SlideShare a Scribd company logo
AN EFFECTIVE BACKOFF ALGORITHM FOR
COLLISION REDUCTION IN MANET
R.K. Shanmugasundaram, S. Vaidheeswaran
BTECH, B.S Abdur Rahman University,
Vandalur, Tamilnadu, (India)
Professor, Dr.N. Sabiyath Fatima, Dept of CSE, B.S Abdur Rahman University,
Vandalur, Tamilnadu, (India)
ABSTRACT
In Mobile Ad-hoc Networks (MANETS), every node performs both as transmitter and receiver. The existing
backoff models do not accurately predict the performance of the wireless network. Also, the existing models
suffer with high packet collisions. Whenever a collision occurs, the contention window (CW) of the station is
doubled until it reaches the maximum value. The main objective of this project is to reduce collision using
contention window Multiplicative Increase Decrease Backoff (CWMIDB) scheme. The purpose of increasing
CW is to reduce the collision probability by distributing the traffic into a larger time space. In wireless Ad hoc
networks, the CWMIDB algorithm dynamically controls the contention window of the nodes experiencing
collisions. During packet transmission, the backoff counter is uniformly selected from the given range of [0,
CW-1]. Here, CW is known as contention window and its value depends on the number of failed transmissions
for the packet. At the first transmission attempt, CW is set to minimum value (Cmin), if transmission attempt fails
then its value gets doubled, and again set to minimum value on successful transmission. CWMIDB is simulated
in NS2 environment and its performance is compared with Binary Exponential Backoff Algorithm. The
simulation results shows improvement in transmission probability compared to that of the existing backoff
algorithm.
Keywords— backoff, MANET, contention window,CWMIDB.
I. INTRODUCTİON
Mobile Ad Network (MANET) is an infrastructure-less dynamic network without fixed routers. All nodes are
capable of moving and can be connected dynamically. The responsibilities for organizing and controlling the
network are distributed among the terminals themselves. The entire network is mobile, in this type of network,
some pairs of terminals may not be able to communicate directly with each other and relaying of some messages
is required so that they are delivered to their destinations. The main drawback of MANET is energy
conservation. Energy consumption increases due to packet loss. This packet loss occurs due to collision between
the nodes during transmission of data. For wireless networks, the devices operating on battery try to pursue the
energy efficiently by reducing the energy they consume, while data transmission. The features of MANET
introduce several challenges. These include, collision due to transmission errors. This system breaks down when
two computers attempt to transmit at the same time. This is a case of collision. To avoid collision, carrier
sensing mechanism is used. Here each computer listens to the network before attempting to transmit. If the
network is busy, it waits until network quiets down. In carrier detection, computers continue to listen to the
network as they transmit. If computer detects another signal that interferes with the signal it is sending, it stops
transmitting. Both computers then wait for random amount of time and attempt to transmit. A collision can be
detected by listening to the shared medium immediately after transmitting and identifying collision
characteristics; or by capturing data from the medium and performing error detection.An alternative method to
handle collisions in a contention based system is to attempt to avoid them. Some systems may utilize a strict
scheduling guideline to identify who may use which resources another system may have the senders listen to the
channel immediately prior to transmitting and determine suitable times to transmit. The purpose of using
CWMIDB algorithm in IEEE 802.11 is to minimize collisions during contention between multiple nodes and
also in the presence of hidden nodes. This is a very simple backoff algorithm in which the size of the contention
window increases and decreases rather than increasing exponentially. The basic operation of the MAC protocol
is by successive Frame Exchange Sequences (FES) RTS-CTS-DATA-ACK as in 802.11 DCF. Each transmitter
before attempting to transmit must find the carrier to be idle for a time period of Distributed Inter-Frame
Spacing (DIFS) seconds. After deferring for the DIFS period the station selects a back off value for an
additional deferral time before transmitting. This back off period corresponds to an integer number of time slots
of the protocol and is selected based on Contention Window Multiplicative Increase Decrease Backoff
Algorithm. When some other transmission is detected the back off procedure pauses and starts over when the
medium is found to be idle for one DIFS period. If collision occurs, then the stations that were involved have to
restart the access procedure with DIFS period and new back off value.
II. AN EFFECTIVE BACKOFF ALGORITHM FOR COLLISION REDUCTION IN
MANET
The major problem in MANET is degradation in throughput because of node mobility, unreliable medium,
interference and route failure. The degradation in throughput is because MANET is unable to distinguish packet
loss. The packet loss occurs due to hidden node and congestion. This problem can be solved by using certain
backoff scheme. The backoff algorithm is a part of Media Access Control (MAC) protocol which is used to
avoid collision in Mobile Ad hoc Network (MANET). When the nodes in the network try to access the channel,
one of these nodes gains access the channel while the other nodes still contend for a time period. Collision
occurs in mobile ad-hoc networks when the node chooses the same value for data transmission. In Figure 3.1, A
and B are two nodes. During the transmission of data between these two nodes, collision occurs. After receiving
the collision signal, transmission is stopped from A and B. They will try to retransmit, since there is no
restriction.
Figure 2.1 Collision Problem
To overcome from the problem of collision, a new Contention Window Multiplicative Increase Decrease
Backoff scheme is proposed. CWMIDB provides minimum transmission delay and maximum throughput by
improving collision. This collision can be improved by certain mechanism. In the existing Binary Exponential
Backoff algorithm, for each packet transmission, the backoff time is uniformly chosen in the range (0, W-1)
where W is the initial contention window size. When the packet transmission is not successful the node
increases the contention window size, so the node has to sense the channel for long period of time. Due to this
throughput of the wireless network decreases automatically. The average delay required for the packet delivery
increases.
Figure 2.2 Backoff Concept
The Contention Window Multiplicative Increase Decrease Backoff Algorithm (CWMIDB) consist of three
phases, they are Identification of channel idleness, Setting up Backoff Counter, Performance comparison
