Loading…
On Modeling Contention-Based MAC Protocols Using Markov Chains
Using discrete-time Markov chains to analyze the performance of contention-based medium access control (MAC) protocols has been a common practice since its initial proposal by Bianchi in his seminal paper published in 2000. The way these methods work is by modeling each individual node competing for...
Saved in:
Main Authors: | , , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | 6 |
container_issue | |
container_start_page | 1 |
container_title | |
container_volume | |
creator | Gallardo, J R Makrakis, D Mouftah, H T |
description | Using discrete-time Markov chains to analyze the performance of contention-based medium access control (MAC) protocols has been a common practice since its initial proposal by Bianchi in his seminal paper published in 2000. The way these methods work is by modeling each individual node competing for the medium in a wireless network as a Markov chain. Performance metrics of the whole system, such as throughput, delays and losses, can then be obtained from the model. However, these methods implicitly assume that Markov chains modeling individual nodes are independent from each other, which is not necessarily true in most situations. In this work we propose a more realistic model in which the whole network with all of its nodes is modeled using a single Markov chain, and in which assuming independence is no longer necessary. We reduce the complexity of the problem, both in processing and memory requirements, by taking advantage of its inherent symmetry, which allows us to work with only a few selected representative states. We evaluate how results from both types of methods compare to each other and to simulations. Our findings show that the old method has a very poor performance as compared to the new one. |
doi_str_mv | 10.1109/ICC.2010.5502486 |
format | conference_proceeding |
fullrecord | <record><control><sourceid>ieee_CHZPO</sourceid><recordid>TN_cdi_ieee_primary_5502486</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5502486</ieee_id><sourcerecordid>5502486</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-c84cba83afcf3554ae453716a72cc233553d8185f97de3bbd61a79500446e59e3</originalsourceid><addsrcrecordid>eNpFUFtLwzAUjpeB3fRd8KV_IDMnJ2mSF2EGL4OV-eDAt5G2qVZnIk0Z-O-tOPDp47sdOB8hl8DmAMxcL62dczYyKRkXujgiUxBciEIwfDkmGRjUFLTGk3-Dw-lojAWKBVMTkmmghTBSqDMyTemdMckNQkZu1iEvY-N3XXjNbQyDD0MXA711yTd5ubD5Ux-HWMddyjfpN1S6_iPuc_vmupDOyaR1u-QvDjgjm_u7Z_tIV-uHpV2saAdKDrTWoq6cRtfWLUopnBcSFRRO8brmOErYaNCyNarxWFVNAU4Zydj4jJfG44xc_d3tvPfbr777dP339jAI_gAksEyC</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>On Modeling Contention-Based MAC Protocols Using Markov Chains</title><source>IEEE Xplore All Conference Series</source><creator>Gallardo, J R ; Makrakis, D ; Mouftah, H T</creator><creatorcontrib>Gallardo, J R ; Makrakis, D ; Mouftah, H T</creatorcontrib><description>Using discrete-time Markov chains to analyze the performance of contention-based medium access control (MAC) protocols has been a common practice since its initial proposal by Bianchi in his seminal paper published in 2000. The way these methods work is by modeling each individual node competing for the medium in a wireless network as a Markov chain. Performance metrics of the whole system, such as throughput, delays and losses, can then be obtained from the model. However, these methods implicitly assume that Markov chains modeling individual nodes are independent from each other, which is not necessarily true in most situations. In this work we propose a more realistic model in which the whole network with all of its nodes is modeled using a single Markov chain, and in which assuming independence is no longer necessary. We reduce the complexity of the problem, both in processing and memory requirements, by taking advantage of its inherent symmetry, which allows us to work with only a few selected representative states. We evaluate how results from both types of methods compare to each other and to simulations. Our findings show that the old method has a very poor performance as compared to the new one.