期刊文献+

CIMLD:多跳Ad Hoc网络中一种自适应的MAC退避算法 被引量:3

CIMLD:an Adaptive MAC Backoff Algorithm in Multi-hop Ad Hoc Networks
下载PDF
导出
摘要 针对现有MAC退避算法无法适应多跳Ad Hoc网络的问题,本文提出一种自适应的MAC退避算法CIMLD(Conic In-crease,Multiplicative/Linear Decrease).CIMLD利用CWbasic阈值将竞争窗口分为两个区域,通过分段二次曲线计算每个区域冲突退避时的倍乘因子,从而能够快速解决节点碰撞问题和提高信道利用率.仿真结果表明,与BEB等其他算法相比,CIMLD在网络吞吐量和流间公平性上表现出了更好的网络性能. Motivated by the problem that existing MAC backoff algorithms are not adaptable to multi-hop ad hoe networks, we develop an adaptive MAC baekoff algorithm, named CIMLD (Conic Increase, Multiplieative/Linear Decrease) algorithm, which utilizes a threshold of CWbasie to segment the eontent window into two regions. In each region, the baekoff factor is calculated by a piecewise conic curve. CIMLD is capable of redueing the probability of collision and increasing the utilization of channel. Simulation results demonstrate that, CIMLD outperforms BEB and other backoff algorithms in terms of network throughput and fairness.
出处 《小型微型计算机系统》 CSCD 北大核心 2009年第4期679-682,共4页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目(60672042)资助
关键词 多跳Ad HOC网络 MAC 退避算法 退避因子 multi-hop Ad Hoc networks MAC backoff algorithm baekoff factor
  • 相关文献

参考文献9

  • 1Xua S, Saadawi T. Revealing the problems with 802.11 medium access control protocol in multi-hop wireless ad hoc networks [J]. Elsevier Computer Networks, 2002, 38(4): 531-548.
  • 2Zhai Hong-qiang, Chen Xiang, Fang Yu-guang. Improving transport layer performance in multihop ad hoc networks by exploiting MAC layer information [J]. IEEE Transactions on Wireless Communications, 2007, 6(5): 1692-1701.
  • 3李云,陈前斌,隆克平,吴诗其.无线自组织网络中TCP稳定性的分析及改进[J].软件学报,2003,14(6):1178-1186. 被引量:29
  • 4IEEE Standard for Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specificatlons[S] . ANSI/ IEEE Std 802. 11, 1999 Edition, New York, USA, August 1999.
  • 5Bharghavan V, Demers A, Shenker S, et al. MACAW: a media access protocol for wireless LAN's[C]. London, England: ACM SIGCOMM, 1994,212-225.
  • 6Pang Qi-xiang, Soung C. Liew, Jack Y. B. Lee, et al. Performanee evaluation of an adaptive backoff seheme for WLAN[J]. Wireless Communieations and Mobile Computing, 2004, 4 (8) : 867-879.
  • 7Chatzimisiosl P, Boucouvalas A C, Vitsas V, et al. A simple and effective baekoff scheme for the IEEE 802.11 MAC protocol[C]. Orlando, USA: Proceedings of the International Conference on Cybernetics and Information Technologies, Systems and Applications (CITSA), 2005,45-53.
  • 8Heusse M, Rousseau F, Guillier R, et al. Idle sense: an optimal access method for high throughput and fairness in rate diverse wireless LANs [C]. Philadelphia, USA: Proceedings of ACM SIGCOMM, 2005,121-132.
  • 9Raj Jain,Arjan Durresi, Gojko Babie. Throughput fairness index : an explanation [EB/OL]. ATMForum/99-0045, http :// www. cis. ohio-state. edu//jain/atmf/a99-0045. htm, February, 1999.

二级参考文献7

  • 1Perkins CE, Bhagwat P. Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers. In:Proceedings of SIGCOMM'94. New York: ACM Press, 1994. 234-244.
  • 2Broch J, Maltz DA, Johnson DB, Hu Y-C, Jetcheva J. A performance comparison of multi-hop wireless Ad Hoc network routing protocols. In: Proceedings of the 4th Annual ACM/IEEE International Conference on Mobile Computing and Networking. New York: ACM Press, 1998. 85-97.
  • 3Bharghavan V, Demers A, Shenker S, Zhang L. MACAW: A media access protocol for wireless LANs. In: Proceedings of the ACM SIGCOMM'94. New York: ACM Press, 1994. 212-225.
  • 4IEEE standard for wireless LAN medium access control (MAC) and physical layer (PHY) specifications. ANSFIEEE Std 802.11,1999.
  • 5Xu SG, Saadawi T. Does the IEEE802.11 MAC protocol works well in multi-hop wireless Ad Hoc networks? IEEE Communications Magazine, 2001,39(6): 130-137.
  • 6Floyd S, Henderson T. The newreno modification to TCP's fast recovery algorithm. Technique Report, RFC 2582, Internet Engineering Task Force, 1999.
  • 7Binachi G. Performance analysis of the IEEE 802.11 distributed coordination function. IEEE Journal on Selected Areas in Communications, 2000,18(3):535-547.

共引文献28

同被引文献18

  • 1黎宁,韩露.无线自组织网络退避算法综述[J].计算机应用,2005,25(6):1244-1247. 被引量:18
  • 2CHIA W C, CHEW L W, ANG L M, et al. Low memory image stitching and compression for WMSN using strip- based processing[J]. International journal of sensor network, 2012,11(1):22032.
  • 3PANTAZI A,ANTONAKOPOULOS T. Equilibrium point analysis of the binary exponential backoff algorithm[J]. Computer Communications, 2001,24(18): 1759-1768.
  • 4Zhang Yi, PIUNOVSKIY A, AYESTA U,ct al. Convergence of trajectories and optimal buffer sizing for MIMD congestion control[J]. Computer Communications, 2010,33(2): 149-159.
  • 5CAMILLO A,NATI M, PETRIOLI C,et al. IRIS:Integrated data gathering and interest dissemination system for wireless sensor networks [J]. Ad Hoc Networks, 2011, 11(2):654- 671.
  • 6YIGITEL M A, INCEL 0 D, ERSOY C. Design .and implementationof a QoS-aware MAC protocol for wireless multimedia sensor networks[J]. Computer Communications,2011,34(16) :1991-2001.
  • 7MANJUSHA P,SHEKHAR V. Comparison of MAC layer performanceof reactive and proactive protocols for different mobility conditions inWSN[ J]. Communications in Computer and Information Scie-nce,2011,203(1) :258-269.
  • 8PANTAZI A,ANTONAKOPOULOS T. Equilibrium point analysis ofthe binary exponential backoff algorithm [ J]. Computer Communi-cations,2001,24(18) : 1759-1768.
  • 9ZHANG Yi, PIUNOVSKIY A, AYESTA U,et al. Convergence oftrajectories and optimal buffer sizing for MIMD congestion control[ J].Computer Communications ,2010,33 (2) : 149-159.
  • 10SUN Yan, LUO Hong, DAS S K. A trust-based framework for fault-tolerant data aggregation in wireless multimedia sensor networks[ J].IEEE Trans on Dependable and Secure Computing, 2012, 9(6):785-797.

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部