of CWMIDB & Binary Exponential Backoff Algorithm. The steps for Contention Window
Multiplicative Increase Decrease Backoff Algorithm is implemented as follows,
CW = min [4*CW, CWmax] --------- (2.1)
The equation 2.2 describes that size of the contention window increase by four times during collision
CW = CWmin ------------------ (2.2)
The equation 2.2 describes that size of the contention window decrease during successful transmission
The CWMIDB algorithm steps are discussed
Step 1: Initially source node sends data when channel is in idle state until the destination is reached. The data
transmission process consists of two states namely idle and non-idle state.
Step 2: In Figure 2.3 S,A,B,D are nodes where S is source node and D is destination node, This node check for
idleness, if channel is in idle state, then it transfers the data to destination. If channel is not idle then it
waits for random backoff time.
Figure 2.3 A Scenario of Collision Detection
Step 3: When random backoff time value reaches zero it will transmit packet again to the destination.
Step 4: If the frame is correctly received, the receiving node sends an acknowledgment (ACK) frame to sender.
If ACK is not received, the size of the contention window size increases and retransmit packet again to
the destination.
Step 4.1: During successful transmission, the size of the contention window decreases to minimum.
Step 4.2: During the second transmission attempt, the size of contention window increases exponentially by CW
= CW x 4.
Step 5: During third transmission attempt, the size of the contention window decreases by CW = current value
of CW / 2
Step 6: If acknowledgement is received, go to step1.
Step 7: Stop
III Pseudocode for CWMIDB algorithm during successful transmission
Step 1: Set BackOff Timer to initial value
Step 2: While BackOff Timer ≠ 0 do
For each Time Slot
If channel is idle then BackOff Timer = BackOff Timer – 1
If channel is idle for more than DIFS then
Send
If (Send Failure) then
If (NumberOfBackoffs<=W) then
CW= CW * K
Else if (NumberOfBackoffs>=W)
CW= CW / K
BackOffTimer = Random x; 1 ≤ x ≤ CW -1
Else
CW = CW - 1
BackOffTimer = 0
Go to Step 1
Step 3: Stop
[Where
DIFS – Distributed Inter-Frame Spacing
CW-Contention Window]
/* Channel idleness process*/
When idle
MinCW=32;
MaxCW=256;
Backoff range = [0,CW];
/*During Successful Transmission*/
MinCW=32;
MaxCW=256, 1024;
Backoff range = [0,CW];
if (success) node's CW = MinCW;
node's BC = randomly select (0, MinCW);
end if
/*During Packet Collision*/
MinCW=32;
MaxCW=256, 1024;
Backoff range = [0,CW];
if (collision),
node's CW =
min(4*currentCW, MaxCW);
node's BC = randomly
select (0, newCW);
end
3.1 Channel Idleness phase
In channel idleness phase every node must sense the medium, in order to check the state of the channel (idle or
busy). If a node has data to send, but it sees that the channel is busy, then it waits for the end of transmission. At
the end of transmission, it must wait for a DIFS. The back off time counter continuously gets decremented until
the channel is sensed in an “Idle” state. It goes in “Frozen” State when a transmission is detected on the channel
and it goes to the reactivated state when the channel is sensed idle again for more than a DFIS. As soon as the
back-off time reaches zero the station starts the transmission. If two or more wireless nodes finish their
countdowns at the same time-slot, there occurs a collision between RTS (ready to send) packets if the
CSMA/CA (carrier sense multiple access with collision avoidance) is implemented, otherwise two data packets
collide with each other. If there is a collision, every node which participated in the collision multiplies its
contention window by the multiplicative factor m.
Figure 3.1 IDLE Procedure Finite State Representation
In Figure 3.1, the contention period can be determined by the CWMIDB algorithm. It increments the
appropriate retry counter associated with the frame. The CWMID Backoff mechanism chooses a random
number which represents the amount of time must elapse while there are not any transmissions, i.e., the medium
is idle before the listening station may attempt to begin its transmission again. The random number resulting
from this algorithm is uniformly distributed in a range, called the contention window, the size of which
increases with every attempt to transmit that is deferred, until a maximum size is reached for the range. Once a
transmission is successfully completed, the range is reduced to its minimum value for the Next transmission.
3.2 Backoff Counter Phase
In backoff counter phase, it attempts to double the contention window size during collision .Set the backoff counter
(BOC) between 0 and CWlow. Decrement the BOC by 1 if the channel is idle. If BOC reaches zero, transmit the data
frame. If acknowledgment is received then, transmit the next data frame. If the acknowledgement is not received
select the BOC between 0 and CW in the next backoff stage as
For second transmission attempt, CW = CW x 4. For third transmission attempt, CW = current value of CW / 2. For
fourth transmission attempt, CW = current value of CW X 4. For fifth transmission attempt, CW = current value of
CW / 2 and so on. If contention window is high, it will select the BOC between 0 and CW in the current backoff
stage.
Figure 3.2 BACKOFF Procedure Finite State Representation.
The Figure 3.2 depicts the backoff procedure for finite state representation.To prevent all nodes sensing the
channel from beginning of the transmission at the same time, each node chooses a random waiting time called
Backoff before starting transmission. The range from which the Backoff value is chosen is called the Contention
Window (CW). If the channel becomes busy during Backoff, Backoff counter decrementing is stopped until the
channel becomes idle again. For example, let us assume that the current backoff stage is ‘i’ with contention
windowCW( i ) = 4i * CWmin , and there is a successful transmission, the next backoff stage will be stage 0
with contention window CW( 0 ) = 31 according to the specification. But if the number of competing nodes is
large enough (>>31), the new collision will likely occur at the backoff stage 0. The main argument is that since
the current backoff stage is ‘i’ some collision must have occurred recently at the previous stage. Now if the
number of current competing nodes is larger than or close to CW( i ), and if the backoff stage is set to 0, there is
a high probability that new Collision will happen. So resetting the contention window after every successful
transmission is an inefficient approach if the number of nodes is large.
3.3 PERFORMANCE COMPARISON OF CWMIDB AND BEB
Here in this project performance comparison is done with CWMIDB and Binary Exponential Backoff (BEB) .
This performance comparison is done by taking into the account the performance metrics like packet delivery
ratio (PDR), Energy, Throughput. While making comparison CWMIDB is proven to be highly energy
