Comparison of performance analysis of 802.11a, 802.11b and 802.11g standard
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 6
Abstract
Wireless local area networks (WLANs) based on the IEEE 802.11 standards has been successfully deployed in a variety of home, office and corporate environments and available in various flavors like 802.11a/b/g. In this paper indepth analysis of the throughput performance and bandwidth efficiency of 802.11a standard has been investigated and compared for CSMA/CA and RTS/CTS schemes. In this paper, an analytical model based on theoretical analysis has been used to predict the throughput performance in IEEE 802.11a, 802.11b and 802.11g WLANs and further extended to predict the throughput performance taking into account the effect of channel onditions (FER). Results have been obtained using Matlab software which shows a superior throughput performance for 802.11a as compared to 802.11b/g using the same OFDM technology is employed for both the standards. Variation of throughput as a function of MSDU for the CSMA/CA and RTS/CTS for standard 802.11a, 802.11b and 802.11g reveals that throughput for CSMA/CA is greater than RTS/CTS scheme for same data rate. It has also been observed that considering physical condition i.e. FER in this case, throughput for 02.11a/b/g standards decreases with increasing FER when data rate is kept constant.
Authors and Affiliations
RAJU SHARMA , Dr. GURPAL SINGH , RAHUL AGNIHOTRI
Efficiency of K-Means Clustering Algorithm in Mining Outliers from Large Data Sets
This paper presents the performance of k-means clustering algorithm, depending upon various mean values input methods. Clustering plays a vital role in data mining. Its main job is to group the similar data together base...
Effective Term Based Text Clustering Algorithms
Text clustering methods can be used to group large sets of text documents. Most of the text clustering methods do not address the problems of text clustering such as very high dimensionality of the data and understandabi...
Secured, Authenticated Communication Model for Dynamic Multicast Groups
Secure Multicast networks forms the backbone for many web and multimedia applications such as Interactive TV, Teleconference etc. The main challenge for secure multicast is scalability, efficiency and authenticity. A co...
Fast Method for Two-dimensional Renyi’s Entropy-based Thresholding
Two-dimensional (2-D) thresholding can give a better segmentation than one-dimensional thresholding by taking the spatial correlation of the image. Unfortunately, the computational cost is an obstacle for the implementat...
CLASSIFICATION OF AGRICULTURAL LAND SOILS A DATA MINING APPROACH
The problem of the knowledge acquisition and efficient knowledge exploitation is very popular also in agriculture area. One of the methods for knowledge acquisition from the existing agricultural databases is the methods...