SlideShare a Scribd company logo
1 of 9
Download to read offline
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 6, December 2015
DOI : 10.5121/ijwmn.2015.7605 45
IMPROVING PERFORMANCE OF IEEE 802.11 BY A
DYNAMIC CONTROL BACKOFF ALGORITHM UNDER
UNSATURATED TRAFFIC LOADS
Hatm Alkadeki, Xingang Wang and Michael Odetayo
Department of Computing, Coventry University, Coventry, UK
ABSTRACT
The IEEE 802.11 backoff algorithm is very important for controlling system throughput over contention-
based wireless networks. For this reason, there are many studies on wireless network performance focus on
developing backoff algorithms. However, most existing models are based on saturated traffic loads, which
are not a real representation of actual network conditions. In this paper, a dynamic control backoff time
algorithm is proposed to enhance both delay and throughput performance of the IEEE 802.11 distributed
coordination function. This algorithm considers the distinction between high and low traffic loads in order
to deal with unsaturated traffic load conditions. In particular, the equilibrium point analysis model is used
to represent the algorithm under various traffic load conditions. Results of extensive simulation
experiments illustrate that the proposed algorithm yields better performance throughput and a better
average transmission packet delay than related algorithms.
KEYWORDS
IEEE 802.11, Backoff algorithm, Contention window threshold, Equilibrium point analysis, Dynamic
control backoff time algorithm
1. INTRODUCTION
Use of wireless local area networks (WLANs) is ubiquitous. IEEE 802.11 is the most important
standard in WLANs; however, achieving acceptable quality of service (QoS) over the standard is
still a challenging task. The IEEE 802.11 standard provides a basic medium access control
(MAC) mechanism called the distributed coordination function (DCF) [1]. The DCF is based on
the carrier sense multiple access with collision avoidance (CSMA/CA) mechanism with binary
exponential backoff (BEB) algorithm to reduce the probability of collisions. The BEB algorithm
is implemented by doubling the backoff time after every unsuccessful transmission. The backoff
time is called the contention window (CW), which is bounded by CWmax. However, the CW is
reset to zero after every successful transmission with the backoff counter in the interval (0, CWi
−1) [2]. Furthermore, the collision probability eventually leads to an unsuccessful transmission,
which decreases throughput. Therefore, improving the backoff algorithm will help to enhance
throughput performance and reduce the transmission delay. In this paper, we propose a new
backoff algorithm that applies the distinction between low and high traffic loads over non-
saturated traffic load conditions. We also evaluate the performance of the proposed algorithm in
terms of throughput and delay.
The remainder of this paper is organized as follows. Section 2 discusses and evaluates related
work, while Section 3 presents the proposed algorithm. Section 4 evaluates the performance of
the proposed algorithm and compares the results with those of existing works. Section 5 presents
our conclusion.
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 6, December 2015
46
2. RELATED WORK
As mentioned above, the backoff algorithm for IEEE 802.11 is very important for controlling
channel access to maximize throughput and fairness [3]. There are several methods for extending
or proposing backoff algorithms. Most of these are based on modifying the backoff parameters
such as CW size and backoff stage (m), which is why much research has focused on modifying
the CW size during execution of the backoff algorithm to improve the performance of the IEEE
802.11 DCF. Therefore, an appropriate CW size leads to an improvement in the system
throughput by reducing the probability of collisions. However, some of the methods do not
account for dynamic traffic loads. For example, the authors in [4], proposed a new backoff
algorithm, called the multiplicative increase and linear decrease (MILD) algorithm. Their work
focused on modifying the CW size to CW×1.5 rather than doubling it after every unsuccessful
transmission. Moreover, CW size is decremented by 1 after every successful transmission rather
than reset to 0. However, decreasing the CW size gradually helps avoid any degradation in
performance. Therefore, the MILD algorithm is better than the BEB algorithm over large
networks. The authors in [5], extended the MILD algorithm by creating a new algorithm called
the linear increase linear decrease (LILD) algorithm. However, the authors applied CW+CWmin as
the size of increasing CW rather than multiplying by 1.5 to avoid the problem of slow linear
change over unsuccessful transmission. Therefore, the LILD algorithm provides good quality
performance over large networks. In another study [6], the authors proposed a new backoff
algorithm, called the exponential increase exponential decrease (EIED) algorithm. This algorithm
is based on increasing and decreasing the CW size exponentially. In [7], the authors proposed a
new algorithm called the double increment double decrement (DIDD) algorithm. This algorithm
is based on doubling the CW size after every unsuccessful transmission, in the same way as the
BEB algorithm, but using CW/2 as the size of decreasing CW after every successful transmission.
The DIDD algorithm generates a better result than the other algorithms mentioned above. In
addition, improving the BEB algorithm is still an active research topic. Therefore, [8] recently
evaluated the performance of BEB as a poor algorithm due to a number of collisions and CW
restoration after every successful transmission. This study is devoted to improve collision
avoidance under saturated traffic loads.
However, the above algorithms do not consider dynamic traffic loads. There are other interesting
directions that can be taken. For example, according to the research in [9], the authors focused on
channel traffic loads, and proposed a new algorithm called the exponential linear backoff
algorithm (ELBA). ELBA combines both exponential and linear algorithms depending on traffic
loads and provides better system throughput than the BEB, EIED, and LILD algorithms. In [10],
the authors used pause count backoff for monitoring channel traffic loads. This algorithm aims to
set an appropriate CW size based on estimation results. The authors in [11], proposed an adaptive
backoff algorithm based on the trade-off of efficiency and fairness for ad hoc networks. This
work is based on a fair schedule to control the increase and decrease in CW size depending on the
channel situation (idle or busy). In [12], the authors considered dynamic traffic loads by
proposing an algorithm based on monitoring the channel before data transmission. In this
algorithm, each station can record the number of busy slots by opening an observation window.
Thus, the sender can calculate a dynamic priority and CW size according to the number of
successful transmissions. In [13], the authors monitored the channel traffic loads by using a
channel state (CS) vector, and proposed a new algorithm called the dynamic deterministic
contention window control algorithm (DDCWC). This algorithm is based on monitoring the
channel traffic load conditions by checking the CS. However, selecting the optimum CW size
based on different traffic load conditions using the CS vector is difficult.
Overall, the majority of research work has paid great attention to improving the performance of a
saturated system without accounting for non-saturated traffic load conditions. Therefore, creating
a new backoff algorithm under non-saturated traffic load conditions is the objective of this paper.
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 6, December 2015
47
3. BACKOFF STRATEGY
In this section, the proposed algorithm is discussed in detail. The discussion starts by describing
the principle behind the proposed algorithm in terms of mechanism and traffic load conditions.
3.1 Principle of the Proposed Algorithm
As mentioned in Section 2, most existing algorithms do not consider traffic loads under non-
saturated conditions, and thus do not take into account practical network operation. In this
section, a new backoff algorithm is proposed, called the dynamic control backoff time algorithm
(DCBTA). The DCBTA is implemented under non-saturated traffic loads using the equilibrium
point analysis (EPA) model [14]. The EPA model provides a very convenient way of evaluating
system performance under non-saturated traffic loads, thereby enabling the presentation of the
DCBTA under more flexible traffic sources. Furthermore, it is possible to investigate network
traffic load conditions under a different number of stations.
In the DCBTA, channel conditions are checked by a CW threshold (CWThreshold). The CWThreshold
value serves as a reference point for the collision rate. Therefore, CWThreshold plays a major role in
the proposed algorithm as illustrated in Figure 1. The CWThreshold size is dependent on the
maximum contention window size (CWmax), where the value of CWThreshold is equal to half that of
CWmax. For example, the value of CWmax in [14] was selected to be 1024. In this case, the value of
CWThreshold is set to 512. Each state of node “i” is initially set to the minimum CW size (CWmin),
which can be increased up to CWmax.
Figure 1. Underlying mechanism of the proposed algorithm (DCBTA)
Figure 1 shows that the proposed algorithm enables the detection of heavy or light traffic load
using the CWThreshold value. After every unsuccessful transmission, if the CW size is smaller than
the CWThreshold value, that is, a light traffic load, the CW size is doubled as (2×CW) similar to the
BEB algorithm. Conversely, if the CW size is greater than CWThreshold, that is, a heavy traffic load,
the CW size is doubled and incremented by two as (2×CW+2). Adding two to double the CW size
leads to a decrease in the collision probability, thus increasing system throughput. A summary of
this discussion is given below:
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 6, December 2015
48
Light traffic load:
If (CWi ≤ CWThreshold)
Successful transmission: CWi = CWi−1−1;
Else (CWi = CWi−1×2).
Heavy traffic load:
If (CWi > CWThreshold)
Successful transmission: CWi = CWi−1−2;
Else (CWi = CWi−1×2+2).
3.2 DCBTA Algorithm under EPA Model
In order to run the proposed algorithm under non-saturated traffic load conditions, the EPA model
is used. The EPA model provides a very convenient way to evaluate the system performance
under non-saturated traffic load conditions. In the EPA model, the traffic load generated by each
station follows the Poisson distribution with rate time/packets. Thus, the packet transmission
probability (R) plays a pivotal role in the EPA model mechanism. However, the proposed
algorithm adaptively changes the CW size with respect to the collision rate or the transmitting
nodes. Therefore, the proposed algorithm under the EPA model affects the transmission
