Numerical Analysis of IEEE Broadcast Scheme in Multihop Wireless Ad Hoc Networks

Similar documents
UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks

Enhanced Power Saving Scheme for IEEE DCF Based Wireless Networks

Medium Access Control in Ad Hoc Networks with Omni-directional and Directional Antennas

Wireless Medium Access Control Protocols

Performance of Collision Avoidance Protocols in Single-Channel Ad Hoc Networks Λ

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF

The MAC layer in wireless networks

Modeling of Partially Overlapping Wireless Personal Area Networks

Collision Free and Energy Efficient MAC protocol for Wireless Networks

The MAC layer in wireless networks

WLAN Performance Aspects

/$10.00 (c) 1998 IEEE

Rahman 1. Application

H-MMAC: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc Networks

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

ECEN 5032 Data Networks Medium Access Control Sublayer

Fu-Yi Hung ALL RIGHTS RESERVED

Multiple Access in Cellular and Systems

AGOOD medium access control (MAC) protocol for wireless

2 Related Work. 1 Introduction. 3 Background

Mohammad Hossein Manshaei 1393

Review of Medium Access Control protocol for MANET

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function

Wireless Networking & Mobile Computing

Title. Author(s)Nguyen, Thi Xuan My; Saivichit, Chaiyachet; Miyanaga. Issue Date Doc URL. Type. Note. File Information

Can Multiple Subchannels Improve the Delay Performance of RTS/CTS-based MAC Schemes?

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver

Analyzing Multi-Channel Medium Access Control Schemes With ALOHA Reservation

ANewRoutingProtocolinAdHocNetworks with Unidirectional Links

Evaluation of the backoff procedure of Homeplug MAC vs. DCF

Multiple Access Links and Protocols

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Lecture 25: CSE 123: Computer Networks Alex C. Snoeren. HW4 due NOW

Improving IEEE Power Saving Mechanism

Hidden Nodes Avoidance in Wireless Sensor Networks

Impact of IEEE n Operation on IEEE Operation

IEEE modifications and their impact

Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks

Logical Link Control (LLC) Medium Access Control (MAC)

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem

MAC in /20/06

Towards the Performance Analysis of IEEE in Multi-hop Ad-Hoc Networks

Wireless MACs: MACAW/802.11

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV

A Comparative Analysis on Backoff Algorithms to Optimize Mobile Network

An Efficient Scheduling Scheme for High Speed IEEE WLANs

CSE 461: Wireless Networks

Lecture 24: CSE 123: Computer Networks Stefan Savage. HW4 due NOW

A Wireless MAC Protocol with Collision Detection. Jun Peng, Member, IEEE, Liang Cheng, Member, IEEE, and Biplab Sikdar, Member, IEEE

CMPE 257: Wireless and Mobile Networking

Multi-channel MAC with Dynamic Channel Selection for Ad Hoc Networks

The IEEE Distributed Coordination Function in Small-Scale Ad-Hoc Wireless LANs

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

A Jamming-Based MAC Protocol for Wireless Multihop Ad Hoc Networks

A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment

/99/$10.00 (c) 1999 IEEE

Channel-Hopping Multiple Access

A Distributed Throughput-Optimal CSMA/CA

NMA Radio Networks Network Level: Medium Access Control Roberto Verdone

Markov Chains and Multiaccess Protocols: An. Introduction

Analysis of CSMA/CA Systems under Carrier Sensing Error: Throughput, Delay and Sensitivity

Channel-Hopping Multiple Access

A Comprehensive Simulation Study of Slotted CSMA/CA for IEEE Wireless Sensor Networks

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA

Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica

Department of Electrical and Computer Systems Engineering

Throughput and Energy Consumption Analysis of IEEE Slotted CSMA/CA. T.R. Park, T.H. Kim, J.Y. Choi, S. Choi, and W.H.

AN ADAPTIVE ENERGY EFFICIENT MAC PROTOCOL FOR WIRELESS SENSOR NETWORKS

CSE 461: Multiple Access Networks. This Lecture

Aloha and slotted aloha

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

CMPE 257: Wireless and Mobile Networking

MAC protocols. Lecturer: Dmitri A. Moltchanov

Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks

Performance Analysis of WLANs Under Sporadic Traffic

SRN Model for IEEE DCF MAC Protocol in Multi-hop Ad Hoc Networks with Hidden Nodes

ECE453 Introduction to Computer Networks. Broadcast vs. PPP. Delay. Lecture 7 Multiple Access Control (I)

CSE 6811 Ashikur Rahman

Chapter 6 Medium Access Control Protocols and Local Area Networks

Computer Communication III

Maximum Traffic Scheduling and Capacity Analysis for IEEE High Data Rate MAC Protocol

A Multi-channel MAC Protocol for Ad Hoc Wireless Networks

Wireless & Mobile Networking

MAC. Fall Data Communications II 1

Modeling of Physical Carrier Sense in Multi-hop Wireless Networks and Its Use in Joint Power Control and Carrier Sense Adjustment

B. Bellalta Mobile Communication Networks

Wireless Networks (MAC)

An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol

A Hybrid Distributed Coordination Function for Scalability and Inter-operability in Large-scale WLANs

ETSN01 Exam Solutions

P B 1-P B ARRIVE ATTEMPT RETRY 2 1-(1-P RF ) 2 1-(1-P RF ) 3 1-(1-P RF ) 4. Figure 1: The state transition diagram for FBR.

IEEE Protocol: Design and Performance Evaluation of an Adaptive Backoff Mechanism

A Survey on Modified RTS/CTS Mechanism

Investigating MAC-layer Schemes to Promote Doze Mode in based WLANs

Effect of Turn-Around Times on the Performance of High Speed Ad-hoc MAC Protocols

MAC LAYER. Murat Demirbas SUNY Buffalo

Transcription:

Numerical Analysis of IEEE 802.11 Broadcast Scheme in Multihop Wireless Ad Hoc Networks Jong-Mu Choi 1, Jungmin So 2, and Young-Bae Ko 1 1 School of Information and Computer Engineering Ajou University, Republic of Korea {jmc,jso1}@uiuc.edu 2 Coordinated Science Lab. and Dept. of Computer Science Engineering University of Illinois at Urbana-Champaign, USA youngko@ajou.ac.kr Abstract. In this paper, we study the performance of IEEE 802.11 broadcast scheme in multihop wireless networks using an analytical model. Previous works have evaluated the performance of IEEE 802.11 protocol assuming unicast communication, but there has not been an analysis considering broadcast communication. Analyzing performance of broadcast communication is important because multicast communication is gaining attention in wireless networks with numerous potential applications. Broadcast in IEEE 802.11 does not use virtual carrier sensing and thus only relies on physical carrier sensing to reduce collision. For this study, we define a successful broadcast transmission to be the case when all of the sender s neighbors receive the broadcast frame correctly, and calculate the achievable throughput. 1 Introduction The IEEE 802.11 standard [3] is widely deployed and used in wireless systems today. Its de facto medium access control (MAC) protocol, called Distributed Coordination Function (DCF) allows multiple nodes to share the wireless medium without any central coordinator. Although IEEE 802.11 DCF was designed for a wireless LAN, it is also used in multihop wireless networks because of its distributed nature. The major goal of a MAC protocol is to have only a single node in a broadcast domain transmit at a given time. If two nodes that are nearby each other transmit frames at the same time, the frames collide and the channel bandwidth is wasted. To achieve this goal, IEEE 802.11 DCF uses a technology called Carrier Sensing Multiple Access with Collision Avoidance (CSMA/CA). In CSMA/CA, whenever a node has a data frame to transmit, it listens on the channel for a duration of time. This duration of time is called slot time. If the channel is sensed This work is supported by grant no. R05-2003-000-1607-02004 and M07-2003-000-20095-0 from Korea Science & Engineering Foundation, and University IT research center project (ITRC). C. Kim (Ed.): ICOIN 2005, LNCS 3391, pp. 1 10, 2005. c Springer-Verlag Berlin Heidelberg 2005

