Skip to main content
Erschienen in: EURASIP Journal on Wireless Communications and Networking 1/2010

Open Access 01.12.2010 | Research Article

Performance Analysis of Binary Exponential Backoff and Improved Backoff for WPAN

verfasst von: S. Mehta, K.S. Kwak

Erschienen in: EURASIP Journal on Wireless Communications and Networking | Ausgabe 1/2010

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The IEEE 802.15.3 medium access control (MAC) is proposed, especially, for wireless personal area network (WPAN) short and high data rates applications, to coordinate the access to the wireless medium among the competing devices. A concept of a geometrically increasing probability distribution for contention process was brought up in the work of Tay et al. (2004). In this paper, we adopt this idea as improved backoff (IB) for contention process of IEEE 802.15.3, where binary exponential backoff (BEB) is originally used. Here, we propose an analytical model for IB and compared both BEB and IB for saturated and nonsaturated traffic conditions. Furthermore, our research results demonstrate that IB provides an edge over BEB in terms of channel efficiency, channel access delay, and energy efficiency.

1. Introduction

The IEEE standard 802.15.3 MAC or WPAN MAC layer [1] is based on a centralized, connection oriented topology which divides a large network into several smaller ones termed "piconets." A piconet consists of a Piconet Network Controller (PNC) and DEVs (DEVices). One DEV is required to perform the role of PNC (Piconet Coordinator), which provides the basic timing for the piconet as well as other piconet management functions, such as power management, Quality of Service (QoS) scheduling, and security. The standard also allows for the formation of child piconets and neighbor piconets. In IEEE 802.15.3 MAC protocol, the channel time is divided into superframes, where each superframe beginning with a beacon. The superframe is composed of the three major parts: the beacon, the optional contention access period (CAP), and the channel time allocation period (CTAP) or channel time allocation time (CTA). Wireless channel is usually vulnerable to errors. Hence, error control mechanism is an essential part of any MAC protocol design. In accordance with that, IEEE 802.15.3 standard defines three types of acknowledgment mechanisms for CTAs and CAPs: the No-ACK, Imm-ACK, and Dly-ACK mechanisms [1].
During the CAP time devices request for reservation in CTA and also send data packets if needed. So the time length of CAP is dynamic and it is determined by the PNC. Longer the duration of CAP time is, more the number of devices will send their CTA slot requests and causes less time for CTA slots. Hence, it is important to improve the performance for both data and request packets transmission within limited time frame of CAP. In our previous work [2] we present the detail performance analysis of WPAN MAC and identified some key issues to improve the MAC performance, especially, for CAP duration. In this paper, we limit our research focus on improving the performance of CAP using IB instead of BEB during the contention process, and hence, overall WPAN MAC performance. During the CAP, MAC protocol performs backoff procedure before transmitting any kind of data or request packets. This backoff mechanism is similar to CSMA/CA mechanism of IEEE 802.11 with some different parameters. In WAPN MAC, retry count is limited up to 3 counts (0 to 3) with maximum window size of 64 slots (8, 16, 32, and 64).
To the best of our knowledge, there is no work on the performance or channel analysis of IEEE 802.15.3 networks with respect to contention-based scheme during the CAP time.
However, a large amount of literature is available on IEEE 802.15.3 MAC scheduling, optimization of superframe size, and various traffic analyses. Some of the important related works are as follow.
In [3] the authors presented the implementation of IEEE 802.15.3 module in ns-2 and discussed various experimental scenario results including various scheduling techniques. Specially, to investigate the performance of real-time and best-effort traffic with various super frame lengths and different ACK policies. In [4] the authors presented two adaptive Dly-ACK schemes for both TCP and UDP traffic. The first one is to request the Dly-ACK frame adaptively or change the burst size of Dly-ACK according to the transmitter queue status. The second is a retransmission counter to enable the destination DEV to deliver the MAC data frames to upper layer timely and orderly. Similarly, the work presented in [5] also discussed about different acknowledge schemes and optimization of channel capacity. Both papers [4, 5] laid a good foundation in simulation and analytical works of IEEE 802.15.3 MAC protocol. In [6] the authors formulated a throughput optimization problem under error channel condition and derive a closed form solution for the optimal throughput. Similarly, in [2] the authors presented a detailed performance analysis of WPAN with different designing parameters as well as with different ACK policies and aggregation method.
In summary, in our knowledge, this is the first attempt to analyze and compare both the IB and BEB schemes in the contention process of WPAN MAC. Even though the basic idea of IB is adopted from [7] the main contributions of this paper are as follows.
(i)
To apply the geometrically increasing distribution as IB to IEEE 802.15.3 MAC.
 
