• 沒有找到結果。

Design and performance analysis on adaptive reservation-assisted collision resolution protocol for WLANs

N/A
N/A
Protected

Academic year: 2021

Share "Design and performance analysis on adaptive reservation-assisted collision resolution protocol for WLANs"

Copied!
14
0
0

加載中.... (立即查看全文)

全文

(1)

Design and performance analysis on adaptive reservation-assisted

collision resolution protocol for WLANs

Jia-Shi Lin•Kai-Ten Feng

Published online: 5 March 2011

Ó Springer Science+Business Media, LLC 2011

Abstract In conventional IEEE 802.11 medium access control protocol, the distributed coordination function is designed for the wireless stations (WSs) to perform channel contention within the wireless local area networks (WLANs). Packet collision is considered one of the major issues within this type of contention-based scheme, which can severely degrade network performance for the WLANs. Research work has been conducted to modify the random backoff mechanism in order to alleviate the packet collision problem while the WSs are contending for channel access. However, most of the existing work can only provide limited throughput enhancement under specific number of WSs within the net-work. In this paper, an adaptive reservation-assisted collision resolution (ARCR) protocol is proposed to improve packet collision resulting from the random access schemes. With its adaptable reservation period, the contention-based channel access can be adaptively transformed into a reservation-based system if there are pending packets required to be transmitted between the WSs and the access point. Analytical model is derived for the proposed ARCR scheme in order to evaluate and validate its throughput performance. It can be observed from both analytical and simulation results that the proposed protocol outperforms existing schemes with enhanced chan-nel utilization and network throughput.

Keywords Wireless local area network (WLAN) IEEE 802.11 standards Medium access control  Random backoff mechanism Reservation-based algorithm

1 Introduction

In recent years, the techniques for wireless local area net-works (WLANs) have been prevailing exploited for both indoor and mobile communications. The applications for WLANs include wireless home gateways, hotspots for commercial usages, and ad-hoc networking for inter-vehicular communications. Among different techniques, IEEE 802.11 standard is considered the well-adopted suite due to its remarkable success in both design and deploy-ment. Various amendments are contained in the IEEE 802.11 standard suite, mainly including IEEE 802.11a/b/g [1–3] and IEEE 802.11e [4] for quality-of-service (QoS) support. The medium access control (MAC) protocol within the IEEE 802.11 standard supports the distributed coordination function (DCF) to regulate the random and complex medium accessing behaviors among the wireless stations (WSs) within the same WLAN. How to alleviate the probability of packet collision has been considered a crucial issue for the enhancement of network throughput.

Different types of schemes have been proposed in order to resolve the packet collision problem within the WLAN. The adjustment of contention window (CW) size has been considered an effective scheme in most of the existing research work [1, 5–12]. The binary exponential backoff scheme [1] as described in the IEEE 802.11 MAC protocol controls the waiting time duration for channel contention. The CW size will be increased or decremented with failed or successful transmission respectively. In general, the probability of packet collision can be decreased with aug-mented value of CW size, especially with a larger number of WSs in the network. However, excessive idle time resulted from the enlarged CW size will consequently degrade the channel utilization. In order to enhance the throughput performance for the conventional IEEE 802.11

J.-S. Lin K.-T. Feng (&)

Department of Electrical Engineering, National Chiao Tung University, Hsinchu, Taiwan

e-mail: ktfeng@mail.nctu.edu.tw J.-S. Lin

e-mail: uxoxox.cm96g@g2.nctu.edu.tw DOI 10.1007/s11276-011-0328-9

(2)

protocol, the algorithm proposed in [5] increases the tran-sition rate between the backoff stages associated with decreased value of minimum CW and incremented value of maximum CW size. The hybrid algorithm proposed in [6] combines both the exponential and the linear backoff for the purpose of decreasing packet collision; while the slow CW decrease (SD) scheme in [7] either doubles or halves the CW size according to the successfulness of packet transmission. The early backoff announcement (EBA) protocol [8] pro-posed a WS to record its next backoff number into the MAC head while transmitting data packets. All the other WSs will select their corresponding backoff numbers excluding this value in order to avoid potential packet collisions. Similar design concept was also presented in [9]; while [10] pro-posed a MAC protocol with multiple-step distributed in-band channel reservation. The gentle DCF (GDCF) protocol as proposed in [11,12] maintains a larger value of the CW size compared to the conventional backoff scheme in order to decrease the probability of packet collision. The work in [13] proposed a handshake based channel aware (HCA) MAC protocol which selects the WSs to access the channel according to its corresponding channel condition. Never-theless, all the existing contention-based protocols suffer from the tradeoff between packet collision and transmission delay. Moreover, the throughput performance by adopting these algorithms is greatly influenced by the total number of WSs within the WLAN.

Compared to the DCF-based random access schemes, there are also polling-based algorithms proposed for WLAN in order to provide feasible performance to fulfill time-constrained requirements. Various centralized polling protocols and scheduling algorithms (e.g. [14]) have been proposed to increase the channel utilization for the IEEE 802.11 point coordination function (PCF) [1]. The opera-tion time period for each WS is divided into cycles of contention period (CP) and contention-free period (CFP), where CFP is utilized by either the PCF for real-time packet delivery. A reservation-based MAC protocol was employed in [15] to provide support for real-time traffic. The work in [16, 17] proposed piggyback schemes by adjusting the transmission rate of WS for throughput enhancement. However, the requirement to specifically assign the designated CFP for the implementation of polling-based algorithms will lead to excessive overhead if the WSs have no packet to be delivered to the access point (AP). Moreover, these AP-initiated polling protocols can not completely fulfill the throughput requirement while the WSs are intending to conduct uplink data transmissions. Moreover, the channel reservation MAC protocol was presented in [18] to provide automatic scheduling of channel usage between the WSs. However, this scheme requires both a busy tone channel and multple antennas in order to resolve the hidden terminal problem.

It is noted that there are tradeoffs between the central-ized-based and contention-based schemes under different network environments. It will be beneficial to provide a channel access mechanism that can adaptively switch between these two types of schemes. Therefore, an adap-tive reservation-assisted collision resolution (ARCR) pro-tocol is proposed in this paper in order to alleviate packet collisions within the random access scheme. The main feature of proposed ARCR scheme is that the original contention-based channel access will be adaptively trans-formed into a reservation-based system in the case that there are pending requests for packet transmission from the WSs. With the adaptable reservation period by exploiting the ARCR algorithm, packet collision resulting from channel contention can be effectively reduced which con-sequently leads to enhanced network throughput. Analyti-cal model for throughput analysis is developed in this paper to provide feasible observations on the behaviors of pro-posed ARCR protocol. Numerical results are conducted via simulations both to provide validation on the analytical models and to evaluate the effectiveness of proposed scheme. It can be observed that network throughput can be enhanced by adopting the ARCR algorithm compared with other existing protocols.

The remainder of this paper is organized as follows. Section2briefly summarizes the IEEE 802.11, the GDCF, and the EBA protocols. The proposed ARCR scheme is described in Sect.3associated with its throughput analysis presented in Sect. 4. Section5 illustrates the performance validation and evaluation for the proposed ARCR protocol; while conclusions are drawn in Sect.6.

2 Preliminaries

2.1 IEEE 802.11 MAC protocol

The DCF is utilized as the basic access mechanism in the IEEE 802.11 MAC protocol. It is based on the carrier sensing multiple access with collision avoidance (CSMA/ CA) scheme to ensure that each WS can acquire a fair chance to access the wireless medium. A WS that intends to transmit data will first sense the channel to verify if it is at the idle state. As the channel is idle for the time interval of DCF interframe space (DIFS), the random backoff process will be started which is executed in each WS for the purpose of decreasing the probability of data collision. The random number kdcf at the backoff stage i is chosen

within the range of a uniform distribution U[a, b], i.e. kdcf= U[0, 2i W - 1] where W denotes the minimum

backoff window size. It is noted that the backoff stage i corresponds to the number of transmission retries. More-over, both the request-to-send (RTS) and clear-to-send

(3)

(CTS) packets exchanged before the data transmission is exploited to resolve the potential hidden terminal problem. In order to avoid packet collision during data transmission, the virtual carrier sensing mechanism carried out by the network allocation vector (NAV) is utilize to record the duration of on-going data transmission. It is noted that the NAV information adopted within each WS will be delivered to its neighbor nodes. A nonzero NAV value recorded in a WS will consequently prohibit the surround-ing neighbor nodes to initiate a new data transmission.

Unlike the contention-based DCF scheme, the PCF supported by IEEE 802.11 standard is designed to be a centralized polling protocol. Periodic occurrences of CP and CFP are designed for each WS, where CP is operated by DCF and CFP is executed by polling mechanism. The AP will broadcast a beacon message to inform all the WSs regarding the start of CFP. Based on a polling list of WSs recorded within the AP, the AP will sequentially transmit the CF-Poll control frame to the WS within the list by adopting the round-robin scheduling algorithm. If a WS that receives the CF-Poll frame has data to be delivered, the WS will transmit data packets to the AP after waiting for a short interframe space (SIFS). The AP correctly receiving data packets will send a CF-ACK frame in response to the WS after waiting for the SIFS time interval. On the other hand, in the case that the AP did not receive any data packet within the time interval of PCF interframe space (PIFS), it will continue to poll the next WS in its corre-sponding polling list. After all the WSs in the list have been consecutively polled, the AP will broadcast the CF-End frame as the indication for the end of CFP. Afterwards, all the WSs in the network will enter into the CP mode with the adoption of contention-based DCF scheme.

2.2 Gentle DCF (GDCF) protocol

The GDCF algorithm in [11,12] modifies the conventional backoff scheme within the IEEE 802.11 protocol for the enhancement of network throughput. The major parameter in GDCF scheme is the design of a successful counter for recording the number of consecutive successful transmis-sions. The counter will be reset to zero every time a failed transmission has been occurred. Similar to the conventional DCF scheme, the CW size will be doubled if the packet for the WS is failed in transmission. On the other hand, in the case of successful packet transmission, the CW size by adopting the GDCF protocol will not be reset back to the minimal CW size as the DCF scheme. The CW size will be maintained until there exist c successful transmissions of data packets, and the size will be halved only after the c consecutive transmissions have been achieved. Conse-quently, the packet collision owing to the channel con-tention can be alleviated with the adoption of GDCF

scheme. However, the network throughput can only be enhanced with the reduction of RTS packet collisions while there exists a large number of WSs within the network. In the case that there is a comparably smaller number of WSs in the considered network, the design of an enlarged CW size will degrade the network throughput, which conse-quently results in elongated transmission delay.

2.3 Early backoff announcement (EBA) protocol

The main concept of EBA protocol [8] is to select the next backoff counter earlier and also inform the other WSs in the current transmission. An extra field, called EBA field, is piggybacked after the MAC header in order to record the value for the WS to select in its next contention. The other WSs will hear the value of backoff counter chosen by this WS, and avoid picking the same slot for channel conten-tion. Each WS will maintain a reservation window to record the slots occupied by other WSs according to the EBA field received from others. If a WS selects a backoff number but hears that this number will be utilized by another WS, it will choose another empty slot to avoid collision with that WS. Moreover, the authors proposed two different methods for CW selection, i.e. the EBA-1 and EBA-2 schemes. Similar to the conventional DCF protocol, the EBA-1 scheme randomly chooses a value based on the current CW. The difference is that the WS will be kept away from the occupied slot by adopting the EBA-1 scheme. On the other hand, in the EBA-2 method, the WS will calculate the number of occupied slot a to estimate the number of WSs existed in the network. The CW size will be set as 2a and the backoff counter will be randomly selected in this range excluding the occupied slot. More-over, the minimum CW size (W) is assumed to be 8 in the EBA-2 method except that W = 0 is chosen if the WS enters the network for the first time. Intuitively, the EBA-2 scheme can adapt to the environment change faster than the EBA-1 method.

3 Proposed ARCR protocol

The design concept of proposed ARCR algorithm is to adaptively provide reservation periods for specific WSs within the contention-based channel access networks. In order to promote the network throughput without incurring excessive control overhead, the piggyback mechanism [19] is utilized to append the control messages after either the data or the acknowledge (ACK) packets. The piggybacked fields introduced by the ARCR protocol are applied in order to alleviate the RTS/CTS/ACK overheads, to regulate the backoff processes, and to schedule the transmission

(4)

orders, which ultimately can achieve higher network throughput. With the enhanced channel utilization by adopting the proposed ARCR scheme, it will be illustrated in the numerical evaluation that the overheads from the piggybacked control fields are observed to be insignificant. The functional description of proposed ARCR scheme is described in Sect. 3.1 The examples of both ideal and realistic network scenarios for the proposed scheme are addressed in Sects.3.2and3.3.

3.1 Functional description

As a node intends to transmit data packets within an IEEE 802.11 AP-based network, an RTS/CTS exchange process will be initiated before the transmission of data packets. In the case that there are additional data packets to be deliv-ered, a control field called table-adding request (TAR) will be appended after the data packet for piggyback purpose, i.e. denoted as DATA?TAR. On the other hand, the con-ventional DCF scheme will be adopted if there is no further data packet to be dispatched. The TAR control field is defined as follows.

Definition 1 (TAR) TAR (Table-Adding Request) is defined as a control field used to inform the AP that a WS is intending to join the AP’s reservation table.

After receiving the DATA?TAR packet from the WS, the AP will record the MAC address of the corresponding WS within its reservation table T = {Tr(S), V r, S} that

consists a list of prioritized numbering for each WS, e.g. T0(A) indicates that WS A is recorded in the first entry (i.e.

r = 0) of the reservation table T. Consequently, the AP will respond with an ACK packet associated with a pig-gybacked field called next transmission order NTO(r), which is defined as follows.

Definition 2 (NTO(r)) NTO(r) (Next Transmission Order) is defined as a control field adopted by the AP to inform a WS that its order for the next transmission is r.

For example, r = 0 indicates that the WS is recorded at the top of the reservation list T, which will be the next WS to conduct packet transmission. Therefore, each WS that are recorded in the reservation table will be informed by the AP with the ACK?NTO(r) packet. By adopting the ARCR scheme, the random backoff number karcr for the

WS will be selected based on the corresponding index r as

karcr¼ U½0; 20W 1; r¼ 0 U½2r1W; 2rW 1; 1 r  M U½‘  2M1W; u 2M1W 1; r [ M 8 < : ð1Þ

where ‘ = r - M ? 1, u = r - M ? 2, and the parameter M denotes the maximum number of backoff stage. According to the transmission order r, it can be observed

from (1) that each specific WS S within the table entry Tr(S) will possess a distinct range of values for its

corre-sponding random backoff number karcr. This design will

assure that small value of r will result in smaller random backoff number karcr. Consequently, based on the

reser-vation system of the ARCR scheme, the WS with the smallest value of r (i.e. at the top of the reservation table) will be ensured to acquire the channel access comparing with the other WSs within the table T. It is also noticed that the backoff scheme is transformed from exponential to linear increase for the purpose of limiting the range of random number karcrafter r [ M.

Definition 3 (RTS-R) The RTS-R packet signifies the initiation of the reservation period, which is delivered by the WS after acquiring the ACK?NTO(r) packet from the AP.

