21 research outputs found

    Throughput Analysis of the IEEE 802.11 DCF in Cognitive Radio Networks

    Get PDF
    This paper presents an analysis estimating the saturation throughput of the IEEE 802.11 Distributed Coordination Function (DCF) in Cognitive Radio (CR) networks. Among the many CR network paradigms, the one where existing wireless networks continue to work in the cognitive radio context is attractive and of great importance for CR study and deployment. The performance of the IEEE 802.11 DCF with cognitive radio thus emerges as an important topic. We present an analytical method based on a Markov chain model to estimate the saturation throughput of the IEEE 802.11 DCF with cognitive radio. We also show simulation results validating the presented throughput analysis. Our main contributions are that we propose the abstracted network concept in the context of CR networks and based on this concept we revise an existing Markov chain model to derive the saturation throughput of the IEEE 802.11 DCF in CR networks

    Modeling and analysis of IEEE 1609.4 MAC in the presence of error-prone channels

    Get PDF
    Vehicular Ad Hoc Networks (VANETs) have been developed to improve the safety, comfort and efficiency of driving on the road. The IEEE 1609.4 is a standard intended to support multi-channel in VANETs. These channels include one control channel for safety applications and six service channels for service applications. However, there is still no comprehensive analysis for the average delay and system throughput of IEEE 1609.4 MAC in VANETs considering error-prone channel under non-saturated conditions. In this paper, we propose an analytical models based on 1-D and 2-D Markov chain to evaluate the performance analysis of IEEE 1609.4 MAC in the presence of error-prone channels. Besides, freezing of the back-off timer is taken into consideration to provide an accurate estimation of access to the channel. The simulation results have been carried out to validate the analytical results of our model. The results show that the performance of our model outperforms the existing model in terms of packet delivery ratio and average delay of safety packets over CCH, and system throughput of service packets over SCHs

    Unsaturated Throughput Analysis of IEEE 802.11 in Presence of Non Ideal Transmission Channel and Capture Effects

    Full text link
    In this paper, we provide a throughput analysis of the IEEE 802.11 protocol at the data link layer in non-saturated traffic conditions taking into account the impact of both transmission channel and capture effects in Rayleigh fading environment. The impact of both non-ideal channel and capture become important in terms of the actual observed throughput in typical network conditions whereby traffic is mainly unsaturated, especially in an environment of high interference. We extend the multi-dimensional Markovian state transition model characterizing the behavior at the MAC layer by including transmission states that account for packet transmission failures due to errors caused by propagation through the channel, along with a state characterizing the system when there are no packets to be transmitted in the buffer of a station. Finally, we derive a linear model of the throughput along with its interval of validity. Simulation results closely match the theoretical derivations confirming the effectiveness of the proposed model.Comment: To appear on IEEE Transactions on Wireless Communications, 200

    Incentivising Fairness and Policing Nodes in WiFi

    Full text link

    On the Behavior of the Distributed Coordination Function of IEEE 802.11 with Multirate Capability under General Transmission Conditions

    Full text link
    The aim of this paper is threefold. First, it presents a multi-dimensional Markovian state transition model characterizing the behavior of the IEEE 802.11 protocol at the Medium Access Control layer which accounts for packet transmission failures due to channel errors modeling both saturated and non-saturated traffic conditions. Second, it provides a throughput analysis of the IEEE 802.11 protocol at the data link layer in both saturated and non-saturated traffic conditions taking into account the impact of both the physical propagation channel and multirate transmission in Rayleigh fading environment. The general traffic model assumed is M/M/1/K. Finally, it shows that the behavior of the throughput in non-saturated traffic conditions is a linear combination of two system parameters; the payload size and the packet rates, λ(s)\lambda^{(s)}, of each contending station. The validity interval of the proposed model is also derived. Simulation results closely match the theoretical derivations, confirming the effectiveness of the proposed models.Comment: Submitted to IEEE Transactions on Wireless Communications, October 21, 200

    Decentralised Learning MACs for Collision-free Access in WLANs

    Get PDF
    By combining the features of CSMA and TDMA, fully decentralised WLAN MAC schemes have recently been proposed that converge to collision-free schedules. In this paper we describe a MAC with optimal long-run throughput that is almost decentralised. We then design two \changed{schemes} that are practically realisable, decentralised approximations of this optimal scheme and operate with different amounts of sensing information. We achieve this by (1) introducing learning algorithms that can substantially speed up convergence to collision free operation; (2) developing a decentralised schedule length adaptation scheme that provides long-run fair (uniform) access to the medium while maintaining collision-free access for arbitrary numbers of stations

    How does CSMA/CA affect the performance and security in wireless blockchain networks

    Get PDF
    The impact of communication transmission delay on the original blockchain, has not been well considered and studied since it is primarily designed in stable wired communication environment with high communication capacity. However, in a wireless scenario, due to the scarcity of spectrum resource, a blockchain user may have to compete for wireless channel to broadcast transactions following Media Access Control (MAC) mechanism. As a result, the communication transmission delay may be significant and pose a bottleneck on the blockchain system performance and security. To facilitate blockchain applications in wireless Industrial Internet of Things (IIoT), this paper aims to investigate whether the widely used MAC mechanism, Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA), is suitable for Wireless Blockchain Networks (WBN) or not. Based on tangle, as an example to analyze the system performance in term of confirmation delay, Transaction Per Second (TPS) and transaction loss probability by considering the impact of queueing and transmission delay caused by CSMA/CA. Next, a stochastic model is proposed to analyze the security issue taking into account the malicious double-spending attack. Simulation results provide valuable insights when running blockchain in wireless network, the performance would be limited by the traditional CSMA/CA protocol. Meanwhile, we demonstrate that the probability of launching a successful double-spending attack would be affected by CSMA/CA as well
    corecore