- 1 Per as long as mance analysis of 802.11 DCF in presence of hidden nodes in addition to collision prevention mechanism. Outline (What ) Assumptions (What contd.) Assumptions (What contd.) Typical node settings
- 2 Waters, Lee Ann Music Director/Afternoon On-Air Personality
- 3 Journal Ratings by University of Wales
Waters, Lee Ann, Music Director/Afternoon On-Air Personality has reference to this Academic Journal, PHwiki organized this Journal Per as long as mance analysis of 802.11 DCF in presence of hidden nodes in addition to collision prevention mechanism. – Ruchir Bhanushali. – Sagar. Shah. Outline (What ) RTS/CTS vs. Basic access mechanism using OPNET Modeler: Case 1:Netwok nodes are hidden (0 5). Case 2: Additions of hidden nodes ( 0 4). Per as long as mance parameters: Global Statistics: Throughput, MAC delay, Retransmission Attempts. Node Statistics: Control traffic sent/received. Assumptions (What contd.) Physical Characteristics: 802.11b @ 11Mbps. Channel 1: center Frequency 2.412Ghz ; BW: 22Mhz. PT: 5mW, Receiver Sensitivity: -95dbm, Coverage: 1200m. Path loss: Lp = L0 + 10 log10d ; L0: 40.04dB as long as 802.11b.
This Particular University is Related to this Particular Journal
Assumptions (What contd.) Data & Control traffic: Generation: Throughout the simulation with an inter-arrival time of 0.05sec. Min Outcome :256 bytes & Max. Outcome: 2000bytes. RTS threshold : 512 Bytes. Simulation time: 20 minutes. Typical node settings Case 1 Network Nodes become hidden.
Case 1: Assumptions Configuration: Adhoc, Star Topology. Number of periphery nodes: 16. Destination as long as every periphery node: Center node. Configuration Hidden node creation (HOW )
Scenarios (How ) Observations:Traffic Sent(bits/sec) Throughput(bits/sec) Basic RTS/CTS
Retransmission Attempts(packets) MAC delay (sec) Data Dropped(bits/sec)
Control traffic Sent by Central Node (bits/sec) Throughput Vs. No. of hidden nodes Case 1: Conclusions (So What ) Robustness of RTS/CTS access mechanism. Weakness of basic access mechanism. Overhead of RTS/CTS frames degrades the per as long as mance.
Case 2 Introduction of hidden nodes. Assumptions Existing WLAN: Basic Service Set. Star topology: periphery nodes 16. R in addition to om destinations as long as Center node. Periphery nodes do not transmit. Assumptions (contd.) Data & Control traffic: Generation: Uni as long as m distribution: Min Outcome :256 bytes & Max. Outcome: 2000bytes. RTS threshold : 512 Bytes. Simulation time: 20 minutes.
Scenario 2 Scenario 3 & 4 Scenario 5
Configuration Hidden node Configuration Graphs Throughput: Basic Mechanism:
Graphs Throughput: RTS/CTS Mechanism: Retransmission Attempts (packets) End to End Delay (sec)
References (contd.) Evaluation Analysis of the Per as long as mance of IEEE 802.11b in addition to IEEE 802.11g St in addition to ards; Athanasopoulos, A.; Topalis, E.; Antonopoulos, C.; Koubias, S.;23-29 April 2006. Wireless In as long as mation networks; Kaveh Pahlavan, Allen h. Levesque; Wiley publication; second edition. IEEE Std 802.11, 1999 edition. OPNET Modeler v 12.0 model documentation.
Waters, Lee Ann Music Director/Afternoon On-Air Personality
Waters, Lee Ann is from United States and they belong to WZEW-FM and they are from Mobile, United States got related to this Particular Journal. and Waters, Lee Ann deal with the subjects like Music; Music Programming; Rock and Alternative Music
Journal Ratings by University of Wales
This Particular Journal got reviewed and rated by University of Wales and short form of this particular Institution is GB and gave this Journal an Excellent Rating.