A delay analysis of multi-access protocol under wireless network

무선환경하에서 Slotted ALOHA 방식의 다중채널 경쟁에 대한 지연시간분석

  • Hur Sun (Department of Industrial Engineering, Hanyang University) ;
  • Kim Jeong-Kee (Department of Industrial Engineering, Hanyang University) ;
  • Nam Jin-Gyu (Department of Industrial Engineering, Hanyang University)
  • 허선 (한양대학교 산업공학과) ;
  • 김정기 (한양대학교 산업공학과) ;
  • 남진규 (한양대학교 산업공학과)
  • Published : 2005.03.01

Abstract

Slotted ALOHA(S-ALOHA) is widely used in local wireless network. We analyze the performance of contention-based model in wireless LAN using S-ALOHA protocol. We analyze the performance of binary exponential backoff (BEB) algorithm under the slotted ALOHA protocol: whenever a node's message which tries to reserve a channel is involved in a collision for the ith time, it chooses one of the next $2^i$ frames with equal probability and attempts the reservation again. We derive the expected access delay and throughput which is defined as the expected number of messages that reserve a channel in a frame. A simulation study is performed to verify our method.

Keywords

References

  1. D. G. Jeong, and W. S. Jeon, 'Performance of an Ex­ponential Backoff for Slotted-ALOHA Protocol in Local Wireless Environment', IEEE TRANS. Veh. Technol., vol. 44, no. 3, pp. 470-479, Aug. 1995 https://doi.org/10.1109/25.406614
  2. B. J. Kwak, N. O. Song, and L. E. Miller, 'Analysis of the stability and Performance of Exponential Backoff', IEEE WCNC 2003, vol. 3, pp. 1754-1759, Mar. 2003 https://doi.org/10.1109/WCNC.2003.1200652
  3. W. Szpankowski, 'Analysis and stability considerations in a reservation multiaccess system', IEEE Trans. on Comm., vol. com-31, no. 5, pp. 684-692, May 1983
  4. R. M. Metcalfe, and D. G. Boggs, 'Ethernet: Distrib­uted packet switching for local computer network', Comm. ACM, vol. 19, no. 7, pp. 395-404, July 1976 https://doi.org/10.1145/360248.360253
  5. IEEE Std 802.11, 'IEEE standard for wireless LAN medium access control and physical layer specifica­tions', Nov. 1997
  6. L. Kleinrock, 'queueing system, vol. 2 : computer ap­plications', New York: Wiley, 1976
  7. D. J. Aldous, 'Ultimate instability of exponential back-off protocol for acknowledgement-based transmission control of random access communication channels', IEEE Trans. Information Theory, vol. 33, no.2, pp. 219-213, Mar. 1987 https://doi.org/10.1109/TIT.1987.1057295
  8. J. Goodman, A. G. Greenberg, N. Madras, and P. March, 'Stability of binary exponential backoff', Journal of ACM, vol. 35, no. 2, pp. 579-602, July 1988 https://doi.org/10.1145/44483.44488
  9. R. Rom, and M. Sidi, 'Multiple Access protocols : per­formance and analysis', Springer-Verlag New York, 1990