After the WS is informed by the AP that it will be the next station to conduct packet transmission, the WS is ready to transmit its RTS-R packet in order to initiate the reservation period. The transmission of RTS-R packet will be delivered from the WS after it has succeeded in con-tending the channel access by adopting its random backoff number karcras in (1). After the RTS-R/CTS handshake has

been completed, either the DATA?TAR packet or the DATA packet will be transmitted from the WS to the AP. Once the data transmission has been accomplished, the table entry Tr(S) will remain in or be removed from the

reservation table if the DATA?TAR packet or the DATA packet is transmitted respectively. Furthermore, in the case that there are remaining table entries within T, the AP will transmit its ACK packet appended with a request for data (RFD) field towards the WS that is recorded within the next table entry. The RFD field is defined as follows.

Definition 4 (RFD(r)) RFD(r) (Request for DATA) is defined as a control field utilized by the AP to inform the r-th WS in the reservation table that it can conduct packet transmission after waiting for a short interframe space (SIFS) duration.

The ACK?RFD(r) packet is employed to serve as the indication message from the AP to the WS for requesting the next data transmission, which is delivered within the reservation period. Without conducting the backoff pro-cess, the corresponding WS can immediately transmit its DATA?TAR (or DATA) packet to the AP after a SIFS interval. The procedures for transmitting the ACK? RFD(r) packet will be continuously conducted until all the table entries within the reservation table T have been processed. The ARCR algorithm will be switched from the reservation-based system back to the contention-based DCF scheme. It is especially noticed that there is only one RTS-R packet required for channel contention within the

(5)

entire reservation period. With the exploration of adaptive reservation period, the proposed ARCR scheme can reduce packet collision from the RTS packets, which effectively increases the channel utilization.

Furthermore, the fairness for packet transmission between the WSs is also considered within the reservation period of proposed ARCR scheme. All WSs within the reservation table will be scheduled by the AP based on the round-robin fashion in order to maintain the fairness for packet transmission. Considering that all the WSs contin-uously have data packets to be delivered, i.e. the DATA?TAR packets are always transmitted by the WSs, the WS that is informed by the AP with the order r (i.e. NTO(r)) will be assigned with the order of r - 1 for its next transmission with NTO (r - 1). It is noted that the WS with the order of r = 0 will therefore be assigned with the maximum value of r for its next transmission order.

Figure1shows the flow chart for each WS by adopting the proposed ARCR protocol. As a WS enters the network at the first time, it will stay in the DCF mode and wait for packet arrival. In the case that the WS possesses data packets to be delivered, the WS will send out an RTS packet to contend for channel access. Assuming that the WS wins the channel contention, it will verify there exists additional packet in its queue to be delivered. If there are extra packets, the flag DataInQueue will be set to 1, and the DATA?TAR packet will be transmitted. Otherwise, the

flag DataInQueue will be 0 and a pure DATA packet will be delivered. After successful transmission of the packet, if DataInQueue = 1, the WS will select a random number in the range based on the NTO(r) value given by the AP. Afterwards, if the WS receives the RFD(r) field before the backoff counter goes down to 0, the WS will cancel its backoff process and transmit either the DATA?TAR or DATA packet after waiting for a SIFS interval. Otherwise, the WS will send out an RTS-R packet for channel con-tention. The transitions between the conventional DCF scheme and the ARCR algorithm are also illustrated. Either the WS failed in packet transmission or it has no further data to be delivered, the ARCR scheme will be switched back to the DCF protocol with the implementation of random backoff scheme for packet retransmission. It is noted that the AP is in charge of all the WS within the reservation table; while those WSs that are out of the res-ervation table will conduct the RTS/CTS handshakes with the AP. Therefore, the hidden terminal problem can be resolved in the proposed ARCR algorithm since the AP will set the NAV vector to all the WSs in the network. Moreover, several types of control fields can be piggy-backed after the ACK packet, e.g. NTO(r) or RFD(r). Figure2 shows the formats of ACK packet with different piggybacked control fields. Therefore, while receiving the ACK packet, the WS can recognize the type of ACK packet according to the value within the two-bit flag as illustrated in Fig.2. Different types of transmission scenarios will be exemplified in the following two subsections.

3.2 Ideal network scenarios

Figure3(a) shows an example for an ideal network sce-nario by exploiting the proposed ARCR algorithm. In this case, it is assumed that the channel is error-free without any packet collision occurred. Three WSs A, B, and C within the network are intending to continuously trans-mit data packets to the AP. At the beginning time instant t1,

no entry is recorded within the AP’s reservation table T; while the three WSs are contending for channel access by adopting the IEEE 802.11 DCF mechanism. It is assumed that WS A acquires the channel access after the contention, the conventional RTS/CTS exchange will be conducted between WS A and the AP. The DATA?TAR packet will be delivered from WS A to the AP, where the TAR field indicates the request from node A that it still possesses remaining data packet to be transmitted. After the table entry T0(A) has been added to the reservation table T, the

AP will transmit the ACK?NTO(0) packet to WS A indi-cating that it will be the first WS to conduct packet trans-mission in the next reservation period. It is noted that the

select select DatalnQueue DatalnQueue DatalnQueue DatalnQueue DatalnQueue DatalnQueue cancel cancel select

Fig. 1 The flow chart for the behavior of WS by adopting the proposed ARCR protocol

(6)

NAV vector is utilized to suspend potential channel sens-ing and packet transmissions from both WSs B and C dur-ing the interaction time interval between WS A and the AP. After WS A completes its first transmission with the AP, the three WSs will continue to compete for the channel access at time t2. Since WS A has received the NTO(0)

packet from the AP, it will employ the random backoff scheme in (1) by adopting the ARCR scheme; while the conventional backoff scheme from the DCF mechanism will be applied to both WSs B and C. Considering that WS B has obtained the channel access, similar procedures between WS B and the AP will be taken place, i.e. the transmission of RTS, CTS, DATA?TAR, and ACK?NTO(1) packets between WS B and the AP. The table entry T1(B) will also be included in the AP’s

reser-vation table T. Due to the reason that both WSs A and B have received the NTO(r) packets, the random backoff scheme from (1) is exploited for both nodes at time instant t3; while the conventional DCF backoff mechanism will be

adopted by WS C. Owing to the special design of the

random backoff algorithm as in (1), the WS with the smallest r value (i.e. WS A in this case) will be ensured to have the highest opportunity to acquire the channel access among the WSs recorded in the table. Therefore, there will only be either WS A or C that will finally win the channel access after the time instant t3.

Assuming that WS A acquires the channel access after t3, the RTS-R packet will be initiated by WS A to start the

reservation period for both WSs A and B, i.e. DtR;1 as shown in Fig.3. After the reception of the DATA?TAR packet from WS A, the AP will respond with the ACK?RFD(1) packet where the ACK packet is intended for WS A and the RFD(1) field is targeting for WS B. Note that as WS A receives this type of ACK packet, i.e. ACK?RFD(r), WS A will know that it is the first suc-cessfully transmitted WS in this reservation period. Based on the received RFD(1) field from the AP, WS B will terminate its backoff process and conduct the transmission of DATA?TAR packet to the AP after a SIFS time interval. It is noted that the cancelation of the backoff

A A F,r r A r A F,r A r1 r2 F, r undefined 1 0 r F, r 1 0 r1 r2 1 1

2 bits 7 bits 7 bits

ACK+NTO(r)+RFD(r) ACK

ACK+NTO(r) ACK+RFD(r)

ACK+NTO(r )+NTO(r )1 2

Frame Control Duration Address Frame Control Duration Address Frame Control Duration Address

