Intelligent Paging Backoff Algorithm for IEEE 802.11 MAC Protocol

  • Ahmad Abed Elellah Momani
  • Muneer Bani Yassein
  • Omar Darwish
  • Saher Manaseer
  • Wail Mardini
Keywords: Backoff algorithms, BO, Binary Exponential Backoff, BEB, Contention window, CW, Medium Access Control, MAC, Failure transmissions

Abstract

Backoff algorithms have been introduced to improve network performance by reducing collisions over networks, especially in large ones. The Binary Exponential Backoff used in the standard IEEE 802.11 Medium Access Control makes exponential increments to contention window sizes. The large contention window gaps produced can significantly reduce the network performance. Therefore, a new increment behavior is introduced in this paper in order to avoid failure transmissions. The Results show that shifting the contention window to the right place based on previous transmissions outperforms each of the Binary Exponential Backoff Algorithm, the Smart Adaptive Backoff Algorithm and Pessimistic Linear Exponential Backoff Algorithm, up to 7.1%, 16.5% and 19% respectively in term of data delivery ratio.

Author Biographies

Ahmad Abed Elellah Momani

Ahmad A. Momani

received his B.Sc. degree in Computer Science from Jordan University of Science and Technology, Jordan in 2007 and M. Sc. in Computer Science, from Jordan University of Science and Technology, Jordan in 2011. His main area of research is Computer Networks. Currently, he is an active researcher in the field of Mobile Ad Hoc Networks. More specifically, his research on MANETs is focused on developing MAC layer protocols. Before obtaining his Masters, he has worked as a programmer for one year in 2007. Now he is a part time lecturer in Jordan University of Science and Technology and Jerash Private University. Moreover, he is a teacher in the Ministry of Education since 2008.
Muneer Bani Yassein

Muneer O. Bani Yassein

received his B.Sc. degree in Computing Science and Mathematics from Yarmouk University, Jordan in 1985 and M. Sc. in Computer Science, from Al Al-bayt University, Jordan in 2001. He received his Ph.D. degree in Computing Science from the University of Glasgow, U.K. in 2007. His current research interests include networking protocol development and analysis the performance probabilistic flooding in mobile ad hoc networks.
Omar Darwish

Omar A. Darwish

received his M. Sc. in Computer Science with excellence, from Jordan University of Science and Technology, Jordan, his rank was the first on 2010 / 2011 class. His current research interests are Computer Networks, Data mining, Information Retrieval and Software Engineering. Before obtaining his Masters degree he has worked as software engineer in Smart System group and a programmer in Nuqul group .He is a part time lecturer in Jordan University of Science and Technology
Saher Manaseer

Saher S. Manaseer

received PhD degree in Computer Science from the Department of Computing Science at the University of Glasgow in 2009. His main area of research is Computer Networks and Embedded Systems. Currently, he is an active researcher in the field of Mobile Ad Hoc Networks. More specifically, his research on MANETs is focused on developing MAC layer protocols. Before obtaining his PhD, He got his Masters in Computing Science from the University of Jordan in 2004 where his research in that era was focused on Software Engineering. Since he earned his undergraduate degree in Computer science, he has worked in two parallel directions, being Training and software development.
Wail Mardini

Wail E. Mardini

is an assistant professor at the Computer Science department at Jordan University of Science and Technology (JUST)/Jordan. He received his B.Sc. in Applied Mathematics from JUST in 1997, Master’s degree in Computer Science from University of New Brunswick/Canada in 2001, and his Ph.D. degree in Computer Science from University of Ottawa/Canada in 2006. His research interests include the following areas: Wireless Mesh Networks, Wireless Sensor Networks, Wireless Optical Mesh Networks, Optical Network Survivability, WiMax Technology, and Scheduling in Parallel Computing and Intrusion Detection in data base Techniques.
Published
2012-06-19
Section
Ad-Hoc and Sensor Network Protocols and Algorithms