Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








4,814 Hits in 3.2 sec

Design and Analysis of Backoff Algorithms for Random Access Channels in UMTS-LTE and IEEE 802.16 Systems

Jun-Bae Seo, Victor C. M. Leung
2011 IEEE Transactions on Vehicular Technology  
In this paper, we examine the performance of uniform backoff (UB) and binary exponential backoff (BEB) algorithms with retry limit, which can be used in the randomaccess channels of Universal Mobile Telecommunication  ...  We show that controlling the persistence value as specified in UMTS is effective in both backoff algorithms.  ...  Note that the value of i can indicate a certain partition of the random access channels.  ... 
doi:10.1109/tvt.2011.2166569 fatcat:73wvnl5tfvhw5pedyv5chj6jxi

An Efficient and Secured Media Access Mechanism Using the Intelligent Coordinator in Low-Rate WPAN Environment [chapter]

Joon Heo, Choong Seon Hong
2005 Lecture Notes in Computer Science  
For example, IEEE 802.15.4 requires nodes competing for getting access to the channel to wait for a 'backoff' interval, randomly selected from a specified range, before initiating a transmission.  ...  However, this use is predicated on an implicit assumption of confidentiality and availability. In this environment, malicious device may obtain an unfair share of the channel bandwidth.  ...  If the channel is busy, following this random backoff, the device shall wait for another random number of backoff slots before trying to access the channel again.  ... 
doi:10.1007/11552451_63 fatcat:n6uwvqseonhaxl373b4q63f6ei

Multichannel outage-aware MAC protocols for wireless networks

Hyukjin Lee, Cheng-Chew Lim, Jinho Choi
2009 2009 4th IEEE Conference on Industrial Electronics and Applications  
Channel outage is a concept to reflect channel fading and interference into an efficient design of medium access control (MAC) protocols.  ...  ., channel outage) over distinct channels, throughput may vary depending on channel selection of users.  ...  It resolves contention by random channel selection instead of conventional random backoff time.  ... 
doi:10.1109/iciea.2009.5138421 fatcat:tndwzlynr5bkdom2eekggqd7sa

On optimizing the backoff interval for random access schemes

Z.J. Haas, Jing Deng
2003 IEEE Transactions on Communications  
To improve the channel throughput and the fairness of random access channels, we propose a new backoff algorithm, namely, the sensing backoff algorithm (SBA).  ...  Index Terms-Backoff algorithm, backoff interval, binary exponential backoff (BEB), multiplicative increase linear decrease (MILD), random access, sensing backoff algorithm (SBA).  ...  Another contribution of this paper is the analytical model of backoff-controlled random access channels.  ... 
doi:10.1109/tcomm.2003.820754 fatcat:jnuouyhuyjaaxj3aofd2rcaxtq

Service Differentiation based on Contention Window with Enhanced Collision Resolution LR-WPANs
English

Vandita Grover, Sugandha Gupta
2015 International Journal of Computer Trends and Technology  
Our proposed algorithm not only deliver service differentiation according to class priority, but also adapts to the backoff exponent according to the channel contention information collected during CCA  ...  The IEEE 802.15.4 MAC [1] standard defines the channel access for low-rate, low-power communication applications such as Wireless Sensor Networks but does not differentiate between high or low priority  ...  The Number of Backoffs (NB) represents the number of times the CSMA/CA algorithm was required to backoff while attempting to access the channel.  ... 
doi:10.14445/22312803/ijctt-v19p116 fatcat:6aawzk7rt5dohejngohw7ier24

Token-DCF: An opportunistic MAC protocol for wireless networks

Ghazale Hosseinabadi, Nitin Vaidya
2013 2013 Fifth International Conference on Communication Systems and Networks (COMSNETS)  
However, due to idle and collision times, 802.11 DCF performs poorly when it comes to channel utilization, system throughput, and channel access time.  ...  Main focus of our approach is on reducing idle and collision times by introducing an implicit token passing algorithm.  ...  Any opinions, findings, and conclusions or recommendations expressed here are those of the authors and do not necessarily reflect the views of the funding agencies or the U.S. government.  ... 
doi:10.1109/comsnets.2013.6465559 dblp:conf/comsnets/HosseinabadiV13 fatcat:6v6fxm5m7fdd3byd4tph76ghgy

Explicit and implicit pipelining for wireless medium access control

Xue Yang, N.H. Vaidya
2003 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484)  
In this paper, we propose to use pipelining techniques to resolve such conflicts and improve the performance of multiple access control in terms of channel utilization.  ...  In wireless networks, multiple stations contend for access to the shared channel.  ...  Random Backoff RTS/CTS Handshake Channel Control Data Channel Random Backoff RTS/CTS Handshake Random Backoff RTS/CTS Handshake Stage 1: Stage 1: Stage 1: Data / ACK transmission Stage  ... 
doi:10.1109/vetecf.2003.1285260 fatcat:h6pmuwkotnbdnbhgxuokzqzzhq