FCS FCS FCS Frame Control Duration Address FCS

undefined

r 0 0

Frame Control Duration Address FCS

s e t y b 4 s e t y b 6 s e t y b 2 s e t y b 2

simple form detailed format

Fig. 2 The formats of ACK

packets with different piggybacked control fields

R C D 0 A R C D 1 A R-R C D AP WS A WS B WS C rank Table 0 1 2 A rank Table 0 1 2 B A rank Table 0 1 2 A B rank Table 0 1 2 A B C rank Table 0 1 2 t1 t2 t3 0 A 1 R C D 2 A R-R C D A rank Table 0 1 2 C A B D 0 A D 1 A 2 t4 t5 t6

Reservation Period tR,1 Reservation Period tR,2

AP WS A WS B WS C C D A

X

R-R R-R rank Table 0 1 2 C A B rank Table 0 1 2 C B rank Table 0 1 2 B rank Table 0 1 2 A B A 1 D 0 R-R C D A

X

D R C D A R-R

X

RTS RTS-R CTS DATA+TAR RFD(r) ACK r NTO(r) NAV from WS NAV from AP packet fail

SIFS DIFS+backoff time

WS D

X

R

“collision”

“packet error occurs”

ideal network scenarios (a) realistic network scenarios (b) F,1 D A F,1 F,2 F,2 F,1 F,r t1 t2 t3 R C D 1 A t4 0 A r “don’t care” Δ Δ

(7)

process for WS B can reduce the channel idle time, and consequently promotes the network throughput. After the completion of the DATA?TAR packet from WS B, the AP will respond with an ACK?NTO(0)?NTO(1) packet where the ACK?NTO(0) packet is delivered to WS B and NTO(1) packet is intended for WS A. It is noticed that the transmission order within the reservation system has been swapped for the consideration of fairness, i.e. T¼ fT0ðBÞ; T1ðAÞg.

Considering that WS C finally acquires the channel access at t4, the table-adding procedures will be conducted

for WS C after the completion of its data transmission, i.e. T¼ fT0ðBÞ; T1ðAÞ; T2(C)}. Consequently, at t5, the

reser-vation period DtR;2 will be utilized to conduct packet transmission for all the three WSs that are recorded within the reservation table T. First of all, the AP does not have the information regarding the total number of WSs that will continue to stay in the reservation table before the end of reservation period. Therefore, the AP will not give out the NTO(r) field after WS B finished its data transmission, i.e. only the ACK?RFD(1) packet is delivered where the ACK packet is intended for WS B and the RFD(1) field is targeting for WS A. WS B will understand that it is the first successfully transmitted WS in the reservation period after receiving the ACK?RFD(1) packet where the ACK packet is targeting for itself. Next, as WS A finishes its data transmission, the AP will deliver the ACK? NTO(0)?RFD(2) packet where the ACK?NTO(0) part is for WS A to inform WS A to be the first WS in the next round’s reservation table. Note that the RFD(2) part is to inform WS C that it will be the next WS for data trans-mission. After WS C transmits its data packet, it will receive an ACK?NTO(1)?NTO(2) packet and recognize that NTO(1) is targeting for itself since the ACK packet is specified for WS C. WS C recognizes that it will be the second item recorded in the reservation table for the next round. On the other hand, as WS B receives the same ACK?NTO(1)?NTO(2) packet, it will understand that the second NTO, i.e. NTO(2), is designated for itself since this type of ACK packet specifies the end of this reservation period. WS B will be assigned with a lower priority on the next reservation period based on the round-robin fashion. Afterwards, the transmission order will be rotated for the purpose to ensure the transmission fairness i.e. T¼ fT0ðAÞ; T1ðCÞ; T2ðBÞg. Therefore, with the recognition of the different types of ACK packets, it is not required for the WSs to include their station identifier in the NTO field. In the case that there exists a new WS (e.g. WS D) that joins the network at the time instant t6, channel contention will

occur between WSs A and D. Otherwise, a new reservation period DtR;3 will be initiated to continuously transmit the packets from WSs A, B, and C.

3.3 Realistic network scenarios

The examples for the proposed ARCR scheme to alleviate the packet collision problems under an realistic network scenario is shown in Fig. 3(b). First of all, the adaptive adjustment of ARCR scheme owing to the RTS-R packet collision is considered. Assuming that the AP’s reservation table is recorded as T¼ fT0ðAÞ; T1ðCÞ; T2ðBÞg before the time instant t1. Since WS A is situated at the top of table T,

it will possess the smallest backoff number karcraccording

to (1) which results in the acquisition of channel access. WS A will initiate the RTS-R packet to the AP, and it is assumed to be unsuccessfully transmitted due to packet collision. Without receiving the CTS packet from the AP, WS A will change its channel access mechanism from the ARCR algorithm back to the conventional DCF scheme. As shown in the flow chart from Fig.1, the random number kdcf

will be selected via the original DCF scheme with backoff stage i = 0, i.e. within the range of U[0,20W - 1]. On the other hand, since WS C did not obtain the RFD(1) field from the AP, it will continue its random backoff process. There-fore, both WSs A and C will be involved in contending the channel access at time t2. Considering that WS C is

suc-cessful in acquiring the channel, it will start the reservation period by sending the RTS-R packet to the AP. With the reception of the RTS-R packet, the AP will notice that its first table entry T0(A) is not available for data transmission.

Consequently, the entry T0(A) is removed such that the

res-ervation table will become T¼ fT0ðBÞ; T1ðCÞg. It can be observed that all the WSs within the reservation table are assigned with the random number kdcfbased on the ARCR

scheme. If the RTS-R packet of the WS with NTO(0) fails, the WS with NTO(1) can continue to conduct the corre-sponding reservation process.

The transmission priorities that are recorded within the reservation table will be changed after the packet trans-missions for both WSs B and C, i.e. T¼ fT0ðBÞ; T1ðCÞg. For the next reservation period starting from t3, after WS

B accomplishes its packet transmission with the AP, WS C will receive the RFD(1) message from the AP and start to dispatch its DATA?TAR packet. Considering that the DATA?TAR packet failed in transmission due to channel error, the AP will wait for a period required for successful packet transmission, i.e. the AP timout period, to recognize this situation and consequently remove WS C from its reservation table as T = {T0(B)}. Moreover, if there are

still other table entries recorded behind the removed table entry, the AP will continue to initiate the RFD message to the remaining WSs for packet transmissions. On the other hand, without any further acknowledgement from the AP, WS C will change its channel access mechanism from the ARCR algorithm back to the DCF scheme. At time t4, all

(8)

the three WSs will be in the process to contend for channel access, and similar procedures are implemented to conduct packet transmission.

Similar processes can be examined as above in the case that either the ACK?NTO or the ACK?RFD packet failed in its transmission from the AP to the corresponding WS. The AP will remove the table entry for the WS after waiting for the AP timeout period; while the WS will be adaptively switched back to its original DCF mode for channel contention.

4 Throughput analysis of proposed ARCR protocol

Analytical study is performed in order to explore the benefits of proposed ARCR protocol. The probability for a WS to join the reservation table is derived in Sect.4.1As a consequence, the analytical model of throughput perfor-mance for proposed ARCR protocol will be obtained in Sect.4.2

4.1 Derivation of reservation probability Pt

There are existing research [20–25] establishing the ana-lytical models for the backoff process of DCF scheme under different considerations, e.g. fading channel [21], backoff suspension [24], or retry limit [25]. The two-dimensional Markov chain model utilized in [21] is adop-ted as the baseline model to analyze the random backoff process in the proposed ARCR protocol. It is considered that there are N WSs and 1 AP in the wireless network. Let the probability p represent the probability of failed trans-mission due to packet collisions or channel noise, and s be defined as the probability that a WS transmits a RTS packet in a randomly selected time slot. By iteratively solving the nonlinear functions for p and s as stated in [21], these two parameters can therefore be obtained.

