• Title/Summary/Keyword: Collision Protocols

Search Result 99, Processing Time 0.021 seconds

Unsaturated Throughput Analysis of IEEE 802.11 DCF under Imperfect Channel Sensing

  • Shin, Soo-Young
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.4
    • /
    • pp.989-1005
    • /
    • 2012
  • In this paper, throughput of IEEE 802.11 carrier-sense multiple access (CSMA) with collision-avoidance (CA) protocols in non-saturated traffic conditions is presented taking into account the impact of imperfect channel sensing. The imperfect channel sensing includes both missed-detection and false alarm and their impact on the utilization of IEEE 802.11 analyzed and expressed as a closed form. To include the imperfect channel sensing at the physical layer, we modified the state transition probabilities of well-known two state Markov process model. Simulation results closely match the theoretical expressions confirming the effectiveness of the proposed model. Based on both theoretical and simulated results, the choice of the best probability detection while maintaining probability of false alarm is less than 0.5 is a key factor for maximizing utilization of IEEE 802.11.

Efficient Dual-layered Hierarchical Routing Scheme for Wireless Sensor Networks

  • Yoon, Mahn-Suk;Kim, Hyun-Sung;Lee, Sung-Woon
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2008.10b
    • /
    • pp.507-511
    • /
    • 2008
  • Supporting energy efficiency and load balancing in wireless sensor network is the most important issue in devising the hierarchical routing protocols. Recently, the dual layered clustering scheme with GPS was proposed for the supporting of load balancing for cluster heads but there would be many collided messages in the overlapped area between two layers. Thereby, the purpose of this paper is to reduce the collision rate in the overlapped layer by concisely distinguish them with the same number of nodes in them. For the layer partition, this paper uses an equation $x^2+ y^2{\le}(\frac{R}{\sqrt{2\pi}})^2$ to distinguish layers. By using it, the scheme could efficiently distinguish two layers and gets the balanced number of elements in them. Therefore, the proposed routing scheme could prolong the overall network life cycle about 10% compared to the previous two layered clustering scheme.

  • PDF

Accelerating RFID Tag Identification Processes with Frame Size Constraint Relaxation

  • Park, Young-Jae;Kim, Young-Beom
    • Journal of information and communication convergence engineering
    • /
    • v.10 no.3
    • /
    • pp.242-247
    • /
    • 2012
  • In the determination of suitable frame sizes associated with dynamic framed slotted Aloha used in radio frequency identification tag identification processes, the widely imposed constraint $L=2^Q$ often yields inappropriate values deviating far from the optimal values, while a straightforward use of the estimated optimal frame sizes causes frequent restarts of read procedures, both resulting in long identification delays. Taking a trade-off, in this paper, we propose a new method for determining effective frame sizes where the effective frame size changes in a multiple of a predetermined step size, namely ${\Delta}$. Through computer simulations, we show that the proposed scheme works fairly well in terms of identification delay.

Multi-Channel Pipelining for Energy Efficiency and Delay Reduction in Wireless Sensor Network (무선 센서 네트워크에서 에너지 효율성과 지연 감소를 위한 다중 채널 파리프라인 기법)

  • Lee, Yoh-Han;Kim, Daeyoung
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.11
    • /
    • pp.11-18
    • /
    • 2014
  • Most of the energy efficient MAC protocols for wireless sensor networks (WSNs) are based on duty cycling in a single channel and show competitive performances in a small number of traffic flows; however, under concurrent multiple flows, they result in significant performance degradation due to contention and collision. We propose a multi-channel pipelining (MCP) method for convergecast WSN in order to address these problems. In MCP, a staggered dynamic phase shift (SDPS) algorithms devised to minimize end-to-end latency by dynamically staggering wake-up schedule of nodes on a multi-hop path. Also, a phase-locking identification (PLI) algorithm is proposed to optimize energy efficiency. Based on these algorithms, multiple flows can be dynamically pipelined in one of multiple channels and successively handled by sink switched to each channel. We present an analytical model to compute the duty cycle and the latency of MCP and validate the model by simulation. Simulation evaluation shows that our proposal is superior to existing protocols: X-MAC and DPS-MAC in terms of duty cycle, end-to-end latency, delivery ratio, and aggregate throughput.

