scholarly journals Performance Analysis of Synchronous Multi-Radio Multi-Link MAC Protocols in IEEE 802.11be Extremely High Throughput WLANs

2020 ◽  
Vol 11 (1) ◽  
pp. 317
Author(s):  
Taewon Song ◽  
Taeyoon Kim

The representative media access control (MAC) mechanism of IEEE 802.11 is a distributed coordination function (DCF), which operates based on carrier-sense multiple access with collision avoidance (CSMA/CA) with binary exponential backoff. The next amendment of IEEE 802.11 being developed for future Wi-Fi by the task group-be is called IEEE 802.11be, where the multi-link operation is mainly discussed when it comes to MAC layer operation. The multi-link operation discussed in IEEE 802.11be allows multi-link devices to establish multiple links and operate them simultaneously. Since the medium access on a link may affect the other links, and the conventional MAC mechanism has just taken account of a single link, the DCF should be used after careful consideration for multi-link operation. In this paper, we summarize the DCFs being reviewed to support the multi-radio multi-link operation in IEEE 802.11be and analyze their performance using the Markov chain model. Throughout the extensive performance evaluation, we summarize each MAC protocol’s pros and cons and discuss essential findings of the candidate MAC protocols.

Author(s):  
Nurul I. Sarkar

One of the limitations of the IEEE 802.11 distributed coordination function (DCF) protocol is its low bandwidth utilization under medium-to-high traffic loads resulting in low throughput and high packet delay. To overcome performance problems, traditional IEEE 802.11 DCF (“DCF”) protocol is modified to the buffer unit multiple access (BUMA) protocol. The BUMA protocol achieves a better system performance by introducing a temporary buffer unit at the medium access control (MAC) layer to accumulate multiple packets and combine them into a single packet (with a header and a trailer) before transmission. This paper provides an in-depth performance evaluation (by simulation) of BUMA for multiuser ad hoc and infrastructure networks. Results obtained show that the BUMA is more efficient than that of DCF. The BUMA protocol is simple and its algorithm (software) can be upgraded to 802.11 networks requiring no hardware changes. The BUMA protocol is described and simulation results are presented to verify the performance.


MAC design in a vehicle network is a challenging task due to high node speed, frequent topology changes, lack of infrastructure, and different QoS requirements. Several medium access control protocols based on Time Division Multiple Access (TDMA) have recently been suggested for VANETs in an effort to guarantee that all cars have sufficient time to send safety messages without collisions and to decrease the end-to-end delay and the loss ratio of packets. The reasons for using the collision-free media access control paradigm in VANETs are identified in this document. We then present a new topology-based classification and provide an overview of the MAC protocols suggested for VANETs based on TDMA. We concentrate on these protocols ' features as well as their advantages and constraints. Finally, we provide a qualitative comparison and address some open problems that need to be addressed in future studies to enhance the efficiency of TDMA-based MAC protocols for vehicle-to-vehicle (V2V) and vehicle to infrastructural (V2I) communications.


Author(s):  
Nurul I. Sarkar

One of the limitations of the IEEE 802.11 distributed coordination function (DCF) protocol is its low bandwidth utilization under medium-to-high traffic loads resulting in low throughput and high packet delay. To overcome performance problems, traditional IEEE 802.11 DCF (“DCF”) protocol is modified to the buffer unit multiple access (BUMA) protocol. The BUMA protocol achieves a better system performance by introducing a temporary buffer unit at the medium access control (MAC) layer to accumulate multiple packets and combine them into a single packet (with a header and a trailer) before transmission. This paper provides an in-depth performance evaluation (by simulation) of BUMA for multiuser ad hoc and infrastructure networks. Results obtained show that the BUMA is more efficient than that of DCF. The BUMA protocol is simple and its algorithm (software) can be upgraded to 802.11 networks requiring no hardware changes. The BUMA protocol is described and simulation results are presented to verify the performance.


