SlideShare uma empresa Scribd logo
1 de 13
Baixar para ler offline
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013

DCF LEARN AND PERFORMANCE ANALYSIS OF
802.11B WIRELESS NETWORK
Mingming Li1, Biao Huang2, Haiyang Liu1 and Miao Yang1
1

Spectrum Management Research Division, SRRC, Beijing, China
2
Spectrum Engineering Department, SRRC, Beijing, China

ABSTRACT
Though WLAN wireless network has been widely deployed as the main split-flow deployment of the
communication network, little study emphasizes its performance as WLAN protocols were only designed for
the public communicating conveniently with each other. Actually that too much wireless access points
assembling together will cause self-interference to the whole WLAN network. This paper investigates the
distributed coordination function (DCF) learn and the performance study of 802.11b networks. Firstly, our
study illustrates the performance of its MAC layer and its fairness issues related to DCF. Next we propose
the details which should be paid attention to in deploying network services. Then, performance analyses
are evaluated by simulation and real test for a dense wireless network. Our main goal is to give proposals
to network operators how to design a WLAN network more standardized and orderly.

KEYWORDS
WLAN network, 802.11b, Performance Analysis, Distributed Coordination Function, Fairness

1. INTRODUCTION
Although IEEE 802.11 standard series include802.11, 802.11b, 802.11a, 802.11g, 802.11n,
802.11AC, etc., 802.11b is one most-widely deployed version as it originally appeared. This
technology operates in the 2.4GHz ISM (Industrial, Scientific, and Medical) radio spectrum with
signal bandwidth 20MHz. Complementary Code Keying(CCK) or Direct sequence spread
spectrum (DSSS) and carrier sense multiple access with collision avoidance (CSMA/CA) are
respectively used as key techniques both in physical layer and MAC layer, supporting variable
data rates 1, 2, 5.5 and 11Mbps.
In IEEE Std. 802.11b-1999[1], the CCK modulation used by 802.11b transmits data in symbols of
eight chips, where each chip is a complex QPSK bit-pair at a chip rate of 11Mchip/s. In 5.5
Mbit/s and 11 Mbit/s modes respectively 4 and 8 bits are modulated onto the eight chips of the
c = c0 ,..., c7 = (e j (φ1 +φ2 +φ3 +φ4 ) , e j (φ1 +φ2 +φ4 ) , − e j (φ1 +φ4 ) , e j (φ1 +φ2 +φ3 ) ,
symbols c0 ,…, c7 , where

, e j (φ1 +φ3 ) , −e j (φ1 +φ2 ) , e jφ1 ) and φ1 , φ2 , φ3 , φ4 are determined by the bits being modulated. Then
802.11b has a maximum raw data rate of 11 Mbit/s. As we know, 802.11b uses the same
CSMA/CA media access method in its MAC layer and DCF is one coordination function for its
channel access. Within DCF, there are two ways to access the MAC layer. One way is that each
successful transmission follows the so-called 4-way handshake protocol of
RTS_CTS_DATA_ACK. Once hearing RTS, the neighbour nodes in set their NAVs to the
duration mentioned in RTS. After hearing CTS, the nodes in the vicinity of receiver set their
NAVs to the duration mentioned in CTS. Then each DATA packet is preceded. This causes in
DOI : 10.5121/ijcnc.2013.5611

181
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013

establishment of channel reservation till the time the ACK is sent back to the sender. The timeline
for DCF message exchanges is shown in Figure 1[1]. The other way is so-called CTS_self of
DATA_ACK, which is quite simple than 4-way handshake protocol. Due to CSMA/CA protocol
overhead, in practice the maximum 802.11b throughput that an application can achieve is about
5.9 Mbit/s using TCP and 7.1 Mbit/s using UDP. Many simulation results and test results will
survey this statement.

Figure 1. Message exchanging in Distributed Coordination Function

This paper mainly gives study illustrating the fairness issues of DCF and the performance of
802.11bs MAC layer. Then some details are referred to give proposals to network operators how
to design a WLAN network more standardized and orderly. In Section 2, we give a mathematical
definition and a comparison of the fairness issues related to 802.11b MAC layer. Section 3 gives a
particular introduction to 802.11b performance analysis through simulation and test methods. At
the end, some proposals are mentioned to network operators and conclude our study.

2. PERFORMANCE AND FAIRNESS OF 802.11B’S MAC LAYER
2.1. Scenario 1: Only One UE in a BSS
A BSS (Basic Service Set) composed one AP is the basic structural unit of WLAN network. We
presume a simple WLAN network including only one UE in a BSS. When the user accesses the
network, none will race to control the channel with it. The throughput can be modelled as:

R1 =

DATA length
DATA Delay

(1)

One ordinary frame with the length 2346 bytes in MAC layer looks like the follow. Done like in
IEEE Std. 802.11b [1], in a simple WLAN network, the DATA can be chosen as the MSDU
(MAC layer service data unit). Correspondingly, the DATA delay is a time slot. As referred in
the part one, in DCF, each successful transmission follows the 4-way handshake protocol or
CTS_self. Then we can get:

Delayer MSDU Handshake _ 4 = (TDIFS + TSIFS + TBO + TRTS + TCTS + TACK + TDATA )

Delayer MSDU CTS _ self = (TDIFS + TSIFS + TBO + TACK + TDATA )

(2)
(3)
182
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013

As described in [2], the upper delay parameters are constant presented in table 1. With formula 1,
2, 3 and table I, the R1 can be plotted as figure 2, which shows the maximum throughput of
scenario 1 is about 7.1 Mbps for IEEE Std. 802.11b. The result is the maximum 802.11b
throughput using UDP retrospect in Part 1. Even this conclusion will be confirmed by simulation
and test results again Part 3.
Table 1. Time of various frames in IEEE STD 802.11

DIFS
CTS_self
HR-5.5
HR-11
RTS/CTS
HR-5.5
HR-11

SIFS

50
50

10
10

50
50

10*3
10*3

BO

) (

Scheme

Time of delay ms
RTS CTS ACK DATA

310 N/A
310 N/A
310
310

352
352

N/A
N/A

304 192+8*(34+MSDU)/5.5
304 192+8*(34+MSDU)/11

304
304

304 192+8*(34+MSDU)/5.5
304 192+8*(34+MSDU)/11

Figure 2. The compare of CTS_self's maximal throughput vs Handshake_4's

2.2. Scenario 2: N UEs in a BSS
Also, presumption is made as N UEs ( N > 1 ) competing the same channel in a BSS and
assuming N UEs randomly located in a circle with AP as the centre. With DCF, UEs in this
scene will execute back-off mechanism [1]. G. Bianchi, in whose article [3], modelled this
competing process as two-dimensional discrete time Markov chain. Making use of this thesis, the
authors intend to prove the fairness of DCF at first. Given q is the probability that one UE will
transmit a package and Pt is the probability that at least one UE transmits the packet in the
183
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013

considered slot time; we can write as Pt = 1 − (1 − q ) N Assuming that any ith UE and the jth UE
have the similar wireless condition to access AP, AP will receive the same power both from any
UE. That means to any UE in the network, its transmitting probability is Pt N . In this situation,
DCF proves its fairness to any UE [3], [4], [5], [6]. G. Bianchi in [3] gave out the throughput
analysis by equation 13. Xiang Ling and Kwan Lawrence Yeung calculated the maximum
throughput of the network with N APs with this method in [4].
Table 2. Various parameters of IEEE STD 802.11HR/DSSS technology

a slot time
a Air Propagation Delay
a MAC Processing Delay
a MPDU length

20
1

31
1023

Figure 3. The contrast of CTS_self 's stable throughput and Handshake_4's

Using the parameters described in table 2, we verify G. Bianchi’s results with CW _ min = 32 or
128 and find that the WLAN networks maximal stable throughput is near 7.05Mbps, but the
maximal stable CTS_throughput is less than ACK_DATA_throughput when N < 40 in figure 3.
Under the scenario of WLAN network with multiple users using the same channel, we suggest
network operators enable the CTS/RTS component on all APs when N > 40 .