Media Access Control Protocol based on Dynamic Time Slot Assignment in Underwater Mobile Ad-hoc Network (동적 타임 슬롯 할당에 기반한 수중 모바일 Ad-hoc 네트워크에서의 매체접근제어 프로토콜)

  • Shin, Seung-Won;Kim, Yung-Pyo;Yun, Nam-Yeol;Park, Soo-Hyun
    • Journal of the Korea Society for Simulation
    • /
    • v.20 no.4
    • /
    • pp.81-89
    • /
    • 2011
  • Underwater wireless network can be useful in various fields such as underwater environment observation, catastrophe prevention, ocean resources exploration, ocean organism research, and vessel sinking exploration. We need to develop an efficient design for Medium Access Control (MAC) protocol to improve multiple data communication in underwater environment. Aloha protocol is one of the basic and simple protocols, but it has disadvantage such as collision occurs oftenly in communication. If there is collision occured in RF communication, problem can be solved by re-sending the data, but using low frequency in underwater, the re-transmission has difficulties due to slow bit-rate. So, Time Division Multiple Access (TDMA) based MAC protocol is going to be used to avoid collisions, but if there is no data to send in existing TDMA, time slot should not be used. Therefore, this paper proposes dynamic TDMA protocol mechanism with reducing the time slots by sending short "I Have No Data" (IHND) message, if there is no data to transmit. Also, this paper presents mathematic analysis model in relation to data throughput, channel efficiency and verifies performance superiority by comparing the existing TDMA protocols.

A Multi-Service MAC Protocol in a Multi-Channel CSMA/CA for IEEE 802.11 Networks

  • Ben-Othman, Jalel;Castel, Hind;Mokdad, Lynda
    • Journal of Communications and Networks
    • /
    • v.10 no.3
    • /
    • pp.287-296
    • /
    • 2008
  • The IEEE 802.11 wireless standard uses the carrier sense multiple access with collision avoidance (CSMA/CA) as its MAC protocol (during the distributed coordination function period). This protocol is an adaptation of the CSMA/CD of the wired networks. CSMA/CA mechanism cannot guarantee quality of service (QoS) required by the application because orits random access method. In this study, we propose a new MAC protocol that considers different types of traffic (e.g., voice and data) and for each traffic type different priority levels are assigned. To improve the QoS of IEEE 802.11 MAC protocols over a multi-channel CSMA/CA, we have developed a new admission policy for both voice and data traffics. This protocol can be performed in direct sequence spread spectrum (DSSS) or frequency hopping spread spectrum (FHSS). For voice traffic we reserve a channel, while for data traffic the access is random using a CSMA/CA mechanism, and in this case a selective reject and push-out mechanism is added to meet the quality of service required by data traffic. To study the performance of the proposed protocol and to show the benefits of our design, a mathematical model is built based on Markov chains. The system could be represented by a Markov chain which is difficult to solve as the state-space is too large. This is due to the resource management and user mobility. Thus, we propose to build an aggregated Markov chain with a smaller state-space that allows performance measures to be computed easily. We have used stochastic comparisons of Markov chains to prove that the proposed access protocol (with selective reject and push-out mechanisms) gives less loss rates of high priority connections (data and voices) than the traditional one (without admission policy and selective reject and push-out mechanisms). We give numerical results to confirm mathematical proofs.

A Study about Implementation Method of Multi-Interface Multi-Channel 2.4GHz Active RFID Reader Protocol (다중인터페이스 다중채널 2.4GHz 능동형 RFID 리더 프로토콜 구현방법에 관한 연구)

  • Kim, Dong-Hyun;Lee, Chae-Suk;Kim, Jong-Doek
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.4
    • /
    • pp.1005-1014
    • /
    • 2010
  • When reader collect tags, we found that they tend to get together to specific interface in Multi-Interface Multi-Channel 2.4GHz Active RFID system. To solve this problem, we designed the LP-Combind and AP-Balanced protocol for load distribution between interfaces, then verified its superiority of the performance through the simulation. There are three problems to implement designed protocols in hardware of firmware-level. first, tag selects randomly the channel of reader and reader need the method which can change the channel of tags. second, reader has the synchronization problem between reader and tag. third, reader has problem that MCU of reader have to operate simultaneously dual interface. To slove this problems, we designed the message and implemented method for tag channel change and the protocol in order to adjust synchronization between reader and tag, Therefore, we compared and analyzed the performance of protocols by experiment. If LP windows size is same, the performance of LP-Combined protocol and AP-Balanced protocol which lower collision probability by its load distribution is more outstanding than single interface protocol performance.

