Open Access

Throughput and reliability analysis of a scalable broadcast MAC for distributed wireless networks

EURASIP Journal on Wireless Communications and Networking20122012:254

Received: 8 June 2011

Accepted: 16 July 2012

Published: 14 August 2012


In carrier-sense-multiple-access-based distributed wireless networks, the legacy mechanism of arbitrating the access attempts of multiple broadcast users (using a fixed-size temporal contention window consisting of multiple contention slots having uniform selection probability) has been well understood to be inefficient in avoiding collisions, especially when the network is large. Recently, it has been found that this inefficiency can be mitigated by exploiting an additional degree of freedom (DoF) over the contention window, referred to as contention slot selection distribution (CSSD). In this article, the authors examine how the additional DoF contributes to enhancing network performance and quantify the performance gains that the network can achieve in terms of easily understandable performance indicators like network throughput efficiency and broadcast reliability. A discrete-time Markov chain is formulated to characterize the access arbitration process involving a reverse exponential CSSD and its steady-state solution is fed to a renewal-reward process-based network model to estimate the performances of interest. Validated numerical results are presented which confirm that this new channel access arbitration mechanism can significantly enhance the scalability of distributed broadcast networks.


Broadcast MACScalabilityReliabilityContention slot selection distributionDistributed wireless networkIEEE 802.11


Medium access control (MAC)-layer broadcasting is a fundamental network-wide communication primitive that provides an operational platform for many other higher-layer protocols in distributed wireless networks [1]. A very common example is the route discovery mechanism in general-purpose multi-hop ad hoc networks [2]. With the advent of different special purpose ad hoc networks like sensor networks [3] and vehicular ad hoc networks [4], the scope of broadcasting has been widened to incorporate mechanism to disseminate sensed or monitored physical phenomena of interest.

The basic distributed coordination function (DCF), defined in Section 9.2.7 of the IEEE 802.11 protocol specification [5], has been used as a de facto MAC for broadcast applications in distributed wireless networks. Hereafter, it will be referred to as a B-MAC. It uses a temporal contention window-based channel arbitration mechanism along with carrier sense multiple access (CSMA). Note that the rationale behind using the contention window, even after performing carrier sensing, is to mandate contending users to access the channel only after a further deferral (random backoff) period which would possibly avoid concurrent transmissions (literally, packet collisions) from multiple contending users. Note that the efficiency of such a collision avoidance mechanism depends on two factors: the size of the contention window and the number of contending users. For a given size of the contention window, the collision probability increases with an increase in the contending population size. As a consequence, the throughput efficiency of the network decreases. Moreover, because of the large number of destinations in broadcast operation, unlike the single destination in unicast operation, simultaneously acknowledging reception from multiple destinations is not feasible. Therefore, the transmitting user cannot know whether the transmitted packet has safely reached its destinations. Thus, B-MAC does not invoke MAC layer retransmission or recovery for the collided packets as its unicast counterpart does. Therefore, broadcast reliability (in terms of successful reception at destinations) also quickly decreases with an increase in contending population size.

Based on these considerations (the inverse relationship of network throughput efficiency and broadcast reliability with contending population size), it can be stated that B-MAC is nonscalable. The ideal prerequisite for any MAC to be scalable would be its ability to maintain the performances of interest intact, irrespective of any increase in contending population size. Hence, from the perspective of MAC layer, it is desirable to reduce collisions as much as possible to attain scalability. An interesting concept has been proposed in [6, 7] which can drastically reduce the number of collisions in the network. The concept simply exploits an additional degree of freedom (DoF) in designing a broadcast MAC. In particular, the uniform contention slot selection distribution (CSSD) over the contention window is replaced with a nonuniform CSSD which multiplicatively increases the probability of picking a later slot relative to an earlier slot. As a result, the degree of contention remains low for the earlier slots within the contention window, irrespective of the contending population size, and therefore the number of collisions can greatly be reduced. Hereafter, a B-MAC with such a nonuniform CSSD will be called a scalable B-MAC (SB-MAC).

The number of applications of IEEE 802.11-based broadcast networks has continuously been increasing. The accurate characterization of underlying MAC protocols in such networks is essential not only to analyze their performance, but also to identify ways to upgrade and optimize them. In response to this need, Ma and Chen [8] have provided a simple analytical model for B-MAC, which has been further enhanced by Wang and Hassan [9]. Even though these models accurately estimate the performance of B-MAC, they cannot directly be used to characterize the performance of SB-MAC because SB-MAC not only incorporates the nonuniform CSSD, but also adds the concept of resetting the backoff counter when it finds a channel busy instead of freezing it as in the conventional B-MAC. Therefore, in this article, a new analytical model is proposed which accommodates both these modifications and has a simple closed-form solution.

