Analytical analysis of applying packet fragmentation mechanismon IEEE 802.11b DCF network in non ideal channel with infiniteload conditions
Mohand Yazid • Louiza Bouallouche-Medjkoune •
Djamil Aıssani • Lilia Ziane-Khodja
� Springer Science+Business Media New York 2013
Abstract The analytical modeling and performance
analysis of the 802.11 network in all its various extensions
(802.11b, 802.11a, 802.11g, 802.11e, 802.11n, etc.) have
already been widely explored over the past years. How-
ever, the packet fragmentation mechanism (PFM), which is
proposed by the IEEE work group to reduce the impact of
bit error rate (BER) on the packet error rate (PER), has not
been considered in the analytical models proposed in the
literature. Yet, the PFM constitutes a key parameter to
achieve the best performances of 802.11 networks. In this
paper, we extend the Bianchi’s Markov chain model with
the PFM and the PER. Then, we analyze the performance
improvement level achieved with the PFM in an IEEE
802.11 network under the impact of BER and packet
length. The proposed analysis has been applied on the basic
access method of 802.11b network in saturated traffic
conditions. So, we have analyzed the throughput and the
mean response time of the 802.11 network. The obtained
theoretical results are validated by simulation.
Keywords Packet fragmentation mechanism (PFM) �Packet error rate (PER) � IEEE 802.11 networks �Analytical analysis � Simulation and validation
1 Introduction
The IEEE 802.11 is an international standard (ISO/IEC
8802-11) for wireless local area networks (WLANs). It was
released in 1999 [1], then reissued in 2007 [2] grouping
some amendments. The IEEE 802.11 standard includes
detailed specifications for both medium access control
(MAC) and physical (PHY) layers. In the MAC layer, the
standard defines the distributed coordination function
(DCF) and the optional point coordination function (PCF).
DCF is an asynchronous data transmission function, it is
available in ad hoc or infrastructure networks. PCF is used
for real time services, it is only available in infrastructure
networks. The DCF is based on the carrier sense multiple
access with collision avoidance (CSMA/CA). The
retransmission of collided packets, is managed according to
the binary exponential backoff (BEB) rules. DCF describes
two methods for packet transmission. The main method
used in DCF, is called basic access method. The optional
method is called request to send/clear to send (RTS/CTS).
A comprehensive description of DCF function can be
found in [2].
The practical performance of the IEEE 802.11 network
depends on the availability of transmission opportunities at
the underlying 802.11 card. In all cases, when transmission
opportunities are lost, 802.11 stations will be affected by
throughput drops, higher delay and unfairness. The Loss of
transmission opportunities arises from the combined MAC
and PHY environment at both sender and receiver on each
802.11 link [3]. The transmission failures in an IEEE
802.11 network occur mainly because of collisions or noise
errors [4]. Thereby, the transmission of a given data packet
can fail due to collision with the other transmission(s).
Otherwise, transmission attempt can also fail without col-
lision, since the wireless channel itself is error-prone due
to path loss, multi-path fading, interferences, etc. Detail
arguing of noise errors sources can be found in [5]. To
reduce the influence of noise errors on the transmitted data
packets, the IEEE work group have proposed the packet
M. Yazid (&) � L. Bouallouche-Medjkoune � D. Aıssani �L. Ziane-Khodja
LAMOS, Laboratory of Modeling and Optimization of Systems,
University of Bejaia, 06000 Bejaıa, Algeria
e-mail: [email protected]
123
Wireless Netw
DOI 10.1007/s11276-013-0653-2
fragmentation mechanism. This mechanism consists on
subdividing the data packets, which are larger than a
fragmentation threshold, into fragments. Thus, the data
packets are transmitted as a continuous chain of data
frames, which contains sequential fragments [2].
The wide popularity of the IEEE 802.11 standard has
encouraged many researchers to analytically model its
access mechanisms (see [6–18]). Modeling the IEEE
802.11 access mechanisms allows networks designers: to
identify appropriate values for the various parameters that
can achieve the best performance, to decide appropriate
network size according to the expected traffic and required
performance, or to prove the efficiency of mechanisms
which are designed to improve the 802.11 network per-
formances. The special issue on Recent Advances in IEEE
802.11 WLANs: Protocols, Solutions and Future Direc-
tions, presented by Chatzimisios et al. and published in
2009 [19], gives a collection of selected papers that rep-
resents advances towards the performance evaluation and
enhancement of IEEE 802.11 WLANs. In this paper, we
focus on the performance improvement level achieved in
an IEEE 802.11b DCF network by applying the packet
fragmentation mechanism under non ideal channel and
infinite load conditions. So, we introduce the packet frag-
mentation mechanism and the packet error rate in the
Bianchi’s Markov chain model [6], and we develop
mathematical models to compute the overall throughput
and the mean response time of the 802.11b version of the
IEEE 802.11 standard. These mathematical models can
also be generalized for the other versions of the IEEE
802.11 protocol such as IEEE 802.11e [20].
The remainder of this paper is organized as follows: an
overview of the packet fragmentation mechanism is pre-
sented in Sect. 2. Section 3 gives a review of previous
studies and underlines the motivation of applying the PFM
in an IEEE 802.11 network. The extension of Bianchi’s
model with the PFM and the PER is described in Sect. 4. In
Sect. 5, we analyze the performance improvement level
achieved in the 802.11b network by applying the PFM. The
accuracy of the proposed analytical model is validated in
Sect. 6. Section 7 concludes the paper.
2 Packet fragmentation mechanism overview
The process of data packet partitioning into smaller MAC
level frames, fragments, is called the packet fragmentation
mechanism. This mechanism creates fragments smaller
than the original data packet length, in order to increase the
reliability of data packet transmission. So, the PFM
increases the probability of successful transmission of a
data packet in cases where channel characteristics limit the
reliable reception for longer frames.
2.1 Packet fragmentation process
A data packet shall be fragmented if its length exceeds a
fragmentation threshold. Therefore, when a data packet is
received from the logical link control (LLC) sublayer that
would result in a length greater than a fragmentation
threshold, before the MAC header and frame check sequence
(FCS) are added, the data packet shall be fragmented. So, the
data packet is divided into smaller data fragments, each of
them is a frame no larger than a fragmentation threshold. An
illustration of the packet fragmentation mechanism is shown
in Fig. 1. The fragments resulting from the fragmentation of
a data packet, are sent as independent transmissions.
Therefore, each data fragment is separately acknowledged.
Thereby, the PFM permits transmission retries to occur per
fragment, rather than per packet. Moreover, the data frag-
ments of a single data packet are sent as a burst, using a single
invocation of the DCF medium access procedure.
2.2 Multiple data fragments transmission
The shortest interframe space (SIFS) is used to provide an
efficient data packet delivery mechanism. Once the source
station has won the access to the wireless channel, it shall
continue to send its data fragments until either all the data
fragments of a single data packet are sent, or an
ACKnowledgment (ACK) is not received for at least one
data fragment. So, when the source station transmits a data
fragment, it immediately monitors the wireless channel for
an ACK. The destination station receiving a valid data
fragment, sends an ACK in order to notify the correct
reception of the data fragment. Then, the SIFS period
following the reception of the ACK, attributes to the source
station the priority to continue (if necessary) with another
fragment (see Fig. 2). Otherwise, If the source station does
not receive an ACK for the transmitted data fragment, it
means that the data fragment transmission is failed. Con-
sequently, the source station shall attempt to retransmit the
failed data fragment after performing the backoff proce-
dure and the contention process. The source station that
contends for the wireless channel to retransmit a data
packet, starts with the last data fragment that has not been
acknowledged.
Fig. 1 Packet fragmentation process
Wireless Netw
123
2.3 RTS/CTS utilization with the PFM
The following is a description of using the RTS/CTS col-
lision avoidance mechanism with the packet fragmentation
mechanism. The Duration/ID field contained in the RTS
and CTS frames, is used to set the network allocation
vector (NAV) of the other stations to the total period of the
Fragment0/ACK0 exchange sequence. Thus, the RTS/CTS
exchange sequence allows only to reserve the wireless
channel for the Fragment0/ACK0 exchange sequence.
Thereby, to avoid collisions on the next Fragment1/ACK1
exchange sequence, the total period of this exchange
sequence is indicated in the Fragment0 and ACK0 frames
(see Fig. 3). This shall continue until the last fragment,
which shall have its Duration/ID field set to 0. So, each
Fragment/ACK exchange sequence acts as a virtual RTS/
CTS exchange sequence. Thus, no further RTS/CTS frames
need to be generated after the RTS/CTS frames that began
the first Fragment/ACK exchange sequence.
3 Previous studies and motivations
The performance analysis of IEEE 802.11 networks has
been covered in several research works by either simula-
tion and experiment (see [21–34]) or by mathematical
modeling (see [35–45]).
In 2000, Bianchi [6] was the first author in the literature
who used a Markov chain model to analyze the DCF
operations, and who calculated the saturation throughput
of the IEEE 802.11 network. The saturation throughput is
the system throughput when each station always has a data
packet pending for transmission. Since the offered load is
maximized, it is clear that the saturation throughput is the
maximum throughput that can be achieved by the system.