conservation and efficient one than other.
The characteristics of NS2 parameter like throughput, packet information, etc can be plotted using trace graph.
The following Table 7.2 illustrates the comparison of various performance metrices like Packet Delivery Ratio
(PDR), Energy and throughput. These metrices are calculated by taking in to the account the number of sending
packets, number of receiving packets at destination and considerably the number of routing packets which is
generated in the trace file. The packet delivery ratio (PDR) of CWMIDB gradually increases from 10.28 percent
to 91.92 percent. The PDR ratio is high because CWMIDB send the packets by increasing and decreasing the
contention window size. CWMIDB initially increases and then decreases. The simulation analysis of CWMIDB
algorithm is obtained by considering the following performance metrics like, Packet delivery ratio and
Throughput
IV Packet Delivery Ratio (PDR)
Packet Delivery Ratio (PDR) is the ratio between the number of packets transmitted by a traffic source and the
number of packets received by a traffic sink. It measures the loss rate as seen by transport protocols and as such,
it characterizes both the correctness and efficiency of ad hoc routing protocols. In CWMIDB the packet
Delivery Ratio is high as 97.94%.
PDR is defined as the total amount of packets received by the receiver and amount of data packet sent by
source. The formula to calculate the packet delivery ratio is defined as follows,
PDR=[ ]* 100
Then by taking into the account number of sending packets, receiving packets and routing packets the graph is
plotted. Here, the packet delivery ratio gradually increases with time in CWMIDB. Here, the PDR of CWMIDB
is 97.94%.The Figure 4.1 shows the packet delivery ratio between CWMIDB and BEB.
Figure 4.1 Packet delivery ratio between CWMIDB and BEB
V Throughput analysis
It is the ratio of the total amount of data that reaches a receiver from a sender to the time it takes for the
receiver to get the last packet. When comparing the routing throughput by each of the node, AODV has the high
throughput. It measures of effectiveness of a routing protocol. The throughput value of CWMIDB algorithm is
high when compared to BEB. Here, the throughput ratio increases with increase in number of packets received.
Figure 4.2 Throughput comparison between CWMIDB and BEB
The Figure 7.2 shows the throughput comparison between CWMIDB and BEB. It shows that
CWMIDB has high throughput than BEB. The throughput percentage of CWMIDB is 97.14%
VI CONCLUSION AND FUTURE WORK
In this project, Contention Window based Multiplicative Increase Decrease backoff (CWMIDB) algorithm for
IEEE 802.11 based wireless networks is proposed. The main feature of this algorithm is to avoid channel
capture and to decrease the number of collisions. In this algorithm, the size of the contention window will not be
doubled immediately following a collision. Rather it increases by four times for first collision and decreases by
half for second collision and so on. The performance of the CWMIDB algorithm is very efficient especially
when basic access mechanism is employed under high congested environments as well as in Ad hoc networks.
The simulation result and analysis shows that Contention Window Multiplicative Increase Decrease Backoff
algorithm has higher efficiency with high packet delivery ratio and throughput than the Binary Exponential
Backoff algorithm.
CWMIDB can be extended further by taking into account the data transmission among number of nodes. If
number of node increases there is a slight deflection in the performance. The future work concentrates on the
reduction of collision by increasing the number of nodes. Integration of modified BEB and CWMIDB may
produce high throughput which may help in increasing the efficiency of CWMIDB.
REFERENCES
[1] Tatineni Madhavi, Gottapu SasiBhushanaRao, Development of Collision Alleviating DCF Protocol with
Efficient Backoff Algorithm for Wireless Ad hoc Networks. November 2014, 80:1791–1814.1.
[2] Sasi BhushanaRao, G., &Madhavi, T, Performance analysis of collision alleviating distributed coordination
function protocol in congested wireless networks - a Markov chain analysis, IET Networks, 2013, 2(4), 204–
213.
[3] Ibrahim Sayed Ahmad., Modified Binary Exponential Backoff Algorithm to Minimize Mobiles
Communication Time”, I.J. Information Technology and Computer Science, 2014, 20-29,.
[4] Xiangyu, P., Letian, J.,&Guozhi,X. Performance analysis of hybrid backoff algorithm of wireless
LAN.InProceedings of 5th international conference on WiCom, 2007, pp. 1853–1856.
[5] Sartthong, J., &Sittichivapak, S. Backoff algorithm optimization for IEEE802.11 wireless local area
networks. In Proceedings of ECTI-CON, 2012, pp. 1–4.
[6] Fan, J., Gao, F.,Wang,W. S., & Dong, G. F. Performance analysis of an adaptive backoff scheme for ad hoc
networks. In Proceedings of IEEE international conference on CIT, 2008, pp. 624–629.
[7] Albalt, M.,&Nasir, Q. Adaptive backoff algorithm for IEEE 802.11MAC protocol.International Journal of
Communications, Network and System Sciences, 2009, 2(4), 300–317.
[8] Babich, F.,&Comisso, M. Throughput and delay analysis of 802.11-based wireless networks using smart and
directional antennas. IEEE Transactions on Communications, 57(5), 2009, 1413–1423.
[9] Zhalehpoor, S., &ShahriarShahhoseini, H. SBA backoff algorithm to enhance the quality of service in
MANETs. In Proceedings of international conference on signal acquisition and processing, 2009, pp. 43–47.
[10] Chatzimisios, P., Boucouvalas, A., & Vitsas, V. Performance analysis of IEEE 802.11 DCF in presence of
transmission errors. In Proceedings of IEEE international conference on communications (7), 2004, pp. 3854–
3858.
[11] Fan, J., Gao, F.,Wang,W. S., & Dong, G. F. Performance analysis of an adaptive backoff scheme for ad hoc
networks. In Proceedings of IEEE international conference on CIT, 2008, pp. 624–629.
[12] Peng Xiangyu, Hybrid Backoff Algorithm based on DCF protocol. IEEE international conference on 2007,
1-4244-1312-5.
[8] Babich, F.,&Comisso, M. Throughput and delay analysis of 802.11-based wireless networks using smart and
directional antennas. IEEE Transactions on Communications, 57(5), 2009, 1413–1423.
[9] Zhalehpoor, S., &ShahriarShahhoseini, H. SBA backoff algorithm to enhance the quality of service in
MANETs. In Proceedings of international conference on signal acquisition and processing, 2009, pp. 43–47.
[10] Chatzimisios, P., Boucouvalas, A., & Vitsas, V. Performance analysis of IEEE 802.11 DCF in presence of
transmission errors. In Proceedings of IEEE international conference on communications (7), 2004, pp. 3854–
3858.
[11] Fan, J., Gao, F.,Wang,W. S., & Dong, G. F. Performance analysis of an adaptive backoff scheme for ad hoc
networks. In Proceedings of IEEE international conference on CIT, 2008, pp. 624–629.
[12] Peng Xiangyu, Hybrid Backoff Algorithm based on DCF protocol. IEEE international conference on 2007,
1-4244-1312-5.

More Related Content

What's hot

Medium access control unit 3-33
Medium access control  unit 3-33Medium access control  unit 3-33
12 multiple access
12 multiple access12 multiple access
12 multiple access
bheemsain
 
Common protocols
Common protocolsCommon protocols
Common protocols
Mr SMAK
 
Mac
MacMac
Mac
ravi4u
 
Mac
MacMac
Wierless networks ch3 (1)
Wierless networks ch3 (1)Wierless networks ch3 (1)
Wierless networks ch3 (1)
bheemsain
 
Snooping TCP
Snooping TCPSnooping TCP
Snooping TCP
Sushant Kushwaha
 
3.Medium Access Control
3.Medium Access Control3.Medium Access Control
3.Medium Access Control
Sonali Chauhan
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Pallepati Vasavi
 
The mac layer
The mac layerThe mac layer
The mac layer
aazamk
 
Ch12
Ch12Ch12
M.A.C (Medium Access Control)
M.A.C (Medium Access Control)M.A.C (Medium Access Control)
M.A.C (Medium Access Control)
JaironLanda
 
The medium access sublayer
 The medium  access sublayer The medium  access sublayer
The medium access sublayer
Lal Bahadur Gehlot
 
specialized-mac-sdmafdmatdma-and-cdma.pdf
specialized-mac-sdmafdmatdma-and-cdma.pdfspecialized-mac-sdmafdmatdma-and-cdma.pdf
specialized-mac-sdmafdmatdma-and-cdma.pdf
ianeroman
 
Csma protocols
Csma protocolsCsma protocols
Csma protocols
Manal Shah
 
Mac layer
Mac  layerMac  layer
Mac layer
Shubham Kansal
 
MAC seminar
MAC seminarMAC seminar
MAC seminar
Mridula Sharma
 
MOBILE COMPUTING
MOBILE COMPUTINGMOBILE COMPUTING
MOBILE COMPUTING
santosh kumar
 
Multiple access procedures
Multiple access proceduresMultiple access procedures
Multiple access procedures
abishajesus
 
Quality of Service for Video Streaming using EDCA in MANET
Quality of Service for Video Streaming using EDCA in MANETQuality of Service for Video Streaming using EDCA in MANET
Quality of Service for Video Streaming using EDCA in MANET
ijsrd.com
 

What's hot (20)

Medium access control unit 3-33
Medium access control  unit 3-33Medium access control  unit 3-33
Medium access control unit 3-33
 
12 multiple access
12 multiple access12 multiple access
12 multiple access
 
Common protocols
Common protocolsCommon protocols
Common protocols
 
Mac
MacMac
Mac
 
Mac
MacMac
Mac
 
Wierless networks ch3 (1)
Wierless networks ch3 (1)Wierless networks ch3 (1)
Wierless networks ch3 (1)
 
Snooping TCP
Snooping TCPSnooping TCP
Snooping TCP
 
3.Medium Access Control
3.Medium Access Control3.Medium Access Control
3.Medium Access Control
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
 
The mac layer
The mac layerThe mac layer
The mac layer
 
Ch12
Ch12Ch12
Ch12
 
M.A.C (Medium Access Control)
M.A.C (Medium Access Control)M.A.C (Medium Access Control)
M.A.C (Medium Access Control)
 
The medium access sublayer
 The medium  access sublayer The medium  access sublayer
The medium access sublayer
 
specialized-mac-sdmafdmatdma-and-cdma.pdf
specialized-mac-sdmafdmatdma-and-cdma.pdfspecialized-mac-sdmafdmatdma-and-cdma.pdf
specialized-mac-sdmafdmatdma-and-cdma.pdf
 
Csma protocols
Csma protocolsCsma protocols
Csma protocols
 
Mac layer
Mac  layerMac  layer
Mac layer
 
MAC seminar
MAC seminarMAC seminar
MAC seminar
 
MOBILE COMPUTING
MOBILE COMPUTINGMOBILE COMPUTING
MOBILE COMPUTING
 
Multiple access procedures
Multiple access proceduresMultiple access procedures
Multiple access procedures
 
Quality of Service for Video Streaming using EDCA in MANET
Quality of Service for Video Streaming using EDCA in MANETQuality of Service for Video Streaming using EDCA in MANET
Quality of Service for Video Streaming using EDCA in MANET
 

Similar to Shanmu-CONFERENCE PAPER

11.a review of improvement in tcp congestion control using route failure det...
11.a  review of improvement in tcp congestion control using route failure det...11.a  review of improvement in tcp congestion control using route failure det...
11.a review of improvement in tcp congestion control using route failure det...
Alexander Decker
 
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETsSimulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
IOSR Journals
 
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
partha pratim deb
 
Improving data transmission in the vanet using multi criteria decision making...
Improving data transmission in the vanet using multi criteria decision making...Improving data transmission in the vanet using multi criteria decision making...
Improving data transmission in the vanet using multi criteria decision making...
ijfcstjournal
 
Performance analysis and evaluation of IEEE 802.11 distributed coordination f...
Performance analysis and evaluation of IEEE 802.11 distributed coordination f...Performance analysis and evaluation of IEEE 802.11 distributed coordination f...
Performance analysis and evaluation of IEEE 802.11 distributed coordination f...
journalBEEI
 
Chapter_05_WLAN_MAC-Performance metrics.pptx
Chapter_05_WLAN_MAC-Performance metrics.pptxChapter_05_WLAN_MAC-Performance metrics.pptx
Chapter_05_WLAN_MAC-Performance metrics.pptx
msohail37
 
V.KARTHIKEYAN PUBLISHED ARTICLE AA
V.KARTHIKEYAN PUBLISHED ARTICLE AAV.KARTHIKEYAN PUBLISHED ARTICLE AA
V.KARTHIKEYAN PUBLISHED ARTICLE AA
KARTHIKEYAN V
 
4..[26 36]signal strength based congestion control in manet
4..[26 36]signal strength based congestion control in manet4..[26 36]signal strength based congestion control in manet
4..[26 36]signal strength based congestion control in manet
Alexander Decker
 
