## A Capacity Analysis for the IEEE 802.11 MAC Protocol (2001)

Venue: | In Wireless Networks |

Citations: | 20 - 0 self |

### BibTeX

@ARTICLE{Tay01acapacity,

author = {Y. C. Tay and K. C. Chua},

title = {A Capacity Analysis for the IEEE 802.11 MAC Protocol},

journal = {In Wireless Networks},

year = {2001},

volume = {7},

pages = {159--171}

}

### Years of Citing Articles

### OpenURL

### Abstract

The recently proposed IEEE 802.11 MAC protocol provides shared access to a wireless channel. This paper uses an analytic model to study the channel capacity --- i.e. maximum throughput --- when using the basic access (two-way handshaking) method in this protocol. It provides closed-form approximations for (1) the probability of collision p, (2) the maximum throughput S and (3) the limit on the number of stations in a wireless cell. The analysis also shows that (4) p does not depend on the packet length, the latency in crossing the MAC and physical layers, the acknowledgement timeout, the interframe spaces and the slot size; (5) p and S (and other performance measures) depend on the minimum window size W and the number of stations n only through a variable g = W=(n+ 1) --- consequently, halving W is like doubling n; (6) the maximum contention window size has minimal effect on p and S; (7) the choice of W that maximizes S is proportional to the square root of the packet length; (8) S ...

### Citations

877 |
The Art of Computer Systems Performance Analysis
- Jain
- 1991
(Show Context)
Citation Context ... we have not excluded transmissions that belong to the station itself. To factor out these transmissions, we use p = n \Gamma 1 n T slot T slice ; (A5) this is similar to the Schweitzer approximation =-=[J]-=- for queueing networks, and correctly gives p = 0 for n = 1. Eliminating T slice and W backoff from (A1), (A4) and (A5) gives p 1 \Gamma p \Gamma p(2p) m 1 \Gamma 2p = 2 W \Gamma 1 + 2 3 n \Delta n \G... |

192 | Packet switching in radio channels: Part i– carrier sense multiple-access modes and their throughput-delay characteristics - Kleinrock, Tobagi - 1975 |

119 |
Queueing Systems, Vol. I: Theory
- Kleinrock
- 1975
(Show Context)
Citation Context ...e A1 Glossary The performance analysis of any real system requires approximations if it is to be tractable. Only idealized queues (e.g. M/M/1) and networks (e.g. product-form) can be analyzed exactly =-=[K]-=-. For example, stochastic analysis of a protocol must adopt assumptions (e.g. exponential distributions, independent variables) and techniques (e.g. state space aggregation) that are -- in effect -- a... |

71 | Analysis of backoff protocols for multiple access channels - Håstad, Leighton, et al. - 1996 |

68 | Performance evaluation and enhancement of the CSMA/CA MAC protocol for 802.11 wireless lans
- Bianchi, Fratta, et al.
- 1996
(Show Context)
Citation Context ...ot the latter, for two reasons: (1) the basic access method is mandatory, whereas RTS/CTS is an optional variant; (2) the performance for RTS/CTS is significantly different from that for basic access =-=[BFO]-=-, and therefore requires a separate analytic model. 1 We also do not discuss the no-ACK option meant for broadcasts and multicasts, nor the point coordination function, which is an optional polling sc... |

63 | Zarki, Voice and data transmission over an 802.11 wireless network - Visser, El |

55 |
Locking performance in centralized databases
- YC, Goodman, et al.
- 1985
(Show Context)
Citation Context ...too much time waiting for each other in backoffs --- we call this backoff thrashing, and it is something to guard against in a CSMA/CA protocol. (A similar phenomenon occurs in transaction processing =-=[TGS]-=-.) The details for our model are given in the Appendix. There, we show that p is the root of the approximation p 1 \Gamma p \Gamma p(2p) m 1 \Gamma 2p = 2 W \Gamma 1 + 2 3 n \Delta n \Gamma 1 n ; (1) ... |

28 | Multiaccess Protocols in Packet Communication Systems - Tobagi - 1980 |

27 | Interference analysis of nonpersistent CSMA with hidden terminals in multicell wireless data networks - Huang, Chen - 1995 |

23 | Throughput and Fairness Properties of Asynchronous Data Transfer Methods - Chhaya, Gupta - 1995 |

23 | Throughput Analysis for Persistent CSMA Systems - Takagi, Kleinrock - 1985 |

22 | Performance Analysis of Multiple Access Protocols - Tasaka - 1986 |

6 | A Multi-Queue Problem: Bounds and Approximations - Szpankowski - 1984 |

3 | Throughput-Delay Analysis of the Nonslotted and Nonpersistent - Vo-Dai - 1982 |

2 | A theoretical performance analysis of polling and carrier sense collision detection communication systems - Arthurs, Stuck - 1982 |

2 | Packet output process of CSMA and CSMA/CD protocols - Tan, Tsai - 1996 |

1 | Performance of CSMA-CA MAC protocol for distributed radio local area networks - Nor, Ismail - 1995 |

1 | Stability and throughput optimization of multichannel slotted nonpersistent CSMA protocol - Pountourakis, Sykas, et al. |