184
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013

3. PERFORMANCE ANALYSIS
SIMULATION AND TEST

OF

802.11B WIRELESS NETWORK

WITH

3.1. SIMULATION A: A BSS’s Throughput of MAC layer with One User
As mentioned in scenario 1, the length of the biggest data frame in MAC layer is 2304 bytes
while no fragmentation configuration on the network nodes. Meanwhile setting the transmitting
package length in MAC layer being equal to the length of the biggest data frame, we can plot the
maximal throughput and the time delay of 802.11b MAC layer with the simulation seeds 256 and
time length 3 minutes in figure 4.The 4-way handshake protocol or CTS_self protocol, its stable
throughput by simulation is close to the theoretical value in figure 2 or 3, 7.1Mbps or 5.5Mbps
respectively. As obviously shown that more packages are transmitted in the 4-way handshake
protocol in figure 1, the time delay of the 4-way handshake protocol is much longer than
CTS_self protocol. This may help in claiming that there is no advantage to improve system
performance by using the 4-way handshake protocol when a wireless network is lack of users in
the same channel.

Figure 4. A BSS's throughput and delay of MAC layer with 1 UE

3.2. SIMULATION B: DCF Fairness and BSS’s Throughput of MAC layer with N
Users
Now, it is turn to prove fairness of DCF by simulation mentioned in scenario 2. Announcing a
wireless network like the figure 5, ten users are located the same distance far away the centre AP
downloading package of 100K bytes in every 0.169s. The users transmitting speed is 11Mbps and
CTS_self protocol are used in MAC layer.
Table 3. Parameters setup in simulation B

BSS
Number
Values
1
Parameters DATA
Parameters

AP
Number
1
Time

UE
service
Number
10
FTP
Power
Access
185
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013

Values

Length
100KB

0.169s

Mechanism
100mW CTS_self

Figure 5. The scenario of a BSS with N UE

In the upper case, it is to say that any UE can access AP with the similar wireless condition shown
in the table 3; AP will receive the same power both from any UE. Without other limitation, we
can get ten users total throughput is about 4Mbps and every user is about 0.4Mbps from figure 6.
And also, the time delay of every user confirms that every user nearly has the same chance to
access the same channel. In retrospection BSS’s throughput of MAC layer with N users, we have
verified that the 4-way handshake protocol is not fit for less than 40 users within a wireless
network. With this reason, we plot the maximal stable throughput only for CTS_self protocol with
the length of the biggest data frame 2304 bytes in MAC layer on every nodes and

CW _ min = 32 .

Figure 6. The throughput of a BSS with 10 UE

Figure 7 shows the stable throughput by simulation is close to the theoretical value in figure 3
when the user number is N = 5 , 10, 20, 30, 40, 50. However, the stable throughput by simulation
186
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013

is less than its theoretical when N = 30 . As the user number increasing, the occurrence
possibility in an interval of time of more users increasing, collision between different users burst
the same time. Until N = 40 , the maximal stable throughput of MAC layer is also bigger than
5.5Mbps associated to multiuser diversity gain. Compared the throughput line of N = 50 with
others, we affirm the constraint of DCF that the user number N is better no more than 40 within
a BSS.

Figure 7. The throughput contrast of a BSS with different Users

3.3. SIMULATION C: A BSS's Throughput with TCP Protocol
Reference [7] had learned the method to improve the network’s throughput with TCP protocol;
the following simulation is given out to show the wireless networks performance of application
layer in fact. Supposing that a BSS contains 10, 20, 30, 40, 50 users respectively and all users are
downloading package of 1MB with the transmitting speed 11Mbps, we optimally configure the
network parameters and use CTS_self protocol by the MAC layer accessing, and other parameters
are the same as values shown in table 3.

187
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013

Figure 7. The throughput and delay contrast of a BSS with different Users

Figure 8. The data dropped size and throughput of one UE contrast with different Users

Figure 8 depicts the total throughput, the time delay, the data dropped, and the throughput of a
single user’s under every circumstance. It is observed that the total throughput of the network is
about 5.1Mbps,the time delay and the data dropped are increasing, and the throughput of a single
user’s is decreasing when the network becomes a dense one. That is to say, optimal configuration
can improve the WLAN networks carrying capacity and make it more efficiently.

188
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013

3.4. A test of the BSS’s Throughput

Figure 9. A Scene of a BSS’s throughput test

For testing a BSS’s throughput, a small scale 802.11b network was set up in the office
environment like figure 9. Ixchariot_Client is the ftp client fixed on PC, Ixchariot_Server is the
ftp server fixed on server, AP is connected with sever by VLAN, and PC is connected with AP by
802.11b WLAN network. In this case, network coverage is out of our consideration, so free-space
attenuation is supposed for the test thus the loss is a little larger indeed. At first, we let one
Ixchariot_Client link the AP by downloading the package of 1MB bytes in MAC layer. Other
network configuration looks like the table 4.
Table 4. Parameters configuration in the test of the BSS’s Throughput

BSS
Number
Values
1
DATA
Parameters
Length
Values
640KB
Parameters

AP
UE
service
Number Number
1
1/6
FTP
Access
Time
Power
Mechanism
0.55s
100mW CTS_self

The largest throughput of the BSS can be gotten in figure 10. That is to say the maximal
throughput of MAC layer is nearly 7.0Mbps, a little less than simulation result. Then we let six
Ixchariot_Clients communicate with the AP simultaneously, we can obtain the total largest
throughput of MAC layer is nearly 6.6Mbps in figure 11, a little less than the single user scene
because of channel accessing competition between multiple users.

189
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013

Figure 10. The throughput a BSS's throughput test with 1 UE

Figure 11. The throughput a BSS’s throughput test with 6 UE
190
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013

3.5. SIMULATION D: Two BSS's Throughput Contrast with TCP Protocol
As we know, 802.11b uses DSSS modulation to support the data rate 11Mbps. DSSS system can
make the narrow-band noise broaden so as to decrease interference brought by other wireless
systems in the same bands. To evaluate the interference, we suppose a scenario with two WLAN
networks like figure 12.