11.signal strength based congestion control in manet
11.signal strength based congestion control in manet11.signal strength based congestion control in manet
11.signal strength based congestion control in manet
Alexander Decker
 
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless NetworkQuadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
IJCI JOURNAL
 
Multiple Access ppt in Object Oriented Programming
Multiple Access ppt in Object Oriented ProgrammingMultiple Access ppt in Object Oriented Programming
Multiple Access ppt in Object Oriented Programming
arnavytstudio2814
 
A New MultiChannel MAC Protocol With On-Demand Channel Assignment For Multi-H...
A New MultiChannel MAC Protocol With On-Demand Channel Assignment For Multi-H...A New MultiChannel MAC Protocol With On-Demand Channel Assignment For Multi-H...
A New MultiChannel MAC Protocol With On-Demand Channel Assignment For Multi-H...
Wendy Hager
 
Seamless and Secured wide Fidelity enhancement in moving vehicles Using Eeack...
Seamless and Secured wide Fidelity enhancement in moving vehicles Using Eeack...Seamless and Secured wide Fidelity enhancement in moving vehicles Using Eeack...
Seamless and Secured wide Fidelity enhancement in moving vehicles Using Eeack...
International journal of scientific and technical research in engineering (IJSTRE)
 
Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...
Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...
Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...
IJCSEIT Journal
 
B031201016019
B031201016019B031201016019
B031201016019
ijceronline
 
Ijcnc050203
Ijcnc050203Ijcnc050203
Ijcnc050203
IJCNCJournal
 
DYNAMIC CURATIVE MECHANISM FOR GEOGRAPHIC ROUTING IN WIRELESS MULTIMEDIA SENS...
DYNAMIC CURATIVE MECHANISM FOR GEOGRAPHIC ROUTING IN WIRELESS MULTIMEDIA SENS...DYNAMIC CURATIVE MECHANISM FOR GEOGRAPHIC ROUTING IN WIRELESS MULTIMEDIA SENS...
DYNAMIC CURATIVE MECHANISM FOR GEOGRAPHIC ROUTING IN WIRELESS MULTIMEDIA SENS...
csandit
 
Mac protocol for wmn
Mac protocol for wmnMac protocol for wmn
Mac protocol for wmn
mmjalbiaty
 
Transport laye
Transport laye Transport laye
Transport laye
Sammer Qader
 
ch24-congestion-control-and-quality-of-service.ppt
ch24-congestion-control-and-quality-of-service.pptch24-congestion-control-and-quality-of-service.ppt
ch24-congestion-control-and-quality-of-service.ppt
praveenkulkarni55
 

Similar to Shanmu-CONFERENCE PAPER (20)

11.a review of improvement in tcp congestion control using route failure det...
11.a  review of improvement in tcp congestion control using route failure det...11.a  review of improvement in tcp congestion control using route failure det...
11.a review of improvement in tcp congestion control using route failure det...
 
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETsSimulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
 
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
 
Improving data transmission in the vanet using multi criteria decision making...
Improving data transmission in the vanet using multi criteria decision making...Improving data transmission in the vanet using multi criteria decision making...
Improving data transmission in the vanet using multi criteria decision making...
 
Performance analysis and evaluation of IEEE 802.11 distributed coordination f...
Performance analysis and evaluation of IEEE 802.11 distributed coordination f...Performance analysis and evaluation of IEEE 802.11 distributed coordination f...
Performance analysis and evaluation of IEEE 802.11 distributed coordination f...
 
Chapter_05_WLAN_MAC-Performance metrics.pptx
Chapter_05_WLAN_MAC-Performance metrics.pptxChapter_05_WLAN_MAC-Performance metrics.pptx
Chapter_05_WLAN_MAC-Performance metrics.pptx
 
V.KARTHIKEYAN PUBLISHED ARTICLE AA
V.KARTHIKEYAN PUBLISHED ARTICLE AAV.KARTHIKEYAN PUBLISHED ARTICLE AA
V.KARTHIKEYAN PUBLISHED ARTICLE AA
 
4..[26 36]signal strength based congestion control in manet
4..[26 36]signal strength based congestion control in manet4..[26 36]signal strength based congestion control in manet
4..[26 36]signal strength based congestion control in manet
 
11.signal strength based congestion control in manet
11.signal strength based congestion control in manet11.signal strength based congestion control in manet
11.signal strength based congestion control in manet
 
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless NetworkQuadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
 
Multiple Access ppt in Object Oriented Programming
Multiple Access ppt in Object Oriented ProgrammingMultiple Access ppt in Object Oriented Programming
Multiple Access ppt in Object Oriented Programming
 
A New MultiChannel MAC Protocol With On-Demand Channel Assignment For Multi-H...
A New MultiChannel MAC Protocol With On-Demand Channel Assignment For Multi-H...A New MultiChannel MAC Protocol With On-Demand Channel Assignment For Multi-H...
A New MultiChannel MAC Protocol With On-Demand Channel Assignment For Multi-H...
 
Seamless and Secured wide Fidelity enhancement in moving vehicles Using Eeack...
Seamless and Secured wide Fidelity enhancement in moving vehicles Using Eeack...Seamless and Secured wide Fidelity enhancement in moving vehicles Using Eeack...
Seamless and Secured wide Fidelity enhancement in moving vehicles Using Eeack...
 
Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...
Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...
Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...
 
B031201016019
B031201016019B031201016019
B031201016019
 
Ijcnc050203
Ijcnc050203Ijcnc050203
Ijcnc050203
 
DYNAMIC CURATIVE MECHANISM FOR GEOGRAPHIC ROUTING IN WIRELESS MULTIMEDIA SENS...
DYNAMIC CURATIVE MECHANISM FOR GEOGRAPHIC ROUTING IN WIRELESS MULTIMEDIA SENS...DYNAMIC CURATIVE MECHANISM FOR GEOGRAPHIC ROUTING IN WIRELESS MULTIMEDIA SENS...
DYNAMIC CURATIVE MECHANISM FOR GEOGRAPHIC ROUTING IN WIRELESS MULTIMEDIA SENS...
 