probability of node “Ri” at any state of node “i” as follows:
In networks with a large number of nodes or a high collision rate, the proposed algorithm results
in a very low probability of transmission. In this case, the CW size increases to more than the
threshold, resulting in a high traffic load. The throughput formula is the same, where Ri is
calculated as follows:
Otherwise, the value of CWi decreases to less than or equal to the threshold value, resulting in a
low traffic load. Then Ri is calculated in the same way as the BEB algorithm under the EPA
model. In the case of successful transmission, the CWi size decreases gradually to avoid
performance degradation. However, if the CWi size is less than or equal to CWThreshold, the CW
size for the next stage CWi+1 is decremented by one:
If CWi is greater than CWThreshold, CWi+1 is decremented by two:
4. PERFORMANCE EVALUATION
In this section, the proposed backoff algorithm is compared with related algorithms in terms of
throughput and average packet transmission delay. The comparative evaluation of backoff
algorithms is carried out using MATLAB simulation experiments.
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 6, December 2015
49
4.1 Simulation Settings
The proposed and related algorithms are implemented based on the EPA model assumption in
[14]. Therefore, there are no hidden terminals and system performance can be investigated under
more flexible traffic sources with fixed packet length. The different system parameters used in the
simulation experiments are summarised in Table 1.
Table 1. System parameter settings
4.2 Comparison of Throughput
System performance of the proposed algorithm (DCBTA) is compared with that of the BEB
algorithm under non-saturated traffic load conditions in the work of [14]. In addition, the
performance of DCBTA is compared with other related algorithms, such as ELBA in the work of
[9]. ELBA combines both exponential and linear algorithms, which is why it was selected for
comparison with the proposed algorithm. The number of nodes is set to 50; the maximum number
of backoff stages equals six. Figure 2 illustrates the throughput performance for DCBTA
compared with the BEB algorithm and ELBA under various traffic load conditions. The results
show that the throughput performance of DCBTA is better than that of the BEB algorithm and
ELBA under various traffic loads.
Figure 2. Non-saturated throughput comparison of the proposed algorithm and various related backoff
algorithms, where (CWmin = 8, m = 6)
Parameter Value
Packet Payload 8184 bits
Data Packet 8200 µs
Channel Bit Rate 1 Mbit/s
Physical Slot Time 50 µs
DIFS 128 µs
SIFS 28 µs
ACK_Timeout 300 µs
RTS 350 µs
CTS 350 µs
CWmin 8
CWmax 1024
Maximum Backoff Stage, m 6
Network Nodes (n) 50-100 nodes
Analytical Tool EPA model
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 6, December 2015
50
To investigate the impact of using different CWmin size, Figure 3 plots the throughput
performance for DCBTA, BEB, and ELBA with a varying size of 8, 16, and 32 CWmin. The
throughput increases when CWmin increases, since increasing CWmin contributes to collision
avoidance. Moreover, system throughput depends on the incoming data [15]. Therefore, the
throughput result is equal to the increase in the incoming traffic data rates if the traffic load is
low. Otherwise, throughput becomes saturated if the amount of data is sufficiently high. Hence,
the system performance strongly depends on system parameters, such as CWmin and m.
Figure 3 clearly shows that DCBTA provides better throughput results than BEB and ELBA with
different CWmin size under various offered loads. The DCBTA allows the stations to adjust CW
value appropriately according to the traffic load variation within the network. This means that the
DCBTA mechanism can reduce the number of collisions, which will lead to increased system
throughput. In addition, the performance results show that DCBTA has lower performance
degradation than BEB and ELBA. The reason for this is that the CW size decreases gradually
after every successful transmission.
Figure 3. Non-saturated throughput comparison of the proposed algorithm and various related backoff
algorithms with varying CWmin (8, 16, 32) and m = 6
4.3 Comparison of Delay
In [14], the EPA model represented the MAC channel in idle, transmission, and collision states
under varying traffic load conditions. The MAC channel was proposed as a multi-dimensional
discrete-time Markov chain analysis model. Therefore, the delay can be represented as a sequence
of discrete time delays as follows:
Average transmission delay = Total delay / Total number of transmissions,
where:
Total delay = Total transmission time + Total time delay in the collision + Backoff time + Empty
slot.
Total transmission time = Transmission time of single packet × Total number of transmissions.
Transmission time of single packet = RTS + SIFS + CTS + SIFS + Data + SIFS + ACK + DIFS.
Total time delay in the collision = Delay time of single collision × Total number of collisions.
Delay of single collision = RTS + DIFS.
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 6, December 2015
51
Average packet transmission delays for the BEB algorithm, ELBA, and DCBTA are calculated
over 100 stationary nodes. For further investigation, the performance of algorithms is also
examined under different CWmin values of 32, 64, and 128. All the assumptions and system
parameters related to this experiment are the same as in the previous section. Figure 4, Figure 5,
and Figure 6 show the delay comparison of the BEB, ELBA, and DCBTA algorithms under the
EPA unsaturated model. The increment in CW size in the BEB and ELBA algorithms results in
greater delay compared to that of the DCBTA algorithm. This means that the DCBTA mechanism
produces a small delay by reducing a collision rate. Actually, when there is a high offered traffic
load, the CW size should be kept large to avoid frequent collision. Moreover, DCBTA reduces
CW size more slowly after successful transmission in order to avoid the collision probability. For
these reasons, it can clearly be seen that the proposed algorithm has a smaller average
transmission delay than that of the BEB and ELBA algorithms, as shown in the figures below.
Figure 4. Average packet transmission delay with CWmin = 32, m = 6
Figure 5. Average packet transmission delay with CWmin = 64, m = 6
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 6, December 2015
52
Figure 6. Average packet transmission delay with CWmin = 128, m = 6
5. CONCLUSION
In this paper, a new backoff algorithm under non-saturated traffic loads was proposed to represent
actual network situations. A suitable model was selected to evaluate system performance under
non-saturated traffic loads such as the EPA model.
The motivation for this research was to enhance the system performance of the IEEE 802.11 DCF
under non-saturated traffic load conditions in terms of throughput and time delay. To realize this,
a new backoff algorithm was proposed and then integrated with the EPA model.
The performance results show that the proposed algorithm (DCBTA) presents better system
throughput than the BEB algorithm and ELBA. In addition, calculation of the average packet
transmission delay for each algorithm shows that the DCBTA provides a better time delay than
the BEB algorithm and ELBA. This is because the DCBTA decreases the time delay, which leads
to an increase in system throughput. However, throughput and delay are both relevant for the
performance metrics of QoS. Therefore, the proposed algorithm may help to enhance the
effectiveness of the IEEE 802.11 DCF. A possible further extension of the DCBTA would be to
consider the various data frame sizes.
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 6, December 2015
53
REFERENCES
[1] Bianchi, G. (2000) “Performance analysis of the IEEE 802.11 distributed coordination function”,
IEEE Journal on Selected Areas in Communications, 18(3), 535-547.
[2] Gangrade, K., Patidar, P. & Tiwari, A. (2013). “Performance Evaluation of IEEE 802.11 MAC DCF
Using Various Schemes Towards : Throughput, Delay and Reliability”, International Journal of
Advanced Research in Computer and Communication Engineering 2 (7), 2731–2737.
[3] Cho, J.W. & Jiang, Y. (2015). “Fundamentals of the Backoff Process in 802.11 : Dichotomy of the
Aggregation”, IEEE Transactions on Information Theory 61 (4), 1687–1701.
[4] Bharghavan, V., Demers, A., Shenker, S. & Zhang, L. (1994). “MACAW: a media access protocol for
wireless LAN’s”, SIGCOMM ’94 Proceedings of the Conference on Communications Architectures,
Protocols and Applications, 24(4), 212-225.
[5] Deng, J., Varshney, PK. & Haas, ZJ. (2004). “A new backoff algorithm for the IEEE 802.11
distributed coordination function”, Proceedings of CNDS, 4, 18-21.
[6] Song, N., Kwak, B., Song, J. & Miller, ME. (2003). “Enhancement of IEEE 802.11 distributed
coordination function with exponential increase exponential decrease backoff algorithm”, The 57th
IEEE Semiannual Spring VTC, 4, 2775-2778.
[7] Chatzimisios, P., Boucouvalas, AC., Vitsas, V., Vafiadis, A., Economidis, A. & Huang, P. (2005). “A
simple and effective backoff algorithm for the IEEE 802.11 MAC protocol”, Proceedings of the
International Conference on Cybernetics and Information Technologies, System and 2nd
Applications, 1, 48-53.
[8] Cheng, H., Yan, X., Lian, H., Weng, L., Zhang, Q. & Feng, Z. (2014). “A novel collision avoidance
algorithm for IEEE 802.11 wireless LANs”, IEEE Military Communications Conference (MILCOM),
879–884.
[9] Lin, CH., Shieh, CK., Hwang, WS. & Ke, CH. (2008). “An exponential-linear backoff algorithm for
contention-based wireless networks”, Proceedings of the International Conference on Mobile
Technology, Applications and Systems, 42.
[10] Liang, HM., Zeadally, S., Chilamkurti, N. & Shieh, CK. (2008). “A novel pause count backoff
algorithm for channel access in IEEE 802.11 based wireless LANs”, International Sympsium on
Computer Science and Its Applications, 8, 163-168.
[11] Cui, H.X. & Wei, G. (2009). “A novel backoff algorithm based on the tradeoff of efficiency and
Fairness for ad hoc networks”, International Conference on Communications and Mobile Computing,
02, 82-86.
[12] Jingqi, F., Qiang, Z. & Haikuan, W. (2009). “A new backoff algorithm based on the dynamic
modulating parameters of IEEE 802.11”, WICOM ‘9 Proceedings of the 5th International Conference
on Wireless Communications, Networking and Mobile Computing, 1, 4-7.
[13] Balador, A., Movaghar, A., Jabbehdari, S. & Kanellopoulos, D. (2012). “A novel contention window
control scheme for IEEE 802.11 WLANs”, IETE Technical Review, 29, 202-212.
[14] Wang, X., Min, G. & Guan, L. (2009). “Performance modelling of IEEE 802.11 DCF using
equilibrium point analysis”, International Journal of Wireless and Mobile Computing, 3(3), 201-209.
[15] Alam, M., Mumtaz, S., Saghezchi, F.B., Radwan, A. & Rodriguez, J. (2013). “Energy and throughput
analysis of reservation protocols of Wi media MAC”, Journal of Green Engineering, 3, 363–382.

