On the Logarithmic Backoff Algorithm for MAC Protocol in MANETs

On the Logarithmic Backoff Algorithm for MAC Protocol in MANETs

Saher S. Manaseer (University of Glasgow, UK), Mohamed Ould-Khaoua (University of Glasgow, UK) and Lewis M. Mackenzie (University of Glasgow, UK)
DOI: 10.4018/978-1-60566-418-7.ch012
OnDemand PDF Download:


In wireless communication environments, backoff is traditionally based on the IEEE binary exponential backoff (BEB). Using BEB results in a high delay in message transmission, collisions and ultimately wasting the limited available bandwidth. As each node has to obtain medium access before transmitting a message, in dense networks, the collision probability in the MAC layer becomes very high when a poor backoff algorithm is used. The Logarithmic algorithm proposes some improvements to the backoff algorithms that aim to efficiently use the channel and to reduce collisions. The algorithm under study is based on changing the incremental behavior of the backoff value. The Binary Exponential Backoff (BEB) is used by the Local Area Networks standards, IEEE 802.11, Medium Access Control (MAC). BEB uses a uniform random distribution to choose the backoff value; this often leads to reducing the effect of window size increment. This paper carries out a deeper study and analysis of the logarithmic backoff algorithm that uses logarithmic increment instead of exponential extension of window size to eliminate the degrading effect of random number distribution. Results from simulation experiments reveal that the algorithm subject to study achieves higher throughput and less packet loss when in a mobile ad hoc environment.
Chapter Preview


Since their emergence, wireless networks have become increasingly popular in the computing industry. This is particularly true within the past decade, which has seen wireless networks being adapted to enable mobility. There are currently two variations of mobile wireless networks (IEEE, ANSI/IEEE Standard 802.11, 1999), infrastructure, and ad hoc wireless networks.

Infrastructured networks, that is, those networks with fixed and wired gateways, have bridges known as base stations. A mobile unit within these networks connects to, and communicates with, the nearest base station within its communication radius. Typical applications of this type of network include wireless local area networks (WLAN) (IEEE, ANSI/IEEE Standard 802.11, 1999).

Mobile ad hoc networks (MANETs) are getting more and more attention. Unlike wired networks, MANETs are easily deployed, and need no infrastructure (Fang, Bensaou, & Wang, 2002). Such networks can be useful in disaster recovery, where there is not enough time or resources to configure a wired network. Ad hoc networks also are used in military operations, where the units are moving around the battlefield in a random way, and a central unit cannot be used for synchronization (Fang et al., 2002).

In MANETs, a central station is not needed to control the different types of operations taking place allover the network (Sundaresan & Sivakumar, 2004). A node participating in an ad hoc network must have the ability to act as a client, a server, and a router (Fang et al., 2002). Nodes also should have the ability to connect to the network and to automatically configure to start transmitting data over the network. This is the reason why ad hoc protocols, in general, function in a distributed manner (Manaseer & Ould-Khaoua, 2005). The distributed coordination function (DCF) is used for synchronous, contention-based, distributed access to the channel (Bononi et al., 2004). MANETs use a shared medium to transfer data between its nodes.

It is unrealistic to expect a MANET to be fully connected, where a node can communicate directly with every other node in the network. Typically nodes must use a multihop path for transmission, and a packet may traverse multiple nodes before being delivered to its destination.

The wireless medium used by MANETs has a number of problems, including bandwidth sharing, signal fading, noise, interference, and so forth. With such a shared medium, an efficient and effective MAC is essential for sharing the scarce bandwidth resource (Cali, Conti, & Gregori, 1998; Fang et al., 2002). Based on the features mentioned, the design of the MAC protocol is a significantly affects a MANET.

As a part of an efficient MAC protocol, a backoff algorithm is used to avoid collisions, when more than one node tries to access the channel (Manaseer & Ould-Khaoua, 2005). Only one of the nodes is granted access to the channel, while other contending nodes are suspended into a backoff state for some period (Goodman, Albert, Madras, & March, 1985). Many backoff algorithms have been developed in the literature (Sundaresan & Sivakumar 2004; Xu, Gerla, & Bae, 2002). One example is the multiplicative increase linear decrease (MILD) algorithm (Sakakibara, Sasaki, & Yamakita, 2005). This algorithm improves the total throughput of the network, but the cost of this improvement is the need of a perfect knowledge about collisions happening over the network, which is high cost, hard-to-acquire knowledge.

In a normal LAN, the total number of nodes of the network is easily obtained. However, as nodes in MANETs are mobile, knowing the number of nodes may incur a high cost, since this knowledge needs to be updated. One approach to update and keep the knowledge coherent is by exchanging “hello” packets between neighboring nodes (Manaseer & Ould-Khaoua, 2005). Broadcasting “hello” packets over the network generates extra traffic load over the network, consumes a part of the network resources, causes a longer delay, requires more control processing, and even gives more work to the backoff algorithm itself. Other backoff algorithms have tried to find a fixed optimum backoff value to use. But, even though, the distributed functioning was not complete (Bao & Garcia-Luna-Aceces, 2001).

