• 沒有找到結果。

A multichain backoff mechanism for IEEE 802.11 WLANs

N/A
N/A
Protected

Academic year: 2021

Share "A multichain backoff mechanism for IEEE 802.11 WLANs"

Copied!
8
0
0

加載中.... (立即查看全文)

全文

(1)

A Multichain Backoff Mechanism

for IEEE 802.11 WLANs

Shiang-Rung Ye and Yu-Chee Tseng

Abstract—The distributed coordination function (DCF) of

IEEE 802.11 standard adopts the binary exponential backoff (BEB) for collision avoidance. In DCF, the contention window is reset to an initial value, i.e., CWmin, after each successful trans-mission. Much research has shown that this dramatic change of window size may degrade the network performance. Therefore, backoff algorithms, such as gentle DCF (GDCF), multiplica-tive increase–linear decrease (MILD), exponential increase– exponential decrease (EIED), etc., have been proposed that try to keep the memory of congestion level by not resetting the contention window after each successful transmission. This paper proposes a multichain backoff (MCB) algorithm, which allows stations to adapt to different congestion levels by using more than one backoff chain together with collision events caused by stations themselves as well as other stations as indications for choosing the next backoff chain. The performance of MCB is analyzed and com-pared with those of 802.11 DCF, GDCF, MILD, and EIED backoff algorithms. Simulation results show that, with multiple backoff chains and collision events as reference for chain transition, MCB can offer a higher throughput while still maintaining fair channel access than the existing backoff algorithms.

Index Terms—Backoff algorithms, medium access control

(MAC), multichain backoff (MCB), wireless local area networks (WLANs).

I. INTRODUCTION

T

HE wireless local area network (WLAN) is emerging as a promising technology providing high-speed and low-cost wireless communications. In WLANs, the medium access control (MAC) plays an important role on efficient and fair use of the wireless medium. In 1970s, Abramson and his colleagues first proposed an elegant MAC protocol, called ALOHA [1]. In ALOHA, stations are allowed to transmit immediately upon receiving data from upper layers. A variant of ALOHA divides time into contiguous time slots and allows transmission to start only at the beginning of the time slot. This reduces the vulnera-ble time of the pure ALOHA. It has been shown that with Pois-son arrival process, the maximum throughputs of pure ALOHA and slotted ALOHA are only 0.184 and 0.368, respectively [2]. The inefficacy of ALOHA protocols results from its high col-lision probability in heavy traffic load. To decrease the colcol-lision probability, carrier sense multiple access (CSMA) scheme [2] requires stations to sense carriers on the wireless channel before transmitting data. In this scheme, if the medium is busy, stations have to defer their transmission until the medium becomes Manuscript received September 17, 2004; revised June 27, 2005 and Sep-tember 26, 2005. The review of this paper was coordinated by Prof. Y.-B. Lin.

The authors are with the Department of Computer Science and Information Engineering, National Chiao Tung University, Hsinchu 30050, Taiwan, R.O.C. (e-mail: shiarung@csie.nctu.edu.tw; yctseng@csie.nctu.edu.tw).

Digital Object Identifier 10.1109/TVT.2006.877467

idle. This prevents stations’ frames from colliding with ongoing transmitted frames of other stations. When a station detects the medium is busy, it can persistently wait for the medium to become idle and then transmit with a probability of 1 orp (0 < p < 1). The former is called 1-persistent CSMA and the latter is p-persistent CSMA. Alternatively, a station can stop monitoring the wireless medium. After a random time period, it listens to the medium again to check whether the medium has become idle. This is called nonpersistent CSMA.

The distributed coordination function (DCF) of IEEE 802.11 is a variant of persistent CSMA with a collision avoidance (CA) scheme. Two types of carrier sense mechanisms are defined in DCF, namely 1) “physical carrier sense” and 2) “virtual carrier sense.” The former is supported by physical (PHY) layer via actual channel assessment, whereas the latter is supported by the MAC layer. The virtual carrier sense is carried out by the network allocation vector (NAV), which is declared by the duration/ID field in control frames or data frames. In DCF, only when both carrier sense mechanisms indicate that the medium is idle can a station proceed with the remainder of contention procedure.

