• Title/Summary/Keyword: packet collision

Search Result 160, Processing Time 0.026 seconds

Throughput Performance of Slotted ALOHA Communication System with Guard Time and Capture Effect (신호점유 현상과 보호시간을 고려한 슬롯형 알로아 통신 시스템의 성능분석)

  • 이현구;곽경섭
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.18 no.7
    • /
    • pp.989-998
    • /
    • 1993
  • In a bursty user traffic mode, ALOHA random multiple access protocol achieves higher performance than any conventional fixed assignment technique. One of central problems in slotted ALOHA is synchronization. Because of the long propagation delay in satellite mobile communication, packet may be spilt over into adjacent slots and thus guard time may be included between packet intervals. In conventional ALOHA channels, simultaneous transmission by two or more users results in a collision : the unsuccessful packets have to be retransmitted according to some retransmission algorithm. However, in a radio environment, users are often at different distances from the receiver : therefore, their received signals have substantially different power levels. The packet arriving with the highest energy now has a good chance of being detected accurately. Similarly, in some spread-spectrum random access systems, the earliest arriving packet dominates later arriving packets and thus captures the channel. In this paper slotted ALOHA channel with non zero guard time and capture probability is studied. Using the Markovian model, the performance of slotted ALOHA with guard time and capture effects is derived and compared with that of the conventional ALOHA via numerical analysis.

  • PDF

A Study on the Network Throughput of Bluetooth Packet Communication System for Short Distance Wireless Connectivity (근거리 무선 연결을 위한 블루투스 패킷 통신 시스템의 네트워크 처리율에 관한 연구)

  • Ye, Hwi-Jin;Kim, Moon;Kim, Seong-Chul;Roh, Jae-Sung
    • Journal of Advanced Navigation Technology
    • /
    • v.11 no.3
    • /
    • pp.281-287
    • /
    • 2007
  • The Bluetooth technology represents an attractive approach to enable short distance wireless connectivity. The Bluetooth standard operates at the 2.4 GHz ISM band and offers the advantage of establishing ad hoc networks, called piconet and scatternet. The spread of Bluetooth implementation in consumer products opens up a new short range wireless networking applications. Bluetooth MAC avoids packet collision within a piconet by simple time multiplexing. But lack of synchronization among independent neighboring piconets introduces packet overlapping within a time slot. In this paper, the wireless network throughput of Bluetooth packet transmission system applying the pure-ALOHA and slotted-ALOHA MAC is investigated according to the impact of channel environment. From the obtained results, the throughput of the Bluetooth MAC protocol shown to offer good performance in wireless channel, and the results are useful for the implementation of Bluetooth networks.

  • PDF

A MAC Protocol for the Integrated Voice/Data Services in Packet CDMA Network (패킷 CDMA 망에서 음성/데이타 통합 서비스를 위한 MAC 프로토콜)

  • Lim, In-Taek
    • Journal of KIISE:Information Networking
    • /
    • v.27 no.1
    • /
    • pp.68-75
    • /
    • 2000
  • In this paper, a media access control protocol is proposed for voice/data integrated services in the packet CDMA network, and the performance of the proposed protocol is analyzed. The proposed protocol uses the spreading code sensing and the reservation schemes. This protocol gives higher priority to the delay-sensitive voice traffic than to the data traffic. A voice terminal can reserve an available spreading code during a talkspurt to transmit multiple voice packets. On the other hand, whenever a data packet is generated, the data terminal transmits the packet through one of the available spreading codes that are not used by the voice terminals. In this protocol, the voice packets do not come into collision with the data packets. The numerical results show that this protocol can increase the maximum number of voice terminals. The performance for the data traffic degrades by increasing the voice traffic load because of the low priority. But it shows that the data traffic performance can be increased in proportion to the number of spreading codes.

  • PDF

performance analysis of the CSMA/CA protocol using stop-and-wait ARQ method in iwreless LANs (무선 근거리 통신망에서의 Stop-and-wait ARQ 방식을 사용하는 충돌회피 프로토콜 성능분석)

  • 김재현;이정규
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.21 no.5
    • /
    • pp.1208-1220
    • /
    • 1996
  • In this paper, the performance of a Carrier Sense Multiple Access/Collision avoidance (CSMA/CA) protocol using stop-and-Wait automatic Repeat reQuest, which is adapted as a draft standard in IEEE 802.11, is analyzed using a mathematical method based on a renewal theory, and simulation checks are performed, which confirm the goodness of our anlysis. In order to anlayze of CSMA/CA, we model that network is composed of finite populationand channel is slotted. And, we consider the CSMA/CA protocol as a hybrid protocol of 1-persistent CSMA and p-persistent CSMA protocol. As resuls of analysis, we have found that the throughput is degraded and packet delay is increased as the number of stations, Acknowledgement (ACK) length and Distributed coordination function Inter Frame Space (DIFS) length are increased.

