SlideShare a Scribd company logo
1 of 27
Presented By:
Md. Ahasanul Alam
Roll: 1301
Gottapu, Sasi Bhushana Rao, Madhavi Tatineni, and M. N. V. S. S. Kumar. IET
networks 2.4 (2013): 204-213.
 IEEE 802.11 lays down the architecture and specifications of wireless LANs
(WLANs)
 In IEEE 802.11, the basic medium access control (MAC) technique –
Distributed Coordination Function (DCF)
 Markov chain model is used to evaluate the performance of IEEE 802.11 DCF
protocol
 Based on some assumptions and simplification
 Can not accurately predict performance in real network
 This work
 Propose a Collision Alleviating DCF (CAD) to enhance the performance in congested
wireless network
 Design a exact Markov chain model to evaluate and predict the performance of the
protocol
2
 MAC protocol based on IEEE 802.11
 Employs a Carrier-Sense Multiple Access with Collision Avoidance (CSMA/CA) method
with the binary exponential backoff algorithm
 Data transfer
 2-way handshaking
 Data Packet is Acknowledged by Receiver
 Acks are used to maintain reliability
3
Sender Receiver
Data
ACK
 4-way handshaking
 First, reserve the channel by
Request-to-Send (RTS) and
Clear-to-Send (CTS)
 Then Follow 2-way data
transfer
Sender Receiver
Data
ACK
RTS
CTS
4
No
 Can be experienced in saturated networks
 In congested networks
 Collision occurs more frequently
 DCF uses binary exponential backoff
for collision avoidance
 Increase contention window (CW)
 Successful transmission resets the
CW to minimum
 Channel Capture Effect:
 Node with recent successful transmission
may get biased advantage to channel access
5
CW:
16
CW:
16
CW:
8
CW:
32
CW:
16
Access
Channel
 Can be experienced in saturated networks
 In congested networks
 Collision occurs more frequently
 DCF uses binary exponential backoff
for collision avoidance
 Increase contention window (CW)
 Successful transmission resets the
CW to minimum
 Channel Capture Effect:
 Node with recent successful transmission
may get biased advantage to channel access
6
CW:
16
CW:
16
CW:
8
CW:
32
CW:
16
Access
Channel
 Can be experienced in saturated networks
 In congested networks
 Collision occurs more frequently
 DCF uses binary exponential backoff
for collision avoidance
 Increase contention window (CW)
 Successful transmission resets the
CW to minimum
 Channel Capture Effect:
 Node with recent successful transmission
may get biased advantage to channel access
7
CW:
8
CW:
16
CW:
8
CW:
32
CW:
16
Access
Channel
 Can be experienced in saturated networks
 In congested networks
 Collision occurs more frequently
 DCF uses binary exponential backoff
for collision avoidance
 Increase contention window (CW)
 Successful transmission resets the
CW to minimum
 Channel Capture Effect:
 Node with recent successful transmission
may get biased advantage to channel access
8
CW:
8
CW:
16
CW:
8
CW:
8
CW:
16
Access
Channel
 Can be experienced in saturated networks
 In congested networks
 Collision occurs more frequently
 DCF uses binary exponential backoff
for collision avoidance
 Increase contention window (CW)
 Successful transmission resets the
CW to minimum
 Channel Capture Effect:
 Node with recent successful transmission
may get biased advantage to channel access
9
CW:
8
CW:
16
CW:
8
CW:
8
CW:
8
Access
Channel
 Can be experienced in saturated networks
 In congested networks
 Collision occurs more frequently
