21 research outputs found

    Delay distributions of slotted ALOHA and CSMA

    Get PDF
    We derive the closed-form delay distributions of slotted ALOHA and nonpersistent carrier sense multiple access (CSMA) protocols under steady state. Three retransmission policies are analyzed. We find that under a binary exponential backoff retransmission policy, finite average delay and finite delay variance can be guaranteed for G<2S and G<4S/3, respectively, where G is the channel traffic and S is the channel throughput. As an example, in slotted ALOHA, S<(ln2)/2 and S<3(ln4-ln3)/4 are the operating ranges for finite first and second delay moments. In addition, the blocking probability and delay performance as a function of r/sub max/ (maximum number of retransmissions allowed) is also derived

    Analytic Model of Beb Algorithm With Multiple Priorities in Mobile Information Systems

    Get PDF
    In this paper we propose analytic model for computing the delay of the slotted ALOHA protocol with Binary Exponential Backoff (BEB) with multiple priorities as a collision resolution algorithm in mobile information systems. If a packet which tries to reserve a channel collides times, it chooses one of the next 2n frames with equal probabilities and attempts the reservation again. We derive the expected access delay until an arbitrary packet reserves a channel in any cell. Then the expected transmission delays for packets of calls with multiple priorities are calculated analytically. Proposed analytic model is checked against simulation

    Performance Evaluation of Channel Access Methods for Dedicated IoT Networks

    Get PDF
    International audienceNetworking technologies dedicated for the Internet of Things are different from the classical mobile networks in terms of architecture and applications. This new type of network is facing several challenges to satisfy specific user requirements. Sharing the communication medium between (hundreds of)thousands of connected nodes and one base station is one of these main requirements, hence the necessity to imagine new solutions, or to adapt existing ones, for medium access control. In this paper, we start by comparing two classical medium access control protocols, CSMA/CA and Aloha, in the context of Internet of Things dedicated networks. We continue by evaluating a specific adaptation of Aloha, already used in low-power wide areanetworks, where no acknowledgement messages are transmitted in the network. Finally, we apply the same concept to CSMA/CA, showing that this can bring a number of benefits. The results we obtain after a thorough simulation study show that the choice of the best protocol depends on many parameters (number of connected objects, traffic arrival rate, allowed retransmissionnumber), as well as on the metric of interest (e.g. packet reception probability or energy consumption)

    Fair Coexistence of Scheduled and Random Access Wireless Networks: Unlicensed LTE/WiFi

    Get PDF
    We study the fair coexistence of scheduled and random access transmitters sharing the same frequency channel. Interest in coexistence is topical due to the need for emerging unlicensed LTE technologies to coexist fairly with WiFi. However, this interest is not confined to LTE/WiFi as coexistence is likely to become increasingly commonplace in IoT networks and beyond 5G. In this article we show that mixing scheduled and random access incurs and inherent throughput/delay cost, the cost of heterogeneity. We derive the joint proportional fair rate allocation, which casts useful light on current LTE/WiFi discussions. We present experimental results on inter-technology detection and consider the impact of imperfect carrier sensing.Comment: 14 pages, 8 figures, journa

    A cartel maintenance framework to enforce cooperation in wireless networks with selfish users

    Full text link
    corecore