scinapse is loading now...

Throughput and delay limits of IEEE 802.11

Published on Aug 1, 2002in IEEE Communications Letters 2.72
· DOI :10.1109/LCOMM.2002.802035
Yang Xiao56
Estimated H-index: 56
(Charles Stark Draper Laboratory),
Jon Rosdahl2
Estimated H-index: 2
(Charles Stark Draper Laboratory)
Abstract
The IEEE 802.11 protocol family provides up to 54-Mbps data rate, whereas the industry is seeking higher data rates. This paper shows that a theoretical throughput upper limit and a theoretical delay lower limit exist for the IEEE 802.11 protocols. The existence of such limits indicates that by simply increasing the data rate without reducing overhead, the enhanced performance, in terms of throughput and delay, is bounded even when the data rate goes into infinitely high. Reducing overhead is vital for good performance.
  • References (0)
  • Citations (360)
Cite
References0
Newest
Cited By360
Newest
Published on Mar 23, 2019in Wireless Networks 1.98
Mehdi Gheisari (Guangdong University of Technology), Jafar A. Alzubi3
Estimated H-index: 3
(Al-Balqa` Applied University)
+ 2 AuthorsJose Antonio Marmolejo Saucedo (Panamerican University)
Nowadays, wireless mesh networks are known as important parts of different commercial, scientific, and industrial processes. Their prevalence increases day-by-day and the future of the world is associated with such technologies for better communication. However, the issue of improving quality of service for dealing with more complex and intense flow of data has been always a remarkable research problem, as a result of improved wireless communication systems. In this sense, objective of this stud...
Source Cite
Published on Mar 1, 2019in Pervasive and Mobile Computing 2.97
Amar Nath Patra1
Estimated H-index: 1
(University of Nevada, Reno),
Paulo Alexandre Regis3
Estimated H-index: 3
(University of Nevada, Reno),
Shamik Sengupta17
Estimated H-index: 17
(University of Nevada, Reno)
Abstract Providing wireless coverage to users using Unmanned Aerial Vehicles (UAVs) encounters two major challenges: deployment and channel allocation. To this end, solutions to both issues are proposed in this paper. An overloaded UAV attempts to acquire more channels by performing channel bonding/aggregation followed by requesting its chosen peers to move closer for load sharing. The proposed channel reallocation schemes minimize interference caused by channel reassignments, or change in netwo...
Source Cite
Published on Feb 1, 2019in Wireless Networks 1.98
Tao Chi1
Estimated H-index: 1
(Shanghai Ocean University),
Ming Chen1
Estimated H-index: 1
(Shanghai Ocean University)
Currently, a variety of wireless modules are purposed for different criteria in the area of the agricultural internet of things; however, there is a lack of appropriate methods enabling these wireless modules to operate in the same frequency band. The goal of this paper is to make a very thorough quantitative analysis on the theoretical maximum collision time and collision probability of WiFi or Bluetooth network with RFID interferers. We propose the interference avoidance scheme which requires ...
1 Citations Source Cite
Published on Oct 1, 2018
Yoo Seung Song (Electronics and Telecommunications Research Institute), Shin K. Lee (Electronics and Telecommunications Research Institute), Jeong W. Lee (Electronics and Telecommunications Research Institute)
Recently, several projects for cooperative intelligent transportation systems (C-ITS) are being actively conducted all over the world. The C-ITS is expected to secure the safety of road traffic and provide more convenient transportation services to drivers. The dedicated short range communication (DSRC) technology is a vehicle communication technology developed for the purpose of providing an ITS service. So far, many studies and field tests using a DSRC technology have been conducted. However, ...