2 Jong-Mu Choi, Jungmin So, and Young-Bae Ko Fig. 1. Illustration of the hidden terminal problem in a multihop wireless network to be idle during a predefined slot time, the node transmits the data frame. If the channel is busy, then the node defers its transmission and waits for a random delay (called random backoff interval) before retrying. Sensing the channel to determine if it is busy or idle is called physical carrier sensing. When a node receives a frame, the node is able to decode the frame correctly only if the received signal power is higher than a threshold called receiver sensitivity, which is also called receive threshold. Also, when a node senses the channel to see whether it is busy or not, it determines the channel to be busy if the sensed power is greater than the carrier sense threshold. The carrier sense threshold is a tunable parameter. Let us assume for now that the carrier sense threshold is equal to the receive threshold. It means while node A is transmitting a data frame, all nodes in A s transmission range senses the channel to be busy, and the nodes outside of A s transmission ranges senses the channel to be idle. Under this assumption, the scenario in Fig. 1 illustrates a situation where physical carrier sensing cannot prevent collision. Suppose node A starts transmitting a frame to node B. Since node C is outside of A s transmission range, it senses the channel as idle. So node C can start transmitting its frame, which collides at node B. In this scenario, node C is said to be hidden from node A, and C is a hidden terminal from A s view [4]. When node A transmits a data frame to B, there is a period of time in which if node C starts transmitting, it will collide with node A s transmission. This period is called a vulnerable period[1]. 3 To prevent collisions caused by hidden terminals, a mechanism called virtual carrier sensing is used in addition to CSMA/CA. When a node S wants to transmit a frame, it first transmits a Request-To-Send (RTS) frame which is much smaller in size than a data frame. On receiving RTS, the receiver replies with Clear-To-Send (CTS) frame also very small in size. Any node other then the sender and the receiver that receives RTS or CTS defers its transmission while S transmits the data frame. So the RTS/CTS exchange has the effect 3 The vulnerable period for IEEE 802.11 broadcast scheme is calculated in section II.

Numerical Analysis of IEEE 802.11 Broadcast Scheme 3 of reserving the space around the sender and receiver for the duration of the data transmission. This is called Virtual Carrier Sensing, because it provides information on the channel but not by physically sensing the channel. In IEEE 802.11 DCF, the virtual carrier sensing mechanism is only used in unicast transmissions, and it is an optional feature that can be turned on or off. For a broadcast transmission, only physical carrier sensing is used. Virtual carrier sensing is not directly applicable to broadcast transmissions because CTS messages sent by multiple receivers will result in a collision. The performance of IEEE 802.11 DCF for unicast transmissions has been studied using mathematical analysis. Cali et al. [5] calculates the throughput of IEEE 802.11 DCF when the basic CSMA/CA scheme is used without RTS/CTS mechanism. Bianchi [6] calculates the throughput of DCF with and without RTS/CTS mechanism, and also a combination of the two. These two studies are for wireless LANs, and so they do not consider hidden terminals. Wu et al. [1] studies the throughput the CSMA protocol in multihop wireless networks, considering hidden terminals. All of these studies are for unicast communication, and do not consider broadcast communications. We are interested in the performance analysis of broadcast scheme in IEEE 802.11 DCF, operated in a multihop network. Also, we are interested in reliable broadcast, where a broadcast transmission is considered successful only if all of the sender s neighbors receive the broadcast message correctly. Reliable broadcast can be used for numerous applications, such as code distribution, database replication, and a basis for supporting distributed protocols. The rest of paper is organized as follows: Insection2,wepresenttheanalysis of the IEEE 802.11 broadcast scheme. To our knowledge, this is the first analytical study of IEEE 802.11 broadcast scheme in multihop wireless networks. In section 3, we present numerical results from our analysis. Finally, we conclude in Section 4. 2 Numerical Analysis Model Before analyzing performance of IEEE 802.11 broadcast scheme, we examine the hidden node problem in a broadcast scenario. As you see in the Fig. 2(a), nodes in the receiving region of node T but not in the receiving region of node S, may cause hidden terminal problem. We call this area as a potential hidden node area. For unicast communications, the size of the potential hidden node area can be calculated using the distance between the sender and receiver. However, in case of broadcast communication (see Fig. 2(b)), the potential hidden node area needs to include the receiving range of all the neighbors of the senders. So it is difficult to exactly compute the size of this area. Moreover, as explained earlier, varying the carrier sensing area also change the form of this area. The worst case, where the size of the potential hidden node area is maximized, is when there are infinite number of node at the edge of the sender s transmission range. Let R denote the transmission range of a node. As you see in the Fig. 2, maximum size of potential