</description><identifier>ISSN: 1550-3607</identifier><identifier>ISBN: 1424464021</identifier><identifier>ISBN: 9781424464029</identifier><identifier>EISSN: 1938-1883</identifier><identifier>EISBN: 142446403X</identifier><identifier>EISBN: 9781424464043</identifier><identifier>EISBN: 1424464048</identifier><identifier>EISBN: 9781424464036</identifier><identifier>DOI: 10.1109/ICC.2010.5502486</identifier><identifier>LCCN: 81-649547</identifier><language>eng</language><publisher>IEEE</publisher><subject>Access protocols ; Communications Society ; Information technology ; Internetworking ; Laboratories ; Media Access Protocol ; Peer to peer computing ; Performance analysis ; Probability ; Wireless application protocol</subject><ispartof>2010 IEEE International Conference on Communications, 2010, p.1-6</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5502486$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2056,27923,54553,54918,54930</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5502486$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Gallardo, J R</creatorcontrib><creatorcontrib>Makrakis, D</creatorcontrib><creatorcontrib>Mouftah, H T</creatorcontrib><title>On Modeling Contention-Based MAC Protocols Using Markov Chains</title><title>2010 IEEE International Conference on Communications</title><addtitle>ICC</addtitle><description>Using discrete-time Markov chains to analyze the performance of contention-based medium access control (MAC) protocols has been a common practice since its initial proposal by Bianchi in his seminal paper published in 2000. The way these methods work is by modeling each individual node competing for the medium in a wireless network as a Markov chain. Performance metrics of the whole system, such as throughput, delays and losses, can then be obtained from the model. However, these methods implicitly assume that Markov chains modeling individual nodes are independent from each other, which is not necessarily true in most situations. In this work we propose a more realistic model in which the whole network with all of its nodes is modeled using a single Markov chain, and in which assuming independence is no longer necessary. We reduce the complexity of the problem, both in processing and memory requirements, by taking advantage of its inherent symmetry, which allows us to work with only a few selected representative states. We evaluate how results from both types of methods compare to each other and to simulations. Our findings show that the old method has a very poor performance as compared to the new one.</description><subject>Access protocols</subject><subject>Communications Society</subject><subject>Information technology</subject><subject>Internetworking</subject><subject>Laboratories</subject><subject>Media Access Protocol</subject><subject>Peer to peer computing</subject><subject>Performance analysis</subject><subject>Probability</subject><subject>Wireless application protocol</subject><issn>1550-3607</issn><issn>1938-1883</issn><isbn>1424464021</isbn><isbn>9781424464029</isbn><isbn>142446403X</isbn><isbn>9781424464043</isbn><isbn>1424464048</isbn><isbn>9781424464036</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2010</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNpFUFtLwzAUjpeB3fRd8KV_IDMnJ2mSF2EGL4OV-eDAt5G2qVZnIk0Z-O-tOPDp47sdOB8hl8DmAMxcL62dczYyKRkXujgiUxBciEIwfDkmGRjUFLTGk3-Dw-lojAWKBVMTkmmghTBSqDMyTemdMckNQkZu1iEvY-N3XXjNbQyDD0MXA711yTd5ubD5Ux-HWMddyjfpN1S6_iPuc_vmupDOyaR1u-QvDjgjm_u7Z_tIV-uHpV2saAdKDrTWoq6cRtfWLUopnBcSFRRO8brmOErYaNCyNarxWFVNAU4Zydj4jJfG44xc_d3tvPfbr777dP339jAI_gAksEyC</recordid><startdate>201005</startdate><enddate>201005</enddate><creator>Gallardo, J R</creator><creator>Makrakis, D</creator><creator>Mouftah, H T</creator><general>IEEE</general><scope>6IE</scope><scope>6IH</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIO</scope></search><sort><creationdate>201005</creationdate><title>On Modeling Contention-Based MAC Protocols Using Markov Chains</title><author>Gallardo, J R ; Makrakis, D ; Mouftah, H