SlideShare a Scribd company logo
EE384Y – Packet Switch Architectures II                                                                 1


                                  Shahriar Rahman, 4928735

      THROUGHPUT ANALYSIS OF IEEE 802.11 DCF IN PRESENCE OF
                        HIDDEN NODES
Motivation
Scheduling packets in wireless networks is different than wired networks and the actual scheduling is
almost always preceded by a contention phase where wireless nodes compete to gain access to the shared
medium. The reasons behind the contention are the inherent lossy properties and limited bandwidth
of wireless media resulting in frequent packet losses and retransmissions. The situation is exacerbated
by the presence of hidden nodes. The “hidden node problem” is well known in wireless networks
where two communicating nodes can communicate with a third station, but cannot directly
communicate with each other due to physical or spatial limitations.

One of the emerging wireless LAN standards, IEEE 802.11 provides three mechanisms to deal with
the contention phase: Distributed Coordination Function (DCF), Point Coordination Function (PCF) and
Hybrid Coordination Function (HCF). The DCF is the most popular method that operates in a true
distributed manner without any central arbitration and provides the RTS/CTS mechanism to avoid the
“hidden node problem”. Bianchi presents a Markovian model for throughput analysis of wireless
networks employing DCF in [1]. Wu, et. al. in [2] extends it to include station retry limits. However,
nobody has done the throughput analysis of DCF in presence of hidden nodes based on analytical
models. I intend to do so with motivation of quantifying the effect(s) of the “hidden node problem”
on wireless network throughput with and without RTS/CTS access methods of DCF.

Related Work
Sadalgi provides some limited simulation results in [3]. Chatzimisios, et. al. suggests doing so as future
research in [4]. Other than these, currently there is no known work exists.

The Basic Idea
The basic probabilistic model of the presence of hidden node may be based on the Probability of hidden
nodes, P r(h), which depends on the relative spatial characteristics of the nodes. The concept of
reachability, R may be used to quantify Pr(h) as R determines whether two nodes can hear each other or
not. It is expected that the classic CSMA hidden terminal model used by Tobagi and Kleinrock in [5]
can be studied to add suitable extensions to Bianchi’s model. The throughput analysis may then follow.
I intend to do some infrastructure WLAN simulation in ns-2 in order to get some degree of validation
of the analytical results. Current version of ns-2 implements DCF and simulating hidden nodes should
be straight forward using it.
EE384Y – Packet Switch Architectures II                                                          2




Deliverables

The deliverables of the my project are-

    v An analytical model incorporating the effect of hidden nodes extending Bianchi’s DCF model
      for throughput

    v Analytical throughput results using the above model under different traffic loads (e.g.
      Bernoulli, Geometric, Hyper-geometric)

    v Simulation results of the DCF with hidden nodes throughput under the similar loads

    v A comparing discussion of the analytical and simulation results with concluding remarks

Project Plan

 Week 1 (20 April 2003)           Detailed study of hidden node models in shared medium (CSMA)

 Week 4 (11 May 2003)             Analytical model development for DCF with hidden nodes

 Week 5 (18 May 2003)             Analytical throughput results with different traffic loads

 Week 6 (25 May 2003)             Simulation or DCF with hidden nodes and results from ns-2

 Week 7 (1 June 2003)             Comparison, discussions and conclusion



References

[1] G. Bianchi, “Performance Analysis of the IEEE 802.11 Distributed Coordination Function”,
IEEE Journal on Selected Area in Communications V18, N3, 2000.

[2] H. Wu, Y. Peng, K. Long, S. Cheng, J. Ma, “Performance of Reliable Transport Protocol over
IEEE 802.11 Wireless LAN: Analysis And Enhancement”, IEEE INFOCOM'2002.

[3] S. Sadalgi, “A Performance Analysis of the Basic Access of IEEE 802.11 Wireless LAN MAC
Protocol (CSMA/CA)”, Tech Report, CS-Rutgers University, NJ 2000.