4 Jong-Mu Choi, Jungmin So, and Young-Bae Ko (a) Unicast (b) Broadcast Fig. 2. Potential hidden node area hidden node area can be π(2r) 2 πr 2 =3πR 2. Thus, in case of broadcast, the potential hidden node area can be dramatically larger than that of unicast. We use the similar approximate approaches used in [1] to achieve the average throughput for multihop wireless networks. To make our numerical model tractable, we assume followings for the multihop wireless network model. 1. All nodes in the network are two-dimensionally Poisson distributed with density λ, i.e., the probability p(i, A) of finding i nodes in an area of size A is given by p(i, A) = (λa)i e λa i! 2. All nodes have the same transmission and receiving range, which is denoted as R. N is the average number of neighbor nodes within a circular region of radius R. Therefore, we have N = λπr 2 3. A node transmits a frame only at the beginning of each slot time. The size of a slot time, τ, is the duration including transmit-to-receive turn-around time, carrier sensing delay and processing time. 4. The transmission time or the frame length is the same for all nodes. 5. When a node is transmitting, it cannot receive simultaneously. 6. A node is ready to transmit with probability p. Letp denote probability that a node transmits in a time slot. If p is independent at any time slot, it can be defined to be p = p Prob{Channel is sensed idle in a slot} p P I where P I is the limiting probability that the channel is sensed to be idle. 7. The carrier sensing range is assumed to vary between the range [R, 2R].

Numerical Analysis of IEEE 802.11 Broadcast Scheme 5 Fig. 3. Markov chain model for the channel With above assumptions, the channel process can be modeled as a two-state Markov chain shown in Fig. 3. The description of the states of this Markov chain is the following: Idle is the state when the channel around node x is sensed idle, and its duration T idle,isτ. Busy is the state when a successful DATA transfer is done. The channel is in effect busy for the duration of the DATA transfer, thus the busy time, T busy, is equal to the data transmission time δ data.(t busy = δ data ) In IEEE 802.11 scheme, all nodes should not transmit immediately after the channel becomes idle. Instead, nodes should stay idle for at least one slot time. Thus the transition probability P bi is 1. The transition probability P ii is that probability of the neighbor nodes transmits is given by, P ii = (1 p ) i (λπr2 ) i ((1 p )λπr 2 ) i e λπr2 = e λπr2 (1 p ) e p N =e p N i! i! i=0 i=0 Let, Φ i and Φ b denote the steady-state probabilities of state idle and busy, respectively. From Fig. 3, we have Since Φ b =1 Φ i,wehave Φ i = Φ i P ii + Φ b P bi = Φ i P ii + Φ b Φ i = 1 1 = 2 P ii 2 e p N Now the limiting probability P I can be obtained by T idle Φ i τ P I = = T busy (1 Φ i )+T idle Φ i δ data (1 e p N )+τ According to the relationship between p and p, p can be p = τp (δ data )(1 e p N )+τ To obtain the throughput, we need to calculate the probability of a successful transmission. The transmission state of a node x can also be modeled by a threestate Markov chain, as shown in Fig. 4. In the figure, wait is the state when the

6 Jong-Mu Choi, Jungmin So, and Young-Bae Ko Fig. 4. Markov chain model for the transmission states of node node in deferring its transmission, succeed is the state when the node successfully transmits DATA frame to all of neighbor nodes, and collision is the state when a node collides with other nodes. At the beginning of each time slot, node x leaves the wait state with probability p. Thus the transition probability P ww is given by P ww =1 p and, the duration of a node in wait state T wait is τ. The durations of success and collision states are equal to the frame transmission time, thus T succ and T coll are δ data + τ. Aftersuccess or collision state, node x always enter the wait state, thus P sw and P cw are 1. Let Φ w, Φ s,andφ c denote the steady-state probabilities of state wait, success, and collision, respectively. From the above Markov chain we have Hence, we have: Φ w = Φ w P ww + Φ s P sw + Φ c P cw = Φ w P ww +1 Φ w (1) Φ w = 1 = 1 2 P ww 1+p Based on the above condition, transition probability P ws can be P ws = P 1 P 2 P 3 (2) where P 1 =Prob{node x transmits in a slot} P 2 =Prob{All of node x s neighbor nodes do not transmit in the same slot} P 3 =Prob{Nodes in potential hidden nodes area do not transmit for 2δ data +τ} The reason for the last term is that the vulnerable period for an data frame is only 2δ data + τ. As you see in the Fig. 5, this is because the collide from node in potential hidden node happen during the period that begin δ data before sending node x begins its transmission and ends one slot after x completes its transmission.

