2015
DOI: 10.1007/s11276-015-1038-5
|View full text |Cite
|
Sign up to set email alerts
|

Throughput analysis of a CSMA based WLAN with successive interference cancellation under Rayleigh fading and shadowing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(4 citation statements)
references
References 23 publications
0
4
0
Order By: Relevance
“…In addition, Wang et al [13] used the signal transfer function to generate a probability distribution of the MAC access delay in IEEE 802.11b and used Markov chain to model the exponential process of backoff. Uddin et al [14] adopted the Rayleigh fading and shadowing propagation model to obtain explicit expression for the distribution, standardized deviation and mean of the MAC access delay. It is approved that a condensed powerlaw tail is included in the distribution when there is a limit of retransmission while a heavy-tailed delay distribution for unlimited retransmission is induced by the binary exponential backoff mechanism.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In addition, Wang et al [13] used the signal transfer function to generate a probability distribution of the MAC access delay in IEEE 802.11b and used Markov chain to model the exponential process of backoff. Uddin et al [14] adopted the Rayleigh fading and shadowing propagation model to obtain explicit expression for the distribution, standardized deviation and mean of the MAC access delay. It is approved that a condensed powerlaw tail is included in the distribution when there is a limit of retransmission while a heavy-tailed delay distribution for unlimited retransmission is induced by the binary exponential backoff mechanism.…”
Section: Related Workmentioning
confidence: 99%
“…TR (z) = z T tr (14) Let H i (z) be the average time's PGF that the backoff counter reduces by one of ACi. It will be blocked for the T tr + AIFS[i] period when another transmission can be identified.…”
Section: Mac Access Delay Analysismentioning
confidence: 99%
“…We notice that the average throughput of the network declines with the increase in distance and decrease in transmission power (Pt), as exhibited in Figure 3(a). This is understandable according to the path-loss model where the path loss increases with distance and the effect of the log-normal shadowing involves a fluctuation of the time of the received power, which can further degrade the performance of the communication [44,45]. Due to this fluctuation, the received power may go below the Receiver Sensitivity (Rs) (-95 dBm), thus the CU considers the received signal as noise that leads to a lower throughput.…”
Section: Link Analysis Between the End-device And The Central Entitymentioning
confidence: 99%
“…In [23], a k-SIC MAC protocol is proposed which the devices are divided into 2k groups using different carrier sensing thresholds for scheduling up to k devices simultaneously. In [24], an analytical model is developed to compute the average throughput of a device in a WLAN with the SIC technique in presence of pathloss, Rayleigh fading and log-normal shadowing. In [25], the authors propose a SIC-aware CSMA MAC protocol for uplink access which the AP waits to receive requests from a certain number of devices and then selects the highest number of potential devices for uplink data transmission.…”
Section: Introductionmentioning
confidence: 99%