Team for Research in
Ubiquitous Secure Technology

Performance Modeling and Analysis of the IEEE 802.11 Distributed Coordination Function In Presence of Hidden Stations
Fuyi Hung, Sameer Pai, Ivan Marsic

Citation
Fuyi Hung, Sameer Pai, Ivan Marsic. "Performance Modeling and Analysis of the IEEE 802.11 Distributed Coordination Function In Presence of Hidden Stations". Proceedings of the Military Communications Conference, 7, October, 2006.

Abstract
In this paper, we propose an analytical model to evaluate the hidden station effect on the performance of the IEEE 802.11 Distributed Coordination Function (DCF). DCF is a random channel-access scheme based on the Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) method and the binary slotted exponential backoff procedure to reduce packet collisions. Most collisions are caused by hidden stations because these stations cannot sense each other’s transmission and often send packets concurrently, resulting in significant degradation of the network performance. The proposed model generalizes the existing work on 802.11 DCF performance modeling. The performance of our model is evaluated by comparison with NS-2 simulations. The impact of different parameters, such as the number of station, packet size and initial backoff window size, is also considered.

Electronic downloads


Internal. This publication has been marked by the author for TRUST-only distribution, so electronic downloads are not available without logging in.
Citation formats  
  • HTML
    Fuyi Hung, Sameer Pai, Ivan Marsic. <a
    href="http://www.truststc.org/pubs/204.html"
    >Performance Modeling and Analysis of the IEEE 802.11
    Distributed Coordination Function In Presence of Hidden
    Stations</a>, Proceedings of the Military
    Communications Conference, 7, October, 2006.
  • Plain text
    Fuyi Hung, Sameer Pai, Ivan Marsic. "Performance
    Modeling and Analysis of the IEEE 802.11 Distributed
    Coordination Function In Presence of Hidden Stations".
    Proceedings of the Military Communications Conference, 7,
    October, 2006.
  • BibTeX
    @inproceedings{HungPaiMarsic06_PerformanceModelingAnalysisOfIEEE80211DistributedCoordination,
        author = {Fuyi Hung and Sameer Pai and Ivan Marsic},
        title = {Performance Modeling and Analysis of the IEEE
                  802.11 Distributed Coordination Function In
                  Presence of Hidden Stations},
        booktitle = {Proceedings of the Military Communications
                  Conference},
        pages = {7},
        month = {October},
        year = {2006},
        abstract = {In this paper, we propose an analytical model to
                  evaluate the hidden station effect on the
                  performance of the IEEE 802.11 Distributed
                  Coordination Function (DCF). DCF is a random
                  channel-access scheme based on the Carrier Sense
                  Multiple Access with Collision Avoidance (CSMA/CA)
                  method and the binary slotted exponential backoff
                  procedure to reduce packet collisions. Most
                  collisions are caused by hidden stations because
                  these stations cannot sense each other’s
                  transmission and often send packets concurrently,
                  resulting in significant degradation of the
                  network performance. The proposed model
                  generalizes the existing work on 802.11 DCF
                  performance modeling. The performance of our model
                  is evaluated by comparison with NS-2 simulations.
                  The impact of different parameters, such as the
                  number of station, packet size and initial backoff
                  window size, is also considered.},
        URL = {http://www.truststc.org/pubs/204.html}
    }
    

Posted by Sameer Pai on 19 Mar 2007.
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.