The major task in this subsection is to derive the parameter Ptwhich refers as the transition probability that

a WS either is in or will join the reservation table, named as reservation probability. As described in Sect.3.1, the WSs will be added into or removed from the AP’s reservation table T according to the proposed ARCR scheme. There-fore the total number of effective WSs will vary with the transmission events that happen in the network. In the proposed ARCR protocol, the effective WSs are defined as the set which consists of (a) the WSs that adopt the DCF scheme for channel contention and (b) the WS in the first entry of the reservation table T. Consider that the AP has recorded several WSs in its reservation table T. If a WS successfully completes its transmission by applying the DCF scheme, it will be added as the last entry in T and the number of effective WSs will be decreased by one.

On the other hand, the number of the effective WSs will be increased by one if any of the WSs recorded in T is forced to be removed from the table under certain network sce-narios. Let ne,r be referred as the number of the effective

WSs in the network on the condition that there are r WSs in the reservation table T. The relationship between the number of WSs r in the reservation table T and the number of effective WSs ne,rin the network is represented as

ne;r¼

N; r¼ 0

N r þ 1; 1 r  N 

ð2Þ

According to (2), if the reservation table T is empty (i.e. r = 0), ne,0will be equal to N and all the effective WSs will

compete the channel by using the DCF scheme. In the case that there is one WS in T, the parameter ne,1will still be equal

to N since the WS in T will need to contend for channel access with the other N - 1 WSs that are not in the table. Considering that there are ne,reffective WSs in the network,

the numbers of WSs reside inside and outside the reservation table T will be N - ne,r? 1 and ne,r- 1 respectively.

A WS which joins in or departs from the reservation table T will affect the degree of channel contention in the wireless network. If a WS joins in the reservation table T, the number of effective WSs will decrease and the occur-rence of packet collisions will be reduced. On the other hand, the transmitted packets will potentially suffer from more collisions when the number of effective WSs is increased owing to the departure of WSs from the reser-vation table T. To simplify the interactions among the WSs, it is assumed that whether a WS will join in or depart from the reservation table is independent to the strategies adopted by the other WSs. Figure4 shows the transitions between the steady states according to whether a WS will be recorded in the reservation table T. The parameter ptis

defined as the steady state probability that a WS will reside in the reservation table T, which can be obtained as

pt ¼ ptPtþ ð1  ptÞPt¼ Pt ð3Þ

In order to solve the reservation probability Pt, another

relationship between ptand Ptwill be required. Given that

there are r WSs in the reservation table which corresponds to ne,r effective WSs in the network, the parameters Pc,r

and sr are respectively denoted as the probabilities of

collisions and the events that a WS transmits its RTS

Fig. 4 The Markov model of reservation probability Pt for the

(9)

packet in a random slot time. Based on the iterative computation between s and p, the set of parameters Pc,rand

srcan be solved from r = 0 to r = N. In other words, Pc,r

and sr can be calculated by replacing N with ne,r.

Moreover, the probability for a WS to be in the reservation table can be contributed to either one of the following two factors: (a) a WS is added into the reservation table T after successfully transmitting packets via channel contention or (b) a WS that exists in table T has conducted successful packet transmission. Therefore, the parameter Ptcan also be regarded as the probability of

successful transmission considering the situations that a WS is either inside or outside of the reservation table. Based on the value of Pc,r as described above, the

probability Pt in the steady state can consequently be

derived as Pt¼ XN r¼0 CNrprtð1  ptÞ Nr ne;r N ð1  PfÞð1  Pc;rÞ þ N ne;r N ð1  PfÞ   ð4Þ

where Pfdenotes the packet error rate due to the existence

of channel noises. It is noted thatne;r

N in (4) is denoted as the probability that a WS is required to contend with the other WSs in the network. On the other hand,Nne;r

N represents the probability that the WS resides within the reservation table to be scheduled for packet transmission. Therefore, only the packet error rate Pfis required to be addressed without

the consideration of collision probability Pc,r. By

substi-tuting (3) into the (4), the parameters pt and Pt can

con-sequently be obtained by solving the corresponding nonlinear function.

4.2 Throughput performance of proposed ARCR protocol

Compared to conventional analytical models for DCF scheme, the analysis for throughput performance of pro-posed ARCR protocol is to further investigate the effect from the reservation table to the channel contention. Let Ptr,rbe the probability that there is at least one WS

trans-mitting in a slot time while r WSs are recorded in the reservation table T, i.e.

Ptr;r¼ 1  ð1  srÞne;r ð5Þ

Moreover, the probability Ps,r is denoted as the event that

exactly one WS occupies the channel without any transmission from the other WSs given that there are r WSs in the reservation table. The probability Ps,r can be

derived as

Ps;r ¼

ne;rsrð1  srÞne;r1 Ptr;r

ð6Þ

To obtain the system throughput with r WSs recorded in T, the average payload delivered in successful transmissions will be considered. The parameter E[Pr] represents the

average payload size for one transmission given that there are r (r = 0) WSs in the reservation table T, which can be obtained as E½Pr ¼ ne;r 1 ne;r E½P þ 1 ne;r ðN  ne;rþ 1ÞE½P ¼ N ne;r E½P ð7Þ where E[P] denotes the average intended transmitted pay-load size for each WS. It is noted thatne;r1

ne;r represents the

probability that the transmitters do not reside in the reser-vation table T, and each of them has payload E[P] to be delivered. On the other hand, the fractionn1

e;rstands for the

transmission probability of the WS that possesses the first transmission priority among all the WSs in the reservation table T. The total payload issued at this case by the entire r WSs in T becomes (N - ne,r? 1)E[P]. In the case that

r = 0, all the WSs will adopt the conventional DCF scheme which results in E[Pr=0] = E[P] that can also be

verified by substituting r = 0 in (7).

In order to evaluate the total required time Tav,r for

packet transmission given that there are r WSs in the res-ervation table, the time durations owing to packet collisions Tc, successful transmissions Ts,r, and noise

cor-ruptions Tf,r will be taken into account. Note that the

required time owning to noise corruption Tf,ris assumed to

be equal to that for successful transmissions Ts,r. With the

consideration of the three events mentioned before, the average required time Tav,rcan be derived as

Tav;r¼ ð1  Ptr;rÞr þ Ptr;rð1  Ps;rÞTc þ Ptr;rPs;rð1  PfÞTs;rþ Ptr;rPs;rPfTf;r

ð8Þ

where r represents the slot time. The probabilities Ptr,r

and Ps,r can be obtained from (5) and (6) respectively.

The parameter Tcdenotes the time for a WS to sense the

occurrence of packet collisions which can be expressed as

Tc¼ TRTSRþ d þ TCTSþ d þ TSIFSþ TDIFS ð9Þ

where d is the propagation delay, and the remaining parameters in (9) are indicated by their corresponding subscripts. Noted that TRTS-R represents the required time

for either the RTS or the RTS-R packet since no additional control field is required by adopting the designed RTS-R packet. On other other hand, the required time for successful transmissions can be acquired as

(10)

Ts;r¼ ne;r 1

ne;r

½TRTSRþ TCTSþ TPHYþ TMACþ TE½P

þ TACKþNTOþ 3TSIFSþ 4d þ TDIFS

þ 1 ne;r

½TRTSþ TCTSþ TSIFSþ 2d þ TDIFS

þ ðN  ne;rþ 1ÞðTPHYþ TMACþ TE½P

þ TACKþ 2TSIFSþ 2dÞ ð10Þ

where TE[P], TACK?NTO, TPHY, and TMAC are defined as

the required time intervals for transmitting payload, ACK?NTO frame, PHY header, and MAC header. Noted that the time interval for transmitting the designed RFD field is considered within the MAC header. Similar to the concept in (7), the first term in (10) that associated with probability ne;r1

ne;r denotes the successful transmission

conducted by a WS that adopts the DCF scheme. The second term associated with probability 1

ne;r indicates the

required time for a successful transmission while the WS resides in the reservation table, which exploits the ARCR protocol to compete the channel access. Furthermore, a transmitter will need to perceive whether its transmission has completed or not according to the reception of ACK packet. Therefore, the required time owing to noise corruption will be equal to that for successful transmissions, i.e. Tf;r¼ Ts;r. Based on (7) and (8), the average system throughput S can consequently be derived as S¼ PN r¼0CNrprtð1  ptÞNrPtr;rPs;rð1  PfÞE½Pr PN r¼0CNrprtð1  ptÞNrTav;r ð11Þ

where ptcan be obtained by solving (3) and (4). It is noted

the term Ptr;rPs;rð1  PfÞE½Pr in (11) denotes the expected payload to be transmitted with r WSs in the reservation table. The term (1 - Pf) shown in (11) indicates that only

partial payload can be successfully transmitted with the consideration of packet error rate Pf. The validation of

throughput performance S in (11) for the proposed ARCR protocol will be conducted in Sect.5.1.

