Generic stationary backoff distributions for distributed multiple access control

In this paper, we study the characteristics of two different backoff schemes: one that maximizes the channel utilization and one that maximizes the probability of a successful transmission. Our results indicate that while the latter provides slightly lower channel utilization, its shape is much less sensitive to the number of contending nodes. That is, the channel utilization is kept almost constant for a very wide range of node densities if the backoff distribution has increasing shape. This motivates us to propose a simple heuristic backoff scheme called the Truncated Geometric Backoff Distribution (TGBD). We provide simple analytical expressions for the probability of a successful transmission and the channel utilization. We also show that the TGBD can easily be extended to support service differentiation by adjusting the window lengths, and we provide a simple approximation that gives the relative share of the capacity for a node in a priority class compared to nodes in other classes. This extended backoff scheme easily outperforms the much more complex Quality of Service (QoS) standard, IEEE802.11e EDCA. Finally, a two-stage backoff model, based on the TGBD, is proposed that further increases the probability of a successful transmission. Results indicate that the channel utilization is almost independent of the number of contending nodes.

[1]  Marco Conti,et al.  Runtime optimization of IEEE 802.11 wireless LANs performance , 2004, IEEE Transactions on Parallel and Distributed Systems.

[2]  Nitin H. Vaidya,et al.  A wireless MAC protocol using implicit pipelining , 2006, IEEE Transactions on Mobile Computing.

[3]  H. T. Mouftah,et al.  A self-optimized random access protocol for an infrastructure-less mission critical wireless networking system , 2013, Telecommun. Syst..

[4]  L. Kleinrock,et al.  Packet Switching in Radio Channels: Part I - Carrier Sense Multiple-Access Modes and Their Throughput-Delay Characteristics , 1975, IEEE Transactions on Communications.

[5]  Pranesh Sthapit,et al.  Medium reservation based sensor MAC protocol for low latency and high energy efficiency , 2013, Telecommun. Syst..

[6]  Greger Wikstrand,et al.  Prioritized Repeated Eliminations Multiple Access: A Novel Protocol for Wireless Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[7]  Eitan Altman,et al.  New Insights From a Fixed-Point Analysis of Single Cell IEEE 802.11 WLANs , 2007, IEEE/ACM Transactions on Networking.

[8]  Li Yun,et al.  A Novel Random Backoff Algorithm to Enhance the Performance of IEEE 802.11 DCF , 2006 .

[9]  Yang-Sheng Chen,et al.  Nonpreemptive priority scheme for the S-MAC protocol in multimedia mobile sensor networks , 2013, Telecommun. Syst..

[10]  Shugong Xu,et al.  Does the IEEE 802.11 MAC protocol work well in multihop wireless ad hoc networks? , 2001, IEEE Commun. Mag..

[11]  Hesham El Gamal,et al.  Correlated sources over wireless channels: cooperative source-channel coding , 2004, IEEE Journal on Selected Areas in Communications.

[12]  A. M. Abdullah,et al.  Wireless lan medium access control (mac) and physical layer (phy) specifications , 1997 .

[13]  Christian Bonnet,et al.  Optimal Constant-Window Backoff Scheme for IEEE 802.11 DCF in Single-Hop Wireless Networks Under Finite Load Conditions , 2007, Wirel. Pers. Commun..

[14]  Marco Conti,et al.  Dynamic tuning of the IEEE 802.11 protocol to achieve a theoretical throughput limit , 2000, TNET.

[15]  Marco Conti,et al.  Optimal capacity of p-persistent CSMA protocols , 2003, IEEE Communications Letters.

[16]  Jari Nieminen,et al.  Multichannel Communications in Wireless Automation: Interdependencies between Communication and Control Parameters , 2012, Int. J. Distributed Sens. Networks.

[17]  Y. C. Tay,et al.  Collision-minimizing CSMA and its applications to wireless sensor networks , 2004, IEEE Journal on Selected Areas in Communications.

[18]  Shugong Xu,et al.  Does the ieee 802 , 2001 .