The CA scheme of DCF further reduces frame collision prob-ability by requiring each backlogged station to perform binary exponential backoff (BEB) after the medium becomes idle. In BEB, if a station successfully transmits a frame, its contention window will be reset to an initial value, i.e., CWmin. However, if the transmission fails, the window size is doubled. The maxi-mum window size is restricted to CWmax. The CWmin and CWmax are defined in the PHY layer of IEEE 802.11. For fre-quency hopping (FH), CWmin= 15 and CWmax = 1023, and for direct sequence spread spectrum (DSSS), CWmin= 31 and CWmax= 1023.

In the literature, it has been shown that the size of the con-tention window has a great impact on the performance of DCF [3]–[10]. In this paper, we propose a multichain backoff (MCB) algorithm that enables stations to adapt to different congestion levels by exploiting multiple backoff chains with the collision events that occur on the wireless channel as reference for switching among the chains. The advantage of the MCB is that it does not have to estimate the number of contending stations, traffic load, etc., but provides high throughput and fair channel access for WLANs with a small or large population.

The remainder of this paper is organized as follows: In Section II, we review related work on backoff algorithms. In Sections III and IV, we present the MCB algorithm and the analysis of its saturation throughput, respectively. Section V shows simulation results and analytic results, and Section VI concludes this paper.

(2)

II. RELATEDWORK

In the literature, there have been many studies of backoff algorithms [3]–[7], [11]–[16]. In [11], to prevent the contention window of BEB from oscillation, the multiplicative increase– linear decrease (MILD) algorithm increases the contention window by 1.5 times when collision occurs and decreases the contention window by 1 when transmission succeeds. To ensure fair access to the wireless medium, a station is required to attach its contention window in each transmitted frame. Whenever other station overhears this frame, it has to adopt this window size. However, since a station with a smaller contention window has a better chance to win the channel, this may force other stations with a large window size to adopt this small window size. When the network is in high traffic load, this may increase collision probability and decrease the network throughput. In [3] and [4], it is suggested to choose a contention window according to the estimated number of competing stations. While this may significantly improve performance, it relies on the accurate estimation of the number of competing stations.

The exponential increase–exponential decrease (EIED) algorithm [15], [17], [18] increases the contention window by a multiple when collision occurs and exponentially decreases the window size when transmission succeeds. With a relatively small decrement of the window size compared with the incre-ment, EIED can outperform 802.11 DCF. However, our simu-lation results show that with such a relatively small decrement, EIED may suffer from unfair channel access when the number of contending stations is small. The linear increase–linear de-crease (LILD) algorithm always adjusts the contention window by a constant [8], [18]. This is not suitable for the network with a large population. The GDCF backoff algorithm [9] doubles the contention window after each unsuccessful transmission and halves the window size after c consecutive successful transmissions, wherec is a system parameter. Although GDCF greatly improves the performance of 802.11 DCF, it may cause unfair medium access for some values ofc. The works [5] and [12] show that the performance of DCF is highly related to the number of contending stations and CWmin; the CWmin has to change with the number of contending stations to obtain a better throughput. Motivated by this observation, we propose a backoff algorithm that employs multiple backoff chains, each of which is used in a different congestion level. Thereby, stations can adapt to different congestion levels by switching among the chains.

III. MCB ALGORITHM

In MCB, each station maintains a transition diagram, as demonstrated in Fig. 1, to determine its current contention window. The diagram consists ofc backoff chains, numbered from 0 toc − 1, each of which represents a sequence of backoff stages and is defined by the following parameters:

wi: the minimum contention window of chaini:mi: the maximum backoff stage of chaini:

ui: the transition probability from chaini to chain i + 1. In the case ofi = c − 1, uc−1= 0:

vi: the transition probability from chaini to chain i − 1. In the case ofi = 0, v0= 0.

Fig. 1. Transition diagram of MCB. The pair(i, j) denotes jth backoff stage of chaini. The symbols s and f denote possible transitions after a successful transmission and a failure transmission, respectively.