However, Bianchi’s model exhibits several severe con-
straints. Firstly, the model does not follow correctly the
backoff rules as specified in the standard [2]. So, the
Bianchi’s model omits the fact that a station in a backoff
stage will not always decrease its backoff timer, and it
will not keep in the mth backoff stage until the data packet
is successfully transmitted. Secondly, the Bianchi’s model
does not derive other performance metrics, such as: the
average packet delay and the delay jitter. Yet, these per-
formance metrics are critical, in order to support real time
applications. Thirdly, the IEEE 802.11 DCF performance
under finite load conditions has not been covered. Since
saturation may be viewed as the limiting mode of opera-
tion when the arrival rates at all nodes tends to infinity,
the non-saturation mode may equivalently be considered
as the finite rate or finite load mode of operation. Finally,
the saturation throughput was evaluated under ideal
channel conditions. Since electromagnetic noise in large
cities is inevitable, the calculated throughput may be
Fig. 2 Transmission of
multiple data fragments using a
SIFS
Fig. 3 RTS/CTS utilization with a fragmented data packet
Wireless Netw
123
overestimated. To address this void in Bianchi’s analytical
model, considerable studies have been devoted in the
literature.
In 2002, Vishnevsky and Lyakhov [46] presented an
analytical method to estimate the saturation throughput of
the 802.11 network under the assumption of an ideal
channel. The proposed method generalizes the existing
802.11 analytical models and advances them to take the
seizing effect into account. The seizing effect means that,
the station which has just completed successfully its
transmission, will have a better chance to win once again
the wireless channel rather than the other stations in the
network.
In 2005, Lyakhov and Vishnevsky in [47] extended their
analytical model presented in [46], in order to estimate the
saturation throughput of the IEEE 802.11 network under
the presence of noise. In addition, the authors proposed and
studied a modification of the 802.11 MAC protocol. Thus,
the proposed protocol is able to recognize the reason of a
transmission failure (collision or noise). Consequently, the
contention window is not increased if a failure happens due
to noise. Pham [48] presented a Markov chain model to
provide a comprehensive analysis of the IEEE 802.11b
DCF network under finite load and packet loss due to
queue overflow. The performance metrics derived by the
author are: the overall throughput, the packet loss proba-
bility and the average packet delay. Ni et al. [49] investi-
gated the saturation throughput achieved at the MAC layer
in both congested and error-prone channel. The authors
showed that channel errors have a significant impact on the
system performance. Kim et al. [50] proposed a rate-
adaptive protocol with dynamic fragmentation to enhance
the system throughput. The authors proposed to use mul-
tiple fragmentation thresholds for different data rates rather
than one fragmentation threshold like in the IEEE 802.11
standard.
In 2006, Li et al. [51] presented a theoretical model to
evaluate the saturation throughput for the Block Trans-
mission and Acknowledgment (BTA) scheme under error
channel conditions in the ad hoc mode. The authors showed
some advantages of BTA over the legacy MAC, and ana-
lyzed how to select a proper number of frames for each
transmission block. Smadi and Szabados [52] developed a
service that allows the current IEEE 802.11b MAC proto-
col to perform dynamic packet sizing and forward error
correction. The proposed service is designed to allow the
deployment of the IEEE 802.11b protocol in industrial
environments characterized by high BER and fast time
variation. Hneiti and Ajlouni [53] analyzed and evaluated
several methods to improve the throughput performance of
WLANs. Through simulation the authors demonstrated that
WLAN performance can be improved by tuning parame-
ters, such as: slot time, short inter-frame spacing, minimum
contention window, fragmentation threshold and RTS
threshold.
In 2007, Chang et al. [54] proposed an algorithm to
enhance system goodput through the dynamic optimal
fragmentation. Using an adaptive SNR estimator, the sen-
der estimates the SNR of the receiver, and chooses a
fragmentation threshold to shape arbitrary sized packets
into optimal length packets.
In 2008, Szczypiorski and Lubacz [55] proposed a
Markov chain model of the IEEE 802.11g (ERP-OFDM)
network, taking into account the effect of backoff timer
freezing, the limitation of the number of retransmissions,
maximum size of the contention window and the impact of
transmission errors. The authors showed that the saturation
throughput depends on the PER, which is a function of
BER and packet length. Bae et al. [56] estimated the
characteristics of the IEEE 802.11 DCF network in non-
saturation mode. The authors took into account two fea-
tures inherent to the non-saturated 802.11 DCF: (1) the
probability of asynchronous transmission performed with-
out preceding backoff for the first packet arriving at the idle
station, and (2) so-called post backoff, meaning that a
station must perform a backoff once after any of its
transmissions even if its queue becomes empty. Li et al.
[57] proposed an analytical model to analyze the channel
access delay and delay jitter of the IEEE 802.11 DCF in
saturation traffic conditions for both basic access and RTS/
CTS-based scheme. Using the proposed analytical model,
the authors studied the impact of initial contention window,
maximal backoff stage and packet size on channel access
delay and delay jitter of the 802.11 DCF. Lin-Fang et al.
[58] analyzed the average packet delay of the IEEE 802.11
DCF network under finite load conditions. Therefore, the
authors had employed a Markov chain model to derive the
channel access delay, and they had used an M/G/1 queue to
derive the queueing delay. Zheng and Nelson [59] studied
the cross-layer (between MAC and PHY) design problem
for IEEE 802.11 wireless networks. The authors focused on
the design of the optimal length of frame body for the real
wireless channel conditions. Bykowski et al. [60] investi-
gated the influence of fragmentation on the throughput
performance of 802.11b networks. The authors demon-
strated that combining fragmentation threshold tuning with
line-rate selection, allows to achieve high performance
level.
In 2009, Peng et al. [61] proposed a three dimensional
Markov model to estimate the saturation throughput of
RTS/CTS scheme in a noisy channel. The proposed model
takes into account the effect of BER on all frames, station
short and long retry limits. The authors evaluated the
influence of different bit error rates and different packet
lengths on saturation throughput. The presented study
shows that the channel bit error affects the system
Wireless Netw
123
throughput significatively and an optimal frame size exists,
it can maximize the system saturation throughput. Raptis
et al. [62] introduced a comprehensive packet delay ana-
lysis for wireless networks based IEEE 802.11 DCF. The
authors developed mathematical models that calculate a set
of packet delay metrics, namely the average packet delay
for successfully transmitted packets, the average packet
delay of successfully transmitted packets experiencing a
specific number of collisions, the average packet drop time,
the delay jitter and the delay distribution. Li et al. [63]
proposed a novel scheme called aggregation with fragment
Retransmission (AFR) that exhibits the required properties
to achieve high efficiency at the MAC layer of the IEEE
802.11 standard. The authors also developed an analytical
model to evaluate the throughput and delay performance of
AFR over noisy channels, and compared AFR with similar
schemes in the literature.
In 2010, Senthikumar and Krishnan [64] proposed and
analyzed a modified backoff (MB) mechanism to decrease
the channel idle time in the IEEE 802.11 DCF under a
noisy channel. The authors proposed a notion that instead
of doubling the contention window in case of erroneous
packet retransmission, the backoff counter selects a counter
value from the same contention window. Otherwise, if a
collision occurs, the contention window is doubled to
reduce the collision in the network. In [65], Senthikumar
and Krishnan proposed and validated, by mathematical
modeling, a collision aware rate adaptation (CARA)
algorithm in the IEEE 802.11 DCF network. The proposed
CARA algorithm is able to differentiate collisions from
channel errors at the sender side without any feedback from
the receiver station, by using adaptive request-to-send
(RTS) or clear-to-send (CTS) exchange and clear channel
assessment (CCA).
In 2011, Bayraktaroglu et al. [40] studied the perfor-
mance of the IEEE 802.11 MAC protocol under a range of
jammers that covers both channel-oblivious and channel-
aware jamming. The authors considered two channel-
oblivious jammers: a periodic jammer that jams determin-
istically at a specified rate, and a memoryless jammer whose
interfering signals arrive according to a Poisson process.
Prakash and Thangaradj [66] presented an analytical model
for performance evaluation of the IEEE 802.11 DCF taking
into account packet retry limits and transmission errors
under non-saturated traffic conditions. The authors devel-
oped an expression for the non-saturation throughput as a
function of the number of stations, packet size and also
calculated SNR values using slow Rayleigh fading channel.
Kumar and Krishnan [67] presented a performance study of
the DCF of 802.11 networks considering erroneous channel
and capture effects under non-saturated traffic conditions
employing a basic access method. The authors used a mul-
tidimensional Markov chain model to characterize the
behavior of DCF and derived a generalized expression for
the station’s transmission probability.
In 2012, Keene and Carruthers [42] examined an algo-
rithm to estimate the location of packet collision in the
presence of bandlimited multipath channel. Furthermore,
the authors proposed an improvement to the collision
localization algorithm to further enhance its performance,
to compensate for the increased impairments of the mul-
tipath channel. Senthikumar and Krishnan [68] provided an
extended model for analytical analysis of the IEEE 802.11
network under a noisy channel. So, a reservation stage is
introduced in the proposed Markov chain model to reduce
unnecessary retransmissions in case of transmission failure
caused by channel error.
