• Title/Summary/Keyword: CSMA

Search Result 314, Processing Time 0.027 seconds

A CSMA/CA with Binary Exponential Back-off based Priority MAC Protocol in Tactical Wireless Networks (전술 무선망에서 2진 지수 백오프를 사용하는 CSMA/CA 기반 우선순위 적용 MAC 프로토콜 설계)

  • Byun, Ae-Ran;Son, Woong;Jang, Youn-Seon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.11
    • /
    • pp.12-19
    • /
    • 2015
  • In network-centric warfare, the communication network has played a significant role in defeating an enemy. Especially, the urgent and important data should be preferentially delivered in time. Thus, we proposed a priority MAC protocol based on CSMA/CA with Binary Exponential Back-off for tactical wireless networks. This MAC protocol suggested a PCW(Prioritized Contention Window) with differentiated back-off time by priority and a RBR(Repetitive Back-off Reset) to reset the remaining back-off time. The results showed that this proposed MAC has higher performance than those of DCF(Distributed Coordination Function) in the transmission success rate and the number of control packet transmission by reducing the packet collision. Thus, it produced more effective power consumption. In comparison with DCF, this proposed protocol is more suitable in high-traffic network.

Performance analysis of CSMA based MAC protocols for underwater communications (수중 통신에 적합한 CSMA기반 매체접근제어 프로토콜 연구)

  • Song, Min-Je;Jang, Youn-Seon
    • Journal of IKEEE
    • /
    • v.22 no.4
    • /
    • pp.1068-1072
    • /
    • 2018
  • In underwater communications, there are many challenges due to energy limitations, long propagation delay, low data rate, and high power loss, unlike terrestrial RF communications. Especially, the propagation delay of underwater acoustic channel is five orders of magnitude higher than in electro-magnetic terrestrial channels due to the low speed of sound(1,500m/s). Thus, the MAC protocols for terrestrial communications are not suitable for underwater network. In this paper, we studied the considerations for MAC protocol in underwater acoustic channel. Here, we concentrated on CSMA based MAC protocols. From the results, we confirmed that the number of control packets has an important effect on the performance in underwater environment. These results would be useful in designing MAC protocols for underwater acoustic communications.

Towards the Saturation Throughput Disparity of Flows in Directional CSMA/CA Networks: An Analytical Model

  • Fan, Jianrui;Zhao, Xinru;Wang, Wencan;Cai, Shengsuo;Zhang, Lijuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.4
    • /
    • pp.1293-1316
    • /
    • 2021
  • Using directional antennas in wireless Ad hoc networks has many superiorities, including reducing interference, extending transmission range, and increasing space division multiplexing. However, directional transmission introduces two problems: deafness and directional hidden terminals problems. We observe that these problems result in saturation throughput disparity among the competing flows in directional CSMA/CA based Ad hoc networks and bring challenges for modeling the saturation throughput of the flows. In this article, we concentrate on how to model and analyze the saturation throughput disparity of different flows in directional CSMA/CA based Ad hoc networks. We first divide the collisions occurring in the transmission process into directional instantaneous collisions and directional persistent collisions. Then we propose a four-dimensional Markov chain to analyze the transmission state for a specific node. Our model has three different kinds of processes, namely back-off process, transmission process and freezing process. Each process contains a certain amount of continuous time slots which is defined as the basic time unit of the directional CSMA/CA protocols and the time length of each slot is fixed. We characterize the collision probabilities of the node by the one-step transition probability matrix in our Markov chain model. Accordingly, we can finally deduce the saturation throughput for each directional data stream and evaluate saturation throughput disparity for a given network topology. Finally, we verify the accuracy of our model by comparing the deviation of analytical results and simulation results.

Evaluation of Multiple Access Protocols for Controlling UUV (무인잠수체 통제를 위한 다중접속 프로토콜 평가)

  • Jung, Seung-Back;Cho, Jin-Soo;Shim, Tae-Bo
    • The Journal of the Acoustical Society of Korea
    • /
    • v.27 no.6
    • /
    • pp.279-285
    • /
    • 2008
  • This study includes the efficiency assessment of a multiple access protocol for UUV (Underwater unmanned vehicle) control. Most of UUVs are controled by wire now; however, wireless control is demanded because of the demerit of the wire control that limits the place and activity. This study simulates efficiency of a standardization multiple access protocol (Pure ALOHA, Slotted ALOHA, Nonpersistent CSMA, Slotted Nonpersistent ISMA) formed for the purpose of performing wireless communication controlled by the ship or communication buoy at the sea surface and by the under water communication node at the bottom in order to efficiently control the UUV's. Results show that no significant changes occur related to changing type of the mother ship and the communication node; In addition, the Non-persistent CSMA and the Slotted Non-persistent ISMA show relatively high efficiency for underwater acoustic communication.

Exploiting cognitive wireless nodes for priority-based data communication in terrestrial sensor networks

  • Bayrakdar, Muhammed Enes
    • ETRI Journal
    • /
    • v.42 no.1
    • /
    • pp.36-45
    • /
    • 2020
  • A priority-based data communication approach, developed by employing cognitive radio capacity for sensor nodes in a wireless terrestrial sensor network (TSN), has been proposed. Data sensed by a sensor node-an unlicensed user-were prioritized, taking sensed data importance into account. For data of equal priority, a first come first serve algorithm was used. Non-preemptive priority scheduling was adopted, in order not to interrupt any ongoing transmissions. Licensed users used a nonpersistent, slotted, carrier sense multiple access (CSMA) technique, while unlicensed sensor nodes used a nonpersistent CSMA technique for lossless data transmission, in an energy-restricted, TSN environment. Depending on the analytical model, the proposed wireless TSN environment was simulated using Riverbed software, and to analyze sensor network performance, delay, energy, and throughput parameters were examined. Evaluating the proposed approach showed that the average delay for sensed, high priority data was significantly reduced, indicating that maximum throughput had been achieved using wireless sensor nodes with cognitive radio capacity.