For each backoff chaini, we define w0= CWmin and wc−1= CWmax. Fori = 1, . . . , c − 2, wicould be

wi= CWmin + i ·  CWmax− CWmin c − 1  .

Alternatively, we may increase wi in an exponential manner as follows: wi= (CWmin + 1) ·  CWmax+ 1 CWmin+ 1  i c−1 − 1.

Within a backoff chain, the contention window is doubled for the next backoff stage but is limited to CWmax. Parametersui andviare probabilities for a station to switch from its current chain to the next chain and the previous chain, respectively, after each successful transmission. The simplest assignment is to let alluibe the same and allvi be the same. For this case, the optimal values are derived in Section IV-B.

The MCB algorithm works as follows: Initially, a station is in stage 0 of chain 0. Before transmitting data, it randomly chooses a backoff value from the current contention window. When the medium is sensed to be idle for a DIFS period, the backoff procedure is started. During backoff, the backoff counter is decreased by 1 for each idle slot being detected. However, if the medium is busy during a backoff slot, the backoff counter is frozen, and the station has to wait until the medium becomes idle. During the backoff period, the station shall also detect any collision event caused by other stations. A collision flagfcol is used to record whether frame collision

occurs on the wireless channel.fcolis set to 1 if a station itself

experiences a collision or it detects that the medium has been busy for a duration longer than the transmission time of the smallest frame but does not correctly receive a frame. fcol is

(3)

reset to 0 after each successful transmission. Once the backoff counter reaches 0, the station will start to transmit data. Assume that a station is transmitting in stagej of chain i. In the case that the transmission fails, it will move to stagej + 1 of chain

i if j < mi or stay in the same stage ifj = mi. In the case that the transmission succeeds, the station will move to stage 0 of chain i + 1 with probability (fcol· ui), stage 0 of chain

i − 1 with probability ((1 − fcol) · vi), and stage 0 of chain i with probability (1 − fcol· ui− (1 − fcol) · vi). Intuitively, if

a station encounters collision or detects a collision event, this may imply that the network traffic load has increased or just a coincidence. Therefore, it will move to the next chain with a larger minimum contention window or stay at the same chain. Similarly, if no collision is encountered and detected, it moves to a chain with a smaller minimum contention window or stay at the same chain.

IV. PERFORMANCEANALYSIS

In this section, we analyze the saturation throughput of MCB, which is defined to be the maximum achievable throughput, obtained by continuously increasing the traffic load to a limit. To operate the network in a saturation condition, all transmit queues of stations are assumed to be nonempty all the time. It is also assumed that, under such a condition, the collision probability for each transmission attempt is a constant and independent valuep.

A. Saturation Throughput

Fig. 2 shows the Markov chain of MCB. Each state is represented by a triple (i, j, k), which means that the station is in stage j of chain i and has a backoff value k. Let τ be the probability that a station will transmit in a randomly chosen backoff slot, and let χi be the probability that a station will detect at least one collision event on the wireless channel during its backoff period in stage 0 of chain i. For a given backoff slot, the probability that a contending station will not detect any collision event is((1 − τ)n−1+ τ(n − 1)(1 − τ)n−2), where

n is the total number of stations. Since a station will choose a

backoff value from the current contention windowwi with an equal probability of(1/(wi+ 1)), we have

χi= wi  k=0 1−(1−τ)n−1+(n−1)τ(1−τ)n−2k wi+1 = 1− 1−  (1−τ)n−1+(n−1)τ(1−τ)n−2wi+1 (wi+1) (1−(1−τ)n−1−(n−1)τ(1−τ)n−2). (1) The transition probability from stagej of chain i to stage 0 of chaini + 1 is (1 − p) · χi· uiifj = 0 and is (1 − p) · uiif

j > 0. Similarly, transition probability from stage j of chain i transits to stage 0 of chain i − 1 is (1 − p) · (1 − χi) · vi if

j = 0 and is 0 if j > 0. Let Pi,j,k|i,j,k denote the probability

that a station changes from state(i, j, k) to (i, j, k).

