跳到主要內容

臺灣博碩士論文加值系統

(44.200.122.214) 您好!臺灣時間:2024/10/14 11:07
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:王信棋
研究生(外文):Hsin-Chi Wang
論文名稱:載波偵測範圍和訊框長度對802.11架構下的多點跳躍式網路之影響
論文名稱(外文):The Effect of Carrier Sense Range and Frame Size on IEEE 802.11 Based Multi-hop Networks
指導教授:侯廷昭
指導教授(外文):Ting-Chao Hou
學位類別:碩士
校院名稱:國立中正大學
系所名稱:電機工程研究所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2002
畢業學年度:90
語文別:英文
論文頁數:69
中文關鍵詞:多點跳躍式網路隱藏點曝露點載波偵測範圍訊框資料長度媒介存取控制分散式協調功能
外文關鍵詞:Multi-hop Networkshidden nodeexposed nodeCarrier Sense RangeFrame SizeIEEE 802.11DCF
相關次數:
  • 被引用被引用:0
  • 點閱點閱:190
  • 評分評分:
  • 下載下載:12
  • 收藏至我的研究室書目清單書目收藏:2
由於無線通訊提供使用上的彈性和便利性,近年無線通訊儼然形成一股潮流。過去這幾年許多研究特別針對一種不需固有的基礎架構的多點跳躍式網路感到興趣。這種各行動點之間就能夠互相通訊的網路,可以和現有的蜂巢式細胞行動通訊系統搭配,延伸通訊的涵蓋範圍。
衰減和干擾是無線環境既有的問題,除此之外,隱藏點 (hidden node) 問題是在無線多點跳躍式網路所發生的特有干擾現象。IEEE 802.11是無線區域網路的標準,它定義了分散式協調功能 (DCF) 的機制, 可以應用在多點跳躍式網路上。本篇論文主要分析IEEE 802.11 DCF 用在媒介存取控制 (MAC) 機制上的效能分析。我們以不同的載波偵測範圍和不同的訊框資料長度來討論在無線多點跳躍式網路的隱藏點和曝露點 (exposed node) 的問題。

In recent years there has been an increasing trend toward wireless communications. Wireless communication networks are gaining special interest as they provide flexibility and convenience. Much research has focused on one kind of multi-hop ad hoc wireless networks where there is no stationary infrastructure, such as a base station, and nodes communicate with each other through other mobile nodes. It may work together with the existing mobile cellular system to extend the communication coverage.
In a wireless environment, there are the inherent fading and
interference problems. The hidden node problem is a unique
interference phenomenon in wireless multi-hop networks. IEEE
802.11 is a wireless LAN standard which defines a DCF mechanism
that may be used in a multi-hop networks. This thesis work
analyzes the throughput of a wireless multi-hop network when the
IEEE 802.11 DCF mechanism is used as the MAC access scheme. We
discuss the hidden node problem and the exposed node problem when different carrier sense ranges and packet sizes are adopted in a multi-hop WLAN.

Table of Contents iv
List of Tables vi
List of Figures vii
Abstract x
1 Introduction 1
2 IEEE 802.11 DCF 6
2.1 CarrierSenseMechanism.........................6
2.1.1 PhysicalCarrierSense ......................7
2.1.2 VirtualCarrierSense.......................7
2.2 RandomBacko Time ..........................9
2.3 DCF Access Procedure ..........................11
3 Mathematical Analysis 13
3.1 OverviewoftheSingle-hopAnalysis...................13
3.1.1 Packet Transmission Probability .................13
3.1.2 Throughput Analysis .......................16
3.2 MultihopNetworkAnalysis .......................17
3.3 Calculation of Equilibrium τ .......................21
3.4 TheAnalyticalResult ..........................21
4 Simulation study 24
4.1 NS-2Introduction.............................24
4.2 SimulationModel.............................26
4.3 TheSimulationResult ..........................27
5 Multihop Topology in One Dimension 32
5.1 Three Baseline Connection Patterns with Four Nodes .........32
5.2 Three Transmission Pairs in One-Dimensional Topology ........47
6 Conclusions 55
Bibliography 57

