An Improved Backoff Scheme and Its Performance Analysis for Full Duplex MAC Protocols in VLC Networks †
<p>Random–access procedure for the CSMA/CA in IEEE 802.15.7 standard.</p> "> Figure 2
<p>The mechanism of the hidden device problem in VLC networks.</p> "> Figure 3
<p>The mechanism of solving the hidden device problem in FD VLC networks.</p> "> Figure 4
<p>Channel access example of the FD-RTS/CTS scheme.</p> "> Figure 5
<p>Random–access procedure for the proposed backoff scheme.</p> "> Figure 6
<p>Channel access example of the proposed scheme.</p> "> Figure 7
<p>Markov–chain model for the improved backoff scheme.</p> "> Figure 8
<p>Packet discard probability as a function of offered load for <math display="inline"><semantics> <mrow> <mi>N</mi> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math>.</p> "> Figure 9
<p>Network throughput as a function of offered load for <math display="inline"><semantics> <mrow> <mi>N</mi> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math>.</p> "> Figure 10
<p>Access delay as a function of offered load for <math display="inline"><semantics> <mrow> <mi>N</mi> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math>.</p> "> Figure 11
<p>Access delay as a function of offered load, the case of no packet discard.</p> "> Figure 12
<p>Packet discard probability as a function of offered load for <math display="inline"><semantics> <mrow> <mi>N</mi> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>K</mi> <mo>=</mo> <mn>0</mn> <mo>,</mo> <mn>1</mn> <mo>,</mo> <mn>5</mn> </mrow> </semantics></math>, and 30.</p> "> Figure 13
<p>Access delay as a function of offered load for <math display="inline"><semantics> <mrow> <mi>N</mi> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>K</mi> <mo>=</mo> <mn>0</mn> <mo>,</mo> <mn>1</mn> <mo>,</mo> <mn>5</mn> </mrow> </semantics></math>, and 30.</p> "> Figure 14
<p>Network throughput as a function of offered load for <math display="inline"><semantics> <mrow> <mi>N</mi> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>K</mi> <mo>=</mo> <mn>0</mn> <mo>,</mo> <mn>1</mn> <mo>,</mo> <mn>5</mn> </mrow> </semantics></math>, and 30.</p> ">
Abstract
:1. Introduction
2. Related Work
2.1. IEEE 802.15.7 CSMA/CA and Hidden Device Problem in VLC Networks
2.2. FD-RTS/CTS Aided CSMA/CA Mechanism
2.3. Performance Analysis for IEEE 802.15.7 Networks
3. Improved Backoff Scheme for FD VLC Networks
4. Theoretical Analysis of the Improved Backoff Scheme
4.1. Assumption for the Analysis
- The network is star topology with one coordinator and N devices. Each device cannot detect any signal transmitted from other ones due to a hidden device relationship.
- Each device generates data packets whose size is P [bytes], and the destination is the coordinator. All the devices have the same packet arrival rate [1/s] following a Poisson arrival process.
- Network offered load is O [Mbps]. Therefore, the offered load of each device is [Mbps]. This means .
- Because the coordinator transmits a busytone signal during the reception of a signal from the devices, no transmission failure induced by the hidden device occurs. When multiple devices start to transmit RTS frames simultaneously, they fail their transmission due to signal collision.
