Short-term nonuniform access in IEEE 802.11-compliant WLANs

A microscopic view and its impact

Chunyu Hu, Hwangnam Kim, Jennifer C. Hou

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

Along with the success of IEEE 802.11-compliant WLANs, the Distributed Coordinated Function (DCF) specified as the contention-based medium access mechanism in IEEE 802,11 has been widely used to support applications in new regimes. A thorough understanding of the characteristics of IEEE 802.11 DCF is therefore a research focus. DCF assumes the binary exponential backoff algorithm (BEBA), Several existing models that characterize BEBA as a p-persistent scheme have ignored several subtle protocol details. This has practically constrained the models from being applied in a broader range of configurations, e.g., small contention window, and from being further extended, e.g. 802.11e EDCA. In this paper, we develop an analytical model that captures the subtlety, and faithfully describes the channel activities as governed by DCF. Based on the devised model, we perform a rigorous analysis on the saturation throughput performance in a single-hop WLAN. We also identify, by clearly defining and thus being able to differentiate the two terms, attempt probability and transmission probability, an erroneous extension made to Bianchi's model [3]. All the findings are corroborated by ns-2 simulation.

Original languageEnglish
Title of host publicationACM MSWiM 2006 - Proceedings of the 9th ACM Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems
Pages99-107
Number of pages9
Volume2006
Publication statusPublished - 2006 Nov 16
EventACM MSWiM 2006 - 9th ACM Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems - Malaga, Spain
Duration: 2006 Oct 22006 Oct 6

Other

OtherACM MSWiM 2006 - 9th ACM Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems
CountrySpain
CityMalaga
Period06/10/206/10/6

Fingerprint

Wireless local area networks (WLAN)
Analytical models
Throughput
Network protocols

Keywords

  • Backoff algorithm
  • IEEE 802.11 MAC
  • Model
  • p-Persistent

ASJC Scopus subject areas

  • Engineering(all)

Cite this

Hu, C., Kim, H., & Hou, J. C. (2006). Short-term nonuniform access in IEEE 802.11-compliant WLANs: A microscopic view and its impact. In ACM MSWiM 2006 - Proceedings of the 9th ACM Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems (Vol. 2006, pp. 99-107)

Short-term nonuniform access in IEEE 802.11-compliant WLANs : A microscopic view and its impact. / Hu, Chunyu; Kim, Hwangnam; Hou, Jennifer C.

ACM MSWiM 2006 - Proceedings of the 9th ACM Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems. Vol. 2006 2006. p. 99-107.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Hu, C, Kim, H & Hou, JC 2006, Short-term nonuniform access in IEEE 802.11-compliant WLANs: A microscopic view and its impact. in ACM MSWiM 2006 - Proceedings of the 9th ACM Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems. vol. 2006, pp. 99-107, ACM MSWiM 2006 - 9th ACM Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems, Malaga, Spain, 06/10/2.
Hu C, Kim H, Hou JC. Short-term nonuniform access in IEEE 802.11-compliant WLANs: A microscopic view and its impact. In ACM MSWiM 2006 - Proceedings of the 9th ACM Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems. Vol. 2006. 2006. p. 99-107
Hu, Chunyu ; Kim, Hwangnam ; Hou, Jennifer C. / Short-term nonuniform access in IEEE 802.11-compliant WLANs : A microscopic view and its impact. ACM MSWiM 2006 - Proceedings of the 9th ACM Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems. Vol. 2006 2006. pp. 99-107
@inproceedings{eb8d0a4458514a3ab7b1fa52687dba29,
title = "Short-term nonuniform access in IEEE 802.11-compliant WLANs: A microscopic view and its impact",
abstract = "Along with the success of IEEE 802.11-compliant WLANs, the Distributed Coordinated Function (DCF) specified as the contention-based medium access mechanism in IEEE 802,11 has been widely used to support applications in new regimes. A thorough understanding of the characteristics of IEEE 802.11 DCF is therefore a research focus. DCF assumes the binary exponential backoff algorithm (BEBA), Several existing models that characterize BEBA as a p-persistent scheme have ignored several subtle protocol details. This has practically constrained the models from being applied in a broader range of configurations, e.g., small contention window, and from being further extended, e.g. 802.11e EDCA. In this paper, we develop an analytical model that captures the subtlety, and faithfully describes the channel activities as governed by DCF. Based on the devised model, we perform a rigorous analysis on the saturation throughput performance in a single-hop WLAN. We also identify, by clearly defining and thus being able to differentiate the two terms, attempt probability and transmission probability, an erroneous extension made to Bianchi's model [3]. All the findings are corroborated by ns-2 simulation.",
keywords = "Backoff algorithm, IEEE 802.11 MAC, Model, p-Persistent",
author = "Chunyu Hu and Hwangnam Kim and Hou, {Jennifer C.}",
year = "2006",
month = "11",
day = "16",
language = "English",
isbn = "1595934774",
volume = "2006",
pages = "99--107",
booktitle = "ACM MSWiM 2006 - Proceedings of the 9th ACM Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems",

