This Article 
 Bibliographic References 
 Add to: 
A Wireless MAC Protocol Using Implicit Pipelining
March 2006 (vol. 5 no. 3)
pp. 258-273
In distributed multiple access control protocols, two categories of overhead are usually associated with contention resolution. One is channel idle overhead, where all contending stations are waiting to transmit. Another is collision overhead, which occurs when multiple contending stations attempt to transmit simultaneously. Either idle overhead or collision overhead being large, contention resolution algorithm would be inefficient. Prior research work tries to minimize both the idle and the collision overheads using various methods. In this paper, we propose to apply "pipelining” techniques to the design of multiple access control protocol so that channel idle overhead could be (partially) hidden and the collision overhead could be reduced. While the concept of pipelined scheduling can be applied to various MAC protocol designs in general, in this paper, we focus on its application to IEEE 802.11 DCF. In particular, an implicitly pipelined dual-stage contention resolution MAC protocol (named DSCR) is proposed. With IEEE 802.11, the efficiency of contention resolution degrades dramatically with the increasing load due to high probability of collision. Using the implicit pipelining technique, DSCR hides the majority of channel idle time and reduces the collision probability, hence, improves channel utilization, average access delay, and access energy cost over 802.11 significantly both in wireless LANs and in multihop networks. The simulation results, as well as some analysis, are presented to demonstrate the effectiveness of DSCR.

[1] “Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications,” IEEE Standard 802.11, June 1999.
[2] H.S. Chhaya and S. Gupta, “Performance Modeling of Asynchronous Data Transfer Methods of IEEE 802.11 MAC Protocol,” Wireless Networks, vol. 3, pp. 217-234, 1997.
[3] B.P. Crow, I. Widjaja, J.G. Kim, and P.T. Sakai, “IEEE 802.11 Wireless Local Area Networks,” IEEE Comm. Magazine, vol. 2, pp. 116-126, Sept. 1997.
[4] Y.C. Tay and K.C. Chuan, “A Capacity Analysis for the IEEE 802.11 MAC Protocol,” ACM/Baltzer Wireless Networks, vol. 7, no. 2, pp. 159-171, Mar. 2001.
[5] J. Weinmiller, H. Woesner, J.P. Ebert, and A. Wolisz, “Analyzing and Tuning the Distributed Coordination Function in the IEEE 802.11 DFWMAC Draft Standard,” Proc. Int'l Workshop Modelling MASCOT, Feb. 1996.
[6] J. Weinmiller, M. Schlager, A. Festag, and A. Wolisz, “Performance Study of Access Control in Wireless LANs IEEE 802.11 DFWMAC and ETSI RES 10 HIPERLAN,” Mobile Networks and Applications, vol. 2, pp. 55-67, 1997.
[7] G. Bianchi, “Performance Analysis of the IEEE 802.11 Distributed Coordinated Function,” IEEE J. Selected Areas in Comm., vol. 18, no. 3, pp. 535-547, Mar. 2000.
[8] G. Bianchi, L. Fratta, and M. Oliveri, “Performance Evaluation and Enhancement of the CSMA/CA MAC Protocol for 802.11 Wireless LANs,” Proc. Ann. IEEE Int'l Symp. Personal Indoor and Mobile Radio Comm. (PIMRC), vol. 2, pp. 392-396, Oct. 1996.
[9] F. Cali, M. Conti, and E. Gregori, “IEEE 802.11 Protocol: Design and Performance Evaluation of an Adaptive Backoff Mechanism,” IEEE J. Selected Areas in Comm., vol. 18, no. 9, pp. 1774-1786, Sept. 2000.
[10] F. Cali, M. Conti, and E. Gregori, “Dynamic Tunning of the IEEE 802.11 Protocol to Achieve a Theoretical Throughput Limit,” IEEE/ACM Trans. Networking, vol. 8, no. 6, pp. 785-799, Dec. 2000.
[11] B. Hajek and T. VanLoon, “Decentralized Dynamic Control of a Multiaccess Broadcast Channel,” IEEE Trans. Automatic Control, 1982.
[12] R.L. Rivest, “Network Control by Bayessian Broadcast,” Technical Report MIT/LCS/TM-285, Laboratory for Computer Science, Massachusetts Inst. of Technology, Cambridge, Mass., 1985.
[13] J.I. Capetanakis, “Tree Algorithms for Packet Broadcast Channels,” IEEE Trans. Information Theory, vol. 25, no. 5, pp. 505-515, Sept. 1979.
[14] D. Bertsekas and R. Gallager, Data Networks, second ed. Prentice Hall, 1992.
[15] J. Hennessy and D. Patterson, Computer Architecture: A Quantitative Approach, third ed. Morgan Kaufmann, 2002.