Complete Chapter List

Search this Book:
Editorial Advisory Board
Table of Contents
Chapter 1
Olivier Berger, Christian Bac, Benoît Hamet
Libre software provides powerful applications ready to be integrated for the build-up of platforms for internal use in organizations. We describe... Sample PDF
Integration of Libre Software Applications to Create a Collaborative Work Platform for Researchers at GET
Chapter 2
James Howison, Megan Conklin, Kevin Crowston
This paper introduces and expands on previous work on a collaborative project, called FLOSSmole (formerly OSSmole), designed to gather, share and... Sample PDF
FLOSSmole: A Collaborative Repository for FLOSS Research Data and Analyses
Chapter 3
Luis López-Fernández, Gregorio Robles, Jesus M. Gonzalez-Barahona, Israel Herraiz
Source code management repositories of large, long-lived libre (free, open source) software projects can be a source of valuable data about the... Sample PDF
Applying Social Network Analysis Techniques to Community-Driven Libre Software Projects
Chapter 4
Walt Scacchi, Chris Jensen, John Noll, Margaret Elliott
Understanding the context, structure, activities, and content of software development processes found in practice has been and remains a challenging... Sample PDF
Multi-Modal Modeling, Analysis, and Validation of Open Source Software Development Processes
Chapter 5
B. B. Rossi, M. Scotto, A. Sillitti, G. Succi
The aim of the paper is to report the results of a migration to Open Source Software (OSS) in one Public Administration. The migration focuses on... Sample PDF
An Empirical Study on the Migration to OpenOffice.org in a Public Administration
Chapter 6
Claudio Agostino Ardagna, Fulvio Frati, Gabriele Gianini
Business and recreational activities on the global communication infrastructure are increasingly based on the use of remote resources and services... Sample PDF
Open Source in Web-Based Applications: A Case Study on Single Sign-On
Chapter 7
Qusay H. Mahmoud, Zakaria Maamar
Conventional desktop software applications are usually designed, built, and tested on a platform similar to the one on which they will be deployed... Sample PDF
Engineering Wireless Mobile Applications
Chapter 8
G. Sivaradje, R. Nakkeeran, P. Dananjayan
In this paper, a novel prediction technique is proposed, which uses road topology information for prediction. The proposed scheme uses real time... Sample PDF
A Prediction Based Flexible Channel Assignment in Wireless Networks using Road Topology Information
Chapter 9
Hesham A. Ali, Tamer Ahmed Farrag
Due to the rapidly increasing of the mobile devices connected to the internet, a lot of researches are being conducted to maximize the benefit of... Sample PDF
High Performance Scheduling Mechanism for Mobile Computing Based on Self-Ranking Algorithm (SRA)
Chapter 10
Khaldoon Al-Zoubi
This paper proposes hierarchal scheduling schemes for Grid systems: a self-discovery scheme for the resource discovery stage and an adaptive child... Sample PDF
Hierarchical Scheduling in Heterogeneous Grid Systems
Chapter 11
Amjad Mahmood, Taher S.K. Homeed
Object replication is a well-known technique to improve performance of a distributed Web server system. This paper first presents an algorithm to... Sample PDF
Object Grouping and Replication on a Distributed Web Server System
Chapter 12
Saher S. Manaseer, Mohamed Ould-Khaoua, Lewis M. Mackenzie
In wireless communication environments, backoff is traditionally based on the IEEE binary exponential backoff (BEB). Using BEB results in a high... Sample PDF
On the Logarithmic Backoff Algorithm for MAC Protocol in MANETs
Chapter 13
Xunhua Wang, David Rine
Domain Name System (DNS) is the system for the mapping between easily memorizable host names and their IP addresses. Due to its criticality, the... Sample PDF
Secure Online DNS Dynamic Updates: Architecture and Implementation
Chapter 14
Osama H.S. Khader
In mobile ad hoc networks, routing protocols are becoming more complicated and problematic. Routing in mobile ad hoc networks is multi-hop because... Sample PDF
FSR Evaluation Using the Suboptimal Operational Values
Chapter 15
Suet Chun Lee
Software product line (SPL) is a software engineering paradigm for software development. A software product within a product line often has specific... Sample PDF
Modeling Variant User Interfaces for Web-Based Software Product Lines
Chapter 16
M. Brian Blake, Lisa Singh, Andrew B. Williams, Wendell Norman, Amy L. Sliva
Organizations are beginning to apply data mining and knowledge discovery techniques to their corporate data sets, thereby enabling the... Sample PDF
Experience Report: A Component-Based Data Management and Knowledge Discovery Framework for Aviation Studies
Chapter 17
A. F. Tappenden, T. Huynh, J. Miller, A. Geras, M. Smith
This article outlines a four-point strategy for the development of secure Web-based applications within an agile development framework and... Sample PDF
Agile Development of Secure Web-Based Applications
Chapter 18
D. Xuan Le, J. Wenny Rahayu, David Taniar
This paper proposes a data warehouse integration technique that combines data and documents from different underlying documents and database design... Sample PDF
Web Data Warehousing Convergence: From Schematic to Systematic
Chapter 19
Haya El-Ghalayini, Mohammed Odeh, Richard McClatchey
This paper studies the differences and similarities between domain ontologies and conceptual data models and the role that ontologies can play in... Sample PDF
Engineering Conceptual Data Models from Domain Ontologies: A Critical Evaluation
Chapter 20
John D. Ferguson, James Miller
It is now widely accepted that software projects utilizing the Web (e-projects) face many of the same problems and risks experienced with more... Sample PDF
Modeling Defects in E-Projects
Chapter 21
Jaime Gomez, Alejandro Bia, Antonio Parraga
This paper describes the engineering foundations of VisualWADE, a CASE tool to automate the production of Web applications. VisualWADE follows a... Sample PDF
Tool Support for Model-Driven Development of Web Applications
About the Editors