Fig 18 - uploaded by Lilia Ziane Khodja
Content may be subject to copyright.
Flowchart of the IEEE 802.11 DCF  

Flowchart of the IEEE 802.11 DCF  

Source publication
Article
Full-text available
The analytical modeling and performance analysis of the 802.11 network in all its various extensions (802.11b, 802.11a, 802.11g, 802.11e, 802.11n, etc.) have already been widely explored over the past years. However, the packet fragmentation mechanism (PFM), which is proposed by the IEEE work group to reduce the impact of bit error rate (BER) on th...

Citations

... For example, large sized packets are to be transferred, on a smaller MTU frame size, packet fragmentation is needed to ensure successful delivery. However, these fragmented packets will require that they are recollected together again at the receivers end which results to increase in latency [85], leading to low throughput, especially when the packets are not successfully delivered [86] - [89]. Figure 3 below demonstrates the packet fragmentation process [90]. ...
Article
The network interface layer of the TCP/IP protocol suite, primarily comprised of the Internet Protocol (IP), serves as the backbone of modern internet communication. With its efficient data delivery, The network interface layer, presents key challenges in terms of performance, security, and privacy. This comprehensive survey delves into these three crucial aspects, analyzing the inherent vulnerabilities, limitations of the interface layer, and provide solutions of the related problems. The performance analysis explores throughput, latency, and bandwidth constraints, along with solutions such as bandwidth allocation and optimization techniques. Vulnerabilities within Network Interface Layer, including denial-of-service attacks and MAC address spoofing, are discussed, along with a review of existing security mechanisms. Privacy flaws are examined, covering MAC address tracking, profiling risks, and anonymization techniques, while also addressing privacy considerations on the Internet of Things. The survey analyzes several case studies providing comparative analysis of the Network Interface Layer Protocols, with support of the real world scenarios including performance analysis in high density environment, and security and privacy risks in smart homes networks. The findings provide a comprehensive understanding of the complexities surrounding performance, security, and privacy issues future directions and potential solutions.
... In a future study, the proposed scheme will be extended to take account not only of the delay consideration, but also the ratio of the upload traffic to the download traffic in the WMN [26][27][28][29]. In addition, the resource allocation of multi-channel [30,31] over wireless lossy channel [32][33][34][35] will be the research issues. Finally, an analytical model will be proposed for predicting the effects of transmission delays and node mobility on different classes of traffic given the use of the PBA-CDC scheme [36]. ...
Article
Full-text available
Wireless mesh networks (WMNs) extend the limited transmission coverage of wireless LANs by enabling users to connect to the Internet via a multi-hop relay service provided by wireless mesh routers. In such networks the quality of experience (QoE) depends on both the user location relative to the Internet gateway and the traffic load. Various channel access or queue management schemes have been proposed for achieving throughput fairness among WMN users. However, delay and bandwidth utilization efficiency of such schemes may be unacceptable for real-time applications. Accordingly, the present study proposes a proportional bandwidth allocation scheme with a delay constraint consideration for enhancing the QoE of users of WMNs based on the IEEE 802.11e standard. An analytical model of the proposed scheme is provided. Moreover, the performance of the proposed scheme is systematically compared with that of existing bandwidth allocation methods. The simulation results show that the proposed scheme outperforms previously proposed schemes in terms of both an improved throughput fairness among the WMN users and a smaller end-to-end transmission delay.
... In IEEE 802.11 standard, the fragmentation technique is implemented, and many studies have mentioned that this technique improves the network's throughput [10][11][12]. The authors, in [13], proposed a fragmentation mechanism for IEEE 802.15.4 wireless sensor network to improve the bandwidth utilization. ...
Article
Full-text available
Transmission delay, throughput and energy are important criterions to consider in wireless sensor networks (WSN). In this way, IEEE 802.15.4 standard was conceived with the objective to reduce resource’s consumption in both WSN and wireless personal area networks. In such networks, the slotted CSMA/CA still occupies a prominent place as a channel control access mechanism with its inherent simplicity and reduced complexity. In this paper, we propose to introduce a network allocation vector (NAV), to reduce energy consumption and collisions in IEEE 802.15.4 networks. A Markov chain-based analytical model of the fragmentation mechanism, in a saturated traffic, is given as well as a model of the energy consumption using the NAV mechanism. The obtained results show that the fragmentation technique improves at the same time the throughput, the access delay and the bandwidth occupation. They, also, show that using the NAV allows reducing significantly the energy consumption when applying the fragmentation technique in slotted CSMA/CA under saturated traffic conditions.
