A smart exponential-threshold-linear backoff mechanism for IEEE WLANs
|
|
- Howard Morris
- 6 years ago
- Views:
Transcription
1 INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS Int. J. Commun. Syst. 2011; 24: Published online 13 January 2011 in Wiley Online Library (wileyonlinelibrary.com) A smart exponential-threshold-linear backoff mechanism for IEEE WLANs Chih-Heng Ke 1, Chih-Cheng Wei 2, Kawuu W. Lin 2,, and Jen-Wen Ding 3 1 Department of Computer Science and Information Engineering, National Quemoy University, Kinmen, Taiwan 2 Department of Computer Science and Information Engineering, National Kaohsiung University of Applied Sciences, Kaohsiung, Taiwan 3 Department of Information Management, National Kaohsiung University of Applied Sciences, Kaohsiung, Taiwan SUMMARY Based on the standardized IEEE Distributed Coordination Function (DCF) protocol, this paper proposes a new backoff mechanism, called Smart Exponential-Threshold-Linear (SETL) Backoff Mechanism, to enhance the system performance of contention-based wireless networks. In the IEEE DCF scheme, the smaller contention window (CW) will increase the collision probability, but the larger CW will delay the transmission. Hence, in the proposed SETL scheme, a threshold is set to determine the behavior of CW after each transmission. When the CW is smaller than the threshold, the CW of a competing station is exponentially adjusted to lower collision probability. Conversely, if the CW is larger than the threshold, the CW size is tuned linearly to prevent large transmission delay. Through extensive simulations, the results show that the proposed SETL scheme provides a better system throughput and lower collision rate in both light and heavy network loads than the related backoff algorithm schemes, including Binary Exponential Backoff (BEB), Exponential Increase Exponential Decrease (EIED) and Linear Increase Linear Decrease (LILD). Copyright 2011 John Wiley & Sons, Ltd. Received 20 April 2010; Revised 9 August 2010; Accepted 11 October 2010 KEY WORDS: DCF; backoff algorithm; contention window; BEB; EIED; LILD 1. INTRODUCTION Wireless local area networks (WLANs) have recently gained widespread popularity and have consequently become ubiquitous in our society. An increasing number of wireless mobile computing devices are being introduced, including portables, palmtops and personal digital assistants. WLANs have been successfully adopted in many domains, such as health-care, manufacturing, retail outlets, warehousing, libraries and academia. WLANs have been widely deployed and thus people can now easily access the Internet using wireless services, and nowadays are quite familiar with transmitting multimedia contents, voice and video over WLANs. The dominant standard for WLANs is the IEEE protocol [1]; It includes detailed specifications both for Medium Access Control (MAC) and Physical Layer (PHY). In WLANs, the media constituting PHY is shared by all mobile stations and has a limited connection range. The MAC protocol provides the contention-free Point Coordination Function (PCF) and the contention-based Distributed Coordination Function (DCF) to access the shared wireless channel. The results of many studies have shown that currently designed PCF is not able to guarantee sufficient QoS Correspondence to: Kawuu W. Lin, Department of Computer Science and Information Engineering, National Kaohsiung University of Applied Sciences, Kaohsiung, Taiwan. linwc@cc.kuas.edu.tw Copyright 2011 John Wiley & Sons, Ltd.
2 1034 C.-H. KE ET AL. [2 4]. Further, the DCF is imperative for IEEE products. Therefore, we will only focus on how to improve the performance of IEEE DCF. In the IEEE protocol, DCF is the fundamental method of access used to support asynchronous data transfer on a best effort basis. The DCF is based on Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA), in which all stations compete for the wireless channel with the same priority. Binary Exponential Backoff (BEB) with CSMA/CA is employed as a scheme of obtaining stability and enabling the media to be shared. At the first transmission attempt of a packet, all competing stations randomly select the backoff time according to the BEB scheme which is set from a uniform distribution over the interval [0,CW min 1], where CW min is the minimum contention window (CW) size. Every time a station experiences transmission collision, the CW size doubles up to its maximum CW max. And the new CW is used for the following transmission attempt. Following a successful transmission, the station resets its CW size to the minimum size. However, the CW resetting mechanism of BEB causes a very large variation in the CW size, and degrades the performance of a network when it is heavily loaded since each new packet starts with the CW min, which increases the probability of collision. Accordingly, there have been many proposals for improving the performance. The mechanism of Exponential Increase Exponential Decrease (EIED) [5] suggests a slower reduction of the CW after a successful transmission. In the EIED mechanism, the CW is doubled after a collision and halved after a successful transmission. This improves the performance if the number of competing stations is large. The CW size is thus kept large in order to avoid frequent collisions, but the rapid variations in CW size may be too sensitive to adapt to the network load. Another algorithm, Linear Increase Linear Decrease (LILD), which is based on Multiple Increase Linear Decrease (MILD) originally proposed in [6], provides better performance than DCF and EIED mechanisms when the number of stations is large. In the LILD mechanism, the CW is plus one or CW min after a collision and minus one or CW min after a successful transmission. Other contention resolution mechanisms have also been proposed to improve the network performance of IEEE DCF. Most of them, however, require an exchange of information between stations and complicated computation [7 10]. These algorithms are not considered here and we consider only acknowledgment based on the backoff algorithm. The remainder of this paper is organized as follows. Section 2 reviews the DCF and describes various schemes presented in the literature that were designed to improve the performance of contention-based wireless networks. Section 3 introduces the proposed scheme and presents an analytical model in detail. Model validation, a simulation and experimental results are presented in Section 4. Section 5 concludes the paper and discusses future works. 2. RELATED WORKS 2.1. IEEE DCF DCF is the primary access protocol of the IEEE standard for stations to share the wireless medium with the same priority. DCF is basically a CSMA/CA. Each station with a new packet ready for transmission monitors the channel activity. If a station senses that the medium has been idle, the transmission may begin. If it senses that the channel is busy, the station will wait until it senses that the medium is idle again after which the station is then allowed to transmit. The basic access mechanism of DCF is shown in a simple diagram in Figure 1. First, a station with a new packet to transmit senses the channel state until it senses that the channel is idle, then waits longer for a DIFS period and generates a backoff time in a CW state. The IEEE DFC uses the BEB algorithm. The backoff timer is uniformly chosen in the range (0, W i 1). CW is also known as contention window, which is an integer with the range determined by the PHY characteristics between a minimum value of CW min and a maximum value of CW max,andwithw i as the current CW. The number of failed transmissions of the same packet is represented by i. At the first transmission attempt, the CW is set at W 0 =CW min. After each unsuccessful transmission, CW is doubled and W i =2 W i 1 =2 i CW min, until the maximum value CW max =2 m CW min is
3 AN SETL BACKOFF MECHANISM FOR IEEE WLANS 1035 Figure 1. Basic mechanism of DCF. Figure 2. Backoff algorithm for the DCF scheme. Figure 3. CW variation in the BEB scheme. reached. m is the maximum number of backoff stages. Conversely, for each successful transmission, CW will reset to the minimum value CW min. In the IEEE DCF standard for the Direct Sequence Spread Spectrum (DSSS) physical channel, CW min =32, CW max =1024 and m =5. Figure 2 presents a diagram of the transitions in a backoff stage in the BEB scheme. The values CW min and CW max are assumed to be 32 and The CW variations of the BEB scheme are illustrated in Figure 3.