Figure 12. The scene of two BSS’s throughput simulation

Presumption is made as every 5 UEs accessing the same channel in one BSS and assuming every
5 UEs randomly located in one cell. The users’ transmitting speed is 11Mbps and CTS_self
protocol are used in MAC layer. The free space model is used to calculate path loss, the users’
transmitting power is 100mW and all UEs and Aps both in BSS1 and BSS2 are set to use channel
1/ channel 1 to communication separately.

Figure 13. The total throughput contrast of two BSS’s with different distance
191
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013

Figure 14. Each BSS’s throughput contrast with different distance

Here, we want to check one AP’s coverage to set two APs’ being parted 597m, 600m, 620m,
650m and 700m. In figure 13, the total throughput is about 500, 500, 580, 600 and 1200K bytes
of two BSS’s, which shows the interference is serious when the channel is overlapped and the
interference becomes seriously when the distance is closer. And each BSS’s throughput with
different distance is plotted in the figure 14, which confirms that additional RF medium
contention overhead occurs for all radios using the same channel in physical area resulting in
throughput degradation and latency.

4. CONCLUSIONS
In this paper we have proposed much analysis, many simulation cases and real tests to illustrate
the performance of 802.11b MAC layer, application layer and the fairness issues related to DCF.
Let us recall here that our final goal is to suggest the details which should be paid attention to in
deploying network services. First, with the constraint of DCF, the largest user number is less the
40 in a BSS (Actually, 20 users are much better in a BSS with 802.11b or 802.11g WLAN
network). Second, the condition of DCF is that all users have the same channel condition. That is
to say those WLAN network operators have to find other method to achieve loading balance for
users with different channel condition in real circumstance. And the last contribution of this paper
is the simulation results and test results are general values which can be offered as the basis.

ACKNOWLEDGEMENTS
This work is supported by Important National Science and Technology Specific Projects
NO.2013ZX03003016.

192
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013

REFERENCES
[1]

Lee, S.hyun. & Kim Mi Na, (2008) “This is my paper”, ABC Transactions on ECE, Vol. 10, No. 5,
pp120-122. IEEE Computer Society, (1999) “Wireless LAN Medium Access Control (MAC) and
Physical Layer (PHY) Specifications”, IEEE Std. 802.11-1999.

[2]

Soung Chang Liew,Ying Jun Zhang, (2008) “Proportional Fairness in Multi-channel Multi-rate
Wireless Networks C Part I: The Case of Deterministic Channels with Application to AP Association
Problem in Large-Scale WLAN”,IEEE Trans. on Wireless Communications, Vol.7, No.9, pp.34463456.

[3]

G. Bianchi, (200) “Performance analysis of IEEE 802.11 distributed coordination function, IEEE J.
Select. Areas. Commun.”, Vol. 18, No. 3, pp.535-547.

[4]

Xiang Ling and Kwan Lawrence Yeung, (2006) “Joint Access Point Placement and Channel
Assignment for 802.11 Wireless LANs” IEEE Trans. on Wireless Communications, Vol.5, No.10,
pp.2705-271.

[5]

A. Hills, (2001) “Large-scale wireless LAN design”, IEEE Commun.Mag., Vol.39, No.11, pp.98-107.

[6]

G. Anastasi, E. Borgia and M. Conti, E. Gregori, (2005) “IEEE 802.11b Ad Hoc Networks:
Performance Measurements”, Cluster Computing, Vol 8, pp.2-3.

[7]

Purvang Dalal, Nikhil Kothari and K. S. Dasgupta, (2011)“Improving TCP Performance over
Wireless Network with Frequent Disconnections,” International Journal of Computer Networks &
Communications (IJCNC) Vol.3, No.6, pp.169-184.

Authors
Mingming Li works in SRRC of China as an engineer, ever graduated from Beijing University
of Post and Telecommunication in 2011. Her research field is frequency spectrum planning
and spectrum demand forecasting

193

Mais conteúdo relacionado

Mais procurados

21 Network Layer_Address_Mapping_Error_Reporting_and_Multicasting
21 Network Layer_Address_Mapping_Error_Reporting_and_Multicasting21 Network Layer_Address_Mapping_Error_Reporting_and_Multicasting
21 Network Layer_Address_Mapping_Error_Reporting_and_MulticastingAhmar Hashmi
 
Question bank cn2
Question bank cn2Question bank cn2
Question bank cn2sangusajjan
 
Physical layer network coding
Physical layer network codingPhysical layer network coding
Physical layer network codingNguyen Tan
 
13 Wired Lans_Ethernet
13 Wired Lans_Ethernet13 Wired Lans_Ethernet
13 Wired Lans_EthernetAhmar Hashmi
 
20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks 20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks Kathirvel Ayyaswamy
 
Ch 19 Network-layer protocols Section 1
Ch 19  Network-layer protocols Section 1Ch 19  Network-layer protocols Section 1
Ch 19 Network-layer protocols Section 1Hossam El-Deen Osama
 
06 Bandwidth Utilization_Multiplexing_and_Spreading
06 Bandwidth Utilization_Multiplexing_and_Spreading06 Bandwidth Utilization_Multiplexing_and_Spreading
06 Bandwidth Utilization_Multiplexing_and_SpreadingAhmar Hashmi
 
VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...
VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...
VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...vtunotesbysree
 
Fa2c4eb1e3582a1a36255a82b258cb03a7dc
Fa2c4eb1e3582a1a36255a82b258cb03a7dcFa2c4eb1e3582a1a36255a82b258cb03a7dc
Fa2c4eb1e3582a1a36255a82b258cb03a7dcsatriyo aris
 
Lecture 3 network layer
Lecture 3 network layerLecture 3 network layer
Lecture 3 network layerRonoh Kennedy
 
4c Address Mapping, Error Reporting and Multicasting
4c Address Mapping, Error Reporting and Multicasting4c Address Mapping, Error Reporting and Multicasting
4c Address Mapping, Error Reporting and Multicastingkavish dani
 
22 Network Layer_Delivery_forwarding_and_Routing
22 Network Layer_Delivery_forwarding_and_Routing22 Network Layer_Delivery_forwarding_and_Routing
22 Network Layer_Delivery_forwarding_and_RoutingAhmar Hashmi
 

Mais procurados (20)

21 Network Layer_Address_Mapping_Error_Reporting_and_Multicasting
21 Network Layer_Address_Mapping_Error_Reporting_and_Multicasting21 Network Layer_Address_Mapping_Error_Reporting_and_Multicasting
21 Network Layer_Address_Mapping_Error_Reporting_and_Multicasting
 
Question bank cn2
Question bank cn2Question bank cn2
Question bank cn2
 
Physical layer network coding
Physical layer network codingPhysical layer network coding
Physical layer network coding
 
Cs8591 Computer Networks
Cs8591 Computer NetworksCs8591 Computer Networks
Cs8591 Computer Networks
 
13 Wired Lans_Ethernet
13 Wired Lans_Ethernet13 Wired Lans_Ethernet
13 Wired Lans_Ethernet
 
can bus theory solution
can bus theory solutioncan bus theory solution
can bus theory solution
 
20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks 20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks
 
CS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKSCS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKS
 
Unit 3 - Data Link Layer - Part B
Unit 3 - Data Link Layer - Part BUnit 3 - Data Link Layer - Part B
Unit 3 - Data Link Layer - Part B
 
Ch 19 Network-layer protocols Section 1
Ch 19  Network-layer protocols Section 1Ch 19  Network-layer protocols Section 1
Ch 19 Network-layer protocols Section 1
 
06 Bandwidth Utilization_Multiplexing_and_Spreading
06 Bandwidth Utilization_Multiplexing_and_Spreading06 Bandwidth Utilization_Multiplexing_and_Spreading
06 Bandwidth Utilization_Multiplexing_and_Spreading
 
VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...
VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...
VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...
 
