Skip to main content
Log in

Generic stationary backoff distributions for distributed multiple access control

  • Published:
Telecommunication Systems Aims and scope Submit manuscript

Abstract

In this paper, we study the characteristics of two different backoff schemes: one that maximizes the channel utilization and one that maximizes the probability of a successful transmission. Our results indicate that while the latter provides slightly lower channel utilization, its shape is much less sensitive to the number of contending nodes. That is, the channel utilization is kept almost constant for a very wide range of node densities if the backoff distribution has increasing shape. This motivates us to propose a simple heuristic backoff scheme called the Truncated Geometric Backoff Distribution (TGBD). We provide simple analytical expressions for the probability of a successful transmission and the channel utilization. We also show that the TGBD can easily be extended to support service differentiation by adjusting the window lengths, and we provide a simple approximation that gives the relative share of the capacity for a node in a priority class compared to nodes in other classes. This extended backoff scheme easily outperforms the much more complex Quality of Service (QoS) standard, IEEE802.11e EDCA. Finally, a two-stage backoff model, based on the TGBD, is proposed that further increases the probability of a successful transmission. Results indicate that the channel utilization is almost independent of the number of contending nodes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Broadband radio access networks (BRAN); high performance radio local area network (HIPERLAN) type 1; functional specification. Number EN300 652 V1.2.1 ed. ETSI, Sophia Antipolis Cedex, France, July 1998.

  2. Anouar, H., & Bonnet, C. (2007). Optimal constant-window backoff scheme for IEEE 802.11 DCF in single-hop networks under finite load conditions. Wireless Personal Communications, 43(4), 1583–1602.

    Article  Google Scholar 

  3. Bononi, L., Conti, M., & Gregori, E. (2004). Runtime optimization of IEEE 802.11 wireless LANs performance. IEEE Transactions on Parallel and Distributed Systems, 15(1), 66–80.

    Article  Google Scholar 

  4. Bruno, R., Conti, M., & Gregori, E. (2003). Optimal capacity of p-persistent CSMA protocols. IEEE Communications Letters, 7(3), 139–141.

    Article  Google Scholar 

  5. Calì, F., Conti, M., & Gregori, E. (2000). Dynamic tuning of the IEEE 802.11 protocol to achieve a theoretical throughput limit. IEEE/ACM Transactions on Networking, 8(6), 785–799.

    Article  Google Scholar 

  6. Cole, T. (Ed.) (2005). IEEE standard 802.11e: wireless LAN medium access control (MAC) and physical layer (PHY) specifications, amendment 8: medium access control (MAC) quality of service enhancements. New York: IEEE.

    Google Scholar 

  7. Kleinrock, L., & Tobagi, F. A. (1975). Packet switching in radio channels, part I: carrier sense multiple-access modes and their throughput-delay characteristics. IEEE Transactions on Communications, 23(12), 1400–1416.

    Article  Google Scholar 

  8. Kumar, A., Altman, E., Miorandi, D., & Goyal, M. (2007). New insights from a fixed-point analysis of single cell ieee 802.11 wlans. IEEE/ACM Transactions on Networking, 15(3), 588–601.

    Article  Google Scholar 

  9. Nieminen, J., Björkbom, M., Jäntti, R., & Eriksson, L. (2012). Multichannel communications in wireless automation: Interdependencies between communication and control parameters. International Journal of Distributed Sensor Networks, 2012(1).

  10. O’Hara, B. (Ed.) (1999). IEEE standard 802.11: wireless LAN medium access control (MAC) and physical layer (PHY) specifications. New York: IEEE.

    Google Scholar 

  11. Sarker, J., & Mouftah, H. (2011). A self-optimized random access protocol for an infrastructure-less mission critical wireless networking system. Telecommunication Systems. doi:10.1007/s11235-011-9490-8.

    Google Scholar 

  12. Sthapit, P., & Pyun, J.-Y. (2011). Medium reservation based sensor mac protocol for low latency and high energy efficiency. Telecommunication Systems. doi:10.1007/s11235-011-9551-z.

    Google Scholar 

  13. Tay, Y. C., Jamieson, K., & Balakrishnan, H. (2004). Collision-minimizing CSMA and its applications to wireless sensor networks. IEEE Journal on Selected Areas in Communications, 22(6), 988–1004.

    Article  Google Scholar 

  14. Wikstrand, G., Nilsson, T., & Dougherty, M. (2008). Prioritized repeated eliminations multiple access: a novel protocol for wireless networks. In IEEE INFOCOM 2008 (Vol. 27, pp. 1561–1569). New York: IEEE.

