Abstract
In this paper, we study the characteristics of two different backoff schemes: one that maximizes the channel utilization and one that maximizes the probability of a successful transmission. Our results indicate that while the latter provides slightly lower channel utilization, its shape is much less sensitive to the number of contending nodes. That is, the channel utilization is kept almost constant for a very wide range of node densities if the backoff distribution has increasing shape. This motivates us to propose a simple heuristic backoff scheme called the Truncated Geometric Backoff Distribution (TGBD). We provide simple analytical expressions for the probability of a successful transmission and the channel utilization. We also show that the TGBD can easily be extended to support service differentiation by adjusting the window lengths, and we provide a simple approximation that gives the relative share of the capacity for a node in a priority class compared to nodes in other classes. This extended backoff scheme easily outperforms the much more complex Quality of Service (QoS) standard, IEEE802.11e EDCA. Finally, a two-stage backoff model, based on the TGBD, is proposed that further increases the probability of a successful transmission. Results indicate that the channel utilization is almost independent of the number of contending nodes.
Similar content being viewed by others
References
Broadband radio access networks (BRAN); high performance radio local area network (HIPERLAN) type 1; functional specification. Number EN300 652 V1.2.1 ed. ETSI, Sophia Antipolis Cedex, France, July 1998.
Anouar, H., & Bonnet, C. (2007). Optimal constant-window backoff scheme for IEEE 802.11 DCF in single-hop networks under finite load conditions. Wireless Personal Communications, 43(4), 1583–1602.
Bononi, L., Conti, M., & Gregori, E. (2004). Runtime optimization of IEEE 802.11 wireless LANs performance. IEEE Transactions on Parallel and Distributed Systems, 15(1), 66–80.
Bruno, R., Conti, M., & Gregori, E. (2003). Optimal capacity of p-persistent CSMA protocols. IEEE Communications Letters, 7(3), 139–141.
Calì, F., Conti, M., & Gregori, E. (2000). Dynamic tuning of the IEEE 802.11 protocol to achieve a theoretical throughput limit. IEEE/ACM Transactions on Networking, 8(6), 785–799.
Cole, T. (Ed.) (2005). IEEE standard 802.11e: wireless LAN medium access control (MAC) and physical layer (PHY) specifications, amendment 8: medium access control (MAC) quality of service enhancements. New York: IEEE.
Kleinrock, L., & Tobagi, F. A. (1975). Packet switching in radio channels, part I: carrier sense multiple-access modes and their throughput-delay characteristics. IEEE Transactions on Communications, 23(12), 1400–1416.
Kumar, A., Altman, E., Miorandi, D., & Goyal, M. (2007). New insights from a fixed-point analysis of single cell ieee 802.11 wlans. IEEE/ACM Transactions on Networking, 15(3), 588–601.
Nieminen, J., Björkbom, M., Jäntti, R., & Eriksson, L. (2012). Multichannel communications in wireless automation: Interdependencies between communication and control parameters. International Journal of Distributed Sensor Networks, 2012(1).
O’Hara, B. (Ed.) (1999). IEEE standard 802.11: wireless LAN medium access control (MAC) and physical layer (PHY) specifications. New York: IEEE.
Sarker, J., & Mouftah, H. (2011). A self-optimized random access protocol for an infrastructure-less mission critical wireless networking system. Telecommunication Systems. doi:10.1007/s11235-011-9490-8.
Sthapit, P., & Pyun, J.-Y. (2011). Medium reservation based sensor mac protocol for low latency and high energy efficiency. Telecommunication Systems. doi:10.1007/s11235-011-9551-z.
Tay, Y. C., Jamieson, K., & Balakrishnan, H. (2004). Collision-minimizing CSMA and its applications to wireless sensor networks. IEEE Journal on Selected Areas in Communications, 22(6), 988–1004.
Wikstrand, G., Nilsson, T., & Dougherty, M. (2008). Prioritized repeated eliminations multiple access: a novel protocol for wireless networks. In IEEE INFOCOM 2008 (Vol. 27, pp. 1561–1569). New York: IEEE.
Wong, Y.-S., Chen, Y.-S., Deng, D.-J., & Huang, D.-C. (2011). Nonpreemptive priority scheme for the S-MAC protocol in multimedia mobile sensor networks. Telecommunication Systems. doi:10.1007/s11235-011-9571-8.
Xu, S., & Saadawi, T. (2001). Does the IEEE 802.11 MAC protocol work well in multihop wireless ad hoc networks? IEEE Communications Magazine, 39(6), 130–137.
Yang, X., & Vaidya, N. H. (2006). A wireless mac protocol using implicit pipelining. IEEE Transactions on Mobile Computing, 5, 258–273.
Li, Y., Long, K.-P., Zhao, W.-L., & Chen, Q.-B. (2006). A novel random backoff algorithm to enhance the performance of IEEE 802.11 DCF. Wireless Personal Communications, 36, 29–44.
