Skip to main content

Advertisement

Log in

Evaluations and Optimizations of CSMA-Based Protocols Considering Energy-Efficient Wireless Personal Area Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

For the efficiency of multiple access in wireless communication department, the carrier sense multiple access schemes have been deeply studied with various attempts of random backoff mechanisms. The key parameters to be mainly considered can be taken into account the number of active devices and the slot number of contention window, which can sensitively affect the performance of those schemes. These tradeoff factors can have complemental relation, because high slot number can accommodate high number of active devices with low probability of radio collisions but can aggravate bandwidth performance in low traffic environment, and vice versa. For deducting the optimal parameters, I adopt and analyze these key parameters in each transmission time with stochastic process, and show the results by numerical examples with the difference between representative protocols.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Amendola, D., et al. (2014). Performance evaluation of a multi-frame persistent neighbor discovery strategy based on sift-distribution in DTN RFID networks. In International symposium on performance evaluation of computer and telecommunication systems (SPECTS 2014). IEEE.

  2. Bianchi, G. (2000). Performance analysis of the IEEE 802.11 distributed coordination function. IEEE Journal on Selected Areas in Communications, 18, 535–547.

    Article  Google Scholar 

  3. IEEE Standard for Information Technology—Telecommunication and Information Exchange Between Systems—Locan and Metropolitan Area Networks—Specific Requirement, Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications (1999).

  4. Jamieson, K., Balakrishnan, H., Tay, Y. C. (2006). Sift: A MAC protocol for event-driven wireless sensor networks. In Proceedings of EWSN 2006, LNCS 3868 (pp. 260–275).

  5. Liu, J. S., & Lin, C. H. R. (2006). Performance improvements with a P-persistent enhanced DCF for WLANs. In Proceedings of IEEE VTC 2006-Spring (pp. 1151–1155).

  6. Miskowicz, M., Szyduczynski, J., & Koscielnik, D. (2015). Analytical approach to multiple memoryless backoff contention analysis. In: 2015 IEEE world conference on factory communication systems (WFCS). IEEE.

  7. Pyo, C. W., & Harada, H. (2009). Throughput analysis and improvement of hybrid multiple access in IEEE 802.15.3c mm-wave WPAN. IEEE Journal on Selected Areas in Communications, 27, 1414–1424.

    Article  Google Scholar 

  8. Tay, Y. C., Jamieson, K., & Balakrishnan, H. (2004). Collision-minimizing CSMA and its applications to wireless sensor networks. IEEE Journal on Selected Areas in Communications, 22, 1048–1057.

    Article  Google Scholar 

  9. Warrier, A., & Rhee, I. (2005). Stochastic analysis of wireless sensor network MAC protocols. North Carolina State University, Computer Science Department, Raleigh, NC, Technical Report.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jaeho Lee.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lee, J. Evaluations and Optimizations of CSMA-Based Protocols Considering Energy-Efficient Wireless Personal Area Networks. Wireless Pers Commun 98, 2319–2331 (2018). https://doi.org/10.1007/s11277-017-4976-7

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-017-4976-7

Keywords

Navigation