Mac protocol for wmn
Mac protocol for wmnMac protocol for wmn
Mac protocol for wmn
 
Transport laye
Transport laye Transport laye
Transport laye
 
ch24-congestion-control-and-quality-of-service.ppt
ch24-congestion-control-and-quality-of-service.pptch24-congestion-control-and-quality-of-service.ppt
ch24-congestion-control-and-quality-of-service.ppt
 

Shanmu-CONFERENCE PAPER

  • 1. AN EFFECTIVE BACKOFF ALGORITHM FOR COLLISION REDUCTION IN MANET R.K. Shanmugasundaram, S. Vaidheeswaran BTECH, B.S Abdur Rahman University, Vandalur, Tamilnadu, (India) Professor, Dr.N. Sabiyath Fatima, Dept of CSE, B.S Abdur Rahman University, Vandalur, Tamilnadu, (India) ABSTRACT In Mobile Ad-hoc Networks (MANETS), every node performs both as transmitter and receiver. The existing backoff models do not accurately predict the performance of the wireless network. Also, the existing models suffer with high packet collisions. Whenever a collision occurs, the contention window (CW) of the station is doubled until it reaches the maximum value. The main objective of this project is to reduce collision using contention window Multiplicative Increase Decrease Backoff (CWMIDB) scheme. The purpose of increasing CW is to reduce the collision probability by distributing the traffic into a larger time space. In wireless Ad hoc networks, the CWMIDB algorithm dynamically controls the contention window of the nodes experiencing collisions. During packet transmission, the backoff counter is uniformly selected from the given range of [0, CW-1]. Here, CW is known as contention window and its value depends on the number of failed transmissions for the packet. At the first transmission attempt, CW is set to minimum value (Cmin), if transmission attempt fails then its value gets doubled, and again set to minimum value on successful transmission. CWMIDB is simulated in NS2 environment and its performance is compared with Binary Exponential Backoff Algorithm. The simulation results shows improvement in transmission probability compared to that of the existing backoff algorithm. Keywords— backoff, MANET, contention window,CWMIDB. I. INTRODUCTİON Mobile Ad Network (MANET) is an infrastructure-less dynamic network without fixed routers. All nodes are capable of moving and can be connected dynamically. The responsibilities for organizing and controlling the network are distributed among the terminals themselves. The entire network is mobile, in this type of network, some pairs of terminals may not be able to communicate directly with each other and relaying of some messages is required so that they are delivered to their destinations. The main drawback of MANET is energy conservation. Energy consumption increases due to packet loss. This packet loss occurs due to collision between the nodes during transmission of data. For wireless networks, the devices operating on battery try to pursue the energy efficiently by reducing the energy they consume, while data transmission. The features of MANET introduce several challenges. These include, collision due to transmission errors. This system breaks down when two computers attempt to transmit at the same time. This is a case of collision. To avoid collision, carrier sensing mechanism is used. Here each computer listens to the network before attempting to transmit. If the network is busy, it waits until network quiets down. In carrier detection, computers continue to listen to the network as they transmit. If computer detects another signal that interferes with the signal it is sending, it stops
  • 2. transmitting. Both computers then wait for random amount of time and attempt to transmit. A collision can be detected by listening to the shared medium immediately after transmitting and identifying collision characteristics; or by capturing data from the medium and performing error detection.An alternative method to handle collisions in a contention based system is to attempt to avoid them. Some systems may utilize a strict scheduling guideline to identify who may use which resources another system may have the senders listen to the channel immediately prior to transmitting and determine suitable times to transmit. The purpose of using CWMIDB algorithm in IEEE 802.11 is to minimize collisions during contention between multiple nodes and also in the presence of hidden nodes. This is a very simple backoff algorithm in which the size of the contention window increases and decreases rather than increasing exponentially. The basic operation of the MAC protocol is by successive Frame Exchange Sequences (FES) RTS-CTS-DATA-ACK as in 802.11 DCF. Each transmitter before attempting to transmit must find the carrier to be idle for a time period of Distributed Inter-Frame Spacing (DIFS) seconds. After deferring for the DIFS period the station selects a back off value for an additional deferral time before transmitting. This back off period corresponds to an integer number of time slots of the protocol and is selected based on Contention Window Multiplicative Increase Decrease Backoff Algorithm. When some other transmission is detected the back off procedure pauses and starts over when the medium is found to be idle for one DIFS period. If collision occurs, then the stations that were involved have to restart the access procedure with DIFS period and new back off value. II. AN EFFECTIVE BACKOFF ALGORITHM FOR COLLISION REDUCTION IN MANET The major problem in MANET is degradation in throughput because of node mobility, unreliable medium, interference and route failure. The degradation in throughput is because MANET is unable to distinguish packet loss. The packet loss occurs due to hidden node and congestion. This problem can be solved by using certain backoff scheme. The backoff algorithm is a part of Media Access Control (MAC) protocol which is used to avoid collision in Mobile Ad hoc Network (MANET). When the nodes in the network try to access the channel, one of these nodes gains access the channel while the other nodes still contend for a time period. Collision occurs in mobile ad-hoc networks when the node chooses the same value for data transmission. In Figure 3.1, A and B are two nodes. During the transmission of data between these two nodes, collision occurs. After receiving the collision signal, transmission is stopped from A and B. They will try to retransmit, since there is no restriction. Figure 2.1 Collision Problem