 DCF uses binary exponential backoff
for collision avoidance
 Increase contention window (CW)
 Successful transmission resets the
CW to minimum
 Channel Capture Effect:
 Node with recent successful transmission
may get biased advantage to channel access
10
CW:
8
CW:
32
CW:
8
CW:
8
CW:
8
Access
Channel
 Provides inter packet backoff (IPB) delay between successive transmission
 Introduces a post-backoff stage
 Reduces contention among nodes and avoid channel capture
 Post-backoff stage window size: (0, W0-1)
 Doesn’t follow binary exponential increment
 Only applicable when the channel is busy and there are more packets in
queue
11
12
13
14
Idle state
Backoff State
Transmitting State
Binary exponential
Backoff
Post Backoff
State
State = (i, k) where, i = backoff state, k = backoff delay
q = prob. of at least one packet in node buffer
Pb = prob. of channel is busy
Pe = prob. of transmission error
Pcol = prob. of packet collision
Peq = Pe + Pcol - Pe Pcol = prob. of failed transmission
 Remain idle
 Idle to transition
 Random backoff
 decrease backoff
 Channel busy
 Successful transition,
no new packet
 failed transition,
increase CW
 Successful transition,
post-backoff
 Decrease post backoff
 Channel busy
 Last backoff stage 15
16
bi,k = Probability that a node occupies a given state {i,k} at any descrete time
17
τ = probability with which a node transmits a packet in a randomly
chosen slot time
18
Pe = Frame error probability
Pe = 1 – (success_in_PHY_layer)*(success_in_MAC_layer)
Pe = 1 – (1-PPHY_error) (1-PMAC_error)
PPHY_error = 1 – (1-Pb1)24x8 Pb1 = Physical layer bit error prop.
PLCP preamble and header = 24 bytes
PMAC_error = 1 – (1-Pb2)(28+MSDU)8 Pb2 = MAC layer bit error prop.
MAC header = 28 byte
MSDU = MAC Service Data Unit
19
Performance Analysis
Throughput
End to End Delay
20
Busy and collision probability, Pb & Pcol
τ = node transmitting probability
Ptr = Pb = 1 - prob. of no node transmitting
Ptr = 1 – (1- τ)n
Pcol = 1 - prob. of zero or one node transmitting
Pcol = 1 – prob. of no node transmitting – prob.
of one node transmitting
Pcol = Ptr – (1- τ)n-1
CAD outperforms particularly when the system contains large number of competing nodes.
When the number of nodes is 25, the reduction in collision probability is more than 10%
Fig. Nodes vs Collision Probability
21
s = fraction of time channel is used to transmit
payload bit successfully
s = system throughput
E[St] = per slot time
22
Fig. Throughput vs packet rate, λ when Pe = 10 − 1
Fig. Throughput vs nodes when Pe = 10 − 3 and λ = 50 Pkts/s
2-way
Handshaking
4-way
Handshaking
23
E[Nc] = number of collisions of a frame until its
successful reception
E[D] = End to end delay = mean frame delay
E[BD] = average backoff delay
E[x] = average no. of backoff req. to reach 0
E[S] = average time the counter stop while
listening to other node transmitting
E[Nfon] = average no. of time node detects
transmission from other node
End-to-end delay analysis under saturated load conditions
Fig. Nodes against end-to-end delay for various retries Fig. Nodes against end-to-end delay for various data
rates using RTS/CTS mechanism
24
End-to-end delay analysis in unsaturated load conditions
Fig. Nodes against end-to-end delay for different
packet arrival rates
25
Simulation Parameters
Fig. Simulation parameters using in different experiments
26
27
Thank You