[4] P. Chatzimisios, V. Vitsas and A. C. Boucouvalas, “Throughput and Delay Analysis of IEEE
802.11 Protocol”, Tech Report, Bournemouth University, UK 2002.

[5] L. Kleinrock and F. Tobagi, “Packet Switching in Radio Channels, Part II - The Hidden Terminal
Problem in C   arrier Sense Multiple Access and the Busy Tone Solution”, IEEE Transactions On
Communications, vol.23, pp. 1417-1433, 1975.

More Related Content

What's hot

Graph Representation Learning
Graph Representation LearningGraph Representation Learning
Graph Representation Learning
Jure Leskovec
 
Investigation and Evaluation of IEEE 802.11n Wlans Link Features Performance ...
Investigation and Evaluation of IEEE 802.11n Wlans Link Features Performance ...Investigation and Evaluation of IEEE 802.11n Wlans Link Features Performance ...
Investigation and Evaluation of IEEE 802.11n Wlans Link Features Performance ...
pijans
 
Noise Tolerant and Faster On Chip Communication Using Binoc Model
Noise Tolerant and Faster On Chip Communication Using Binoc ModelNoise Tolerant and Faster On Chip Communication Using Binoc Model
Noise Tolerant and Faster On Chip Communication Using Binoc Model
IJMER
 
Digital Wave Simulation of Quasi-Static Partial Element Equivalent Circuit Me...
Digital Wave Simulation of Quasi-Static Partial Element Equivalent Circuit Me...Digital Wave Simulation of Quasi-Static Partial Element Equivalent Circuit Me...
Digital Wave Simulation of Quasi-Static Partial Element Equivalent Circuit Me...
Piero Belforte
 
Vol 8 No 1 - December 2013
Vol 8 No 1 - December 2013Vol 8 No 1 - December 2013
Vol 8 No 1 - December 2013
ijcsbi
 
Representation Learning on Complex Graphs
Representation Learning on Complex GraphsRepresentation Learning on Complex Graphs
Representation Learning on Complex Graphs
eXascale Infolab
 
Types of network topology
Types of network topologyTypes of network topology
Types of network topology
Md Ashikur Rahman
 
Osi model
Osi modelOsi model
Osi model
Harish Sharma
 
IMPERATIVE PROGRAMS BEHAVIOR SIMULATION IN TERMS OF COMPOSITIONAL PETRI NETS
IMPERATIVE PROGRAMS BEHAVIOR SIMULATION IN TERMS OF COMPOSITIONAL PETRI NETSIMPERATIVE PROGRAMS BEHAVIOR SIMULATION IN TERMS OF COMPOSITIONAL PETRI NETS
IMPERATIVE PROGRAMS BEHAVIOR SIMULATION IN TERMS OF COMPOSITIONAL PETRI NETS
IJCNCJournal
 
Clustering for Stream and Parallelism (DATA ANALYTICS)
Clustering for Stream and Parallelism (DATA ANALYTICS)Clustering for Stream and Parallelism (DATA ANALYTICS)
Clustering for Stream and Parallelism (DATA ANALYTICS)
DheerajPachauri
 
Kernel analysis of deep networks
Kernel analysis of deep networksKernel analysis of deep networks
Kernel analysis of deep networks
Behrang Mehrparvar
 
Network Cables
Network CablesNetwork Cables
Network Cables
SanowerHossainRabbi
 
Data encoding techniques for reducing energyb consumption in network on-chip
Data encoding techniques for reducing energyb consumption in network on-chipData encoding techniques for reducing energyb consumption in network on-chip
Data encoding techniques for reducing energyb consumption in network on-chip
LogicMindtech Nologies
 
A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIPA NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
Editor IJMTER
 
