301 research outputs found

    Stability Region of a Slotted Aloha Network with K-Exponential Backoff

    Full text link
    Stability region of random access wireless networks is known for only simple network scenarios. The main problem in this respect is due to interaction among queues. When transmission probabilities during successive transmissions change, e.g., when exponential backoff mechanism is exploited, the interactions in the network are stimulated. In this paper, we derive the stability region of a buffered slotted Aloha network with K-exponential backoff mechanism, approximately, when a finite number of nodes exist. To this end, we propose a new approach in modeling the interaction among wireless nodes. In this approach, we model the network with inter-related quasi-birth-death (QBD) processes such that at each QBD corresponding to each node, a finite number of phases consider the status of the other nodes. Then, by exploiting the available theorems on stability of QBDs, we find the stability region. We show that exponential backoff mechanism is able to increase the area of the stability region of a simple slotted Aloha network with two nodes, more than 40\%. We also show that a slotted Aloha network with exponential backoff may perform very near to ideal scheduling. The accuracy of our modeling approach is verified by simulation in different conditions.Comment: 30 pages, 6 figure

    Analytic Model of Beb Algorithm With Multiple Priorities in Mobile Information Systems

    Get PDF
    In this paper we propose analytic model for computing the delay of the slotted ALOHA protocol with Binary Exponential Backoff (BEB) with multiple priorities as a collision resolution algorithm in mobile information systems. If a packet which tries to reserve a channel collides times, it chooses one of the next 2n frames with equal probabilities and attempts the reservation again. We derive the expected access delay until an arbitrary packet reserves a channel in any cell. Then the expected transmission delays for packets of calls with multiple priorities are calculated analytically. Proposed analytic model is checked against simulation

    Goodbye, ALOHA!

    Get PDF
    ©2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.The vision of the Internet of Things (IoT) to interconnect and Internet-connect everyday people, objects, and machines poses new challenges in the design of wireless communication networks. The design of medium access control (MAC) protocols has been traditionally an intense area of research due to their high impact on the overall performance of wireless communications. The majority of research activities in this field deal with different variations of protocols somehow based on ALOHA, either with or without listen before talk, i.e., carrier sensing multiple access. These protocols operate well under low traffic loads and low number of simultaneous devices. However, they suffer from congestion as the traffic load and the number of devices increase. For this reason, unless revisited, the MAC layer can become a bottleneck for the success of the IoT. In this paper, we provide an overview of the existing MAC solutions for the IoT, describing current limitations and envisioned challenges for the near future. Motivated by those, we identify a family of simple algorithms based on distributed queueing (DQ), which can operate for an infinite number of devices generating any traffic load and pattern. A description of the DQ mechanism is provided and most relevant existing studies of DQ applied in different scenarios are described in this paper. In addition, we provide a novel performance evaluation of DQ when applied for the IoT. Finally, a description of the very first demo of DQ for its use in the IoT is also included in this paper.Peer ReviewedPostprint (author's final draft

    On Optimizing the Backoff Interval for Random Access Schemes

    Get PDF
    To improve the channel throughput and the fairness of random access channels, we propose a new backoff algorithm, namely, the sensing backoff algorithm (SBA). A novel feature of the SBA scheme is the sensing mechanism, in which every node modifies its backoff interval according to the results of the sensed channel activities. In particular, every active node sensing the successful transmission decreases its backoff interval by an additive factor of the transmission time of a packet. In order to find the optimum parameters for the SBA scheme, we have studied the optimum backoff intervals as a function of different number of active nodes (N) in a single transmission area with pure ALOHA-type channels.We have found that the optimum backoff interval should be 4N times the transmission time of a packet when the random access channel operates under a pure ALOHA scheme. Based on this result, we have numerically calculated the optimum values of the parameters for SBA, which are independent of N. The SBA scheme operates close to the optimum backoff interval. Furthermore, its operation does not depend on the knowledge of N. The optimum backoff interval and the SBA scheme are also studied by simulative means. It is shown that the SBA scheme out-performs other backoff schemes, such as binary exponential backoff (BEB) and multiplicative increase linear decrease (MILD). As a point of reference, the SBA scheme offers a channel capacity of 0.19 when N is 10, while the MILD scheme can only offer 0.125. The performance gain is about 50%

    Computing Nash Equilibrium in Wireless Ad Hoc Networks: A Simulation-Based Approach

    Full text link
    This paper studies the problem of computing Nash equilibrium in wireless networks modeled by Weighted Timed Automata. Such formalism comes together with a logic that can be used to describe complex features such as timed energy constraints. Our contribution is a method for solving this problem using Statistical Model Checking. The method has been implemented in UPPAAL model checker and has been applied to the analysis of Aloha CSMA/CD and IEEE 802.15.4 CSMA/CA protocols.Comment: In Proceedings IWIGP 2012, arXiv:1202.422
    • …
    corecore