More Related Content

What's hot

OPTIMIZATION OF IP NETWORKS IN VARIOUS HYBRID IGP/MPLS ROUTING SCHEMES
OPTIMIZATION OF IP NETWORKS IN VARIOUS HYBRID IGP/MPLS ROUTING SCHEMESOPTIMIZATION OF IP NETWORKS IN VARIOUS HYBRID IGP/MPLS ROUTING SCHEMES
OPTIMIZATION OF IP NETWORKS IN VARIOUS HYBRID IGP/MPLS ROUTING SCHEMESEM Legacy
 
FEAS_Poster_2016_WNCS_Tina
FEAS_Poster_2016_WNCS_TinaFEAS_Poster_2016_WNCS_Tina
FEAS_Poster_2016_WNCS_TinaTina Mirfakhraie
 
Paper id 37201517
Paper id 37201517Paper id 37201517
Paper id 37201517IJRAT
 
ENHANCING COMPUTATIONAL EFFORTS WITH CONSIDERATION OF PROBABILISTIC AVAILABL...
ENHANCING COMPUTATIONAL EFFORTS WITH CONSIDERATION OF  PROBABILISTIC AVAILABL...ENHANCING COMPUTATIONAL EFFORTS WITH CONSIDERATION OF  PROBABILISTIC AVAILABL...
ENHANCING COMPUTATIONAL EFFORTS WITH CONSIDERATION OF PROBABILISTIC AVAILABL...Raja Larik
 
Vtc conf presentation - cdt website
Vtc conf presentation - cdt websiteVtc conf presentation - cdt website
Vtc conf presentation - cdt websiteimad Al-Samman
 
Analysis and Evolution of AQM Algortihms
Analysis and Evolution of AQM AlgortihmsAnalysis and Evolution of AQM Algortihms
Analysis and Evolution of AQM AlgortihmsSiddharth Nawani
 
High Speed and Area Efficient Booth Multiplier Using SQRT CSLA with Zero Find...
High Speed and Area Efficient Booth Multiplier Using SQRT CSLA with Zero Find...High Speed and Area Efficient Booth Multiplier Using SQRT CSLA with Zero Find...
High Speed and Area Efficient Booth Multiplier Using SQRT CSLA with Zero Find...IJERA Editor
 
sky x ppt ankur
sky x ppt ankursky x ppt ankur
sky x ppt ankurAnkur Yogi
 
An efficient list decoder architecture for polar codes
An efficient list decoder architecture for polar codesAn efficient list decoder architecture for polar codes
An efficient list decoder architecture for polar codesjpstudcorner
 
Report on the sky x technology.
Report on the sky x technology.Report on the sky x technology.
Report on the sky x technology.Udirmaan Deka
 
Adjustment Delay Scheme to Improve Performance IEEE 802.15.4 Networks
Adjustment Delay Scheme to Improve Performance IEEE 802.15.4 NetworksAdjustment Delay Scheme to Improve Performance IEEE 802.15.4 Networks
Adjustment Delay Scheme to Improve Performance IEEE 802.15.4 NetworksTELKOMNIKA JOURNAL
 
Modified montgomery modular multiplier for cryptosystems
Modified montgomery modular multiplier for cryptosystemsModified montgomery modular multiplier for cryptosystems
Modified montgomery modular multiplier for cryptosystemsIAEME Publication
 
Equity-Based free channels assignment for secondary users in a cognitive radi...
Equity-Based free channels assignment for secondary users in a cognitive radi...Equity-Based free channels assignment for secondary users in a cognitive radi...
Equity-Based free channels assignment for secondary users in a cognitive radi...IJECEIAES
 
Low cost high-performance vlsi architecture for montgomery modular multiplica...
Low cost high-performance vlsi architecture for montgomery modular multiplica...Low cost high-performance vlsi architecture for montgomery modular multiplica...
Low cost high-performance vlsi architecture for montgomery modular multiplica...jpstudcorner
 
Proportional-integral genetic algorithm controller for stability of TCP network
Proportional-integral genetic algorithm controller for stability of TCP network Proportional-integral genetic algorithm controller for stability of TCP network
Proportional-integral genetic algorithm controller for stability of TCP network IJECEIAES
 

What's hot (19)

OPTIMIZATION OF IP NETWORKS IN VARIOUS HYBRID IGP/MPLS ROUTING SCHEMES
OPTIMIZATION OF IP NETWORKS IN VARIOUS HYBRID IGP/MPLS ROUTING SCHEMESOPTIMIZATION OF IP NETWORKS IN VARIOUS HYBRID IGP/MPLS ROUTING SCHEMES
OPTIMIZATION OF IP NETWORKS IN VARIOUS HYBRID IGP/MPLS ROUTING SCHEMES
 
FEAS_Poster_2016_WNCS_Tina
FEAS_Poster_2016_WNCS_TinaFEAS_Poster_2016_WNCS_Tina
FEAS_Poster_2016_WNCS_Tina
 
Paper id 37201517
Paper id 37201517Paper id 37201517
Paper id 37201517
 
ENHANCING COMPUTATIONAL EFFORTS WITH CONSIDERATION OF PROBABILISTIC AVAILABL...
ENHANCING COMPUTATIONAL EFFORTS WITH CONSIDERATION OF  PROBABILISTIC AVAILABL...ENHANCING COMPUTATIONAL EFFORTS WITH CONSIDERATION OF  PROBABILISTIC AVAILABL...
ENHANCING COMPUTATIONAL EFFORTS WITH CONSIDERATION OF PROBABILISTIC AVAILABL...
 
Vtc conf presentation - cdt website
Vtc conf presentation - cdt websiteVtc conf presentation - cdt website
Vtc conf presentation - cdt website
 
Analysis and Evolution of AQM Algortihms
Analysis and Evolution of AQM AlgortihmsAnalysis and Evolution of AQM Algortihms
Analysis and Evolution of AQM Algortihms
 
Sky X Tech Report
Sky X Tech ReportSky X Tech Report
Sky X Tech Report
 
High Speed and Area Efficient Booth Multiplier Using SQRT CSLA with Zero Find...
High Speed and Area Efficient Booth Multiplier Using SQRT CSLA with Zero Find...High Speed and Area Efficient Booth Multiplier Using SQRT CSLA with Zero Find...
High Speed and Area Efficient Booth Multiplier Using SQRT CSLA with Zero Find...
 
sky x ppt ankur
sky x ppt ankursky x ppt ankur
sky x ppt ankur
 
An efficient list decoder architecture for polar codes
An efficient list decoder architecture for polar codesAn efficient list decoder architecture for polar codes
An efficient list decoder architecture for polar codes
 
Report on the sky x technology.
Report on the sky x technology.Report on the sky x technology.
Report on the sky x technology.
 
