A Team Study of a Multiple-Power Wireless Random Channel Access Mechanism with Capture Effect

We present a team analysis of a slotted random wireless channel access mechanism. Under the proposed scheme, denoted wireless random access mechanism with multiple power levels (MPL-WRA), each mobile station contends for a transmission opportunity following the principles of a slotted access mechanism incorporating a random transmitting power value selected among various available power levels. In this way, a capture effect may be produced allowing the packet to be decoded whenever the signal-to-interference-plus-noise ratio is higher than a given threshold. In order to analyze the performance and optimization of the proposed setup, we build a Markovian model integrating the wireless access mechanism supplemented by the use of multiple power levels in an attractive and simple cross-layer fashion. We follow a team problem approach allowing us to fine tune the design parameters of the overall system configuration. Throughout an extensive numerical analysis, our main results set the basis for the social optimal system configuration of the proposed mechanism taking into account the physical constraints of using multiple power levels and the actual practical implementation of a slotted access mechanism. We end the paper with concluding remarks and future research directions including guidelines for the actual implementation of our proposal.

[1]  Mahbub Hassan,et al.  Power level selection schemes to improve throughput and stability of slotted ALOHA under heavy load , 2002, Comput. Commun..

[2]  Anthony Ephremides,et al.  On the stability of interacting queues in a multiple-access system , 1988, IEEE Trans. Inf. Theory.

[3]  W. Szpankowski Stability conditions for some distributed systems: buffered random access systems , 1994, Advances in Applied Probability.

[4]  Luis Orozco-Barbosa,et al.  A team study of the IEEE 802.16 collision resolution protocol , 2010, 2010 IFIP Wireless Days.

[5]  Peter March,et al.  Stability of binary exponential backoff , 1988, JACM.

[6]  Panayotis G. Cottis,et al.  Satellite communications at KU, KA, and V bands: Propagation impairments and mitigation techniques , 2004, IEEE Communications Surveys & Tutorials.

[7]  Stephen B. Wicker,et al.  Stability of Slotted Aloha with Multipacket Reception and Selfish Users , 2003, INFOCOM 2003.

[8]  Cristina V. Lopes,et al.  A survey, classification and comparative analysis of medium access control protocols for ad hoc networks , 2004, IEEE Communications Surveys & Tutorials.

[9]  Eitan Altman,et al.  Slotted Aloha with Priorities and Random Power , 2005, NETWORKING.

[10]  A. Haqiq,et al.  QoS Criteria in IEEE 802 . 16 Collision Resolution Protocol , 2010 .

[11]  Juanjuan Yan,et al.  Cross-layer Design of Optimal Contention Period for IEEE 802.16 BWA Systems , 2006, 2006 IEEE International Conference on Communications.

[12]  V. Anantharam The stability region of the finite-user slotted ALOHA protocol , 1989, Proceedings of the 28th IEEE Conference on Decision and Control,.

[13]  Cristina Cano,et al.  Learning-BEB: Avoiding Collisions in WLAN , 2008 .

[14]  G. Andrews The Theory of Partitions: Frontmatter , 1976 .

[15]  Essaid Sabir,et al.  Asymptotic delay analysis and timeout-based admission control for ad hoc wireless networks with asymmetric users , 2010, Comput. Commun..

[16]  Panayota Papantoni-Kazakos,et al.  On the Relation Between the Finite and the Infinite Population Models for a Class of RAA's , 1987, IEEE Trans. Commun..

[17]  Essaid Sabir,et al.  Modeling Slotted Aloha as a Stochastic Game with Random Discrete Power Selection Algorithms , 2009, J. Comput. Networks Commun..

[18]  J. Morris Chang,et al.  A Comprehensive Analysis of Bandwidth Request Mechanisms in IEEE 802.16 Networks , 2010, IEEE Transactions on Vehicular Technology.

[19]  Byung-Jae Kwak,et al.  Performance analysis of exponential backoff , 2005, IEEE/ACM Transactions on Networking.

[20]  Dina Katabi,et al.  Zigzag decoding: combating hidden terminals in wireless networks , 2008, SIGCOMM '08.

[21]  David J. Aldous Ultimate instability of exponential back-off protocol for acknowledgment-based transmission control of random access communication channels , 1987, IEEE Trans. Inf. Theory.

[22]  Vishal Misra,et al.  Modeling and Analysis of Generalized Slotted-Aloha MAC Protocols in Cooperative, Competitive and Adversarial Environments , 2006, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06).