Improvement of WLAN Contention Resolution by Loss Differentiation

Qixiang Pang, Victor M. Leung, Soung Liew
2006 IEEE Transactions on Wireless Communications  
In this paper, we propose new backoff algorithms that take advantage of a new capability to differentiate the losses, and thereby sharpen the accuracy of the contention resolution process.  ...  The existence of noise-induced losses reduces the effectiveness of the standard WLAN backoff algorithm for contention resolution, which assumes that all losses are caused by collisions and always doubles  ...  link conditions for a single accessing station...........Comparison of the backoff algorithms under heterogeneous conditions for basic access .Comparison of the backoff algorithms under heterogeneous  ... 
doi:10.1109/twc.2006.256983 fatcat:2n466oyqrrg43pdkyozxx37qiu

Optimized tuning of contention window for IEEE 802.11 WLAN

B Nithya, A Justin Gopinath, Venkatesh Kameswaran, P Yogesh
2017 International Journal of Engineering, Science and Technology  
The simulation results prove that the proposed algorithm outperforms the existing algorithms under heavy and low traffic in random and grid topology.  ...  The proposed Collision Ratio based BackOff (CRBO) algorithm uses collision ratio to suggest CW updation after the successful and unsuccessful transmission events.  ...  Proposed Algorithm The proposed CRBO algorithm intents to afford an efficient medium access control by proper scheduling of transmissions among competing stations.  ... 
doi:10.4314/ijest.v9i2.2 fatcat:3sjycw7nwvfrzbdycrraarolsm

Enhancing the Selection of Backoff Interval Using Fuzzy Logic over Wireless Ad Hoc Networks

Radha Ranganathan, Kathiravan Kannan
2015 The Scientific World Journal  
But this random backoff interval can change the optimal order and frequency of channel access among competing nodes which results in unfairness and increased delay.  ...  ., random binary exponential backoff—BEB) of IEEE 802.11 DCF (distributed coordination function) is inefficient and unfair especially under heavy load.  ...  Conflict of Interests The authors declare that there is no conflict of interests regarding the publication of this paper.  ... 
doi:10.1155/2015/680681 pmid:25879066 pmcid:PMC4386703 fatcat:z2grewlngzfprd7aomkdrtet54

An Enhanced CSMA-CA Algorithm for IEEE 802.15.4 LR-WPANs

Jae Ha, Tae Kim, Hong Park, Sunghyun Choi, Wook Kwon
2007 IEEE Communications Letters  
The second one is an enhanced backoff (EB) mechanism that shifts the range of backoff counters by utilizing the CCA outcome.  ...  The first one is an enhanced collision resolution (ECR) mechanism that adjusts the backoff exponent (BE) based on both consecutive clear channel assessment (CCA) busy results and a packet transmission.  ...  The CSMA-CA variants employed in these standards provide robustness against unstable channel conditions and higher capacity than other random access algorithms.  ... 
doi:10.1109/lcomm.2007.061891 fatcat:pqtv4r5apjck5abggaci35jweq

An Insight of Backoff Algorithms in Wireless Networks

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
The IEEE 802.11 MAC is liable for the scheme of channel accessing. It decides the performance of the WLAN and DCF is the central strategy.  ...  Different existing algorithms for backoff and comparision among the algorithms are shown in the manuscript.  ...  algorithms controls the CW dynamically.  ... 
doi:10.35940/ijitee.l3855.119119 fatcat:4cn2higqejegdfgunkcfxh6uwy

Adaptive Backoff Algorithm for IEEE 802.11 MAC Protocol

Maali ALBALT, Qassim NASIR
2009 International Journal of Communications, Network and System Sciences  
Several approaches have been suggested to improve Quality of Service (QoS) in IEEE 802.11-based MANETs through modifying some of the IEEE 802.11 Medium Access Control (MAC) algorithms, such as the backoff  ...  algorithm that is used to control the packets collision aftermath.  ...  The BEB algorithm is used by the IEEE 802.11 to control access to the shared wireless medium among contending stations.  ... 
doi:10.4236/ijcns.2009.24033 fatcat:hq45xlgfcjeptkdzfcqr4urixm

Simulation and Performance Analysis of Various IEEE 802.11 Backoff Algorithms

B. Nithya, C. Mala, Vijay KumarB
2012 Procedia Technology - Elsevier  
The Backoff Algorithm is the heart of Medium Access Control(MAC) protocol which determines the system throughput in IEEE802.11 networks.  ...  Backoff algorithm has to take an important and crucial decision to correctly predict the precious waiting time for the station before accessing the medium.  ...  For all these access methods, it is required to have some mechanisms that control waiting time of stations before accessing the medium.  ... 
doi:10.1016/j.protcy.2012.10.102 fatcat:3frlwauneffqbh7owmbwj7foba

An Effective Approach to Contention Based Bandwidth Request Mechanism in WiMAX Networks

Sonia Panchal, Satinder Pal
2004 INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY  
In this paper the IEEE 802.16 standard based Mobile WiMAX (Worldwide Interoperability for Microwave Access) system is investigated for the purpose of Quality of Service provisioning.  ...  a well thought out algorithm will be of great contribution to the area under investigation.  ...  Instead, we assume that requests are generated at random intervals, emulating the general behaviour of user-defined algorithms for request generation.  ... 
doi:10.24297/ijct.v3i1b.2749 fatcat:cennw4ss5zdjdbd4jqztyqhox4
« Previous Showing results 1 — 15 out of 4,814 results