Adjustment Delay Scheme to Improve Performance IEEE 802.15.4 Networks
Adjustment Delay Scheme to Improve Performance IEEE 802.15.4 NetworksAdjustment Delay Scheme to Improve Performance IEEE 802.15.4 Networks
Adjustment Delay Scheme to Improve Performance IEEE 802.15.4 Networks
 
Modified montgomery modular multiplier for cryptosystems
Modified montgomery modular multiplier for cryptosystemsModified montgomery modular multiplier for cryptosystems
Modified montgomery modular multiplier for cryptosystems
 
Equity-Based free channels assignment for secondary users in a cognitive radi...
Equity-Based free channels assignment for secondary users in a cognitive radi...Equity-Based free channels assignment for secondary users in a cognitive radi...
Equity-Based free channels assignment for secondary users in a cognitive radi...
 
Low cost high-performance vlsi architecture for montgomery modular multiplica...
Low cost high-performance vlsi architecture for montgomery modular multiplica...Low cost high-performance vlsi architecture for montgomery modular multiplica...
Low cost high-performance vlsi architecture for montgomery modular multiplica...
 
Proportional-integral genetic algorithm controller for stability of TCP network
Proportional-integral genetic algorithm controller for stability of TCP network Proportional-integral genetic algorithm controller for stability of TCP network
Proportional-integral genetic algorithm controller for stability of TCP network
 
Sky x technology
Sky x technologySky x technology
Sky x technology
 
Adaptive dynamic programing based optimal control for a robot manipulator
Adaptive dynamic programing based optimal control for a robot manipulatorAdaptive dynamic programing based optimal control for a robot manipulator
Adaptive dynamic programing based optimal control for a robot manipulator
 
Sky x technology
Sky x technologySky x technology
Sky x technology
 

Viewers also liked

O dsr optimized dsr routing
O dsr optimized dsr routingO dsr optimized dsr routing
O dsr optimized dsr routingijwmn
 
Elgamal signature for content distribution with network coding
Elgamal signature for content distribution with network codingElgamal signature for content distribution with network coding
Elgamal signature for content distribution with network codingijwmn
 
Spatial multiplexing ofdmoqam systems with time reversal technique
Spatial multiplexing ofdmoqam systems with time reversal techniqueSpatial multiplexing ofdmoqam systems with time reversal technique
Spatial multiplexing ofdmoqam systems with time reversal techniqueijwmn
 
Zigbee based wearable remote healthcare monitoring system for elderly patients
Zigbee based wearable remote healthcare monitoring system for elderly patientsZigbee based wearable remote healthcare monitoring system for elderly patients
Zigbee based wearable remote healthcare monitoring system for elderly patientsijwmn
 
An educational bluetooth quizzing application in android
An educational bluetooth quizzing application in androidAn educational bluetooth quizzing application in android
An educational bluetooth quizzing application in androidijwmn
 
Opportunistic and playback sensitive scheduling for video streaming
Opportunistic and playback sensitive scheduling for video streamingOpportunistic and playback sensitive scheduling for video streaming
Opportunistic and playback sensitive scheduling for video streamingijwmn
 
Performance analysis of fls, exp, log and
Performance analysis of fls, exp, log andPerformance analysis of fls, exp, log and
Performance analysis of fls, exp, log andijwmn
 
COMP-JT WITH DYNAMIC CELL SELECTION, GLOBAL PRECODING MATRIX AND IRC RECEIVER...
COMP-JT WITH DYNAMIC CELL SELECTION, GLOBAL PRECODING MATRIX AND IRC RECEIVER...COMP-JT WITH DYNAMIC CELL SELECTION, GLOBAL PRECODING MATRIX AND IRC RECEIVER...
COMP-JT WITH DYNAMIC CELL SELECTION, GLOBAL PRECODING MATRIX AND IRC RECEIVER...ijwmn
 
Sinr, rsrp, rssi and rsrq
Sinr, rsrp, rssi and rsrqSinr, rsrp, rssi and rsrq
Sinr, rsrp, rssi and rsrqijwmn
 
Advanced antenna techniques and high order sectorization with novel network t...
Advanced antenna techniques and high order sectorization with novel network t...Advanced antenna techniques and high order sectorization with novel network t...
Advanced antenna techniques and high order sectorization with novel network t...ijwmn
 
Mobile elements scheduling for periodic sensor applications
Mobile elements scheduling for periodic sensor applicationsMobile elements scheduling for periodic sensor applications
Mobile elements scheduling for periodic sensor applicationsijwmn
 
Multiple optimal path identification using ant colony optimisation in wireles...
Multiple optimal path identification using ant colony optimisation in wireles...Multiple optimal path identification using ant colony optimisation in wireles...
Multiple optimal path identification using ant colony optimisation in wireles...ijwmn
 
Analyse Performance of Fractional Fourier Transform on Timing and Carrier Fr...
 Analyse Performance of Fractional Fourier Transform on Timing and Carrier Fr... Analyse Performance of Fractional Fourier Transform on Timing and Carrier Fr...
Analyse Performance of Fractional Fourier Transform on Timing and Carrier Fr...ijwmn
 
A new channel coding technique to approach the channel capacity
A new channel coding technique to approach the channel capacityA new channel coding technique to approach the channel capacity
A new channel coding technique to approach the channel capacityijwmn
 
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF ijwmn
 
P ERFORMANCE A NALYSIS O F A DAPTIVE N OISE C ANCELLER E MPLOYING N LMS A LG...
P ERFORMANCE A NALYSIS  O F A DAPTIVE N OISE C ANCELLER E MPLOYING N LMS A LG...P ERFORMANCE A NALYSIS  O F A DAPTIVE N OISE C ANCELLER E MPLOYING N LMS A LG...
P ERFORMANCE A NALYSIS O F A DAPTIVE N OISE C ANCELLER E MPLOYING N LMS A LG...ijwmn
 

Viewers also liked (16)

O dsr optimized dsr routing
O dsr optimized dsr routingO dsr optimized dsr routing
O dsr optimized dsr routing
 
Elgamal signature for content distribution with network coding
Elgamal signature for content distribution with network codingElgamal signature for content distribution with network coding
Elgamal signature for content distribution with network coding
 
Spatial multiplexing ofdmoqam systems with time reversal technique
Spatial multiplexing ofdmoqam systems with time reversal techniqueSpatial multiplexing ofdmoqam systems with time reversal technique
Spatial multiplexing ofdmoqam systems with time reversal technique
 
Zigbee based wearable remote healthcare monitoring system for elderly patients
Zigbee based wearable remote healthcare monitoring system for elderly patientsZigbee based wearable remote healthcare monitoring system for elderly patients
Zigbee based wearable remote healthcare monitoring system for elderly patients
 
An educational bluetooth quizzing application in android
An educational bluetooth quizzing application in androidAn educational bluetooth quizzing application in android
An educational bluetooth quizzing application in android
 
Opportunistic and playback sensitive scheduling for video streaming
Opportunistic and playback sensitive scheduling for video streamingOpportunistic and playback sensitive scheduling for video streaming
Opportunistic and playback sensitive scheduling for video streaming
 
Performance analysis of fls, exp, log and
Performance analysis of fls, exp, log andPerformance analysis of fls, exp, log and
Performance analysis of fls, exp, log and
 
COMP-JT WITH DYNAMIC CELL SELECTION, GLOBAL PRECODING MATRIX AND IRC RECEIVER...
COMP-JT WITH DYNAMIC CELL SELECTION, GLOBAL PRECODING MATRIX AND IRC RECEIVER...COMP-JT WITH DYNAMIC CELL SELECTION, GLOBAL PRECODING MATRIX AND IRC RECEIVER...
COMP-JT WITH DYNAMIC CELL SELECTION, GLOBAL PRECODING MATRIX AND IRC RECEIVER...
 
Sinr, rsrp, rssi and rsrq
Sinr, rsrp, rssi and rsrqSinr, rsrp, rssi and rsrq
Sinr, rsrp, rssi and rsrq
 
Advanced antenna techniques and high order sectorization with novel network t...
Advanced antenna techniques and high order sectorization with novel network t...Advanced antenna techniques and high order sectorization with novel network t...
Advanced antenna techniques and high order sectorization with novel network t...
 
