Performance Analysis of IEEE 802.11 in the Presence of Hidden Terminal for Wireless Networks

Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 31)

Abstract

IEEE 802.11 is the most important standard for wireless local area network (WLANs). In IEEE 802.11 the fundamental medium access control (MAC) scheme is the Distributed Coordination Function (DCF). DCF provides both Basic access and RTS/CTS (Request-to-send/ Clear-to-send) access. The previous work for DCF only provide analysis when all the nodes in WLAN lie in the carrier sense range of each other. In the real scenario of WLAN all the stations are in communication range of Access Point (AP) but not necessary with respect to each other, which results in hidden terminals (HT) and degrades the performance. This paper presents an accurate analytical model for DCF in presence of Hidden terminals through Markov Chain for throughput in unsaturated condition i.e. packet error, transmission error. This analytical model is suitable for both Basic access and RTS/CTS access mechanism and is evaluated by extensive simulation results using MATLAB simulator.

Keywords

WLAN MAC DCF Basic access RTS/CTS Hidden terminals Unsaturated conditions 

References

  1. 1.
    Cali, F., Conti, M., Gregori, E.: Dynamic tuning of the IEEE 802.11 protocol to achieve a theoretical throughput limit. IEEE/ACM Trans. Netw. 8(6), 785–799 (2000)CrossRefGoogle Scholar
  2. 2.
    Bianchi, G.: Performance analysis of the IEEE 802.11 distributed coordination function. IEEE J. Sel. Areas Commun. 18(3), 785–799 (2000)CrossRefGoogle Scholar
  3. 3.
    Jiang, L.B., et al.: Improving throughput and fairness by reducing exposed and hidden nodes in 802.11 networks. IEEE Trans. Mob. Comput. 7(1), 34–49 (2008)CrossRefGoogle Scholar
  4. 4.
    Wu, H., et. al.: Analysis of IEEE 802.11 DCF with hidden terminals. IEEE GLOBECOM. (2006)Google Scholar
  5. 5.
    IEEE 802.11, Part 11(Draft): wireless LAN medium access control (MAC) and physical layer (PHY) specifications. IEEE, New York (Aug 1999)Google Scholar
  6. 6.
    Chatzimisios, P., Vitsas, V., Boucouvalas, A.C.: Throughput and delay analysis of IEEE 802.11 protocol. In: Proceedings of IEEE International Workshop on Networked Appliances (IWNA), pp. 168–174. Liverpool, UK (Oct 2002)Google Scholar
  7. 7.
    Jeon, J., Kim, C., Kiseok Lee, L.: Fast retransmission scheme for overcoming hidden node problem in IEEE 802.11 Networks. J Comput. Sci. Eng. 5(4), 324–330 (2011)CrossRefGoogle Scholar
  8. 8.
    Saeed, M.J., Merabti, M., Askwith, R.J.: Hidden and exposed nodes and medium access control in wireless ad-hoc networks. In: Proceedings of the PGNet. School of Computing and Mathematical Sciences, Liverpool John Moores University, UK (2006)Google Scholar
  9. 9.
    Ergen, M., Varaiya, P.: Throughput analysis and admission control for IEEE 802.11a. Mob. Netw. Appl. 10, 705–716 (2005)CrossRefGoogle Scholar
  10. 10.
    Jafarian, J., Hamdi, K.A.: Analysis of the exposed node problem in IEEE 802.11 wireless networks. In: Proceedings of the PGNet. School of Electrical and Electronic Engineering, University of Manchester, UK (2010)Google Scholar
  11. 11.
    Kapadia, V.V., Patel, S.N., Jhaveri, R.H.: Comparative study of hidden node problem and solution using different techniques and protocols. J. Comput. 2(3), (2010)Google Scholar

Copyright information

© Springer India 2015

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringBanasthali VidhyapithTonkIndia
  2. 2.Department of Computer Science and EngineeringGuru Jambheshwar University of Science and TechnologyHisarIndia

Personalised recommendations