4 1036 C.-H. KE ET AL. Figure 4. Backoff algorithm for the EIED scheme. Figure 5. CW variation in the EIED scheme EIED backoff scheme As mentioned in Section 2.1, the IEEE DCF uses the BEB scheme to enable active stations to compete accessing the medium. Another alternative backoff scheme, called EIED [5], has been proposed in order to lower the collision probability and improve performance. In EIED, whenever a packet transmitted from a station is involved in a collision, the CW size for that station is increased by backoff factor r I, and the CW for that station is decreased by backoff factor r D after a successful transmission. The EIED backoff algorithm is represented by the following: W i =min[ri W i 1,CW max ] for a collision, and W i =max[w i 1 /r D,CW min ] for a successful transmission. For r I =r D =2, the CW both increases and decreases exponentially. Whenever a successful transmission occurs, this does not mean that the number of competing stations has been reduced. Thus, to prevent CW from immediately returning to the initial state CW min and increasing the probability of collision, the EIED aims to reduce the CW slowly, exponentially, after a successful transmission. A diagram of the transitions in a backoff stage for EIED is shown in Figure 4, and variations in the CW in the EIED scheme are shown in Figure LILD scheme In [5], another backoff scheme is proposed, called MILD; after a successful transmission the CW is reduced by one to CW min, and multiplied by 1.5 to the maximum CW max. The backoff algorithm
5 AN SETL BACKOFF MECHANISM FOR IEEE WLANS 1037 Figure 6. Backoff algorithm for the LILD scheme. of MILD could be expressed as follows: W i =min[wi 1 1.5,CW max] for a collision, and W i =max[w i 1 1,CW min ] for a successful transmission. The LILD scheme also represents an improvement of the MILD mechanism, as it increases and decreases the CW size linearly. Therefore, regardless of whether a transmission succeeds or fails, the CW changes with the value of CW min, and is also limited by CW max and CW min. The backoff algorithm of LILD is represented by the following. W i =min[w i 1 +CW min,cw max ] for a collision, and W i =max[w i 1 CW min,cw min ] for a successful transmission. The LILD linearly slows down or increases the variations in CW. When a station faces many collision incidents and its CW is in the higher region, a slow linear decrease in CW after successful transmission will help resolve contention. The network load may be still heavy. Keeping the CW in the higher region can help avoid contention occurrence. A diagram of the transitions in a backoff stage for LILD is shown in Figure Comparison of the related works For contention-based DCF, the adjustment of CW is very important. A proper tuning of the CW resolution mechanism that is coordinated with the network load will improve the system s throughput and prevent transmission collision. As mentioned above, the EIED mechanism provides a rapid variation of CW, and is suitable for an environment with fewer competing stations and a light network load. The LILD, on the other hand, changes the CW slowly, which makes it suitable for heavy network loads with a large number of competing stations. There is a tradeoff between the waste of transmission time and the risk of collision followed by retransmission. To address this tradeoff, we propose a new backoff algorithm, called Smart Exponential Threshold Linear backoff algorithm scheme (SETL), that combines the advantages of EIED and LILD. Furthermore, we adjust the policy after a successful transmission to further improve the performance of IEEE DCF. 3. THE PROPOSED SCHEME As shown in the comparison in Section 2, the EIED mechanism performs better than the LILD mechanism with a light network load of less competing stations. Conversely, the LILD mechanism performs better than the EIED mechanism when the network load is heavy with more competing stations. In order to enhance the performance in both a light and heavy network load environment, we combine the advantages of the EIED and LILD mechanisms in order to adapt to the conditions of a wireless network. In the proposed SETL backoff algorithm, a threshold value of CW, CW Threshold, is set in order to determine whether there are more or less competing stations in the WLANs. If the current CW size of a competing station is more than the CW Threshold, the CW is in the higher region, which means that the competing station has retransmitted many times due to a collision