Lower Bound of Partial Packet Recovery (패킷부분재전송기법의 수율 최저 한계)

  • Jeong, Choong-Kyo
    • Journal of Industrial Technology
    • /
    • v.28 no.A
    • /
    • pp.113-117
    • /
    • 2008
  • Wireless carrier sense multiple access (CSMA) systems are widely used but show extremely different transmission efficiency according to the operation environment. Simulation or prototype deployment is needed to see the transmission efficiency of a wireless CSMA system with the partial packet retransmission scheme. The lower bound for the transmission efficiency of such a system is found mathematically in this work. This shows how much the partial packet retransmission scheme improves the transmission efficiency quantitatively. It also shows that the maximum throughput is obtained at higher offered load compared to the conventional CSMA system without the partial packet transmission. The result of this work can be applied to IEEE 802.11 networks or wireless mesh networks.

  • PDF

A Study on the MAC Protocols for the Power Line Communications (전력선 통신을 위한 MAC프로토콜 분석)

  • 황민태;김동균;이재조;이원태;김관호
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2000.04a
    • /
    • pp.22-25
    • /
    • 2000
  • 전력공급을 위해 사용되는 전력선은 다수의사용자들이 공유하는 형태이므로, 이를 통신 목적으로 이용하고자 하는 경우에는 충돌방지와 신뢰성있는 통신을 위한 MAC 프로토콜이 필수적으로 필요하다. 본 논문에서는 전력선 통신을 위한 MAC 프로토콜을 조사 분석하였다. 전력선통신을 위한 MAC 프로토콜로는 물리적인 구조상 토큰 패싱과 CSMA를 사용하고있으나 토큰패싱은 통신망이 저부하일 때 토큰 전달에 따른 대역폭의 낭비가 있으며 CSMA는 통신망이 고부하일 때 잦은 충돌로 인해 효율이 저하된다. 이러한 단점을 극복하기 위해 하이브리드 토큰패싱과 CSMA/PA가 연구되고 있으나, 성능향상은 있는 반면에 각 노드가 가져야 하는 기능이 복잡해지고 구현의 용이성은 떨어진다.

  • PDF

Performance Analysis of a BRAM (The Broadcast Recognizing Aceess Method) Protocol in a Wireless LAN (무선 근거리 통신망에서의 BRAM(The Broadcast Recognizing Access Method) 프로토콜 성능 분석)

  • 김재현;이종규
    • Journal of the Korean Institute of Telematics and Electronics A
    • /
    • v.31A no.1
    • /
    • pp.1-8
    • /
    • 1994
  • In this paper, we have analyzed the performance of a BRAM (The Broadcasting Recognizing Access Method) protocol, as a CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) scheme, which is widely used in wireles LAN systems. We have selected a Fair BRAM protocol among CSMA/CA schemes, considering the fairness of channel usage and the simplicity of the protocol. We have compared the performance of BRAM protocol to that of CSMA/CD. to research the characteristics of BRAM in wireless LAN system. In order to analyze the performance of this system, we have set up an imbedded Markov chain and calculated state transition probabilities. Then we have calculated steady state probabilities and finally derived the throughput of a Fair BRAM moder. To verify our analysis, we have simulated practical models. Then, we have found that analytic results are very close to simulation ones. Our analysis of the BRAM protocol will be expected to be very helpful to design and evaluate a MAC (Media Access Control) protocol in wireless LAN systems.

  • PDF

WBAN MAC Protocols- Non-Saturation Modeling and Performance Analysis

  • Khan, Pervez;Ullah, Niamat;Kim, Hoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.3
    • /
    • pp.1462-1476
    • /
    • 2017
  • The current literature on discrete-time Markov chain (DTMC) based analysis of IEEE 802.15.6 MAC protocols for wireless body area networks (WBANs), do not consider the ACK timeout state, wherein the colliding nodes check the ill fate of their transmissions, while other contending nodes perform backoff check that slot as usual. In this paper, our DTMC model accurately captures the carrier sense multiple access with collision avoidance (CSMA/CA) mechanism of IEEE 802.15.6 medium access control (MAC) and allows the contending nodes performing backoff to utilize the ACK timeout slot during collisions. The compared rigorous results are obtained by considering a non-ideal channel in non-saturation conditions, and CSMA/CA parameters pertaining to UWB PHY of IEEE 802.15.6 MAC protocols.

A Study on the Performance Analysis and Comparision of Channel Access Protocols in LAN (LAN에서 채널 접속프로토콜의 성능해석 및 비교에 관한 연구)

  • 김평육;김정선;이대영
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.11 no.6
    • /
    • pp.402-410
    • /
    • 1986
  • The Media Access Control(MAC) Technologies in IEEE 802 Local Area Network(LAN) reference model include CSMA/CD, Token Ring and Token Bus methodes. The channel throughput of LAN can be affected by some parameters such as channel length, transmission rate and packet size, and station numbers. In this paper, the effect of these parameters to channel throughput are analyzed by normalized parameters. And the token ring and token bus method are analyzed by using the normalized parameter, and relatinonship bwtween channel thorughput and parameters is discussed. Finally, results are compared.

  • PDF