Fa2c4eb1e3582a1a36255a82b258cb03a7dc
Fa2c4eb1e3582a1a36255a82b258cb03a7dcFa2c4eb1e3582a1a36255a82b258cb03a7dc
Fa2c4eb1e3582a1a36255a82b258cb03a7dc
 
Lecture 3 network layer
Lecture 3 network layerLecture 3 network layer
Lecture 3 network layer
 
Chapter 8: Switching
Chapter 8: SwitchingChapter 8: Switching
Chapter 8: Switching
 
4c Address Mapping, Error Reporting and Multicasting
4c Address Mapping, Error Reporting and Multicasting4c Address Mapping, Error Reporting and Multicasting
4c Address Mapping, Error Reporting and Multicasting
 
Computer networks ct2
Computer networks ct2Computer networks ct2
Computer networks ct2
 
Cs8591 Computer Networks
Cs8591 Computer NetworksCs8591 Computer Networks
Cs8591 Computer Networks
 
22 Network Layer_Delivery_forwarding_and_Routing
22 Network Layer_Delivery_forwarding_and_Routing22 Network Layer_Delivery_forwarding_and_Routing
22 Network Layer_Delivery_forwarding_and_Routing
 
Ch21
Ch21Ch21
Ch21
 

Destaque

A novel scheme to improve the spectrum sensing performance
A novel scheme to improve the spectrum sensing performanceA novel scheme to improve the spectrum sensing performance
A novel scheme to improve the spectrum sensing performanceIJCNCJournal
 
OPTIMIZING VOIP USING A CROSS LAYER CALL ADMISSION CONTROL SCHEME
OPTIMIZING VOIP USING A CROSS LAYER CALL ADMISSION CONTROL SCHEMEOPTIMIZING VOIP USING A CROSS LAYER CALL ADMISSION CONTROL SCHEME
OPTIMIZING VOIP USING A CROSS LAYER CALL ADMISSION CONTROL SCHEMEIJCNCJournal
 
Framework for wireless network security using quantum cryptography
Framework for wireless network security using quantum cryptographyFramework for wireless network security using quantum cryptography
Framework for wireless network security using quantum cryptographyIJCNCJournal
 
Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...IJCNCJournal
 
Further results on the joint time delay and frequency estimation without eige...
Further results on the joint time delay and frequency estimation without eige...Further results on the joint time delay and frequency estimation without eige...
Further results on the joint time delay and frequency estimation without eige...IJCNCJournal
 
A fuzzy logic controllerfora two link functional manipulator
A fuzzy logic controllerfora two link functional manipulatorA fuzzy logic controllerfora two link functional manipulator
A fuzzy logic controllerfora two link functional manipulatorIJCNCJournal
 
A review study of handover performance in mobile ip
A review study of handover performance in mobile ipA review study of handover performance in mobile ip
A review study of handover performance in mobile ipIJCNCJournal
 
LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...
LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...
LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...IJCNCJournal
 
NODE FAILURE TIME AND COVERAGE LOSS TIME ANALYSIS FOR MAXIMUM STABILITY VS MI...
NODE FAILURE TIME AND COVERAGE LOSS TIME ANALYSIS FOR MAXIMUM STABILITY VS MI...NODE FAILURE TIME AND COVERAGE LOSS TIME ANALYSIS FOR MAXIMUM STABILITY VS MI...
NODE FAILURE TIME AND COVERAGE LOSS TIME ANALYSIS FOR MAXIMUM STABILITY VS MI...IJCNCJournal
 
A New Programming Model to Simulate Wireless Sensor Networks : Finding The Be...
A New Programming Model to Simulate Wireless Sensor Networks : Finding The Be...A New Programming Model to Simulate Wireless Sensor Networks : Finding The Be...
A New Programming Model to Simulate Wireless Sensor Networks : Finding The Be...IJCNCJournal
 
On the development of methodology for planning and cost modeling of a wide ar...
On the development of methodology for planning and cost modeling of a wide ar...On the development of methodology for planning and cost modeling of a wide ar...
On the development of methodology for planning and cost modeling of a wide ar...IJCNCJournal
 
Key management in information centric networking
Key management in information centric networkingKey management in information centric networking
Key management in information centric networkingIJCNCJournal
 
PAPR REDUCTION OF OFDM SIGNAL BY USING COMBINED HADAMARD AND MODIFIED MEU-LAW...
PAPR REDUCTION OF OFDM SIGNAL BY USING COMBINED HADAMARD AND MODIFIED MEU-LAW...PAPR REDUCTION OF OFDM SIGNAL BY USING COMBINED HADAMARD AND MODIFIED MEU-LAW...
PAPR REDUCTION OF OFDM SIGNAL BY USING COMBINED HADAMARD AND MODIFIED MEU-LAW...IJCNCJournal
 
ETOR-Efficient Token based Opportunistic Routing
ETOR-Efficient Token based Opportunistic RoutingETOR-Efficient Token based Opportunistic Routing
ETOR-Efficient Token based Opportunistic RoutingIJCNCJournal
 

Destaque (19)

A novel scheme to improve the spectrum sensing performance
A novel scheme to improve the spectrum sensing performanceA novel scheme to improve the spectrum sensing performance
A novel scheme to improve the spectrum sensing performance
 
OPTIMIZING VOIP USING A CROSS LAYER CALL ADMISSION CONTROL SCHEME
OPTIMIZING VOIP USING A CROSS LAYER CALL ADMISSION CONTROL SCHEMEOPTIMIZING VOIP USING A CROSS LAYER CALL ADMISSION CONTROL SCHEME
OPTIMIZING VOIP USING A CROSS LAYER CALL ADMISSION CONTROL SCHEME
 
Framework for wireless network security using quantum cryptography
Framework for wireless network security using quantum cryptographyFramework for wireless network security using quantum cryptography
Framework for wireless network security using quantum cryptography
 
Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...
 
Further results on the joint time delay and frequency estimation without eige...
Further results on the joint time delay and frequency estimation without eige...Further results on the joint time delay and frequency estimation without eige...
Further results on the joint time delay and frequency estimation without eige...
 
A fuzzy logic controllerfora two link functional manipulator
A fuzzy logic controllerfora two link functional manipulatorA fuzzy logic controllerfora two link functional manipulator
A fuzzy logic controllerfora two link functional manipulator
 
Ijcnc050208
Ijcnc050208Ijcnc050208
Ijcnc050208
 
A review study of handover performance in mobile ip
A review study of handover performance in mobile ipA review study of handover performance in mobile ip
A review study of handover performance in mobile ip
 
LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...
LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...
LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...
 