Through the studies presented previously, we note that
many researchers have been interested to analyze and
enhance the performance of IEEE 802.11 networks in non
ideal channel conditions. However, performance modeling
and analysis of applying packet fragmentation mechanism
on IEEE 802.11 MAC protocol under an error-prone
channel were still missing in the available literature. Yet,
the PFM is considered as the only existing solution, pro-
posed by the IEEE 802.11 work group, to reduce the
impact of bit error rate and packet length on the packet
error rate by splitting the data packet into smaller data
fragments (see the IEEE 802.11 standard [2]). The impact
of packet fragmentation mechanism on the packet error rate
is illustrated in Figs. 4 and 5. These figures show com-
parisons of PER variations between the cases of non-
fragmented and fragmented data packets according to bit
error rate values (see Fig. 4) and data packet lengths (see
Fig. 5), the PER expression is given by the Eq. (1). We
note on Fig. 4 that, for a specific length of data packet
(12,000 bits, for example), more the BER value is high,
more the PER value becomes important, because the PER
is in linear relationship with BER. We also note that,
applying packet fragmentation mechanism allows to reduce
significatively the impact of BER on the PER. Figure 5
Fig. 4 PER versus BER
Wireless Netw
123
shows that, for a specific value of BER (10-4, for exam-
ple), more the data packet length is great, more the PER
value is highly increased, because the PER is in expo-
nential relationship with the data packet length. Figure 5
also shows that, the PFM maintains the PER at a constant
value whatever the data packet length.
PER ¼ 1� ð1� BERÞP: ð1Þ
It is true that, the Figs. 4 and 5 are trivial, and the
conclusions done on these figures can be easily deduced.
But, the main goal of drawing these figures is to give an
idea on the behavior of the packet fragmentation mecha-
nism in non ideal channel conditions, and to show how it
reduces the influence of BER and packet length on the
PER. In other words, we have demonstrated the useful and
the efficiency of using the packet fragmentation mecha-
nism, in order to reduce the amount of data lost due to
noise errors. Theoretically, the PFM provides a better
chance to a data packet to be transmitted successfully.
Consequently, the PFM plays a central role to increase the
overall throughput and to decrease the average packet
delay in an IEEE 802.11 network in all its various exten-
sions. So, a formal validation of packet fragmentation
mechanism is necessary to obtain exact quantitative results
about its performance improvement level achieved in an
IEEE 802.11 network under a noisy channel. The PFM can
be also combined with the recent proposed protocols and
algorithms which aim to improve the performance of IEEE
802.11 networks in an error-prone channel (see [11, 15, 34,
38, 39, 41]).
4 Analytical model of the 802.11 DCF with PFM
and PER
In this section, we describe our analytical model of the
IEEE 802.11 DCF with PFM and PER. Firstly, we extend
the Bianchi’s Markov chain model [6] with the PFM and
the PER, in order to estimate the probability that a station
transmits its packet in a given time slot. Secondly, we use
the Bianchi’s throughput analysis, to develop the saturation
throughput expression of the 802.11 network. Thirdly, we
model the 802.11 station as an M/G/1 queueing system
[69], to derive the mean response time of a data packet, by
applying the second formula of Pollaczek-Khinchin [70].
4.1 Assumptions, parameters and probabilities
of the 802.11 analytical model
The following is a list of assumptions of our analytical
model. The lists of parameters and probabilities are pro-
vided in Tables 1 and 2, respectively.
1. The channel is not ideal. Thereby, noise errors can
occur on the transmitted data packets, and cause losses
in the network.
2. All the data packets are of the same size. They are
divided into smaller data fragments, if their length is
greater than a fragmentation threshold.
3. We assume a fixed number of stations, each always
having a data packet available for transmission. In
other words, we operate in saturation conditions.
Fig. 5 PER versus packet length
Table 1 802.11 Analytical model parameters
Parameter Description
n Number of stations in the network
CW Contention window
m Maximum retry limit
m0 Minimum retry limit
i ith transmission attempt
w0 Minimum contention window
2m0w0 Maximum contention window
BOF Random backoff time chosen in CW
P Data packet length (header ? payload)
�P Data packet payload length
F Data fragment payload length
NF Number of data fragments in a data packet
MAC The length of MAC header
PHY The length of PHY header
T�P
RPacket transmission time with data rate R
TRF Fragment transmission time with data rate R
TMAC Time of MAC header transmission
TPHY Time of PHY header transmission
ACK Time of acknowledgment transmission
DIFS Time interval of DIFS
SIFS Time interval of SIFS
d Time of signal propagation
r An empty slot time
Wireless Netw
123
4. The collision probability of a data packet is constant
and is independent of retransmissions number.
4.2 Packet transmission probability
We study the behavior of a single station with a Markov chain
model, and we obtain the stationary probability s that the
station transmits a packet in a generic slot time. This proba-
bility will be used to determine the saturation throughput and
the mean response time of the 802.11 network.
Let b(t) be the stochastic process representing the
backoff time counter for a given station.
Let s(t) be the stochastic process representing the
backoff stage ð0; . . .;m0; . . .;mÞ of the station at the time t.
For a node in backoff stage i, the backoff window size
wi is:
wi ¼2iw0 i�m0;2m0w0 i 2 ½m0 þ 1;m�:
�ð2Þ
Once the key approximation in Bianchi’s analytical
model is assumed, which means that, at each transmission
attempt, and regardless of the number of retransmissions
suffered, each packet collides with constant and independent
probability Pc, it is possible to model the bi-dimensional
process {s(t), b(t)} with the discrete-time Markov chain
depicted in Fig. 6. Particularly, we find in this Markov chain
model the state (0, - 1), which represents the transmission
state of data fragments following the first data fragment
successfully transmitted. This state is necessary in order to
differentiate between the transmission of the first data
fragment, which can encounter a collision or undergo noise
errors, and the following data fragments, which can only
undergo noise errors.
In this Markov chain, the only non null one-step tran-
sition probabilities are:
Pfi;kji;kþ1g¼1; i2ð0;mÞ; k2ð0;wi�2Þ:Pf0;�1ji;0g¼ð1�PrÞð1�Pf Þ; i2ð0;mÞ:Pf0;�1j0;�1g¼ð1�PeÞð1�Pf Þ:Pfi;kji�1;0g¼ Pr
wi; i2ð1;mÞ; k2ð0;wi�1Þ:
Pf1;kj0;�1g¼ Pe
w1;k2ð0;w1�1Þ:
Pf0;kjm;0g¼ 1w0½Prþð1�PrÞPf �; k2ð0;w0�1Þ:
Pf0;kji;0g¼ ð1�PrÞPf
w0; i2ð0;m�1Þ; k2ð0;w0�1Þ:
Pf0;kj0;�1g¼ ð1�PeÞPf
w0; k2ð0;w0�1Þ:
8>>>>>>>>>>>><>>>>>>>>>>>>:
ð3Þ
Let pi;k¼ limt!1PfsðtÞ¼ i;bðtÞ¼ kg;i2ð0;mÞ;k2ð�1;
wi�1Þ be the stationary distribution of the chain. The
closed-form solution for this Markov chain is:
pi;k ¼wi � k
wi
� a � p0;�1 i ¼ 0; k 2 ð0;wi � 1ÞPi
r � b � p0;�1 i 2 ð1;mÞ; k 2 ð0;wi � 1Þ:
�
ð4Þ
where,
• a ¼ Pmr �Pe�ð1�Pf ÞþPf
ð1�Pf Þ:ð1�Pmþ1r Þ.
• b ¼PePr�ð1�Pf ÞþPf
ð1�Pf Þ�ð1�Pmþ1r Þ.