The nonnull one-step transition probabilities are summarized as follows:                                            Pi,j,k−1|i,j,k = 1

Pi,0,k|i,j,0= (1−p)(1−uWi,0 i), 0 < j ≤ mi, i < c − 1

Pc−1,0,k|c−1,0,0= 1−(1−p)(1−χWc−1,0c−1)vc−1

Pi,0,k|i,0,0= (1−p)(χi(1−uWi)+(1−χi,0 i)(1−vi)), 0 < i < c − 1

P0,0,k|0,0,0 =(1−p)(1−χW0,00·u0) Pi,j+1,k|i,j,0=Wi,j+1p , j < mi

Pi,mi,k|i,mi,0=Wi,mip , i < c − 1

Pi+1,0,k|i,j,0= (1−p)uWi+1,0i, j > 0, i < c − 1

Pi+1,0,k|i,0,0= (1−p)χWi+1,0iui, i < c − 1

Pi−1,0,k|i,0,0= (1−p)(1−χWi−1,0i)vi, i > 0

(2) where Wi,j = (wi+ 1) · 2j. Letbi,j,kbe the stationary prob-ability that a station will be in state (i, j, k). Since bi,j,0=

bi,j−1,0· p

bi,j,0= bi,0,0· pj, 0 < j < mi

bi,mi,0= bi,0,0·

pmi

(1 − p). (3)

With (3), we can express eachbi,j,kin terms ofbi−1,0,0,bi,0,0, andbi+1,0,0. For0 < j < miand0 ≤ k < Wi,j

bi,j,k=WWi,j− k

i,j · bi,j−1,0· p =WWi,j− k

i,j · bi,0,0· p

j (4)

and forj = miand0 ≤ k < Wi,mi

bi,mi,k= Wi,mi− k Wi,mi (bi,mi,0· p + bi,mi−1,0· p) =Wi,mi− k Wi,mi · bi,0,0· p mi 1 − p. (5)

In the case thatj = 0, for 0 < i < c − 1 and 0 ≤ k < Wi,0

bi,0,k=WWi,0− k i,0

×bi,0,0(1 − ui)(p − pmi+1)

+(1 − p)(1 − χi· ui− vi+ χi· vi)) + bi−1,0,0· ui−1(χi−1− pχi−1+ p − pmi−1+1) + bi+1,0,0· (1 − p) · (1 − χi+1) · vi+1)) . (6) Forj = 0, i = 0, b0,0,k, and0 ≤ k < W0,0 b0,0,k=WW0,0− k 0,0 ×b0,0,0  (1−u0)(p−pm0+1) +(1−p)(1−χ0·u0)  + b1,0,0·(1−p)·(1−χ1)·v1) (7)

(4)

Fig. 2. Markov chain model of MCB.

and forj = 0, i = c − 1, and 0 ≤ k < wc−1,0

bc−1,0,k=WWc−1,0− k c−1,0

× (bc−2,0,0· uc−2 p − pmc−2+1+ (1 − p)χc−2 + bc−1,0,0· (1 − (1 − p)(1 − χc−1)vc−1)) . (8) From (7),b1,0,0can be written as

b1,0,0= b0,0,0 (1 − p)(1 − χ1)v1 ·1 − (1 − u0)(p − pm0+1) − (1 − p)(1 − χ0· u0)  . (9)

From (6), for1 < i < c − 1, bi,0,0can be in a recurrence form

bi,0,0=(1−p)(1−χbi−1,0,0 i)vi

×1−(1−ui−1)(p−pmi−1+1) + (1−p) (1−vi−1−χi−1· ui−1+χi−1·vi−1)))

−ui−2(χi−2−pχi−2+p−pmi−2+1)

(1−p)(1−χi)vi ·bi−2,0,0 (10) and fori = c − 1 bc−1,0,0 =uc−2  p − pmc−2+1+ (1 − p)χ c−2 (1 − p)(1 − χc−1)vc−1 bc−2,0,0. (11)

