Loading…

On Modeling Contention-Based MAC Protocols Using Markov Chains

Using discrete-time Markov chains to analyze the performance of contention-based medium access control (MAC) protocols has been a common practice since its initial proposal by Bianchi in his seminal paper published in 2000. The way these methods work is by modeling each individual node competing for...

Full description

Saved in:
Bibliographic Details
Main Authors: Gallardo, J R, Makrakis, D, Mouftah, H T
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page 6
container_issue
container_start_page 1
container_title
container_volume
creator Gallardo, J R
Makrakis, D
Mouftah, H T
description Using discrete-time Markov chains to analyze the performance of contention-based medium access control (MAC) protocols has been a common practice since its initial proposal by Bianchi in his seminal paper published in 2000. The way these methods work is by modeling each individual node competing for the medium in a wireless network as a Markov chain. Performance metrics of the whole system, such as throughput, delays and losses, can then be obtained from the model. However, these methods implicitly assume that Markov chains modeling individual nodes are independent from each other, which is not necessarily true in most situations. In this work we propose a more realistic model in which the whole network with all of its nodes is modeled using a single Markov chain, and in which assuming independence is no longer necessary. We reduce the complexity of the problem, both in processing and memory requirements, by taking advantage of its inherent symmetry, which allows us to work with only a few selected representative states. We evaluate how results from both types of methods compare to each other and to simulations. Our findings show that the old method has a very poor performance as compared to the new one.
doi_str_mv 10.1109/ICC.2010.5502486
format conference_proceeding
fullrecord <record><control><sourceid>ieee_CHZPO</sourceid><recordid>TN_cdi_ieee_primary_5502486</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5502486</ieee_id><sourcerecordid>5502486</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-c84cba83afcf3554ae453716a72cc233553d8185f97de3bbd61a79500446e59e3</originalsourceid><addsrcrecordid>eNpFUFtLwzAUjpeB3fRd8KV_IDMnJ2mSF2EGL4OV-eDAt5G2qVZnIk0Z-O-tOPDp47sdOB8hl8DmAMxcL62dczYyKRkXujgiUxBciEIwfDkmGRjUFLTGk3-Dw-lojAWKBVMTkmmghTBSqDMyTemdMckNQkZu1iEvY-N3XXjNbQyDD0MXA711yTd5ubD5Ux-HWMddyjfpN1S6_iPuc_vmupDOyaR1u-QvDjgjm_u7Z_tIV-uHpV2saAdKDrTWoq6cRtfWLUopnBcSFRRO8brmOErYaNCyNarxWFVNAU4Zydj4jJfG44xc_d3tvPfbr777dP339jAI_gAksEyC</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>On Modeling Contention-Based MAC Protocols Using Markov Chains</title><source>IEEE Xplore All Conference Series</source><creator>Gallardo, J R ; Makrakis, D ; Mouftah, H T</creator><creatorcontrib>Gallardo, J R ; Makrakis, D ; Mouftah, H T</creatorcontrib><description>Using discrete-time Markov chains to analyze the performance of contention-based medium access control (MAC) protocols has been a common practice since its initial proposal by Bianchi in his seminal paper published in 2000. The way these methods work is by modeling each individual node competing for the medium in a wireless network as a Markov chain. Performance metrics of the whole system, such as throughput, delays and losses, can then be obtained from the model. However, these methods implicitly assume that Markov chains modeling individual nodes are independent from each other, which is not necessarily true in most situations. In this work we propose a more realistic model in which the whole network with all of its nodes is modeled using a single Markov chain, and in which assuming independence is no longer necessary. We reduce the complexity of the problem, both in processing and memory requirements, by taking advantage of its inherent symmetry, which allows us to work with only a few selected representative states. We evaluate how results from both types of methods compare to each other and to simulations. Our findings show that the old method has a very poor performance as compared to the new one.