More Related Content

Similar to Performance analysis of collision alleviating distributed coordination function protocol in congested wireless networks – a Markov chain analysis

Direct Link Lan
Direct Link LanDirect Link Lan
Direct Link Lanyanhul
 
High Performance Networking with Advanced TCP
High Performance Networking with Advanced TCPHigh Performance Networking with Advanced TCP
High Performance Networking with Advanced TCPDilum Bandara
 
LTE RACH Procedure
LTE RACH ProcedureLTE RACH Procedure
LTE RACH ProcedureAalekh Jain
 
DySCO: A DYnamic Spectrum and COntention Control Framework for Enhanced Broad...
DySCO: A DYnamic Spectrum and COntention Control Framework for Enhanced Broad...DySCO: A DYnamic Spectrum and COntention Control Framework for Enhanced Broad...
DySCO: A DYnamic Spectrum and COntention Control Framework for Enhanced Broad...Luca Bedogni
 
ExOR Multihop Routing in Wireless Networks
ExOR Multihop Routing in Wireless NetworksExOR Multihop Routing in Wireless Networks
ExOR Multihop Routing in Wireless NetworksYatindra shashi
 
KandR_TCP (1).ppt notes for congestion control
KandR_TCP (1).ppt    notes for congestion controlKandR_TCP (1).ppt    notes for congestion control
KandR_TCP (1).ppt notes for congestion controlGOKULKANNANMMECLECTC
 
Congestion control in TCP.pptx
Congestion control in TCP.pptxCongestion control in TCP.pptx
Congestion control in TCP.pptxkamalakantas
 
Mncs 16-08-3주-변승규-opportunistic flooding in low-duty-cycle wireless sensor ne...
Mncs 16-08-3주-변승규-opportunistic flooding in low-duty-cycle wireless sensor ne...Mncs 16-08-3주-변승규-opportunistic flooding in low-duty-cycle wireless sensor ne...
Mncs 16-08-3주-변승규-opportunistic flooding in low-duty-cycle wireless sensor ne...Seung-gyu Byeon
 
Flow Control (1).ppt
Flow Control (1).pptFlow Control (1).ppt
Flow Control (1).pptsarthakgithub
 
Tcp Congestion Avoidance
Tcp Congestion AvoidanceTcp Congestion Avoidance
Tcp Congestion AvoidanceRam Dutt Shukla
 
Computer network
Computer networkComputer network
Computer networkDeepikaT13
 
Mobile transport layer
 Mobile transport layer Mobile transport layer
Mobile transport layerSonaliAjankar
 
3a data link layer
3a data link layer 3a data link layer
3a data link layer kavish dani
 
Comparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
Comparison of TCP congestion control mechanisms Tahoe, Newreno and VegasComparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
Comparison of TCP congestion control mechanisms Tahoe, Newreno and VegasIOSR Journals
 
Comparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
Comparison of TCP congestion control mechanisms Tahoe, Newreno and VegasComparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
Comparison of TCP congestion control mechanisms Tahoe, Newreno and VegasIOSR Journals
 
Data and computer communication exam ll
Data and computer communication exam llData and computer communication exam ll
Data and computer communication exam llAndrew Ibrahim
 

Similar to Performance analysis of collision alleviating distributed coordination function protocol in congested wireless networks – a Markov chain analysis (20)

Direct Link Lan
Direct Link LanDirect Link Lan
Direct Link Lan
 
High Performance Networking with Advanced TCP
High Performance Networking with Advanced TCPHigh Performance Networking with Advanced TCP
High Performance Networking with Advanced TCP
 
LTE RACH Procedure
LTE RACH ProcedureLTE RACH Procedure
LTE RACH Procedure
 
DySCO: A DYnamic Spectrum and COntention Control Framework for Enhanced Broad...
DySCO: A DYnamic Spectrum and COntention Control Framework for Enhanced Broad...DySCO: A DYnamic Spectrum and COntention Control Framework for Enhanced Broad...
DySCO: A DYnamic Spectrum and COntention Control Framework for Enhanced Broad...
 
ExOR Multihop Routing in Wireless Networks
ExOR Multihop Routing in Wireless NetworksExOR Multihop Routing in Wireless Networks
ExOR Multihop Routing in Wireless Networks
 
HIGH SPEED NETWORKS
HIGH SPEED NETWORKSHIGH SPEED NETWORKS
HIGH SPEED NETWORKS
 
KandR_TCP (1).ppt notes for congestion control
KandR_TCP (1).ppt    notes for congestion controlKandR_TCP (1).ppt    notes for congestion control
KandR_TCP (1).ppt notes for congestion control
 
csma.pdf
csma.pdfcsma.pdf
csma.pdf
 
Congestion control in TCP.pptx
Congestion control in TCP.pptxCongestion control in TCP.pptx
Congestion control in TCP.pptx
 
Mncs 16-08-3주-변승규-opportunistic flooding in low-duty-cycle wireless sensor ne...
Mncs 16-08-3주-변승규-opportunistic flooding in low-duty-cycle wireless sensor ne...Mncs 16-08-3주-변승규-opportunistic flooding in low-duty-cycle wireless sensor ne...
Mncs 16-08-3주-변승규-opportunistic flooding in low-duty-cycle wireless sensor ne...
 
