Abstract
For the efficiency of multiple access in wireless communication department, the carrier sense multiple access schemes have been deeply studied with various attempts of random backoff mechanisms. The key parameters to be mainly considered can be taken into account the number of active devices and the slot number of contention window, which can sensitively affect the performance of those schemes. These tradeoff factors can have complemental relation, because high slot number can accommodate high number of active devices with low probability of radio collisions but can aggravate bandwidth performance in low traffic environment, and vice versa. For deducting the optimal parameters, I adopt and analyze these key parameters in each transmission time with stochastic process, and show the results by numerical examples with the difference between representative protocols.
Similar content being viewed by others
References
Amendola, D., et al. (2014). Performance evaluation of a multi-frame persistent neighbor discovery strategy based on sift-distribution in DTN RFID networks. In International symposium on performance evaluation of computer and telecommunication systems (SPECTS 2014). IEEE.
Bianchi, G. (2000). Performance analysis of the IEEE 802.11 distributed coordination function. IEEE Journal on Selected Areas in Communications, 18, 535–547.
IEEE Standard for Information Technology—Telecommunication and Information Exchange Between Systems—Locan and Metropolitan Area Networks—Specific Requirement, Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications (1999).
Jamieson, K., Balakrishnan, H., Tay, Y. C. (2006). Sift: A MAC protocol for event-driven wireless sensor networks. In Proceedings of EWSN 2006, LNCS 3868 (pp. 260–275).
Liu, J. S., & Lin, C. H. R. (2006). Performance improvements with a P-persistent enhanced DCF for WLANs. In Proceedings of IEEE VTC 2006-Spring (pp. 1151–1155).
Miskowicz, M., Szyduczynski, J., & Koscielnik, D. (2015). Analytical approach to multiple memoryless backoff contention analysis. In: 2015 IEEE world conference on factory communication systems (WFCS). IEEE.
Pyo, C. W., & Harada, H. (2009). Throughput analysis and improvement of hybrid multiple access in IEEE 802.15.3c mm-wave WPAN. IEEE Journal on Selected Areas in Communications, 27, 1414–1424.
Tay, Y. C., Jamieson, K., & Balakrishnan, H. (2004). Collision-minimizing CSMA and its applications to wireless sensor networks. IEEE Journal on Selected Areas in Communications, 22, 1048–1057.
Warrier, A., & Rhee, I. (2005). Stochastic analysis of wireless sensor network MAC protocols. North Carolina State University, Computer Science Department, Raleigh, NC, Technical Report.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Lee, J. Evaluations and Optimizations of CSMA-Based Protocols Considering Energy-Efficient Wireless Personal Area Networks. Wireless Pers Commun 98, 2319–2331 (2018). https://doi.org/10.1007/s11277-017-4976-7
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-017-4976-7