By (3)–(11), all stationary probabilities are expressed in terms ofb0,0,0,p, and τ. Since the sum of all probabilities must be 1

c−1  i=0 mi  j=0 Wi,j−1 k=0 bi,j,k= 1. (12)

Moreover, since a station only transmits when its backoff counter is 0, it follows that

τ = c−1  i=0 mi  j=0 bi,j,0. (13)

From (12) and (13), we have an equation with two unknown variables, i.e., p and τ. The collision probability can be ex-pressed in terms ofτ, i.e.,

p = 1 − (1 − τ)n−1. (14)

By solving (13) and (14), we can obtainp and τ. The saturation throughputS is given by

S =E[amount of data transmitted in a time slot]E[length of a time slot]

= PsPtrTdata

(1 − Ptr)ρ + PsPtrTs+ (1 − Ps)PtrTc

(15) wherePtr= 1 − (1 − τ)nis the probability that a transmission

occurs in a randomly chosen backoff slot, Ps= (nτ(1 −

τ))n−1/P

tr is the probability that a transmission succeeds in

a backoff slot,ρ is the length of a backoff slot, Tsis the time required to complete a frame exchange sequence, andTcis the

(5)

Fig. 3. u to v that give the optimal throughput under different n and c for frame size of 1024 bytes.

length of a colliding duration.TsandTcare(DIFS + DATA + ACK+ SIFS) and (DIFS + DATA), respectively, if direct transmission is used and are(DIFS + RTS + CTS + DATA + ACK+ 3SIFS) and (DIFS + RTS), respectively, when RTS– CTS exchange is used.

B. Optimal Values ofu and v

In the case that all uis are the same and all vis are the same, the optimal u and v can be obtained from the optimal transmission probability τ, which maximizes the saturation throughput. Let us define v = vi and u = ui for all backoff chains. Equation (15) can be rewritten as

S = Tdata

Ts− Tc+ 1/f(τ) where

f(τ) = T nτ(1 − τ)n−1

c/ρ − (1 − τ)n(Tc/ρ − 1).

The saturation throughputS is maximized when f(τ) is maxi-mized. Taking the derivative off(τ) and setting it to 0

f(τ) = (1 − τ)n− T

c/ρ (nτ − (1 − (1 − τ)n)) = 0 under the condition τ  1, we have τ ≈ 1/(n ·Tc/(2ρ)). With the optimalτ, we have an equation that relates the optimal

u and v from (13).

Fig. 3 plotsu and v that give the maximum throughput for the frame size of 1024 bytes. The figure shows that parameters

u and v are almost linearly related. The mean value of the ratios

ofu to v is shown in Fig. 4. When n increases, the ratio of u tov also increases, which implies that stations have to move to backoff chains with a larger minimum contention. However, the increment is smaller when more backoff chains are used.

V. PERFORMANCEEVALUATION

This section presents simulation results of the performance of MCB as opposed to MILD, DCF, GDCF, and EIED algorithms. The custom simulation programs are written in C++ that

sim-Fig. 4. Ratios ofu to v that give the optimal throughput under different n and

c for frame size of 1024 bytes.

TABLE I SIMULATIONPARAMETERS

ulate networks with an ideal wireless channel (i.e., no hidden terminals). In addition to saturation throughput, a fairness index (FI) [10] is used to examine the fairness property of a backoff algorithm, i.e.,

FI= (

iSi)2

n · i(Si)2 (16)

whereSiis the saturation throughput received by stationi. The FI is bounded in the interval [1, 0]. An algorithm is fair as its FI is close to 1. Table I lists the MAC-layer and PHY-layer parameters used in our simulations. For ease of discussion, we assume the sameu and the same v for all chains throughout the simulations.

Fig. 5 presents the saturation throughput under different u andv. The frame size is 1024 bytes. First, we vary u from 0 to 1 with fixedv = 0.5. The figure shows that saturation throughput decreases as the number of competing stations n increases. Given a fixedn, the throughput increases as u increases. Next, we fixu = 1 and change v from 0 to 1. When v is small, the saturation throughput drops and then increases asn increases. This drop is due to bad ratios of u to v, which cause large backoff overheads. However, asn increases, the overheads will decrease, and the throughput will increase.

