O-ACK: An adaptive wireless MAC protocol exploiting opportunistic token-passing and ack piggybacking

Shegufta Bakht Ahsan, Nitin Vaidya

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Bandwidth is a shared and limited resource of the wireless LAN. The MAC protocols are mainly responsible for efficiently sharing it among all the stations. The IEEE 802.11 standard uses Distributed Coordination Function (DCF) as its default MAC protocol which employs Carrier Sense Multiple Access using Collision Avoidance (CSMA/CA) scheme with binary exponential backoff algorithm. Despite its ubiquitous acceptance, it has two major drawbacks: i) channel idle time and ii) collision overhead. Besides, this protocol uses explicit ack which comes with significant overheads, for example preamble, frame header etc. In this paper, we propose a scheme called O-ACK which reduces the overhead of explicit ack and backoff interval by leveraging piggybacking, packet overhearing and token based scheduling. Our NS2 based simulation results confirm that this protocol significantly outperforms the DCF protocol.

Original languageEnglish (US)
Title of host publicationProceedings of the 40th Annual IEEE Conference on Local Computer Networks, LCN 2015
EditorsSalil Kanhere, Jens Tolle, Soumaya Cherkaoui
PublisherIEEE Computer Society
Pages410-413
Number of pages4
ISBN (Electronic)9781467367707
DOIs
StatePublished - Dec 24 2015
Event2015 IEEE 40th Conference on Local Computer Networks, LCN 2015 - Clearwater Beach, United States
Duration: Oct 26 2015Oct 29 2015

Publication series

NameProceedings - Conference on Local Computer Networks, LCN
Volume26-29-October-2015

Other

Other2015 IEEE 40th Conference on Local Computer Networks, LCN 2015
CountryUnited States
CityClearwater Beach
Period10/26/1510/29/15

Keywords

  • Fairness
  • Multiple Access Point
  • Packet Overhearing
  • Token Passing

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Hardware and Architecture

Fingerprint Dive into the research topics of 'O-ACK: An adaptive wireless MAC protocol exploiting opportunistic token-passing and ack piggybacking'. Together they form a unique fingerprint.

Cite this