Ijcnc050211
Ijcnc050211Ijcnc050211
Ijcnc050211
 
Ijcnc050206
Ijcnc050206Ijcnc050206
Ijcnc050206
 
NODE FAILURE TIME AND COVERAGE LOSS TIME ANALYSIS FOR MAXIMUM STABILITY VS MI...
NODE FAILURE TIME AND COVERAGE LOSS TIME ANALYSIS FOR MAXIMUM STABILITY VS MI...NODE FAILURE TIME AND COVERAGE LOSS TIME ANALYSIS FOR MAXIMUM STABILITY VS MI...
NODE FAILURE TIME AND COVERAGE LOSS TIME ANALYSIS FOR MAXIMUM STABILITY VS MI...
 
A New Programming Model to Simulate Wireless Sensor Networks : Finding The Be...
A New Programming Model to Simulate Wireless Sensor Networks : Finding The Be...A New Programming Model to Simulate Wireless Sensor Networks : Finding The Be...
A New Programming Model to Simulate Wireless Sensor Networks : Finding The Be...
 
On the development of methodology for planning and cost modeling of a wide ar...
On the development of methodology for planning and cost modeling of a wide ar...On the development of methodology for planning and cost modeling of a wide ar...
On the development of methodology for planning and cost modeling of a wide ar...
 
Key management in information centric networking
Key management in information centric networkingKey management in information centric networking
Key management in information centric networking
 
PAPR REDUCTION OF OFDM SIGNAL BY USING COMBINED HADAMARD AND MODIFIED MEU-LAW...
PAPR REDUCTION OF OFDM SIGNAL BY USING COMBINED HADAMARD AND MODIFIED MEU-LAW...PAPR REDUCTION OF OFDM SIGNAL BY USING COMBINED HADAMARD AND MODIFIED MEU-LAW...
PAPR REDUCTION OF OFDM SIGNAL BY USING COMBINED HADAMARD AND MODIFIED MEU-LAW...
 
Ijcnc050201
Ijcnc050201Ijcnc050201
Ijcnc050201
 
Ijcnc050214
Ijcnc050214Ijcnc050214
Ijcnc050214
 
ETOR-Efficient Token based Opportunistic Routing
ETOR-Efficient Token based Opportunistic RoutingETOR-Efficient Token based Opportunistic Routing
ETOR-Efficient Token based Opportunistic Routing
 

Semelhante a Dcf learn and performance analysis of 802.11 b wireless network

ESTIMATION OF MEDIUM ACCESS CONTROL LAYER PACKET DELAY DISTRIBUTION FOR IEEE ...
ESTIMATION OF MEDIUM ACCESS CONTROL LAYER PACKET DELAY DISTRIBUTION FOR IEEE ...ESTIMATION OF MEDIUM ACCESS CONTROL LAYER PACKET DELAY DISTRIBUTION FOR IEEE ...
ESTIMATION OF MEDIUM ACCESS CONTROL LAYER PACKET DELAY DISTRIBUTION FOR IEEE ...ijwmn
 
A20345606_Shah_Bonus_Report
A20345606_Shah_Bonus_ReportA20345606_Shah_Bonus_Report
A20345606_Shah_Bonus_ReportPanth Shah
 
TCP Fairness for Uplink and Downlink Flows in WLANs
TCP Fairness for Uplink and Downlink Flows in WLANsTCP Fairness for Uplink and Downlink Flows in WLANs
TCP Fairness for Uplink and Downlink Flows in WLANsambitlick
 
Performance analysis and evaluation of IEEE 802.11 distributed coordination f...
Performance analysis and evaluation of IEEE 802.11 distributed coordination f...Performance analysis and evaluation of IEEE 802.11 distributed coordination f...
Performance analysis and evaluation of IEEE 802.11 distributed coordination f...journalBEEI
 
Paper id 21201485
Paper id 21201485Paper id 21201485
Paper id 21201485IJRAT
 
Fa2c4eb1e3582a1a36255a82b258cb03a7dc
Fa2c4eb1e3582a1a36255a82b258cb03a7dcFa2c4eb1e3582a1a36255a82b258cb03a7dc
Fa2c4eb1e3582a1a36255a82b258cb03a7dcsatriyo aris
 
Analysis of data transmission in wireless lan for 802.11
Analysis of data transmission in wireless lan for 802.11Analysis of data transmission in wireless lan for 802.11
Analysis of data transmission in wireless lan for 802.11eSAT Publishing House
 
Analysis of data transmission in wireless lan for 802.11 e2 et
Analysis of data transmission in wireless lan for 802.11 e2 etAnalysis of data transmission in wireless lan for 802.11 e2 et
Analysis of data transmission in wireless lan for 802.11 e2 eteSAT Journals
 
Available network bandwidth schema to improve performance in tcp protocols
Available network bandwidth schema to improve performance in tcp protocolsAvailable network bandwidth schema to improve performance in tcp protocols
Available network bandwidth schema to improve performance in tcp protocolsIJCNCJournal
 
PERFORMANCE EVALUATION OF SELECTED E2E TCP CONGESTION CONTROL MECHANISM OVER ...
PERFORMANCE EVALUATION OF SELECTED E2E TCP CONGESTION CONTROL MECHANISM OVER ...PERFORMANCE EVALUATION OF SELECTED E2E TCP CONGESTION CONTROL MECHANISM OVER ...
PERFORMANCE EVALUATION OF SELECTED E2E TCP CONGESTION CONTROL MECHANISM OVER ...ijwmn
 
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3ijwmn
 
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3ijwmn
 
Application Aware Topology Generation for Surface Wave Networks-on-Chip
Application Aware Topology Generation for Surface Wave Networks-on-ChipApplication Aware Topology Generation for Surface Wave Networks-on-Chip
Application Aware Topology Generation for Surface Wave Networks-on-Chipzhao fu
 
The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...IJCNCJournal
 
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksEfficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksCSCJournals
 
Performance and interference analysis of 802.11 g wireless network
Performance and interference analysis of 802.11 g wireless networkPerformance and interference analysis of 802.11 g wireless network
Performance and interference analysis of 802.11 g wireless networkijwmn
 
An Implementation and Analysis of RTS/CTS Mechanism for Data Transfer in Wire...
An Implementation and Analysis of RTS/CTS Mechanism for Data Transfer in Wire...An Implementation and Analysis of RTS/CTS Mechanism for Data Transfer in Wire...
An Implementation and Analysis of RTS/CTS Mechanism for Data Transfer in Wire...iosrjce
 

Semelhante a Dcf learn and performance analysis of 802.11 b wireless network (20)

ESTIMATION OF MEDIUM ACCESS CONTROL LAYER PACKET DELAY DISTRIBUTION FOR IEEE ...
ESTIMATION OF MEDIUM ACCESS CONTROL LAYER PACKET DELAY DISTRIBUTION FOR IEEE ...ESTIMATION OF MEDIUM ACCESS CONTROL LAYER PACKET DELAY DISTRIBUTION FOR IEEE ...
ESTIMATION OF MEDIUM ACCESS CONTROL LAYER PACKET DELAY DISTRIBUTION FOR IEEE ...
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
A20345606_Shah_Bonus_Report
A20345606_Shah_Bonus_ReportA20345606_Shah_Bonus_Report
A20345606_Shah_Bonus_Report
 
TCP Fairness for Uplink and Downlink Flows in WLANs
TCP Fairness for Uplink and Downlink Flows in WLANsTCP Fairness for Uplink and Downlink Flows in WLANs
TCP Fairness for Uplink and Downlink Flows in WLANs
 
Performance analysis and evaluation of IEEE 802.11 distributed coordination f...
Performance analysis and evaluation of IEEE 802.11 distributed coordination f...Performance analysis and evaluation of IEEE 802.11 distributed coordination f...
Performance analysis and evaluation of IEEE 802.11 distributed coordination f...
 