(ii)
To introduce Markov Chains for BEB and IB in WPAN MAC.
 
(iii)
To model the saturation and nonsaturation traffic conditions.
 
(iv)
To present a comparison of BEB and IB for a medium access scheme.
 
(v)
To present the detail performance evaluation study in terms of channel efficiency, channel access delay, and energy efficiency to compare BEB and IB.
 
The rest of the paper is outlined as follows. In Section 2 we describe the BEB and IB medium access schemes. In Section 3, we present the analytical modeling of BEB and IB schemes and in-depth performance analysis in Section 4. Finally, conclusions are drawn in Section 5.

2. BEB and IB Schemes

2.1. BEB Scheme

BEB-based carrier sense multiple access with collision avoidance (CSMA/CA) is the most basic and widely used mechanism for MAC protocol. In WPAN MAC, if the channel is idle for backoff interframe space (BIFS) or short interframe space (SIFS) the DEV starts executing the BEB scheme. At each packet transmission, the backoff counter is uniformly selected from the given range of [0, CW-1] (in rest of the paper we keep using terms "DEV" and "node" interchangeably). Here, CW is known as contention window and its value depends on the number of failed transmissions for the packet. At the first transmission attempt, CW is set to minimum value of 8 and if transmission attempt fails then its value gets double, and again set to minimum value on successful transmission. In WPAN MAC, the maximum contention window value is set to 64 with the maximum retry limit up to 3 counts. After selecting CW node decrement its value by 1 as long as channel is sensed idle and freeze its value when channel is sensed busy.
By using BEB method MAC protocol attempt to adapt to the active population size of contending DEVs. However, this method has several disadvantages as follows.
(i)
Traditional backoff takes time for (Contention Window) CW to correctly adapt to the right value when the active population (of nodes) is large(here, traditional backoff procedure means CSMA/CA scheme with binary exponential backoff (BEB), unless and otherwise specified).
 
(ii)
The MAC protocol latency performance is high if CW is large.
 
(iii)
A station that successfully transmits resets its CW to a small, fixed minimum value of CW. Consequently, the node has to rediscover the correct CW, wasting some precious bandwidth.
 
(iv)
Traditional backoff algorithm could not take the advantage of shared learning when number of nodes is increasing.
 
(v)
Traditional back-off's success probability degrades with increasing number of nodes.
 
(vi)
Traditional back-off is also not suitable for power saving networks' application.
 
Our results from [2] also support the aforementioned disadvantages. Figure 1 shows the throughput for different number of active nodes. It can be seen that throughput decreases as the number of active nodes increases due to increase in collision probability and channel access time.
In nutshell, during the CAP, backoff window size and the number of active nodes are the major factors to have impact on the throughput performance. The BEB scheme does not work well when we are interested in the high bandwidth utilization, latency, and energy efficiency. These observations and result lead us to use new medium access scheme for IEEE 802.15.3 MAC. So to improve the channel performance during the CAP time, we use a fixed-size contention window, but a nonuniform, geometrically increasing probability distribution for picking a transmission slot in the contention window interval.

