29 research outputs found
Recommended from our members
A New Routing Metric for High Throughput in Dense Ad Hoc Networks
Routing protocols in most ad hoc networks use the length of paths as the routing metric. Recent findings have revealed that the minimum-hop metric can not achieve the maximum throughput because it tries to reduce the number of hops by containing long range links, where packets need to be transmitted at the lowest transmission rate. In this paper, we investigate the tradeoff between transmission rates and throughputs and show that in dense networks with uniform-distributed traffic, there exists the optimal rate that may not be the lowest rate. Based on our observation, we propose a new routing metric, which measures the expected capability of a path assuming the per-node fairness. We develop a routing protocol based on DSDV and demonstrate that the routing metric enhances the system throughput by 20% compared to the original DSDV
Stability Region of a Slotted Aloha Network with K-Exponential Backoff
Stability region of random access wireless networks is known for only simple
network scenarios. The main problem in this respect is due to interaction among
queues. When transmission probabilities during successive transmissions change,
e.g., when exponential backoff mechanism is exploited, the interactions in the
network are stimulated. In this paper, we derive the stability region of a
buffered slotted Aloha network with K-exponential backoff mechanism,
approximately, when a finite number of nodes exist. To this end, we propose a
new approach in modeling the interaction among wireless nodes. In this
approach, we model the network with inter-related quasi-birth-death (QBD)
processes such that at each QBD corresponding to each node, a finite number of
phases consider the status of the other nodes. Then, by exploiting the
available theorems on stability of QBDs, we find the stability region. We show
that exponential backoff mechanism is able to increase the area of the
stability region of a simple slotted Aloha network with two nodes, more than
40\%. We also show that a slotted Aloha network with exponential backoff may
perform very near to ideal scheduling. The accuracy of our modeling approach is
verified by simulation in different conditions.Comment: 30 pages, 6 figure
Is Our Model for Contention Resolution Wrong?
Randomized binary exponential backoff (BEB) is a popular algorithm for
coordinating access to a shared channel. With an operational history exceeding
four decades, BEB is currently an important component of several wireless
standards. Despite this track record, prior theoretical results indicate that
under bursty traffic (1) BEB yields poor makespan and (2) superior algorithms
are possible. To date, the degree to which these findings manifest in practice
has not been resolved.
To address this issue, we examine one of the strongest cases against BEB:
packets that simultaneously begin contending for the wireless channel. Using
Network Simulator 3, we compare against more recent algorithms that are
inspired by BEB, but whose makespan guarantees are superior. Surprisingly, we
discover that these newer algorithms significantly underperform. Through
further investigation, we identify as the culprit a flawed but common
abstraction regarding the cost of collisions. Our experimental results are
complemented by analytical arguments that the number of collisions -- and not
solely makespan -- is an important metric to optimize. We believe that these
findings have implications for the design of contention-resolution algorithms.Comment: Accepted to the 29th ACM Symposium on Parallelism in Algorithms and
Architectures (SPAA 2017
Simple Contention Resolution via Multiplicative Weight Updates
We consider the classic contention resolution problem, in which devices conspire to share some common resource, for which they each need temporary and exclusive access. To ground the discussion, suppose (identical) devices wake up at various times, and must send a single packet over a shared multiple-access channel. In each time step they may attempt to send their packet; they receive ternary feedback {0,1,2^+} from the channel, 0 indicating silence (no one attempted transmission), 1 indicating success (one device successfully transmitted), and 2^+ indicating noise. We prove that a simple strategy suffices to achieve a channel utilization rate of 1/e-O(epsilon), for any epsilon>0. In each step, device i attempts to send its packet with probability p_i, then applies a rudimentary multiplicative weight-type update to p_i.
p_i <- { p_i * e^{epsilon} upon hearing silence (0), p_i upon hearing success (1), p_i * e^{-epsilon/(e-2)} upon hearing noise (2^+) }.
This scheme works well even if the introduction of devices/packets is adversarial, and even if the adversary can jam time slots (make noise) at will. We prove that if the adversary jams J time slots, then this scheme will achieve channel utilization 1/e-epsilon, excluding O(J) wasted slots. Results similar to these (Bender, Fineman, Gilbert, Young, SODA 2016) were already achieved, but with a lower constant efficiency (less than 0.05) and a more complex algorithm
On Optimizing the Backoff Interval for Random Access Schemes
To improve the channel throughput and the fairness
of random access channels, we propose a new backoff algorithm,
namely, the sensing backoff algorithm (SBA). A novel feature of
the SBA scheme is the sensing mechanism, in which every node
modifies its backoff interval according to the results of the sensed
channel activities. In particular, every active node sensing the successful
transmission decreases its backoff interval by an additive
factor of the transmission time of a packet. In order to find the
optimum parameters for the SBA scheme, we have studied the optimum
backoff intervals as a function of different number of active
nodes (N) in a single transmission area with pure ALOHA-type
channels.We have found that the optimum backoff interval should
be 4N times the transmission time of a packet when the random
access channel operates under a pure ALOHA scheme. Based on
this result, we have numerically calculated the optimum values of
the parameters for SBA, which are independent of N. The SBA
scheme operates close to the optimum backoff interval. Furthermore,
its operation does not depend on the knowledge of N. The
optimum backoff interval and the SBA scheme are also studied by
simulative means. It is shown that the SBA scheme out-performs
other backoff schemes, such as binary exponential backoff (BEB)
and multiplicative increase linear decrease (MILD). As a point of
reference, the SBA scheme offers a channel capacity of 0.19 when N
is 10, while the MILD scheme can only offer 0.125. The performance
gain is about 50%