Paper id 21201485
Paper id 21201485Paper id 21201485
Paper id 21201485
 
Fa2c4eb1e3582a1a36255a82b258cb03a7dc
Fa2c4eb1e3582a1a36255a82b258cb03a7dcFa2c4eb1e3582a1a36255a82b258cb03a7dc
Fa2c4eb1e3582a1a36255a82b258cb03a7dc
 
Analysis of data transmission in wireless lan for 802.11
Analysis of data transmission in wireless lan for 802.11Analysis of data transmission in wireless lan for 802.11
Analysis of data transmission in wireless lan for 802.11
 
Analysis of data transmission in wireless lan for 802.11 e2 et
Analysis of data transmission in wireless lan for 802.11 e2 etAnalysis of data transmission in wireless lan for 802.11 e2 et
Analysis of data transmission in wireless lan for 802.11 e2 et
 
Available network bandwidth schema to improve performance in tcp protocols
Available network bandwidth schema to improve performance in tcp protocolsAvailable network bandwidth schema to improve performance in tcp protocols
Available network bandwidth schema to improve performance in tcp protocols
 
Cs8591 Computer Networks
Cs8591 Computer NetworksCs8591 Computer Networks
Cs8591 Computer Networks
 
PERFORMANCE EVALUATION OF SELECTED E2E TCP CONGESTION CONTROL MECHANISM OVER ...
PERFORMANCE EVALUATION OF SELECTED E2E TCP CONGESTION CONTROL MECHANISM OVER ...PERFORMANCE EVALUATION OF SELECTED E2E TCP CONGESTION CONTROL MECHANISM OVER ...
PERFORMANCE EVALUATION OF SELECTED E2E TCP CONGESTION CONTROL MECHANISM OVER ...
 
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
 
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
 
Application Aware Topology Generation for Surface Wave Networks-on-Chip
Application Aware Topology Generation for Surface Wave Networks-on-ChipApplication Aware Topology Generation for Surface Wave Networks-on-Chip
Application Aware Topology Generation for Surface Wave Networks-on-Chip
 
The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...
 
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksEfficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
 
Performance and interference analysis of 802.11 g wireless network
Performance and interference analysis of 802.11 g wireless networkPerformance and interference analysis of 802.11 g wireless network
Performance and interference analysis of 802.11 g wireless network
 
B010611015
B010611015B010611015
B010611015
 
An Implementation and Analysis of RTS/CTS Mechanism for Data Transfer in Wire...
An Implementation and Analysis of RTS/CTS Mechanism for Data Transfer in Wire...An Implementation and Analysis of RTS/CTS Mechanism for Data Transfer in Wire...
An Implementation and Analysis of RTS/CTS Mechanism for Data Transfer in Wire...
 

Mais de IJCNCJournal

April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficIJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...IJCNCJournal
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...IJCNCJournal
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...IJCNCJournal
 
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemSensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemIJCNCJournal
 
Feature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSFeature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSIJCNCJournal
 

Mais de IJCNCJournal (20)

April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & Communications
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & Communications
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
 
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemSensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
 
Feature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSFeature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDS
 

Último

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Último (20)