2.2. IB Scheme

In contrast to BEB scheme, IB scheme uses a small and fixed CW. In IB scheme, nodes choose nonuniform geometrically increasing probability distribution (P) for picking a transmission slot in the contention window. Nodes which are executing IB scheme pick a slot in the range of (1, CW) with the probability distribution P. Here, CW is contention window and its value is fixed. More information on CW we will be presenting in the later sections of this paper. Figure 2 shows the probability distribution P. The higher slot numbers have higher probability to get selected by nodes compared to lower slot numbers. In physical meaning we can explain this as follows. At the start node select a higher slot number for its CW by estimating large population of active nodes (n) and keep sensing the channel status. If no nodes transmit in the first or starting slots then each node adjusts its estimation of competing nodes by multiplicatively increasing its transmission probability for the next slot selection cycle. Every node keeps repeating the process of estimation of active nodes in every slot selection cycle and allows the competition to happen at geometrically decreasing values of n all within the fixed contention window (CW).
In contrast to the probability distributionP, in uniform distribution, as shown in Figure 2, all the contending nodes have the same probability of transmitting in a randomly chosen time slot. From Figure 2, in the probability distributionP, we can depict that when the population of competing nodes (n) is large, most of the nodes will choose medium to higher slot numbers of CW before accessing the channel and a very few nodes will choose low slot numbers, hence, a collision-free transmission will take place in lower slot numbers. When n is medium, most nodes will choose higher slot numbers and a collision-free transmission will take place in medium slot numbers. Similarly, when n is small, a collision-free transmission will take place in higher slot numbers. Thus for any value of n, and for any fast change in n, a collision free transmission can take place. These special characteristics of IB give the advantage over the BEB in terms of different performance metrics. If only one node gets the chance to select the contention slot within the fixed CW, it will transmit in that slot. While other nodes will select new random contention slots for next contention process, to win channel medium, regardless of success or failure of transmission of winner node.
Let us say that each node picks a slot https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq1_HTML.gif using the probability distribution P. Then slot https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq2_HTML.gif define an idle slot if no nodes choose it, and also as a collided slot if more than one node chooses it. A node can get the chance to transmit if it is the only node to choose slot https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq3_HTML.gif . As we mentioned earlier IB uses a truncated, increasing geometric distribution, as presented in [7], and is given by
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_Equ1_HTML.gif
(1)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq4_HTML.gif is a distribution parameter. In this range of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq5_HTML.gif increases exponentially with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq6_HTML.gif , so the later slots have higher probability. Here, it is worth to note that IB scheme does not use timer suspension like in IEEE 802.11 to save energy and reduce latency in case of a collision. The only problem with the IB is fairness, however, for WPAN MAC, especially, during CAP fairness is not an issue as every node do not have request packet for PNC for every time. For the general wireless communication scenario we need fairness mechanism, which we left to our future research investigation.

3. Analytical Modeling

In this section we present the general frame work to model the backoff algorithms. This frame work basically consists of three steps: finding the attempting probability for a node in backoff, finding the transition probability for a given channel state, and model the stationary probabilities of the channel state for required protocol details. Here we also model channel efficiency, channel access delay, and energy efficiency with these three basic steps (In this paper, we use terms "algorithm," "scheme," and "method" interchangeably.

3.1. Approach and Assumptions

Most of the studies on backoff algorithm (BA) are focused on the stability issue rather than performance analysis of backoff algorithm. In this paper our main focus is to analyze and compare the performance of both IB and BEB with respect to network load in steady-state condition. Here, we define network load in terms of the number of nodes that are contending for the access medium. Another approach is to consider total arrival packet rate to the network as an offered load. The main purpose of BA is to reduce the effect of contention among the nodes and try to adopt the population of nodes so the number of nodes contending for medium is a more favorable way to define an offered load for analyzing BA. Here, we assume a fixed number of nodes in saturated and nonsaturated conditions. Saturation conditions mean every node always has a packet to transmit and similarly in nonsaturation case every node receives a packet with probability https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq7_HTML.gif . More on saturation and nonsaturation will be explained later. The channel is an ideal and introducing no errors to the reception of a packet other than collision. Also, capture effect is not considered.
The BA performed in a time-slotted fashion. A node attempts to attain the access the channel only at the beginning of a slot. Furthermore, all nodes are well synchronized in time slots and propagation delay is negligible compared to the length of an idle slot.