Reliability Improvement in Logic Circuit Stochastic Computation
Reliability Improvement in Logic Circuit Stochastic ComputationReliability Improvement in Logic Circuit Stochastic Computation
Reliability Improvement in Logic Circuit Stochastic Computation
Waqas Tariq
 
Ring topology
Ring topologyRing topology
Ring topology
nehrumariya
 
OSI model
OSI modelOSI model
OSI modelDMMemon
 
Mesh topology
Mesh topologyMesh topology
Mesh topology
nehrumariya
 

What's hot (18)

Graph Representation Learning
Graph Representation LearningGraph Representation Learning
Graph Representation Learning
 
Investigation and Evaluation of IEEE 802.11n Wlans Link Features Performance ...
Investigation and Evaluation of IEEE 802.11n Wlans Link Features Performance ...Investigation and Evaluation of IEEE 802.11n Wlans Link Features Performance ...
Investigation and Evaluation of IEEE 802.11n Wlans Link Features Performance ...
 
Noise Tolerant and Faster On Chip Communication Using Binoc Model
Noise Tolerant and Faster On Chip Communication Using Binoc ModelNoise Tolerant and Faster On Chip Communication Using Binoc Model
Noise Tolerant and Faster On Chip Communication Using Binoc Model
 
Digital Wave Simulation of Quasi-Static Partial Element Equivalent Circuit Me...
Digital Wave Simulation of Quasi-Static Partial Element Equivalent Circuit Me...Digital Wave Simulation of Quasi-Static Partial Element Equivalent Circuit Me...
Digital Wave Simulation of Quasi-Static Partial Element Equivalent Circuit Me...
 
Vol 8 No 1 - December 2013
Vol 8 No 1 - December 2013Vol 8 No 1 - December 2013
Vol 8 No 1 - December 2013
 
Representation Learning on Complex Graphs
Representation Learning on Complex GraphsRepresentation Learning on Complex Graphs
Representation Learning on Complex Graphs
 
Types of network topology
Types of network topologyTypes of network topology
Types of network topology
 
Osi model
Osi modelOsi model
Osi model
 
IMPERATIVE PROGRAMS BEHAVIOR SIMULATION IN TERMS OF COMPOSITIONAL PETRI NETS
IMPERATIVE PROGRAMS BEHAVIOR SIMULATION IN TERMS OF COMPOSITIONAL PETRI NETSIMPERATIVE PROGRAMS BEHAVIOR SIMULATION IN TERMS OF COMPOSITIONAL PETRI NETS
IMPERATIVE PROGRAMS BEHAVIOR SIMULATION IN TERMS OF COMPOSITIONAL PETRI NETS
 
Clustering for Stream and Parallelism (DATA ANALYTICS)
Clustering for Stream and Parallelism (DATA ANALYTICS)Clustering for Stream and Parallelism (DATA ANALYTICS)
Clustering for Stream and Parallelism (DATA ANALYTICS)
 
Kernel analysis of deep networks
Kernel analysis of deep networksKernel analysis of deep networks
Kernel analysis of deep networks
 
Network Cables
Network CablesNetwork Cables
Network Cables
 
Data encoding techniques for reducing energyb consumption in network on-chip
Data encoding techniques for reducing energyb consumption in network on-chipData encoding techniques for reducing energyb consumption in network on-chip
Data encoding techniques for reducing energyb consumption in network on-chip
 
A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIPA NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
 
Reliability Improvement in Logic Circuit Stochastic Computation
Reliability Improvement in Logic Circuit Stochastic ComputationReliability Improvement in Logic Circuit Stochastic Computation
Reliability Improvement in Logic Circuit Stochastic Computation
 
Ring topology
Ring topologyRing topology
Ring topology
 
OSI model
OSI modelOSI model
OSI model
 
Mesh topology
Mesh topologyMesh topology
Mesh topology
 

Viewers also liked

Finalaya daily wrap_20mar2013
Finalaya daily wrap_20mar2013Finalaya daily wrap_20mar2013
Finalaya daily wrap_20mar2013
Investors Empowered
 
