Abstract
IEEE 802.11 has employed distributed coordination function (DCF) adopting carrier sense multiple access with collision avoidance (CSMA/CA). To effectively resolve collisions, DCF uses binary exponential backoff (BEB) algorithm with three parameters, i.e., backoff stage, backoff counter and contention window. If a collision occurs, stations involving in the collision increase their backoff stages by one and double their contention window sizes. However, DCF with BEB wastes wireless resource when there are many contending stations. Therefore, in this paper, we propose a binary negative-exponential backoff (BNEB) algorithm which maintains a maximum contention window size during collisions and reduces a contention window size half after successful transmission of a frame without retransmissions. We also compare the performance of DCF with BEB to that with BNEB. From the results, BNEB yields better performance than BEB when the number of contending stations is larger than 4.
| Original language | English |
|---|---|
| Title of host publication | Mobile Ad-Hoc and Sensor Networks - 2nd International Conference, MSN 2006, Proceedings |
| Pages | 294-303 |
| Number of pages | 10 |
| DOIs | |
| State | Published - 2006 |
| Event | 2nd International Conference on Mobile Ad-Hoc and Sensor Networks, MSN 2006 - Hong Kong, China Duration: 13 Dec 2006 → 15 Dec 2006 |
Publication series
| Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
|---|---|
| Volume | 4325 LNCS |
| ISSN (Print) | 0302-9743 |
| ISSN (Electronic) | 1611-3349 |
Conference
| Conference | 2nd International Conference on Mobile Ad-Hoc and Sensor Networks, MSN 2006 |
|---|---|
| Country/Territory | China |
| City | Hong Kong |
| Period | 13/12/06 → 15/12/06 |
UN SDGs
This output contributes to the following UN Sustainable Development Goals (SDGs)
-
SDG 3 Good Health and Well-being
Fingerprint
Dive into the research topics of 'Performance evaluation of binary negative-exponential backoff algorithm in IEEE 802.11 WLAN'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver