TY - JOUR
T1 - Efficient multiple access control using a channel-adaptive protocol for a wireless ATM-based multimedia services network
AU - Kwok, Y. K.
AU - Lau, V. K.N.
N1 - Funding Information:
The authors would like to thank the reviewers for their constructive and insightful comments, which have improved the paper significantly. The authors would also like to thank Professor Victor Li for his initial inspiration on the idea of joint design of protocol layers. This research was also jointly supported by research initiation grants from the HKU CRCG under contract numbers 10202523 and 10202518, by a seed grant from the HKU URC under contract number 10203010, and by a grant from the Hong Kong Research Grants Council under contract number HKU7124/99E.
PY - 2001/5/15
Y1 - 2001/5/15
N2 - As tetherless multimedia computing environments are becoming much desired, broadband wireless communication infrastructures such as wireless ATM will play an important role and thus, are expected to proliferate. However, despite much research efforts have been expended, the multiple access control of the precious bandwidth remains a challenging problem because of the existence of two common drawbacks in state-of-the-art protocols: (1) channel condition is ignored or not exploited, and (2) inflexible or biased time slots allocation algorithms are used. Indeed, existing protocols mostly ignore the burst errors due to fading and shadowing, which are inevitable in a mobile and wireless communication environment. A few protocols take into account the burst errors but just "handle" the errors in a passive manner. On the other hand, most of the existing protocols employ an inflexible or biased allocation algorithm such that over-provisioning may occur for a certain class of users at the expense of the poor service quality received by other users. In this paper, a new judicious MAC protocol, called SCAMA (synergistic channel adaptive multiple access) is proposed. The proposed protocol works closely with the underlying physical layer in that through observing the channel state information (CSI) of each mobile user, the MAC protocol first segregates a set of users with good CSI from requests gathered in the request contention phase of an uplink frame. The MAC protocol then judiciously allocates information time slots to the users according to the respective traffic types, CSI, urgency, and throughput, which are collectively represented by a novel and flexible priority function. Extensive simulation results indicate that the protocol is robust and considerably outperforms previous protocols.
AB - As tetherless multimedia computing environments are becoming much desired, broadband wireless communication infrastructures such as wireless ATM will play an important role and thus, are expected to proliferate. However, despite much research efforts have been expended, the multiple access control of the precious bandwidth remains a challenging problem because of the existence of two common drawbacks in state-of-the-art protocols: (1) channel condition is ignored or not exploited, and (2) inflexible or biased time slots allocation algorithms are used. Indeed, existing protocols mostly ignore the burst errors due to fading and shadowing, which are inevitable in a mobile and wireless communication environment. A few protocols take into account the burst errors but just "handle" the errors in a passive manner. On the other hand, most of the existing protocols employ an inflexible or biased allocation algorithm such that over-provisioning may occur for a certain class of users at the expense of the poor service quality received by other users. In this paper, a new judicious MAC protocol, called SCAMA (synergistic channel adaptive multiple access) is proposed. The proposed protocol works closely with the underlying physical layer in that through observing the channel state information (CSI) of each mobile user, the MAC protocol first segregates a set of users with good CSI from requests gathered in the request contention phase of an uplink frame. The MAC protocol then judiciously allocates information time slots to the users according to the respective traffic types, CSI, urgency, and throughput, which are collectively represented by a novel and flexible priority function. Extensive simulation results indicate that the protocol is robust and considerably outperforms previous protocols.
KW - Adaptive protocol
KW - Mobile computing
KW - Multiple access control
KW - Wireless ATM
UR - http://www.scopus.com/inward/record.url?scp=0035873290&partnerID=8YFLogxK
U2 - 10.1016/S0140-3664(00)00278-4
DO - 10.1016/S0140-3664(00)00278-4
M3 - Article
AN - SCOPUS:0035873290
SN - 0140-3664
VL - 24
SP - 970
EP - 983
JO - Computer Communications
JF - Computer Communications
IS - 10
ER -