Thus, by the relation (4), all the values pi,k are expressed
as a function of the value p0,-1 and packet retransmission
probability Pr. p0,-1 is finally determined by imposing the
normalization condition, that can be simplified as follows:Fig. 6 Markov chain model of 802.11 DCF with PFM and PER
Table 2 802.11 Analytical model probabilities
Probability Definition
s Packet transmission probability
Pc Packet collision probability
Pe Packet error probability
Pr Packet retransmission probability
Pf Probability to reach the end of the data packet
transmission after having transmitted all its fragments
Wireless Netw
123
1¼Xm
i¼0
Xwi�1
k¼�1
pi;k
¼ p0;�1þXm
i¼0
pi;0 �Xwi�1
k¼0
wi� k
wi
¼ p0;�1 1þw0ð2PrÞm
0Peð1�Pf ÞþPrPf
� �ð1�Pm�m0
r Þ2ð1�Pf Þð1�Pmþ1
r Þð1�PrÞ
"
þ PrPeð1�Pf ÞþPf
2ð1�Pf Þð1�Pmþ1r Þþ
Peð1�Pf ÞþPrPf
� �ð1�Pm
r Þ2ð1�Pf Þð1�Pmþ1
r Þð1�PrÞ
þw0 Peð1�Pf ÞþPrPf
� �ð1�ð2PrÞm
0Þ
ð1�Pf Þð1�Pmþ1r Þð1� 2PrÞ
#:
ð5Þ
Hence, we have:
p0;�1 ¼2ð1� Pf Þð1� PrÞð1� 2PrÞð1� Pmþ1
r Þ� �ð1� PrÞð1� 2PrÞ � 2ð1� Pf Þð1� Pmþ1
r Þþ�
PrPeð1� Pf Þ þ Pf
�þ Peð1� Pf Þ þ PrPf
� ��
2w0ð1� PrÞ 1� ð2PrÞm0
� �þ ð1� 2PrÞ�
�w0ð2PrÞm
0ð1� Pm�m0
r Þ þ ð1� Pmr Þ
� ��
266664
377775
:
ð6Þ
We can now express the probability s that a station
transmits in a random chosen slot time. As any
transmission occurs when the backoff time counter is
equal to 0, regardless of the backoff stage, it is:
s ¼ p0;�1 þXm
i¼0
pi;0
¼ 1
1� Pf
þ Peð1� Pmþ1r Þ
1� Pr
� p0;�1:
ð7Þ
However, s depends on the following probabilities:
• Pc (packet collision probability); the probability that a
transmitted packet encounters a collision, is the prob-
ability that, in a time slot, at least one of the n - 1
remaining stations transmits:
Pc ¼ 1� ð1� sÞn�1: ð8Þ
• Pe (packet error probability); the probability that a
transmitted packet undergoes an error, depends on the
bit error rate (BER), and on the packet length:
Pe ¼ 1� ð1� BERÞP: ð9Þ
• Pr (packet retransmission probability); a packet is
retransmitted, if it encounters a collision, or it
undergoes an error. Therefore, Pr is equal to the sum
of Pc and Pe:
Pr ¼ Pc þ Pe;
¼ 1� ð1� sÞn�1 þ 1� ð1� BERÞP:ð10Þ
• Pf (probability to reach the end of data packet
transmission); the probability that all fragments of a
given packet are transmitted, is equal to the ratio of
fragment payload length (F), and packet payload length
ð�PÞ:
Pf ¼F�P: ð11Þ
Equations (7) and (10) represent a non linear system in
the two unknown s and Pr, which can be solved using
numerical techniques.
4.3 Saturation throughput (THR)
We study the events that can occur within a generic slot
time, and we express the saturation throughput of basic
access method as a function of the computed value s.
We express the elementary parameters of THR:
• Let Ptr be the probability that there is at least a
transmission in the considered slot time:
Ptr ¼ 1� ð1� sÞn: ð12Þ
• Let Ps be the probability that the transmission occurring
on the channel is successful. It is given by the
probability that exactly one station transmits on the
channel, which is conditioned by the fact that at least
one station transmits:
Ps ¼nsð1� sÞn�1ð1� PeÞ
Ptr
;
¼ nsð1� sÞn�1ð1� PeÞ1� ð1� sÞn :
ð13Þ
• Let Ts be the time that the channel is sensed busy by a
successful transmission:
Ts ¼ DIFSþ T�P
R þ�P
FTPHY þ TMAC½
þ ACK þ 2ðSIFSþ dÞ� � SIFS:
ð14Þ
• Let Tm be the time that the channel is sensed busy by a
missed transmission:
Tm ¼ DIFSþ TPHY þ TMAC þ TFR þ d: ð15Þ
We define E[d], as the average delay of packet payload
successfully transmitted in a slot time, since a successful
transmission occurs in a slot time with probability PtrPs:
E½d� ¼ PtrPsT�P
R : ð16Þ
The average length of a slot time E[r], is obtained by
considering that, with (1 - Ptr) the slot time is empty, with
PtrPs it contains a successful transmission, and with the
probability Ptr(1 - Ps), it contains a collision. this yields:
Wireless Netw
123
E½r� ¼ ð1� PtrÞrþ PtrPsTs þ Ptrð1� PsÞTm: ð17Þ
Now, we are able to express the saturation throughput
(THR) as the fraction of time (S) in which the channel is
used to transmit successfully the packet payload multiplied
by the data rate (R):
S ¼ E½d�E½r� ; ð18Þ
¼ PtrPsT�P
R
ð1� PtrÞrþ PtrPsTs þ Ptrð1� PsÞTm: ð19Þ
THR ¼ S� R: ð20Þ
4.4 Mean response time ð�TrÞ
In the following, we consider an M/G/1 queue [69] (see
Fig. 7) where arrivals occur according to a Poisson process
of rate k, service times are independent and identically
distributed with general distribution, there is a single server
operating a FIFO policy, and there is infinite queue. k is the
average arrival rate of customers per time unit. We denote
the mean service time by 1/l, and define q = k/l as the
fraction of time that the server is busy. We shall assume
that q\ 1, so that the queue is stable and does not below
up to infinity. We are now aiming to find an expression for
the mean response time in this queue. The formula for this
quantity is called the second formula of Pollaczek-Khin-
chin [70].
Let S be the service time distribution, and GS(Z) is its
generating function of probabilities:
GSðZÞ ¼Xm
i¼0
Psuccessi ZDsuccess
i þ PdropZDdrop
: ð21Þ
where,
• Pisuccess is the probability that a packet is transmitted
successfully at the stage i, after having undergone
i transmission failures at the stages 0; 1; 2; . . .; i� 1:
Psuccessi ¼ Pi
rð1� PrÞ: ð22Þ
• Pdrop is the probability that a packet is dropped after
reaching the maximum number m of retransmissions:
Pdrop ¼ Pmþ1r : ð23Þ
• Disuccess is the time to transmit successfully a packet at
the stage i, knowing that it has undergone transmission
failures at the stages 0; 1; 2; . . .; i� 1:
Dsuccessi ¼
Xi�1
j¼0
Tmj þ Ts
i : ð24Þ
• Ddrop is the time to destroy a packet after having
undergone m ? 1 transmission failures:
Ddrop ¼Xm
j¼0
Tmj : ð25Þ
With TRF (respectively Tj
m) is the time of a successfully
packet transmission exactly at the stage i (respectively, the
time of a packet transmission failure exactly at the stage j).
They are given as follows:
Tsi ¼ Ts þ E½cwi�E½�r�: ð26Þ
Tmj ¼ Tm þ E½cwj�E½�r�: ð27Þ
Such as, E[cwi] is the average number of backoff time
slots at the stage i:
E½cwi� ¼ wi=2: ð28Þ
and E½�r� is the average length of a slot time obtained by
considering n - 1 stations:
E½�r� ¼ ð1� �PtrÞrþ �Ptr�PsT
s þ �Ptrð1� �PsÞTm: ð29Þ�Ptr ¼ 1� ð1� sÞn�1: ð30Þ
�Ps ¼ðn� 1Þsð1� sÞn�2ð1� PeÞ
1� ð1� sÞðn� 1Þ : ð31Þ
Now, to obtain the mean response time ð�TrÞ, we apply
the second formula of Pollaczek-Khinchin:
�Tr ¼ E½S� þ kEðS2Þ2 1� kEðSÞð Þ : ð32Þ
where, E(S) and E(S2) are respectively the first and the
second moment of the service time distribution:
EðSÞ ¼ G0Sð1Þ: ð33Þ
EðS2Þ ¼ G0Sð1Þ þ G00Sð1Þ: ð34Þ
G0Sð1Þ ¼Xm
i¼0
Psuccessi Dsuccess
i þ PdropDdrop: ð35Þ
G00Sð1Þ ¼Xm
i¼0
Psuccessi Dsuccess
i Dsuccessi � 1
� �
þ PdropDdrop Ddrop � 1� �
: ð36Þ
Fig. 7 Modeling of a 802.11
station by an M/G/1 queuing
system
Wireless Netw
123
5 Analytical results and analysis
In this section, we provide a comprehensive analysis on the
behavior of packet fragmentation mechanism in non ideal
channel conditions. So, we show how the packet frag-
mentation mechanism increases the overall throughput and
decreases the mean response time of the IEEE 802.11
network under the impact of packet error rate parameters
(bit error rate and data packet length). The analysis pre-
sented in this section, investigates for the first time in the
literature the performance improvement level achieved in
an IEEE 802.11 network by applying packet fragmentation
mechanism under an error-prone channel. The presented
analytical results, give a formal proof on the useful and
efficiency of packet fragmentation mechanism in a noisy
channel. Moreover, they underline the necessity to take the
packet fragmentation mechanism into consideration, when
the performances of the IEEE 802.11 MAC Protocol are
investigated, or a new MAC protocol is designed to
enhance the IEEE 802.11 network. The electromagnetic
noise in large cities is inevitable, it causes high delays and
worsens the throughput due to data distortion. Therefore,
the IEEE 802.11 work group has proposed the packet
fragmentation mechanism, to reduce the impact of noise
errors on the transmitted data packets. Furthermore, the
packet fragmentation mechanism is the only existing
solution since 1999, which is the date of the first release of
IEEE 802.11 standard [1]. The results presented in this
section are generated by solving the analytical model
described in Sect. 4. Table 3 lists all the parameters used in
this section.