  • PDF

eMCCA: An Enhanced Mesh Coordinated Channel Access Mechanism for IEEE 802.11s Wireless Mesh Networks

  • Islam, Md. Shariful;Alam, Muhammad Mahbub;Hong, Choong-Seon;Lee, Sung-Won
    • Journal of Communications and Networks
    • /
    • v.13 no.6
    • /
    • pp.639-654
    • /
    • 2011
  • In this paper, we present a channel access mechanism, referred to as the enhanced mesh coordinated channel access (eMCCA) mechanism, for IEEE 802.11s-based wireless mesh networks. The current draft of IEEE 802.11s includes an optional medium access control (MAC), denoted as MCCA, which is designed to provide collision-free and guaranteed channel access during reserved periods. However, the MCCA mechanism fails to achieve the desired goal in the presence of contending non-MCCA nodes; this is because non-MCCA nodes are not aware of MCCA reservations and have equal access opportunities during reserved periods. We first present a probabilistic analysis that reveals the extent to which the performance of MCCA may be affected by contending non-MCCA nodes. We then propose eMCCA, which allows MCCA-enabled nodes to enjoy collision-free and guaranteed channel access during reserved periods by means of prioritized and preemptive access mechanisms. Finally, we evaluate the performance of eMCCA through extensive simulations under different network scenarios. The simulation results indicate that eMCCA outperforms other mechanisms in terms of success rate, network throughput, end-to-end delay, packet-loss rate, and mesh coordinated channel access opportunity-utilization.

Analysis of MIMD Backoff Algorithm for IEEE 802.11 DCF (IEEE 802.11 DCF를 위한 MIMD 백오프 알고리즘 분석)

  • Lim, Seog-Ku
    • Journal of Digital Contents Society
    • /
    • v.12 no.3
    • /
    • pp.299-307
    • /
    • 2011
  • The MAC of IEEE 802.11 WLAN to control data transmission uses two control methods called DCF and PCF. The DCF controls the transmission based on CSMA/CA The BEB backoff algorithm of DCF shows relatively excellent performance in situation that the number of competing station is less, but has a problem that performance of throughput and delay is degraded in situation that the number of competing station is increased. This paper mathematically analyzes an MIMD backoff algorithm considering retry limit that increases the CW to doubled after collision and decreases smoothly the CW to halves after successful transmission in order to reduce the collision probability. To prove efficiency of the MIMD backoff algorithm, lots of simulations are conducted and analyzed.

An Enhanced Message Priority Mechanism in IEEE 802.11p Based Vehicular Networks

  • Liu, Chang;Chung, Sang-Hwa;Jeong, Han-You;Jung, Ik-Joo
    • Journal of Information Processing Systems
    • /
    • v.11 no.3
    • /
    • pp.465-482
    • /
    • 2015
  • IEEE 802.11p is a standard MAC protocol for wireless access in vehicular environments (WAVEs). If a packet collision happens when a safety message is sent out, IEEE 802.11p chooses a random back-off counter value in a fixed-size contention window. However, depending on the random choice of back-off counter value, it is still possible that less important messages are sent out first while more important messages are delayed longer until sent out. In this paper, we present a new scheme for safety message scheduling, called the enhanced message priority mechanism (EMPM). It consists of the following two components: the benefit-value algorithm, which calculates the priority of the messages depending on the speed, deceleration, and message lifetime; and the back-off counter selection algorithm, which chooses the non-uniform back-off counter value in order to reduce the collision probability and to enhance the throughput of the highly beneficial messages. Numerical results show that the EMPM can significantly improve the throughput and delay of messages with high benefits when compared with existing MAC protocols. Consequently, the EMPM can provide better QoS support for the more important and urgent messages.

Transmission Power Control Scheme for VANET using STPC Algorithm (STPC 알고리즘을 이용한 VANET을 위한 전송파워 제어기법)

  • Lim, Young-Gyu;Kim, Dong-Seoung;Kim, Eung-Soo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.1
    • /
    • pp.187-195
    • /
    • 2013
  • In this paper, we propose a transmission power control scheme for performance improvement of VANET using STPC algorithm considering traffic-flow model. In traffic congestion, a transmission power between car and car increases the collision probability of control messages, which causes the problems to decrease the performance of VANET. The proposed scheme is evaluated by OPNet modeler 16.0 for analyzing its performance and effectiveness in terms of end-to-end delays in hops, packet success probability, and throughput. The simulation result show that the proposed scheme reduces a delay in hops and increases high packet transmission success ratio. Furthermore, a throughput under high density traffic is improved effectively.

A new MAC protocol to improve a performance in IEEE 802.11 wireless LANs (IEEE 802.11 무선 랜의 성능 향상을 위한 새로운 MAC프로토콜)

  • Hwang, Gyung-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.4
    • /
    • pp.759-764
    • /
    • 2009
  • A new backoff scheme for infrastructure mode in IEEE 802.11 wireless LANs is proposed to improve a performance. Each station generates a unique backoff number using total number of stations, fairness parameter included in beacon frame and an user's ID that is assigned by AP. The station sends a packet after its own backoff number of idle slots, which makes a collision free access among stations within AP's coverage. The proposed method shows better performance in the view of channel utilization and packet delay than an original IEEE 802.11 CSMA/CA backoff scheme.

Synch. RA-based Uplink Packet Transmission in OFDMA Systems (OFDMA 시스템에서 동기 RA 방식 기반의 상향링크 패킷 전송)

  • Oh, Sang-Kyu;Moon, Jin-Soo;Shin, Seok-Joo
    • Journal of Internet Computing and Services
    • /
    • v.9 no.2
    • /
    • pp.25-33
    • /
    • 2008
  • In this paper we propose uplink packet transmission scheme based on Synchronized RA. The scheme can afford to support diverse QoS required from diverse multimeda traffics. In order to minimze the collision probability occurred in contention based channel access, we assign a reservation access channel additionally to the traffic channels. Access probability function for controlling collisions occurred in the reservation access channel is applied. Through assigning different access probability to each traffic user with respect to priority issued by his required QoS, the proposed scheme guarantees minimum throughput required by higher priority users in the whole range of system load.

  • PDF