• 제목/요약/키워드: Backoff

검색결과 187건 처리시간 0.026초

An Analysis of the Effect of IEEE 802.15.4 Contention Window Size to Throughput and Energy Consumption (IEEE 802.15.4에서 Contention Window 크기 변화가 데이터 처리량과 에너지 소비량에 미치는 영향 분석)

  • Noh, Ki-chol;Ye, Seok-Hwan;Lee, Kang-woo;Ahn, Jong-Suk
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 한국정보처리학회 2009년도 춘계학술발표대회
    • /
    • pp.1136-1139
    • /
    • 2009
  • 본 논문은 802.15.4에서 CW(Contention Window)에 따른 성능과 에너지 소비량을 분석한다. 기존 연구에서는 802.15.4 표준안의 성능과 에너지 소비량을 분석하고, CW나 BE(Backoff Exponent)와 같은 변수를 변화시켜 시뮬레이션만으로 성능과 에너지 소비량을 비교하여 분석하였으나, 본 논문은 CW에 따른 성능과 에너지 소비량을 마코프 체인(Markov Chain)을 이용하여 수학적으로 분석을 하였다.

Bugs on the IEEE 802.11 Module of ns-2.31 (ns-2.31의 IEEE 802.11 모듈 버그)

  • Jung, Nak-Cheon;Ahn, Jong-Suk
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 한국정보처리학회 2008년도 춘계학술발표대회
    • /
    • pp.841-844
    • /
    • 2008
  • 본 논문은 공개 네트워크 시뮬레이터 ns-2.31(Network Simulator 2.31)의 802.11 DCF 모듈에서 버그(bug)를 소개하고 이의 영향 결과를 분석한다. ns의 802.11 DCF 모듈은 다음과 같은 문제점을 가지고 있다. 첫째, 백오프(backoff) 알고리즘은 표준안에서 명시한 알고리즘대로 작성되지 않았다. 둘째, 특정조건에 해당되는 충돌에 대하여 트레이스 파일에 출력하지 않는다. 셋째, 전파 오류 모듈을 삽입하여도 전파 오류 결과를 트레이스 파일에 출력하지 않는다. 넷째, MAC(Medium Access Control) 알고리즘만을 평가할 수 있는 기법을 제공하지 않는다. 이러한 문제점을 수정한 ns-2와 수정전의 ns-2와 평균4.6%의 충돌률 차이를 보인다.

Performance Evaluation of LTE-A Random Access Procedure for IoT Service (IoT 서비스를 위한 LTE-A 랜덤 액세스 절차 성능 평가)

  • Yoo, Seung-Su;Lee, Sung-Hyung;Shin, Jaesheung;Oh, Sung-Min;Kim, Jae-Hyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • 제41권8호
    • /
    • pp.965-973
    • /
    • 2016
  • As increase of IoT services in wireless communications, the performance evaluation is required to connects massive number of devices in LTE-A system. Existing performance analysis of 3GPP TR 37.868 is shown the limited results up to the number of devices only 30,000 in a cell. So, it is required the performance analysis according to various parameter values in the greater number of devices environment. In this paper, to evaluate the performance, we developed the new modules to simulate LTE-A random access procedures because of a limit that accommodate massive number of devices in existing LTE module. The simulator was developed by OPNET and it can support up to 100,000 devices per cell. This paper also represents the performance analysis results according to the number of preambles, the maximum number of preamble transmissions, backoff indicator and msg2 window size in the same environment with 3GPP TR 37.868. This results are expected to be utilized such as the transition to 5G network and standardization activities.

Design of Adaptive DCF algorithm for TCP Performance Enhancement in IEEE 802.11 based Mobile Ad-hoc Networks (IEEE 802.11 기반 이동 ad-hoc 망에서 TCP 성능 향상을 위한 적응적 DCF 알고리즘 설계)

