A Capacity Analysis for the IEEE 802.11 MAC Protocol
Rent the article at a discountRent now
* Final gross prices may vary according to local VAT.Get Access
The IEEE 802.11 MAC protocol provides shared access to a wireless channel. This paper uses an analytic model to study the channel capacity – i.e., maximum throughput – when using the basic access (two-way handshaking) method in this protocol. It provides closed-form approximations for the probability of collision p, the maximum throughput S and the limit on the number of stations in a wireless cell.
The analysis also shows that: p does not depend on the packet length, the latency in crossing the MAC and physical layers, the acknowledgment timeout, the interframe spaces and the slot size; p and S (and other performance measures) depend on the minimum window size W and the number of stations n only through a gap g=W/(n−1) – consequently, halving W is like doubling n; the maximum contention window size has minimal effect on p and S; the choice of W that maximizes S is proportional to the square root of the packet length; S is maximum when transmission rate (including collisions) equals the reciprocal of transmission time, and this happens when channel wastage due to collisions balances idle bandwidth caused by backoffs.
The results suggest guidelines on when and how W can be adjusted to suit measured traffic, thus making the protocol adaptive.
- Arthurs, E., Stuck, B.W. A theoretical performance analysis of polling and carrier sense collision detection communication systems. In: Ravasio, P.C., Hopkins, G., Naffah, N. eds. (1982) Local Computer Networks. North-Holland, Amsterdam, pp. 415-437
- G. Bianchi, L. Fratta and M. Oliveri, Performance evaluation and enhancement of the CSMA/CA MAC protocol for 802.11 wireless LANs, in: Proc. PIMRC, Taipei, Taiwan (October 1996) pp. 392–396.
- Chhaya, H.S., Gupta, S. (1997) Performance modeling of asynchronous data transfer methods of IEEE 802.11 MAC protocol. Wireless Networks 3: pp. 217-234
- Cottrell, M., Fort, J.C., Malgouyres, G. (1983) Large deviations and rare events in the study of stochastic algorithms. IEEE Transactions on Automatic Control 28: pp. 907-920
- J. Hastad, T. Leighton and B. Rogoff, Analysis of backoff protocols for multiple access channels, in: Proc. Symposium on Theory of Computing, New York (May 1987) pp. 241–253.
- T.S. Ho and K.C. Chen, Performance analysis of IEEE 802.11 CSMA/CA medium access control protocol, in: Proc. PIMRC, Taipei, Taiwan (October 1996) pp. 407–411.
- K.C. Huang and K.C. Chen, Interference analysis of nonpersistent CSMA with hidden terminals in multicell wireless data networks, in: Proc. PIMRC, Toronto, Canada (September 1995) pp. 907–911.
- P802.11, IEEE Draft Standard for Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specification, D6.1 (May 1997).
- Jain, R. (1991) The Art of Computer Systems Performance Analysis. Wiley, New York, NY
- Kim, J.H., Lee, J.K. (1999) Performance of carrier sense multiple access with collision avoidance protocols in wireless LANs. Wireless Personal Communications 11: pp. 161-183
- Kleinrock, L. (1975) Queuing Systems, Vol. I: Theory. Wiley-Interscience, New York, NY
- Kleinrock, L., Tobagi, F.A. (1975) Packet switching in radio channels: Part I — Carrier sense multiple-access modes and their throughputdelay characteristics. IEEE Transactions on Communications 23: pp. 1400-1416
- S.M. Nor and I. Ismail, Performance of CSMA-CA MAC protocol for distributed radio local area networks, in: Proc. PIMRC, Toronto, Canada (September 1995) pp. 912–916.
- Pountourakis, I.E., Sykas, E.D., Protonotarios, E.N. (1995) Stability and throughput optimization of multichannel slotted nonpersistent CSMA protocol. Computer Communications 18: pp. 949-958
- R. Rom and M. Sidi, Multiple Access Protocols: Performance and Analysis (Springer-Verlag, 1990).
- Shwartz, A., Weiss, A. (1995) Large Deviations for Performance Analysis. Chapman & Hall, London, UK
- Szpankowski, W. A multiqueue problem: bounds and approximations. In: Rudin, H., Bux, W. eds. (1984) Performance of Computer-Communication Systems. North-Holland, Amsterdam, pp. 349-364
- Takagi, H., Kleinrock, L. (1985) Throughput analysis for persistent CSMA systems. IEEE Transactions on Communications COM-33: pp. 627-638
- Tan, H.H., Tsai, K. (1996) Packet output process of CSMA and CSMA/CD protocols. IEEE Transactions on Communications 44: pp. 464-474
- Tasaka, S. (1986) Performance Analysis of Multiple Access Protocols. MIT Press, Cambridge, MA
- Tay, Y.C., Goodman, N., Suri, R. (1985) Locking performance in centralized databases. ACM Transactions on Database Systems 10: pp. 415-462
- Tobagi, F.A. (1980) Multiaccess protocols in packet communication systems. IEEE Transactions on Communications 28: pp. 468-488
- M. Visser and M. El Zarki, Voice and data transmission over an 802.11 wireless network, in: Proc. PIMRC, Toronto, Canada (September 1995) pp. 648–652.
- Vo-Dai, T. Throughput-delay analysis of the nonslotted and nonpersistent CSMA-CD protocol. In: Ravasio, P.C., Hopkins, G., Naffah, N. eds. (1982) Local Computer Networks. North-Holland, Amsterdam, pp. 459-476
- A Capacity Analysis for the IEEE 802.11 MAC Protocol
Volume 7, Issue 2 , pp 159-171
- Cover Date
- Print ISSN
- Online ISSN
- Kluwer Academic Publishers
- Additional Links
- IEEE 802.11 MAC protocol
- capacity analysis
- saturation throughput
- closed-form approximation
- analytic validation
- window size adaptation
- Industry Sectors