Modified Binary Exponential Backoff Algorithm to Minimize Mobiles Communication Time

Full Text (PDF, 521KB), PP.20-29

Views: 0 Downloads: 0

Author(s)

Ibrahim Sayed Ahmad 1,* Ali Kalakech 2 Seifedine Kadry 3

1. American University of Culture and Education, Lebanon

2. Lebanese University, Lebanon

3. American University of the Middle East, Kuwait

* Corresponding author.

DOI: https://doi.org/10.5815/ijitcs.2014.03.03

Received: 4 Jun. 2013 / Revised: 29 Oct. 2013 / Accepted: 7 Dec. 2013 / Published: 8 Feb. 2014

Index Terms

Mobile Communicastions, CSMA/CA, Binary Exponential Backoff Algorithm

Abstract

The field of Wireless Local Area Networks (LANs) is expanding rapidly as a result of advances in digital communications, portable computers, and semiconductor technology. The early adopters of this technology have primarily been vertical application that places a premium on the mobility offered by such systems.
Binary Exponential Backoff (BEB) refers to a collision resolution mechanism used in random access MAC protocols. This algorithm is used in Ethernet (IEEE 802.3) wired LANs. In Ethernet networks, this algorithm is commonly used to schedule retransmissions after collisions.
The paper’s goal is to minimize the time transmission cycle of the information between mobiles moving in a Wi-Fi by changing the BEB algorithm. The Protocol CSMA / CA manage access to the radio channel by performing an arbitration based on time. This causes many problems in relation to time transmission between mobiles moving in a cell 802.11. what we have done show that the protocol using CSMA / CA access time believed rapidly when the number of stations and / or the network load increases or other circumstances affects the network.

Cite This Paper

Ibrahim Sayed Ahmad, Ali Kalakech, Seifedine Kadry, "Modified Binary Exponential Backoff Algorithm to Minimize Mobiles Communication Time", International Journal of Information Technology and Computer Science(IJITCS) vol.6, no.3, pp.20-29, 2014. DOI:10.5815/ijitcs.2014.03.03

Reference

[1]http://www.isi.edu/nsnam/ns/.

[2]Tutorial for the Network Simulator NS, http://www.isi.edu/nsnam/ns/tutorial/,2006.

[3]www.opnet.com.

[4]Gilberto flores Lucio, Marcos Paredes-Farrera, Emmanuel Jammeh, Martin Fleury,Martin J.Reed, Opnet Modeler and NS2: comparing the accuracy of network simulator for packet-level analysis using a network testbed, WSEAS Transactions on Computers, Issue 3,Volume 2:700-707 July 2003.

[5]P. Anelli, E. Horlait, « Ns-2: principle », version 1.3, 1999.

[6]Sabri Benfarhat, « rapport interne équipe réseau et protocole », LIMOS, Clermont Ferrand, 2007.

[7]Byung-Jae Kwak, Nah-Oak Song, Miller, “Performance analysis of exponential backoff”, Networking, IEEE/ACM Transactions on , volume 13, issue 2, april 2005.

[8]M. M. Carvalho, J. J. Garcia-Luna-Aceves, “Delay analysis of IEEE 802.11 in single-hop networks”, Proc. of IEEE ICNP, Nov. 2003.

[9]J. Chittamuru, A. Ramanathan, M. Sinha, “Simulation of Point Coordination Function for IEEE 802.11 Wireless LAN using Glomosim”, 2006.

[10]John G. Proakis, Massoud Salehi, “Digital communications”, McGraw Hill Higher Education, 2007.