The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Current 802.11 networks do not typically achieve the maximum potential throughput despite link adaptation and cross-layer optimization techniques designed to alleviate many causes of packet loss. A primary contributing factor is the difficulty in distinguishing between various causes of packet loss, including collisions caused by high network use, co-channel interference from neighboring networks,...
Distributed Coordination Function (DCF) of IEEE 802.11 WLANs prohibits concurrent transmissions to avoid packet collisions or interferences. This conservative transmission mechanism of DCF makes it hard to fully utilize the wireless capacity in terms of spatial reuse. Recent measurement studies demonstrate that a packet can survive the collision and can be decoded successfully by the receiver depending...
A new subfunction for the IEEE 802.11e EDCF allowing efficient transport of real-time traffic is proposed. The delay induced by the freezout of the backoff counter is to be considered. Intentional dropping is used if a certain threshold delay is exceeded. A system enabled with this suggested feature is analyzed and the impact of backoff parameters on the transmission probability, the dropping probability,...
The network throughput will decrease dramatically and collision rate increases severely when active nodes increase in WLAN. Breaking through the limitation of the Binary Exponential Backoff algorithms, we provide a new backoff algorithm which utilizes the linear contention window based on the node numbers. To attain better performance, we derive that the contention window is selected as an approximate...
In this paper, we show the enhanced version of SLPv2 (Service Location Protocol version 2). It is one of the service discovery protocols in wired network, and we propose the wireless network based SLP for WSN (wireless sensor network). If a wired protocol is transferred to the wireless domain, then we have to consider some critical problems, like resource and power wall, etc. So SLP for the WSN must...
The regression model, approximating the behavior of the utilization rate of WAP's capacity in download-emphasizing network, is estimated based on a 10-client full-factorial experiment with 95.9% adjusted R2. This experiment-based model is further employed to draft a deterministic model estimating the effective per-client throughput, and a probabilistic model approximating the probability to obtain...
Access points in 802.11 wireless networks suffer from performance problems because of insufficient resources at layer 2 - the DCF (distributed control function) access method provides equal access probability to all devices in a wireless cell including the access point itself. Consequently, performance degrades and contention between uploads and downloads can lead to the familiar TCP unfairness problem...
The IEEE 802.11 WLAN standard specifies two different ways in which a wireless station (STA) can gain access to the channel - (i) distributed channel access where each STA can access channel in a probabilistic manner, (ii) access point (AP) coordinated channel access where the AP provides channel access to each STA by polling mechanism. Whilst the former is attractive because of simpler implementation,...
Analytic performance of IEEE 802.11 distributed coordination function that takes into account hidden node problem and unsaturated traffic condition is presented for symmetric networks. This enables us to estimate the performance of practical wireless local area networks more accurately. It is shown that the presence of hidden nodes barely affects the network performance in low traffic conditions,...
In this paper, we propose an analytical approach for performance evaluation of the classic tree/stack splitting algorithm in an interference-dominating wireless access network with random traffic and finite nodes. In an interference-dominating wireless access network, a receiver could simultaneously receive multiple packets from a variety of transmitters, as long as the signal-to-interference-plus-noise...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.