6 1046 C.-H. KE ET AL Normalized saturation throughput with different counter 'S' Normalized Saturation Throughput "stations=10" "stations=30" "stations=50" "stations=70" "stations=90" "stations=110" "stations=130" "stations=150" Continuous consecutive successful counter 'S' Figure 15. Normalized saturation throughput with different counter S. Collision Rate (%) Collision rate with different counter 'S' "stations=10" "stations=30" "stations=50" "stations=70" "stations=90" "stations=110" "stations=130" "stations=150" Continuous consecutive successful counter 'S' Figure 16. Collision rate with different counter S. consecutive successful transmission counter S, the SETL scheme is stably tuned to prevent the CW from being directly reduced after each successful transmission, which invites the probability of collision. We validated our analysis model by means of simulations, and from the results of our experiments, we confirmed that the SETL works better than other related backoff schemes, offering higher saturation throughput and a lower collision rate. In our future work, we are interested in applying the SETL scheme to a contention-based wireless network of multi-rate environment. By adjusting the continuous consecutive successful transmission counter S to assign different transmitting priorities for different transmission rates, performance can be improved even further. REFERENCES 1. IEEE standard for Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications. ISO/IEC :1999(E), August Kuo WK, Chan CY, Chen KC. Time bounded services and mobility management in IEEE wireless LANs. Proceedings of the IEEE Personal Wireless Communication Conference, Mumbai, India, 1997;
7 AN SETL BACKOFF MECHANISM FOR IEEE WLANS Visser MA, Zarki ME. Voice and data transmission over an wireless network. Proceedings of the Personal, Indoor and Mobile Radio Communications Conference, Toronto, Ont., Canada, vol. 2, September 1995; Sanchez J, Martinez R, Marcellin MW. A survey of MAC protocols for wireless ATM. IEEE Network 1997; 11: Song N, Kwak B, Song J, Miller LE. Enhancement of IEEE distributed coordination function with exponential increase exponential decrease backoff algorithm. The 57th IEEE Semiannual Spring VTC, Orlando, FL, U.S.A., vol. 4, Bharghavan V, Demers A, Shenker S, Zhang L. MACAW: a media access protocol for wireless LAN s. Proceeding ACK SIGCOMM 94, London, England, Bianchi G, Fratta L, Oliveri M. Performance evaluation and enhancement of the CSMA/CA MAC protocol for wireless LANs. Proceedings of PIMRC 96, Taipei, Taiwan, October 1996; Cali F, Conti M, Gergori E. Dynamic tuning of the IEEE protocol to achieve a theoretical throughput limit. IEEE/ACM Transactions on Networking 2000; 8(6): Qiao D, Shin KG. UMAV: a simple enhancement to the IEEE DCF. Proceedings of the 36th Hawaii International Conference on System Science (HICSS-36), Hawaii, January Deng DJ, Ke CH, Chen HH, Huang YM. Contention window optimization for IEEE DCF access control. IEEE Transactions on Wireless Communications 2008; 7(12): Natkanies M, Pach AR. An analysis of the backoff mechanism used in IEEE networks. IEEE Symposium on Computer and Communication, Antibes-Juan les Pins, France, July 2000; Wu H, Peng Y, Long K, Cheng S. A simple model of IEEE Wireless LAN. IEEE International Conference on Info-tech and Info-net, Beijing, China, vol. 2, November 2001; Wu H, Cheng S, Peng Y, Long K, Ma J. IEEE distributed coordination function (DCF) analysis and enhancement. IEEE International Conference on Communications, New York, NY, U.S.A., vol. 1(28), May 2002; Kwak BJ, Song NO, Miller LE. Analysis of the stability and performance of exponential backoff. IEEE Wireless Communications and Networking Conference, New Orleans, LA, U.S.A., vol. 3(3), 2003; Xiao Y. Backoff-based priority schemes for IEEE IEEE International Conference on Communications 2003, Anchorage, AK, U.S.A., vol. 3, May 2003; Velkov ZH, Spasenovski B. Saturation throughput-delay analysis of IEEE DCF in fading channel. IEEE International Conference on Communications 2003, Anchorage, AK, U.S.A., vol. 1, May 2003; Chatzimisios P, Boucouvalas AC, Vitsas V. IEEE packet delay a finite retry limit analysis. IEEE Global Telecommunications Conference 2003, San Francisco, U.S.A., vol. 2, 2003; Chen H, Li Y. Performance model of IEEE DCF with variable packet length. IEEE Communications Letters 2004; 8(3): Bianchi G. Performance analysis of the IEEE distributed coordination function. IEEE Journal on Selected Areas in Communication 2000; 18(3): The Network Simulator NS-2. Available from: AUTHORS BIOGRAPHIES Chih-Heng Ke received his BS and PhD degrees in Electrical Engineering from the National Cheng-Kung University, in 1999 and He is an assistant professor of Computer Science and Information Engineering, in the National Quemoy University, Kinmen, Taiwan. His current research interests include multimedia communications, wireless network, and QoS network. Chih-Cheng Wei received the BS degree from the Electrical Engineering Department, National Central University, Taiwan in 1991 and the MS degree in Computer Science and Information Engineering from the National Kinmen Institute of Technology, Kinmen, Taiwan in He is now a PhD student in the Electronics Department of the National Kaohsiung University of Applied Sciences. His research interests are performance evaluation and optimization in wireless networks.
