Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2013 (2013), Article ID 187630, 16 pages
http://dx.doi.org/10.1155/2013/187630
Research Article

A Team Study of a Multiple-Power Wireless Random Channel Access Mechanism with Capture Effect

1L-IR2M, Faculty of Sciences and Techniques Hassan 1st University, Settat, Morocco
2ENSEM-GREENTIC Hassan II University Casablanca, Morocco
3Engineering Division, ITAM, Mexico City, DF, Mexico
4University of Castilla La Mancha (UCLM), 02071 Albacete, Spain

Received 25 March 2013; Revised 24 June 2013; Accepted 25 June 2013

Academic Editor: Xu Zhang

Copyright © 2013 Abdelillah Karouit et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. E. Sabir, R. El-Azouzi, T. Jiménez, and E.-H. Bouyakhf, “Modeling slotted aloha as a stochastic game with random discrete power selection algorithms,” Journal of Computer Systems, Networks, and Communications, vol. 2009, Article ID 572650, 28 pages, 2009. View at Publisher · View at Google Scholar · View at Scopus
  2. R. Jurdak, C. V. Lopes, and P. Baldi, “A survey, classification and comparative analysis of medium access control protocols for ad hoc networks?” IEEE Communications Surveys and Tutorials, vol. 6, no. 1, pp. 2–16, 2004. View at Google Scholar
  3. A. B. MacKenzie and S. B. Wicker, “Stability of slotted aloha with multi-packet reception and selfish users,” in Proceedings of the IEEE INFOCOM, April 2003.
  4. R. R. Rao and A. Ephremides, “On the stability of interacting queues in a multiple-access system,” IEEE Transactions on Information Theory, vol. 34, no. 5, pp. 918–930, 1988. View at Publisher · View at Google Scholar · View at Scopus
  5. W. Szpankowski, “Stability conditions for some distributed systems: buffered random access systems,” Advances in Applied Probability, vol. 26, pp. 498–515, 1994. View at Google Scholar
  6. V. Anantharam, “The stability region of the finite-user slotted ALOHA protocol,” IEEE Transactions on Information Theory, vol. 37, no. 3, pp. 535–540, 1991. View at Publisher · View at Google Scholar · View at Scopus
  7. D. J. Aldous, “Ultimate instability of exponential backoff protocol for acknowledgment based transmission control of random access communication channels,” IEEE Transactions on Information Theory, vol. 33, no. 2, pp. 219–223, 1987. View at Google Scholar · View at Scopus
  8. J. Goodman, A. G. Greenberg, N. Madras, and P. March, “Stability of binary exponential backoff,” Journal of the ACM, vol. 35, no. 3, pp. 579–602, 1988. View at Publisher · View at Google Scholar · View at Scopus
  9. M. Paterakis, L. Georgiadis, and P. Papantoni-Kazakos, “On the relation between the finite and the infinite population models for a class of raa's,” IEEE Transactions on Communications, vol. 35, no. 11, pp. 1239–1240, 1987. View at Google Scholar · View at Scopus
  10. A. Haqiq, A. Karouit, and L. O. Barbosa, “A team study of the IEEE 802.16 collision resolution protocol,” in Proceedings of the IFIP Wireless Days (WD '10), pp. 1–6, Venice, Italy, October 2010. View at Publisher · View at Google Scholar · View at Scopus
  11. A. Karouit, L. O. Barbosa, and A. Haqiq, “QoS criteria of the IEEE 802.16 collision resolution protocol,” in Proceeding of International Conference MICS, Rabat, Morocco, 2010.
  12. E. Altman, D. Barman, A. Benslimane, and R. El Azouzi, “Slotted aloha with priorities and random power,” in Proceedings of NETWORKING, pp. 610–622, Ontario, Canada, May 2005. View at Scopus
  13. J. H. Sarker, M. Hassan, and S. J. Halme, “Power level selection schemes to improve throughput and stability of slotted ALOHA under heavy load,” Computer Communications, vol. 25, no. 18, pp. 1719–1726, 2002. View at Publisher · View at Google Scholar · View at Scopus
  14. B.-J. Kwak, N.-O. Song, and L. E. Miller, “Performance analysis of exponential backoff,” IEEE/ACM Transactions on Networking, vol. 13, no. 2, pp. 343–355, 2005. View at Publisher · View at Google Scholar · View at Scopus
  15. J. Barcelo, B. Bellalta, C. Cano, and M. Oliver, “Learning-BEB: avoiding collisions in WLAN,” in Proceedings of the IFIP EUNICE, 2008.
  16. R. El-Azouzi, E. Sabir, S. K. Samanta, and R. El-Khoury, “Asymptotic delay analysis and timeout-based admission control for ad hoc wireless networks with asymmetric users,” Computer Communications, vol. 33, no. 17, pp. 2057–2069, 2010. View at Publisher · View at Google Scholar · View at Scopus
  17. J. Yan and G.-S. Kuo, “Cross-layer design of optimal contention period for IEEE 802.16 BWA systems,” in Proceedings of the IEEE International Conference on Communications (ICC '06), pp. 1807–1812, July 2006. View at Publisher · View at Google Scholar · View at Scopus
  18. D. Bertsekas and R. Gallager, Data Networks, Prentice Hall, Englewood Cliffs, NJ, USA, 1987.
  19. G. E. Andrews, The Theory of Partitions, Addison-Wesley, Advanced Book Program, Reading, Mass, USA, 1976.
  20. E. M. Reingold, J. Nievergelt, and N. Deo, Combinatorial Algorithms, Prentice Hall, Englewood Cliffs, NJ, USA, 1977.
  21. R. T. B. Ma, V. Misra, and D. Rubenstein, “Modeling and analysis of generalized slotted-aloha MAC protocols in cooperative, competitive and adversarial environments,” in Proceedings of the 26th IEEE International Conference on Distributed Computing Systems (ICDCS '06), Lisbon, Portugal, July 2006. View at Publisher · View at Google Scholar · View at Scopus
  22. D. Chuck, K.-Y. Chen, and J. M. Chang, “A comprehensive analysis of bandwidth request mechanisms in IEEE 802.16 networks,” IEEE Transactions on Vehicular Technology, vol. 59, no. 4, pp. 2046–2056, 2010. View at Publisher · View at Google Scholar · View at Scopus
  23. S. Gollakota and D. Katabi, “ZigZag decoding: combating hidden terminals in wireless networks,” in Proceedings of SIGCOMM, Seattle, Wash, USA, 2008.