</description><identifier>ISSN: 1550-3607</identifier><identifier>ISBN: 1424464021</identifier><identifier>ISBN: 9781424464029</identifier><identifier>EISSN: 1938-1883</identifier><identifier>EISBN: 142446403X</identifier><identifier>EISBN: 9781424464043</identifier><identifier>EISBN: 1424464048</identifier><identifier>EISBN: 9781424464036</identifier><identifier>DOI: 10.1109/ICC.2010.5502486</identifier><identifier>LCCN: 81-649547</identifier><language>eng</language><publisher>IEEE</publisher><subject>Access protocols ; Communications Society ; Information technology ; Internetworking ; Laboratories ; Media Access Protocol ; Peer to peer computing ; Performance analysis ; Probability ; Wireless application protocol</subject><ispartof>2010 IEEE International Conference on Communications, 2010, p.1-6</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5502486$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2056,27923,54553,54918,54930</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5502486$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Gallardo, J R</creatorcontrib><creatorcontrib>Makrakis, D</creatorcontrib><creatorcontrib>Mouftah, H T</creatorcontrib><title>On Modeling Contention-Based MAC Protocols Using Markov Chains</title><title>2010 IEEE International Conference on Communications</title><addtitle>ICC</addtitle><description>Using discrete-time Markov chains to analyze the performance of contention-based medium access control (MAC) protocols has been a common practice since its initial proposal by Bianchi in his seminal paper published in 2000. The way these methods work is by modeling each individual node competing for the medium in a wireless network as a Markov chain. Performance metrics of the whole system, such as throughput, delays and losses, can then be obtained from the model. However, these methods implicitly assume that Markov chains modeling individual nodes are independent from each other, which is not necessarily true in most situations. In this work we propose a more realistic model in which the whole network with all of its nodes is modeled using a single Markov chain, and in which assuming independence is no longer necessary. We reduce the complexity of the problem, both in processing and memory requirements, by taking advantage of its inherent symmetry, which allows us to work with only a few selected representative states. We evaluate how results from both types of methods compare to each other and to simulations. Our findings show that the old method has a very poor performance as compared to the new one.</description><subject>Access protocols</subject><subject>Communications Society</subject><subject>Information technology</subject><subject>Internetworking</subject><subject>Laboratories</subject><subject>Media Access Protocol</subject><subject>Peer to peer computing</subject><subject>Performance analysis</subject><subject>Probability</subject><subject>Wireless application protocol</subject><issn>1550-3607</issn><issn>1938-1883</issn><isbn>1424464021</isbn><isbn>9781424464029</isbn><isbn>142446403X</isbn><isbn>9781424464043</isbn><isbn>1424464048</isbn><isbn>9781424464036</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2010</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNpFUFtLwzAUjpeB3fRd8KV_IDMnJ2mSF2EGL4OV-eDAt5G2qVZnIk0Z-O-tOPDp47sdOB8hl8DmAMxcL62dczYyKRkXujgiUxBciEIwfDkmGRjUFLTGk3-Dw-lojAWKBVMTkmmghTBSqDMyTemdMckNQkZu1iEvY-N3XXjNbQyDD0MXA711yTd5ubD5Ux-HWMddyjfpN1S6_iPuc_vmupDOyaR1u-QvDjgjm_u7Z_tIV-uHpV2saAdKDrTWoq6cRtfWLUopnBcSFRRO8brmOErYaNCyNarxWFVNAU4Zydj4jJfG44xc_d3tvPfbr777dP339jAI_gAksEyC</recordid><startdate>201005</startdate><enddate>201005</enddate><creator>Gallardo, J R</creator><creator>Makrakis, D</creator><creator>Mouftah, H T</creator><general>IEEE</general><scope>6IE</scope><scope>6IH</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIO</scope></search><sort><creationdate>201005</creationdate><title>On Modeling Contention-Based MAC Protocols Using Markov Chains</title><author>Gallardo, J R ; Makrakis, D ; Mouftah, H