We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Deriving the Suspended Backoff Counter Value Distribution in CSMA/CA

by Raymond J Jayabal, Lau Chiew Tong
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 28 - Number 9
Year of Publication: 2011
Authors: Raymond J Jayabal, Lau Chiew Tong
10.5120/3417-4768

Raymond J Jayabal, Lau Chiew Tong . Deriving the Suspended Backoff Counter Value Distribution in CSMA/CA. International Journal of Computer Applications. 28, 9 ( August 2011), 14-20. DOI=10.5120/3417-4768

@article{ 10.5120/3417-4768,
author = { Raymond J Jayabal, Lau Chiew Tong },
title = { Deriving the Suspended Backoff Counter Value Distribution in CSMA/CA },
journal = { International Journal of Computer Applications },
issue_date = { August 2011 },
volume = { 28 },
number = { 9 },
month = { August },
year = { 2011 },
issn = { 0975-8887 },
pages = { 14-20 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume28/number9/3417-4768/ },
doi = { 10.5120/3417-4768 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:14:19.380737+05:30
%A Raymond J Jayabal
%A Lau Chiew Tong
%T Deriving the Suspended Backoff Counter Value Distribution in CSMA/CA
%J International Journal of Computer Applications
%@ 0975-8887
%V 28
%N 9
%P 14-20
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Most of today’s wireless LANs and PANs employ the use of the CSMA/CA protocol. In CSMA/CA, a randomly initialised counter is used to reduce the probability of nodes accessing the channel at the same time. In most implementations, this counter is suspended when the channel is idle. In this paper, we derive and verify through simulation the exact analytical expression for the distribution of this counter’s value. For further validation, we show how it can be used to obtain the protocol’s idle period distribution under saturation loads. For this latter distribution, we provide simulation results to show the accuracy of the formula compared to one derived using the de-facto first-order Markov channel state model.

References
  1. “IEEE Std. 802.11-2007, Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications,” IEEE Std. 802.11, 2007.
  2. G. Bianchi, “IEEE 802.11— Saturation Throughput Analysis”, IEEE Comm. Letters, Vol. 2, No. 12, December 1998.
  3. G. Bianchi, “Performance Analysis of the IEEE 802.11 Distributed Coordination Function,” in IEEE Journal on Selected Areas in Comm., Vol. 18, No. 3, March 2000, pp. 535-547.
  4. H. S. Chhaya, S. Gupta, "Performance Modeling of Asynchronous Data Transfer Methods of IEEE 802.11 MAC Protocol," in Wireless Networks 3 (1997), pp.217-234, 1997.
  5. F. Cali, M. Conti, E. Gregori, "Dynamic Tuning of the IEEE 802.11 Protocol to Achieve a Theoretical Throughput Limit", in IEEE/ACM Trans. On Networking, Vol. 8, No. 6, December 2000.
  6. F. Cali, M. Conti, E. Gregori, "IEEE 802.11 Protocol: Design and Performance Evaluation of an Adaptive Backoff Mechanism", in IEEE Journal on Selected Areas in Communications 2000, Vol. 18, No. 9, pp. 1774–1786.
  7. F. Cali, M. Conti, E. Gregori, "IEEE 802.11 Wireless LAN: Capacity Analysis and Protocol Enhancement", in Proceedings of IEEE INFOCOM’1998, March, 1998.
  8. E. Ziouva and T. Antonakopoulos, “CSMA/CA Performance under High Traffic Conditions: Throughput and Delay Analysis,” in Computer Communications, Vol. 25, No. 3, February 2002, pp. 313-321.
  9. C. H. Foh and J. W. Tantra, “Comments on IEEE 802.11 Saturation Throughput Analysis with Freezing of Backoff Counters,” in IEEE Communications Letters, Vol. 9, No. 2, 2005, pp. 130-132.
  10. C. Hu, H. Kim, and J. C. Hou. “An Analysis of the Binary Exponential Backoff Algorithm in Distributed MAC Protocols,” in Tech. Rep. No. UIUCDCS-R-2005-2599 UILU-ENG-2005-1794. July 2005.
  11. C. H. Foh and M. Zukerman, “Performance analysis of the IEEE 802.11 MAC protocol” in European Wireless 2002, February 2002, Florence, Italy.
  12. P. Chatzimisios, V. Vitsas, A. C. Boucouvalas, “Packet Delay Analysis of the IEEE 802.11 MAC Protocol,” in IEE Electronic Letters, vol. 39, no. 18, 2003, pp. 13581359.
  13. T. Sakurai and Hai L. Vu, “MAC Access Delay of IEEE 802.11 DCF”, in IEEE Transactions on Wireless Comm., Vol. 6, No. 5, May 2007, pp 1702-1710.
  14. Y. Li, C. Wang, K. Long, W. Zhao, “Modeling Channel Access Delay and Jitter of IEEE802.11 DCF,” in Wireless Personal Communications, vol. 47, no. 3, November 2008, pp. 417-440.
  15. Y. Chen and D. P. Agrawal, “Effect of Contention Window on the Performance of IEEE 802.11 WLANs”, in Proceedings, 3rd Annual Mediterranean Ad Hoc Networking Workshop June 27-30, 2004.
  16. Y. Chen, Q-A Zeng and D. P. Agrawal. "Performance Analysis and Enhancement of IEEE 802.11 MAC Protocol," in Proceedings of IEEE International Conference on Telecommunications, 2003.
  17. D. Qiao, and K. Shin, "UMAV: A Simple Ehancement to the IEEE 802.11 DCF," in Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS-36), January 2003.
  18. “ns-2 Network Simulator,” http://www.isi.edu/nsnam/ns/.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless data networks LAN PAN CSMA/CA random backoff algorithm