1A - The Cloud: Was it manna from heaven or just a tin of rice pudding? Roger...
1A - The Cloud: Was it manna from heaven or just a tin of rice pudding? Roger...1A - The Cloud: Was it manna from heaven or just a tin of rice pudding? Roger...
1A - The Cloud: Was it manna from heaven or just a tin of rice pudding? Roger...CFG
 
予備校での利用導入プラン
予備校での利用導入プラン予備校での利用導入プラン
予備校での利用導入プランcotonas_en
 
"Gry Penney'a", Praca dyplomowa
"Gry Penney'a", Praca dyplomowa"Gry Penney'a", Praca dyplomowa
"Gry Penney'a", Praca dyplomowa
Piotr Szlagor
 
Formato3
Formato3Formato3
2. division serie_1
2. division serie_12. division serie_1
2. division serie_1
sportwort
 
Security, Audit and Compliance: course overview
Security, Audit and Compliance: course overviewSecurity, Audit and Compliance: course overview
Security, Audit and Compliance: course overview
Edinburgh Napier University
 
Fuentes de energia cruc igrama
Fuentes de energia cruc igramaFuentes de energia cruc igrama
Fuentes de energia cruc igramacpro2000
 
как разработать тесты
как разработать тестыкак разработать тесты
как разработать тестыTatyana Voronova
 
Two Days Seven Conversations
Two Days Seven ConversationsTwo Days Seven Conversations
Two Days Seven Conversations
Stuart Fensterheim LCSW
 
Infografia proyecto de la vivienda economica
Infografia proyecto de la vivienda economicaInfografia proyecto de la vivienda economica
Infografia proyecto de la vivienda economica
Ariana Gomez
 

Viewers also liked (15)

Hn analysis
Hn analysisHn analysis
Hn analysis
 
Finalaya daily wrap_20mar2013
Finalaya daily wrap_20mar2013Finalaya daily wrap_20mar2013
Finalaya daily wrap_20mar2013
 
Gnuplot
GnuplotGnuplot
Gnuplot
 
1A - The Cloud: Was it manna from heaven or just a tin of rice pudding? Roger...
1A - The Cloud: Was it manna from heaven or just a tin of rice pudding? Roger...1A - The Cloud: Was it manna from heaven or just a tin of rice pudding? Roger...
1A - The Cloud: Was it manna from heaven or just a tin of rice pudding? Roger...
 
予備校での利用導入プラン
予備校での利用導入プラン予備校での利用導入プラン
予備校での利用導入プラン
 
Auditing
AuditingAuditing
Auditing
 
"Gry Penney'a", Praca dyplomowa
"Gry Penney'a", Praca dyplomowa"Gry Penney'a", Praca dyplomowa
"Gry Penney'a", Praca dyplomowa
 
Formato3
Formato3Formato3
Formato3
 
2. division serie_1
2. division serie_12. division serie_1
2. division serie_1
 
Wedding presentation
Wedding presentationWedding presentation
Wedding presentation
 
Security, Audit and Compliance: course overview
Security, Audit and Compliance: course overviewSecurity, Audit and Compliance: course overview
Security, Audit and Compliance: course overview
 
Fuentes de energia cruc igrama
Fuentes de energia cruc igramaFuentes de energia cruc igrama
Fuentes de energia cruc igrama
 
как разработать тесты
как разработать тестыкак разработать тесты
как разработать тесты
 
Two Days Seven Conversations
Two Days Seven ConversationsTwo Days Seven Conversations
Two Days Seven Conversations
 
Infografia proyecto de la vivienda economica
Infografia proyecto de la vivienda economicaInfografia proyecto de la vivienda economica
Infografia proyecto de la vivienda economica
 

Similar to Hn cw

Experimental analysis of channel interference in ad hoc network
Experimental analysis of channel interference in ad hoc networkExperimental analysis of channel interference in ad hoc network
Experimental analysis of channel interference in ad hoc network
ijcsa
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
IJERD Editor
 
