Verification of Common 802.11 MAC Model Assumptions

نویسندگان

  • David Malone
  • Ian Dangerfield
  • Douglas J. Leith
چکیده

There has been considerable success in analytic modeling of the 802.11 MAC layer. These models are based on a number of fundamental assumptions. In this paper we attempt to verify these assumptions by taking careful measurements using an 802.11e testbed with commodity hardware. We show that the assumptions do not always hold but our measurements offer insight as to why the models may still produce good predictions. To our knowledge, this is the first in-detail attempt to compare 802.11 models and their assumptions with experimental measurements from an 802.11 testbed. The measurements collect also allow us to test if the basic MAC operation adhere to the 802.11 standards.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Improved Probabilistic Models for 802.11 Protocol Verification

The IEEE 802.11 protocol is a popular standard for wireless local area networks. Its medium access control layer (MAC) is a carrier sense multiple access with collision avoidance (CSMA/CA) design and includes an exponential backoff mechanism that makes it a possible target for probabilistic model checking. In this work, we identify ways to increase the scope of application of probabilistic mode...

متن کامل

Scalable Probabilistic Models for 802.11 Protocol Verification

The IEEE 802.11 protocol is a popular standard for wireless local area networks. Its medium access control layer (MAC) is a carrier sense multiple access with collision avoidance (CSMA/CA) design and includes an exponential backoff mechanism that makes it a possible target for probabilistic model checking. In this work, we identify ways to increase the scope of application of probabilistic mode...

متن کامل

Wireless Network Measurement: VoIP and 802.11e

802.11 wireless networks are a convenient way to provide ‘last-hop’ network connections in many environments. However the distributed nature of their operation poses problems in providing quality of service guarantees, which are vital for providing interactive services such as Voice over IP. In this thesis we will review the operation of 802.11 and it’s extended MAC layer, 802.11e. We will then...

متن کامل

SRN Model for IEEE 802.11 DCF MAC Protocol in Multi-hop Ad Hoc Networks with Hidden Nodes

Since its development for WLAN, IEEE 802.11 standard has been widely used for various wireless networks due to the low cost and effectiveness in reducing collisions with simple and decentralized mechanisms. In this paper we present a novel analytical SRN model for performance evaluation of IEEE 802.11 DC F MAC protocol in multi-hop ad hoc networks in the presence of hidden nodes, taking into ac...

متن کامل

A Media Access Control Protocol for Wireless Ad Hoc Networks with Misbehaviour Avoidance

The most common wireless Medium Access Control (MAC) protocol is IEEE 802.11. Currently IEEE 802.11 standard protocol is not resilient for many identified MAC layer attacks, because the protocol is designed without intention for providing security and with the assumption that all the nodes in the wireless network adhere to the protocol. However, nodes may purposefully show misbehaviours at the ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007