Collision based multiple access scheme for wireless networks
نویسندگان
چکیده
Ethernet adopts the well-known Binary Exponential Back-off (BEB) scheme for collision resolution. Operation of the BEB algorithm leads to the last-come-firstserve result among competing users (also known as the “capture effect”, which allows a few “winning” users to occupy most of the available bandwidth) and BEB is also unstable for every arrival rate greater than 0. Taking the advantage of the central control unit (access point or base station) in wireless network, we propose a novel scheme, Fixed Collision Rate (FCR) back-off algorithm, which amends the drawbacks of BEB. FCR not only achieves a throughput of 1/e at extremely busy channel, but also share the limited bandwidth among competing users in a fairer way. Operation of FCR scheme relies on estimating number of users and maintains the collision rate at a constant level. A variety of estimation methods are provided in this work. Simulation results with perfect knowledge of number of users are obtained to find the performance upper bound of the proposed scheme.
منابع مشابه
A Deterministic Multiple Key Space Scheme for Wireless Sensor Networks via Combinatorial Designs
The establishing of a pairwise key between two nodes for encryption in a wireless sensor network is a challenging issue. To do this, we propose a new deterministic key pre-distribution scheme which has modified the multiple key space scheme (MKSS). In the MKSS, the authors define two random parameters to make better resilience than existing schemes. Instead of a random selection of these parame...
متن کاملComparison of IEEE 802.3 & IEEE802.11 MAC Protocol EEET1149 LOCAL AND METROPOLITAN AREA NETWORKS LECTURER:
The IEEE 802.3 and 802.11 standards are used to define CSMA/CD (Carrier Sense Multiple Access with Collision Detection) based on the Ethernet LAN (Local Area Networks) and Wireless LAN (WLAN) protocol, respectively. This report deals with the comparison of IEEE 802.3 and IEEE802.11 MAC protocol in terms of the physical and medium access control (MAC) layer. CSMA/CD Ethernet-based protocol is th...
متن کاملLPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring
Communication security of wireless sensor networks is achieved using cryptographic keys assigned to the nodes. Due to resource constraints in such networks, random key pre-distribution schemes are of high interest. Although in most of these schemes no location information is considered, there are scenarios that location information can be obtained by nodes after their deployment. In this paper,...
متن کاملEvaluation of a BIBD Based Directional MAC Protocol for Wireless Ad Hoc Networks
The use of directional antennas in wireless ad hoc networks can significantly improve global performance due to a high spatial channel reuse. Nevertheless, its introduction poses new location dependent problems related to the MAC protocol. In this paper, the Balanced Incomplete Block Design theory has been exploited to develop a new MAC protocol for wireless ad hoc networks using directional ant...
متن کاملHybrid Key pre-distribution scheme for wireless sensor network based on combinatorial design
Key distribution is an important problem in wireless sensor networks where sensor nodesare randomly scattered in adversarial environments.Due to the random deployment of sensors, a list of keys must be pre-distributed to each sensor node before deployment. To establish a secure communication, two nodes must share common key from their key-rings. Otherwise, they can find a key- path in which ens...
متن کاملA multi-layer collision resolution multiple access protocol for wireless networks
In mobile communication networks operating in unreliable physical transmission, random access protocol with the collision resolution (CR) scheme is more attractive than the ALOHA family including carrier sense multiple access (CSMA) [IEEE Networks (September 1994) 50–64], due to likely failure on the channel sensing. Being a member of CR family schemes, a protocol known as non-preemptive priori...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2002