  • Kim, Han-Jib;Lee, Gi-Ra;Lee, Jae-Yong;Kim, Byung-Chul
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • 제43권10호
    • /
    • pp.79-89
    • /
    • 2006
  • TCP is the most widely used transport protocol in Internet applications that guarantees a reliable data transfer. But, in the wireless multi-hop networks, TCP performance is degraded because it is designed for wired networks. The main reasons of TCP performance degradation are contention for wireless medium at the MAC layer, hidden terminal problem, exposed terminal problem, packet losses in the link layer, unfairness problem, reordering problem caused by path disconnection, bandwidth waste caused by exponential backoff of retransmission timer due to node's mobility and so on. Specially, in the mobile ad-hoc networks, discrepancy between a station's transmission range and interference range produces hidden terminal problem that decreases TCP performance greatly by limiting simultaneous transmission at a time. In this paper, we propose a new MAC algorithm for mobile ad-hoc networks to solve the problem that a node can not transmit and just increase CW by hidden terminal. In the IEEE 802.11 MAC DCF, a node increases CW exponentially when it fails to transmit, but the proposed algorithm, changes CW adaptively according to the reason of failure so we get a TCP performance enhancement. We show by ns-2 simulation that the proposed algorithm enhances the TCP performance by fairly distributing the transmission opportunity to the failed nodes by hidden terminal problems.

An Adaptive Anti-collision Algorithm for RFID Systems (RFID 시스템에서의 적응형 리더 충돌 방지 알고리즘)

  • Ok, Chi-Young;Quan, Cheng-Hao;Choi, Jin-Chul;Choi, Gil-Young;Mo, Hee-Sook;Lee, Chae-Woo
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • 제45권4호
    • /
    • pp.53-63
    • /
    • 2008
  • Reader collision may occur when neighboring RFID readers use the same channel at the same time. Especially when the readers are operated in dense mode, even though many channels are available, because of frequent reader collisions we can not guarantee the performance of RFID readers. Conventional solutions such as FH(Frequency Hopping) or LBT(Listen Before Talk) are not effective in this situation because they can not schedule RFID readers effectively when RFID readers are operated in multi-channel, dense reader mode, In this paper, we propose a new RFID reader anti-collision algorithm which employs LBT, random backoff before channel access, and probabilistic channel hopping at the same time. While LBT and Random backoff before channel access reduces collisions between competing readers, probabilistic channel hopping increases channel utilization by adaptively changing the hopping probability by reflecting the reader density and utilization. Simulation results shows that our algorithm outperforms conventional methods.

VLSI Design of Interface between MAC and PHY Layers for Adaptive Burst Profiling in BWA System (BWA 시스템에서 적응형 버스트 프로파일링을 위한 MAC과 PHY 계층 간 인터페이스의 VLSI 설계)

  • Song Moon Kyou;Kong Min Han
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • 제42권1호`
    • /
    • pp.39-47
    • /
    • 2005
  • The range of hardware implementation increases in communication systems as high-speed processing is required for high data rate. In the broadband wireless access (BWA) system based on IEEE standard 802.16 the functions of higher part in the MAC layer to Provide data needed for generating MAC PDU are implemented in software, and the tasks from formatting MAC PDUs by using those data to transmitting the messages in a modem are implemented in hardware. In this paper, the interface hardware for efficient message exchange between MAC and PHY layers in the BWA system is designed. The hardware performs the following functions including those of the transmission convergence(TC) sublayer; (1) formatting TC PDU(Protocol data unit) from/to MAC PDU, (2) Reed-solomon(RS) encoding/decoding, and (3) resolving DL MAP and UL MAP, so that it controls transmission slot and uplink and downlink traffic according to the modulation scheme of burst profile. Also, it provides various control signal for PHY modem. In addition, the truncated binary exponential backoff (TBEB) algorithm is implemented in a subscriber station to avoid collision on contention-based transmission of messages. The VLSI architecture performing all these functions is implemented and verified in VHDL.

Implementation and Performance Evaluation of Transaction Protocol for Wireless Internet Services (무선 인터넷 서비스를 위한 트랜잭션 프로토콜의 구현과 성능평가)

  • Choi, Yoon-Suk;Lim, Kyung-Shik
    • Journal of KIISE:Information Networking
    • /
    • 제29권4호
    • /
    • pp.447-458
    • /
    • 2002
  • In this paper, we design and implement Wireless Transaction Protocol(WTP) and evaluate it for wireless transaction processing in mobile computing environments. The design and implementation of WTP are based on the coroutine model that might be suitable for light-weight portable devices. We test the compatibility between our product and the other products such as Nokia, Kannel and WinWAP For the evaluation of WTP, we use an Internet simulator that can arbitrary generate random wireless errors based on the Gilbert model. In our experiment, the performance of WTP is measured and compared to those of Transmission Control Protocol(TCP) and TCP for Transactions. The experiment shows that WTP outperforms the other two protocols for wireless transaction processing in terms of throughput and delay. Especially, WTP shows much higher performance In ease of high error rate and high probability of burst errors. This comes from the fact that WTP uses a small number of packets to process a transaction compared to the other two protocols and introduces a fixed time interval for retransmission instead of the exponential backoff algorithm. The experiment also shows that the WTP performance is optimized when the retransmission counter is set to 5 or 6 in case of high burst error rate.