4.2. Markov-Chain Model for the Proposed Backoff Scheme and the Overview of Calculation
4.3. Transition Probability for the Proposed Backoff Scheme
4.4. Stationary Distribution Probability in the Markov-Chain Model
4.5. CCA Probability
4.6. Collision Probability and Channel Busy Probability
4.7. Packet-Discard Probability
4.8. Throughput S
5. Performance Evaluation and Analysis of the Improved Backoff Scheme
5.1. Performance Evaluation of the Improved Backoff Scheme
5.2. Appropriate Value of K
6. Conclusions
Author Contributions
Funding
Conflicts of Interest
References
- Matheus, L.E.M.; Vieira, A.B.; Vieira, L.F.M.; Vieira, M.A.M.; Gnawali, O. Visible light communication: Concepts, applications and challenges. IEEE Commun. Surv. Tutor. 2019, 21, 3204–3237. [Google Scholar] [CrossRef]
- IEEE Standards Association. IEEE Standard for Local and Metropolitan Area Networks-Part 15.7: Short-Range Wireless Optical Communication Using Visible Light; IEEE Standards Association: Piscataway, NJ, USA, 2011; Volume 802, pp. 7–2011. [Google Scholar]
- Bosch, C.L.; Gonzalez, I.A.; Rodriguez, D.S.; Casanas, C.R. Evaluation of the effects of hidden node problems in IEEE 802.15.7 uplink performance. Sensors 2016, 16, 216. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Bosch, C.L.; Gonzalez, I.A.; Rodriguez, D.S.; Suarez, M.A.Q. Analysis of the effects of the hidden node problem in IEEE 802.15. 7 uplink performance. In Proceedings of the 2015 International Conference on Computer, Information and Telecommunication Systems (CITS), Gijon, Spain, 15–17 July 2015; IEEE: Piscataway, NJ, USA, 2015; pp. 1–5. [Google Scholar]
- Wang, Q.; Giustiniano, D. Intra-frame bidirectional transmission in networks of visible LEDs. IEEE/ACM Trans. Netw. 2016, 24, 3607–3619. [Google Scholar] [CrossRef]
- Wang, Z.; Liu, Y.; Lin, Y.; Huang, S. Full-duplex MAC protocol based on adaptive contention window for visible light communication. J. Opt. Commun. Netw. 2015, 7, 164–171. [Google Scholar] [CrossRef]
- Zhang, Z.; Yu, X.; Wu, L.; Dang, J.; Li, V.O.K. Performance analysis of full-duplex visible light communication networks. In Proceedings of the 2015 IEEE International Conference on Communications (ICC), London, UK, 8–12 June 2015; IEEE: Piscataway, NJ, USA, 2015; pp. 3933–3938. [Google Scholar]
- Wang, X.; Chen, W. Design and Optimization of a full duplex CSMA/CA medium access mechanism for hybrid visible light communication networks. In Proceedings of the 2020 IEEE 9th Joint International Information Technology and Artificial Intelligence Conference (ITAIC), Chongqing, China, 11–13 December 2020; IEEE: Piscataway, NJ, USA, 2020; pp. 347–351. [Google Scholar]
- Lin, X.; Ikawa, K.; Hirohashi, K. High-speed full-duplex multiaccess system for LED-based wireless communications using visible light. In Proceedings of the International Symposium on Optical Engineering and Photonic Technology (OEPT), Orlando, FL, USA, 10–13 July 2009; pp. 1–5. [Google Scholar]
- Lin, P.; Zhang, L. Full-Duplex RTS/CTS Aided CSMA/CA Mechanism for Visible Light Communication Network with Hidden Nodes under Saturated Traffic. In Proceedings of the 2018 IEEE International Conference on Communications (ICC), Kansas City, MO, USA, 20–24 May 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 1–6. [Google Scholar]
- LAN/MAN Standards Committee. IEEE Standard for Information Technology Telecommunications and Information Exchange between Systems Local and Metropolitan Area Networks Specific Requirements. Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (LR-WPANs); IEEE Standards Association: Piscataway, NJ, USA, 2006; Volume 802. [Google Scholar]
- Torres-Zapata, E.; Guerra, V.; Rabadan, J.; Luna-Rivera, M.; Perez-Jimenez, R. MAC/PHY Comprehensive Visible Light Communication Networks Simulation. Sensors 2020, 20, 6014. [Google Scholar] [CrossRef] [PubMed]
- Komine, T.; Nakagawa, M. Fundamental analysis for visible-light communication system using LED lights. IEEE Trans. Consum. Electron. 2004, 50, 100–107. [Google Scholar] [CrossRef]
- Bianchi, G. Performance analysis of the IEEE 802.11 distributed coordination function. IEEE J. Sel. Areas Commun. 2000, 18, 535–547. [Google Scholar] [CrossRef]
- Van Huyun, V.; Jang, Y.M. Priority MAC based on multi-parameter for IEEE 802.15. 7 VLC. In Proceedings of the ICTC 2011, Seoul, Korea, 28–30 September 2011; IEEE: Piscataway, NJ, USA, 2011; pp. 257–260. [Google Scholar]
- Musa, A.; Baba, M.D.; Mansor, H.M.A.H. Performance analysis of the IEEE 802.15. 7 CSMA/CA algorithm based on discrete time Markov chain (DTMC). In Proceedings of the 2013 IEEE 11th Malaysia International Conference on Communications (MICC), Kuala Lumpur, Malaysia, 26–28 November 2013; IEEE: Piscataway, NJ, USA, 2013; pp. 385–389. [Google Scholar]
- Nobar, S.; Mehr, K.; Niya, J. Comprehensive performance analysis of IEEE 802.15.7 CSMA/CA mechanism for saturated traffic. J. Opt. Commun. Netw. 2015, 7, 62–73. [Google Scholar] [CrossRef]
- Shams, P.; Erol-Kantarci, M.; Uysal, M. MAC layer performance of the IEEE 802.15.7 visible light communication standard. Trans. Emerg. Telecommun. Technol. 2016, 27, 662–674. [Google Scholar] [CrossRef]
- Bhutani, M.; Lall, B.; Dixit, A. MAC Layer Performance Modelling for IEEE 802.15. 7 Based on Discrete-Time Markov Chain. IET Commun. 2021, 15, 1883–1896. [Google Scholar] [CrossRef]
- Malone, D.; Duffy, K.; Leith, D.J. Modeling the 802.11 distributed coordination function in non-saturated heterogeneous conditions. IEEE/ACM Trans. Netw. 2007, 15, 159–172. [Google Scholar] [CrossRef] [Green Version]
- Zhao, Q.; Tsang, D.H.K.; Sakurai, T. A Simple and Approximate Model for Nonsaturated IEEE 802.11 DCF. IEEE Trans. Mob. Comput. 2009, 8, 1539–1553. [Google Scholar] [CrossRef]
- Park, P.; Di Marco, P.; Soldati, P.; Fischione, C.; Johansson, K.H. A generalized Markov chain model for effective analysis of slotted IEEE 802.15. 4. In Proceedings of the 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, Macau, China, 12–15 October 2009; IEEE: Piscataway, NJ, USA, 2009; pp. 130–139. [Google Scholar]
- Jung, C.Y.; Hwang, H.Y.; Sung, D.K.; Hwang, G.U. Enhanced Markov chain model and throughput analysis of the slotted CSMA/CA for IEEE 802.15. 4 under unsaturated traffic conditions. IEEE Trans. Veh. Technol. 2008, 58, 473–478. [Google Scholar] [CrossRef] [Green Version]
Parameter | Value |
---|---|
Data rate | 24 Mbps |
Data payload size (P) | 50 bytes |
LIFS time () | 40 optical clocks |
SIFS time () | 20 optical clocks |
RTS time () | 20 optical clocks |
CTS time () | 20 optical clocks |
ACK time () | 20 optical clocks |
CCA time | 20 optical clocks |
Slot time | 20 optical clocks |
Optical clock rate | 60 MHz |
3 | |
5 | |
4 |
Network | Packet Discard | Network | Packet Discard | |||
---|---|---|---|---|---|---|
N | max K | throughput | Probability | throughput | Probability | Gain |
for max K | for max K | for K = 0 | for K = 0 | |||
5 | 12 | 14.58 Mbps | 2.769% | 10.27 Mbps | 31.55% | 1.42 |
10 | 5 | 13.27 Mbps | 11.56% | 9.71 Mbps | 35.28% | 1.37 |
15 | 4 | 12.78 Mbps | 14.80% | 9.53 Mbps | 36.44% | 1.34 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Sawa, Y.; Sanada, K.; Hatano, H.; Mori, K. An Improved Backoff Scheme and Its Performance Analysis for Full Duplex MAC Protocols in VLC Networks. Sensors 2021, 21, 8263. https://doi.org/10.3390/s21248263
Sawa Y, Sanada K, Hatano H, Mori K. An Improved Backoff Scheme and Its Performance Analysis for Full Duplex MAC Protocols in VLC Networks. Sensors. 2021; 21(24):8263. https://doi.org/10.3390/s21248263
Chicago/Turabian StyleSawa, Yuta, Kosuke Sanada, Hiroyuki Hatano, and Kazuo Mori. 2021. "An Improved Backoff Scheme and Its Performance Analysis for Full Duplex MAC Protocols in VLC Networks" Sensors 21, no. 24: 8263. https://doi.org/10.3390/s21248263