8 1048 C.-H. KE ET AL. Kawuu W. Lin received the BS from the Department of Computer Science and Information Engineering, National Taiwan University (NTU), Taiwan, 1999, and received his PhD from the Department of Computer Science and Information Engineering, National Cheng-Kung University (NCKU), Taiwan, Since August 2007, he has been an assistant professor in the Department of Computer Science and Information Engineering, National Kaohsiung University of Applied Sciences (KUAS), Taiwan. His research interests include data mining and its applications, sensor technologies, and parallel and distributed computing. He is a member of Phi Tau Phi honorary society, and has won the Phi Tau Phi Scholastic Honor in Jen-Wen Ding is an Associate Professor in the Department of Information Management, the National Kaohsiung University of Applied Sciences, Kaohsiung, Taiwan. He received his BS, MS, and PhD degrees in Engineering Science from the National Cheng Kung University, Tainan, Taiwan, in 1996, 1998, and 2001, respectively. His research interests include video streaming and multimedia communications. He has authored/co-authored over 30 refereed papers in journals, conference, and workshop proceedings. He also holds several patents in multimedia storage and communications. He received the Best Paper Award of 2007 Asia-Pacific Workshop on Visual Information Processing (VIP 2007) and Acer Long-Term Prize in Dr Ding was the Editor of the proceeding of 2008 Pacific-Rim Conference on Multimedia (PCM 2008) and the Guest Editor of the Special Issue on Ubiquitous Multimedia Computing: Systems, Networking, and Applications for International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC). He has been invited to serve on the technical program committee at many national and international conferences. He is also a member of the IEEE as well as of IEEE Circuits and Systems Society.
A Comparative Analysis on Backoff Algorithms to Optimize Mobile Network
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.771
More informationAN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS
AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE 802.11 NETWORKS Marek Natkaniec, Andrzej R. Pach Department of Telecommunications University of Mining and Metallurgy al. Mickiewicza 30, 30-059 Cracow
More informationA Backoff Algorithm for Improving Saturation Throughput in IEEE DCF
A Backoff Algorithm for Improving Saturation Throughput in IEEE 80.11 DCF Kiyoshi Takahashi and Toshinori Tsuboi School of Computer Science, Tokyo University of Technology, 1404-1 Katakura, Hachioji, Tokyo,
More informationMohammad Hossein Manshaei 1393
Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 An Analytical Approach: Bianchi Model 2 Real Experimentations HoE on IEEE 802.11b Analytical Models Bianchi s Model Simulations ns-2 3 N links with the
More informationAn Efficient Backoff Algorithm for QoS Guaranteeing in Wireless Networks
An Efficient Backoff Algorithm for QoS Guaranteeing in Wireless Networks Xinhua Liu, Guojun Ma, HaiLan Kuang, Fangmin Li School of Information Engineering, Wuhan University of Technology, Wuhan, 430070
More informationPerformance Evaluation of Different Backoff Algorithms in IEEE Using Double Sensing
Indonesian Journal of Electrical Engineering and Computer Science Vol. 5, No. 2, February 2017, pp. 376 ~ 382 DOI: 10.11591/ijeecs.v5.i2.pp376-382 376 Performance Evaluation of Different Backoff Algorithms
More informationPerformance Comparison of IEEE e EDCA and b DCF Under Non- Saturation Condition using Network Simulator
Research Journal of Applied Sciences, Engineering and Technology 4(22): 4748-4754, 212 ISSN: 24-7467 Maxwell Scientific Organization, 212 Submitted: April 3, 212 Accepted: April 23, 212 Published: November
More informationEnhanced high-performance distributed coordination function for IEEE multi-rate LANs
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS Int. J. Commun. Syst. 2009; 22:1045 1061 Published online 27 May 2009 in Wiley InterScience (www.interscience.wiley.com)..1025 Enhanced high-performance distributed
More informationN-BEB: New Binary Exponential Back-off Algorithm for IEEE
N-BEB: New Binary Exponential Back-off Algorithm for IEEE 802.11 Mohammad Shurman 1, Bilal Al-Shua'b 2 (1) Jordan University of Science and Technology/Network Engineering and Security Department, Irbid,
More informationEnhancements and Performance Evaluation of Wireless Local Area Networks
Enhancements and Performance Evaluation of Wireless Local Area Networks Jiaqing Song and Ljiljana Trajkovic Communication Networks Laboratory Simon Fraser University Burnaby, BC, Canada E-mail: {jsong,
More informationThe MAC layer in wireless networks
The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?
More informationComparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function
Comparison of pre-backoff and post-backoff procedures for IEEE 802.11 distributed coordination function Ping Zhong, Xuemin Hong, Xiaofang Wu, Jianghong Shi a), and Huihuang Chen School of Information Science
More informationAnalysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm
International Journal of Computer Applications (975 8887) Volume 6 No.8, July Analysis of Throughput and Energy Efficiency in the IEEE 8. Wireless Local Area Networks using Constant backoff Window Algorithm
More informationProject Report: QoS Enhancement for Real-Time Traffic in IEEE WLAN
Project Report: QoS Enhancement for Real-Time Traffic in IEEE802.11 WLAN Abstract A key issue in IEEE802.11 WLAN MAC is how to provide QoS support, especially for time-bounded traffic. Although much work
More informationAGOOD medium access control (MAC) protocol for wireless
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 3, NO. 3, MAY 2004 793 Design of MAC Protocols With Fast Collision Resolution for Wireless Local Area Networks Younggoo Kwon, Yuguang Fang, Senior Member,
More informationEVALUATION OF EDCF MECHANISM FOR QoS IN IEEE WIRELESS NETWORKS
MERL A MITSUBISHI ELECTRIC RESEARCH LABORATORY http://www.merl.com EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE802.11 WIRELESS NETWORKS Daqing Gu and Jinyun Zhang TR-2003-51 May 2003 Abstract In this paper,
More informationInternational Journal of Technical Research and Applications e-issn: , Special, Issue 43 (March 2017), PP.