Fig. 6 shows the saturation throughput under the frame size of 128 bytes. In Fig. 6, we first fix v = 0.5 but vary u. The throughput increases whenu increases from 0 to 0.1. Further increase ofu will degrade the performance. Fig. 7 shows the relations between throughput and frame sizes. When the frame size increases, the throughput also increases since less backoff overhead is incurred.

(6)

Fig. 5. Saturation throughput under differentu and v with the frame size of 1024 bytes.

Fig. 6. Saturation throughput under differentu and v with the frame size of 128 bytes.

Fig. 7. Saturation throughput versus frame sizes.

A. Number of Backoff Chains

Fig. 4 has shown that when the number of contending stations

n increases, the increment on the ratio of u to v will be smaller

if more backoff chains are used. In Fig. 8,u and v are chosen to maximize the throughput forn = 6 and n = 46, respectively. In the case thatu and v are chosen for n = 6, the throughput of a two-chain MCB drops more when the number of stations

Fig. 8. Throughput of MCB withu and v, which are chosen for n = 6 and

n = 46, respectively.

Fig. 9. Saturation throughput of a four-chain MCB: analysis versus simulation.

n increases. In the case that u and v are chosen for n = 46,

the throughput of a two-chain MCB decreases more whenn is small. Fig. 9 compares the analysis results with the simulation results of saturation throughput of a four-chain MCB. The figures show that the analyzed throughput has the same trend as the simulation throughput and that for some values ofu and

v, the analysis results match the simulation results. B. Comparisons With Existing Algorithms

In the following, we compare the performance of a four-chain MCB with those of the existing algorithms. The minimum contention windows of the four chains are 31, 127, 511, and 1023, respectively. u and v are chosen from the simulation results in Figs. 5 and 6. They are 0.1 and 0.3, respectively, for the frame size of 128 bytes and are 1 and 0.3, respectively, for the frame size of 1024 bytes.

1) Comparing With GDCF: In Fig. 10, we compare the

throughput of MCB with that of GDCF, assuming the frame size of 128 bytes. For GDCF, we increase its parameterc from 1 to 5. It is clear that MCB outperforms GDCF. Figs. 11 and 12 compare MCB and GDCF under the frame size of 1024 bytes. With a largec, GDCF suffers from unfair channel access when

n is small. In the case of n = 2, when window sizes of the two

(7)

Fig. 10. Saturation throughput of MCB and GDCF (128 bytes).

Fig. 11. Saturation throughput of MCB and GDCF (1024 bytes).

Fig. 12. FI of MCB and GDCF (1024 bytes).

of their window sizes. Since the station with a small contention window has shorter backoff time, it may reach c successful transmissions and then halve its contention window faster than the other station, which further enlarges the difference of the two contention windows and causes unfair channel access.

2) Comparing With IEEE 802.11 and MILD: Fig. 13 shows

the throughputs of MCB, IEEE 802.11, and MILD. The throughput of MILD is lower than those of MCB and IEEE 802.11. In MILD, a station can advertise its contention win-dow only if no other station successfully transmits during its

Fig. 13. Saturation throughput of MCB, IEEE 802.11, and MILD.

Fig. 14. Saturation throughput of MCB and EIED(x, y) with fixed y = 2. backoff period. However, there is a high probability that a station with a smaller contention window successfully transmits during this period. This will force other stations to adopt this small contention window. In high traffic load, this will increase collision probability. IEEE 802.11 is outperformed by MCB since MCB offers more than one chain, allowing stations to adapt to different congestion levels.