T</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-c84cba83afcf3554ae453716a72cc233553d8185f97de3bbd61a79500446e59e3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2010</creationdate><topic>Access protocols</topic><topic>Communications Society</topic><topic>Information technology</topic><topic>Internetworking</topic><topic>Laboratories</topic><topic>Media Access Protocol</topic><topic>Peer to peer computing</topic><topic>Performance analysis</topic><topic>Probability</topic><topic>Wireless application protocol</topic><toplevel>online_resources</toplevel><creatorcontrib>Gallardo, J R</creatorcontrib><creatorcontrib>Makrakis, D</creatorcontrib><creatorcontrib>Mouftah, H T</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan (POP) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Xplore</collection><collection>IEEE Proceedings Order Plans (POP) 1998-present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Gallardo, J R</au><au>Makrakis, D</au><au>Mouftah, H T</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>On Modeling Contention-Based MAC Protocols Using Markov Chains</atitle><btitle>2010 IEEE International Conference on Communications</btitle><stitle>ICC</stitle><date>2010-05</date><risdate>2010</risdate><spage>1</spage><epage>6</epage><pages>1-6</pages><issn>1550-3607</issn><eissn>1938-1883</eissn><isbn>1424464021</isbn><isbn>9781424464029</isbn><eisbn>142446403X</eisbn><eisbn>9781424464043</eisbn><eisbn>1424464048</eisbn><eisbn>9781424464036</eisbn><abstract>Using discrete-time Markov chains to analyze the performance of contention-based medium access control (MAC) protocols has been a common practice since its initial proposal by Bianchi in his seminal paper published in 2000. The way these methods work is by modeling each individual node competing for the medium in a wireless network as a Markov chain. Performance metrics of the whole system, such as throughput, delays and losses, can then be obtained from the model. However, these methods implicitly assume that Markov chains modeling individual nodes are independent from each other, which is not necessarily true in most situations. In this work we propose a more realistic model in which the whole network with all of its nodes is modeled using a single Markov chain, and in which assuming independence is no longer necessary. We reduce the complexity of the problem, both in processing and memory requirements, by taking advantage of its inherent symmetry, which allows us to work with only a few selected representative states. We evaluate how results from both types of methods compare to each other and to simulations. Our findings show that the old method has a very poor performance as compared to the new one.</abstract><pub>IEEE</pub><doi>10.1109/ICC.2010.5502486</doi><tpages>6</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1550-3607
ispartof 2010 IEEE International Conference on Communications, 2010, p.1-6
issn 1550-3607
1938-1883
language eng
recordid cdi_ieee_primary_5502486
source IEEE Xplore All Conference Series
subjects Access protocols
Communications Society
Information technology
Internetworking
Laboratories
Media Access Protocol
Peer to peer computing
Performance analysis
Probability
Wireless application protocol
title On Modeling Contention-Based MAC Protocols Using Markov Chains
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-14T12%3A44%3A04IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_CHZPO&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=On%20Modeling%20Contention-Based%20MAC%20Protocols%20Using%20Markov%20Chains&rft.btitle=2010%20IEEE%20International%20Conference%20on%20Communications&rft.au=Gallardo,%20J%20R&rft.date=2010-05&rft.spage=1&rft.epage=6&rft.pages=1-6&rft.issn=1550-3607&rft.eissn=1938-1883&rft.isbn=1424464021&rft.isbn_list=9781424464029&rft_id=info:doi/10.1109/ICC.2010.5502486&rft.eisbn=142446403X&rft.eisbn_list=9781424464043&rft.eisbn_list=1424464048&rft.eisbn_list=9781424464036&rft_dat=%3Cieee_CHZPO%3E5502486%3C/ieee_CHZPO%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i175t-c84cba83afcf3554ae453716a72cc233553d8185f97de3bbd61a79500446e59e3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5502486&rfr_iscdi=true