Abstract
IEEE 802.11 is the most important standard for wireless local area network (WLANs). In IEEE 802.11 the fundamental medium access control (MAC) scheme is the Distributed Coordination Function (DCF). DCF provides both Basic access and RTS/CTS (Request-to-send/ Clear-to-send) access. The previous work for DCF only provide analysis when all the nodes in WLAN lie in the carrier sense range of each other. In the real scenario of WLAN all the stations are in communication range of Access Point (AP) but not necessary with respect to each other, which results in hidden terminals (HT) and degrades the performance. This paper presents an accurate analytical model for DCF in presence of Hidden terminals through Markov Chain for throughput in unsaturated condition i.e. packet error, transmission error. This analytical model is suitable for both Basic access and RTS/CTS access mechanism and is evaluated by extensive simulation results using MATLAB simulator.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Cali, F., Conti, M., Gregori, E.: Dynamic tuning of the IEEE 802.11 protocol to achieve a theoretical throughput limit. IEEE/ACM Trans. Netw. 8(6), 785–799 (2000)
Bianchi, G.: Performance analysis of the IEEE 802.11 distributed coordination function. IEEE J. Sel. Areas Commun. 18(3), 785–799 (2000)
Jiang, L.B., et al.: Improving throughput and fairness by reducing exposed and hidden nodes in 802.11 networks. IEEE Trans. Mob. Comput. 7(1), 34–49 (2008)
Wu, H., et. al.: Analysis of IEEE 802.11 DCF with hidden terminals. IEEE GLOBECOM. (2006)
IEEE 802.11, Part 11(Draft): wireless LAN medium access control (MAC) and physical layer (PHY) specifications. IEEE, New York (Aug 1999)
Chatzimisios, P., Vitsas, V., Boucouvalas, A.C.: Throughput and delay analysis of IEEE 802.11 protocol. In: Proceedings of IEEE International Workshop on Networked Appliances (IWNA), pp. 168–174. Liverpool, UK (Oct 2002)
Jeon, J., Kim, C., Kiseok Lee, L.: Fast retransmission scheme for overcoming hidden node problem in IEEE 802.11 Networks. J Comput. Sci. Eng. 5(4), 324–330 (2011)
Saeed, M.J., Merabti, M., Askwith, R.J.: Hidden and exposed nodes and medium access control in wireless ad-hoc networks. In: Proceedings of the PGNet. School of Computing and Mathematical Sciences, Liverpool John Moores University, UK (2006)
Ergen, M., Varaiya, P.: Throughput analysis and admission control for IEEE 802.11a. Mob. Netw. Appl. 10, 705–716 (2005)
Jafarian, J., Hamdi, K.A.: Analysis of the exposed node problem in IEEE 802.11 wireless networks. In: Proceedings of the PGNet. School of Electrical and Electronic Engineering, University of Manchester, UK (2010)
Kapadia, V.V., Patel, S.N., Jhaveri, R.H.: Comparative study of hidden node problem and solution using different techniques and protocols. J. Comput. 2(3), (2010)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer India
About this paper
Cite this paper
Anita, Singh, R., Priyanka, Indu (2015). Performance Analysis of IEEE 802.11 in the Presence of Hidden Terminal for Wireless Networks. In: Jain, L., Behera, H., Mandal, J., Mohapatra, D. (eds) Computational Intelligence in Data Mining - Volume 1. Smart Innovation, Systems and Technologies, vol 31. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2205-7_61
Download citation
DOI: https://doi.org/10.1007/978-81-322-2205-7_61
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-2204-0
Online ISBN: 978-81-322-2205-7
eBook Packages: EngineeringEngineering (R0)