The analytical analysis proposed in this section of
applying packet fragmentation mechanism on IEEE
802.11b DCF network, is presented as following: firstly, we
vary the BER value and the data packet length, to study the
performance improvement level achieved in an IEEE
802.11 network, when the packet fragmentation mecha-
nism is activated under the impact of packet error rate
parameters (BER and packet length). Secondly, we vary
the number of stations, as the network size has a direct
influence on channel saturation, to analyze the performance
of packet fragmentation mechanism with different BER
values, data packet lengths and data rates.
Figures 8 and 9 illustrate respectively the overall
throughput and the mean response time variation of the
IEEE 802.11 network according to BER value
(1 9 10-5 B BER B 20 9 10-5) in cases of fragmented
and non fragmented data packets. In case of non-frag-
mented data packets, we show on Figs. 8 and 9 that the
performances of the IEEE 802.11 network are highly
affected because of BER value; more the BER value
increases, more the overall throughput is lower (see Fig. 8)
and the mean response time is higher (see Fig. 9). This
degradation of IEEE 802.11 network performances is due
to data packets distortion that happens when the PER
increases. Since the PER is in linear relationship with BER,
it increases with the increase of BER value (see Eq. 1 and
Fig. 4). Furthermore, according to DCF operations, after
sending a data packet, if the source station does not receive
an acknowledgment, it assumes that its data packet is lost.
Consequently, the source station tries to retransmit its data
packet after a random backoff time, given by the binary
exponential backoff algorithm, in order to solve the wire-
less channel access contention. Unfortunately, the source
station assumes that, all transmission failures are due to
collisions. Thus, it does not consider the probability of
transmission errors due to bit error rate. So, each time the
source station experiences a transmission failure, the
backoff algorithm doubles the maximum backoff time to
reduce contention, without taking into account the real
reason of the data packet loss. Consequently, the backoff
algorithm adds additional delays, which cause poor channel
utilization at each time the loss of data packet is due toTable 3 802.11b Physical and MAC parameters
Parameter Numerical value
Signal propagation delay 1 ls
DIFS 50 ls
SIFS 10 ls
Slot time 20 ls
Physical basic rate (PHY header) 1 Mbits/s
Physical basic rate (MAC header) 2 Mbits/s
Physical data rate 11 Mbits/s
Minimum contention window 32
Maximum contention window 1,024
PHY header length 192 bits
MAC header length 34 bytes
ACK length 14 bytes
Maximum length of MAC frame 4,095 bytesFig. 8 Overall throughput versus BER
Wireless Netw
123
noise errors. Thereby, some recent studies (see [64, 67,
68]) have proposed to enhance the performance of IEEE
802.11 network under a noisy channel. So, in case of
erroneous data packet retransmission, instead of doubling
the contention window, the backoff counter selects a
counter value from the same contention window. Indeed,
this solution allows to avoid the doubling of the contention
window in case of erroneous data packet retransmission,
and consequently it improves the channel utilization
because of reducing the waiting backoff time. However,
the loss of data packets because of noise errors, is not
solved. In case of fragmented data packets, we show on
Figs. 8 and 9 that, the use of Packet Fragmentation
Mechanism with the 802.11 DCF function, allows to
improve significatively the overall throughput and the
mean response time of the IEEE 802.11 network under the
influence of bit error rate. We note that, the packet frag-
mentation mechanism provides good performances at
MAC level of the IEEE 802.11 protocol, although the
increase of BER value. So, the PFM contributes consid-
erably to reduce the decrease of overall throughput (see
Fig. 8) and the increase of mean response time (see Fig. 9)
of the IEEE 802.11 network. This improvement level
achieved in an IEEE 802.11 network, is due to packet error
rate, which is considerably reduced, once the packet frag-
mentation mechanism is applied. So, the PER does not
increase in the same manner like in case of non-fragmented
data packets, when the BER value increases (see Fig. 4).
Therefore, the packet fragmentation mechanism provides a
better chance to a data packet to be successfully trans-
mitted. Thereby, the packet fragmentation mechanism
allows to increase the overall throughput and to decrease
the mean response time of the IEEE 802.11 network.
Furthermore, we think that, to improve the performance of
the IEEE 802.11 network under the impact of bit error rate,
the packet fragmentation mechanism must be used with the
802.11 DCF function, in order to reduce the influence of bit
error rate on the packet error rate. Then, if the transmitted
data fragments undergo transmission errors, it is very
interesting to use the solutions proposed in the papers [64,
67] and [68], to avoid the doubling of the contention
window.
Figures 10 and 11 illustrate respectively the overall
throughput and the mean response time variation of the
IEEE 802.11 network according to data packet length
(4,000 bits B packet B 32,000 bits) in cases of frag-
mented and non-fragmented data packets. We note on
Figs. 10 and 11 respectively that, more the length of data
packets is great, more the overall throughput of IEEE
802.11 network is considerably decreased and the mean
response time is highly increased. This is due to packet
error rate, which is in exponential relationship with the data
packet length. So, the PER increases quickly with the
increase of data packet length (see Eq. 1 and Fig 5).
Consequently, it causes frequent data packets losses. These
losses reduce severely the amount of data successfully
transmitted and add additional delays to transmit the data
packets. Thereby, we can conclude that, increasing the
length of data packets in an IEEE 802.11 network is not
always a good way to increase the useful use of the wire-
less channel, or to attribute a privilege for a given station in
the network. Unfortunately, the wireless stations in an
IEEE 802.11 network perform several applications, which
require to exchange a huge amount of data, for example:
FTP application, Remote Access, Remote Data Processing,
Remote Surveillance, etc. These applications which are
widely deployed and used in industries, companies and
universities, are highly affected by the packet error rate.
Furthermore, the IEEE 802.11 wireless network is cur-
rently proposed for several control-command industrial
applications, for example: Remote Control, Remote
Maintenance, etc. However, this kind of applications are
sensitive to mean response time, which is highly affected,
in case of wireless networks, by the packet error rate. In the
objective to improve the performance of the IEEE 802.11Fig. 9 Mean response time versus BER
Fig. 10 Overall throughput versus packet length
Wireless Netw
123
network, and to support applications with quality of service
(QoS) requirements, the IEEE work group published the
IEEE 802.11e standard. However, the IEEE 802.11e stan-
dard does not provide any solution to reduce the influence
of packet error rate on the transmitted data packets.
Otherwise, we note on Figs. 10 and 11 a highly improve-
ment level on the performances of the IEEE 802.11 net-
work, when the packet fragmentation mechanism is used
with the 802.11 DCF function. We show that, more the
length of data packets is great, more the overall throughput
is increased (see Fig. 10) and the mean response time is
acceptable (see Fig. 11). This exceptional improvement
level of the IEEE 802.11 network performances is due to
the packet fragmentation mechanism, which allows to
maintain the packet error rate at a constant value for a
given value of BER, whatever the length of data packets
(see Fig. 5). Therefore, the packet fragmentation mecha-
nism allows in an IEEE 802.11 network to increase the
amount of data successfully transmitted. Consequently, it
enhances the useful use of the wireless channel. According
to the presented results and to the best of our knowledge,
we think that, the packet fragmentation mechanism can be
combined with the packet aggregation mechanism (PAM),
which is used in both IEEE 802.11e and IEEE 802.11n
MAC protocols. In IEEE 802.11e MAC protocol, the
packet aggregation mechanism is called Burst ACK. It is
used to privilege voice and video streaming rather than data
and background streaming, in order to provide a differen-
tiation of service (DiffServ) at MAC level of the IEEE
802.11 network (see the reference [20]). While, in IEEE
802.11n MAC protocol, the packet aggregation mechanism
is called Block ACK. It is used to enhance the wireless
channel utilization, in order to reach higher throughput in
IEEE 802.11 network (see the reference [71]). The packet
aggregation mechanism has been previously studied and
proved efficient (see the references [38, 11] and [41]).
However, these studies have been done in ideal channel
conditions, i.e, without considering the effect of packet
error rate. Therefore, the efficiency of packet aggregation
mechanism in an error-prone channel is questionable, as we
have shown in Figs. 10 and 11: the length of data packet
affects severely the packet error rate. So, when we aggre-
gate many data packets, and we transmit them as a single
frame, the packet error rate will be more important.
Therefore, we think that, the use of packet fragmentation
mechanism with the packet aggregation mechanism will
certainly enhance the performances of both IEEE 802.11e
and IEEE 802.11n MAC protocols.
Figures 12, 13, 14, 15, 16 and 17 show the variation of
the IEEE 802.11 network performances according to the
network size with different BER values, data packet
lengths and data rates, in cases of fragmented and non-
fragmented data packets.