Performance Analysis of Opportunistic Spectrum Access Protocol for Multi-Channel Cognitive Radio Networks

  • Kim, Kyung Jae;Kwak, Kyung Sup;Choi, Bong Dae
    • Journal of Communications and Networks
    • /
    • v.15 no.1
    • /
    • pp.77-86
    • /
    • 2013
  • Cognitive radio (CR) has emerged as one of effective methods to enhance the utilization of existing radio spectrum. Main principle of CR is that secondary users (SUs) are allowed to use the spectrum unused by primary users (PUs) without interfering PU's transmissions. In this paper, PUs operate on a slot-by-slot basis and SUs try to exploit the slots unused by PUs. We propose OSA protocols in the single channel and we propose an opportunistic spectrum access (OSA) protocols in the multi-channel cognitive radio networks with one control channel and several licensed channels where a slot is divided into contention phase and transmission phase. A slot is divided into reporting phase, contention phase and transmission phase. The reporting phase plays a role of finding idle channels unused by PUs and the contention phase plays a role of selecting a SU who will send packets in the data transmission phase. One SU is selected by carrier sense multiple access / collision avoidance (CSMA/CA) with request to send / clear to send (RTS/CTS) mechanism on control channel and the SU is allowed to occupy all remaining part of all idle channels during the current slot. For mathematical analysis, first we deal with the single-channel case and we model the proposed OSA media access control (MAC) protocol by three-dimensional discrete time Markov chain (DTMC) whose one-step transition probability matrix has a special structure so as to apply the censored Markov chain method to obtain the steady state distribution.We obtain the throughput and the distribution of access delay. Next we deal with the multi-channel case and obtain the throughput and the distribution of access delay by using results of single-channel case. In numerical results, our mathematical analysis is verified by simulations and we give numerical results on throughput and access delay of the proposed MAC protocol. Finally, we find the maximum allowable number of SUs satisfying the requirements on throughput and access delay.

Priority Collision Resolution Algorithm on HFC Networks (우선 순위를 고려한 HFC 망의 충돌 해소 알고리즘)

  • 김변곤;박준성;정경택;전병실
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.7B
    • /
    • pp.1252-1260
    • /
    • 1999
  • The HFC network has a architecture of a star topology in fiber optic trunks, and tree and branch topology is used in the part of coaxial cable. It is well known that the HFC upstream channel is noisy. Ingress, common mode distortion and impulse noise exist in the upstream channel. In order to provide Quality of Service(QoS) to users with real-time data such as voice, video and interactive services, the evolving IEEE 802.14 standard for HFC networks must include an effective priority scheme. The scheme separates and resolves collisions between stations in a priority order. It is important to simulate protocols under a practical environment. The proposed algorithm in this paper is simulated with the assumption that the collision detector made certain mistake due to noises. Simulation results show that the proposed algorithm is more efficient than existing tree-based algorithm under practical environment.

  • PDF

A MAC Protocol for Underwater Acoustic Sensor Networks (수중 음파 센서 네트워크를 위한 매체접근제어 프로토콜)

  • Jang, Kil-Woong
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.4
    • /
    • pp.337-344
    • /
    • 2008
  • Underwater acoustic sensor networks exhibit characteristics such as high propagation delay and low data rates, which are different from those of terrestrial wireless networks. Therefore, the conventional protocols used in wireless networks can be restrictive and inefficient when applied to underwater acoustic sensor networks. In this paper, we propose a medium access control protocol (MAC) to enhance the energy efficiency and throughput in underwater acoustic sensor networks. The proposed protocol employs a slot-based competition mechanism that reserves a time slot to send a data packet in advance. In the proposed protocol, collision between nodes can occur due to competition to obtain a slot. However, the proposed protocol minimizes the collisions between nodes because the nodes store the reservation information of the neighboring nodes, this reduces unnecessary energy consumption and increases throughput. We perform a simulation to evaluate the performance of the proposed protocol with regard to the energy consumption, the number of collision, channel utilization, throughput and transmission delay. We compare the proposed protocol with the conventional protocol, and the performance results show that the proposed protocol outperforms the conventional protocol.