Journal of Applied Science and Engineering

Published by Tamkang University Press

1.30

Impact Factor

2.10

CiteScore

Fun Ye1 , Shiann-Tsong Sheu This email address is being protected from spambots. You need JavaScript enabled to view it.1 , Tobias Chen1 and Jenhui Chen2

1Department of Electrical Engineering Tamkang University Tamsui,Taiwan 251, R.O.C.
2Department of Computer Science and Information Engineering Tamkang University Tamsui, Taiwan 251, R.O.C.


 

Received: October 1, 2002
Accepted: December 30, 2002
Publication Date: March 1, 2003

Download Citation: ||https://doi.org/10.6180/jase.2003.6.1.08  


ABSTRACT


Wireless technologies and applications received great attention in recent years. The medium access control (MAC) protocol is the main element that determines the efficiency in sharing the limited communication bandwidth of the wireless channel in wireless local area networks (WLANs). The request-to-send/clear-to-send (RTS/CTS) mechanism is an optional handshaking procedure used by the IEEE 802.11 wireless network to reduce the possibility of collision. The RTS_Threshold (RT) value which determines when the RTS/CTS handshaking mechanism should be used is an important parameter to investigate; since different RT values will produce different performance characteristics in data transmission. This paper presents an evaluation of the influence of the RT parameter on the IEEE 802.11 wireless network, and gives a guideline to dynamically adjust the RT value. Simulation results of this paper show that, in order to achieve the best performance, the RT should be dynamically adjusted according to the environment. However, we suggest to have the RTS/CTS always activated (RT = 0), saving complex work designing and implementing a dynamic RT mechanism, to obtain a near best performance.


Keywords: Ad Hoc, IEEE 802.11, MAC, RTS/CTS, Wireless


REFERENCES


  1. [1] IEEE 802.11 Working Group, “Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications,” ANSI/IEEE Std. 802.11 (1999).
  2. [2] Crow, B. P., Widjaja, I., Kim, L. G. and Sakai, P. T., “IEEE 802.11 Wireless Local Area Networks,” IEEE Commun. Mag., Vol. 35 (1997).
  3. [3] Tobagi, F. A. and Kleinrock, L., “Packet Switching in Radio Channels: Part II-The Hidden Terminal Problem in Carrier Sense Multiple-Access and the Busy-Tone Solution,” IEEE Trans. Commun., Vol. COM-23, pp. 1417-1433 (1975).
  4. [4] Chhaya, H. S. and Gupta, S., “Performance Modeling of Asynchronous Data Transfer Methods in the IEEE 802.11 MAC Protocol,” ACM/Baltzer Wireless Networks, Vol. 3, pp. 217-234 (1997).
  5. [5] Kurose, J. F., Schwartz, M. and Yemini, Y. “Multiple-Access Protocols and TimeConstrained Communication,” ACM Computing Surveys, Vol. 16, pp. 43-70 (1984).
  6. [6] Cali, F., Conti, M. and Gregori, E., “Dynamic Tuning of the IEEE 802.11 Protocol to Achieve a Theoretical Throughput Limit,” IEEE/ACM Trans. Networking, Vol. 8, pp. 785-799 (2000).
  7. [7] Bianchi, G., “Performance Analysis of the IEEE 802.11 Distributed Coordination Function,” IEEE J. Select. Areas Commun., Vol. 18 (2000).