T</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-c84cba83afcf3554ae453716a72cc233553d8185f97de3bbd61a79500446e59e3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2010</creationdate><topic>Access protocols</topic><topic>Communications Society</topic><topic>Information technology</topic><topic>Internetworking</topic><topic>Laboratories</topic><topic>Media Access Protocol</topic><topic>Peer to peer computing</topic><topic>Performance analysis</topic><topic>Probability</topic><topic>Wireless application protocol</topic><toplevel>online_resources</toplevel><creatorcontrib>Gallardo, J R</creatorcontrib><creatorcontrib>Makrakis, D</creatorcontrib><creatorcontrib>Mouftah, H T</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan (POP) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Xplore</collection><collection>IEEE Proceedings Order Plans (POP) 1998-present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Gallardo, J R</au><au>Makrakis, D</au><au>Mouftah, H T</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>On Modeling Contention-Based MAC Protocols Using Markov Chains</atitle><btitle>2010 IEEE International Conference on Communications</btitle><stitle>ICC</stitle><date>2010-05</date><risdate>2010</risdate><spage>1</spage><epage>6</epage><pages>1-6</pages><issn>1550-3607</issn><eissn>1938-1883</eissn><isbn>1424464021</isbn><isbn>9781424464029</isbn><eisbn>142446403X</eisbn><eisbn>9781424464043</eisbn><eisbn>1424464048</eisbn><eisbn>9781424464036</eisbn><abstract>Using discrete-time Markov chains to analyze the performance of contention-based medium access control (MAC) protocols has been a common practice since its initial proposal by Bianchi in his seminal paper published in 2000. The way these methods work is by modeling each individual node competing for the medium in a wireless network as a Markov chain. Performance metrics of the whole system, such as throughput, delays and losses, can then be obtained from the model. However, these methods implicitly assume that Markov chains modeling individual nodes are independent from each other, which is not necessarily true in most situations. In this work we propose a more realistic model in which the whole network with all of its nodes is modeled using a single Markov chain, and in which assuming independence is no longer necessary. We reduce the complexity of the problem, both in processing and memory requirements, by taking advantage of its inherent symmetry, which allows us to work with only a few selected representative states. We evaluate how results from both types of methods compare to each other and to simulations. Our findings show that the old method has a very poor performance as compared to the new one.</abstract><pub>IEEE</pub><doi>10.1109/ICC.2010.5502486</doi><tpages>6</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1550-3607 |
ispartof | 2010 IEEE International Conference on Communications, 2010, p.1-6 |
issn | 1550-3607 1938-1883 |
language | eng |
recordid | cdi_ieee_primary_5502486 |
source | IEEE Xplore All Conference Series |
subjects | Access protocols Communications Society Information technology Internetworking Laboratories Media Access Protocol Peer to peer computing Performance analysis Probability Wireless application protocol |
title | On Modeling Contention-Based MAC Protocols Using Markov Chains |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-14T12%3A44%3A04IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_CHZPO&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=On%20Modeling%20Contention-Based%20MAC%20Protocols%20Using%20Markov%20Chains&rft.btitle=2010%20IEEE%20International%20Conference%20on%20Communications&rft.au=Gallardo,%20J%20R&rft.date=2010-05&rft.spage=1&rft.epage=6&rft.pages=1-6&rft.issn=1550-3607&rft.eissn=1938-1883&rft.isbn=1424464021&rft.isbn_list=9781424464029&rft_id=info:doi/10.1109/ICC.2010.5502486&rft.eisbn=142446403X&rft.eisbn_list=9781424464043&rft.eisbn_list=1424464048&rft.eisbn_list=9781424464036&rft_dat=%3Cieee_CHZPO%3E5502486%3C/ieee_CHZPO%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i175t-c84cba83afcf3554ae453716a72cc233553d8185f97de3bbd61a79500446e59e3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5502486&rfr_iscdi=true |