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 

Dcf learn and performance analysis of 802.11 b wireless network

  • 1. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013 DCF LEARN AND PERFORMANCE ANALYSIS OF 802.11B WIRELESS NETWORK Mingming Li1, Biao Huang2, Haiyang Liu1 and Miao Yang1 1 Spectrum Management Research Division, SRRC, Beijing, China 2 Spectrum Engineering Department, SRRC, Beijing, China ABSTRACT Though WLAN wireless network has been widely deployed as the main split-flow deployment of the communication network, little study emphasizes its performance as WLAN protocols were only designed for the public communicating conveniently with each other. Actually that too much wireless access points assembling together will cause self-interference to the whole WLAN network. This paper investigates the distributed coordination function (DCF) learn and the performance study of 802.11b networks. Firstly, our study illustrates the performance of its MAC layer and its fairness issues related to DCF. Next we propose the details which should be paid attention to in deploying network services. Then, performance analyses are evaluated by simulation and real test for a dense wireless network. Our main goal is to give proposals to network operators how to design a WLAN network more standardized and orderly. KEYWORDS WLAN network, 802.11b, Performance Analysis, Distributed Coordination Function, Fairness 1. INTRODUCTION Although IEEE 802.11 standard series include802.11, 802.11b, 802.11a, 802.11g, 802.11n, 802.11AC, etc., 802.11b is one most-widely deployed version as it originally appeared. This technology operates in the 2.4GHz ISM (Industrial, Scientific, and Medical) radio spectrum with signal bandwidth 20MHz. Complementary Code Keying(CCK) or Direct sequence spread spectrum (DSSS) and carrier sense multiple access with collision avoidance (CSMA/CA) are respectively used as key techniques both in physical layer and MAC layer, supporting variable data rates 1, 2, 5.5 and 11Mbps. In IEEE Std. 802.11b-1999[1], the CCK modulation used by 802.11b transmits data in symbols of eight chips, where each chip is a complex QPSK bit-pair at a chip rate of 11Mchip/s. In 5.5 Mbit/s and 11 Mbit/s modes respectively 4 and 8 bits are modulated onto the eight chips of the c = c0 ,..., c7 = (e j (φ1 +φ2 +φ3 +φ4 ) , e j (φ1 +φ2 +φ4 ) , − e j (φ1 +φ4 ) , e j (φ1 +φ2 +φ3 ) , symbols c0 ,…, c7 , where , e j (φ1 +φ3 ) , −e j (φ1 +φ2 ) , e jφ1 ) and φ1 , φ2 , φ3 , φ4 are determined by the bits being modulated. Then 802.11b has a maximum raw data rate of 11 Mbit/s. As we know, 802.11b uses the same CSMA/CA media access method in its MAC layer and DCF is one coordination function for its channel access. Within DCF, there are two ways to access the MAC layer. One way is that each successful transmission follows the so-called 4-way handshake protocol of RTS_CTS_DATA_ACK. Once hearing RTS, the neighbour nodes in set their NAVs to the duration mentioned in RTS. After hearing CTS, the nodes in the vicinity of receiver set their NAVs to the duration mentioned in CTS. Then each DATA packet is preceded. This causes in DOI : 10.5121/ijcnc.2013.5611 181
  • 2. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013 establishment of channel reservation till the time the ACK is sent back to the sender. The timeline for DCF message exchanges is shown in Figure 1[1]. The other way is so-called CTS_self of DATA_ACK, which is quite simple than 4-way handshake protocol. Due to CSMA/CA protocol overhead, in practice the maximum 802.11b throughput that an application can achieve is about 5.9 Mbit/s using TCP and 7.1 Mbit/s using UDP. Many simulation results and test results will survey this statement. Figure 1. Message exchanging in Distributed Coordination Function This paper mainly gives study illustrating the fairness issues of DCF and the performance of 802.11bs MAC layer. Then some details are referred to give proposals to network operators how to design a WLAN network more standardized and orderly. In Section 2, we give a mathematical definition and a comparison of the fairness issues related to 802.11b MAC layer. Section 3 gives a particular introduction to 802.11b performance analysis through simulation and test methods. At the end, some proposals are mentioned to network operators and conclude our study. 2. PERFORMANCE AND FAIRNESS OF 802.11B’S MAC LAYER 2.1. Scenario 1: Only One UE in a BSS A BSS (Basic Service Set) composed one AP is the basic structural unit of WLAN network. We presume a simple WLAN network including only one UE in a BSS. When the user accesses the network, none will race to control the channel with it. The throughput can be modelled as: R1 = DATA length DATA Delay (1) One ordinary frame with the length 2346 bytes in MAC layer looks like the follow. Done like in IEEE Std. 802.11b [1], in a simple WLAN network, the DATA can be chosen as the MSDU (MAC layer service data unit). Correspondingly, the DATA delay is a time slot. As referred in the part one, in DCF, each successful transmission follows the 4-way handshake protocol or CTS_self. Then we can get: Delayer MSDU Handshake _ 4 = (TDIFS + TSIFS + TBO + TRTS + TCTS + TACK + TDATA ) Delayer MSDU CTS _ self = (TDIFS + TSIFS + TBO + TACK + TDATA ) (2) (3) 182
  • 3. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013 As described in [2], the upper delay parameters are constant presented in table 1. With formula 1, 2, 3 and table I, the R1 can be plotted as figure 2, which shows the maximum throughput of scenario 1 is about 7.1 Mbps for IEEE Std. 802.11b. The result is the maximum 802.11b throughput using UDP retrospect in Part 1. Even this conclusion will be confirmed by simulation and test results again Part 3. Table 1. Time of various frames in IEEE STD 802.11 DIFS CTS_self HR-5.5 HR-11 RTS/CTS HR-5.5 HR-11 SIFS 50 50 10 10 50 50 10*3 10*3 BO ) ( Scheme Time of delay ms RTS CTS ACK DATA 310 N/A 310 N/A 310 310 352 352 N/A N/A 304 192+8*(34+MSDU)/5.5 304 192+8*(34+MSDU)/11 304 304 304 192+8*(34+MSDU)/5.5 304 192+8*(34+MSDU)/11 Figure 2. The compare of CTS_self's maximal throughput vs Handshake_4's 2.2. Scenario 2: N UEs in a BSS Also, presumption is made as N UEs ( N > 1 ) competing the same channel in a BSS and assuming N UEs randomly located in a circle with AP as the centre. With DCF, UEs in this scene will execute back-off mechanism [1]. G. Bianchi, in whose article [3], modelled this competing process as two-dimensional discrete time Markov chain. Making use of this thesis, the authors intend to prove the fairness of DCF at first. Given q is the probability that one UE will transmit a package and Pt is the probability that at least one UE transmits the packet in the 183
  • 4. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013 considered slot time; we can write as Pt = 1 − (1 − q ) N Assuming that any ith UE and the jth UE have the similar wireless condition to access AP, AP will receive the same power both from any UE. That means to any UE in the network, its transmitting probability is Pt N . In this situation, DCF proves its fairness to any UE [3], [4], [5], [6]. G. Bianchi in [3] gave out the throughput analysis by equation 13. Xiang Ling and Kwan Lawrence Yeung calculated the maximum throughput of the network with N APs with this method in [4]. Table 2. Various parameters of IEEE STD 802.11HR/DSSS technology a slot time a Air Propagation Delay a MAC Processing Delay a MPDU length 20 1 31 1023 Figure 3. The contrast of CTS_self 's stable throughput and Handshake_4's Using the parameters described in table 2, we verify G. Bianchi’s results with CW _ min = 32 or 128 and find that the WLAN networks maximal stable throughput is near 7.05Mbps, but the maximal stable CTS_throughput is less than ACK_DATA_throughput when N < 40 in figure 3. Under the scenario of WLAN network with multiple users using the same channel, we suggest network operators enable the CTS/RTS component on all APs when N > 40 . 184
  • 5. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013 3. PERFORMANCE ANALYSIS SIMULATION AND TEST OF 802.11B WIRELESS NETWORK WITH 3.1. SIMULATION A: A BSS’s Throughput of MAC layer with One User As mentioned in scenario 1, the length of the biggest data frame in MAC layer is 2304 bytes while no fragmentation configuration on the network nodes. Meanwhile setting the transmitting package length in MAC layer being equal to the length of the biggest data frame, we can plot the maximal throughput and the time delay of 802.11b MAC layer with the simulation seeds 256 and time length 3 minutes in figure 4.The 4-way handshake protocol or CTS_self protocol, its stable throughput by simulation is close to the theoretical value in figure 2 or 3, 7.1Mbps or 5.5Mbps respectively. As obviously shown that more packages are transmitted in the 4-way handshake protocol in figure 1, the time delay of the 4-way handshake protocol is much longer than CTS_self protocol. This may help in claiming that there is no advantage to improve system performance by using the 4-way handshake protocol when a wireless network is lack of users in the same channel. Figure 4. A BSS's throughput and delay of MAC layer with 1 UE 3.2. SIMULATION B: DCF Fairness and BSS’s Throughput of MAC layer with N Users Now, it is turn to prove fairness of DCF by simulation mentioned in scenario 2. Announcing a wireless network like the figure 5, ten users are located the same distance far away the centre AP downloading package of 100K bytes in every 0.169s. The users transmitting speed is 11Mbps and CTS_self protocol are used in MAC layer. Table 3. Parameters setup in simulation B BSS Number Values 1 Parameters DATA Parameters AP Number 1 Time UE service Number 10 FTP Power Access 185