COMPARATIVE STUDY OF DIFFERENT BACKOFF ALGORITHMS IN IEEE 802.11 DCF MAC PROTOCOL 1 Aditi Harugade, 2 Priyanka Karunglikar, 3 Damini Jadhav, 4 Prem Kumar, 5 T.N. Sawant 1,2,3,4,5 Electronics and Telecommunication
More informationTHE wireless local area network (WLAN) is emerging as. A Multichain Backoff Mechanism for IEEE WLANs Shiang-Rung Ye and Yu-Chee Tseng
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 55, NO. 5, SEPTEMBER 2006 1613 A Multichain Backoff Mechanism for IEEE 802.11 WLANs Shiang-Rung Ye and Yu-Chee Tseng Abstract The distributed coordination
More informationResearch Article 2017
International Journal of Emerging Research in Management &Technology Research Article May 2017 Special Issue of International Conference on Emerging Trends in Science & Engineering (ICETSE 2017) Conference
More informationImpact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11
More informationThe MAC layer in wireless networks
The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?
More informationPriority Collision Resolution - Distributed Coordination Function for Distributed Wireless Networks
Priority Collision Resolution - Distributed Coordination Function for Distributed Wireless etworks Xiaohui Ye *, Xin Liu #, S. J. Ben Yoo *, and Zhi Ding * * Department of Electrical and Computer Engineering,
More informationAn Efficient Scheduling Scheme for High Speed IEEE WLANs
An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological
More informationACK-based QoS Support and Throughput Improvement over WLANs
ACK-based QoS Support and Throughput Improvement over 802.11 WLANs Mehmet Fatih Tüysüz Department of Computer Engineering Harran University ftuysuz@harran.edu.tr ABSTRACT In IEEE 802.11 wireless network
More informationInternational Journal of Emerging Technology and Advanced Engineering Website: (ISSN , Volume 2, Issue 1, January 2012)
Performance Improvement of 802.11 MAC by enhancements in DCF Vikram Jain 1, Siddharth Dutt Choubey 2, Rohit Singh 3, Sandeep Gupta 4 1 Research Scholar, Singhania University, INDIA 2,3,4 ME / MTech (CS
More informationSimulation Based Analysis of the Impact of Hidden Terminal to the TCP Performance in Mobile Ad Hoc Networks
Simulation Based Analysis of the Impact of Hidden Terminal to the TCP Performance in Mobile Ad Hoc Networks Abstract The hidden terminal is classified as the sending hidden terminal and receiving hidden
More informationCollision Probability in Saturated IEEE Networks
in Saturated IEEE 80.11 Networks Hai L. Vu Centre for Advanced Internet Architectures (CAIA) ICT Faculty, Swinburne University of Technology Hawthorn, VIC 31, Australia h.vu@ieee.org Taka Sakurai ARC Special
More informationPerformance analysis of the IEEE MAC protocol for wireless LANs
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS Int. J. Commun. Syst. 25; 18:545 569 Published online 2 June 25 in Wiley InterScience (www.interscience.wiley.com). DOI: 1.12/dac.717 Performance analysis
More informationPerformance analysis of Internet applications over an adaptive IEEE MAC architecture
Journal of the Franklin Institute 343 (2006) 352 360 www.elsevier.com/locate/jfranklin Performance analysis of Internet applications over an adaptive IEEE 802.11 MAC architecture Uthman Baroudi, Mohammed
More informationMedia Access Control in Ad Hoc Networks
Media Access Control in Ad Hoc Networks The Wireless Medium is a scarce precious resource. Furthermore, the access medium is broadcast in nature. It is necessary to share this resource efficiently and
More informationCSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology
CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Local Area Networks (WLANs) Part I Almost all wireless LANs now are IEEE 802.11
More informationDynamic Power Control MAC Protocol in Mobile Adhoc Networks
Dynamic Power Control MAC Protocol in Mobile Adhoc Networks Anita Yadav Y N Singh, SMIEEE R R Singh Computer Science and Engineering Electrical Engineering Computer Science and Engineering Department Department
More informationPAPER Analysis of an Adaptive P-Persistent MAC Scheme for WLAN Providing Delay Fairness
IEICE TRANS. COMMUN., VOL.E93 B, NO.2 FEBRUARY 2010 369 PAPER Analysis of an Adaptive P-Persistent MAC Scheme for WLAN Providing Delay Fairness Chih-Ming YEN a), Student Member, Chung-Ju CHANG, Yih-Shen
More informationEmpirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks
Empirical Study of Mobility effect on IEEE 802.11 MAC protocol for Mobile Ad- Hoc Networks Mojtaba Razfar and Jane Dong mrazfar, jdong2@calstatela.edu Department of Electrical and computer Engineering
More informationA Survey: Optimization of Backoff Algorithm for Wireless Mobile Adhoc Network
A Survey: Optimization of Backoff Algorithm for Wireless Mobile Adhoc Network Neetesh Nema Mahendra Rai M.E.( Computer Science and Engineering) H.O.D.(Department of Information Technology) (0205cs10me08)
More informationFairness Enhancement Scheme for Multimedia Applications in IEEE e Wireless LANs
Fairness Enhancement Scheme for Multimedia Applications in IEEE 802.11e Wireless LANs Young-Woo Nam, Sunmyeng Kim, and Si-Gwan Kim Department of Computer Software Engineering Kumoh National Institute of
More informationA Survey on Modified RTS/CTS Mechanism
A Survey on Modified RTS/CTS Mechanism Prachi Srivastava Computer Science and Engineering, MMMEC, Gorakhpur prachi.srivastava.itm@gmail.com Dayashankar Singh Computer Science and Engineering, MMMEC, Gorakhpur
More informationPerformance evaluation and enhancement of WLAN
Performance evaluation and enhancement of WLAN (CMPT885 / ENSC835) Jiaqing (James) Song songs@acm.org Spring 2002 Table of Contents Introduction to WLAN Performance enhancement Implementation with OPNET
More informationA QUANTITATIVE ANALYSIS OF HANDOVER TIME AT MAC LAYER FOR WIRELESS MOBILE NETWORKS
A QUANTITATIVE ANALYSIS OF HANDOVER TIME AT MAC LAYER FOR WIRELESS MOBILE NETWORKS Syed S. Rizvi 1, Aasia Riasat 2, and Khaled M. Elleithy 3 1 Computer Science and Engineering Department, University of