3) Comparing With EIED: Figs. 14 and 15 compare the

throughput of MCB to that of EIED. We use EIED(x, y) to denote that if a collision occurs, CWnew = min(x · (CWold+

1) − 1, CWmax), and if a transmission succeeds, CWnew=

max( (CWold+ 1)/y − 1, CWmin). In Fig. 14, we fix y = 2

and increase x from 2 to 32. In Fig. 15, we fix x = 2 and vary y from 1.01 to 2. For EIED(2, 1.01), Fig. 16 shows that the wireless medium is unfairly utilized when n < 8. For EIED(2, 1.01) atn = 2, when a collision occurs, the difference between the two window sizes is doubled. Since the decrement of contention windows is small (the decrement is 1 when CW< 100), the window sizes are hardly reduced to CWmin after a number of successful transmissions. Once a collision occurs, the difference between the two window sizes is doubled.

VI. CONCLUSION

In this paper, we have proposed a new MCB algorithm. MCB explores the possibility of using multiple backoff chains and considering collision events on the wireless channel as hints

(8)

Fig. 15. Throughput of MCB and EIED(x, y) with fixed x = 2.

Fig. 16. FI of MBC and EIED(x, y) with fixed x = 2.

to choose a proper chain. With the capability of switching to different backoff chains, MCB offers higher throughput than the existing algorithms, such as GDCF, IEEE 802.11, MILD, and EIED, yet still provides fair access to the wireless channel. In [18], backoff procedures are employed to avoid consecutive burst errors on an error-prone wireless channel to obtain better network performance. How to apply our multichain concept to resolve this issue could be directed to future work.

REFERENCES

[1] N. Abramson, “The ALOHA system—Another alternative for computer communication,” in Proc. Fall Joint Comput. Conf., AFIPS Conf., 1970, pp. 281–285.

[2] F. A. Tobagi and L. Kleinrock, “Packet switching in radio channels: Part I—Carrier sense multiple-access modes and their throughput-delay characteristics,” IEEE Trans. Commun., vol. COM-23, no. 12, pp. 1400–1415, Dec. 1975.

[3] G. Bianchi, L. Frata, and M. Oliveri, “Performance evaluation and en-hancement of the CSMA/CA MAC protocol for 802.11 wireless LANs,” in Proc. IEEE Symp. Pers., Indoor, Mobile Radio Commun., 1996, pp. 392–396.

[4] F. Cali, M. Conti, and E. Gregori, “IEEE 802.11 protocol: Design and performance evaluation of an adaptive backoff mechanism,” IEEE J. Sel.

Areas Commun., vol. 18, no. 9, pp. 1774–1786, Sep. 2000.

[5] M. Natkaniec and A. R. Pach, “An analysis of the backoff mechanism used in IEEE 802.11 networks,” in Proc. IEEE Symp. Comput. and Commun., 2000, pp. 444–449.

[6] F. Cali, M. Conti, and E. Gregori, “Dynamic tuning of the IEEE 802.11 protocol to achieve a theoretical throughput limit,” IEEE/ACM Trans.

Netw., vol. 8, no. 6, pp. 785–799, Dec. 2000.

[7] Y. Kwon, Y. Fang, and H. Latchman, “Design of MAC protocols with fast collision resolution for wireless local area networks,” IEEE Trans.

Wireless Commun., vol. 3, no. 3, pp. 793–807, May 2004.

[8] V. Vitsas, “Throughput analysis of linear backoff scheme in wireless LANs,” IEEE Electron. Lett., vol. 39, no. 1, pp. 99–100, Jan. 2003. [9] C. Wang, B. Li, and L. Li, “A new collision resolution mechanism to

en-hance the performance of IEEE 802.11 DCF,” IEEE Trans. Veh. Technol., vol. 53, no. 4, pp. 1235–1246, Jul. 2004.

[10] R. Jain, D. Chiu, and W. Hawe, “A Quantitative Measure of Fairness and Discrimination for Resource Allocation in Shared Computer Systems,” DEC Research Report TR-301, 1984.

[11] V. Bharghavan, “MACAW: A media access protocol for wireless LAN’s,” in Proc. ACM SIGCOMM, 1994, pp. 212–225.

[12] G. Bianchi, “Performance analysis of the IEEE 802.11 distributed coordi-nation function,” IEEE J. Sel. Areas Commun., vol. 18, no. 3, pp. 535–547, Mar. 2000.