We note on Figs. 12 and 13 that, the packet fragmen-
tation mechanism is efficient to improve significatively the
performances of the IEEE 802.11 network under the
influence of bit error rate whatever the number of stations
in the network. These results generalize and validate, for
various numbers of stations in the network, the resultsFig. 11 Mean response time versus packet length
Fig. 12 Overall throughput variation according to the network size
and BER value
Fig. 13 Mean response time variation according to the network size
and BER value
Wireless Netw
123
presented in Figs. 8 and 9, about the performance
improvement level of packet fragmentation mechanism
under the influence of bit error rate. Through the results
presented in Figs. 12 and 13, we show clearly that, the
packet fragmentation mechanism is an incontestable solu-
tion to reduce the impact of bit error rate on the perfor-
mances of the IEEE 802.11 network, particularly when the
wireless channel is strongly disturbed. We note that, when
the BER value is high (BER = 10-4), the performance
improvement level of packet fragmentation mechanism is
phenomenal, it is about 50 %. We also note that, when the
BER value is moderate (BER = 5 9 10-5), the perfor-
mance improvement level of packet fragmentation mech-
anism is good, it is about 13 %.
In Figs. 14 and 15, we also generalized and validated,
for different network sizes, the results presented in Figs. 10
and 11, about the performance improvement level of
packet fragmentation mechanism under the influence of
data packet length. In Figs. 14 and 15, we show clearly
that, the packet fragmentation mechanism is a very
appropriate solution, not only to reduce the impact of
packet error rate on the performances of the IEEE 802.11
network, but also to allow the IEEE 802.11 MAC protocol
to reach the higher throughput with acceptable delays,
merely by increasing the length of data packets. When the
length of data packet is middle (packet = 8,000 bits), we
note that, the performance improvement level of Packet
Fragmentation Mechanism is very interesting, it is about
25 %. The efficiency of packet fragmentation mechanism
appears more when the length of data packet is doubled
(packet = 16,000 bits), we note that, the performance
improvement level of Packet Fragmentation Mechanism is
exceptional, it is about 66 %.
In Figs. 16 and 17, we study the performance
improvement level of packet fragmentation mechanism
with different data rates. The 802.11 physical layer pro-
vides multiple data rates by employing different modula-
tion and channel coding schemes. In the Figs. 16 and 17,
we show that, the packet fragmentation mechanism allows
to improve the performances of the IEEE 802.11 network
whatever the data rate used at physical layer. We note that,
the performance improvement level of packet fragmenta-
tion mechanism is about 48 % when the high rate
(11 Mbits/s) is used, and it is about 55 % when the low rate
Fig. 14 Overall throughput variation according to the network size
and packet length
Fig. 15 Mean response time variation according to the network size
and packet length
Fig. 16 Overall throughput variation according to the network size
and data rate
Fig. 17 Mean response time variation according to the network size
and data rate
Wireless Netw
123
(5.5 Mbits/s) is used. Some recent papers (see the reference
[65]) propose rate adaptation algorithms which aim to
decrease the data rate only when transmission errors occur
on the transmitted data packets. We affirm that, the packet
fragmentation mechanism can be considered in these
algorithms to more enhance the performances of IEEE
802.11 networks.
6 Simulation and analytical model validation
To validate our analytical model, we have compared its
results with that obtained by Bianchi’s analytical model
and simulation. To obtain the simulation results, we have
implemented the IEEE 802.11 DCF function without and
with the packet fragmentation mechanism (see Figs. 18 and
19, respectively) in a custom-made simulator. Our simu-
lator is an event-driven simulation program, written in
C?? programming language under Linux operating sys-
tem. It closely follows all the IEEE 802.11 DCF function
details in cases of non-fragmented and fragmented data
packets, for each independently transmitting station. The
simulator works in procedural-oriented basis and the source
code of each station runs in parallel using multi-threads
programming. Each station in the network constitutes dif-
ferent threads that execute the code that would be imple-
mented in a real platform. The main motivations for
implementing the Packet Fragmentation Mechanism in a
custom-made C?? simulator rather than in any other well
known simulators (such as ns-2, for example), are the
possibility of isolating the IEEE 802.11 MAC protocol
performance from the rest of the network and the faster
execution of the simulations. All the parameters used in
this section are mentioned in Table 1 of Sect. 4. The values
of protocol parameters used to obtain numerical results for
the analytical model and simulation are given in Table 3 of
Sect. 5.
In Fig. 20, we show, in one hand, a comparison between
our analytical model and the analytical model of Bianchi
[6] in the case of an ideal channel (BER = 0) and non-
fragmented data packets. In other hand, we show com-
parisons between the obtained analytical and simulation
results under a noisy channel (BER = 10-4) in cases of
non-fragmented and fragmented data packets. Through the
Fig. 20, we show clearly that, our analytical model is
validated by both Bianchi analytical model and simulation.
In the case of an error-free channel and without activating
the Packet Fragmentation Mechanism, our analyticalFig. 18 Flowchart of the IEEE 802.11 DCF
Fig. 19 Flowchart of the IEEE 802.11 DCF with PFM
Wireless Netw
123
results mesh well with the Bianchi’s analytical results. It is
evident, since our analytical model is an extension of the
Bianchi’s model with the PFM and the PER. Therefore,
when we do not consider the PER and the PFM, we must
find the same results. Otherwise, when the wireless channel
is error-prone, we show that our analytical results also
mesh very well with the obtained simulation results in both
cases of non-fragmented and fragmented data packets.
According to numerical results obtained by the developed
model, Bianchi’s model and simulation, our analytical
model is quite exact.
7 Conclusion
In this paper, we have focused our study on the Packet
Fragmentation Mechanism which is the solution proposed
by the IEEE work group to enhance the performances of
IEEE 802.11 networks under a noisy channel. The noise
related losses is the second major problem after the colli-
sion induced losses which cause poor channel utilization
and higher delays in an IEEE 802.11 network. It is true
that, IEEE published 802.11e standard to support applica-
tions with Quality of Service requirements, and 802.11n
standard to provide the higher throughput in the network.
Also, several studies have been done to enhance the per-
formances of IEEE 802.11 networks under a noisy channel.
However, the impact of packet error rate on the perfor-
mances of IEEE 802.11 networks has not been solved. The
only one way to reduce the influence of packet error rate on
the performances of IEEE 802.11 networks is to apply the
Packet Fragmentation Mechanism. Indeed, the perfor-
mance modeling and analysis of the IEEE 802.11 network
in all its various extensions have been the subject of several
studies. However, the performance improvement level of
packet fragmentation mechanism on the IEEE 802.11
network under the impact of packet error rate parameters
(Bit Error Rate and data packet length) has been missed in
the available literature. Therefore, we have focused in this
paper to extend an existing and valid Markov chain model,
in order to consider the packet fragmentation mechanism
and the packet error rate. So, we have developed mathe-
matical models to compute the overall throughput and the
mean response time of the IEEE 802.11 network. The
presented analytical results have been obtained for differ-
ent BER values, data packet lengths, network sizes and
data rates. These results have allowed us to quantify, for
the first time in the literature, the performance improve-
ment level of packet fragmentation mechanism, and to give
all the cases where the Packet Fragmentation can be used to
enhance the performances of IEEE 802.11 networks. The
accuracy of the developed analytical model is validated by
simulation.
References
1. IEEE (1999). Part 11: Wireless LAN medium access control
(MAC) and physical layer (PHY) specifications. IEEE Std 802.11.
2. IEEE (2007). Part 11: Wireless LAN medium access control
(MAC) and physical layer (PHY) specifications. IEEE Std 802.11.
3. Giustiniano, D., Malone, D., Leith, D. J., & Papagiannaki, K.
(2010). Measuring transmission opportunities in 802.11 links.
IEEE/ACM Transactions on Networking, 18(5), 1516–1529.
4. Yun, J. H., & Seo, S. W. (2007). Novel collision detection
scheme and its applications for IEEE 802.11 wireless LANs.
Computer Communications, 30, 1350–1366.
5. Willing, A., Kubisch, M., Hoene, C., & Wolisz, A. (2002).
Measurements of a wireless link in an industrial environment
using an IEEE 802.11 compliant physical layer. IEEE Transac-
tions on Industrial Electronics, 43(6), 1265–1282.
6. Bianchi, G. (2000). Performance analysis of the IEEE 802.11
districuted coordination function. IEEE Journal on Selected
Areas in Communications, 18, 535–547.
7. Awerbuch, B., Holmer, D., & Rubens, H. (2006). The medium
time metric: High throughput route selection in multi-rate ad hoc
wireless networks. Mobile Networks and Applications, 11,
253–266.
8. Malone, D., Duffy, K., & Leith, D. (2007). Modeling the 802.11
distributed coordination function in nonsaturated heterogeneous
conditions. IEEE/ACM Transactions on Networking, 15(1),
159–171.
9. Zaki, A. N., & El Hadidi, M. T. (2008). Performance evaluation
of IEEE 802.11-based wireless LANs under finite-load condi-
tions. International Journal of Electronics and Communications,
62, 327–337.
10. Alsabbagh, H. M., Chen, J., & Xu, Y. (2008). Influence of the
limited retransmission on the performance of WLANs using
error-prone channel. International Journal of Communications,
Networks and System Sciences, 1, 49–54.