5 Performance evaluation

In this section, the performance of proposed ARCR pro-tocol will be validated and compared with existing schemes via well-known simulator (NS-2) [26]. All the simulation runs will be conducted for 100 s. Performance validation of the ARCR scheme is conducted in Sect. 5.1, and perfor-mance comparison with other schemes will be shown in Sect.5.2.

5.1 Performance validation

In order to validate the analytical model for proposed ARCR scheme, the system throughput S as derived in (11) is compared with simulation results as shown in Figs. 5and 6. Noted that the legends ‘‘ana’’ and ‘‘sim’’ in both figures represent the results from analytical model and simulations respectively. The system parameters and MAC configura-tions based on IEEE 802.11b standard are listed in Table1, and saturation traffic is assumed for each WS to deliver its data packets. Figure 5 shows the performance validation for throughput performance versus the number of WSs (N) under BER = 0, 10-5, and 10-4. It can be intuitively observed that the system throughput increases as the total number of WSs in the network is augmented. Moreover,

0 10 20 30 40 50 1 2 3 4 5 6 7 Number of WSs System Throughput (Mbps) BER=0, sim BER=0, ana BER=10−5, sim BER=10−5, ana BER=10−4, sim BER=10−4, ana

Fig. 5 Performance validation for ARCR protocol: system through-put versus number of WSs

10−6 10−5 10−4 0 1 2 3 4 5 6 BER System Throughput (Mbps) N=5, sim N=5, ana N=10, sim N=10, ana N=20, sim N=20, ana

Fig. 6 Performance validation for ARCR protocol: system through-put versus BER

(11)

Fig.6 illustrates the throughput versus BER under N = 5, 10, and 20. The throughput performance decreases as the BER values are increased. It can be seen from both figures that the proposed analytical model can match with the simulation results under different numbers of WSs and BER values.

5.2 Performance comparison

As shown in Figs.7, 8, 9 and 10, the proposed ARCR protocol is compared to the DCF, GDCF [11,12], PCF, and EBA-2 [8] schemes through a series of simulations in terms of both the number of WSs and the BER values. The system parameters in Table1 are utilized in performance comparison with saturation traffic considered for each WS. It is also assumed that the successful counter c of GDCF is

set equal to 2. Figure7shows the performance comparison of system throughput w.r.t. different numbers of WSs under BER =0 and 10-5. It can be observed that the pro-posed ARCR scheme possesses higher throughput perfor-mance than the other three protocols under different numbers of WSs. The only exception is at the case of N = 1 that the EBA-2 scheme provides better performance than the ARCR protocol mainly due to the reason that the parameter W is selected to be 8 and 32 for EBA-2 and ARCR schemes, respectively. It is intuitively that smaller W will enhance the throughput performance if there exists only one WS in the network. The EBA-2 protocol has better performance than the GDCF and DCF schemes since most of the WSs are not allowed to choose the same slot to transmit their RTS packets. Collision overhead and backoff delay can therefore be reduced. Moreover, the GDCF

Table 1 System parameters

Parameter Value Minimum window (W) 32 Maximum backoff (M) 5 Data rate 11 Mbps Basic rate 1 Mbps Slot time (r) 20 ls TSIFS 10 ls TDIFS 50 ls

PHY header 192 bits

MAC header ? TAR 224 bits

Propagation delay (d) 1 ls

Payload size (E[P]) 8184 bits

RTS/RTS-R 160 bits

CTS 112 bits

ACK ? RFD/NTO 112 ? 16 bits

0 10 20 30 40 50 3 3.5 4 4.5 5 5.5 6 6.5 Number of WSs System Throughput (Mbps) 0 10 20 30 40 50 3 3.5 4 4.5 5 5.5 6 6.5 Number of WSs System Throughput (Mbps) BER=0, ARCR BER=0, DCF BER=0, GDCF BER=0, EBA−2 BER=10−5, ARCR BER=10−5, DCF BER=10−5, GDCF BER=10−5, EBA−2

Fig. 7 Performance comparison for ARCR protocol: system through-put versus number of WSs

10−6 10−5 10−4 0 1 2 3 4 5 6 System Throughput (Mbps) 10−6 10−5 10−4 0 1 2 3 4 5 6 BER BER System Throughput (Mbps) N=5, ARCR N=5, DCF N=5, GDCF N=5, EBA−2 N=50, ARCR N=50, DCF N=50, GDCF N=50, EBA−2

Fig. 8 Performance comparison for ARCR protocol: system through-put versus BER

0 2 4 6 8 10 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 Time (sec) Fairness Index 2 4 6 8 10 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 Time (sec) Fairness Index N=10, ARCR N=10, DCF N=10, GDCF N=10, EBA−2 N=30, ARCR N=30, DCF N=30, GDCF N=30, EBA−2

Fig. 9 Fairness comparison for ARCR protocol: fairness index versus time

(12)

method is slightly superior to the DCF scheme with larger number of WSs in the network. The reason is that the GDCF scheme has higher probability of staying at the stages with larger backoff window sizes compared to the DCF protocol. Less packet collisions will be incurred by adopting the GDCF scheme especially under larger number of WSs, which results in higher system throughput.

Figure8 illustrates the comparison of throughput per-formance versus different BER values under N = 5 and 50. The proposed ARCR protocol still outperforms the other three schemes under various BER values. It can also be observed that the system throughput of four schemes decrease and converge with the augmentation of BER values. At higher BER values, the proposed ARCR pro-tocol behaves similar to the DCF scheme since almost all the WSs in the network will be removed from the reser-vation table due to occurrence of packet error . On the other hand, with higher BER values, the GDCF method is also comparable to the DCF scheme owing to the reason that its backoff stage will eventually remain at the maximum value. Furthermore, the fairness index F [27] is introduced to estimate the fairness of each protocol, which is formu-lated as F¼ PN i¼1Si  2 NPNi¼1S2i ð12Þ

where Sirepresents the throughput of WS i. The maximum

value of F is equal to 1 which indicates the fairest situation; while minimal value F = 1/N denotes the most unbalanced case. Intuitively, the value of F will be approximated to 1 for the steady state response of each protocol since every WS has equal opportunity to contend the channel.