3.2. BEB and IB Analytical Modeling

In BEB, at first transmission, a packet is transmitted after waiting for the number of slots randomly chosen from the given range of contention window ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq8_HTML.gif ), where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq9_HTML.gif is the minimum contention window size. This contention window is used as time unit for a node to detect the transmission of a frame from any other node. This time unit is defined as "slot time." We model the operation of BEB at an individual node using the state diagram shown in Figure 3. This diagram is based on the models presented in [8, 9] including the freezing and retry limit parameters.
As shown in Figure 3 let j denote the backoff stage, where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq10_HTML.gif , 1, 2, 3 (assuming immediate acknowledgement for a data/request packet). So, we have https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq11_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq12_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq13_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq14_HTML.gif . Let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq15_HTML.gif be defined as a random process representing the backoff counter of a node with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq16_HTML.gif representing random process of the back stage https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq17_HTML.gif . https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq18_HTML.gif is decremented at the start of every idle backoff slot. It is important to note that time scale for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq19_HTML.gif does not represent real time but it observes only backoff slots and its suspended for the duration of all transmissions and interframe spaces (i.e., SIFS). And whenever https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq20_HTML.gif reaches zero the station transmits and regardless of the outcome of the transmission, uniformly chooses a new value for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq21_HTML.gif from ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq22_HTML.gif ) (i.e., new backoff counter value). Here, we define https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq23_HTML.gif as the conditional collision probability and we also assume that it is independent and constant, regardless the number of retransmissions attempted. https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq24_HTML.gif also represents the probability of detecting the channel busy. Thus, the two-dimension process, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq25_HTML.gif is a discrete-time Markov Chain. Therefore, the state of each node is described by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq26_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq27_HTML.gif stands for the backoff stage, and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq28_HTML.gif stands for the backoff timer value. In addition to normal state diagram we also add 2 extra states to model the nonsaturation traffic condition. A node may now wait in the idle state for a packet from upper layers before going into backoff procedure. This corresponds to a delay in the idle state and it is represented by upper left two sates in the Figure 3. The delay in the idle state is modeled geometric with parameter https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq29_HTML.gif . The state transition diagram of the Markov chain model shown in Figure 3 has the following transition probabilities:
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_Equ2_HTML.gif
(2)
The first equation in (2) indicates that at the beginning of each slot time, the backoff counter is decremented if the channel is sensed idle. The second equation shows that the backoff counter is frozen if channel is sensed busy. The third and fourth equations, respectively, indicate that following an unsuccessful transmission, the node backoff stage https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq30_HTML.gif selects a backoff interval uniformly in the range of (0, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq31_HTML.gif ) and when the backoff stage reaches https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq32_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq33_HTML.gif stays constant. The rest of the equations shows the transition probabilities for two extra sates we added. Here, we take https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq34_HTML.gif to introduce 2 extra states. These transition probabilities are straightforward to understand, as shown in Figure 3.
Similar to BEB algorithm, Figure 4 shows the state diagram of IB algorithm at an individual node. As we explained in the previous section, IB does not use contention counter suspension and there is only one stage (i.e., fixed backoff window). In IB, each node selects the contention slot with a geometrically increasing distribution as presented in (1) from ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq35_HTML.gif ). Using similar notation as BEB, j represents the backoff stage ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq36_HTML.gif , in IB) and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq37_HTML.gif represents the back of timer value ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq38_HTML.gif , in IB). Here, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq39_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq40_HTML.gif represent the collision probability and the probability of detecting the channel busy, respectively. Therefore, Figure 4 shows the one-dimension discrete-time Markov Chain for IB at an individual node. In this Markov Chain, the nonnull one step transition probabilities are as follows:
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_Equ3_HTML.gif
(3)
The first equation in (3) indicates the backoff counter which is decremented if the channel is sensed idle. The second equation indicates that the node defers the transmission of a new frame and enters stage 0 of the backoff procedure if it detects a successful transmission of its current frame or finds the channel busy or if it detects that a collision occurred to its current not successfully transmitted frame. The third equation indicates that the node selects a backoff interval nonuniformly in the range of (1, CW) following an unsuccessful transmission.