2017 ◽  
Vol 68 (1) ◽  
pp. 83-86
Author(s):  
Woo-Yong Choi

Abstract The DCF (Distributed Coordination Function) is the basic MAC (Medium Access Control) protocol of IEEE 802.11 wireless LANs and compatible with various IEEE 802.11 PHY extensions. The performance of the DCF degrades exponentially as the number of nodes participating in the DCF transmission procedure increases. To deal with this problem, we propose a simple, however efficient modification of the DCF by which the performance of the DCF is greatly enhanced.


2018 ◽  
Vol 69 (4) ◽  
pp. 323-325
Author(s):  
Woo-Yong Choi

Abstract Combining the IEEE 802.11 basic MAC (medium access control) protocols, which are the DCF (distributed coordination function) and the PCF (point coordination function), we propose a hybrid MAC protocol to improve the performance of IEEE 802.11 wireless LANs and mitigate the hidden node problem.


Author(s):  
Rishipal Singh ◽  
D. K. Lobiyal

In the design of wireless networks, the medium access protocols have a very large impact on the performance of the network. The IEEE 802.11 is widely accepted technology for the Wireless LANs and is used by wireless networks. This paper presents an analysis of the performance of Distributed Coordination Function (DCF) for IEEE 802.11 under modified Binary Exponential Backoff (BEB) Algorithm using Frequency Hoping Spread Spectrum (FHSS). In the modified algorithm, the size of Contention Window (CW) has been changed with the factor of for the first four collisions and the size becomes double thereafter in each subsequent collision. This paper also covers the effects of various parameters in modified BEB Algorithm.


2015 ◽  
Vol 2015 ◽  
pp. 1-13 ◽  
Author(s):  
Radha Ranganathan ◽  
Kathiravan Kannan

IEEE 802.11 is the de facto standard for medium access over wireless ad hoc network. The collision avoidance mechanism (i.e., random binary exponential backoff—BEB) of IEEE 802.11 DCF (distributed coordination function) is inefficient and unfair especially under heavy load. In the literature, many algorithms have been proposed to tune the contention window (CW) size. However, these algorithms make every node select its backoff interval between [0, CW] in a random and uniform manner. This randomness is incorporated to avoid collisions among the nodes. But this random backoff interval can change the optimal order and frequency of channel access among competing nodes which results in unfairness and increased delay. In this paper, we propose an algorithm that schedules the medium access in a fair and effective manner. This algorithm enhances IEEE 802.11 DCF with additional level of contention resolution that prioritizes the contending nodes according to its queue length and waiting time. Each node computes its unique backoff interval using fuzzy logic based on the input parameters collected from contending nodes through overhearing. We evaluate our algorithm against IEEE 802.11, GDCF (gentle distributed coordination function) protocols using ns-2.35 simulator and show that our algorithm achieves good performance.


Author(s):  
Bahaa Kareem Mohammed ◽  
Saif Ali Alsaidi ◽  
Raad Farhood Chisab ◽  
Haider Alrikabi

It is a well-known fact that the forthcoming names are distinctively different: interference range, career sense, and transmission. The given paper reveals the underlying study of disengagement of a request to send (RTS)/ clear to send (CTS) dialog. It was basically adopted under the influence of both; the presence of distributed coordination function of IEEE 802.11 and a sub-layer protocol which is called media access control (MAC) protocol. The demonstration was seen when applying a type of traffic flows such as Constant Bit Rate (CBR), Transmission Control Protocol (TCP), and besides User Datagram Protocol (UDP). When these are applied the output performance in term of throughput shows a very linear topology configuration of the network. To sum up, a new RTS /CTS mechanism was proposed based on the results obtained from the above suggestions. The detailing for the new mechanism showed that a terminal node will be responsible for deciding if it is authorized to use an RTS/CTS protocol dialog to send one of its packets or not. Needless to say, this process will be dynamic in nature.


Sign in / Sign up

Export Citation Format

Share Document