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
ijwmn
 
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
ijwmn
 
Wireless Ad Hoc Networking Lecture Notes
Wireless Ad Hoc Networking Lecture NotesWireless Ad Hoc Networking Lecture Notes
Wireless Ad Hoc Networking Lecture Notes
DrAdeelAkram2
 
DYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKS
DYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKSDYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKS
DYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKS
pharmaindexing
 
Congestion aware routing algorithm network on chip
Congestion aware routing algorithm network on chipCongestion aware routing algorithm network on chip
Congestion aware routing algorithm network on chip
NiteshKumar198644
 
Design of fault tolerant algorithm for network on chip router using field pr...
Design of fault tolerant algorithm for network on chip router  using field pr...Design of fault tolerant algorithm for network on chip router  using field pr...
Design of fault tolerant algorithm for network on chip router using field pr...
International Journal of Reconfigurable and Embedded Systems
 
I05225564
I05225564I05225564
I05225564
IOSR-JEN
 
PERFORMANCE EVALUATION OF MOBILE WIMAX IEEE 802.16E FOR HARD HANDOVER
PERFORMANCE EVALUATION OF MOBILE WIMAX IEEE 802.16E FOR HARD HANDOVERPERFORMANCE EVALUATION OF MOBILE WIMAX IEEE 802.16E FOR HARD HANDOVER
PERFORMANCE EVALUATION OF MOBILE WIMAX IEEE 802.16E FOR HARD HANDOVER
IJCNCJournal
 
Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...
Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...
Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...
BRNSSPublicationHubI
 
IMPROVED EXTENDED XY ON-CHIP ROUTING IN DIAMETRICAL 2D MESH NOC
IMPROVED EXTENDED XY ON-CHIP ROUTING IN DIAMETRICAL 2D MESH NOCIMPROVED EXTENDED XY ON-CHIP ROUTING IN DIAMETRICAL 2D MESH NOC
IMPROVED EXTENDED XY ON-CHIP ROUTING IN DIAMETRICAL 2D MESH NOC
VLSICS Design
 
Paper id 21201485
Paper id 21201485Paper id 21201485
Paper id 21201485IJRAT
 
A20345606_Shah_Bonus_Report
A20345606_Shah_Bonus_ReportA20345606_Shah_Bonus_Report
A20345606_Shah_Bonus_ReportPanth Shah
 
J010216776
J010216776J010216776
J010216776
IOSR Journals
 
IEEE 802.11n Based Wireless Backhaul Enabled by Dual Channel IPT (DCH-IPT) Fo...
IEEE 802.11n Based Wireless Backhaul Enabled by Dual Channel IPT (DCH-IPT) Fo...IEEE 802.11n Based Wireless Backhaul Enabled by Dual Channel IPT (DCH-IPT) Fo...
IEEE 802.11n Based Wireless Backhaul Enabled by Dual Channel IPT (DCH-IPT) Fo...
CSCJournals
 
COMPARATIVE PERFORMANCE ANALYSIS OF THE IEEE802.11AX AND 802.11AC MIMOLINK FO...
COMPARATIVE PERFORMANCE ANALYSIS OF THE IEEE802.11AX AND 802.11AC MIMOLINK FO...COMPARATIVE PERFORMANCE ANALYSIS OF THE IEEE802.11AX AND 802.11AC MIMOLINK FO...
COMPARATIVE PERFORMANCE ANALYSIS OF THE IEEE802.11AX AND 802.11AC MIMOLINK FO...
pijans
 
Crosslayertermpaper
CrosslayertermpaperCrosslayertermpaper
Crosslayertermpaper
B.T.L.I.T
 

Similar to Hn cw (20)

Experimental analysis of channel interference in ad hoc network
Experimental analysis of channel interference in ad hoc networkExperimental analysis of channel interference in ad hoc network
Experimental analysis of channel interference in ad hoc network
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
 