3.2.1. Channel Efficiency Analysis

In BEB, let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq41_HTML.gif be the stationary distribution of the Markov chain [8, 9]. Let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq42_HTML.gif be the probability that a node transmits during a generic slot time. A node transmits when its backoff counter reaches zero. Similar to [8, 9] https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq43_HTML.gif is given by
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_Equ4_HTML.gif
(4)
and as we mentioned earlier and shown in Figure 3, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq44_HTML.gif with nonsaturation traffic condition is given by
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_Equ5_HTML.gif
(5)
Here, (5) will reduce to (4) if we put https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq45_HTML.gif (i.e., saturated case). From (4) and (5) we see that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq46_HTML.gif and depend on https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq47_HTML.gif . The relation between https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq48_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq49_HTML.gif is given by
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_Equ6_HTML.gif
(6)
Here, n denote the number of nodes. Equations (4) and (6) are from a nonlinear system with two unknowns https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq50_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq51_HTML.gif . This nonlinear system can be solved using numerical methods. Figure 5 shows the plot of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq52_HTML.gif as a function of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq53_HTML.gif with various values of CW and n. This graph is plotted with m, the retry limit equal zero. As shown in Figure 5 the unique intersection of (4) and (6) gives us the value of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq54_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq55_HTML.gif for given CW and n. The plot shows https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq56_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq57_HTML.gif converging to 0.5 and zero, respectively, as the number of nodes increases [10]. Similarly, we can obtain the solution for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq58_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq59_HTML.gif when retry limit, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq60_HTML.gif , is https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq61_HTML.gif and traffic condition is nonsaturated (i.e., https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq62_HTML.gif ) (more information on this is discussed later).
Let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq63_HTML.gif define the probability that there is at least one transmission in a slot which is given by
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_Equ7_HTML.gif
(7)
Let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq64_HTML.gif define as the probability that there is not a single transmission in a slot and is given by
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_Equ8_HTML.gif
(8)
A successful transmission occurs when there is only one transmitting node. Thus, the probability that there will be a successful transmission in a time slot and is given by
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_Equ9_HTML.gif
(9)
It is important to note that a collision occurs if there are multiple nodes transmitting in the same time slot. Thus, the probability that a collision will occur in a time slot and is given by (the probability https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq65_HTML.gif is different from the conditional collision probability ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq66_HTML.gif ). https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq67_HTML.gif denote the probability that a slot is busy with collision, where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq68_HTML.gif denote the probability that a collision is seen by a packet being transmitted on the channel.)
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_Equ10_HTML.gif
(10)
In IB scheme, a node is randomly selecting a contention window from the (1, CW) and transmiting with the probability https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq69_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq70_HTML.gif is based on the nonuniform increasing geometry distribution as given in (1) [7] and is define as
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_Equ11_HTML.gif
(11)
To understand (11) readers are advised to refer Figure 2 where the different values of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq71_HTML.gif with different values of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq72_HTML.gif are plotted. Now similar to BEB scheme, we can define the probabilities of busy medium, idle medium, and successful transmission in a time slot in IB scheme, respectively, as follows:
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_Equ12_HTML.gif
(12)
Now, the probability of collision in IB is given by
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_Equ13_HTML.gif
(13)
Using aforementioned equations we can define the channel efficiency as the fraction of time that the channel is used for successful transmission. The time that the channel remains empty or busy with collision is wasted. Here, successful transmission includes data/request frame with an acknowledgement. The channel efficiency for BEB scheme is given by
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_Equ14_HTML.gif
(14)
Here, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq73_HTML.gif is constant and defined in the standard (of duration https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq74_HTML.gif ), https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq75_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq76_HTML.gif are the average time duration of successful transmission and collision, respectively. The duration of successful and collision slots are similar; hence the duration of a collision can be approximated to the duration of a successful slot https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq77_HTML.gif . https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq78_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq79_HTML.gif are given by (both are same in case of BEB and IB)
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_Equ15_HTML.gif
(15)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq80_HTML.gif is the frame header and P is the propagation delay. https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq81_HTML.gif is the duration of data packet or request packet. Using this approximation and (7), (8), and (9), we can simplify (14) as
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_Equ16_HTML.gif
(16)
In a same way, simplified channel efficiency for IB is given by
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_Equ17_HTML.gif
(17)

3.2.2. Delay Analysis

Here, medium access delay is defined as the time elapsed between the generation of a frame and its successful reception. Let D be the medium access delay and let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq82_HTML.gif indicate its mean value. Then, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq83_HTML.gif is given by
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_Equ18_HTML.gif
(18)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq84_HTML.gif represents average number of collisions of a frame until its successful reception. https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq85_HTML.gif represents average backoff delay spent by a node before accessing the medium in busy channel condition and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq86_HTML.gif represents the time that a node has to wait before sensing the channel again in case of its frame collision. Now https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq87_HTML.gif is given by
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_Equ19_HTML.gif
(19)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq88_HTML.gif is the average backoff value and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq89_HTML.gif is the average number of times that a node freezes its counter before reaches state 0. Equation (16) is applicable for both IB and BEB, however in IB https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq90_HTML.gif it is given by
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_Equ20_HTML.gif
(20)
In IB, backoff counter is not suspended if a node detects transmissions from other nodes before its counter reaches state 0 but it takes new value of backoff counter for next attempt (IB has a fixed contention window range). In case of BEB and IB, E[ https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq91_HTML.gif ] is given by
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_Equ21_HTML.gif
(21)
In BEB, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq92_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq93_HTML.gif are given by
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_Equ22_HTML.gif
(22)
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_Equ23_HTML.gif
(23)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq94_HTML.gif is the mean number of consecutive idle slot times before a transmission starts. In IB, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq95_HTML.gif is calculated simply by mean of geometrically increasing distribution with fixed interval. Finally, the time https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq96_HTML.gif depends on the access method and is given by
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_Equ24_HTML.gif
(24)