Therefore, the rates of achieving steady state for all the schemes are compared in order to determine the fairness levels. Figure9 shows the fairness comparison F versus time under different numbers of WSs. It can be observed that the proposed ARCR protocol can quickly achieve the steady state value of the fair index, i.e. F = 1, compared to the other schemes. On the other hand, both the GDCF and EBA-2 schemes result in worse performance compared to that of the DCF protocol due to their inherent designs. The WS with RTS packet collision will suffer from larger backoff delay for the GDCF scheme than that for the DCF protocol since the WS will slowly return back to the minimum CW size in the GDCF scheme, which makes the GDCF scheme become more unfair between the WSs. Furthermore, the WSs that receive the EBA field from the other WS should reselect another backoff counter, which is advantageous for the WS to easily win the channel con-tention. Therefore, the EBA-2 scheme possesses inferior fairness compared to the DCF protocol. Note that it takes more time for the fairness index to achieve steady state with the N = 30 scenario compared to the N = 10 case.

Moreover, the proposed ARCR protocol is compared with the distributed DCF scheme and the centralized PCF protocol given the condition of non-saturated queue in each WS with M/G/1 queuing system. In order to illustrate the pure reservation-based system, the PCF scheme is imple-mented only with the CFP while the CP is not considered in performance comparisons. It is assumed that there are two types of WSs in the network, including the WSs with high packet-arrival rate (k1bits/sec (bps)) and with low

packet-arrival rate (k2bps). Let nk1and nk2 be respectively defined

as the numbers of WSs with k1and k2as the packet-arrival

rates, the corresponding average throughput for each WS with k1and k2is respectively denoted as lk1 and lk2 with

the unit of bps. It is considered that there are total of 10 WSs in the network for performance comparison, i.e. nk1þ nk2¼ 10.

The performance comparisons of average throughput for each WS (i.e. either lk1 or lk2) versus the number of WSs with the packets arrive rate equal to k1 are shown in

Fig.10. Noted that the packet arrival rates k1= 2 Mbps

and k2= 200 Kbps, and the number of WSs with packets

arrive rate k2becomes nk2¼ 10  nk1. It can be observed

from Fig.10that the average throughput for the WSs with k2is approximately the same for all these three protocols,

i.e. lk2 ’ 0:2 Mbps. The results indicate that all three schemes can provide satisfactory services for the WSs with packet arrival rate k2= 0.2 Mbps since lk2 is around the

same as the theoretically maximal throughput for each WS with k2. On the other hand, the effectiveness of proposed

ARCR scheme can be revealed by observing the average throughput lk1 for the WSs with k1. As nk1 is small, the

1 2 3 4 5 6 7 8 9 0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 2 Number of WSs with λ1 1 (nλ)

Average Throughput of Each WS

λ 1 or λ 2 (Mbps) ARCR,λ1 ARCR,λ2 PCF,λ1 PCF,λ2 DCF,λ1 DCF,λ2

Fig. 10 Performance comparison for ARCR protocol: average throughput of each WS versus number of WSs with k1 (nk1) (nk2¼ 10  nk1, k1= 2Mbps, k2= 0.2Mbps)

(13)

polling-based PCF scheme becomes inefficient comparing with the ARCR and the DCF protocols since the network bandwidth is wasted as the AP is scheduled to periodically poll the larger numbers of WS with k2. The proposed

ARCR protocol and the DCF scheme can provide higher throughput for WSs with k1since there is more opportunity

for these WSs to frequently transmit their data packets. Furthermore, with larger values of nk1, the

contention-based DCF scheme will spend significant amount of time to resolve for packet collisions, which results in reduced system throughput of lk1. The proposed ARCR protocol and the PCF scheme can provide higher throughput per-formance since there is greater chance for the larger amount of WSs with k1to be scheduled for packet

trans-mission. As a result, the ARCR protocol can provide better throughput performance under different arrival rates of the WSs in the network.

Figure11 illustrates the average throughput of each WSs (lk1 or lk2) versus the packet arrival rate k2on the

conditions that nk1 ¼ 2, nk2¼ 8, and k1= 2 Mbps. As can

be expected, with the augmentation of k2, the throughput

lk2will be increased, however, the throughput performance lk1for the WSs with k1is reduced for all three schemes. A

saturation point will be reached by the WSs with either k1

or k2for all three protocols due to the availability of total

network bandwidth. Owing to the severe packet collision, the DCF scheme will result in the lowest throughput among the three protocols with the earliest saturation point at k2^400 Kbps. Furthermore, the ARCR scheme will

pro-vide higher throughput performance with around lk1’ lk2’ 0:58 Mbps. On the other hand, the proposed ARCR scheme and DCF can outperform the PCF protocol under smaller values of packet arrival rate k2owing to the polling

overheads resulting from the centralized-based PCF scheme.

Moreover, in each channel competition, based on our proposed ARCR protocol, the first WS in the reservation table possesses the same range of CW size compared to the newly joining WSs. In other words, unsaturated WSs that may not have constant packet to be delivered will have the same level of opportunity for channel contention with the saturated WSs. As shown from Fig.11 that the average throughput of WSs with k1is around 1.32 Mbps and that

with k2is around 0.2 Mbps at packet arrival rate k2= 200

Kbps. It can be seen that the throughput of the unsaturated WS with k2will always be identical to its packet arrival

rate before the saturation occurs at around 580 Kbps. That is to say, the WSs with k2will not encounter large backoff

timer due to packet collisions. As the packet arrival rate k2

is increased to 580 Kbps, it can be observed that all the WSs will achieve around the same throughput perfor-mance. Therefore, the merits of adopting the proposed ARCR scheme can be perceived.

6 Conclusion

In this paper, an adaptive reservation-assisted collision resolution (ARCR) protocol is proposed in order to enhance the network throughput for wireless local area networks. According to the ARCR scheme, adaptive res-ervation periods will be imposed within the conventional contention-based system by adopting the proposed piggy-back mechanisms. Based on the design of reservation table at the access point, excessive packet collision can effec-tively be alleviated in the network. The analytical model of system throughput for the proposed ARCR protocol is derived and validated via simulations. Numerical results show that the ARCR scheme outperforms other existing protocols with enhanced network throughput and better channel utilization.

Acknowledgments This work was in part funded by the Aiming for the Top University and Elite Research Center Development Plan, NSC 99-2628-E-009-005, NSC 98-2221-E-009-065, the MediaTek research center at National Chiao Tung University, the Universal Scientific Industrial (USI) Co., and the Telecommunication Labora-tories at Chunghwa Telecom Co. Ltd, Taiwan.

References

1. IEEE 802.11 WG. (2003). IEEE Std 802.11a-1999(R2003): Part 11: Wireless LAN medium access control (MAC) and physical layer (PHY) specifications: High-speed physical layer in the 5 GHz Band. IEEE Standards Association Std.

2. IEEE 802.11 WG. (2003). IEEE Std 802.11b-1999(R2003): Part 11: Wireless LAN medium access control (MAC) and physical

150 200 250 300 350 400 450 500 550 600 650 0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 CBR (Kbps)

Average Throughput of Each WS

λ 1 or λ 2 (Mbps) ARCR,λ1 ARCR,λ2 PCF,λ1 PCF,λ2 DCF,λ1 DCF,λ2

Fig. 11 Performance comparison for ARCR protocol: average throughput of each WS versus packet arrival rate k2 (nk1¼ 2, nk ¼ 8, k1= 2Mbps)

(14)

layer (PHY) specifications: Higher-speed physical layer exten-sion in the 2.4 GHz Band. IEEE Standards Association Std. 3. IEEE 802.11 WG. (2003). IEEE Std 802.11g-2003: Part 11:

Wireless LAN medium access control (MAC) and physical layer (PHY) specifications: Amendment 4: Further higher data rate extension in the 2.4 GHz band. IEEE Standards Association Std. 4. IEEE 802.11 WG. (2005). IEEE Std 802.11e-2005: Part 11: Wireless LAN medium access control (MAC) and physical layer (PHY) specifications: Amendment 8: Medium access control (MAC) quality of service enhancements. IEEE Standards Association Std. 5. Kwon, Y., Fang, Y., & Latchman, H. (2003). A novel MAC

protocol with fast collision resolution for wireless LANs. In Proceedings of IEEE INFOCOM 2 (pp. 853–862). Mar 2003. 6. Peng, X., Jiang, L., & Xu, G. (2007). Performance analysis of

hybrid backoff algorithm of wireless LAN. In Proceedings of IEEE WiCom (pp. 1853–1856). Sep 2007.