Channel Searching Method of IEEE 802.15.4 Nodes for Avoiding WiFi Traffic Interference (WiFi 트래픽 간섭을 피하기 위한 IEEE 802.15.4 노드의 채널탐색방법)

  • Song, Myong Lyol
    • Journal of Internet Computing and Services
    • /
    • 제15권2호
    • /
    • pp.19-31
    • /
    • 2014
  • In this paper, a parallel backoff delay procedure on multiple IEEE 802.15.4 channels and a channel searching method considering the frequency spectrum of WiFi traffic are studied for IEEE 802.15.4 nodes to avoid the interference from WiFi traffic. In order to search the channels being occupied by WiFi traffic, we analyzed the methods measuring the powers of adjacent channels simultaneously, checking the duration of measured power levels greater than a threshold, and finding the same periodicity of sampled RSSI data as the beacon frame by signal processing. In an wireless channel overlapped with IEEE 802.11 network, the operation of CSMA-CA algorithm for IEEE 802.15.4 nodes is explained. A method to execute a parallel backoff procedure on multiples IEEE 802.15.4 channels by an IEEE 802.15.4 device is proposed with the description of its algorithm. When we analyze the data measured by the experimental system implemented with the proposed method, it is observed that medium access delay times increase at the same time in the associated IEEE 802.15.4 channels that are adjacent each other during the generation of WiFi traffic. A channel evaluation function to decide the interference from other traffic on an IEEE 802.15.4 channel is defined. A channel searching method considering the channel evaluations on the adjacent channels together is proposed in order to search the IEEE 802.15.4 channels interfered by WiFi, and the experimental results show that it correctly finds the channels interfered by WiFi traffic.

Efficient MAC Protocol for Achieving Fairness in Wireless Ad-hoc Networks under the DCF (Wireless Ad-hoc 망의 DCF환경에서 Fairness 구현을 위한 효과적인 MAC 프로토콜)

  • 임희선;박승권
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • 제29권8A호
    • /
    • pp.928-936
    • /
    • 2004
  • This paper proposes simple and effective Contention Window (CW) adjusting algorithm to solve the fairness problem of the IEEE 802.11 under the Distributed Coordination Function (DCF). This adjusting algorithm can support variable packet length as well as both RTS/CTS access method and hidden nodes. Simulation results show that fairness problem can be very severe in the original MAC protocol of the wireless network. In case of implement our algorithm, fair sharing was enlarged prominently and the fairness sharing was improved about maximum 30%.

Priority Based Multi-Channel MAC Protocol for Real-Time Monitoring of Weapon Flight Test Using WSNs

  • Min, Joonki;Kim, Joo-Kyoung;Kwon, Youngmi;Lee, Yong-Jae
    • Journal of Sensor Science and Technology
    • /
    • 제22권1호
    • /
    • pp.18-27
    • /
    • 2013
  • Real-time monitoring is one of the prime necessities in a weapon flight test that is required for the efficient and timely collection of large amounts of high-rate sampled data acquired by an event-trigger. The wireless sensor network is a good candidate to resolve this requirement, especially considering the inhospitable environment of a weapon flight test. In this paper, we propose a priority based multi-channel MAC protocol with CSMA/CA over a single radio for a real-time monitoring of a weapon flight test. Multi-channel transmissions of nodes can improve the network performance in wireless sensor networks. Our proposed MAC protocol has two operation modes: Normal mode and Priority Mode. In the normal mode, the node exploits the normal CSMA/CA mechanism. In the priority mode, the node has one of three grades - Class A, B, and C. The node uses a different CSMA/CA mechanism according to its grade that is determined by a signal level. High grade nodes can exploit more channels and lower backoff exponents than low ones, which allow high grade nodes to obtain more transmission opportunities. In addition, it can guarantee successful transmission of important data generated by high grade nodes. Simulation results show that the proposed MAC exhibits excellent performance in an event-triggered real-time application.