3.2.3. Energy Efficiency Analysis

In this subsection we consider only two power levels, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq97_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq98_HTML.gif . We assume that a node consumes power https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq99_HTML.gif for transmitting and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq100_HTML.gif for being idle and listening. Total power consumption to transmit a data/request packet is given by
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_Equ25_HTML.gif
(25)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq101_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq102_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq103_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq104_HTML.gif represent energy consumption in backoff stage, over hearing in backoff stage, energy consumption for successful transmission, and energy consumption in collision, respectively. We define the energy efficiency as energy required to successfully transmit one bit of data/request packet and is given by
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_Equ26_HTML.gif
(26)
whereL is the length of data/request payload. The energy consumption when backoff is decrementing, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq105_HTML.gif , is given by
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_Equ27_HTML.gif
(27)
where slot is the duration of an idle slot (of duration https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq106_HTML.gif ). The energy consumption when overhearing other nodes' transmission during the backoff procedure is given by
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_Equ28_HTML.gif
(28)
In case of IB method https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq107_HTML.gif will be different from (22). The energy consumption for successful transmission is given by
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_Equ29_HTML.gif
(29)
The energy consumption due to collision is given by
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_Equ30_HTML.gif
(30)
Energy efficiency model is valid for both BEB and IB methods.

4. Performance Evaluation

In this subsection we present the performance analysis of BEB and IBA in terms of channel efficiency, medium access delay, and energy efficiency. For the performance analysis we carried out simulation in Matlab [11]. During CAP time nodes will send only request packets to PNC and PNC will assign them available slots in following CTA cycle. This assumption is reasonable as most of the data packet transmissions carried out in CTA slots. The main parameters for our simulation are based on [12] and listed in Table  1. For calculating the energy consumption in nodes we choose ratio of idle: listen: transmit as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq108_HTML.gif , as measured in [13]. For the simulation results we does not consider the technology adopted at the Physical layer; however the physical layer determines some network parameter values such as interframe spaces. Whenever necessary we choose the values of the physical layer dependent parameters by referring to [12]. In our simulation maximum number of nodes is 100. (Here, we choose 100 nodes according to [5] as the maximum possible number of contending nodes during a CAP frame.)
The channel efficiency is mostly depending on number of active nodes and contention window size. As shown in Figure 6 BEB scheme is plotted for different values of CW and IB is plotted for fixed value of CW = 16. We investigated various values of CW and n for IB and found the CW = 16 is the most suitable value to get best delay and energy efficiency performances while maintaining the channel efficiency above 70% for the given number of nodes. As shown in Figure 6, for BEB (all BEB graphs are caption with Uniform Distribution UD and IB graph is caption with: Geometrical Increasing Distribution GID.) scheme, results with CW = 8 and 16 give high channel efficiency values at lower number of nodes. The reason is very obvious, less collision and low waiting time in backoff procedure, and as the number of contenders increases channel efficiency starts decreasing. For CW = 32 and 64, first graphs show lower channel efficiency, then increase to higher values, and later maintain nearly constant values. This is because first CW is too big for given number of nodes and later it adjusted with the number of nodes, hence, nearly constant collision and waiting time in backoff procedure. In contrast to BEB, IB maintains high channel efficiency due to its unique quality of collision avoidance among the competing nodes. In IB most of the nodes choose higher contention slots while very few nodes selects lower contention slots, hence, less or no collision and low waiting time in backoff procedure. It is worth to note that BEB is executed under the saturation condition (i.e., https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq109_HTML.gif ), where all the nodes are always ready to compete with each other, hence, increase in collision probability. In IB, every node does not compete with each other every time, as they do not have request packet to send to PNC for every superframe (i.e., nonsaturated traffic). So we compare the BEB with IB under the nonsaturation condition as shown in Figures 7 and 8.
Results shown in Figures 7 and 8 are similar to those in Figure 6 except for CW = 8. In the nonsaturation case, especially for low n, competition for cannel access is low so the graph for CW = 8 is initially starting from low value, reaching to maximum, and again it starts decreasing. Form these figures we can also fine the optimum value of CW for given a value of n.
Figures 9, 10, and 11 show the average medium access delay performances of BEB and IB for saturation and nonsaturation traffic, respectively. In BEB scheme, as a large number of stations attempt to access the medium, more collision occurs so the number of retransmissions increases and the nodes suffer longer delays. The BEB scheme is plotted for different values of CW. Figures 10 and 11 show some interesting results, the graphs for CW = 64 show maximum average delay unexpectedly. This is because at nonsaturation condition a node has to wait for longer contention time compared to other CW values. In IB, as we expected access delay is very low compared to BEB. This is because of low or no collision and less idle waiting time in backoff procedure.
Figures 12, 13, and 14 illustrate the effect of bakeoff schemes on energy efficiency under the saturation and nonsaturation conditions, respectively. From Figure 12 we can see that small value of CW in BEB scheme wastes more energy, as collision and number of retransmission increase. As CW value increases the collision probability and the number of retransmissions decreases, hence, we have less energy waste. From Figures 13 and 14 we can observe that the results for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq110_HTML.gif in BEB scheme waste more energy compared to other CW vales, as idle listening and overhearing increases. In contrast IB wastes very less energy due to its unique characteristics of collision avoidance.
In WPAN MAC, due to much smaller minimum contention window and the retry limit , the collision probability could be very high when n is large. The request packets are more likely to drop and thus fewer requests can be successfully transmitted. If the request packets are dropped in the cap, the nodes need to reinitiate the request packets in the following superframe, which degrades the network performance due to waste of network resources by retransmission and collision. Accepting IB as backoff scheme can increase the overall performance of WPAN MAC protocol to a large extends as shown in the aforementioned results.