[1 ]J.Broch,D.A.Maltz,D.B.Johnson,Y-C.Hu,J.Jetcheva,”A Performance
Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols ”Proc.
IEEE/ACM MOBICOM ’98,Oct.1998,pp.85-97.
[2 ]C.E.Perkins,Ad Hoc Networking .Addison-Wesley,NJ,2001.
[3 ]J.P.Macker and M.S.Corson,”Mobile Ad Hoc Networking and the IETF,”
ACM Mobile Comp.and Commun.Rev.vol.2,no.1,Jan.1998.
[4 ]M.Natkaniec and A.R.Pach,”An Analysis of the Backo Mechanism used in
IEEE 802.11 Networks,”5th IEEE Symposium on Computers and comm.,2000
Proceedings ISCC 2000.
[5 ]Z.Hadzi-Velkov and L.Gavrilovska,”Performance of the IEEE 802.11 Wireless
LANs under In uence of Hidden Terminals and Pareto Distributed Packet Traf-
c,”IEEE International Conference on Personal Wireless Communication,1999
pp.221 -225.
[6 ]A.Kamerman and G.Aben,”Net Throughput with IEEE 802.11 Wireless
LANs,”Wireless Communications and Networking Conference,vol.2,pp.747-
752,2000.
[7 ]H.S.Chhaya and S.Gupta,”Performance of Asynchronous Data Transfer Meth-
ods of IEEE 802.11 MAC Protocol,”IEEE Personal Commun.,Oct.1996.
[8 ]J.Weinmiller,H.Woesner,A.Wolisz,”Analyzing and Improving the IEEE
802.11-MAC Protocol for wireless LANs,”Proceeding of MASCOT ’96.
[9 ]B.Bensaou and Y.Wang,”Fair Medium Access in 802.11 based Wireless Ad-Hoc
Networks,”Mobile and Ad Hoc Networking and Computing 2000.
[10 ]F.Cali,M.Conti,E.Gregori,”IEEE 802.11 Protocol:Design and Performance
Evaluation pf an Adaptive Backo Mechanism,”IEEE J.Select.Areas Commun.
,vol.18,No.9,Sep.2000.
[11 ]F.Cali,M.Conti,E.Gregori,”Dynamic Tuning of the IEEE 802.11 Protocol
to Achieve a Theoretical Throughput Limit,”IEEE/ACM trans.on networking,
vol.8,No.6,Dec.2000.
[12 ]G.Bianchi,L.Fratta,M.Oliveri,”Performance Evaluation and Enchancement
of the CSMA/CA MAC Protocol for 802.11 Wireless LANs,”Seventh IEEE In-
ternational Symposium on Personal,Indoor and Mobile Radio Communications,
PIMRC ’96.,,Vol.2 ,1996,pp.392 -396.
[13 ]W.Zahedi and K.Pahlavan,”Natural Hidden Terminal and the Performance of
the Wireless LANs,”Universal Personal Communications Record,vol.2,pp.929-
933,1997.
[14 ]C.H.Foh and M.Zukerman,”Performance Evaluation of IEEE 802.11,”Pro-
ceedings IEEE Vehicular Technology Conference,Vol.2,2001,pp.841 -845.
[15 ]G.Bianchi,”Performance Analysis of the IEEE 802.11 Distributed Coordination
Function,”IEEE Journal on Selected Areas Communications,Vol.18,No.3,
March 2000.
[16 ]IEEE Std.802.11,”Wireless LAN Media Access Control (MAC)and Physical
Layer (PHY)Speci cations,”1999.
[17 ]S.Xu and T.Saadawi,”Does the IEEE 802.11 MAC Protocol Work Well in
Multihop Wireless Ad Hoc Networks?”IEEE Communications Magazine,June
2001.
[18 ]A.S.Tanenbaum,Computer Networks 3rd edition .Prentice-Hall,NJ,1996.
[19 ]Network Simulator version 2 available from http://www.isi.edu/nsnam/.
[20 ]K.Fall and K.Varadhan,editors.Ns note and documentation.The VINT
Project,UC Berkeley,LBL,USC/ISI,and Xerox PARC,Nov.1997.Available
from http://www-mash.cs.berkeley.edu/ns/.
[21 ]J.Broch,D.A.Maltz,D.B.Johnson,Y-C.Hu,J.Jetcheva,”A Performance
Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols,”Proc.
IEEE/ACM MOBICOM ’98,Oct.1998,pp.85-97.
[22 ]T.S .Rappaport,Wireless Communication:Principles and Practice .Prentice
Hall,New Jersey,1996.
[23 ]B.Tuch,”Development of WaveLAN,an ISM band wireless LAN,”AT&T Tech-
nical Journal,72(4):27-33,July/August 1993.
[24 ]D.A.Maltz,J.Broch,J.Jetcheva,D.B.Johnson,”The e ect of on-demand
behavior in routing protocols for multihop wireless ad hoc networks,”Selected
area in communications,IEEE Journal on,vol.17,issue 8,Aug.1999,pp.1439-
1453.
[25 ]J.Li,C.Blake,D.S.J.De Couto,H.I.Lee,R.Morris,”Capacity of Ad Hoc
Wireless Networks,”7th ACM International Conference on Mobile Computing
and Networking,Rome,Italy,July 2001.
[26 ]S.Xu and T.Saadawi,”Revealing TCP Incompatibility Problem in 802.11-based
Wireless Multihop-Hop Networks,”IEEE GLOBECOM,pp.2847-2851,vol.5,
2001.

QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top