7. Sakakibara, K., Kobayashi, Y., & Taketsugu, J. (2008). Satura-tion throughput of IEEE 802.11 using carrier sense mechanism in backoff intervals. In Proceedings of IEEE ISCCSP (pp. 899–904). Mar 2008.

8. Choi, J., Yoo, J., Choi, S., & Kim, C. (2005). EBA: An enhancement of the IEEE 802.11 DCF via distributed reservation. IEEE Transaction on Mobile Computation, 4(4), 378–390. 9. Li, Q. (2008). Reservation-based distributed collision avoidance

channel access scheme for WLAN. In Proceedings of IEEE GLOBECOM. Nov 2008.

10. Bo, L., Wenzhao, T., Hu, Z. & Hui, Z. (2008). m-DIBCR: MAC protocol with multiple-step distributed in-band channel reserva-tion. IEEE Communication on Letters, 12(1), 23–25.

11. Wang, C., Li, B., Li, B. & Sohraby, K. (2003). An effective collision resolution mechanism for wireless LAN. In Proceedings of IEEE ICCNMC (pp. 18–25). Oct 2003.

12. Wang, C., Li, B., & Li, L. (2004). A new collision resolution mechanism to enhance the performance of IEEE 802.11 DCF. IEEE Transaction on Vehicle Technology, 53(4), 1235–1246. 13. Chen, Z., & Khokhar, A. A. (2005). A channel reservation

pro-cedure for fading channels in wireless local area networks. IEEE Transaction on Wireless Communication, 4(2), 689–699. 14. Kanjanavapastit, A., & Landfeldt, B. (2003). An analysis of a

modified point coordination function in IEEE 802.11. In Pro-ceedings of IEEE PIMRC (Vol. 2, pp. 1732–1736). Sep 2003. 15. Joe, I. (2004). Inwhee Joe, QoS-aware MAC with reservation for

mobile ad-hoc networks. In Proceedings of IEEE VTC. Sep 2004. 16. Lee, H. J., Kim, J. H., & Cho, S. H. (2007). A delay-based piggyback scheme in IEEE 802.11. In Proceedings of IEEE WCNC (pp. 447–451). Mar 2007.

17. Lee, H. J., Kim, J. H., & Cho, S. H. (2007). A novel piggyback selection scheme in IEEE 802.11e HCCA. In Proceedings of IEEE ICC (pp. 4529–4534). Jun 2007.

18. Ma, M., & Yang, Y. (2008). A novel contention-based MAC protocol with channel reservation for wireless LANs. IEEE Transaction on Wireless Communication, 7(10), 3748–3758. 19. Yang, X. (2005). IEEE 802.11 performance enhancement via

concatenation and Piggyback mechanisms. IEEE Transaction on Wireless Communication, 4(5), 2182–2192.

20. Bianchi, G. (2000). Performance analysis of the IEEE 802.11 distributed coordination function. IEEE Journal of Selective Areas Communication, 18(3), 535–547.

21. Zoran, H. V., & Boris, S. (2003). Saturation throughput—Delay analysis of IEEE 802.11 DCF in fading channel. In Proceedings of IEEE ICC (Vol. 1, pp. 121–126), May 2003.

22. Eustathia, Z., & Theodore, A. (2002). CSMA/CA performance under high traffic conditions: Throughput and delay analysis. Computer Communications, 25(3), 313–321.

23. Ci, S., Sharif, H., & Mahasukhon, P. (2005) Evaluating saturation throughput performance of the IEEE 802.11 MAC under fading

channels. In Proceedings of IEEE BROADNETS (Vol. 1, pp. 676–681). Oct 2005.

24. Vardakas, J. S., Sidiropoulos, M. K., & Logothetis, M. D. (2008). Performance behaviour of IEEE 802.11 distributed coordination function. IET Circuits, Devices & Systems, 2(1), 50–59. 25. Wu, H., Peng, Y., Long, K., Cheng, S., & Ma, J. (2002).

Per-formance of reliable transport protocol over IEEE 802.11 wire-less LAN: Analysis and enhancement. In Proceedings of IEEE INFOCOM (Vol. 2, pp. 599–607). Jun 2002.

26. The Network Simulator ns-2, http://www.isi.edu/nsnam/ns/, online link.

27. Jain, R., Durresi, A., & Babic, G. (1999). Throughput fairness index: An explanation. ATM Forum/99-0045, Feb 1999.

Author Biographies

Jia-Shi Lin received the B.S. degree from National Tsing Hua University, Hsinchu, Taiwan, in 2007. Since 2007, he has been pursuing the Ph.D. degree in the Department of Electrical Engi-neering, National Chiao Tung University, Hsinchu, Taiwan. His current research interests include game theory, MAC protocol design, wireless local area networks, and cognitive radio networks.

Kai-Ten Fengreceived the BS degree from National Taiwan University, Taipei, in 1992, the MS degree from the University of Michigan, Ann Arbor, in 1996, and the PhD degree from the University of California, Berkeley, in 2000. Since August 2007, he has been with the Department of Electrical Engi-neering, National Chiao Tung University, Hsinchu, Taiwan, as an associate professor. He was an assistant professor with the same department between Feb-ruary 2003 and July 2007. From July 2009 to March 2010, he was a visiting professor in the Department of Electrical and Computer Engineering, University of California at Davis. He was with the OnStar Corp., a subsidiary of General Motors Corporation, as an in-vehicle development manager/ senior technologist between 2000 and 2003, working on the design of future Telematics platforms and the in-vehicle networks. His current research interests include coopera-tive and cognicoopera-tive networks, mobile ad hoc and sensor networks, embedded system design, wireless location technologies, and Intel-ligent Transportation Systems (ITSs). He received the Best Paper Award from the IEEE Vehicular Technology Conference Spring 2006, which ranked his paper first among the 615 accepted papers. He is also the recipient of the Outstanding Young Electrical Engineer Award in 2007 from the Chinese Institute of Electrical Engineering (CIEE). He has served on the technical program committees of VTC, ICC, and WCNC.

數據

Figure 1 shows the flow chart for each WS by adopting the proposed ARCR protocol. As a WS enters the network at the first time, it will stay in the DCF mode and wait for packet arrival
Fig. 3 The timing diagram for the proposed ARCR protocol under ideal network scenarios
Fig. 4 The Markov model of reservation probability P t for the
Fig. 6 Performance validation for ARCR protocol: system through- through-put versus BER
+4

參考文獻

相關文件

6 《中論·觀因緣品》,《佛藏要籍選刊》第 9 冊,上海古籍出版社 1994 年版,第 1

Now, nearly all of the current flows through wire S since it has a much lower resistance than the light bulb. The light bulb does not glow because the current flowing through it

After enrolment survey till end of the school year, EDB will issue the “List of Student Identity Data on EDB Record and New STRNs Generated” to the school in case the

(A) The drought has authorities worried that the effects of climate change are larger than expected as Australia experiences half of its warmest days on record lately.. (B)

Monopolies in synchronous distributed systems (Peleg 1998; Peleg

Performance metrics, such as memory access time and communication latency, provide the basis for modeling the machine and thence for quantitative analysis of application performance..

• Recorded video will be available on NTU COOL after the class..

Microphone and 600 ohm line conduits shall be mechanically and electrically connected to receptacle boxes and electrically grounded to the audio system ground point.. Lines in