Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Performance Analysis of IEEE 802.11 in the Presence of Hidden Terminal for Wireless Networks

  • Conference paper
  • First Online:
Computational Intelligence in Data Mining - Volume 1

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 31))

Abstract

IEEE 802.11 is the most important standard for wireless local area network (WLANs). In IEEE 802.11 the fundamental medium access control (MAC) scheme is the Distributed Coordination Function (DCF). DCF provides both Basic access and RTS/CTS (Request-to-send/ Clear-to-send) access. The previous work for DCF only provide analysis when all the nodes in WLAN lie in the carrier sense range of each other. In the real scenario of WLAN all the stations are in communication range of Access Point (AP) but not necessary with respect to each other, which results in hidden terminals (HT) and degrades the performance. This paper presents an accurate analytical model for DCF in presence of Hidden terminals through Markov Chain for throughput in unsaturated condition i.e. packet error, transmission error. This analytical model is suitable for both Basic access and RTS/CTS access mechanism and is evaluated by extensive simulation results using MATLAB simulator.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Cali, F., Conti, M., Gregori, E.: Dynamic tuning of the IEEE 802.11 protocol to achieve a theoretical throughput limit. IEEE/ACM Trans. Netw. 8(6), 785–799 (2000)

    Article  Google Scholar 

  2. Bianchi, G.: Performance analysis of the IEEE 802.11 distributed coordination function. IEEE J. Sel. Areas Commun. 18(3), 785–799 (2000)

    Article  Google Scholar 

  3. Jiang, L.B., et al.: Improving throughput and fairness by reducing exposed and hidden nodes in 802.11 networks. IEEE Trans. Mob. Comput. 7(1), 34–49 (2008)

    Article  Google Scholar 

  4. Wu, H., et. al.: Analysis of IEEE 802.11 DCF with hidden terminals. IEEE GLOBECOM. (2006)

    Google Scholar 

  5. IEEE 802.11, Part 11(Draft): wireless LAN medium access control (MAC) and physical layer (PHY) specifications. IEEE, New York (Aug 1999)

    Google Scholar 

  6. Chatzimisios, P., Vitsas, V., Boucouvalas, A.C.: Throughput and delay analysis of IEEE 802.11 protocol. In: Proceedings of IEEE International Workshop on Networked Appliances (IWNA), pp. 168–174. Liverpool, UK (Oct 2002)

    Google Scholar 

  7. Jeon, J., Kim, C., Kiseok Lee, L.: Fast retransmission scheme for overcoming hidden node problem in IEEE 802.11 Networks. J Comput. Sci. Eng. 5(4), 324–330 (2011)

    Article  Google Scholar 

  8. Saeed, M.J., Merabti, M., Askwith, R.J.: Hidden and exposed nodes and medium access control in wireless ad-hoc networks. In: Proceedings of the PGNet. School of Computing and Mathematical Sciences, Liverpool John Moores University, UK (2006)

    Google Scholar 

  9. Ergen, M., Varaiya, P.: Throughput analysis and admission control for IEEE 802.11a. Mob. Netw. Appl. 10, 705–716 (2005)

    Article  Google Scholar 

  10. Jafarian, J., Hamdi, K.A.: Analysis of the exposed node problem in IEEE 802.11 wireless networks. In: Proceedings of the PGNet. School of Electrical and Electronic Engineering, University of Manchester, UK (2010)

    Google Scholar 

  11. Kapadia, V.V., Patel, S.N., Jhaveri, R.H.: Comparative study of hidden node problem and solution using different techniques and protocols. J. Comput. 2(3), (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anita .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer India

About this paper

Cite this paper

Anita, Singh, R., Priyanka, Indu (2015). Performance Analysis of IEEE 802.11 in the Presence of Hidden Terminal for Wireless Networks. In: Jain, L., Behera, H., Mandal, J., Mohapatra, D. (eds) Computational Intelligence in Data Mining - Volume 1. Smart Innovation, Systems and Technologies, vol 31. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2205-7_61

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2205-7_61

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2204-0

  • Online ISBN: 978-81-322-2205-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics