JOURNAL OF COMPUTING, VOLUME 2, ISSUE 8, AUGUST 2010, ISSN 2151-9617
HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/
WWW.JOURNALOFCOMPUTING.ORG 13
Efficient Contention Window Control with
Two-Element Array
Ali Balador, Ali Movaghar, and Sam Jabbehdari
Abstract—in wireless networks, the sharing channel has limited communication bandwidth. So designing efficient Medium
Access Control (MAC) protocol with high performances is a major focus in distributed contention-based MAC protocol research.
IEEE 802.11 MAC protocol is the most famous standard in this area. But, this standard has a problem with adopting its backoff
range based on channel status. It causes some problems in throughput and fairness in a real situation. In this paper, we
propose a simple algorithm that maximizes the throughput and fairness among competing nodes. We have divided nodes into
four section of our backoff range. Numerical results show improvement in all performances except end to end delay.
Index Terms—Backoff Algorithm, Contention Window, IEEE 802.11 DCF, Mobile Ad-Hoc Network, MAC layer
——————————
——————————
1 INTRODUCTION
He rapid development in wireless communication
and the growth of mobile communication and com-
puting devices like cell phones, PDAs or laptops
cause Mobile Ad-Hoc Networks (MANETs) as an impor-
tant part of future ubiquitous communication. MANETs
are the important part of mobile communications because
they are infrastructure-less, low cost and quick deployed.
This technology is useful for ubiquitous environment in
offices, hospitals, campuses, airports, factories and battle-
field communications.
In wireless networks, the channel is shared among
network’s nodes. A node should compete with other
nodes that have packet in their buffers to transmit. Be-
cause of that, Medium Access Control (MAC) plays an
important role in controlling channel access among
nodes. Study group 802.11 was formed and introduced
IEEE 802.11 standard. This standard provides detailed
MAC and Physical layer (PHY) specification for wireless
LANs. The MAC incorporates two different medium
access methods: the compulsory Distributed Coordina-
tion Function (DCF) and the mandatory Point Coordina-
tion Function (PCF). 802.11 can operate both in DCF
mode and PCF mode. Every 802.11 node should imple-
ment DCF mode, which is contention-based method and
supports asynchronous data transfer on a best effort ba-
sis. On the other hand, the implementation of PCF is not
mandatory in IEEE 802.11. [1]
The DCF in IEEE 802.11 is based on a Carrier Sense
Multiple Access with Collision Avoidance (CSMA/CA)
technique, which uses a combination of the CSMA and
MACA schemes. In CSMA-based schemes, sender first
senses the channel to check whether it is idle or busy. If
they found channel idle, transmit their own packets. On
the other hand, other nodes that could not transmit their
packets should defer their own transmissions when the
medium is busy. IEEE 802.11 DCF uses this routine to
prevent a collision with other competing nodes.Although,
collision occurs at receiving nodes. There are two known
problems in wireless networks: hidden node problem and
exposed node problem. [2]
As illustrated in Fig. 1, node C wants to transmit to
node D but mistakenly thinks that this will interfere with
B’s transmission to A, so C refrains from transmitting.
This problem is referred to “exposed node problem”
leads to loss in efficiency.
A more serious problem is known as the hidden node
problem. Assume that node A is sending data to node B. a
terminal C is “hidden” when it is far away from the data
source A but it is close to the destination B. without the
ability to detect the ongoing data transmission, C will
cause a collision at B if C starts transmitting a packet. Fig.
2 shows this problem. MAC schemes are designed to
overcome these problems.
For preventing these problems IEEE 802.11 DCF uses a
method to reserve the medium that other neighboring
nodes can distinguish the transmission. IEEE 802.11 uses
Request-To-Send (RTS) / Clear-To-Send (CTS) mechan-
————————————————
Ali Balador is with the Computer Engineering Department, Science and
Research Branch, Islamic Azad University, Tehran, Iran.
Ali Movaghar is with the Department of Electrical and Computer Engi-
neering, Sharif University of Technology, Tehran, Iran.
Sam Jabbehdari is with the Computer Engineering Department, North
Tehran Branch, Islamic Azad University, Tehran, Iran.
T
Fig. 1. Hidden node problem
© 2010 Journal of Computing Press, NY, USA, ISSN 2151-9617
http://sites.google.com/site/journalofcomputing/