Mobile elements scheduling for periodic sensor applications
Mobile elements scheduling for periodic sensor applicationsMobile elements scheduling for periodic sensor applications
Mobile elements scheduling for periodic sensor applications
 
Multiple optimal path identification using ant colony optimisation in wireles...
Multiple optimal path identification using ant colony optimisation in wireles...Multiple optimal path identification using ant colony optimisation in wireles...
Multiple optimal path identification using ant colony optimisation in wireles...
 
Analyse Performance of Fractional Fourier Transform on Timing and Carrier Fr...
 Analyse Performance of Fractional Fourier Transform on Timing and Carrier Fr... Analyse Performance of Fractional Fourier Transform on Timing and Carrier Fr...
Analyse Performance of Fractional Fourier Transform on Timing and Carrier Fr...
 
A new channel coding technique to approach the channel capacity
A new channel coding technique to approach the channel capacityA new channel coding technique to approach the channel capacity
A new channel coding technique to approach the channel capacity
 
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF
 
P ERFORMANCE A NALYSIS O F A DAPTIVE N OISE C ANCELLER E MPLOYING N LMS A LG...
P ERFORMANCE A NALYSIS  O F A DAPTIVE N OISE C ANCELLER E MPLOYING N LMS A LG...P ERFORMANCE A NALYSIS  O F A DAPTIVE N OISE C ANCELLER E MPLOYING N LMS A LG...
P ERFORMANCE A NALYSIS O F A DAPTIVE N OISE C ANCELLER E MPLOYING N LMS A LG...
 

Similar to Improving Performance of Ieee 802.11 by a Dynamic Control Backoff Algorithm Under Unsaturated Traffic Loads

Load balancing In Wireless Mesh Networks Using liquid–Simulated Algorithm
Load balancing In Wireless Mesh Networks Using liquid–Simulated AlgorithmLoad balancing In Wireless Mesh Networks Using liquid–Simulated Algorithm
Load balancing In Wireless Mesh Networks Using liquid–Simulated AlgorithmIJSRED
 
Sample-by-sample and block-adaptive robust constant modulus-based algorithms
Sample-by-sample and block-adaptive robust constant modulus-based algorithmsSample-by-sample and block-adaptive robust constant modulus-based algorithms
Sample-by-sample and block-adaptive robust constant modulus-based algorithmsDr. Ayman Elnashar, PhD
 
Effective Router Assisted Congestion Control for SDN
Effective Router Assisted Congestion Control for SDN Effective Router Assisted Congestion Control for SDN
Effective Router Assisted Congestion Control for SDN IJECEIAES
 
A novel pause count backoff algorithm for channel access
A novel pause count backoff algorithm for channel accessA novel pause count backoff algorithm for channel access
A novel pause count backoff algorithm for channel accessambitlick
 
QOS CATEGORIES ACTIVENESS-AWARE ADAPTIVE EDCA ALGORITHM FOR DENSE IOT NETWORKS
QOS CATEGORIES ACTIVENESS-AWARE ADAPTIVE EDCA ALGORITHM FOR DENSE IOT NETWORKSQOS CATEGORIES ACTIVENESS-AWARE ADAPTIVE EDCA ALGORITHM FOR DENSE IOT NETWORKS
QOS CATEGORIES ACTIVENESS-AWARE ADAPTIVE EDCA ALGORITHM FOR DENSE IOT NETWORKSIJCNCJournal
 
ANALYSIS AND EXPERIMENTAL EVALUATION OF THE TRANSMISSION CONTROL PROTOCOL CON...
ANALYSIS AND EXPERIMENTAL EVALUATION OF THE TRANSMISSION CONTROL PROTOCOL CON...ANALYSIS AND EXPERIMENTAL EVALUATION OF THE TRANSMISSION CONTROL PROTOCOL CON...
ANALYSIS AND EXPERIMENTAL EVALUATION OF THE TRANSMISSION CONTROL PROTOCOL CON...IRJET Journal
 
A_C_RAN_Architecture_for_LTE_Control_Sig.pdf
A_C_RAN_Architecture_for_LTE_Control_Sig.pdfA_C_RAN_Architecture_for_LTE_Control_Sig.pdf
A_C_RAN_Architecture_for_LTE_Control_Sig.pdfsehat maruli
 
CONVEX OPTIMIZATION BASED CONGESTION CONTROL IN LAYERED SATELLITE NETWORKS
CONVEX OPTIMIZATION BASED CONGESTION CONTROL IN LAYERED SATELLITE NETWORKSCONVEX OPTIMIZATION BASED CONGESTION CONTROL IN LAYERED SATELLITE NETWORKS
CONVEX OPTIMIZATION BASED CONGESTION CONTROL IN LAYERED SATELLITE NETWORKSIJCI JOURNAL
 
IMPACT OF PARTIAL DEMAND INCREASE ON THE PERFORMANCE OF IP NETWORKS AND RE-OP...
IMPACT OF PARTIAL DEMAND INCREASE ON THE PERFORMANCE OF IP NETWORKS AND RE-OP...IMPACT OF PARTIAL DEMAND INCREASE ON THE PERFORMANCE OF IP NETWORKS AND RE-OP...
IMPACT OF PARTIAL DEMAND INCREASE ON THE PERFORMANCE OF IP NETWORKS AND RE-OP...EM Legacy
 
Newton-raphson method to solve systems of non-linear equations in VANET perfo...
Newton-raphson method to solve systems of non-linear equations in VANET perfo...Newton-raphson method to solve systems of non-linear equations in VANET perfo...
Newton-raphson method to solve systems of non-linear equations in VANET perfo...journalBEEI
 
New weight function for adapting handover margin level over contiguous carrie...
New weight function for adapting handover margin level over contiguous carrie...New weight function for adapting handover margin level over contiguous carrie...
New weight function for adapting handover margin level over contiguous carrie...Journal Papers
 
ENHANCEMENT OF TCP FAIRNESS IN IEEE 802.11 NETWORKS
ENHANCEMENT OF TCP FAIRNESS IN IEEE 802.11 NETWORKSENHANCEMENT OF TCP FAIRNESS IN IEEE 802.11 NETWORKS
ENHANCEMENT OF TCP FAIRNESS IN IEEE 802.11 NETWORKScscpconf
 
PERFORMANCE EVALUATION OF LOW POWER CARRY SAVE ADDER FOR VLSI APPLICATIONS
PERFORMANCE EVALUATION OF LOW POWER CARRY SAVE ADDER FOR VLSI APPLICATIONSPERFORMANCE EVALUATION OF LOW POWER CARRY SAVE ADDER FOR VLSI APPLICATIONS
PERFORMANCE EVALUATION OF LOW POWER CARRY SAVE ADDER FOR VLSI APPLICATIONSVLSICS Design
 
PERFORMANCE EVALUATION OF LOW POWER CARRY SAVE ADDER FOR VLSI APPLICATIONS
PERFORMANCE EVALUATION OF LOW POWER CARRY SAVE ADDER FOR VLSI APPLICATIONSPERFORMANCE EVALUATION OF LOW POWER CARRY SAVE ADDER FOR VLSI APPLICATIONS
PERFORMANCE EVALUATION OF LOW POWER CARRY SAVE ADDER FOR VLSI APPLICATIONSVLSICS Design
 
Optimizing Data Plane Resources for Multipath Flows
Optimizing Data Plane Resources for Multipath FlowsOptimizing Data Plane Resources for Multipath Flows
Optimizing Data Plane Resources for Multipath FlowsIRJET Journal
 
FEAS_Poster_2015_WNCS_LCV_v2b
FEAS_Poster_2015_WNCS_LCV_v2bFEAS_Poster_2015_WNCS_LCV_v2b
FEAS_Poster_2015_WNCS_LCV_v2bTina Mirfakhraie
 
An ecn approach to congestion control mechanisms in mobile ad hoc networks
An ecn approach to congestion control mechanisms in mobile ad hoc networksAn ecn approach to congestion control mechanisms in mobile ad hoc networks
An ecn approach to congestion control mechanisms in mobile ad hoc networksAlexander Decker
 
Enhancing HTTP Web Protocol Performance with Updated Transport Layer Techniques
Enhancing HTTP Web Protocol Performance with Updated Transport Layer TechniquesEnhancing HTTP Web Protocol Performance with Updated Transport Layer Techniques
Enhancing HTTP Web Protocol Performance with Updated Transport Layer TechniquesIJCNCJournal
 
Enhancing HTTP Web Protocol Performance with Updated Transport Layer Techniques
Enhancing HTTP Web Protocol Performance with Updated Transport Layer TechniquesEnhancing HTTP Web Protocol Performance with Updated Transport Layer Techniques
Enhancing HTTP Web Protocol Performance with Updated Transport Layer TechniquesIJCNCJournal
 

Similar to Improving Performance of Ieee 802.11 by a Dynamic Control Backoff Algorithm Under Unsaturated Traffic Loads (20)