Flow Control (1).ppt
Flow Control (1).pptFlow Control (1).ppt
Flow Control (1).ppt
 
Tcp Congestion Avoidance
Tcp Congestion AvoidanceTcp Congestion Avoidance
Tcp Congestion Avoidance
 
Tcp congestion avoidance
Tcp congestion avoidanceTcp congestion avoidance
Tcp congestion avoidance
 
Computer network
Computer networkComputer network
Computer network
 
Mobile transport layer
 Mobile transport layer Mobile transport layer
Mobile transport layer
 
3a data link layer
3a data link layer 3a data link layer
3a data link layer
 
Comparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
Comparison of TCP congestion control mechanisms Tahoe, Newreno and VegasComparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
Comparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
 
Comparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
Comparison of TCP congestion control mechanisms Tahoe, Newreno and VegasComparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
Comparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
 
Data and computer communication exam ll
Data and computer communication exam llData and computer communication exam ll
Data and computer communication exam ll
 
Congestion control avoidance
Congestion control avoidanceCongestion control avoidance
Congestion control avoidance
 

More from MdAhasanulAlam

Time-Division Multiplexing Realizations of Multiple-Output Functions Based on...
Time-Division Multiplexing Realizations of Multiple-Output Functions Based on...Time-Division Multiplexing Realizations of Multiple-Output Functions Based on...
Time-Division Multiplexing Realizations of Multiple-Output Functions Based on...MdAhasanulAlam
 
Evaluating websites from a p public value perspective: a review of turkish lo...
Evaluating websites from a p public value perspective: a review of turkish lo...Evaluating websites from a p public value perspective: a review of turkish lo...
Evaluating websites from a p public value perspective: a review of turkish lo...MdAhasanulAlam
 
Improvement of id3 algorithm based on simplified information entropy and coor...
Improvement of id3 algorithm based on simplified information entropy and coor...Improvement of id3 algorithm based on simplified information entropy and coor...
Improvement of id3 algorithm based on simplified information entropy and coor...MdAhasanulAlam
 
Speeding Up Sub-Optimal MAPF Algorithms
Speeding Up Sub-Optimal MAPF AlgorithmsSpeeding Up Sub-Optimal MAPF Algorithms
Speeding Up Sub-Optimal MAPF AlgorithmsMdAhasanulAlam
 
How to-read-a-scientific-paper
How to-read-a-scientific-paperHow to-read-a-scientific-paper
How to-read-a-scientific-paperMdAhasanulAlam
 
Multi Agent Path Finding (MAPF)
Multi Agent Path Finding (MAPF)Multi Agent Path Finding (MAPF)
Multi Agent Path Finding (MAPF)MdAhasanulAlam
 
Traffic pattern analysis in Dhaka city
Traffic pattern analysis in  Dhaka cityTraffic pattern analysis in  Dhaka city
Traffic pattern analysis in Dhaka cityMdAhasanulAlam
 

More from MdAhasanulAlam (7)

Time-Division Multiplexing Realizations of Multiple-Output Functions Based on...
Time-Division Multiplexing Realizations of Multiple-Output Functions Based on...Time-Division Multiplexing Realizations of Multiple-Output Functions Based on...
Time-Division Multiplexing Realizations of Multiple-Output Functions Based on...
 
Evaluating websites from a p public value perspective: a review of turkish lo...
Evaluating websites from a p public value perspective: a review of turkish lo...Evaluating websites from a p public value perspective: a review of turkish lo...
Evaluating websites from a p public value perspective: a review of turkish lo...
 