Source Cite
Published on Aug 1, 2018in Journal of Systems Science & Complexity 0.53
Gopinath Panda2
Estimated H-index: 2
(National Institute of Science Education and Research),
Abhijit Datta Banik8
Estimated H-index: 8
(Indian Institute of Technology Bhubaneswar),
Dibyajyoti Guha1
Estimated H-index: 1
(International Management Institute, New Delhi)
This paper considers an infinite buffer renewal input queue with multiple working vacation policy wherein customers are served by a single server according to general bulk service (a, b)-rule (1 ≤ a ≤ b). If the number of waiting customers in the system at a service completion epoch (during a normal busy period) is lower than ‘a’, then the server starts a vacation. During a vacation if the number of waiting customers reaches the minimum threshold size ‘a’, then the server starts serving this bat...
1 Citations Source Cite
Published on Mar 9, 2018
Piyush Dhawankar1
Estimated H-index: 1
(Northumbria University),
Rupak Kharel5
Estimated H-index: 5
(Manchester Metropolitan University)
This paper analyses the results from an experimental study on the performance of the heterogeneous wireless networks based on IEEE 802.11a, 802.11n and 802.11ac standards in an indoor environment considering the key features of PHY layers mainly, Multiple Input Multiple Output (MIMO), Multi-User Multiple Input Multiple Output (MU-MIMO), Channel Bonding and Short-Guard Interval (SGI). The experiment is conducted for the IEEE 802.11ac standard along with the legacy protocols 802.11a/n in a heterog...
Source Cite
Published on Dec 1, 2017
Sadia Sultana (East West University), Anirban Sarkar (East West University)+ 2 AuthorsMd. Ezharul Islam2
Estimated H-index: 2
(Jahangirnagar University)
In this paper, we analyze the relationship of number of access point (AP) and achieved throughput for a given scenario. In the scenario, we consider a number of parameters, i.e. given area, topology, number of users, expected rate and channel allocation vector. We find that in general with the increase of AP the performance of overall network improve. However, after a certain number of deployed APs, further increase of AP does not bring substantial improvement in the network performance. More sp...
Source Cite
Published on Oct 1, 2017
Vikas Bollapragada Subrahmanya1
Estimated H-index: 1
(Clemson University),
Harlan B. Russell12
Estimated H-index: 12
(Clemson University)
The applications for MANETs have increased rapidly and today MANETs are capable of providing a variety of services. One of the major contributing factors is the availability of radios that are able to adapt to the channel conditions and can transmit at multiple data rates. A common approach for channel access is to employ a CSMA/CA based mechanism. However, these protocols tend to under perform at heavy loads or due to exposed/hidden nodes. One solution to this problem is to use a scheduling bas...
Source Cite
Published on Aug 1, 2017in Journal of Network and Computer Applications 3.99
Mohammad Masdari9
Estimated H-index: 9
(Islamic Azad University),
Safiyyeh Ahmadzadeh2
Estimated H-index: 2
(Islamic Azad University),
Moazam Bidaki5
Estimated H-index: 5
(Islamic Azad University)
The miniaturization of wireless sensors and medical devices have empowered the extension of Wireless Body Area Networks (WBANs) and E-Health care systems. However, in WBANs, wireless communications are exposed to a variety of passive and active security attacks. As a result, protection of privacy and integrity of the collected data from WBANs is of high importance. To mitigate these problems, numerous key management and security solutions have been designed for the WBANs in the literature, that ...
7 Citations Source Cite
Published on Aug 1, 2017in Wireless Personal Communications 1.20
Zhifeng Xiao10
Estimated H-index: 10
(Penn State Erie, The Behrend College),
Yang Xiao56
Estimated H-index: 56
(University of Alabama),
Jie Wu74
Estimated H-index: 74
(Temple University)
Accountability in computing implies that an entity should be held responsible for its behaviors with verifiable evidence. In order to study accountability, quantitative methods would be very helpful. Even though there are some researches in accountability, there are no other works which study quantitative accountability in practical settings, while quantitative accountability is defined as using quantities or metrics to measure accountability. In this paper, we propose P-Accountability, which is...
Source Cite