}

TY - GEN

T1 - Short-term nonuniform access in IEEE 802.11-compliant WLANs

T2 - A microscopic view and its impact

AU - Hu, Chunyu

AU - Kim, Hwangnam

AU - Hou, Jennifer C.

PY - 2006/11/16

Y1 - 2006/11/16

N2 - Along with the success of IEEE 802.11-compliant WLANs, the Distributed Coordinated Function (DCF) specified as the contention-based medium access mechanism in IEEE 802,11 has been widely used to support applications in new regimes. A thorough understanding of the characteristics of IEEE 802.11 DCF is therefore a research focus. DCF assumes the binary exponential backoff algorithm (BEBA), Several existing models that characterize BEBA as a p-persistent scheme have ignored several subtle protocol details. This has practically constrained the models from being applied in a broader range of configurations, e.g., small contention window, and from being further extended, e.g. 802.11e EDCA. In this paper, we develop an analytical model that captures the subtlety, and faithfully describes the channel activities as governed by DCF. Based on the devised model, we perform a rigorous analysis on the saturation throughput performance in a single-hop WLAN. We also identify, by clearly defining and thus being able to differentiate the two terms, attempt probability and transmission probability, an erroneous extension made to Bianchi's model [3]. All the findings are corroborated by ns-2 simulation.

AB - Along with the success of IEEE 802.11-compliant WLANs, the Distributed Coordinated Function (DCF) specified as the contention-based medium access mechanism in IEEE 802,11 has been widely used to support applications in new regimes. A thorough understanding of the characteristics of IEEE 802.11 DCF is therefore a research focus. DCF assumes the binary exponential backoff algorithm (BEBA), Several existing models that characterize BEBA as a p-persistent scheme have ignored several subtle protocol details. This has practically constrained the models from being applied in a broader range of configurations, e.g., small contention window, and from being further extended, e.g. 802.11e EDCA. In this paper, we develop an analytical model that captures the subtlety, and faithfully describes the channel activities as governed by DCF. Based on the devised model, we perform a rigorous analysis on the saturation throughput performance in a single-hop WLAN. We also identify, by clearly defining and thus being able to differentiate the two terms, attempt probability and transmission probability, an erroneous extension made to Bianchi's model [3]. All the findings are corroborated by ns-2 simulation.

KW - Backoff algorithm

KW - IEEE 802.11 MAC

KW - Model

KW - p-Persistent

UR - http://www.scopus.com/inward/record.url?scp=33750925145&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=33750925145&partnerID=8YFLogxK

M3 - Conference contribution

SN - 1595934774

SN - 9781595934772

VL - 2006

SP - 99

EP - 107

BT - ACM MSWiM 2006 - Proceedings of the 9th ACM Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems

ER -