More informationMedium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols
Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the
More informationCOLLISION-AWARE ADAPTION OF CONTENTION WINDOW IN E WIRELESS LAN
COLLISION-AWARE ADAPTION OF CONTENTION WINDOW IN 802.11E WIRELESS LAN Shih-Wei Pan, Jung-Shyr Wu and Ming-Wei You Department of Communication Engineering, National Central University, JhungLi City, Taiwan
More informationAccountability of WMNs using BEB Algorithm
Accountability of WMNs using BEB Algorithm Shafi Jasuja Department of Information Technology Chandigarh Engineering College, Landran, Mohali, Punjab, India Parminder Singh Department of Information Technology
More informationAn Approach for Improving Performance of Back off Algorithm
International Journal of Computer Applications (975 8887) Volume 46 No.5, May 212 An Approach for Improving Performance of Back off Algorithm Swati Bhagoria Computer Engineering Department Shri G.S. Institute
More informationPERFORMANCE ENHANCEMENT OF WLAN IEEE FOR ASYMMETRIC TRAFFIC
PERFORMANCE ENHANCEMENT OF WLAN IEEE 802.11 FOR ASYMMETRIC TRAFFIC Elena Lopez-Aguilera, Jordi Casademont, Josep Cotrina, Alfonso Rojas Wireless Networks Group - Telematics Department Technical University
More informationMohamed Khedr.
Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing
More informationSaturation Throughput of IEEE e EDCA Based on Mean Value Analysis
Saturation Throughput of IEEE 80.11e EDCA Based on Mean Value Analysis Yuxia Lin and Vincent W.S. Wong Department of Electrical and Computer Engineering The University of British Columbia 33 Main Mall,
More informationIEEE Throughput and Delay Analysis for mixed real time and normal data traffic
IEEE 802.11 Throughput and Delay Analysis for mixed real time and normal data traffic Matias Arenas P. and Walter Grote H. Department of Electronic Engineering, Federico Santa Maria Technical U. Avenida
More informationAdaptive Fair Channel Allocation for QoS Enhancement in IEEE Wireless LANs
Adaptive Fair Channel Allocation for QoS Enhancement in IEEE 82.11 Wireless LANs Mohammad Malli, Qiang Ni, Thierry Turletti, Chadi Barakat Projet Planète, INRIA-Sophia Antipolis, France E-mail: mmalli,
More informationCSE 461: Wireless Networks
CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network
More informationWireless Local Area Networks (WLANs) Part I
Wireless Local Area Networks (WLANs) Part I Raj Jain Professor of CSE Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-08/
More informationIEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 53, NO. 4, JULY
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 53, NO. 4, JULY 2004 1235 A New Collision Resolution Mechanism to Enhance the Performance of IEEE 802.11 DCF Chonggang Wang, Bo Li, Senior Member, IEEE,
More informationEVALUATION OF BACK-OFF ALGORITHM PERFORMANCE OF MAC LAYER IEEE WLAN
EVALUATION OF BACK-OFF ALGORITHM PERFORMANCE OF MAC LAYER IEEE 802.11 WLAN 1 Khan Tazeem Ahmad, 2 Beg M. T., & 3 Khan M. A. 1,2 Department of ECE, Faculty of Engineering & Technology, Jamia Millia Islamia,New
More informationTarek Sheltami. CCSE COE 3/8/2008 1
Mobile Ad hoc Networks COE 549 Random Access I Tarek Sheltami KFUPM CCSE COE http://faculty.kfupm.edu.sa/coe/tarek/coe549.htm 3/8/2008 1 Outline Medium Access Control Protocols ALOHA BTMA CSMA Some simulation
More informationWireless MACs: MACAW/802.11
Wireless MACs: MACAW/802.11 Mark Handley UCL Computer Science CS 3035/GZ01 Fundamentals: Spectrum and Capacity A particular radio transmits over some range of frequencies; its bandwidth, in the physical
More informationNew Algorithm for High Throughput of IEEE Distributed Coordination Function
Sadiq H. Abdulhussain Dheyaa J. Kadhim Basheera M. Ridha Amna M. Abbas Department of Electrical Engineering, College of Engineering, University of Baghdad, Baghdad, Iraq New Algorithm for High Throughput
More informationA Method of Identifying the P2P File Sharing
IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.11, November 2010 111 A Method of Identifying the P2P File Sharing Jian-Bo Chen Department of Information & Telecommunications
More informationWireless Local Area Network (IEEE )
Wireless Local Area Network (IEEE 802.11) -IEEE 802.11 Specifies a single Medium Access Control (MAC) sublayer and 3 Physical Layer Specifications. Stations can operate in two configurations : Ad-hoc mode
More informationEvaluation of the backoff procedure of Homeplug MAC vs. DCF
Evaluation of the backoff procedure of Homeplug MAC vs. DCF Cristina Cano and David Malone Hamilton Institute National University of Ireland, Maynooth Co. Kildare, Ireland Email: {cristina.cano,david.malone}@nuim.ie
More informationPerformance anomaly of b
Laboratoire LSR Logiciels Systèmes Réseaux Software, Systems, Networks Performance anomaly of 802.11b Andrzej Duda LSR-IMAG Andrzej.Duda@imag.fr Joint work with Martin Heusse, Franck Rousseau, Gilles Berger-Sabbatel
More informationExpanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks
Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE 802.11 networks Christos Chousidis, Rajagopal Nilavalan School of Engineering and Design Brunel University London, UK {christos.chousidis,
More informationPrioritization scheme for QoS in IEEE e WLAN
Prioritization scheme for QoS in IEEE 802.11e WLAN Yakubu Suleiman Baguda a, Norsheila Fisal b a,b Department of Telematics & Communication Engineering, Faculty of Electrical Engineering Universiti Teknologi
More informationE-BEB Algorithm to Improve Quality of Service on Wireless Ad-Hoc Networks
Research Journal of Applied Sciences, Engineering and Technology 4(7): 807-812, 2012 ISSN: 2040-7467 Maxwell Scientific Organization, 2012 Submitted: vember 10, 2011 Accepted: December 09, 2011 Published:
More informationRahman 1. Application
Data Link layer Overview of IEEE 802.11 Application Presentation Session Transport LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform
More informationDepartment of Electrical and Computer Systems Engineering
Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)
More informationComparison of the Quality of Service (QoS) on the IEEE e and the g Wireless LANs
ENSC 427: COMMUNICATION NETWORKS Comparison of the Quality of Service (QoS) on the IEEE 802.11e and the 802.11g Wireless LANs Spring 2010 Final Report Group 5 Yalda Hakki (yha17@sfu.ca) Rosy Johal (rja2@sfu.ca)
More informationMaximum Traffic Scheduling and Capacity Analysis for IEEE High Data Rate MAC Protocol
Maximum Traffic Scheduling and Capacity Analysis for IEEE 80..3 High Data Rate MAC Protocol Yi-Hsien Tseng, Eric Hsiao-kuang Wu and Gen-Huey Chen Department of Computer Science and Information Engineering,
More informationInvestigating MAC-layer Schemes to Promote Doze Mode in based WLANs
Investigating MAC-layer Schemes to Promote Doze Mode in 802.11-based WLANs V. Baiamonte and C.-F. Chiasserini CERCOM - Dipartimento di Elettronica Politecnico di Torino Torino, Italy Email: baiamonte,chiasserini
More informationAn Improved IEEE CSMA/CA Medium Access Mechanism Through the Introduction of Random Short Delays
An Improved IEEE 802.11 CSMA/CA Medium Access Mechanism Through the Introduction of Random Short Delays Nirmala Shenoy, John Hamilton, Andres Kwasinski and Kaiqi Xiong Rochester Institute of Technology,
More informationResearch Article Adaptive Backoff Algorithm for Contention Window for Dense IEEE WLANs
Mobile Information Systems Volume 2016, Article ID 8967281, 11 pages http://dx.doi.org/10.1155/2016/8967281 Research Article Adaptive Backoff Algorithm for Contention Window for Dense IEEE 802.11 WLANs
More informationA Performance Analysis of IEEE Networks in the Presence of Hidden Stations
A Performance Analysis of IEEE 802.11 Networks in the Presence of Hidden Stations Marek Natkaniec, Andrzej R. Pach University of Mining and Metallurgy, Department of Telecommunications, Cracow, Poland
More informationA Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment
05 Third International Conference on Artificial Intelligence, Modelling and Simulation A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment Yoshiaki Morino,
More informationPerformance evaluation and enhancement of WLAN
Performance evaluation and enhancement of WLAN (CMPT885 / ENSC835) Demo Plan Jiaqing (James) Song songs@acm.org Spring 2002 Contents of Demo OPNET WLAN Models PHY Characteristics WLAN Parameters Adaptive
More informationThe IEEE Distributed Coordination Function in Small-Scale Ad-Hoc Wireless LANs
International Journal of Wireless Information Networks, Vol. 10, No. 1, January 2003 ( 2003) The IEEE 802.11 Distributed Coordination Function in Small-Scale Ad-Hoc Wireless LANs Eustathia Ziouva and Theodore
More informationExploiting Multi-User Diversity in Wireless LANs with Channel-Aware CSMA/CA
Exploiting Multi-User Diversity in Wireless LANs with Channel-Aware CSMA/CA Xiaowei Wang, Mahsa Derakhshani, Tho Le-Ngoc Department of Electrical & Computer Engineering, McGill University, Montreal, QC,
More informationLow pass filter/over drop avoidance (LPF/ODA): an algorithm to improve the response time of RED gateways
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS Int. J. Commun. Syst. 2002; 15:899 906 (DOI: 10.1002/dac.571) Low pass filter/over drop avoidance (LPF/ODA): an algorithm to improve the response time of
More informationTwo-Tier WBAN/WLAN Healthcare Networks; Priority Considerations
Two-Tier WBAN/WLAN Healthcare Networks; Priority Considerations Saeed Rashwand Department of Computer Science University of Manitoba Jelena Mišić Department of Computer Science Ryerson University Abstract
More informationInitialization Protocols for IEEE Based Ad Hoc Networks Λ
Initialization Protocols for IEEE 802.11-Based Ad Hoc Networks Λ Chih-Shun Hsu and Jang-Ping Sheu Department of Computer Science and Information Engineering National Central University, Chung-Li, 32054,
More informationEnhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks
Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks Jinfang Zhang, Zbigniew Dziong, Francois Gagnon and Michel Kadoch Department of Electrical Engineering, Ecole de Technologie Superieure
More informationResearch Article The Performance Evaluation of an IEEE Network Containing Misbehavior Nodes under Different Backoff Algorithms
Hindawi Security and Communication Networks Volume 7, Article ID 45978, 8 pages https://doi.org/.55/7/45978 Research Article The Performance Evaluation of an IEEE 8. Network Containing Misbehavior Nodes
More informationImproved MAC protocol for urgent data transmission in wireless healthcare monitoring sensor networks
, pp.282-286 http://dx.doi.org/10.14257/astl.2015.116.57 Improved MAC protocol for urgent data transmission in wireless healthcare monitoring sensor networks Rae Hyeon Kim, Jeong Gon Kim 1 Department of
More informationRemarks On Per-flow Differentiation In IEEE
Remarks On Per-flow Differentiation In IEEE 82.11 Imad Aad and Claude Castelluccia PLANETE project, INRIA Rhône-Alpes ZIRST - 655, Avenue de l Europe - Montbonnot. 38334 Saint Ismier Cedex - France [imad.aad,
More informationWireless Networks (MAC)
802.11 Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica 2016.03.18 CSIE, NTU Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online: http://www.sss-mag.com/pdf/802_11tut.pdf
More informationPerformance Improvement In MANET By Using A Modified BEB Algorithm
Performance Improvement In MANET By Using A Modified BEB Algorithm Aparna S. Mankar 1, Mangla S. Madankar 2 1 ME Student, Wireless Communication & Computing, GHRCE Nagpur 2 Assistant Professor, Department
More informationFair and Effective Transmissions in IEEE e WLAN
GESTS Int l Trans. Computer Science and Engr., Vol.19, No.1 17 Fair and Effective Transmissions in IEEE 802.11e WLAN Seongcheol Kim 1 and Jinoo Joung 1 1 Software School, Sangmyung University, Seoul, Korea
More informationKey-Words: Ad hoc network, multimedia, QoS, routing protocol.