    Chapter  Google Scholar 

  15. Wong, Y.-S., Chen, Y.-S., Deng, D.-J., & Huang, D.-C. (2011). Nonpreemptive priority scheme for the S-MAC protocol in multimedia mobile sensor networks. Telecommunication Systems. doi:10.1007/s11235-011-9571-8.

    Google Scholar 

  16. Xu, S., & Saadawi, T. (2001). Does the IEEE 802.11 MAC protocol work well in multihop wireless ad hoc networks? IEEE Communications Magazine, 39(6), 130–137.

    Article  Google Scholar 

  17. Yang, X., & Vaidya, N. H. (2006). A wireless mac protocol using implicit pipelining. IEEE Transactions on Mobile Computing, 5, 258–273.

    Article  Google Scholar 

  18. Li, Y., Long, K.-P., Zhao, W.-L., & Chen, Q.-B. (2006). A novel random backoff algorithm to enhance the performance of IEEE 802.11 DCF. Wireless Personal Communications, 36, 29–44.

    Article  Google Scholar 

Download references

Acknowledgements

The authors wish to thank Professor Lennart Bondesson, Umeå University, for help with the modeling of the backoff distributions and for providing valuable feedback on the manuscript. This work was started when the first author was with the Department of Computing Science, Umeå University, Sweden.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Thomas Nilsson.

Appendix

Appendix

1.1 8.1 Expected idle time in the priority extension

Here we give the full derivation of the expected number of idle slots before the winner in any priority class transmits.

To find the expected number of idle slots we first consider the distribution of Z,

$$\begin{aligned} P(Z > z) = &\prod_{l=1}^M\sum _{n_l=0}^{\infty} \frac{\lambda_l^{n_l}}{n_l!}e^{-\lambda_l} \bigl(1 - q^{\max{(L_l-z,0)}}\bigr)^{n_l} \\ = & \exp\Biggl(- \sum_{l=1}^M \lambda_l q^{\max{(L_l - z,0)}}\Biggr). \end{aligned}$$

We are only interested in the cases when there is at least one priority class having more than one node. Similarly as before, one solution is to condition on that there is at least one priority class with a positive number of nodes, i.e. N 1+N 2+⋯+N M >0, we get

$$\begin{aligned} &{P(Z > z | N > 0)} \\ &{\quad = \frac{P(Z > z) - P(Z > z | N_1 =\cdots = N_M = 0)}{P(N > 0)}} \\ &{\quad = \frac{\exp(-\sum_{l=1}^M \lambda_l q^{\max{(L_l - z,0)}}) - \exp{(-\sum_{l=1}^M \lambda_l)}}{1 - \exp{(-\sum_{l=1}^M \lambda_l)}},} \end{aligned}$$

where N=N 1+N 2+⋯+N M . Then it follows that the expected length until a winner transmits, with L mx =max(L 1,…,L M ), is

$$\begin{aligned} &{E(Z | N > 0) } \\ &{\quad = \sum_{z=0}^{L_{mx} - 1} P(Z>z | N > 0)} \\ &{\quad = \frac{\sum_{z=0}^{L_{mx} - 1} ( \exp( - \sum_{l =1}^M \lambda_l q^{\max{(L_l - z,0)}}) - \exp{( - \sum_{l =1}^M \lambda_l)} )}{1-\exp(\sum_{l=1}^M \lambda_l)}.} \end{aligned}$$

1.2 8.2 Model of the two-stage backoff

In this section we derive the channel utilization of the two-stage backoff model. We start by deriving the full distribution of the number of winners in the TGBD stage (first stage) and then continue with the uniform backoff stage (second stage).

1.2.1 8.2.1 First stage backoff

To analyze the two-stage backoff, we first need to find the full distribution of the number of nodes from each priority class that selects the minimal backoff. This distribution is easily obtained in the non-Poisson case, we have due to independence between classes and nodes,

$$\begin{aligned} &{P(Y_1 = y_1, \dots, Y_M = y_M)} \\ &{\quad = \sum_{x=0}^{\infty}\prod _{l=1}^M \binom{N_l}{y_l} \bigl(P \bigl(X_{j,l}' = x\bigr)\bigr)^{y_l} \bigl(P \bigl(X_{j,l}' > x\bigr)\bigr)^{N_l-y_l}.} \end{aligned}$$

Now assume that the number of nodes in each priority class is Poisson distributed, i.e. N l ∼Po(λ l ) then the probability for y 1,y 2,…,y M winners is

$$\begin{aligned} &{ P(Y_1 = y_1, \dots, Y_M = y_M) } \\ &{\quad = \sum_{x=0}^{\infty} \prod_{l=1}^M \sum _{n_l=y_l}^{\infty} \frac{\lambda_l^{n_l}}{{n_l}!}e^{-\lambda_l} \binom{n_l}{y_l}} \\ &{\qquad {}\times \bigl(P\bigl(X_{j,l}' = x\bigr) \bigr)^{y_l} \bigl(P\bigl(X_{j,l}' > x\bigr) \bigr)^{n_l-y_l},} \end{aligned}$$

and with \(P(X_{j,l}' = x) = pq^{\max(L_{l} - x,0)}\) for x=1,2,…,L l , \(P(X_{j,l}' = x) = 0\) for x>L l , \(P(X_{j,l}' = 0) = q^{L_{l}}\) and \(P(X_{j,l}' > x) = 1 - q^{\max(L_{l} - x,0)}\). By careful standard manipulations and using that \((\lambda_{l}^{n_{l}}/{n_{l}}!)\binom{n_{l}}{y_{l}}=\lambda_{l}^{n_{l}}/(y_{l}!(n_{l}-y_{l})!)\) and summing over n l y l instead of n l , this expression simplifies to, if y 1+⋯+y M >0,

$$\begin{aligned} &{P(Y_1 = y_1,\dots, Y_M = y_M)} \\ &{\quad = \sum_{x=0}^{L_{bnd}} \prod_{l=1}^M \frac{(\lambda_l\;P(X_{j,l}'=x))^{y_l}}{y_l!\; \exp(\lambda_l q^{\max(L_l-x,0)})}} \\ &{\quad = \sum_{x=1}^{L_{bnd} } \Biggl(\prod_{l=1}^M \frac{{(\lambda_lpq^{\max(L_l-x,0)})}^{y_l}}{y_l!\; \exp{(\lambda_l q^{\max{(L_l-x,0)}} ) } } \Biggr) } \\ &{\qquad {}+ \prod_{l=1}^M \frac{{(\lambda_l q^{L_l})}^{y_l}}{y_l! \exp{(\lambda_l q^{L_l})}}.} \end{aligned}$$

We also have P(Y 1=0,…,Y M =0)=0. The summation bound, L bound , is defined as follows

$$ L_{bound} = \min_{l;y_l > 0}{(L_l)}. $$

If y 1≥1, then the winners must select one of the slots 0,1,…,L 1. However, if y 1=0,y 2≥1 then the winners may also select the additional slots L 1,L 1+1,…,L 2, provided that priority class 1 has zero nodes. We finally get

$$\begin{aligned} &{P(Y_1=y_1,\dots,Y_M=y_M|N > 0)} \\ &{\quad = \frac{P(Y_1 = y_1, \dots, Y_M = y_M | N > 0)}{P(N > 0)}} \\ &{\quad = \frac{P(Y_1 = y_1, \dots, Y_M = y_M)}{1 - \exp{(-\sum_{l=1}^M \lambda_l)}}.} \end{aligned}$$

1.2.2 8.2.2 Second stage backoff

Now we continue with the analysis of the second backoff stage. Let \(m_{l} = \#\{j, X_{j,l}' = Z\}\), i.e. the number of nodes selecting the minimal backoff time in priority class l, in the first backoff stage. First we will look at the probability of a single winner in the second stage, given that m 1,m 2,…,m M nodes remain from the first backoff stage. Let Q j,l ∼U{0,1,…,K−1}, j=1,2,…,m l and \(V_{l} = \min{(Q_{1,l},Q_{2,l},\dots,Q_{m_{l},l})}\). Furthermore, let V=min(V 1,V 2,…,V M ) and W=#{(j,l),Q j,l =V}, i.e. the number of nodes selecting the minimal backoff in the second backoff stage. There can be w winners on slot 0,2,…,K−1 and the total probability becomes

$$\begin{aligned} &{P(W = w)} \\ &{\quad = \sum_{x=1}^K \binom{m_1+ \dots + m_M}{w} \biggl(\frac{1}{K} \biggr)^w \biggl(1 - \frac{x}{K} \biggr)^{\sum_{l=1}^M m_l - w}.} \end{aligned}$$

