• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Cheng Yanhong, Li Zhishu, and Chen Liangyin. An Adaptive MAC Protocol for Wireless LANs Under Error-Prone Environment[J]. Journal of Computer Research and Development, 2012, 49(1): 174-182.
Citation: Cheng Yanhong, Li Zhishu, and Chen Liangyin. An Adaptive MAC Protocol for Wireless LANs Under Error-Prone Environment[J]. Journal of Computer Research and Development, 2012, 49(1): 174-182.

An Adaptive MAC Protocol for Wireless LANs Under Error-Prone Environment

More Information
  • Published Date: January 14, 2012
  • The impact of conditional collision probability (p\-{cl}) on saturation throughput of 802.11 DCF (distributed coordination function) under error-prone channel is investigated through mathematical modeling. The study shows that under a certain network configuration in the basic CSMA/CA mode there exists an optimal p\-{cl} to maximize the throughput, and the optimal p\-{cl} is approximately independent of the number of active nodes, the bit error rate and the length of the packet payload (100—4000B). Based on the stated results, combining contention window and frame length adjustment methods, a channel adaptive protocol is proposed to enhance the performance of 802.11 DCF in case of error-prone environment. The contention window adjustment method adjusts the initial contention window to make p\-{cl} reach its optimum; moreover, the frame length adjustment scheme determines the optimal frame length according to channel condition. The analytical model is implemented based on NS-2 to evaluate the performance of the proposed protocol and the impact of channel condition. The results show that, as compared with legacy 802.11 DCF, the proposed protocol not only significantly improves the throughput in error-prone conditions, but also achieves the self-adapt character with the variation of channel condition and the node number.
  • Related Articles

    [1]Wu Haibo, Liu Hui, Sun Yi, Li Jun. A Concurrent Conflict Transaction Optimization Method for Consortium Blockchain Hyperledger Fabric[J]. Journal of Computer Research and Development, 2024, 61(8): 2110-2126. DOI: 10.7544/issn1000-1239.202220644
    [2]Yang Bo, Guo Haoran, Feng Junhui, Li Ge, Jin Zhi. A Rule Conflict Detection Approach for Intelligent System of Internet of Things[J]. Journal of Computer Research and Development, 2023, 60(3): 592-605. DOI: 10.7544/issn1000-1239.202110941
    [3]Ouyang Dantong, Gao Han, Xu Yini, Zhang Liming. Minimal Conflict Set Solving Method Combined with Fault Logic Relationship[J]. Journal of Computer Research and Development, 2020, 57(7): 1472-1480. DOI: 10.7544/issn1000-1239.2020.20190338
    [4]Xu Yini, Ouyang Dantong, Liu Meng, Zhang Liming, Zhang Yonggang. Algorithm of Computing Minimal Conflict Sets Based on the Structural Feature of Fault Output[J]. Journal of Computer Research and Development, 2018, 55(11): 2386-2394. DOI: 10.7544/issn1000-1239.2018.20170381
    [5]Huang Xiaohui, Li Dong, Shi Hailong, Cui Li. EasiRCC: A Method of Rule-Matching and Conflict Resolution for Smart Home[J]. Journal of Computer Research and Development, 2017, 54(12): 2711-2720. DOI: 10.7544/issn1000-1239.2017.20160646
    [6]Song Yang, Wang Houfeng. Chinese Zero Anaphora Resolution with Markov Logic[J]. Journal of Computer Research and Development, 2015, 52(9): 2114-2122. DOI: 10.7544/issn1000-1239.2015.20140620
    [7]Zhou Hang, Huang Zhiqiu, Zhu Yi, Xia Liang, Liu Linyuan. Real-Time Systems Contact Checking and Resolution Based on Time Petri Net[J]. Journal of Computer Research and Development, 2012, 49(2): 413-420.
    [8]Li Xiangjun, Meng Luoming, and Jiao Li. Problems in Results of Policy Conflict Resolutions and Detection and Resolution Methods in Network Management Systems[J]. Journal of Computer Research and Development, 2006, 43(7): 1297-1303.
    [9]Zhang Xinliang and Shi Chunyi. A Description-Logic Based Agent Organization[J]. Journal of Computer Research and Development, 2005, 42(11): 1843-1848.
    [10]Yao Jian, Mao Bing, and Xie Li. A DAG-Based Security Policy Conflicts Detection Method[J]. Journal of Computer Research and Development, 2005, 42(7): 1108-1114.

Catalog

    Article views (599) PDF downloads (487) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return