Numerical Analysis of IEEE 802.11 Broadcast Scheme 7 Fig. 5. The vulnerable period for IEEE 802.11 broadcast scheme Fig. 6. Illustration of transmission area, additional carrier sensing area, and potential hidden nodes area Obviously, P 1 = p, while P 2 can be obtained by P 2 = i=0 (1 p) i (λπr2 ) i i! e λπr2 = e p λπr 2 = e p N To calculate P 2, we first approximate the number of node in the potential hidden node area. LetA tx, A cs,anda ph denote the transmission area, additional carrier sensing area, and potential hidden node area, respectively. As you see in the Fig. 6, additional carrier sensing area is the physical carrier sensing area that is outer of transmission area. We assume that the physical carrier sensing area is larger than transmission range and smaller than potential hidden node area. Thus,wehave 0 A cs 3πR 2 And, the potential hidden node area can be A ph =2π(2R) 2 A tx A cs =2π(2R) 2 πr 2 A cs =3πR 2 A cs Hence, 0 A ph 3πR 2

8 Jong-Mu Choi, Jungmin So, and Young-Bae Ko Let N ph denotes the number of node in potential node area. As we assume that, nodes are uniformly distributed, thus N ph can be N ph = λa ph 0 N ph λ3πr 2 0 N ph λ3n (3) With Eq. 3, P 3 is given by P 3 = { (1 p) i (N ph) i e N ph } (2δ data+τ ) = e p N ph (2δ data +τ ) i! i=0 Therefore, Eq. 2 can be expressed as P ws = p e p N e p 3N ph (2δ data +τ ) = p e p (N+3N ph (2δ data +τ )) From the Fig. 4, we have P ws =1 P ww P ws and P cw = P sw = 1 Hence, the steady-state probability of state succeed, Φ s, can be expressed as Φ s = Φ w P ws = P ws 1+p According to the definition [2], the throughput equals the fraction of time in which the channel is engaged in successful transmission of user data. Therefore, the throughput Th is equal to the limiting probability that the channel is in state in success. Th= Φ s δ data Φ s T succ + Φ c T coll + Φ w T wait = = 3 Numerical Results Φ s δ data Φ s T succ +(1 Φ s Φ w )T coll + Φ w T wait (4) P ws δ data p = (p e p (N+3N ph (2δ data +τ )) )δ data T coll + T wait τ + p (δ data + τ) In this section, we show numerical results based on the models introduced in the previous section. To see the effect of data frame length on throughput performance, we show results relatively large data frames and relatively small data frames. For the long data frame case, we use 100τ as the frame size. For the small frame case, we use 10τ. We first study the performance of the IEEE 802.11 broadcast scheme by varying the average number of neighboring node (N) and transmission attempt probability (p ). In this scenario, we fix the potential hidden node area (R ph )as 3πR 2, which is the worst case.