Load balancing In Wireless Mesh Networks Using liquid–Simulated Algorithm
Load balancing In Wireless Mesh Networks Using liquid–Simulated AlgorithmLoad balancing In Wireless Mesh Networks Using liquid–Simulated Algorithm
Load balancing In Wireless Mesh Networks Using liquid–Simulated Algorithm
 
StateKeeper Report
StateKeeper ReportStateKeeper Report
StateKeeper Report
 
Sample-by-sample and block-adaptive robust constant modulus-based algorithms
Sample-by-sample and block-adaptive robust constant modulus-based algorithmsSample-by-sample and block-adaptive robust constant modulus-based algorithms
Sample-by-sample and block-adaptive robust constant modulus-based algorithms
 
Effective Router Assisted Congestion Control for SDN
Effective Router Assisted Congestion Control for SDN Effective Router Assisted Congestion Control for SDN
Effective Router Assisted Congestion Control for SDN
 
A novel pause count backoff algorithm for channel access
A novel pause count backoff algorithm for channel accessA novel pause count backoff algorithm for channel access
A novel pause count backoff algorithm for channel access
 
QOS CATEGORIES ACTIVENESS-AWARE ADAPTIVE EDCA ALGORITHM FOR DENSE IOT NETWORKS
QOS CATEGORIES ACTIVENESS-AWARE ADAPTIVE EDCA ALGORITHM FOR DENSE IOT NETWORKSQOS CATEGORIES ACTIVENESS-AWARE ADAPTIVE EDCA ALGORITHM FOR DENSE IOT NETWORKS
QOS CATEGORIES ACTIVENESS-AWARE ADAPTIVE EDCA ALGORITHM FOR DENSE IOT NETWORKS
 
ANALYSIS AND EXPERIMENTAL EVALUATION OF THE TRANSMISSION CONTROL PROTOCOL CON...
ANALYSIS AND EXPERIMENTAL EVALUATION OF THE TRANSMISSION CONTROL PROTOCOL CON...ANALYSIS AND EXPERIMENTAL EVALUATION OF THE TRANSMISSION CONTROL PROTOCOL CON...
ANALYSIS AND EXPERIMENTAL EVALUATION OF THE TRANSMISSION CONTROL PROTOCOL CON...
 
A_C_RAN_Architecture_for_LTE_Control_Sig.pdf
A_C_RAN_Architecture_for_LTE_Control_Sig.pdfA_C_RAN_Architecture_for_LTE_Control_Sig.pdf
A_C_RAN_Architecture_for_LTE_Control_Sig.pdf
 
CONVEX OPTIMIZATION BASED CONGESTION CONTROL IN LAYERED SATELLITE NETWORKS
CONVEX OPTIMIZATION BASED CONGESTION CONTROL IN LAYERED SATELLITE NETWORKSCONVEX OPTIMIZATION BASED CONGESTION CONTROL IN LAYERED SATELLITE NETWORKS
CONVEX OPTIMIZATION BASED CONGESTION CONTROL IN LAYERED SATELLITE NETWORKS
 
IMPACT OF PARTIAL DEMAND INCREASE ON THE PERFORMANCE OF IP NETWORKS AND RE-OP...
IMPACT OF PARTIAL DEMAND INCREASE ON THE PERFORMANCE OF IP NETWORKS AND RE-OP...IMPACT OF PARTIAL DEMAND INCREASE ON THE PERFORMANCE OF IP NETWORKS AND RE-OP...
IMPACT OF PARTIAL DEMAND INCREASE ON THE PERFORMANCE OF IP NETWORKS AND RE-OP...
 
Newton-raphson method to solve systems of non-linear equations in VANET perfo...
Newton-raphson method to solve systems of non-linear equations in VANET perfo...Newton-raphson method to solve systems of non-linear equations in VANET perfo...
Newton-raphson method to solve systems of non-linear equations in VANET perfo...
 
New weight function for adapting handover margin level over contiguous carrie...
New weight function for adapting handover margin level over contiguous carrie...New weight function for adapting handover margin level over contiguous carrie...
New weight function for adapting handover margin level over contiguous carrie...
 
ENHANCEMENT OF TCP FAIRNESS IN IEEE 802.11 NETWORKS
ENHANCEMENT OF TCP FAIRNESS IN IEEE 802.11 NETWORKSENHANCEMENT OF TCP FAIRNESS IN IEEE 802.11 NETWORKS
ENHANCEMENT OF TCP FAIRNESS IN IEEE 802.11 NETWORKS
 
PERFORMANCE EVALUATION OF LOW POWER CARRY SAVE ADDER FOR VLSI APPLICATIONS
PERFORMANCE EVALUATION OF LOW POWER CARRY SAVE ADDER FOR VLSI APPLICATIONSPERFORMANCE EVALUATION OF LOW POWER CARRY SAVE ADDER FOR VLSI APPLICATIONS
PERFORMANCE EVALUATION OF LOW POWER CARRY SAVE ADDER FOR VLSI APPLICATIONS
 
PERFORMANCE EVALUATION OF LOW POWER CARRY SAVE ADDER FOR VLSI APPLICATIONS
PERFORMANCE EVALUATION OF LOW POWER CARRY SAVE ADDER FOR VLSI APPLICATIONSPERFORMANCE EVALUATION OF LOW POWER CARRY SAVE ADDER FOR VLSI APPLICATIONS
PERFORMANCE EVALUATION OF LOW POWER CARRY SAVE ADDER FOR VLSI APPLICATIONS
 
Optimizing Data Plane Resources for Multipath Flows
Optimizing Data Plane Resources for Multipath FlowsOptimizing Data Plane Resources for Multipath Flows
Optimizing Data Plane Resources for Multipath Flows
 
FEAS_Poster_2015_WNCS_LCV_v2b
FEAS_Poster_2015_WNCS_LCV_v2bFEAS_Poster_2015_WNCS_LCV_v2b
FEAS_Poster_2015_WNCS_LCV_v2b
 
An ecn approach to congestion control mechanisms in mobile ad hoc networks
An ecn approach to congestion control mechanisms in mobile ad hoc networksAn ecn approach to congestion control mechanisms in mobile ad hoc networks
An ecn approach to congestion control mechanisms in mobile ad hoc networks
 
Enhancing HTTP Web Protocol Performance with Updated Transport Layer Techniques
Enhancing HTTP Web Protocol Performance with Updated Transport Layer TechniquesEnhancing HTTP Web Protocol Performance with Updated Transport Layer Techniques
Enhancing HTTP Web Protocol Performance with Updated Transport Layer Techniques
 
Enhancing HTTP Web Protocol Performance with Updated Transport Layer Techniques
Enhancing HTTP Web Protocol Performance with Updated Transport Layer TechniquesEnhancing HTTP Web Protocol Performance with Updated Transport Layer Techniques
Enhancing HTTP Web Protocol Performance with Updated Transport Layer Techniques
 

Recently uploaded

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 

Recently uploaded (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 

Improving Performance of Ieee 802.11 by a Dynamic Control Backoff Algorithm Under Unsaturated Traffic Loads