  • 6. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013 Values Length 100KB 0.169s Mechanism 100mW CTS_self Figure 5. The scenario of a BSS with N UE In the upper case, it is to say that any UE can access AP with the similar wireless condition shown in the table 3; AP will receive the same power both from any UE. Without other limitation, we can get ten users total throughput is about 4Mbps and every user is about 0.4Mbps from figure 6. And also, the time delay of every user confirms that every user nearly has the same chance to access the same channel. In retrospection BSS’s throughput of MAC layer with N users, we have verified that the 4-way handshake protocol is not fit for less than 40 users within a wireless network. With this reason, we plot the maximal stable throughput only for CTS_self protocol with the length of the biggest data frame 2304 bytes in MAC layer on every nodes and CW _ min = 32 . Figure 6. The throughput of a BSS with 10 UE Figure 7 shows the stable throughput by simulation is close to the theoretical value in figure 3 when the user number is N = 5 , 10, 20, 30, 40, 50. However, the stable throughput by simulation 186
  • 7. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013 is less than its theoretical when N = 30 . As the user number increasing, the occurrence possibility in an interval of time of more users increasing, collision between different users burst the same time. Until N = 40 , the maximal stable throughput of MAC layer is also bigger than 5.5Mbps associated to multiuser diversity gain. Compared the throughput line of N = 50 with others, we affirm the constraint of DCF that the user number N is better no more than 40 within a BSS. Figure 7. The throughput contrast of a BSS with different Users 3.3. SIMULATION C: A BSS's Throughput with TCP Protocol Reference [7] had learned the method to improve the network’s throughput with TCP protocol; the following simulation is given out to show the wireless networks performance of application layer in fact. Supposing that a BSS contains 10, 20, 30, 40, 50 users respectively and all users are downloading package of 1MB with the transmitting speed 11Mbps, we optimally configure the network parameters and use CTS_self protocol by the MAC layer accessing, and other parameters are the same as values shown in table 3. 187
  • 8. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013 Figure 7. The throughput and delay contrast of a BSS with different Users Figure 8. The data dropped size and throughput of one UE contrast with different Users Figure 8 depicts the total throughput, the time delay, the data dropped, and the throughput of a single user’s under every circumstance. It is observed that the total throughput of the network is about 5.1Mbps,the time delay and the data dropped are increasing, and the throughput of a single user’s is decreasing when the network becomes a dense one. That is to say, optimal configuration can improve the WLAN networks carrying capacity and make it more efficiently. 188
  • 9. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013 3.4. A test of the BSS’s Throughput Figure 9. A Scene of a BSS’s throughput test For testing a BSS’s throughput, a small scale 802.11b network was set up in the office environment like figure 9. Ixchariot_Client is the ftp client fixed on PC, Ixchariot_Server is the ftp server fixed on server, AP is connected with sever by VLAN, and PC is connected with AP by 802.11b WLAN network. In this case, network coverage is out of our consideration, so free-space attenuation is supposed for the test thus the loss is a little larger indeed. At first, we let one Ixchariot_Client link the AP by downloading the package of 1MB bytes in MAC layer. Other network configuration looks like the table 4. Table 4. Parameters configuration in the test of the BSS’s Throughput BSS Number Values 1 DATA Parameters Length Values 640KB Parameters AP UE service Number Number 1 1/6 FTP Access Time Power Mechanism 0.55s 100mW CTS_self The largest throughput of the BSS can be gotten in figure 10. That is to say the maximal throughput of MAC layer is nearly 7.0Mbps, a little less than simulation result. Then we let six Ixchariot_Clients communicate with the AP simultaneously, we can obtain the total largest throughput of MAC layer is nearly 6.6Mbps in figure 11, a little less than the single user scene because of channel accessing competition between multiple users. 189
  • 10. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013 Figure 10. The throughput a BSS's throughput test with 1 UE Figure 11. The throughput a BSS’s throughput test with 6 UE 190
  • 11. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013 3.5. SIMULATION D: Two BSS's Throughput Contrast with TCP Protocol As we know, 802.11b uses DSSS modulation to support the data rate 11Mbps. DSSS system can make the narrow-band noise broaden so as to decrease interference brought by other wireless systems in the same bands. To evaluate the interference, we suppose a scenario with two WLAN networks like figure 12. Figure 12. The scene of two BSS’s throughput simulation Presumption is made as every 5 UEs accessing the same channel in one BSS and assuming every 5 UEs randomly located in one cell. The users’ transmitting speed is 11Mbps and CTS_self protocol are used in MAC layer. The free space model is used to calculate path loss, the users’ transmitting power is 100mW and all UEs and Aps both in BSS1 and BSS2 are set to use channel 1/ channel 1 to communication separately. Figure 13. The total throughput contrast of two BSS’s with different distance 191
  • 12. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013 Figure 14. Each BSS’s throughput contrast with different distance Here, we want to check one AP’s coverage to set two APs’ being parted 597m, 600m, 620m, 650m and 700m. In figure 13, the total throughput is about 500, 500, 580, 600 and 1200K bytes of two BSS’s, which shows the interference is serious when the channel is overlapped and the interference becomes seriously when the distance is closer. And each BSS’s throughput with different distance is plotted in the figure 14, which confirms that additional RF medium contention overhead occurs for all radios using the same channel in physical area resulting in throughput degradation and latency. 4. CONCLUSIONS In this paper we have proposed much analysis, many simulation cases and real tests to illustrate the performance of 802.11b MAC layer, application layer and the fairness issues related to DCF. Let us recall here that our final goal is to suggest the details which should be paid attention to in deploying network services. First, with the constraint of DCF, the largest user number is less the 40 in a BSS (Actually, 20 users are much better in a BSS with 802.11b or 802.11g WLAN network). Second, the condition of DCF is that all users have the same channel condition. That is to say those WLAN network operators have to find other method to achieve loading balance for users with different channel condition in real circumstance. And the last contribution of this paper is the simulation results and test results are general values which can be offered as the basis. ACKNOWLEDGEMENTS This work is supported by Important National Science and Technology Specific Projects NO.2013ZX03003016. 192
  • 13. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013 REFERENCES [1] Lee, S.hyun. & Kim Mi Na, (2008) “This is my paper”, ABC Transactions on ECE, Vol. 10, No. 5, pp120-122. IEEE Computer Society, (1999) “Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications”, IEEE Std. 802.11-1999. [2] Soung Chang Liew,Ying Jun Zhang, (2008) “Proportional Fairness in Multi-channel Multi-rate Wireless Networks C Part I: The Case of Deterministic Channels with Application to AP Association Problem in Large-Scale WLAN”,IEEE Trans. on Wireless Communications, Vol.7, No.9, pp.34463456. [3] G. Bianchi, (200) “Performance analysis of IEEE 802.11 distributed coordination function, IEEE J. Select. Areas. Commun.”, Vol. 18, No. 3, pp.535-547. [4] Xiang Ling and Kwan Lawrence Yeung, (2006) “Joint Access Point Placement and Channel Assignment for 802.11 Wireless LANs” IEEE Trans. on Wireless Communications, Vol.5, No.10, pp.2705-271. [5] A. Hills, (2001) “Large-scale wireless LAN design”, IEEE Commun.Mag., Vol.39, No.11, pp.98-107. [6] G. Anastasi, E. Borgia and M. Conti, E. Gregori, (2005) “IEEE 802.11b Ad Hoc Networks: Performance Measurements”, Cluster Computing, Vol 8, pp.2-3. [7] Purvang Dalal, Nikhil Kothari and K. S. Dasgupta, (2011)“Improving TCP Performance over Wireless Network with Frequent Disconnections,” International Journal of Computer Networks & Communications (IJCNC) Vol.3, No.6, pp.169-184. Authors Mingming Li works in SRRC of China as an engineer, ever graduated from Beijing University of Post and Telecommunication in 2011. Her research field is frequency spectrum planning and spectrum demand forecasting 193