ABSTRACT
In this paper, we develop a Markov model to evaluate the performance of WLAN in the presence of hidden terminals. We focus on characterizing and studying the scenario of an access point with a population of clients partitioned into two mutually hidden groups, and derive a model to estimate the network throughput and the individual nodes' throughput. We propose a general methodology to solve the Markov chain by forming a nonlinear system of equations which describes the relationship between the conditional state transition probabilities, the transmission attempts probability and the steady state probability. Unlike alternative approaches, it is not necessary to invoke iterative methods to solve this system. We also demonstrate how our methodology and model can be used to estimate the optimal stable rate for each source in the WLAN as a means for rate control to achieve a given fairness principle between hidden groups of nodes and avoid starvation or congestion collapse for one group. Simulation results attest to the accuracy of our proposed model.
- IEEE standard for information technology-telecommunications and information exchange between systems-local and metropolitan area networks-specific requirements - part 11: Wireless LAN medium access control (MAC) and physical layer (PHY) specifications. IEEE Std 802.11-2007 (Revision of IEEE Std 802.11-1999), pages C1-1184, June 12 2007.Google Scholar
- G. Bianchi,"Performance analysis of the IEEE 802.11 distributed coordination function," IEEE Journal on Selected Areas in Communications, 18(3):535--547, March 2000. Google ScholarDigital Library
- G. Bianchi, L. Fratta, and M. Oliveri, "Performance evaluation and enhancement of the CSMA/CA MAC protocol for 802.11 wireless LANs," in Proc. IEEE PIMRC, 1996.Google Scholar
- R. Boorstyn, A. Kershenbaum, B. Maglaris, and V. Sahin, "Throughput analysis in multihop csma packet radio networks," IEEE Transactions on Communications, 35(3):267--274, 1987.Google ScholarCross Ref
- M. Borgo, A. Zanella, P. Bisaglia, and S. Merlin, "Analysis of the hidden terminal e ect in multi-rate IEEE 802.11b networks," in Proc. WPMC, 2004.Google Scholar
- F. Cali, M. Conti, and E. Gregori, "IEEE 802.11 wireless LAN: Capacity analysis and protocol enhancement," in Proc. IEEE INFOCOM, 1998.Google ScholarCross Ref
- H. S. Chhaya and S. Gupta, "Performance modeling of asynchronous data transfer methods of IEEE 802.11MAC protocol," Wireless Networks, 3:217--234, 1997. Google ScholarDigital Library
- M. Garetto, T. Salonidis, and E. W. Knightly, "Modeling per-flow throughput and capturing starvation in CSMA multi-hop wireless networks," in Proc. IEEE INFOCOM, 2006.Google ScholarCross Ref
- M. Garetto, J. Shi, and E. W. Knightly, "Modeling media access in embedded two-flow topologies of multi-hop wireless networks," in Proc. ACM MobiCom, 2005. Google ScholarDigital Library
- T. S. Ho and K. C. Chen, "Performance analysys of IEEE 802.11 CSMA/CA medium access control protocol," in Proc. IEEE PIMRC, 1996.Google Scholar
- F. P. Kelly, "Reversibility and Stochastic Networks," Wiley, 1979.Google Scholar
- A. Kumar, E. Altman, D. Miorandi, and M. Goyal, "New insights from a fixed-point analysis of single cell IEEE 802.11 WLANs," IEEE/ACM Transactions on Networking, 15(3):588--601, Jun 2007. Google ScholarDigital Library
- Z. Li, S. Nandi, and A. K. Gupta, "Modeling the short-term unfairness of IEEE 802.11 in presence of hidden terminals", Performance Evaluation, 63(4):441--462, 2006. Google ScholarDigital Library
- W. Moh, D. Yao, and K. Makki, "Wireless LAN: study of hidden-terminal effect and multimedia support," in Proc. ICCCN, 1998. Google ScholarDigital Library
- ns-2, http://www.isi.edu/nsnam/ns/.Google Scholar
- L. Qiu, Y. Zhang, F. Wang, M. K. Han, and R. Mahajan, "A general model of wireless interference," in Proc. ACM MobiCom, 2007. Google ScholarDigital Library
- X. Wang and K. Kar, "Throughput modelling and fairness issues in CSMA/CA based ad-hoc networks," in Proc. IEEE INFOCOM, 2005.Google Scholar
- H. Wu, F. Zhu, Q. Zhang, and Z. Niu, "Analysis of IEEE 802.11 DCF with hidden terminals," in Proc. IEEE Globecom, 2006.Google Scholar
Index Terms
- Throughput analysis and rate control for IEEE 802.11 Wireless LAN with hidden terminals
Recommendations
Throughput analysis and bandwidth allocation for IEEE 802.11 WLAN with hidden terminals
Motivated by observations from real world wireless local area network (WLAN) deployments, we develop in this paper a novel analytical model to characterize the saturation throughput of an IEEE 802.11-based access point (AP) and stations under the ...
Goodput and throughput comparison of single-hop and multi-hop routing for IEEE 802.11 DCF-based wireless networks under hidden terminal existence
We investigate how multi-hop routing affects the goodput and throughput performances of IEEE 802.11 distributed coordination function-based wireless networks compared with direct transmission single hopping, when medium access control dynamics such as ...
Performance Analysis of IEEE 802.11p in the Presence of Hidden Terminals
This paper concentrates on the IEEE 802.11p MAC sublayer to analyze its performance in the presence of hidden terminals. An analytical model for the throughput of the IEEE 802.11p in the presence of hidden terminal is presented in this paper. A 3-D ...
Comments