  • 1. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 6, December 2015 DOI : 10.5121/ijwmn.2015.7605 45 IMPROVING PERFORMANCE OF IEEE 802.11 BY A DYNAMIC CONTROL BACKOFF ALGORITHM UNDER UNSATURATED TRAFFIC LOADS Hatm Alkadeki, Xingang Wang and Michael Odetayo Department of Computing, Coventry University, Coventry, UK ABSTRACT The IEEE 802.11 backoff algorithm is very important for controlling system throughput over contention- based wireless networks. For this reason, there are many studies on wireless network performance focus on developing backoff algorithms. However, most existing models are based on saturated traffic loads, which are not a real representation of actual network conditions. In this paper, a dynamic control backoff time algorithm is proposed to enhance both delay and throughput performance of the IEEE 802.11 distributed coordination function. This algorithm considers the distinction between high and low traffic loads in order to deal with unsaturated traffic load conditions. In particular, the equilibrium point analysis model is used to represent the algorithm under various traffic load conditions. Results of extensive simulation experiments illustrate that the proposed algorithm yields better performance throughput and a better average transmission packet delay than related algorithms. KEYWORDS IEEE 802.11, Backoff algorithm, Contention window threshold, Equilibrium point analysis, Dynamic control backoff time algorithm 1. INTRODUCTION Use of wireless local area networks (WLANs) is ubiquitous. IEEE 802.11 is the most important standard in WLANs; however, achieving acceptable quality of service (QoS) over the standard is still a challenging task. The IEEE 802.11 standard provides a basic medium access control (MAC) mechanism called the distributed coordination function (DCF) [1]. The DCF is based on the carrier sense multiple access with collision avoidance (CSMA/CA) mechanism with binary exponential backoff (BEB) algorithm to reduce the probability of collisions. The BEB algorithm is implemented by doubling the backoff time after every unsuccessful transmission. The backoff time is called the contention window (CW), which is bounded by CWmax. However, the CW is reset to zero after every successful transmission with the backoff counter in the interval (0, CWi −1) [2]. Furthermore, the collision probability eventually leads to an unsuccessful transmission, which decreases throughput. Therefore, improving the backoff algorithm will help to enhance throughput performance and reduce the transmission delay. In this paper, we propose a new backoff algorithm that applies the distinction between low and high traffic loads over non- saturated traffic load conditions. We also evaluate the performance of the proposed algorithm in terms of throughput and delay. The remainder of this paper is organized as follows. Section 2 discusses and evaluates related work, while Section 3 presents the proposed algorithm. Section 4 evaluates the performance of the proposed algorithm and compares the results with those of existing works. Section 5 presents our conclusion.
  • 2. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 6, December 2015 46 2. RELATED WORK As mentioned above, the backoff algorithm for IEEE 802.11 is very important for controlling channel access to maximize throughput and fairness [3]. There are several methods for extending or proposing backoff algorithms. Most of these are based on modifying the backoff parameters such as CW size and backoff stage (m), which is why much research has focused on modifying the CW size during execution of the backoff algorithm to improve the performance of the IEEE 802.11 DCF. Therefore, an appropriate CW size leads to an improvement in the system throughput by reducing the probability of collisions. However, some of the methods do not account for dynamic traffic loads. For example, the authors in [4], proposed a new backoff algorithm, called the multiplicative increase and linear decrease (MILD) algorithm. Their work focused on modifying the CW size to CW×1.5 rather than doubling it after every unsuccessful transmission. Moreover, CW size is decremented by 1 after every successful transmission rather than reset to 0. However, decreasing the CW size gradually helps avoid any degradation in performance. Therefore, the MILD algorithm is better than the BEB algorithm over large networks. The authors in [5], extended the MILD algorithm by creating a new algorithm called the linear increase linear decrease (LILD) algorithm. However, the authors applied CW+CWmin as the size of increasing CW rather than multiplying by 1.5 to avoid the problem of slow linear change over unsuccessful transmission. Therefore, the LILD algorithm provides good quality performance over large networks. In another study [6], the authors proposed a new backoff algorithm, called the exponential increase exponential decrease (EIED) algorithm. This algorithm is based on increasing and decreasing the CW size exponentially. In [7], the authors proposed a new algorithm called the double increment double decrement (DIDD) algorithm. This algorithm is based on doubling the CW size after every unsuccessful transmission, in the same way as the BEB algorithm, but using CW/2 as the size of decreasing CW after every successful transmission. The DIDD algorithm generates a better result than the other algorithms mentioned above. In addition, improving the BEB algorithm is still an active research topic. Therefore, [8] recently evaluated the performance of BEB as a poor algorithm due to a number of collisions and CW restoration after every successful transmission. This study is devoted to improve collision avoidance under saturated traffic loads. However, the above algorithms do not consider dynamic traffic loads. There are other interesting directions that can be taken. For example, according to the research in [9], the authors focused on channel traffic loads, and proposed a new algorithm called the exponential linear backoff algorithm (ELBA). ELBA combines both exponential and linear algorithms depending on traffic loads and provides better system throughput than the BEB, EIED, and LILD algorithms. In [10], the authors used pause count backoff for monitoring channel traffic loads. This algorithm aims to set an appropriate CW size based on estimation results. The authors in [11], proposed an adaptive backoff algorithm based on the trade-off of efficiency and fairness for ad hoc networks. This work is based on a fair schedule to control the increase and decrease in CW size depending on the channel situation (idle or busy). In [12], the authors considered dynamic traffic loads by proposing an algorithm based on monitoring the channel before data transmission. In this algorithm, each station can record the number of busy slots by opening an observation window. Thus, the sender can calculate a dynamic priority and CW size according to the number of successful transmissions. In [13], the authors monitored the channel traffic loads by using a channel state (CS) vector, and proposed a new algorithm called the dynamic deterministic contention window control algorithm (DDCWC). This algorithm is based on monitoring the channel traffic load conditions by checking the CS. However, selecting the optimum CW size based on different traffic load conditions using the CS vector is difficult. Overall, the majority of research work has paid great attention to improving the performance of a saturated system without accounting for non-saturated traffic load conditions. Therefore, creating a new backoff algorithm under non-saturated traffic load conditions is the objective of this paper.
  • 3. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 6, December 2015 47 3. BACKOFF STRATEGY In this section, the proposed algorithm is discussed in detail. The discussion starts by describing the principle behind the proposed algorithm in terms of mechanism and traffic load conditions. 3.1 Principle of the Proposed Algorithm As mentioned in Section 2, most existing algorithms do not consider traffic loads under non- saturated conditions, and thus do not take into account practical network operation. In this section, a new backoff algorithm is proposed, called the dynamic control backoff time algorithm (DCBTA). The DCBTA is implemented under non-saturated traffic loads using the equilibrium point analysis (EPA) model [14]. The EPA model provides a very convenient way of evaluating system performance under non-saturated traffic loads, thereby enabling the presentation of the DCBTA under more flexible traffic sources. Furthermore, it is possible to investigate network traffic load conditions under a different number of stations. In the DCBTA, channel conditions are checked by a CW threshold (CWThreshold). The CWThreshold value serves as a reference point for the collision rate. Therefore, CWThreshold plays a major role in the proposed algorithm as illustrated in Figure 1. The CWThreshold size is dependent on the maximum contention window size (CWmax), where the value of CWThreshold is equal to half that of CWmax. For example, the value of CWmax in [14] was selected to be 1024. In this case, the value of CWThreshold is set to 512. Each state of node “i” is initially set to the minimum CW size (CWmin), which can be increased up to CWmax. Figure 1. Underlying mechanism of the proposed algorithm (DCBTA) Figure 1 shows that the proposed algorithm enables the detection of heavy or light traffic load using the CWThreshold value. After every unsuccessful transmission, if the CW size is smaller than the CWThreshold value, that is, a light traffic load, the CW size is doubled as (2×CW) similar to the BEB algorithm. Conversely, if the CW size is greater than CWThreshold, that is, a heavy traffic load, the CW size is doubled and incremented by two as (2×CW+2). Adding two to double the CW size leads to a decrease in the collision probability, thus increasing system throughput. A summary of this discussion is given below:
