73 research outputs found

    A Power Dissipation Comparison of the R-TDMA and the Slotted-Aloha Wireless MAC protocols

    Get PDF
    In this paper two wireless multiple-access protocols are compared by their power dissipation for the uplink traffic of a wireless networks. After briefly discussing the behaviour of the Slotted Aloha protocol (Abramson, 1985) and the R-TDMA protocol (Linnenbank, 1995), we estimate the energy that is dissipated by the protocols to trasmit a packet. We will show that for general loads, the power dissipation of the R-TDMA protocol is far less than that of the Slotted Aloha protocol

    Network Coding Tree Algorithm for Multiple Access System

    Full text link
    Network coding is famous for significantly improving the throughput of networks. The successful decoding of the network coded data relies on some side information of the original data. In that framework, independent data flows are usually first decoded and then network coded by relay nodes. If appropriate signal design is adopted, physical layer network coding is a natural way in wireless networks. In this work, a network coding tree algorithm which enhances the efficiency of the multiple access system (MAS) is presented. For MAS, existing works tried to avoid the collisions while collisions happen frequently under heavy load. By introducing network coding to MAS, our proposed algorithm achieves a better performance of throughput and delay. When multiple users transmit signal in a time slot, the mexed signals are saved and used to jointly decode the collided frames after some component frames of the network coded frame are received. Splitting tree structure is extended to the new algorithm for collision solving. The throughput of the system and average delay of frames are presented in a recursive way. Besides, extensive simulations show that network coding tree algorithm enhances the system throughput and decreases the average frame delay compared with other algorithms. Hence, it improves the system performance

    A Flexible and Fast Event-Driven Simulator for wireless MAC protocols

    Get PDF
    Many multiple-access (MAC) protocols have been or are being proposed for wireless networks. As most of these multiple-access protocols are designed for specific applications (such as telephony) and analyzed accordingly, the analysis results can not always be adapted to situations where each user has a different behavior. Wireless MAC protocols for data communication are not straightforward to analyse. To quickly make a reliable judgement of the usability of a MAC protocol for specific situations, we designed a simulator that makes it simple to implement the protocol and test it in different configurations and with differently behaving users. Our simulator generates a large amount of quantitative performance information that can be processed with standard graph drawing tools and an integrated trace analyze

    Stability and instability of a random multiple access model with adaptive energy harvesting

    Full text link
    We introduce a model for the classical synchronised multiple access system with a single transmission channel and a randomised transmission protocol (ALOHA). We assume in addition that there is an energy harvesting mechanism, and any message transmission requires a unit of energy. Units of energy arrive randomly and independently of anything else. We analyse stability and instability conditions for this model

    Collision-free Time Slot Reuse in Multi-hop Wireless Sensor Networks

    Get PDF
    To ensure a long-lived network of wireless communicating sensors, we are in need of a medium access control protocol that is able to prevent energy-wasting effects like idle listening, hidden terminal problem or collision of packets. Schedule-based medium access protocols are in general robust against these effects, but require a mechanism to establish a non-conflicting schedule. In this paper, we present such a mechanism which allows wireless sensors to choose a time interval for transmission, which is not interfering or causing collisions with other transmissions. In our solution, we do not assume any hierarchical organization in the network and all operation is localized. We empirically show that our localized algorithm is successful within a factor 2 of the minimum necessary time slots in random networks; well in range of the expected (worst case) factor 3-approximation of known first-fit algorithms. Our algorithm assures similar minimum distance between simultaneous transmissions as CSMA(/CD)-based approaches

    Stable Memoryless Queuing under Contention

    Get PDF

    MAC IEEE802.11 CSMA/CA: A Simulative Performance Analysis

    Get PDF
    In this paper we introduce an algorithm based analytical model to calculate the performance of the wireless LAN MAC protocol – known as Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) – taking into consideration the random exponential back off algorithm. The effects of changing the load on medium utilization and average waiting time are demonstrated and result concluded for high medium and low load conditions

    E2MaC: an energy efficient MAC protocol for multimedia traffic

    Get PDF
    Energy efficiency is an important issue for mobile computers since they must rely on their batteries. We present a novel MAC protocol that achieves a good energy efficiency of wireless interface of the mobile and provides support for diverse traffic types and QoS. The scheduler of the base station is responsible to provide the required QoS to connections on the wireless link and to minimise the amount of energy spend by the mobile. The main principles of the E2MaC protocol are to avoid unsuccessful actions, minimise the number of transitions, and synchronise the mobile and the base-station. We will show that considerable amounts of energy can be saved using these principles. In the protocol the actions of the mobile are minimised. The base-station with plenty of energy performs actions in courtesy of the mobile. We have paid much attention in reducing the cost of a mobile for just being connected. The protocol is able to provide near-optimal energy efficiency (i.e. energy is only spent for the actual transfer) for a mobile within the constraints of the QoS of all connections in a cell, and only requires a small overhead

    Self-stabilizing TDMA Algorithms for Wireless Ad-hoc Networks without External Reference

    Full text link
    Time division multiple access (TDMA) is a method for sharing communication media. In wireless communications, TDMA algorithms often divide the radio time into timeslots of uniform size, Ο\xi, and then combine them into frames of uniform size, τ\tau. We consider TDMA algorithms that allocate at least one timeslot in every frame to every node. Given a maximal node degree, ÎŽ\delta, and no access to external references for collision detection, time or position, we consider the problem of collision-free self-stabilizing TDMA algorithms that use constant frame size. We demonstrate that this problem has no solution when the frame size is τ<max⁥{2ÎŽ,χ2}\tau < \max\{2\delta,\chi_2\}, where χ2\chi_2 is the chromatic number for distance-22 vertex coloring. As a complement to this lower bound, we focus on proving the existence of collision-free self-stabilizing TDMA algorithms that use constant frame size of τ\tau. We consider basic settings (no hardware support for collision detection and no prior clock synchronization), and the collision of concurrent transmissions from transmitters that are at most two hops apart. In the context of self-stabilizing systems that have no external reference, we are the first to study this problem (to the best of our knowledge), and use simulations to show convergence even with computation time uncertainties
    • 

    corecore