[16] X. Yang and N.H. Vaidya, “Explicit and Implicit Pipelining for Wireless Medium Access Control,” Proc IEEE Semiann. Vehicular Technology Conf., Fall 2003.
[17] X. Yang and N.H. Vaidya, “Pipelined Packet Scheduling in Wireless LANs,” technical report, Coordinated Science Laboratory, Univ. of Illinois at Urbana-Champaign, Aug. 2002.
[18] J. Deng, Y.S. Han, and Z.J. Haas, “Analyzing Split Channel Medium Access Control Schemes with ALOHA Reservation,” Proc. Second Int'l Conf. AD-HOC Networks and Wireless (ADHOC-NOW '03), Oct. 2003.
[19] ETSI TC-RES, “Radio Equipment and Systems (RES); HIgh PErformance Radio Local Area Network (HIPERLAN) Type 1; Functional Specification,” Oct. 1996, European Telecomm. Standard ETS 300 652.
[20] VINT Group, “UCB/LBNL/VINT Network Simulator NS (Version 2),”, 1996.
[21] L.M. Feeney and M. Nilsson, “Investigating the Energy Consumption of a Wireless Network Interface in an Ad Hoc Environment,” Proc. IEEE INFOCOM Conf., 2001.
[22] Z. Fu, P. Zerfos, H. Luo, S. Lu, L. Zhang, and M. Gerla, “The Impact of Multihop Wireless Channel on TCP Throughput and Loss,” Proc. IEEE INFOCOM Conf., 2003.
[23] S. Xu and T. Saadawi, “Does the IEEE 802.11 Mac Protocol Work Well in Multihop Wireless Ad Hoc Networks,” IEEE Comm. Magazine, vol. 39, no. 6, pp. 130-137, June 2001.
[24] S. Xu and T. Saadawi, “Revealing the Problems with 802.11 Medium Access Control Protocol in Multihop Wireless Ad Hoc Networks,” Computer Networks, vol. 38, no. 4, pp. 531-548, Mar. 2002.
[25] R.G. Gallager, “Conflict Resolution in Random Access Broadcast Networks,” Proc. AFOSR Workshop Comm. Theory and Applications, Sept. 1978.
[26] B.W. Wah and X. Su, “An Efficient Multiaccess Protocol for Wireless Networks,” Proc. Int'l Symp. Internet Technology, pp. 173-178, Apr. 1998.
[27] A. Tzamaloukas and J.J. Garcia-Luna-Aceves, “A Receiver-Initiated Collision-Avoidance Protocol for MultiChannel Networks,” Proc. IEEE Infocom Conf., 2001.
[28] G.R. Hiertz, J. Habetha, P. May, E. Weiss, R. Bagul, and S. Mangold, “A Decentralized Reservation Scheme for IEEE 802.11 Ad Hoc Networks,” Proc. IEEE Personal Indoor Mobile Radio Conf. (PIMRC), Sept. 2003.
[29] M.C. Yuang, B.C. Lo, and J.-Y. Chen, “Hexanary-Feedback Contention Access with PDF-Based Multiuser Estimation for Wireless Access Networks,” IEEE Trans. Wireless Comm., vol. 3, no. 1, pp. 278-289, Jan. 2004.
[30] Y.C. Tay, K. Jamieson, and H. Balakrishnan, “Collision-Minimizing CSMA and Its Applications to Wireless Sensor Networks,” IEEE J. Selected Areas in Comm., vol. 22, no. 6, pp. 1048-1057, Aug. 2004.
[31] R. Bruno, M. Conti, and E. Gregori, “Optimization of Efficiency and Energy Consumption in p-Persistent CSMA-Based Wireless LANs,” IEEE Trans. Mobile Computing, vol. 1, no. 1, pp. 10-31, Jan. 2002.
[32] H. Kim and J.C. Hou, “Improving Protocol Capacity with Model-Based Frame Scheduling in IEEE 802.11-Operated Wlans,” Proc. ACM MobiCom, Sept. 2003.
[33] Y. Kwon, Y. Fang, and H. Latchman, “A Novel Medium Access Control Protocol with Fast Collision Resolution for Wireless LANs,” Proc. Infocom Conf., 2003.

Index Terms:
Multiple access control (MAC), IEEE 802.11, pipelining, wireless LANs, multihop networks, channel utilization, access energy cost, packet access delay.
Xue Yang, Nitin H. Vaidya, "A Wireless MAC Protocol Using Implicit Pipelining," IEEE Transactions on Mobile Computing, vol. 5, no. 3, pp. 258-273, March 2006, doi:10.1109/TMC.2006.27
Usage of this product signifies your acceptance of the Terms of Use.