If w winners select the minimal backoff time, then the remaining \(\sum_{l=1}^{M} m_{l} -w\) nodes must select a larger backoff. These w winners can be chosen in \(\binom{m_{1}+\cdots+m_{M}}{w}\) different ways. We are only interested in the case of a single winner and that probability is,

$$ P(W = 1) = \frac{\sum_{l=1}^M m_l}{K} \sum_{x=1}^K \biggl(1 - \frac{x}{K} \biggr)^{\sum_{l=1}^M m_l-1}. $$

Let p l (m 1,…,m M ) denote the probability to have a single winner from priority class l and this probability is,

$$\begin{aligned} &{p_l(m_1,\dots,m_M)} \\ &{\quad = P(\text{winner} \in l | W = 1)} \\ &{\quad = \biggl(\frac{m_l}{\sum_{l=1}^M m_l} \biggr) \biggl(\frac{\sum_{l=1}^M m_l}{K} \biggr) \sum_{x=1}^K \biggl(1 - \frac{x}{K} \biggr)^{\sum_{l=1}^M m_l-1}} \\ &{\quad = \frac{m_l}{K}\sum_{x=1}^K \biggl(1 - \frac{x}{K} \biggr)^{\sum_{l=1}^M m_l-1},} \end{aligned}$$

where \(m_{l}/{\sum_{l=1}^{M} m_{l}}\) is the fraction of nodes belonging to priority class l. The expected length of the second backoff stage can easily be computed through the distribution function of V. We have,

$$\begin{aligned} F_V(v) =& P(V \leq v) = 1 - P(V > v) \\ =& 1 - \biggl( 1 - \frac{v + 1}{K} \biggr)^{\sum_{l=1}^M m_l}. \end{aligned}$$

Let ω(m 1,…,m M ) denote the expected length of the second backoff stage and is given by

$$\begin{aligned} &{ \omega(m_1,\dots,m_M) } \\ &{\quad = E(V) = \sum _{v=0}^{\infty}P(V > v)} \\ &{\quad =\sum_{v=0}^{\infty}\bigl(1 - F_V(v)\bigr) = \sum_{v=0}^{K-2} \biggl(1 - \frac{v+1}{K} \biggr)^{\sum_{l=1}^M m_l}.} \end{aligned}$$

To compute the success probability of having a single winner in the second backoff stage then every combination of winners from the priority classes must be considered. However, theoretically there can be a very large number of winners from each priority class since the number of nodes is Poisson distributed, i.e. we have

$$\sum_{m_1=0}^{\infty} \dots \sum_{m_M=0}^{\infty}\frac{P(Y_1 = m_1 , \dots, Y_M = m_M)}{1 - \prod_{l=1}^M e^{-\lambda_l}} = 1. $$

However, the probability of having a large number of winners is very small, i.e. most of the probability mass is found in the region where y 1,…,y M are relatively small.

Let p s,l denote the success probability of having a single winner from priority class l. This probability is given by

$$\begin{aligned} p_{s,l} &\approx \sum_{m_1=0}^{R_1} \cdots \sum_{m_M=0}^{R_M}\frac{P(Y_1 = m_1, \dots, Y_M = m_M)}{1 - \prod_{l=1}^M e^{-\lambda_l}} \\ &\quad {}\times p_l(m_1,\dots,m_M), \end{aligned} $$

where R l ⪆10. Let μ denote the expected length of the second backoff stage. This length is given by

$$\begin{aligned} \mu &\approx \sum_{m_1=0}^{R_1} \cdots \sum _{m_M=0}^{R_M} \frac{P(Y_1 = m_1, \dots, Y_M = m_M)}{1 - \prod_{l=1}^M e^{-\lambda_l}} \\ &\quad {}\times \omega(m_1,\dots,m_M). \end{aligned} $$

Note that the expressions for p s,l and μ quickly become unwieldy when the number of priority classes increases. However, in this work we are only considering a few number of priority classes. Now we can derive the channel utilization for the two-stage backoff model, we have

$$ \rho_l \approx \frac{p_{s,l} U}{E(Z|N > 0) + \mu + S + B}, $$
(20)

where B is the time for transmitting a short burst.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Nilsson, T., Jäntti, R. Generic stationary backoff distributions for distributed multiple access control. Telecommun Syst 56, 383–398 (2014). https://doi.org/10.1007/s11235-013-9851-6

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11235-013-9851-6

Keywords

Navigation