Adaptive Backoff Algorithm for Wireless Internet

نویسندگان

  • Muneer O. Bani Yassein
  • Saher S. Manaseer
  • Ahmad A. Momani
چکیده

The standard IEEE 802.11 MAC protocol uses the Binary Exponential Backoff algorithm. The Binary Exponential Backoff makes exponential increments to contention window sizes. This work has studied the effect of choosing a combination between linear, exponential and logarithmic increments to contention windows. Results have shown that choosing the right increment based on network status enhances the data delivery ratio up to 37% compared to the Binary Exponential Backoff, and up to 39 % compared to the Pessimistic Linear Exponential Backoff algorithms for wireless Internet.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Adaptive Optimized RTO Algorithm for Multi-homed Wireless Environments

As a transport layer protocol SCTP uses end to end metrics, such as Retransmission Time Out (RTO), to manage mobility handover. Our investigation illustrates that Wireless LAN (WLAN) mobility causes continuously increased Round Trip Times (RTT) resulting from 802.11 MAC retransmissions, regardless of the service specified by upper layers. We present scenarios where the current understanding of ...

متن کامل

Hashing Based Distributed Backoff (HBDB) Mechanism for IEEE 802.11 Wireless Networks

Binary Exponential Backoff (BEB) is the De-facto mechanism for contention control in IEEE 802.11 Wireless LAN. The exponential growth of Contention Window (CW) in all BackOff (BO) stages and randomness in BO selection causes unnecessary waiting time, high collision rate and unfairness in accessing the channel among the nodes. To overcome these anomalies, this paper proposes Hashing Based Distri...

متن کامل

PSSB: Priority enforced slow-start backoff algorithm for multimedia transmission in wireless ad-hoc networks

The binary exponential backoff (BEB) algorithm is the fundamental access method, which provides collision avoidance in wireless ad-hoc networks. However, BEB algorithm poses several performance issues. For example, the high collision rate problem, unfair channel access and throughput degradation have been several widely known issues. Besides, frames in BEB do not have priorities, making it unsu...

متن کامل

An Adaptive LEACH-based Clustering Algorithm for Wireless Sensor Networks

LEACH is the most popular clastering algorithm in Wireless Sensor Networks (WSNs). However, it has two main drawbacks, including random selection of cluster heads, and direct communication of cluster heads with the sink. This paper aims to introduce a new centralized cluster-based routing protocol named LEACH-AEC (LEACH with Adaptive Energy Consumption), which guarantees to generate balanced cl...

متن کامل

An Efficient Adaptive Boundary Matching Algorithm for Video Error Concealment

Sending compressed video data in error-prone environments (like the Internet and wireless networks) might cause data degradation. Error concealment techniques try to conceal the received data in the decoder side. In this paper, an adaptive boundary matching algorithm is presented for recovering the damaged motion vectors (MVs). This algorithm uses an outer boundary matching or directional tempo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012