... We consider that the backoff counter is decrement at the end of a time slot. In our proposed model, stage 0 was ---Nadeem [10], Chatzimisios [11], Dong [12], Ahuja [13], Lin [14], Yazid [15], Senthilkumar [16], Yin [17], Ni [18], Katarzyna [22] U --Li [19], Frohn [20], Kim [21], Martorell [23], Hoefel [24], Heereman [25], Daldoul [26], Hajlaoui [28] U -U [14] divided into 0 þ and 0 À . In other words, the transition to stage 0 can be divided into two according to the cause of the trigger. ...
Article
Full-text available
According to the amendment 5 of the IEEE 802.11 standard, 802.11n still uses the distributed coordination function (DCF) access method as mandatory function in access points and wireless stations (essentially to assure compatibility with previous 802.11 versions). This article provides an accurate two dimensional Markov chain model to investigate the throughput performance of IEEE 802.11n networks when frame aggregation and block acknowledgements (Block-ACK) schemes are adopted. Our proposed model considered packet loss either from collisions or channel errors. Further, it took anomalous slots and the freezing of backoff counter into account. The contribution of this work was the analysis of the DCF performance under error-prone channels considering both 802.11n MAC schemes and the anomalous slot in the backoff process. To validate the accuracy of our proposed model, we compared its mathematical simulation results with those obtained using the 802.11n DCF in the network simulator (NS-2) and with other analytical models investigating the performance of 802.11n DCF. Simulation results proved the accuracy of our model.
... Flowchart of the IEEE 802.11 DCF[72] and EDCA[58]. ...
Article
Full-text available
A Medium Access Control (MAC) protocol is designed to disseminate safety messages reliably and rapidly to improve the safety and efficiency of vehicles on the road in Vehicular Ad-hoc Networks (VANETs). VANETs, which are created by moving vehicles, have specific properties such as high node mobility with constrained movements and quick topology changes. Hence, MAC protocols should be designed to adapt to the changing data traffic patterns due to vehicle densities in the VANET environment. The latest multi-channel MAC protocols based on IEEE 802.11p and IEEE 1609.4 standards have higher performance than that of single-channel MAC protocols in every Key Performance Indicator (KPI). Specifically, the multi-channel MAC protocols, which adapt themselves to different vehicular traffic densities, can guarantee a bounded transmission delay of real-time safety applications and an increased throughput for non-safety applications. In this work, we focus on the three following perspectives: First, the multi-channel MAC protocols are studied under saturated and non-saturated data traffic conditions. Second, we study the multi-dimensional Markov chains (up to three dimensions) used in the MAC protocols. Third, the considered Markov models are compared with real-life application requirements to improve the existing analytical models and protocol designs. Finally, we summarize our findings and discuss the open issues concerning multi-channel MAC protocols for VANETs as a part of the Intelligent Transportation System.
... The performance analysis is based either by mathematical modeling or by simulation. When it is based on mathematical modeling, the Markov chain models are often used, it is inspired from the existing works on IEEE 802.11 [35][36][37][38][39][40][41] and IEEE 802.15.4 for both slotted CSMA/CA [42][43][44][45][46][47][48][49][50][51][52][53][54] and unslotted CSMA/CA [55,56]. In [33], authors analyzed the transmission in the shared link using TSCH CA algorithm. ...
Article
Full-text available
The Time Slotted Channel Hopping (TSCH) mechanism is created in the IEEE 802.15.4e amendment, to meet the need of Industrial Wireless Sensor Networks. It combines time slotted access and channel hopping with deterministic behavior. The mechanism offers two types of links: dedicated links and shared links. In order to reduce the probability of repeated collisions in shared links, the mechanism implemented a retransmission backoff algorithm, named TSCH Collision Avoidance (TSCH CA). In this article, we develop a two dimensional Markov chain model for the IEEE 802.15.4e TSCH CA mechanism, we take into account the deterministic behavior of this mechanism. In order to evaluate its performances, we estimate the stationary distribution of this chain. Then, we derive theoretical expressions of: collision probability, data packet loss rate, reliability, energy consumption, throughput, delay and jitter. Then, we analyze the impact of the number of devices sharing the link for a fixed network size under different traffic conditions. Finally, the accuracy of our theoretical analysis is validated by Monte Carlo simulation. It is shown that the performances of the IEEE 802.15.4e TSCH parameters are strongly related to the number of devices sharing the link.