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
 
Wireless Ad Hoc Networking Lecture Notes
Wireless Ad Hoc Networking Lecture NotesWireless Ad Hoc Networking Lecture Notes
Wireless Ad Hoc Networking Lecture Notes
 
DYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKS
DYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKSDYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKS
DYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKS
 
Congestion aware routing algorithm network on chip
Congestion aware routing algorithm network on chipCongestion aware routing algorithm network on chip
Congestion aware routing algorithm network on chip
 
Design of fault tolerant algorithm for network on chip router using field pr...
Design of fault tolerant algorithm for network on chip router  using field pr...Design of fault tolerant algorithm for network on chip router  using field pr...
Design of fault tolerant algorithm for network on chip router using field pr...
 
UIC Thesis Corbetta
UIC Thesis CorbettaUIC Thesis Corbetta
UIC Thesis Corbetta
 
I05225564
I05225564I05225564
I05225564
 
PERFORMANCE EVALUATION OF MOBILE WIMAX IEEE 802.16E FOR HARD HANDOVER
PERFORMANCE EVALUATION OF MOBILE WIMAX IEEE 802.16E FOR HARD HANDOVERPERFORMANCE EVALUATION OF MOBILE WIMAX IEEE 802.16E FOR HARD HANDOVER
PERFORMANCE EVALUATION OF MOBILE WIMAX IEEE 802.16E FOR HARD HANDOVER
 
Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...
Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...
Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...
 
IMPROVED EXTENDED XY ON-CHIP ROUTING IN DIAMETRICAL 2D MESH NOC
IMPROVED EXTENDED XY ON-CHIP ROUTING IN DIAMETRICAL 2D MESH NOCIMPROVED EXTENDED XY ON-CHIP ROUTING IN DIAMETRICAL 2D MESH NOC
IMPROVED EXTENDED XY ON-CHIP ROUTING IN DIAMETRICAL 2D MESH NOC
 
Paper id 21201485
Paper id 21201485Paper id 21201485
Paper id 21201485
 
A20345606_Shah_Bonus_Report
A20345606_Shah_Bonus_ReportA20345606_Shah_Bonus_Report
A20345606_Shah_Bonus_Report
 
Ax24329333
Ax24329333Ax24329333
Ax24329333
 
J010216776
J010216776J010216776
J010216776
 
IEEE 802.11n Based Wireless Backhaul Enabled by Dual Channel IPT (DCH-IPT) Fo...
IEEE 802.11n Based Wireless Backhaul Enabled by Dual Channel IPT (DCH-IPT) Fo...IEEE 802.11n Based Wireless Backhaul Enabled by Dual Channel IPT (DCH-IPT) Fo...
IEEE 802.11n Based Wireless Backhaul Enabled by Dual Channel IPT (DCH-IPT) Fo...
 
COMPARATIVE PERFORMANCE ANALYSIS OF THE IEEE802.11AX AND 802.11AC MIMOLINK FO...
COMPARATIVE PERFORMANCE ANALYSIS OF THE IEEE802.11AX AND 802.11AC MIMOLINK FO...COMPARATIVE PERFORMANCE ANALYSIS OF THE IEEE802.11AX AND 802.11AC MIMOLINK FO...
COMPARATIVE PERFORMANCE ANALYSIS OF THE IEEE802.11AX AND 802.11AC MIMOLINK FO...
 
