Logo
    • English
    • Ελληνικά
    • Deutsch
    • français
    • italiano
    • español
  • English 
    • English
    • Ελληνικά
    • Deutsch
    • français
    • italiano
    • español
  • Login
View Item 
  •   University of Thessaly Institutional Repository
  • Επιστημονικές Δημοσιεύσεις Μελών ΠΘ (ΕΔΠΘ)
  • Δημοσιεύσεις σε περιοδικά, συνέδρια, κεφάλαια βιβλίων κλπ.
  • View Item
  •   University of Thessaly Institutional Repository
  • Επιστημονικές Δημοσιεύσεις Μελών ΠΘ (ΕΔΠΘ)
  • Δημοσιεύσεις σε περιοδικά, συνέδρια, κεφάλαια βιβλίων κλπ.
  • View Item
JavaScript is disabled for your browser. Some features of this site may not work without it.
Institutional repository
All of DSpace
  • Communities & Collections
  • By Issue Date
  • Authors
  • Titles
  • Subjects

Queue and channel state awareness for maximum throughput access control in CSMA/CA-based wireless LANs

Thumbnail
Author
Oliveira, R.; Koutsopoulos, I.
Date
2009
DOI
10.1109/WCNC.2009.4917926
Keyword
Access control policies
Access points
Capacity regions
Channel state
Contention window
CSMA/CA
IEEE 802.11 MAC protocols
IEEE 802.11 protocols
IEEE 802.11s
Link quality
Link state
MAC protocol
Maximum through-put
Medium access
Medium access control protocols
Packet arrivals
Performance improvements
Queue lengths
Queue size
Transmission rates
Wireless LAN
Ad hoc networks
Queueing theory
Security systems
Standards
Telecommunication traffic
Windows
Wireless local area networks (WLAN)
Wireless telecommunication systems
Medium access control
Metadata display
Abstract
This paper introduces two important enhancements to the IEEE 802.11 medium access control (MAC) protocols which are not considered in the current IEEE 802.11 MAC protocol: the channel state between the transmitter and the receiver and the node queue state. Our objective is to characterize the impact of these parameters on medium access regulation, and ultimately rely on them in order to enhance the sum throughput compared to the legacy 802.11x MAC protocols. We consider the scenario of several nodes attempting to access an Access Point (AP). Each node is characterized by: (i) a link quality to the AP which is essentially mapped to the PHY-layer rate that can be supported; (ii) a queue length depending on the packet arrival process at that node. We make the contention window dependent on queue size (backlog) and PHY-rate. The key idea is that a node with large PHY transmission rate and large queue size should tend to use smaller contention window, so that it gets higher chances for accessing the channel. We suggest heuristic queue and link state-aware rules for defining the contention window. We demonstrate with numerical arguments a significant enlargement in the capacity region under our modified access control policies and substantial performance improvement in terms of sum throughput for this system, compared to legacy IEEE 802.11 protocols. © 2009 IEEE.
URI
http://hdl.handle.net/11615/31487
Collections
  • Δημοσιεύσεις σε περιοδικά, συνέδρια, κεφάλαια βιβλίων κλπ. [19735]

Related items

Showing items related by title, author, creator and subject.

  • Thumbnail

    Optimal jamming attack strategies and network defense policies in wireless sensor networks 

    Li, M.; Koutsopoulos, I.; Poovendran, R. (2010)
    We consider a scenario where a sophisticated jammer jams an area in which a single-channel random-access-based wireless sensor network operates. The jammer controls the probability of jamming and the transmission range in ...
  • Thumbnail

    Special needs at different educational levels: A forecast of 2020 

    Karagiannidis, C.; Kouroupetroglou, C.; Koumpis, A. (2012)
    This paper reports on the results of the eAccessibility 2020 study which was funded by the European Commission to explore and analyse the relationships between the emerging Information and Communications Technologies (ICT) ...
  • Thumbnail

    Competition and cooperation in wireless access misbehavior 

    Koutsopoulos, I. (2011)
    With the proliferation of access points and terminals, wireless access misbehavior emerges as important means of protocol misuse, whereby network entities aim at obtaining higher channel share than the one in legitimate ...
htmlmap 

 

Browse

All of DSpaceCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

My Account

LoginRegister (MyDspace)
Help Contact
DepositionAboutHelpContact Us
Choose LanguageAll of DSpace
EnglishΕλληνικά
htmlmap