IEEE 802.11 Saturation Throughput Analysis in the Presence of Hidden Terminals

Due to its usefulness and wide deployment, IEEE 802.11 has been the subject of numerous studies, but still lacks a complete analytical model. Hidden terminals are common in IEEE 802.11 and cause the degradation of throughput. Despite the importance of the hidden terminal problem, there have been a relatively small number of studies that consider the effect of hidden terminals on IEEE 802.11 throughput, and many are not accurate for a wide range of conditions. In this paper, we present an accurate new analytical saturation throughput model for the infrastructure case of IEEE 802.11 in the presence of hidden terminals. Simulation results show that our model is accurate in a wide variety of cases.

[1]  Vladimir M. Vishnevsky,et al.  1 LANs: Saturation Throughput in the Presence of Noise , 2002, NETWORKING.

[2]  Abbas Yongaçoglu,et al.  IEEE 802.11a Throughput Performance with Hidden Nodes , 2008, IEEE Communications Letters.

[3]  John S. Thompson,et al.  A New Approach for the Throughput Analysis of IEEE 802.11 in Networks with Hidden Terminals , 2005 .

[4]  Soung Chang Liew,et al.  Improving Throughput and Fairness by Reducing Exposed and Hidden Nodes in 802.11 Networks , 2008, IEEE Transactions on Mobile Computing.

[5]  Bob O'Hara,et al.  IEEE 802.11g Higher Data Rates in the 2.4 GHz Band , 2007 .

[6]  Gang Wei,et al.  Performance Analysis of IEEE 802.11 DCF in Multi-hop Ad Hoc Networks , 2009, 2009 Eighth IEEE/ACIS International Conference on Computer and Information Science.

[7]  Michele Garetto,et al.  Modeling media access in embedded two-flow topologies of multi-hop wireless networks , 2005, MobiCom '05.

[8]  Soung Chang Liew,et al.  Throughput analysis of IEEE802.11 multi-hop ad hoc networks , 2007, TNET.

[9]  Hsin-Chiao Liu,et al.  Throughput Analysis of the IEEE 802.11 DCF Scheme in Multi-hop Ad Hoc Networks , 2003, International Conference on Wireless Networks.

[10]  Brahim Bensaou,et al.  Throughput analysis and rate control for IEEE 802.11 Wireless LAN with hidden terminals , 2008, MSWiM '08.

[11]  A. Girotra,et al.  Performance Analysis of the IEEE 802 . 11 Distributed Coordination Function , 2005 .

[12]  Hari Balakrishnan,et al.  An analysis of short-term fairness in wireless media access protocols (poster session) , 2000, SIGMETRICS '00.

[13]  David I. Laurenson,et al.  Revisiting the Hidden Terminal Problem in a CSMA/CA Wireless Network , 2008, IEEE Transactions on Mobile Computing.

[14]  Haitao Wu,et al.  WSN02-1: Analysis of IEEE 802.11 DCF with Hidden Terminals , 2006, IEEE Globecom 2006.

[15]  D. Malone,et al.  Modeling the 802.11 Distributed Coordination Function in Nonsaturated Heterogeneous Conditions , 2007, IEEE/ACM Transactions on Networking.

[16]  Yu Wang,et al.  Modeling of Collision Avoidance Protocols in Single-Channel Multihop Wireless Networks , 2004, Wirel. Networks.

[17]  Soung Chang Liew,et al.  Hidden-Node Removal and Its Application in Cellular WiFi Networks , 2007, IEEE Transactions on Vehicular Technology.

[18]  A. Varga,et al.  THE OMNET++ DISCRETE EVENT SIMULATION SYSTEM , 2003 .

[19]  Anura P. Jayasumana,et al.  Effect of hidden terminals on the performance of IEEE 802.11 MAC protocol , 1998, Proceedings 23rd Annual Conference on Local Computer Networks. LCN'98 (Cat. No.98TB100260).

[20]  Hsin-Chiao Liu,et al.  Analyzing the throughput of IEEE 802.11 DCF scheme with hidden nodes , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).

[21]  Sandeep K. S. Gupta,et al.  Performance evaluation of distributed co-ordination function for IEEE 802.11 wireless LAN protocol in presence of mobile and hidden terminals , 1999, MASCOTS '99. Proceedings of the Seventh International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems.

[22]  Sukumar Nandi,et al.  Modeling the Short-Term Unfairness of IEEE 802.11 in Presence of Hidden Terminals , 2004, NETWORKING.

[23]  Pravin Varaiya,et al.  Throughput Analysis and Admission Control for IEEE 802.11a , 2005, Mob. Networks Appl..

[24]  Tong Li,et al.  Throughput Analysis of IEEE 802.11 in Multi-Hop Ad Hoc Networks , 2006, 2006 International Conference on Wireless Communications, Networking and Mobile Computing.

[25]  Marco Conti,et al.  Dynamic tuning of the IEEE 802.11 protocol to achieve a theoretical throughput limit , 2000, TNET.

[26]  Andrey Lyakhov,et al.  Performance analysis of the broadband wireless network with decentralized control and hidden terminals , 2008 .

[27]  Sukumar Nandi,et al.  Modeling the short-term unfairness of IEEE 802.11 in presence of hidden terminals , 2004, Perform. Evaluation.

[28]  W. Marsden I and J , 2012 .

[29]  Soung Chang Liew,et al.  Back-of-the-Envelope Computation of Throughput Distributions in CSMA Wireless Networks , 2007, 2009 IEEE International Conference on Communications.

[30]  Marco Conti,et al.  NETWORKING 2002, Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; and Mobile and Wireless Communications, Second International IFIP-TC6 Networking Conference, Pisa, Italy, May 19-24, 2002, Proceedings , 2002, NETWORKING.