Acknowledgements
The authors wish to thank Professor Lennart Bondesson, Umeå University, for help with the modeling of the backoff distributions and for providing valuable feedback on the manuscript. This work was started when the first author was with the Department of Computing Science, Umeå University, Sweden.
Author information
Authors and Affiliations
Corresponding author
Appendix
Appendix
1.1 8.1 Expected idle time in the priority extension
Here we give the full derivation of the expected number of idle slots before the winner in any priority class transmits.
To find the expected number of idle slots we first consider the distribution of Z,
We are only interested in the cases when there is at least one priority class having more than one node. Similarly as before, one solution is to condition on that there is at least one priority class with a positive number of nodes, i.e. N 1+N 2+⋯+N M >0, we get
where N=N 1+N 2+⋯+N M . Then it follows that the expected length until a winner transmits, with L mx =max(L 1,…,L M ), is
1.2 8.2 Model of the two-stage backoff
In this section we derive the channel utilization of the two-stage backoff model. We start by deriving the full distribution of the number of winners in the TGBD stage (first stage) and then continue with the uniform backoff stage (second stage).
1.2.1 8.2.1 First stage backoff
To analyze the two-stage backoff, we first need to find the full distribution of the number of nodes from each priority class that selects the minimal backoff. This distribution is easily obtained in the non-Poisson case, we have due to independence between classes and nodes,
Now assume that the number of nodes in each priority class is Poisson distributed, i.e. N l ∼Po(λ l ) then the probability for y 1,y 2,…,y M winners is
and with \(P(X_{j,l}' = x) = pq^{\max(L_{l} - x,0)}\) for x=1,2,…,L l , \(P(X_{j,l}' = x) = 0\) for x>L l , \(P(X_{j,l}' = 0) = q^{L_{l}}\) and \(P(X_{j,l}' > x) = 1 - q^{\max(L_{l} - x,0)}\). By careful standard manipulations and using that \((\lambda_{l}^{n_{l}}/{n_{l}}!)\binom{n_{l}}{y_{l}}=\lambda_{l}^{n_{l}}/(y_{l}!(n_{l}-y_{l})!)\) and summing over n l −y l instead of n l , this expression simplifies to, if y 1+⋯+y M >0,
We also have P(Y 1=0,…,Y M =0)=0. The summation bound, L bound , is defined as follows
If y 1≥1, then the winners must select one of the slots 0,1,…,L 1. However, if y 1=0,y 2≥1 then the winners may also select the additional slots L 1,L 1+1,…,L 2, provided that priority class 1 has zero nodes. We finally get
1.2.2 8.2.2 Second stage backoff
Now we continue with the analysis of the second backoff stage. Let \(m_{l} = \#\{j, X_{j,l}' = Z\}\), i.e. the number of nodes selecting the minimal backoff time in priority class l, in the first backoff stage. First we will look at the probability of a single winner in the second stage, given that m 1,m 2,…,m M nodes remain from the first backoff stage. Let Q j,l ∼U{0,1,…,K−1}, j=1,2,…,m l and \(V_{l} = \min{(Q_{1,l},Q_{2,l},\dots,Q_{m_{l},l})}\). Furthermore, let V=min(V 1,V 2,…,V M ) and W=#{(j,l),Q j,l =V}, i.e. the number of nodes selecting the minimal backoff in the second backoff stage. There can be w winners on slot 0,2,…,K−1 and the total probability becomes
If w winners select the minimal backoff time, then the remaining \(\sum_{l=1}^{M} m_{l} -w\) nodes must select a larger backoff. These w winners can be chosen in \(\binom{m_{1}+\cdots+m_{M}}{w}\) different ways. We are only interested in the case of a single winner and that probability is,
Let p l (m 1,…,m M ) denote the probability to have a single winner from priority class l and this probability is,
where \(m_{l}/{\sum_{l=1}^{M} m_{l}}\) is the fraction of nodes belonging to priority class l. The expected length of the second backoff stage can easily be computed through the distribution function of V. We have,
Let ω(m 1,…,m M ) denote the expected length of the second backoff stage and is given by
To compute the success probability of having a single winner in the second backoff stage then every combination of winners from the priority classes must be considered. However, theoretically there can be a very large number of winners from each priority class since the number of nodes is Poisson distributed, i.e. we have
However, the probability of having a large number of winners is very small, i.e. most of the probability mass is found in the region where y 1,…,y M are relatively small.
Let p s,l denote the success probability of having a single winner from priority class l. This probability is given by
where R l ⪆10. Let μ denote the expected length of the second backoff stage. This length is given by
Note that the expressions for p s,l and μ quickly become unwieldy when the number of priority classes increases. However, in this work we are only considering a few number of priority classes. Now we can derive the channel utilization for the two-stage backoff model, we have
where B is the time for transmitting a short burst.
Rights and permissions
About this article
Cite this article
Nilsson, T., Jäntti, R. Generic stationary backoff distributions for distributed multiple access control. Telecommun Syst 56, 383–398 (2014). https://doi.org/10.1007/s11235-013-9851-6
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11235-013-9851-6