Title :
A novel technique for investigating collisions and backoff strategies in three access control protocols
Author :
Gebali, F. ; El-Kharashi, M. Watheq
Author_Institution :
Dept. of Electr. & Comput. Eng., Victoria Univ., BC
Abstract :
This paper presents a new technique for studying backoff strategies in wireless access control protocols. The technique is applied to develop discrete-time Markov chain models for three wireless MAC protocols: pure ALOHA, slotted ALOHA and CSMA/CA. Network throughput is investigated for the protocols. It was found that optimum performance of the MAC protocol critically depends on the choice of backoff window. However, the optimum backoff window size depends on the MAC protocol used and the number of users in the system. The effect of backoff window size on protocol performance was investigated. It was found that the optimum backoff window size is w = 5N for pure ALOHA and CSMA/CA. On the other hand, the optimum backoff window size for slotted ALOHA is w = N
Keywords :
Markov processes; authorisation; carrier sense multiple access; discrete time systems; ALOHA; CSMA/CA; MAC protocols; backoff strategies; discrete-time Markov chain; wireless access control protocols; Access control; Access protocols; Delay; Media Access Protocol; Multiaccess communication; Performance analysis; System performance; Throughput; Tin; Wireless application protocol; Access Control Protocols; Backoff strategies; CSMA/CA; Computer Networks; Discrete-time Markov chains; Markov chain analysis; Packet collisions; Performance Analysis; Slotted ALOHA; pure ALOHA;
Conference_Titel :
Information and Communications Technology, 2005. Enabling Technologies for the New Knowledge Society: ITI 3rd International Conference on
Conference_Location :
Cairo
Print_ISBN :
0-7803-9270-1
DOI :
10.1109/ITICT.2005.1609637