[13] Z. J. Haas and J. Deng, “On optimizing the backoff interval for random access schemes,” IEEE Trans. Commun., vol. 51, no. 12, pp. 2081–2090, Dec. 2003.

[14] D. Raychaudhuri and K. Joseph, “Analysis of the stability and perfor-mance of exponential backoff,” in Proc. IEEE WCNC, 2003, vol. 3, pp. 1754–1759.

[15] N.-O. Song, B.-J. Kwak, J. Song, and L. E. Miller, “Enhancement of IEEE 802.11 distributed coordination function with exponential increase expo-nential decrease backoff algorithm,” in Proc. IEEE VTC—Sprin, 2003, vol. 4, pp. 2775–2778.

[16] G. Bianchi and I. Tinnirello, “Kalman filter estimation of the number of competing terminals in an IEEE 802.11 network,” in Proc. IEEE

INFOCOM, 2003, pp. 844–852.

[17] Y. Wang and B. Bensaou, “Achieving fairness in IEEE 802.11 DFWMAC with variable packet lengths,” in Proc. IEEE GLOBECOM, 2001, vol. 6, pp. 3588–3593.

[18] P. M. Soni and A. Chockalingam, “Analysis of link-layer backoff schemes on point-to-point Markov fading links,” IEEE Trans. Commun., vol. 51, no. 1, pp. 29–32, Jan. 2003.

Shiang-Rung Ye received the B.S. degree from

Tatung University, Taipei, Taiwan, R.O.C., in 1997 and the M.S. degree from Fu Jen Catholic University, Taipei, in 1999, both in computer science and infor-mation engineering. He is currently working toward the Ph.D. degree in computer science and informa-tion engineering at Nainforma-tional Chiao Tung University, Hsinchu, Taiwan, R.O.C.

His research interests include medium access con-trol, quality of services, and performance analysis.

Yu-Chee Tseng received the B.S. degree from

Na-tional Taiwan University, Taipei, Taiwan, in 1985 and the M.S. degree from National Tsing-Hua University, Hsinchu, Taiwan, in 1986, both in computer science, and the Ph.D. degree in computer and informa-tion science from Ohio State University, Columbus, in 1994.

He was an Associate Professor with Chung-Hua University, Hsinchu, from 1994 to 1996 and with National Central University, Taoyuan, Taiwan, from 1996 to 1999, and a Professor with National Central University from 1999 to 2000. Since 2000, he has been a Professor with the Department of Computer Science, National Chiao-Tung University, Hsinchu, where he is also currently the Department Chairman. His research interests include mobile computing, wireless communication, network security, and parallel and distributed computing.

數據

Fig. 1. Transition diagram of MCB. The pair (i, j) denotes jth backoff stage of chain i
Fig. 2 shows the Markov chain of MCB. Each state is represented by a triple (i, j, k), which means that the station is in stage j of chain i and has a backoff value k
Fig. 2. Markov chain model of MCB.
Fig. 3 plots u and v that give the maximum throughput for the frame size of 1024 bytes
+4

參考文獻

相關文件

• The burst profile to use for any uplink transmission is defined by the Uplink Interval Usage Code (UIUC).. – Each UIUC is mapped to a burst profile in the

(2)Ask each group to turn to different page and discuss the picture of that page.. (3)Give groups a topic, such as weather, idols,

In order to provide some materials for this research the present paper offers a morecomprehensive collection and systematic arrangement of the Lotus Sūtra and its commentaries

Reading Task 6: Genre Structure and Language Features. • Now let’s look at how language features (e.g. sentence patterns) are connected to the structure

Understanding and inferring information, ideas, feelings and opinions in a range of texts with some degree of complexity, using and integrating a small range of reading

Writing texts to convey information, ideas, personal experiences and opinions on familiar topics with elaboration. Writing texts to convey information, ideas, personal

Writing texts to convey simple information, ideas, personal experiences and opinions on familiar topics with some elaboration. Writing texts to convey information, ideas,

The Knowledge Value Added theory provides a promising model for quantitative performance measurement of a CoP as long as the value-adding activities are identified with the quantified