Improvement of id3 algorithm based on simplified information entropy and coor...
Improvement of id3 algorithm based on simplified information entropy and coor...Improvement of id3 algorithm based on simplified information entropy and coor...
Improvement of id3 algorithm based on simplified information entropy and coor...
 
Speeding Up Sub-Optimal MAPF Algorithms
Speeding Up Sub-Optimal MAPF AlgorithmsSpeeding Up Sub-Optimal MAPF Algorithms
Speeding Up Sub-Optimal MAPF Algorithms
 
How to-read-a-scientific-paper
How to-read-a-scientific-paperHow to-read-a-scientific-paper
How to-read-a-scientific-paper
 
Multi Agent Path Finding (MAPF)
Multi Agent Path Finding (MAPF)Multi Agent Path Finding (MAPF)
Multi Agent Path Finding (MAPF)
 
Traffic pattern analysis in Dhaka city
Traffic pattern analysis in  Dhaka cityTraffic pattern analysis in  Dhaka city
Traffic pattern analysis in Dhaka city
 

Recently uploaded

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 

Recently uploaded (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 

Performance analysis of collision alleviating distributed coordination function protocol in congested wireless networks – a Markov chain analysis

  • 1. Presented By: Md. Ahasanul Alam Roll: 1301 Gottapu, Sasi Bhushana Rao, Madhavi Tatineni, and M. N. V. S. S. Kumar. IET networks 2.4 (2013): 204-213.
  • 2.  IEEE 802.11 lays down the architecture and specifications of wireless LANs (WLANs)  In IEEE 802.11, the basic medium access control (MAC) technique – Distributed Coordination Function (DCF)  Markov chain model is used to evaluate the performance of IEEE 802.11 DCF protocol  Based on some assumptions and simplification  Can not accurately predict performance in real network  This work  Propose a Collision Alleviating DCF (CAD) to enhance the performance in congested wireless network  Design a exact Markov chain model to evaluate and predict the performance of the protocol 2
  • 3.  MAC protocol based on IEEE 802.11  Employs a Carrier-Sense Multiple Access with Collision Avoidance (CSMA/CA) method with the binary exponential backoff algorithm  Data transfer  2-way handshaking  Data Packet is Acknowledged by Receiver  Acks are used to maintain reliability 3 Sender Receiver Data ACK  4-way handshaking  First, reserve the channel by Request-to-Send (RTS) and Clear-to-Send (CTS)  Then Follow 2-way data transfer Sender Receiver Data ACK RTS CTS
  • 5.  Can be experienced in saturated networks  In congested networks  Collision occurs more frequently  DCF uses binary exponential backoff for collision avoidance  Increase contention window (CW)  Successful transmission resets the CW to minimum  Channel Capture Effect:  Node with recent successful transmission may get biased advantage to channel access 5 CW: 16 CW: 16 CW: 8 CW: 32 CW: 16 Access Channel
  • 6.  Can be experienced in saturated networks  In congested networks  Collision occurs more frequently  DCF uses binary exponential backoff for collision avoidance  Increase contention window (CW)  Successful transmission resets the CW to minimum  Channel Capture Effect:  Node with recent successful transmission may get biased advantage to channel access 6 CW: 16 CW: 16 CW: 8 CW: 32 CW: 16 Access Channel
  • 7.  Can be experienced in saturated networks  In congested networks  Collision occurs more frequently  DCF uses binary exponential backoff for collision avoidance  Increase contention window (CW)  Successful transmission resets the CW to minimum  Channel Capture Effect:  Node with recent successful transmission may get biased advantage to channel access 7 CW: 8 CW: 16 CW: 8 CW: 32 CW: 16 Access Channel
  • 8.  Can be experienced in saturated networks  In congested networks  Collision occurs more frequently  DCF uses binary exponential backoff for collision avoidance  Increase contention window (CW)  Successful transmission resets the CW to minimum  Channel Capture Effect:  Node with recent successful transmission may get biased advantage to channel access 8 CW: 8 CW: 16 CW: 8 CW: 8 CW: 16 Access Channel