... In [29], Bianchi has described the basic functionalities of IEEE 802.11 through a Markov chain under saturated traffic conditions. Extensions of this model have been used to analyze packet reception rate [30], delay [31], and bit error rate (BER) [32][33][34]. Inspired by Bianchi's work, a Markov model for IEEE 802.15.4 CSMA/CA has been presented in [35]. Later, modified Markov models have been presented taking into account the ACKnowledgment (ACK) [36], including retry limit [37], and deriving a distributed adaptive algorithm for minimizing power consumption [38]. ...
... Using the probability distribution over each state, we can compute the probability s as in Eq. (28), and then compute expressions of (33), (34), (43), (50), and (51). ...
Article
Full-text available
The IEEE 802.15.4 standard has been introduced for low latency and low energy consumption in wireless sensor networks. To better support the requirements of industrial applications, where the use of this standard is limited, the low latency deterministic network (LLDN) mechanism of the IEEE 802.15.4e amendment has been proposed. In this paper, we develop a three dimensional Markov chain model for the IEEE 802.15.4e LLDN mechanism. Then, we estimate the stationary probability distribution of this chain in order to derive theoretical expressions of some performance metrics, as the reliability, energy consumption, throughput, delay and jitter. After that, we conduct a comparative study between the IEEE 802.15.4e LLDN and the IEEE 802.15.4 slotted carrier sense multiple access with collision avoidance (CSMA/CA). Numerical results show that the deterministic behavior of the LLDN mechanism significantly reduces the collision probability providing best performances in terms of reliability, energy consumption, throughput and delay compared to the IEEE 802.15.4 slotted CSMA/CA. Finally, the accuracy of our theoretical analysis is validated by Monte Carlo simulations.
... However, they were a solid starting point for further research. Most of all, they resolved the complicated problem of representing multiple states of the channel access procedure by using Markov chains (see Kosek-Szott et al., 2011;Yazid et al., 2014aYazid et al., , 2014bYazid et al., , 2015b. In this area, Kong et al. (2004) presented an analytical model of the IEEE 802.11e ...
... In IEEE 802.11 standard, the fragmentation technique is implemented and many studies have mentioned that this technique improves the network throughput (see, the references IEEE Part 11, 2007;Yazid et al., 2013;Li et al., 2009. The authors (Yoon et al., 2007) have proposed the fragmentation mechanism in IEEE 802.15.4 wireless sensor network to improve the bandwidth utilisation, the problem in their protocol is the risk of collision (when the transmitter node attempt to send the remaining frame, in the beginning of the superframe) when competitive nodes pull a backoff number equal to zero. ...
... A parallel study is performed on the segmentation process for the packets which are higher in size than MTU. Larger data packets than 1500 bytes will split into smaller packets called fragments to enable them transverse the network [15]. Based on the literature study a proper simulation tool is required to develop the network in the real time simulation. ...
Article
Full-text available
Ethernet network, standardized by IEEE 802.3, is vastly installed in Local Area Network (LAN) for cheaper cost and reliability. With the emergence of cost effective and enhanced user experience needs, the Quality of Service (QoS) of the underlying Ethernet network has become a major issue. A network must provide predictable, reliable and guaranteed services. The required QoS on the network is achieved through managing the end-to-end delay, throughput, jitter, transmission rate and many other network performance parameters. The paper investigates QoS parameters based on packet size to analyze the network performance. Segmentation in packet size larger than 1500 bytes, Maximum Transmission Unit (MTU) of Ethernet, is used to divide the large data into small packets. A simulation process under Riverbed modeler 17.5 initiates several scenarios of the Ethernet network to depict the QoS metrics in the Ethernet topology. For analyzing the result from the simulation process, varying sized packets are considered. Hence, the network performance results in distinct throughput, end-to-end delay, packet loss ratio, bit error rate etc. for varying packet sizes.