  • 4. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 6, December 2015 48 Light traffic load: If (CWi ≤ CWThreshold) Successful transmission: CWi = CWi−1−1; Else (CWi = CWi−1×2). Heavy traffic load: If (CWi > CWThreshold) Successful transmission: CWi = CWi−1−2; Else (CWi = CWi−1×2+2). 3.2 DCBTA Algorithm under EPA Model In order to run the proposed algorithm under non-saturated traffic load conditions, the EPA model is used. The EPA model provides a very convenient way to evaluate the system performance under non-saturated traffic load conditions. In the EPA model, the traffic load generated by each station follows the Poisson distribution with rate time/packets. Thus, the packet transmission probability (R) plays a pivotal role in the EPA model mechanism. However, the proposed algorithm adaptively changes the CW size with respect to the collision rate or the transmitting nodes. Therefore, the proposed algorithm under the EPA model affects the transmission probability of node “Ri” at any state of node “i” as follows: In networks with a large number of nodes or a high collision rate, the proposed algorithm results in a very low probability of transmission. In this case, the CW size increases to more than the threshold, resulting in a high traffic load. The throughput formula is the same, where Ri is calculated as follows: Otherwise, the value of CWi decreases to less than or equal to the threshold value, resulting in a low traffic load. Then Ri is calculated in the same way as the BEB algorithm under the EPA model. In the case of successful transmission, the CWi size decreases gradually to avoid performance degradation. However, if the CWi size is less than or equal to CWThreshold, the CW size for the next stage CWi+1 is decremented by one: If CWi is greater than CWThreshold, CWi+1 is decremented by two: 4. PERFORMANCE EVALUATION In this section, the proposed backoff algorithm is compared with related algorithms in terms of throughput and average packet transmission delay. The comparative evaluation of backoff algorithms is carried out using MATLAB simulation experiments.
  • 5. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 6, December 2015 49 4.1 Simulation Settings The proposed and related algorithms are implemented based on the EPA model assumption in [14]. Therefore, there are no hidden terminals and system performance can be investigated under more flexible traffic sources with fixed packet length. The different system parameters used in the simulation experiments are summarised in Table 1. Table 1. System parameter settings 4.2 Comparison of Throughput System performance of the proposed algorithm (DCBTA) is compared with that of the BEB algorithm under non-saturated traffic load conditions in the work of [14]. In addition, the performance of DCBTA is compared with other related algorithms, such as ELBA in the work of [9]. ELBA combines both exponential and linear algorithms, which is why it was selected for comparison with the proposed algorithm. The number of nodes is set to 50; the maximum number of backoff stages equals six. Figure 2 illustrates the throughput performance for DCBTA compared with the BEB algorithm and ELBA under various traffic load conditions. The results show that the throughput performance of DCBTA is better than that of the BEB algorithm and ELBA under various traffic loads. Figure 2. Non-saturated throughput comparison of the proposed algorithm and various related backoff algorithms, where (CWmin = 8, m = 6) Parameter Value Packet Payload 8184 bits Data Packet 8200 µs Channel Bit Rate 1 Mbit/s Physical Slot Time 50 µs DIFS 128 µs SIFS 28 µs ACK_Timeout 300 µs RTS 350 µs CTS 350 µs CWmin 8 CWmax 1024 Maximum Backoff Stage, m 6 Network Nodes (n) 50-100 nodes Analytical Tool EPA model
  • 6. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 6, December 2015 50 To investigate the impact of using different CWmin size, Figure 3 plots the throughput performance for DCBTA, BEB, and ELBA with a varying size of 8, 16, and 32 CWmin. The throughput increases when CWmin increases, since increasing CWmin contributes to collision avoidance. Moreover, system throughput depends on the incoming data [15]. Therefore, the throughput result is equal to the increase in the incoming traffic data rates if the traffic load is low. Otherwise, throughput becomes saturated if the amount of data is sufficiently high. Hence, the system performance strongly depends on system parameters, such as CWmin and m. Figure 3 clearly shows that DCBTA provides better throughput results than BEB and ELBA with different CWmin size under various offered loads. The DCBTA allows the stations to adjust CW value appropriately according to the traffic load variation within the network. This means that the DCBTA mechanism can reduce the number of collisions, which will lead to increased system throughput. In addition, the performance results show that DCBTA has lower performance degradation than BEB and ELBA. The reason for this is that the CW size decreases gradually after every successful transmission. Figure 3. Non-saturated throughput comparison of the proposed algorithm and various related backoff algorithms with varying CWmin (8, 16, 32) and m = 6 4.3 Comparison of Delay In [14], the EPA model represented the MAC channel in idle, transmission, and collision states under varying traffic load conditions. The MAC channel was proposed as a multi-dimensional discrete-time Markov chain analysis model. Therefore, the delay can be represented as a sequence of discrete time delays as follows: Average transmission delay = Total delay / Total number of transmissions, where: Total delay = Total transmission time + Total time delay in the collision + Backoff time + Empty slot. Total transmission time = Transmission time of single packet × Total number of transmissions. Transmission time of single packet = RTS + SIFS + CTS + SIFS + Data + SIFS + ACK + DIFS. Total time delay in the collision = Delay time of single collision × Total number of collisions. Delay of single collision = RTS + DIFS.
  • 7. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 6, December 2015 51 Average packet transmission delays for the BEB algorithm, ELBA, and DCBTA are calculated over 100 stationary nodes. For further investigation, the performance of algorithms is also examined under different CWmin values of 32, 64, and 128. All the assumptions and system parameters related to this experiment are the same as in the previous section. Figure 4, Figure 5, and Figure 6 show the delay comparison of the BEB, ELBA, and DCBTA algorithms under the EPA unsaturated model. The increment in CW size in the BEB and ELBA algorithms results in greater delay compared to that of the DCBTA algorithm. This means that the DCBTA mechanism produces a small delay by reducing a collision rate. Actually, when there is a high offered traffic load, the CW size should be kept large to avoid frequent collision. Moreover, DCBTA reduces CW size more slowly after successful transmission in order to avoid the collision probability. For these reasons, it can clearly be seen that the proposed algorithm has a smaller average transmission delay than that of the BEB and ELBA algorithms, as shown in the figures below. Figure 4. Average packet transmission delay with CWmin = 32, m = 6 Figure 5. Average packet transmission delay with CWmin = 64, m = 6
  • 8. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 6, December 2015 52 Figure 6. Average packet transmission delay with CWmin = 128, m = 6 5. CONCLUSION In this paper, a new backoff algorithm under non-saturated traffic loads was proposed to represent actual network situations. A suitable model was selected to evaluate system performance under non-saturated traffic loads such as the EPA model. The motivation for this research was to enhance the system performance of the IEEE 802.11 DCF under non-saturated traffic load conditions in terms of throughput and time delay. To realize this, a new backoff algorithm was proposed and then integrated with the EPA model. The performance results show that the proposed algorithm (DCBTA) presents better system throughput than the BEB algorithm and ELBA. In addition, calculation of the average packet transmission delay for each algorithm shows that the DCBTA provides a better time delay than the BEB algorithm and ELBA. This is because the DCBTA decreases the time delay, which leads to an increase in system throughput. However, throughput and delay are both relevant for the performance metrics of QoS. Therefore, the proposed algorithm may help to enhance the effectiveness of the IEEE 802.11 DCF. A possible further extension of the DCBTA would be to consider the various data frame sizes.
  • 9. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 6, December 2015 53 REFERENCES [1] Bianchi, G. (2000) “Performance analysis of the IEEE 802.11 distributed coordination function”, IEEE Journal on Selected Areas in Communications, 18(3), 535-547. [2] Gangrade, K., Patidar, P. & Tiwari, A. (2013). “Performance Evaluation of IEEE 802.11 MAC DCF Using Various Schemes Towards : Throughput, Delay and Reliability”, International Journal of Advanced Research in Computer and Communication Engineering 2 (7), 2731–2737. [3] Cho, J.W. & Jiang, Y. (2015). “Fundamentals of the Backoff Process in 802.11 : Dichotomy of the Aggregation”, IEEE Transactions on Information Theory 61 (4), 1687–1701. [4] Bharghavan, V., Demers, A., Shenker, S. & Zhang, L. (1994). “MACAW: a media access protocol for wireless LAN’s”, SIGCOMM ’94 Proceedings of the Conference on Communications Architectures, Protocols and Applications, 24(4), 212-225. [5] Deng, J., Varshney, PK. & Haas, ZJ. (2004). “A new backoff algorithm for the IEEE 802.11 distributed coordination function”, Proceedings of CNDS, 4, 18-21. [6] Song, N., Kwak, B., Song, J. & Miller, ME. (2003). “Enhancement of IEEE 802.11 distributed coordination function with exponential increase exponential decrease backoff algorithm”, The 57th IEEE Semiannual Spring VTC, 4, 2775-2778. [7] Chatzimisios, P., Boucouvalas, AC., Vitsas, V., Vafiadis, A., Economidis, A. & Huang, P. (2005). “A simple and effective backoff algorithm for the IEEE 802.11 MAC protocol”, Proceedings of the International Conference on Cybernetics and Information Technologies, System and 2nd Applications, 1, 48-53. [8] Cheng, H., Yan, X., Lian, H., Weng, L., Zhang, Q. & Feng, Z. (2014). “A novel collision avoidance algorithm for IEEE 802.11 wireless LANs”, IEEE Military Communications Conference (MILCOM), 879–884. [9] Lin, CH., Shieh, CK., Hwang, WS. & Ke, CH. (2008). “An exponential-linear backoff algorithm for contention-based wireless networks”, Proceedings of the International Conference on Mobile Technology, Applications and Systems, 42. [10] Liang, HM., Zeadally, S., Chilamkurti, N. & Shieh, CK. (2008). “A novel pause count backoff algorithm for channel access in IEEE 802.11 based wireless LANs”, International Sympsium on Computer Science and Its Applications, 8, 163-168. [11] Cui, H.X. & Wei, G. (2009). “A novel backoff algorithm based on the tradeoff of efficiency and Fairness for ad hoc networks”, International Conference on Communications and Mobile Computing, 02, 82-86. [12] Jingqi, F., Qiang, Z. & Haikuan, W. (2009). “A new backoff algorithm based on the dynamic modulating parameters of IEEE 802.11”, WICOM ‘9 Proceedings of the 5th International Conference on Wireless Communications, Networking and Mobile Computing, 1, 4-7. [13] Balador, A., Movaghar, A., Jabbehdari, S. & Kanellopoulos, D. (2012). “A novel contention window control scheme for IEEE 802.11 WLANs”, IETE Technical Review, 29, 202-212. [14] Wang, X., Min, G. & Guan, L. (2009). “Performance modelling of IEEE 802.11 DCF using equilibrium point analysis”, International Journal of Wireless and Mobile Computing, 3(3), 201-209. [15] Alam, M., Mumtaz, S., Saghezchi, F.B., Radwan, A. & Rodriguez, J. (2013). “Energy and throughput analysis of reservation protocols of Wi media MAC”, Journal of Green Engineering, 3, 363–382.