  • 9.  Can be experienced in saturated networks  In congested networks  Collision occurs more frequently  DCF uses binary exponential backoff for collision avoidance  Increase contention window (CW)  Successful transmission resets the CW to minimum  Channel Capture Effect:  Node with recent successful transmission may get biased advantage to channel access 9 CW: 8 CW: 16 CW: 8 CW: 8 CW: 8 Access Channel
  • 10.  Can be experienced in saturated networks  In congested networks  Collision occurs more frequently  DCF uses binary exponential backoff for collision avoidance  Increase contention window (CW)  Successful transmission resets the CW to minimum  Channel Capture Effect:  Node with recent successful transmission may get biased advantage to channel access 10 CW: 8 CW: 32 CW: 8 CW: 8 CW: 8 Access Channel
  • 11.  Provides inter packet backoff (IPB) delay between successive transmission  Introduces a post-backoff stage  Reduces contention among nodes and avoid channel capture  Post-backoff stage window size: (0, W0-1)  Doesn’t follow binary exponential increment  Only applicable when the channel is busy and there are more packets in queue 11
  • 12. 12
  • 13. 13
  • 14. 14 Idle state Backoff State Transmitting State Binary exponential Backoff Post Backoff State
  • 15. State = (i, k) where, i = backoff state, k = backoff delay q = prob. of at least one packet in node buffer Pb = prob. of channel is busy Pe = prob. of transmission error Pcol = prob. of packet collision Peq = Pe + Pcol - Pe Pcol = prob. of failed transmission  Remain idle  Idle to transition  Random backoff  decrease backoff  Channel busy  Successful transition, no new packet  failed transition, increase CW  Successful transition, post-backoff  Decrease post backoff  Channel busy  Last backoff stage 15
  • 16. 16 bi,k = Probability that a node occupies a given state {i,k} at any descrete time
  • 17. 17 τ = probability with which a node transmits a packet in a randomly chosen slot time
  • 18. 18 Pe = Frame error probability Pe = 1 – (success_in_PHY_layer)*(success_in_MAC_layer) Pe = 1 – (1-PPHY_error) (1-PMAC_error) PPHY_error = 1 – (1-Pb1)24x8 Pb1 = Physical layer bit error prop. PLCP preamble and header = 24 bytes PMAC_error = 1 – (1-Pb2)(28+MSDU)8 Pb2 = MAC layer bit error prop. MAC header = 28 byte MSDU = MAC Service Data Unit
  • 20. 20 Busy and collision probability, Pb & Pcol τ = node transmitting probability Ptr = Pb = 1 - prob. of no node transmitting Ptr = 1 – (1- τ)n Pcol = 1 - prob. of zero or one node transmitting Pcol = 1 – prob. of no node transmitting – prob. of one node transmitting Pcol = Ptr – (1- τ)n-1 CAD outperforms particularly when the system contains large number of competing nodes. When the number of nodes is 25, the reduction in collision probability is more than 10% Fig. Nodes vs Collision Probability
  • 21. 21 s = fraction of time channel is used to transmit payload bit successfully s = system throughput E[St] = per slot time
  • 22. 22 Fig. Throughput vs packet rate, λ when Pe = 10 − 1 Fig. Throughput vs nodes when Pe = 10 − 3 and λ = 50 Pkts/s 2-way Handshaking 4-way Handshaking
  • 23. 23 E[Nc] = number of collisions of a frame until its successful reception E[D] = End to end delay = mean frame delay E[BD] = average backoff delay E[x] = average no. of backoff req. to reach 0 E[S] = average time the counter stop while listening to other node transmitting E[Nfon] = average no. of time node detects transmission from other node
  • 24. End-to-end delay analysis under saturated load conditions Fig. Nodes against end-to-end delay for various retries Fig. Nodes against end-to-end delay for various data rates using RTS/CTS mechanism 24
  • 25. End-to-end delay analysis in unsaturated load conditions Fig. Nodes against end-to-end delay for different packet arrival rates 25
  • 26. Simulation Parameters Fig. Simulation parameters using in different experiments 26