On the Range Performance of Decode-and-Forward Relays in IEEE 802.11 WLANS


Azadeh Ettefagh, Marc Kuhn, Ingmar Hammerström, and Armin Wittneben


The 17th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC, Helsinki, Finland, Sept. 2006.

DOI: 10.1109/PIMRC.2006.254478

[BibTeX, LaTeX, and HTML Reference]


We consider a Wireless Local Area Network (WLAN) in the 5 GHz band. As the coverage is one of the main challenges in high-frequency wireless systems we focus on enhancing the coverage range of such a system by relaying. So far no relaying functions are defined in IEEE 802.11 Medium Access Control (MAC). We introduce three simple MAC schemes for multihop communications and classify them based on delay, simplicity, capacity and application. We also point out the deficiency of the actual standard regarding multihop links. We study the outage behaviour of a Single Input Single Output (SISO) two-hop link and improve it by developing a Multiple Input Multiple Output (MIMO) system. We investigate the tradeoff between coverage range and number of relays in a two-dimensional scenario. We also discuss the tradeoffs between having relays instead of adding more Access Points (APs) to the system and give an estimation of number of required APs/relays to fully cover an area. In other words we show how much range one can gain from Decode-and- Forward relaying in a WLAN scenario.


WLAN, Coverage range, Relaying, MAC

Download this document:


Copyright Notice: © 2006 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.