4.1. Applicability and Extendibility of the Analytical Model

In this paper, we present the in-depth mathematical analysis of BEB and IB methods for WPAN MAC to evaluate the performance of a WPAN. Form the obtained results we can tune the value of CW if we know the population of n. In case of WPAN MAC where PNC controls the piconet, it is possible to know the number of contenders available in a network. The analysis presented in this paper is an analysis of BEB with an assumption of steady sate. A sudden change of the offered load will cause change of the state; however, IB can easily absorb the new change with stability. So the analytical model of IB presented in the paper is easily applicable to large-scale sensor networks to improve the latency and energy efficiency while maintaining a good throughput. Furthermore, it is also possible to extend our models for erroneous channel conditions and general wireless networks (i.e., IEEE 802.11) with a proper fairness mechanism.

5. Conclusions

In this paper, we applied IB scheme to WPAN MAC to enhance its performance. We have also proposed the analytical models to compute the performance of BEB and IB in WPAN MAC. Using the proposed analytical models, we analyze the performance of BEB and IB in terms of channel efficiency, channel access delay, and energy efficiency under the saturation and nonsaturation traffic conditions. Furthermore, our results show that IB exhibits an edge over BEB in WPAN MAC.
Table 1
Simulation parameters.
Parameters
Values
SIFS
2.5 usec
MIFS
1 usec
Preamble and PLCP header
9 usec
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq111_HTML.gif
8
Request packet size
24 Bytes
Nodes
5 https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq112_HTML.gif 100
Data rate
1 Gbps
Control signal rate
48 Mbps
Transmitting energy
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq113_HTML.gif  J/Bit
Idle/listening energy
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F697535/MediaObjects/13638_2009_Article_1992_IEq114_HTML.gif  J/Bit
Open AccessThis article is distributed under the terms of the Creative Commons Attribution 2.0 International License (https://​creativecommons.​org/​licenses/​by/​2.​0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Literatur
1.
Zurück zum Zitat P802.15.3/D17 : (C/LM) Standard for Telecommunications and Information Exchange Between Systems—LAN/MAN Specific Requirements—Part 15.3: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for High Rate Wireless Personal Area Networks. February 2003. P802.15.3/D17 : (C/LM) Standard for Telecommunications and Information Exchange Between Systems—LAN/MAN Specific Requirements—Part 15.3: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for High Rate Wireless Personal Area Networks. February 2003.
2.
Zurück zum Zitat Mehta S, Kwak KS: Capacity analysis of IEEE 802.15.3 MAC protocol. UWB Research Center, South Korea; May-June 2008. Mehta S, Kwak KS: Capacity analysis of IEEE 802.15.3 MAC protocol. UWB Research Center, South Korea; May-June 2008.
3.
Zurück zum Zitat Chin K-W, Lowe D: Simulation study of the IEEE 802.15.3 MAC. Proceedings of the Australian Telecommunications and Network Applications Conference (ATNAC '04), 2004, Sydney, Australia Chin K-W, Lowe D: Simulation study of the IEEE 802.15.3 MAC. Proceedings of the Australian Telecommunications and Network Applications Conference (ATNAC '04), 2004, Sydney, Australia
4.
Zurück zum Zitat Chen H, Guo Z, Yao R, Li Y: Improved performance with adaptive Dly-ACK for IEEE 802.15.3 WPAN over UWB PHY. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences 2005, E88-A(9):2364-2372. 10.1093/ietfec/e88-a.9.2364CrossRef Chen H, Guo Z, Yao R, Li Y: Improved performance with adaptive Dly-ACK for IEEE 802.15.3 WPAN over UWB PHY. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences 2005, E88-A(9):2364-2372. 10.1093/ietfec/e88-a.9.2364CrossRef
