吉林大学学报(工学版)

• • Previous Articles     Next Articles

Non-saturation throughput analysis of 802.11 DCF in fading channel

Yang Wei-dong;Li Ya-hui;Ma Jian-feng   

  1. Key Laboratory of Computer Network and Information Security,Ministry of Education, Xidian University, Xi'an 710071, China
  • Received:2006-12-06 Revised:2007-02-06 Online:2008-05-01 Published:2008-05-01

Abstract: Using a three dimensional Markov chain, a nonsaturation throughput performance model was proposed for IEEE 802.11 Distributed Coordination Function (DCF) in fading channel. The impacts of different factors, including bit error ratio, traffic loads and packet length, on the throughput of the system were analyzed using this model. Based on the model, a simple formula was derived to calculate the optimized packet length for maximizing the nonsaturation throughput. Simulation results show that this model can effectively predict the nonsaturation throughput of 802.11 DCF in fading channel, and by employing the optimum packet length the system throughput can be enhanced.

Key words: computer systems organization, fading channel, distributed coordination function, throughput

CLC Number: 

  • TP309
[1] ZHANG Hao, ZHAN Meng-ping, GUO Liu-xiang, LI Zhi, LIU Yuan-ning, ZHANG Chun-he, CHANG Hao-wu, WANG Zhi-qiang. Human exogenous plant miRNA cross-kingdom regulatory modeling based on high-throughout data [J]. 吉林大学学报(工学版), 2018, 48(4): 1206-1213.
[2] DONG Jian-feng, ZHANG Yu-feng, DAI Zhi-qiang. Improved recommendation algorithm based on DPM model [J]. 吉林大学学报(工学版), 2018, 48(2): 596-604.
[3] LIU Lei, LIU Li-juan, WU Xin-wei, ZHANG Peng. Compiler testing method based on ECP metamorphic relation [J]. 吉林大学学报(工学版), 2017, 47(4): 1262-1267.
[4] DONG Li-yan, WANG Yue-qun, HE Jia-nan, SUN Ming-hui, LI Yong-li. Collaborative filtering recommendation algorithm based on time decay [J]. 吉林大学学报(工学版), 2017, 47(4): 1268-1272.
[5] DENG Chang-yi, GUO Rui-feng, ZHANG Yi-wen, WANG Hong-liang. Lower power dynamic scheduling algorithm for sporadic tasks based on balance factor [J]. 吉林大学学报(工学版), 2017, 47(2): 591-600.
[6] WANG Ji, CHEN Fang-jiong, XIE Shi-yi. Throughput expanding WLAN based blind beam forming and nulling algorithm [J]. 吉林大学学报(工学版), 2016, 46(3): 972-978.
[7] HU Mao-kai, SUN Ji-zhe, CHEN Xi-hong, ZHANG Qun. Performance of OFDM system under troposcatter fading channels [J]. 吉林大学学报(工学版), 2013, 43(01): 239-243.
[8] ZHANG Hua, PENG Lai-hu, HU Xu-dong, WANG Xian-mei. Model of enterprise cloud manufacture applying to textile machining industry [J]. 吉林大学学报(工学版), 2012, 42(增刊1): 337-340.
[9] WANG Xin-ying, LIU Gang, GU Fang-ming, XIAO Wei. Heterogeneous feature fusion method based on semantic and shape for 3D model retrieval [J]. 吉林大学学报(工学版), 2012, 42(增刊1): 359-363.
[10] WU Xiao-xuan, NI Zhi-wei, NI Li-ping. Clustering ensembles algorithm based on fractal dimension [J]. 吉林大学学报(工学版), 2012, 42(增刊1): 364-367.
[11] LIU Zhuang, FANG Zhi-yi, ZHANG Chun-fei, CHEN Lin, ZHAO Yang. Energy-efficient amendatory algorithm based on energy-consumption transference and data gravitation in wireless sensor networks [J]. , 2012, 42(05): 1237-1242.
[12] LIU Xian, GUO Rui-feng, DING Wan-fu. Schedulability of rollback recovery fault-tolerant real-time system based on priority mixed strategy [J]. , 2012, 42(05): 1243-1250.
[13] CHAI Zheng-yi, WU Hui-xin, WU-Yong. Optimization algorithm for immune real-value detector generation [J]. , 2012, 42(05): 1251-1256.
[14] LI Min, JIA Chun-fu, LI Jing-wei, LIU Zhe-li, DONG Zong-qing. Format-preserving encryption for variable-length encoding character data [J]. , 2012, 42(05): 1257-1261.
[15] LIU Yan-heng, FU Feng, ZHU Jian-qi, SUN Xin. DoS detection model base on alive entropy [J]. 吉林大学学报(工学版), 2011, 41(4): 1059-1064.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!