  • 3. To overcome from the problem of collision, a new Contention Window Multiplicative Increase Decrease Backoff scheme is proposed. CWMIDB provides minimum transmission delay and maximum throughput by improving collision. This collision can be improved by certain mechanism. In the existing Binary Exponential Backoff algorithm, for each packet transmission, the backoff time is uniformly chosen in the range (0, W-1) where W is the initial contention window size. When the packet transmission is not successful the node increases the contention window size, so the node has to sense the channel for long period of time. Due to this throughput of the wireless network decreases automatically. The average delay required for the packet delivery increases. Figure 2.2 Backoff Concept The Contention Window Multiplicative Increase Decrease Backoff Algorithm (CWMIDB) consist of three phases, they are Identification of channel idleness, Setting up Backoff Counter, Performance comparison of CWMIDB & Binary Exponential Backoff Algorithm. The steps for Contention Window Multiplicative Increase Decrease Backoff Algorithm is implemented as follows, CW = min [4*CW, CWmax] --------- (2.1) The equation 2.2 describes that size of the contention window increase by four times during collision CW = CWmin ------------------ (2.2) The equation 2.2 describes that size of the contention window decrease during successful transmission The CWMIDB algorithm steps are discussed Step 1: Initially source node sends data when channel is in idle state until the destination is reached. The data transmission process consists of two states namely idle and non-idle state. Step 2: In Figure 2.3 S,A,B,D are nodes where S is source node and D is destination node, This node check for idleness, if channel is in idle state, then it transfers the data to destination. If channel is not idle then it waits for random backoff time. Figure 2.3 A Scenario of Collision Detection
  • 4. Step 3: When random backoff time value reaches zero it will transmit packet again to the destination. Step 4: If the frame is correctly received, the receiving node sends an acknowledgment (ACK) frame to sender. If ACK is not received, the size of the contention window size increases and retransmit packet again to the destination. Step 4.1: During successful transmission, the size of the contention window decreases to minimum. Step 4.2: During the second transmission attempt, the size of contention window increases exponentially by CW = CW x 4. Step 5: During third transmission attempt, the size of the contention window decreases by CW = current value of CW / 2 Step 6: If acknowledgement is received, go to step1. Step 7: Stop III Pseudocode for CWMIDB algorithm during successful transmission Step 1: Set BackOff Timer to initial value Step 2: While BackOff Timer ≠ 0 do For each Time Slot If channel is idle then BackOff Timer = BackOff Timer – 1 If channel is idle for more than DIFS then Send If (Send Failure) then If (NumberOfBackoffs<=W) then CW= CW * K Else if (NumberOfBackoffs>=W) CW= CW / K BackOffTimer = Random x; 1 ≤ x ≤ CW -1 Else CW = CW - 1 BackOffTimer = 0 Go to Step 1 Step 3: Stop [Where DIFS – Distributed Inter-Frame Spacing CW-Contention Window] /* Channel idleness process*/ When idle MinCW=32; MaxCW=256; Backoff range = [0,CW]; /*During Successful Transmission*/ MinCW=32; MaxCW=256, 1024; Backoff range = [0,CW];
  • 5. if (success) node's CW = MinCW; node's BC = randomly select (0, MinCW); end if /*During Packet Collision*/ MinCW=32; MaxCW=256, 1024; Backoff range = [0,CW]; if (collision), node's CW = min(4*currentCW, MaxCW); node's BC = randomly select (0, newCW); end 3.1 Channel Idleness phase In channel idleness phase every node must sense the medium, in order to check the state of the channel (idle or busy). If a node has data to send, but it sees that the channel is busy, then it waits for the end of transmission. At the end of transmission, it must wait for a DIFS. The back off time counter continuously gets decremented until the channel is sensed in an “Idle” state. It goes in “Frozen” State when a transmission is detected on the channel and it goes to the reactivated state when the channel is sensed idle again for more than a DFIS. As soon as the back-off time reaches zero the station starts the transmission. If two or more wireless nodes finish their countdowns at the same time-slot, there occurs a collision between RTS (ready to send) packets if the CSMA/CA (carrier sense multiple access with collision avoidance) is implemented, otherwise two data packets collide with each other. If there is a collision, every node which participated in the collision multiplies its contention window by the multiplicative factor m. Figure 3.1 IDLE Procedure Finite State Representation In Figure 3.1, the contention period can be determined by the CWMIDB algorithm. It increments the appropriate retry counter associated with the frame. The CWMID Backoff mechanism chooses a random number which represents the amount of time must elapse while there are not any transmissions, i.e., the medium is idle before the listening station may attempt to begin its transmission again. The random number resulting from this algorithm is uniformly distributed in a range, called the contention window, the size of which increases with every attempt to transmit that is deferred, until a maximum size is reached for the range. Once a transmission is successfully completed, the range is reduced to its minimum value for the Next transmission.
  • 6. 3.2 Backoff Counter Phase In backoff counter phase, it attempts to double the contention window size during collision .Set the backoff counter (BOC) between 0 and CWlow. Decrement the BOC by 1 if the channel is idle. If BOC reaches zero, transmit the data frame. If acknowledgment is received then, transmit the next data frame. If the acknowledgement is not received select the BOC between 0 and CW in the next backoff stage as For second transmission attempt, CW = CW x 4. For third transmission attempt, CW = current value of CW / 2. For fourth transmission attempt, CW = current value of CW X 4. For fifth transmission attempt, CW = current value of CW / 2 and so on. If contention window is high, it will select the BOC between 0 and CW in the current backoff stage. Figure 3.2 BACKOFF Procedure Finite State Representation. The Figure 3.2 depicts the backoff procedure for finite state representation.To prevent all nodes sensing the channel from beginning of the transmission at the same time, each node chooses a random waiting time called Backoff before starting transmission. The range from which the Backoff value is chosen is called the Contention Window (CW). If the channel becomes busy during Backoff, Backoff counter decrementing is stopped until the channel becomes idle again. For example, let us assume that the current backoff stage is ‘i’ with contention windowCW( i ) = 4i * CWmin , and there is a successful transmission, the next backoff stage will be stage 0 with contention window CW( 0 ) = 31 according to the specification. But if the number of competing nodes is large enough (>>31), the new collision will likely occur at the backoff stage 0. The main argument is that since the current backoff stage is ‘i’ some collision must have occurred recently at the previous stage. Now if the number of current competing nodes is larger than or close to CW( i ), and if the backoff stage is set to 0, there is a high probability that new Collision will happen. So resetting the contention window after every successful transmission is an inefficient approach if the number of nodes is large. 3.3 PERFORMANCE COMPARISON OF CWMIDB AND BEB Here in this project performance comparison is done with CWMIDB and Binary Exponential Backoff (BEB) . This performance comparison is done by taking into the account the performance metrics like packet delivery ratio (PDR), Energy, Throughput. While making comparison CWMIDB is proven to be highly energy conservation and efficient one than other.