5.
Zurück zum Zitat Tseng Y-H, Wu EH-K, Chen G-H: Maximum traffic scheduling and capacity analysis for IEEE 802.15.3 high data rate MAC protocol. Proceedings of the IEEE Vehicular Technology Conference (VTC '03), October 2003, Orlando, Fla, USA 3: 1678-1682. Tseng Y-H, Wu EH-K, Chen G-H: Maximum traffic scheduling and capacity analysis for IEEE 802.15.3 high data rate MAC protocol. Proceedings of the IEEE Vehicular Technology Conference (VTC '03), October 2003, Orlando, Fla, USA 3: 1678-1682.
6.
Zurück zum Zitat Xaio Y, Shen X, Jiang H: Optimal ACK mechanisms of the IEEE 802.15.3 MAC for ultra-wideband systems. IEEE Journal on Selected Areas in Communications 2006, 24(4, part 1):836-842.CrossRef Xaio Y, Shen X, Jiang H: Optimal ACK mechanisms of the IEEE 802.15.3 MAC for ultra-wideband systems. IEEE Journal on Selected Areas in Communications 2006, 24(4, part 1):836-842.CrossRef
7.
Zurück zum Zitat Tay YC, Jamieson K, Balakrishnan H: Collision-minimizing CSMA and its applications to wireless sensor networks. IEEE Journal on Selected Areas in Communications 2004, 22(6):1048-1057. 10.1109/JSAC.2004.830898CrossRef Tay YC, Jamieson K, Balakrishnan H: Collision-minimizing CSMA and its applications to wireless sensor networks. IEEE Journal on Selected Areas in Communications 2004, 22(6):1048-1057. 10.1109/JSAC.2004.830898CrossRef
8.
Zurück zum Zitat Bianchi G: Performance analysis of the IEEE 802.11 distributed coordination function. IEEE Journal on Selected Areas in Communications 2000, 18(3):535-547. 10.1109/49.840210CrossRef Bianchi G: Performance analysis of the IEEE 802.11 distributed coordination function. IEEE Journal on Selected Areas in Communications 2000, 18(3):535-547. 10.1109/49.840210CrossRef
9.
Zurück zum Zitat Ergen M, Varaiya P: Throughput analysis and admission control for IEEE 802.11a. Mobile Networks and Applications 2005, 10(5):705-716. 10.1007/s11036-005-3364-9CrossRef Ergen M, Varaiya P: Throughput analysis and admission control for IEEE 802.11a. Mobile Networks and Applications 2005, 10(5):705-716. 10.1007/s11036-005-3364-9CrossRef
10.
Zurück zum Zitat Kwak BJ, Song NO, Miller LE: Perfoamnce analysis of exponential backoff. IEEE/ACM Trasection on Networking 2005, 13(2):343-355.CrossRef Kwak BJ, Song NO, Miller LE: Perfoamnce analysis of exponential backoff. IEEE/ACM Trasection on Networking 2005, 13(2):343-355.CrossRef
12.
Zurück zum Zitat Harada H, et al.: IEEE P802.15 working group for wireless personal area networks (WPANs). IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs) DOC: IEEE 802.15-07-0761-05-003c, July 2007 Harada H, et al.: IEEE P802.15 working group for wireless personal area networks (WPANs). IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs) DOC: IEEE 802.15-07-0761-05-003c, July 2007
13.
Zurück zum Zitat Stemm M, Katz RH: Measuring and reducing energy consumption of network interfaces in hand-held devices. IEICE Transactions on Communications 1997, E80-B(8):1125-1131. Stemm M, Katz RH: Measuring and reducing energy consumption of network interfaces in hand-held devices. IEICE Transactions on Communications 1997, E80-B(8):1125-1131.
Metadaten
Titel
Performance Analysis of Binary Exponential Backoff and Improved Backoff for WPAN
verfasst von
S. Mehta
K.S. Kwak
Publikationsdatum
01.12.2010
Verlag
Springer International Publishing
DOI
https://doi.org/10.1155/2010/697535

Weitere Artikel der Ausgabe 1/2010

EURASIP Journal on Wireless Communications and Networking 1/2010 Zur Ausgabe