Back to Search
Start Over
Efficiency of Restricted Access Window Scheme of IEEE 802.11ah Under Non-Ideal Channel Condition
Efficiency of Restricted Access Window Scheme of IEEE 802.11ah Under Non-Ideal Channel Condition
- Source :
- iThings/GreenCom/CPSCom/SmartData
- Publication Year :
- 2018
- Publisher :
- IEEE, 2018.
-
Abstract
- IEEE 802.11ah protocol aims at providing network connectivity to a large number of end points while maintaining a satisfactory network performance. The RAW scheme of MAC access technique enables STAs to contend in different RAW slots and thereby reducing the chance of collision. In this paper we evaluate the performance metrics of the RAW scheme and observe that RAW scheme may be suitable for very small traffic condition. At higher traffic load, some of the nodes need to wait longer to transmit packets and network becomes unstable very quickly as the traffic for each node is increased beyond two packets per second in our test condition. The highest normalized network throughput achieved in this network is around 40%. Some important performance metrics like idle probability, backoff time and transmission probability are evaluated and studied in detail in this paper.
- Subjects :
- business.industry
Computer science
Network packet
Node (networking)
ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS
05 social sciences
050801 communication & media studies
020206 networking & telecommunications
02 engineering and technology
0508 media and communications
Transmission (telecommunications)
Telecommunications link
0202 electrical engineering, electronic engineering, information engineering
Bandwidth (computing)
Network performance
business
Communication channel
Computer network
IEEE 802.11ah
Subjects
Details
- Database :
- OpenAIRE
- Journal :
- 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)
- Accession number :
- edsair.doi...........18e19e64604317080364c5f02134af07
- Full Text :
- https://doi.org/10.1109/cybermatics_2018.2018.00071