Numerical Analysis of IEEE 802.11 Broadcast Scheme 9 0.02 0.018 0.016 N=3 N=5 N=7 N=10 N=15 0.035 0.03 N=3 N=5 N=7 N=10 N=15 0.014 0.025 Throughput 0.012 0.01 0.008 Throughput 0.02 0.015 0.006 0.01 0.004 0.005 0.002 0 1e-005 0.0001 0.001 0.01 0.1 1 0 1e-005 0.0001 0.001 0.01 0.1 1 p : Probaility of transmit in a time slot p : Probaility of transmit in a time slot (a) Long data frame: δ data = 100τ (b) Short data frame: δ data =10τ Fig. 7. The throughput of IEEE 802.11 broadcast scheme varying N and p (R ph =100%=3πR 2 ) Fig 7 shows the throughput results for the IEEE 802.11 broadcast scheme with different frame sizes. As the average number of neighboring node increases, both case of the IEEE 802.11 broadcast scheme shows very poor throughput performance. The main reason is that the probability of collisions becomes higher as the number of node becomes larger. And as N is increased, p achieving optimum throughput decreases. This means that, as the number of competing nodes within a region increases, IEEE 802.11 scheme becomes more ineffective. When data frame length is long, the throughput of IEEE 802.11 broadcast scheme is very low. This is the fact that the vulnerability period (δ data + τ) inequation for P 3 becomes twice the length of the data frame. Next, we investigate the throughput performance of both case when the additional carrier sensing area varies. This is important because IEEE 802.11 broadcast scheme only relies on physical carrier sensing. In this scenario, we fix the probability of transmission in a time slot (p ) as 0.001. To see the effect of varying the additional carrier sensing area (A cs ), we vary the potential hidden node area (A ph ) since this value is inversely proportional to A cs. Fig. 8 shows, the throughput versus the percentage of A ph for the IEEE 802.11 broadcast scheme for 3,5,7,10,15 average neighboring nodes. In this result, when the percentage of A ph is 0, i.e., A cs is 3πR 2, throughput performance have maximum value. This means that, by achieving maximum value of A cs,the IEEE 802.11 broadcast scheme minimizes the possibility of hidden node problem. So it is beneficial to set the carrier sensing range large for broadcast communication. However, for unicast communication, a large carrier sensing range leads to reduced spatial reuse, so minimizing hidden node effect and increasing spatial reuse becomes a tradeoff which must be studied further. As the percentage of potential hidden node area and number of nodes increase, we observe that throughput of both case decreases more deeper. This again means that IEEE 802.11 broadcast scheme becomes more ineffective as the number of competing nodes within a region increases.

10 Jong-Mu Choi, Jungmin So, and Young-Bae Ko 0.1 0.09 N=3 N=5 N=7 N=10 N=15 0.01 0.0095 N=3 N=5 N=7 N=10 N=15 0.08 0.009 0.07 0.0085 0.06 Throughput 0.05 0.04 Throughput 0.008 0.0075 0.03 0.007 0.02 0.0065 0.01 0.006 0 0 20 40 60 80 100 0.0055 0 20 40 60 80 100 Potential hidden node area (%) Potential hidden node area (%) (a) Long data frame: δ data = 100τ (b) Short data frame: δ data =10τ Fig. 8. The throughput of IEEE 802.11 broadcast scheme varying N and R ph (p =0.001) Our results reveal that hidden terminals degrade the performance of IEEE 801.11 broadcast scheme beyond the basic effect of having larger potential hidden node area. 4 Conclusion Broadcast is an efficient paradigm for transmitting a data from sender to group of receivers. In this paper, we present a performance of the IEEE 802.11 broadcast scheme. To derive the throughput, we have used a simple model based on Markov chains. The result shows that overall performance of IEEE 802.11 broadcast scheme degrades rather rapidly when the number of competing nodes allowed within a region increase. References 1. L. Wu and P. K. Varshney, Performance analysis of CSMA and BTMA protocols in multihop netoworks(1). Single channel case, Elseiver Information Sciences, Vol. 120, pp. 159-177, 1999. 2. R. Rom and M. Sidi, Multiple Access Protocols: Performance and Analysis, Springer-Verlag, 1989. 3. IEEE 802.11 Working Group, Wireless LAN Medium Access Control (MAC0 and Physical Layer (PHY) specifications, 1999. 4. F. A. Tobagi and L. Kleinrock, Packet Switching in Radio Channels: Part II - the Hidden Terminal Problem in Carrier Sense Multiple-access Modes and the Busytone Solution, IEEE Trans. on Communications, 1975. 5. F. Cali, M. Conti and E. Gregori, Dynamic Tuning of the IEEE 802.11 Protocol to Achieve a Theoretical Throughput Limit, IEEE/ACM Transactions on Networking (TON), 2000. 6. G. Bianchi, Performance Analysis of the IEEE 802.11 Distributed Coordination Function, IEEE Journal on Selected Areas in Communications (JSAC), 2000