11. Wang, C. Y., & Wei, H. Y. (2009). IEEE 802.11n MAC
enhancement and performance evaluation. Mobile Networks and
Applications, 14, 760–771.
12. Mahmood, M. H., Chang, C., Jung, D., & Mao, Z. (2010).
Throughput behavior of link adaptive 802.11 DCF with MUD
capable access node. International Journal of Electronics and
Communications, 64, 1031–1041.
Fig. 20 Simulation and analytical results
Wireless Netw
123
13. Hung, F. Y., & Marsic, I. (2010). Performance analysis of the
IEEE 802.11 DCF in the presence of the hidden stations. Com-
puter Networks, 54, 2674–2687.
14. Lopez Aguilera, E., Casademont, J., & Cotrina, J. (2010). Prop-
agation delay influence in IEEE 802.11 outdoor networks.
Wireless Networks, 16, 1123–1142.
15. Naor, Z. (2010). LAMA/CA: A load-adaptive MAC protocol for
short packets. Mobile Networks and Applications, 15, 639–651.
16. Li, T., Leith, D. J., Badarla, V., Malone, D., & Cao, Q. (2011).
Achieving end-to-end fairness in 802.11e based wireless multi-hop
mesh networks without coordination. Mobile Networks and Appli-
cations, 16, 17–34.
17. Heereman, F., Joseph, W., Tanghe, E., Plets, D., Verloock, L., &
Martens, L. (2012). Path loss model and prediction of range, power
and throughput for 802.11n in large conference rooms. Interna-
tional Journal of Electronics and Communications, 66, 561–568.
18. Zhu, D. B., & Choi, B. D. (2012). Performance analysis of CSMA
in an unslotted cognitive radio network with licensed channels
and unlicensed channels. Journal on Wireless Communications
and Networking, 12, 1–7.
19. Chatzimisios, P., Xiao, Y., Tinnirello, I., Granelli, F., & Elmal-
lah, E. S. (2009). Recent advances in IEEE 802.11 WLANs:
Protocols, solutions and future directions. Mobile Networks and
Applications, 14, 693–696.
20. IEEE (2005). Part 11: Wireless Medium Access Control (MAC)
and Physical Layer (PHY) Specifications: Medium Access Con-
trol (MAC) Quality of Service (QoS) Enhancements. IEEE Std
802.11e.
21. Weinmiller, J., Schlager, M., Festag, A., & Wolisz, A. (1997).
Performance study of access control in wireless LANs—IEEE
802.11 DFWMAC and ETSI RES 10 Hiperlan. Mobile Networks
and Applications, 2, 55–67.
22. Ci, S., & Sharif, H. (2000). Adaptive approaches to enhance
throughput of IEEE 802.11 wireless LAN with bursty channel. In
Proceedings of 25th annual IEEE conference on local computer
networks (pp. 44–45).
23. Lindgren, A., Almquist, A., & Schelen, O. (2003). Quality of
service schemes for IEEE 802.11 wireless LANs—An evaluation.
Mobile Networks and Applications, 8, 223–235.
24. Borgia, E., Conti, M., & Gregori, E. (2005). IEEE 802.11b ad hoc
networks: performance measurements. Cluster Computing, 8,
135–145.
25. Rajan, D., & Poellabauer C. (2007). Adaptive fragmentation for
latency control and energy management in wireless real-time
environments. In International conference on wireless algo-
rithms, systems and applications (pp. 158–168).
26. Kurth, M., Hermann, U., Zubow, A., & Redlich, J. P. (2009).
Network coding for bit error recovery in IEEE 802.11 mesh net-
works. IEEE International Conference on Communications, 1–6.
27. Skordoulis, D., Ni, Q., Chen, H. H., Stephens, A. P., Liu, C., &
Jamalipour, A. (2008). IEEE 802.11n MAC frame aggregation
mechanisms for next-generation high-throughput WLANs. IEEE
Wireless Communications Magazine, 15(1), 40–47.
28. Zhou, T., Sharif, H., Hempel, M., Mahasukhon, P., Wang, W., &
Chen, H. H. (2009). Performance study of a mobile multi-hop
802.11a/b railway networks using passive measurement. Mobile
Networks and Applications, 14, 782–797.
29. Judd, G., & Steenkiste, P. (2010). Characterizing 802.11 wireless
link behavior. Wireless Networks, 16, 167–182.
30. Sweedy, A. M., Semeia, A. I., Sayed, S. Y., & Konber, A. H.
(2010). The effect of frame length, fragmentation and RTS/CTS
mechanism on IEEE 802.11 MAC performance. In 10th inter-
national conference on intelligent systems design and applica-
tions (pp. 1338–1344).
31. Pocta, P., Bilsak, M., & Rousekova, J. (2010). Impact of frag-
mentation threshold tuning on performance of voice service and
background traffic in IEEE 802.11b WLANs. In 20th interna-
tional conference on radioelektronika (pp. 1–4).
32. Choi, N., Seok, Y., Kwon, T., & Choi, Y. (2011). Multicasting
multimedia streams in IEEE 802.11 networks: A focus on reli-
ability and rate adaptation. Wireless Networks, 17, 119–131.
33. Castignani, G., Blanc, A., Lampropulos, A., & Monavont N.
(2012). Urban 802.11 community networks for mobile users:
Current deployments and prospectives. Mobile Networks and
Applications. doi:10.1007/s11036-012-0402-2.
34. Cardoso, K. V., & De Rezende, J. F. (2012). Increasing
throughput in dense 802.11 networks by automatic rate adapta-
tion improvement. Wireless Networks, 18, 95–112.
35. Lyakhov, A., & Vishnevsky, V. M. (2004). Packet fragmentation
in wi-fi ad hoc networks with correlated channel failures. In IEEE
international conference on mobile ad hoc and sensor systems
(pp. 204–213).
36. Xi, Y., Wei, J. B., Zhuang, Z. W., & Kim, B. S. (2006). Performance
evaluation, improvement and channel adaptive strategy for IEEE
802.11 fragmentation mechanism. In Proceedings of 11th IEEE
symposium on computers and communications (pp. 142–148).
37. Kim, S., Kim, J., Park, S. K., Choi, S., Lee, J., & Jung, H. (2006).
Reachability and goodput enhancement via fragmentation in
public IEEE 802.11b WLAN. In Asia-Pacific conference on
communications (pp. 1–6).
38. Fallah, Y. P., El Housseini, S., & Alnuweiri, H. (2008). A gen-
eralized saturation throughput analysis for IEEE 802.11e con-
tention-based MAC. Wireless Personal Communications, 47,
235–245.
39. Chen, W. T. (2008). An effective medium contention method to
improve the performance of IEEE 802.11. Wireless Networks, 14,
769–776.
40. Bayraktaroglu, E., King, C., Liu, X., Noubir, G., Rajaraman, R.,
& Thapa, B. (2011). Performance of IEEE 802.11 under jam-
ming. Mobile Networks and Applications. doi:10.1007/s11036-
011-0340-4.
41. Feng, K. T., Huang, Y. Z., & Lin, J. S. (2011). Design of MAC-
defined aggregation ARQ schemes for IEEE 802.11n networks.
Wireless Networks, 17, 685–699.
42. Keene, S. M., & Carruthers, J. B. (2012). Collision localization
for IEEE 802.11 wireless LANs. Wireless Personal Communi-
cations, 63, 45–63.
43. Jeong, J., Choi, J., Choi, S., & Kim, C. K. (2012). Resolving
intra-class unfairness in 802.11 EDCA. Wireless Personal Com-
munications, 63, 431–445.
44. Park, S., Chang, Y., & Copeland, J. A. (2012). Throughput
enhancement of MANETs: Packet fragmentation with hidden
stations and BERs. IEEE Consumer Communications and Net-
working Conference, 188–193.
45. Karthikeyani, V., & Thiruvenkadam, T. (2013). Packet size based
performance analysis of IEEE 802.11 WLAN comprising virtual
server arrays. In International conference on pattern recognition
informatics and medical engineering (pp. 43–48).
46. Vishnevsky, V. M., & Lyakhov, A. I. (2002). IEEE 802.11
wireless LAN: Saturation throughput analysis with seizing effect
consideration. Cluster Computing, 5, 133–144.
47. Lyakhov, A., & Vishnevsky, V. (2005). Comparative study of
802.11 DCF and its modification in the presence of noise.
Wireless Networks, 11, 729–740.
48. Pham, P. P. (2005). Comprehensive analysis of the IEEE 802.11.
Mobile Networks and Applications, 10, 691–703.
49. Ni, Q., Li, T., Turletti, T., & Xiao, Y. (2005). Saturation
throughput analysis of error-prone 802.11 wireless networks.
Journal of Wireless Communications and Mobile Computing,
5(8), 945–956.
50. Kim, B. S., Fang, Y., Wong, T. F., & Kwon, Y. (2005).
Throughput enhancement through dynamic fragmentation in
Wireless Netw
123
wireless LANs. IEEE Transactions on Vehicular Technology,
54(4), 1415–1425.
