Branding/Logomark minus Citation Combined Shape Icon/Bookmark-empty Icon/Copy Icon/Collection Icon/Close Copy 7 no author result Created with Sketch. Icon/Back Created with Sketch.
Loading Scinapse...
Throughput and delay limits of IEEE 802.11
Published on Aug 1, 2002in IEEE Communications Letters 2.72
· DOI :10.1109/LCOMM.2002.802035
Yang Xiao56
Estimated H-index: 56
(Charles Stark Draper Laboratory),
Jon Rosdahl2
Estimated H-index: 2
(Charles Stark Draper Laboratory)
The IEEE 802.11 protocol family provides up to 54-Mbps data rate, whereas the industry is seeking higher data rates. This paper shows that a theoretical throughput upper limit and a theoretical delay lower limit exist for the IEEE 802.11 protocols. The existence of such limits indicates that by simply increasing the data rate without reducing overhead, the enhanced performance, in terms of throughput and delay, is bounded even when the data rate goes into infinitely high. Reducing overhead is vital for good performance.
  • Full text
  • References (0)
  • Cited By (359)
Cited By359
Published on Aug 15, 2011
Sangmin Moon1
Estimated H-index: 1
(Hyundai Motor Company),
Taehyu Shin1
Estimated H-index: 1
(Kwangwoon University)
+ 4 AuthorsHo Young Hwang13
Estimated H-index: 13
(Kwangwoon University)
Mobile devices are powered by batteries with limited capacity. In order to use them for a long time, energy efficient operation of them is necessary. In this paper, we propose an energy saving method for Wi-Fi stations which support IEEE 802.11. It modifies existed partial virtual bitmaps in IEEE 802.11 to bitmaps based on IEEE 802.11a physical layer transmission time.
1 Citations Source Cite
Published on Jan 1, 2012
In a wireless network, the medium is a shared resource. The nodes in the network negotiate access of the shared resource using the Medium Access Control (MAC) protocol. The design of a MAC protocol ...
Published on Jan 1, 2009
B. Azimi-Sadjadi1
Estimated H-index: 1
Aggelos Kiayias29
Estimated H-index: 29
(University of Connecticut)
+ 1 AuthorsBülent Yener30
Estimated H-index: 30
(Rensselaer Polytechnic Institute)
The broadcast nature of any wireless communication network provides a natural eavesdropping and intervention capability to an adversary. Anyone with a tuned receiver within a radius that permits adequate signal to interference and noise ratio (SINR) may eavesdrop. Thus, effecting efficient key generation and renewal algorithms to ensure confidentiality, integrity, and authentication for every wireless link is essential for impenetrability.
2 Citations Source Cite
Published on Jan 1, 2004
Qixiang Pang10
Estimated H-index: 10
Soung Chang Liew39
Estimated H-index: 39
+ 1 AuthorsS.-H. Gary Chan2
Estimated H-index: 2
This paper proposes and investigates a simple selfadaptive contention window adjustment algorithm for 802.11 WLAN. We present simulation and analytical results showing that the new algorithm outperforms the standard 802.11 window adjustment algorithm. Compared with the standard and previously proposed enhancement algorithms, a salient feature of our algorithm is that it performs well both when the number of active stations is large and small – that is, in both heavy and light contention cases. F...
13 Citations
Published on Jan 1, 2007
Dionysios Skordoulis6
Estimated H-index: 6
(Brunel University London),
Qiang Ni28
Estimated H-index: 28
(Brunel University London)
+ 1 AuthorsMarios G. Hadjinicolaou8
Estimated H-index: 8
(Brunel University London)
8 Citations
Published on Dec 13, 2006
Hyung Joo Ki4
Estimated H-index: 4
(Sungkyunkwan University),
Seung-Hyuk Choi31
Estimated H-index: 31
(Sungkyunkwan University)
+ 1 AuthorsTae-Jin Lee17
Estimated H-index: 17
(Sungkyunkwan University)
IEEE 802.11 has employed distributed coordination function (DCF) adopting carrier sense multiple access with collision avoidance (CSMA/CA). To effectively resolve collisions, DCF uses binary exponential backoff (BEB) algorithm with three parameters, i.e., backoff stage, backoff counter and contention window. If a collision occurs, stations involving in the collision increase their backoff stages by one and double their contention window sizes. However, DCF with BEB wastes wireless resource when ...
9 Citations Source Cite
Published on Jan 1, 2009
Pangun Park1
Estimated H-index: 1
Given the potential benefits offered by wireless sensor networks(WSNs), they are becoming an appealing technology for process,manufacturing, and industrial control applications. In thisthesis, we p ...
11 Citations
Chia-Chuan Liang (National Central University), Shih-Wei Pan (National Central University), Jung-Shyr Wu (National Central University)
The most significant issue in 802.11 contention based networks is to prevent collisions and to ensure connection quality. Researchers have shown an increased interest in collision aware back-off algorithms. However, collision aware back-off algorithms are still failed to ensure strict priority for the high priority traffic. Especially in the heavy loading network, a large number of unsuccessful collisions of low priority traffic are the leading cause of the performance degradation of high priori...
Published on Jan 1, 2009
Hao-Ming Liang4
Estimated H-index: 4
(National Cheng Kung University),
Sherali Zeadally39
Estimated H-index: 39
(University of the District of Columbia)
+ 1 AuthorsCe-Kuen Shieh16
Estimated H-index: 16
(National Cheng Kung University)
Over the past few years, several backoff algorithms such as Exponential Increase Exponential Decrease (EIED) and Adaptive Enhanced Distributed Coordination Function (AEDCF)) have been proposed for wireless local area networks to improve channel access. We propose a new backoff technique that monitors the number of backoff counter pauses experienced and modifies the contention window accordingly. We evaluate and compare the performance of our proposed approach with EIED and AEDCF channel access t...
3 Citations
Published on Feb 23, 2007
Boris Bellalta1
Estimated H-index: 1
Les xarxes WLANs possibiliten un acces de banda ampla a Internet des d'un terminal mobil, essent una possible solucio alternativa a les xarxes cel·lulars. Tanmateix, aquest tipus de tecnologia presenta certes limitacions, com es la dificil coexistencia entre fluxos de trafic rigids (VoIP) i fluxos de trafic elastic (TCP), degut al propi protocol d'acces al medi. En aquesta tesi es proposa la utilitzacio d'un nou mecanisme de control d'admissio que utilitzant el nou estandard de qualitat de serve...
5 Citations
View next paperPerformance analysis of the IEEE 802.11 distributed coordination function