Exploiting peer-to-peer state exchange for distributed medium access control

Ka Hung Hui*, Li Tianyi Li, Dongning Guo, Randall A. Berry

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

Abstract

Distributed medium access control (MAC) protocols are proposed for wireless networks assuming that one-hop peers can exchange a small amount of state information periodically. Each station maintains a state and makes state transitions and transmission decisions based on its state and recent state information collected from its one-hop peers. A station can adapt its packet length and the size of its state space to the amount of traffic in its neighborhood. It is shown that these protocols converge to a steady state, where stations take turns to transmit in each neighborhood without collision. An important consequence of this work is that using such protocols, an efficient time-division multiple access (TDMA) like schedule can be formed in a distributed manner, as long as the topology of the network remains static or changes slowly with respect to the execution of the protocol.

Original languageEnglish (US)
Title of host publication2011 IEEE International Symposium on Information Theory Proceedings, ISIT 2011
Pages2368-2372
Number of pages5
DOIs
StatePublished - 2011
Event2011 IEEE International Symposium on Information Theory Proceedings, ISIT 2011 - St. Petersburg, Russian Federation
Duration: Jul 31 2011Aug 5 2011

Publication series

NameIEEE International Symposium on Information Theory - Proceedings
ISSN (Print)2157-8104

Other

Other2011 IEEE International Symposium on Information Theory Proceedings, ISIT 2011
Country/TerritoryRussian Federation
CitySt. Petersburg
Period7/31/118/5/11

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Information Systems
  • Modeling and Simulation
  • Applied Mathematics

Fingerprint

Dive into the research topics of 'Exploiting peer-to-peer state exchange for distributed medium access control'. Together they form a unique fingerprint.

Cite this