Proceedings of the 5th WSEAS International Conference on Applications of Electrical Engineering, Prague, Czech Republic, March 12-14, 26 (pp117-122) Hidden Route Aware QoS Routing Protocol for Mobile Multimedia
More informationCSE 6811 Ashikur Rahman
Data Link layer Application Overview of IEEE 802.11 LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform address recognition and CRC validation.
More informationImplementation of an IEEE Wireless LAN Model using OPNET
Implementation of an IEEE 802.11 Wireless LAN Model using OPNET Rusty O. Baldwin, Nathaniel J. Davis IV, Scott F. Midkiff Bradley Department of Electrical and Computer Engineering Virginia Polytechnic
More informationLogical Link Control (LLC) Medium Access Control (MAC)
Overview of IEEE 802.11 Data Link layer Application Presentation Session Transport LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform
More informationP B 1-P B ARRIVE ATTEMPT RETRY 2 1-(1-P RF ) 2 1-(1-P RF ) 3 1-(1-P RF ) 4. Figure 1: The state transition diagram for FBR.
1 Analytical Model In this section, we will propose an analytical model to investigate the MAC delay of FBR. For simplicity, a frame length is normalized as a time unit (slot). 1.1 State Transition of
More informationAN EFFICIENT MAC PROTOCOL BASED ON HYBRID SUPERFRAME FOR WIRELESS SENSOR NETWORKS
AN EFFICIENT MAC PROTOCOL BASED ON HYBRID SUPERFRAME FOR WIRELESS SENSOR NETWORKS Ge Ma and Dongyu Qiu Department of Electrical and Computer Engineering Concordia University, Montreal, QC, Canada tina0702@gmail.com,
More informationCMPE 257: Wireless and Mobile Networking
CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.
More informationPUBLICATIONS. Journal Papers
PUBLICATIONS Journal Papers [J1] X. Wu and L.-L. Xie, Asymptotic equipartition property of output when rate is above capacity, submitted to IEEE Transactions on Information Theory, August 2009. [J2] A.
More informationWireless Networking & Mobile Computing
Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Lec #4: Medium Access Control - II Tamer Nadeem Dept. of Computer Science IEEE 802.11 Standards Page 2 Spring 2012 CS 752/852 - Wireless
More informationCharacterising the interactions between unicast and broadcast in IEEE ad hoc networks
University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2008 Characterising the interactions between unicast and broadcast in
More informationMultichannel Outage-aware MAC Protocols for Wireless Networks
Submitted - the 4th IEEE Conference on Industrial Electronics and Applications (ICIEA 29) Multichannel Outage-aware MAC Protocols for Wireless Networks Hyukjin Lee and Cheng-Chew Lim School of Electrical
More informationDesign and Analysis of Fragmentation Threshold and Buffer Size of Wireless LAN using OPNET Modeler
Design and Analysis of Fragmentation Threshold and Buffer Size of Wireless LAN using OPNET Modeler Rakesh Kumar 1, Dr. Vishnu Shrivastava 2 1 P.hD. Scholar ECE Department, Vivekanand Global University,
More informationNeighbor-Aware Multiple Access Protocol for 5G mmtc Applications
REVIEWS Neighbor-Aware Multiple Access Protocol for 5G mmtc Applications Yang Yang 1,2, Guannan Song 1,2,3, Wuxiong Zhang 1,2, Xiaohu Ge 4, Chengxiang Wang 5 1 Key Lab of Wireless Sensor Networks & Communications,
More informationPerformance evaluation of IEEE e
IJCSNS International Journal of Computer Science and Network Security, VOL.11 No.7, July 2011 159 Performance evaluation of IEEE 802.11e Sandeep kaur 1, Dr.jyotsna sengupta 2 Department of Computer Science,
More informationECE442 Communications Lecture 3. Wireless Local Area Networks
ECE442 Communications Lecture 3. Wireless Local Area Networks Husheng Li Dept. of Electrical Engineering and Computer Science Spring, 2014 Wireless Local Networks 1 A WLAN links two or more devices using
More informationTransmission Control Protocol over Wireless LAN
Global Journal of Computer Science and Technology Network, Web & Security Volume 12 Issue 17 Version 1.0 Year 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
More information