Performance analysis of MAC protocols in wireless line networks using statistical mechanics

Ka Hung Hui, Dongning Guo, Randall Berry, Martin Haenggi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Scopus citations

Abstract

In this paper we consider the application of the Ising model from statistical mechanics to model interactions among interfering stations in a wireless network with a line topology. Each station employs a medium access control (MAC) protocol such that it decides to transmit or not depending on the states of its nearest neighbors and itself in the previous time slot.We use the Ising model to demonstrate how the interactions between neighboring stations affect the one-hop throughput of the network and to optimize the underlying MAC protocol. Both the cases of single-packet and multipacket reception are considered. For single-packet reception, the throughput achieved by an optimized protocol is shown to be 15.8% better than that achieved by slotted ALOHA. In the multipacket reception case, the MAC protocol achieves the same throughput as TDMA, which doubles the throughput of slotted ALOHA.

Original languageEnglish (US)
Title of host publication2009 47th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2009
Pages1315-1322
Number of pages8
DOIs
StatePublished - 2009
Event2009 47th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2009 - Monticello, IL, United States
Duration: Sep 30 2009Oct 2 2009

Publication series

Name2009 47th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2009

Other

Other2009 47th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2009
Country/TerritoryUnited States
CityMonticello, IL
Period9/30/0910/2/09

ASJC Scopus subject areas

  • Computer Science(all)
  • Control and Systems Engineering
  • Communication

Fingerprint

Dive into the research topics of 'Performance analysis of MAC protocols in wireless line networks using statistical mechanics'. Together they form a unique fingerprint.

Cite this