  • 7. The characteristics of NS2 parameter like throughput, packet information, etc can be plotted using trace graph. The following Table 7.2 illustrates the comparison of various performance metrices like Packet Delivery Ratio (PDR), Energy and throughput. These metrices are calculated by taking in to the account the number of sending packets, number of receiving packets at destination and considerably the number of routing packets which is generated in the trace file. The packet delivery ratio (PDR) of CWMIDB gradually increases from 10.28 percent to 91.92 percent. The PDR ratio is high because CWMIDB send the packets by increasing and decreasing the contention window size. CWMIDB initially increases and then decreases. The simulation analysis of CWMIDB algorithm is obtained by considering the following performance metrics like, Packet delivery ratio and Throughput IV Packet Delivery Ratio (PDR) Packet Delivery Ratio (PDR) is the ratio between the number of packets transmitted by a traffic source and the number of packets received by a traffic sink. It measures the loss rate as seen by transport protocols and as such, it characterizes both the correctness and efficiency of ad hoc routing protocols. In CWMIDB the packet Delivery Ratio is high as 97.94%. PDR is defined as the total amount of packets received by the receiver and amount of data packet sent by source. The formula to calculate the packet delivery ratio is defined as follows, PDR=[ ]* 100 Then by taking into the account number of sending packets, receiving packets and routing packets the graph is plotted. Here, the packet delivery ratio gradually increases with time in CWMIDB. Here, the PDR of CWMIDB is 97.94%.The Figure 4.1 shows the packet delivery ratio between CWMIDB and BEB. Figure 4.1 Packet delivery ratio between CWMIDB and BEB V Throughput analysis It is the ratio of the total amount of data that reaches a receiver from a sender to the time it takes for the receiver to get the last packet. When comparing the routing throughput by each of the node, AODV has the high throughput. It measures of effectiveness of a routing protocol. The throughput value of CWMIDB algorithm is high when compared to BEB. Here, the throughput ratio increases with increase in number of packets received.
  • 8. Figure 4.2 Throughput comparison between CWMIDB and BEB The Figure 7.2 shows the throughput comparison between CWMIDB and BEB. It shows that CWMIDB has high throughput than BEB. The throughput percentage of CWMIDB is 97.14% VI CONCLUSION AND FUTURE WORK In this project, Contention Window based Multiplicative Increase Decrease backoff (CWMIDB) algorithm for IEEE 802.11 based wireless networks is proposed. The main feature of this algorithm is to avoid channel capture and to decrease the number of collisions. In this algorithm, the size of the contention window will not be doubled immediately following a collision. Rather it increases by four times for first collision and decreases by half for second collision and so on. The performance of the CWMIDB algorithm is very efficient especially when basic access mechanism is employed under high congested environments as well as in Ad hoc networks. The simulation result and analysis shows that Contention Window Multiplicative Increase Decrease Backoff algorithm has higher efficiency with high packet delivery ratio and throughput than the Binary Exponential Backoff algorithm. CWMIDB can be extended further by taking into account the data transmission among number of nodes. If number of node increases there is a slight deflection in the performance. The future work concentrates on the reduction of collision by increasing the number of nodes. Integration of modified BEB and CWMIDB may produce high throughput which may help in increasing the efficiency of CWMIDB. REFERENCES [1] Tatineni Madhavi, Gottapu SasiBhushanaRao, Development of Collision Alleviating DCF Protocol with Efficient Backoff Algorithm for Wireless Ad hoc Networks. November 2014, 80:1791–1814.1. [2] Sasi BhushanaRao, G., &Madhavi, T, Performance analysis of collision alleviating distributed coordination function protocol in congested wireless networks - a Markov chain analysis, IET Networks, 2013, 2(4), 204– 213. [3] Ibrahim Sayed Ahmad., Modified Binary Exponential Backoff Algorithm to Minimize Mobiles Communication Time”, I.J. Information Technology and Computer Science, 2014, 20-29,. [4] Xiangyu, P., Letian, J.,&Guozhi,X. Performance analysis of hybrid backoff algorithm of wireless LAN.InProceedings of 5th international conference on WiCom, 2007, pp. 1853–1856. [5] Sartthong, J., &Sittichivapak, S. Backoff algorithm optimization for IEEE802.11 wireless local area networks. In Proceedings of ECTI-CON, 2012, pp. 1–4. [6] Fan, J., Gao, F.,Wang,W. S., & Dong, G. F. Performance analysis of an adaptive backoff scheme for ad hoc networks. In Proceedings of IEEE international conference on CIT, 2008, pp. 624–629. [7] Albalt, M.,&Nasir, Q. Adaptive backoff algorithm for IEEE 802.11MAC protocol.International Journal of Communications, Network and System Sciences, 2009, 2(4), 300–317.
  • 9. [8] Babich, F.,&Comisso, M. Throughput and delay analysis of 802.11-based wireless networks using smart and directional antennas. IEEE Transactions on Communications, 57(5), 2009, 1413–1423. [9] Zhalehpoor, S., &ShahriarShahhoseini, H. SBA backoff algorithm to enhance the quality of service in MANETs. In Proceedings of international conference on signal acquisition and processing, 2009, pp. 43–47. [10] Chatzimisios, P., Boucouvalas, A., & Vitsas, V. Performance analysis of IEEE 802.11 DCF in presence of transmission errors. In Proceedings of IEEE international conference on communications (7), 2004, pp. 3854– 3858. [11] Fan, J., Gao, F.,Wang,W. S., & Dong, G. F. Performance analysis of an adaptive backoff scheme for ad hoc networks. In Proceedings of IEEE international conference on CIT, 2008, pp. 624–629. [12] Peng Xiangyu, Hybrid Backoff Algorithm based on DCF protocol. IEEE international conference on 2007, 1-4244-1312-5.
  • 10. [8] Babich, F.,&Comisso, M. Throughput and delay analysis of 802.11-based wireless networks using smart and directional antennas. IEEE Transactions on Communications, 57(5), 2009, 1413–1423. [9] Zhalehpoor, S., &ShahriarShahhoseini, H. SBA backoff algorithm to enhance the quality of service in MANETs. In Proceedings of international conference on signal acquisition and processing, 2009, pp. 43–47. [10] Chatzimisios, P., Boucouvalas, A., & Vitsas, V. Performance analysis of IEEE 802.11 DCF in presence of transmission errors. In Proceedings of IEEE international conference on communications (7), 2004, pp. 3854– 3858. [11] Fan, J., Gao, F.,Wang,W. S., & Dong, G. F. Performance analysis of an adaptive backoff scheme for ad hoc networks. In Proceedings of IEEE international conference on CIT, 2008, pp. 624–629. [12] Peng Xiangyu, Hybrid Backoff Algorithm based on DCF protocol. IEEE international conference on 2007, 1-4244-1312-5.