Crosslayertermpaper
CrosslayertermpaperCrosslayertermpaper
Crosslayertermpaper
 

Hn cw

  • 1. EE384Y – Packet Switch Architectures II 1 Shahriar Rahman, 4928735 THROUGHPUT ANALYSIS OF IEEE 802.11 DCF IN PRESENCE OF HIDDEN NODES Motivation Scheduling packets in wireless networks is different than wired networks and the actual scheduling is almost always preceded by a contention phase where wireless nodes compete to gain access to the shared medium. The reasons behind the contention are the inherent lossy properties and limited bandwidth of wireless media resulting in frequent packet losses and retransmissions. The situation is exacerbated by the presence of hidden nodes. The “hidden node problem” is well known in wireless networks where two communicating nodes can communicate with a third station, but cannot directly communicate with each other due to physical or spatial limitations. One of the emerging wireless LAN standards, IEEE 802.11 provides three mechanisms to deal with the contention phase: Distributed Coordination Function (DCF), Point Coordination Function (PCF) and Hybrid Coordination Function (HCF). The DCF is the most popular method that operates in a true distributed manner without any central arbitration and provides the RTS/CTS mechanism to avoid the “hidden node problem”. Bianchi presents a Markovian model for throughput analysis of wireless networks employing DCF in [1]. Wu, et. al. in [2] extends it to include station retry limits. However, nobody has done the throughput analysis of DCF in presence of hidden nodes based on analytical models. I intend to do so with motivation of quantifying the effect(s) of the “hidden node problem” on wireless network throughput with and without RTS/CTS access methods of DCF. Related Work Sadalgi provides some limited simulation results in [3]. Chatzimisios, et. al. suggests doing so as future research in [4]. Other than these, currently there is no known work exists. The Basic Idea The basic probabilistic model of the presence of hidden node may be based on the Probability of hidden nodes, P r(h), which depends on the relative spatial characteristics of the nodes. The concept of reachability, R may be used to quantify Pr(h) as R determines whether two nodes can hear each other or not. It is expected that the classic CSMA hidden terminal model used by Tobagi and Kleinrock in [5] can be studied to add suitable extensions to Bianchi’s model. The throughput analysis may then follow. I intend to do some infrastructure WLAN simulation in ns-2 in order to get some degree of validation of the analytical results. Current version of ns-2 implements DCF and simulating hidden nodes should be straight forward using it.
  • 2. EE384Y – Packet Switch Architectures II 2 Deliverables The deliverables of the my project are- v An analytical model incorporating the effect of hidden nodes extending Bianchi’s DCF model for throughput v Analytical throughput results using the above model under different traffic loads (e.g. Bernoulli, Geometric, Hyper-geometric) v Simulation results of the DCF with hidden nodes throughput under the similar loads v A comparing discussion of the analytical and simulation results with concluding remarks Project Plan Week 1 (20 April 2003) Detailed study of hidden node models in shared medium (CSMA) Week 4 (11 May 2003) Analytical model development for DCF with hidden nodes Week 5 (18 May 2003) Analytical throughput results with different traffic loads Week 6 (25 May 2003) Simulation or DCF with hidden nodes and results from ns-2 Week 7 (1 June 2003) Comparison, discussions and conclusion References [1] G. Bianchi, “Performance Analysis of the IEEE 802.11 Distributed Coordination Function”, IEEE Journal on Selected Area in Communications V18, N3, 2000. [2] H. Wu, Y. Peng, K. Long, S. Cheng, J. Ma, “Performance of Reliable Transport Protocol over IEEE 802.11 Wireless LAN: Analysis And Enhancement”, IEEE INFOCOM'2002. [3] S. Sadalgi, “A Performance Analysis of the Basic Access of IEEE 802.11 Wireless LAN MAC Protocol (CSMA/CA)”, Tech Report, CS-Rutgers University, NJ 2000. [4] P. Chatzimisios, V. Vitsas and A. C. Boucouvalas, “Throughput and Delay Analysis of IEEE 802.11 Protocol”, Tech Report, Bournemouth University, UK 2002. [5] L. Kleinrock and F. Tobagi, “Packet Switching in Radio Channels, Part II - The Hidden Terminal Problem in C arrier Sense Multiple Access and the Busy Tone Solution”, IEEE Transactions On Communications, vol.23, pp. 1417-1433, 1975.