51. Li, T., Ni, Q., & Xiao, Y. (2006). Investigation of the block ACK
scheme in wireless ad-hoc networks. Journal of Wireless Com-
munications and Mobile Computing, 6(6), 877–888.
52. Smadi, M. N., & Szabados, B. (2006). Error-recovery service for
the IEEE 802.11b protocol. IEEE Transactions on Instrumenta-
tion and Measurement, 55(4), 1377–1382.
53. Hneiti, W., & Ajlouni, N. (2006). Performance enhancement of
wireless local area networks. Information and Communication
Technologies, 2, 2400–2404.
54. Chang, Y., Lee, C. P., Kwon, B., & Copeland, J. A. (2007).
Dynamic optimal fragmentation for goodput enhancement in
WLANs. In 3rd international conference on testbeds and
research infrastructure for the development of networks and
communities (pp. 1–9).
55. Szczypiorski, K., & Lubacz, J. (2008). Saturation throughput
analysis of IEEE 802.11g (ERP-OFDM) networks. Telecommu-
nication Systems, 38, 45–52.
56. Bae, Y. H., Lyakhov, A. I., Vishnevsky, V. M., Kim, K. J., &
Choi, B. D. (2008). Matrix method to study IEEE 802.11 net-
work. Automation and Remote Control, 69(3), 529–543.
57. Li, Y., Wang, C., long, K., & Zhao, W. (2008). Modeling channel
access delay and jitter of IEEE 802.11 DCF. Wireless Personal
Communications, 47, 417–440.
58. Lin Fang, D., Yan Tai, S., Hai Ming, C., & Mao De, M. (2008).
Packet delay analysis on IEEE 802.11 DCF under finite load
traffic in multi-hop ad hoc networks. Science in China Series F:
Information Sciences, 51(4), 408–416.
59. Zheng, F., & Nelson, J. (2008). Cross-layer adaptive design for
the frame length of IEEE 802.11 networks. In 6th international
symposium on modeling and optimization in mobile, ad hoc and
wireless networks and workshops (pp. 437–442).
60. Bykowski, M., Kowalik, K., Keegan, B., & Davis, M. (2008).
Throughput enhancement through combined fragmentation and
rate method in IEEE 802.11b WLANs. In Workshop on wireless
broadband access for communities and rural developing regions,
Karlstad, Sweden.
61. Peng, X. Y., Jiang, L. T., & Xu, G. Z. (2009). Saturation
throughput analysis of RTS/CTS scheme in an error-prone
WLAN channel. Journal of Zhejiang University Science A,
10(12), 1714–1719.
62. Raptis, P., Vitsas, V., & Paparrizos, K. (2009). Packet delay
metrics for IEEE 802.11 distributed coordination function.
Mobile Networks and Applications, 14, 772–781.
63. Li, T., Ni, Q., Malone, D., Leith, D., Xiao, Y., & Turletti, T.
(2009). Aggregation with fragmentation retransmission for very
high-speed wireless LANs. IEEE/ACM Transactions on Net-
working, 17(2), 591–604.
64. Senthilkumar, D., & Krishnan, A. (2010). Nonsaturation through-
put enhancement of IEEE 802.11b distributed coordination func-
tion for heterogeneous traffic under noisy environment. Inter-
national Journal of Automation and Computing, 7(1), 95–104.
65. Senthilkumar, D., & Krishnan, A. (2010). Throughput analysis of
IEEE 802.11 multirate WLANs with collision aware rate adap-
tation algorithm. International Journal of Automation and Com-
puting, 7(4), 571–577.
66. Prakash, G., & Thangaraj, P. (2011). Non-saturation throughput
analysis of IEEE 802.11 distributed coordination function.
European Journal of Scientific Research, 51(2), 157–167.
67. Kumar, P., & Krishnan, A. (2011). Throughput analysis of the
IEEE 802.11 distributed coordination function considering erro-
neous channel and capture effects. International Journal of
Automation and Computing, 8(2), 236–243.
68. Senthilkumar, D., & Krishnan, A. (2012). Enhancement to IEEE
802.11 distributed coordination function to reduce packet
retransmissions under imperfect channel conditions. Wireless
Personal Communications, 65, 929–953.
69. Bouallouche Medjkoune, L., & Aissani, D. (2006). Performance
analysis approximation in a queueing system of Type M/G/1.
International Journal Mathematical Methods of Operation
Research, 63(2), 341–356.
70. Lipsky, L. (2009). M/G/1 queue (pp. 185–286). Queueing theory.
doi:10.1007/978-0-387-49706-8-4, Springer Science?Business
Media, LLC.
71. IEEE (2009). Part 11: Wireless medium access control (MAC)
and physical layer (PHY) specifications: Enhancements for
higher throughput. IEEE Std 802.11n.
Author Biographies
Mohand Yazid is currently a
Ph.D. student at LAMOS labora-
tory (Laboratory of Modeling and
Optimization of Systems), Alge-
ria. He received the engineer
degree in 2008 in Computer Sci-
ence (Distributed and Parallel
Systems option) from the Univer-
sity of Bejaıa (Algeria). He was the
Networks Administrator of CE-
VITAL Enterprise during 3 years,
where he has done many training
about Cisco Networking (ICND1,
ICND2, IUWNE, CVOICE and
CWLMS). Since he had received
his Magister degree in 2011 in Computer Science (Networking and Dis-
tributed Systems option) at the University of Bejaıa (Algeria), he works as a
teacher at the Department of Applied Mathematics at the University of
Bejaıa (for Programming and Algorithmic, Data structures, Computer
networks, Security of networks, Modeling and Simulation of systems,
Performance evaluation of networks). His research interests are in: Mod-
eling, Simulation, Performance evaluation and Analysis of wireless net-
works (IEEE 802.11 Standard) and Industrial networks (Real-time MAC
protocols).
Louiza Bouallouche-Medjko-une received the engineer
degree in Computer Science
from University of Setif (Alge-
ria), the Magister degree in
Applied Mathematics from
University of Bejaıa (Algeria),
the doctorate degree in Com-
puter Science from University
of Setif (Algeria) in 2006 and,
the HDR (Habilitation a Diriger
des Recherches) from the Uni-
versity of Constantine (Algeria)
in 2009. BOUALLOUCHE-
MEDJKOUNE works as a tea-
cher at the Department of Computer Science of University of Bejaıa
and as a researcher at the LAMOS Laboratory (Modeling and Opti-
mization of Systems). She is head of the research team EPSIRT
(Evaluation de Performances des Systemes Informatiques et Reseaux
de Telecommunication) since 2005 and head of Department of
Operation Research since January 2010. Her publications have
appeared in various publishing houses: Taylor Francis, Elsevier,
Springer, AMS, BCS, … Her research interests are: Performance
evaluation of Computer Systems and Telecommunication Networks
(Markov chains, Queuing networks, Simulation, …), stability of
Wireless Netw
123
systems, Quality of service, Routing and Protocols of systems and
networks (mobiles, ad hoc, sensors, …).
Djamil Aıssani was born in
1956 in Biarritz (Basque Coun-
try, France). He started his
career at the University of
Constantine (Algeria) in 1978.
He received his Ph.D. in
November 1983 from Azer-
baidjan State University (Bak-
ou) and Kiev State University
(Soviet Union). He is at the
University of Bejaia since its
opening in 1983/1984. Director
of Research, Head of the Fac-
ulty of Science and Engineering
Science (1999–2000), Director
of the LAMOS Laboratory (Modeling and Optimization of Systems),
Scientific Head of the Computer Science Doctorate School ReSyD, he
has taught in many universities (USTHB Algiers, Annaba, Rouen,
Dijon, ENITA, INPS Ben Aknoun, Boumerdes, Tizi Ouzou, Setif,
EHESS Paris, …). He has supervised more than 20 Ph.D. Thesis. He
has published many papers on Markov chains, Queuing systems,
Reliability theory, Performance evaluation and their applications in
such industrial areas as Electrical, Telecommunication networks and
Computer systems.
Lilia Ziane-Khodja is a Ph.D.
of Computer Science. She
received an engineer degree in
Computer Science (Parallel and
Distributed Systems option) in
2008 from the University of
Bejaıa (Algeria), a master
degree in Computer Science
(Distributed Systems and Net-
works option) in 2009 from the
University of Rennes 1 (France)
and, a Ph.D. in Computer Sci-
ence in 2013 from the Univer-
sity of Franche-Comte (France).
She worked as a teacher at the
department of Computer Science of the IUT Belfort-Montbeliard (for
Programming and Algorithmic, Networks and Systems, Hardware
architectures and, Data Bases). Currently, she works as a postdoctoral
researcher at the French Institute for Research in Computer Science
and Control (INRIA) in Bordeaux Sud-Ouest, France. Her research
interests include parallel and distributed computation, numerical
algorithms, GPU computing, asynchronous iterative algorithms and,
modeling and simulation of parallel HPC applications and modern
multicore nodes.
Wireless Netw
123