The rest of the article is organized as follows: in the following section, the conventional B-MAC is reviewed, and its inability to support network scalability is comprehensively analyzed. In Section “SB-MAC”, the SB-MAC and an analytical model to characterize its performance are presented. Numerical and simulation results are presented in Section “Performance results and discussions”. Finally, in the last section, some concluding remarks are provided.

Legacy broadcast MAC (B-MAC)

Operational procedure of B-MAC

Figure 1 depicts the legacy B-MAC as defined in Section 9.2.7 of the IEEE 802.11 protocol specification [5]. According to this MAC, each user with broadcast packet(s) to transmit first monitors the channel activity. If the channel is found to be idle for a period of time equal to the distributed interframe space (DIFS), the MAC selects a random backoff time from a set of uniformly distributed prospective backoff durations that are bounded in the interval [0,W−1], where W is the size of the contention window, for which the user should defer transmission. It then decreases the backoff timer by one at the passage of every idle slot until either the channel becomes busy again or the backoff timer reaches zero. If the timer has not yet reached zero but the channel has been detected as busy, the user freezes its timer. The countdown starts again after once more detecting the channel as idle for the DIFS interval. When the timer has finally decremented to zero, the user transmits the packet.
Figure 1

Basic channel access mechanism in the legacy B-MAC.

Note that in B-MAC, the recipients do not acknowledge reception as in a unicast MAC. Therefore, there is no MAC layer recovery or retransmission. For this reason, IEEE 802.11 has specified a fixed contention window for broadcast traffic which is equal to the initial (minimum) contention window specified for unicast traffic.

Discouraging throughput-reliability tradeoff

Recall that the efficiency of the access arbitration method used in B-MAC depends on two factors: the number of contending users and the size of contention window. For a given (specified) contention window size, collision probability increases with an increase in the contending population size. Using a large contention window could be a trivial approach to reduce collisions. This approach, however, has counterproductive implications in the network performance.

Figure 2 shows the performancea of IEEE 802.11a distributed networks for varying contention window sizes. It is evident that, for a given contending population size, both throughput efficiency and broadcast reliability increase with an increase in contention window size up to a certain threshold, let the size be called the critical contention window. Beyond this critical value of contention window, throughput is traded off against reliability. In other words, throughput starts to decrease even though broadcast reliability manages to increase.
Figure 2

Throughput-reliability tradeoff of B-MAC with variable contention window sizes.

Note that even though the usage of a large contention window (larger than the critical window) maintains graceful throughput efficiency, especially when the number of users is high, it is still not a good strategy to use such a large window because it severely elongates transmission delays, which is strongly undesirable for delay-sensitive broadcast traffics.


An ideal prerequisite for any MAC to be scalable would be its ability to maintain the performances of interest (e.g., network throughput efficiency and broadcast reliability) intact, irrespective of any increase in contending population size. Note that both these performance indicators are inversely proportional to the number of collisions, while the number of collisions itself is directly proportional to the contending population size. Hence, from the perspective of MAC layer, collisions should be lowered as much as possible to attain scalability.

Note that the most readily available design choice to enhance the collision avoidance efficiency of B-MAC is to increase the size of contention window. This implies that the number of DoF available for adjusting the contention window is one. SB-MAC adds a second DoF (referred to as CSSD over the contention window) to reduce the number of collisions in the network, irrespective of the contending population size.

Operational procedure of SB-MAC

Recall the operational procedure of the legacy B-MAC which was previously described in Section “Legacy broadcast MAC (B-MAC)”. The operational procedure of the SB-MAC is exactly same as that of B-MAC, except for the following two changes:

First, the way of choosing the random further-deferral (backoff) duration upon performing carrier sense is slightly different because the legacy uniform CSSD over the contention window has been replaced with the reverse-exponential CSSD [7] in (1)
q k = 1 α 1 α W a W ( k + 1 ) ; k [ 0 , W 1 ] ,

where k is any contention slot within the window and α is a design variable (an additional DoF) which is bounded over the open interval (0,1). Note that lim α 1 1 α 1 α W a W ( k + 1 ) = 1 W . In other words the distribution in (1) mimics the legacy uniform CSSD when α → 1.

Second, the requirement to freeze the backoff counter upon sensing the channel to be busy is relaxed. In other words, if the channel is detected to be busy during an ongoing backoff cycle, the backoff counter is reset, and the next backoff cycle is initiated.

Performance analysis of SB-MAC

In this section, an analytical model is presented to estimate the performances of interest: network throughput efficiency and broadcast reliability. The model consists of two sub-models: a newly developed Markov chain-based user model that describes the details of SB-MAC channel arbitration, and a widely used renewal-reward process-based network model [10] that estimates the performances of interest based on the solution obtained from the Markovian user model.

Markov chain-based user model

Figure 3 shows the discrete time Markov chain (DTMC) model which characterizes the backoff procedure of the SB-MAC for a given contention window size W . The DTMC has been developed based on the assumption that the packet arrival rate at the transmission buffer is high enough that the buffer will never be empty.
Figure 3

Representation of the channel access arbitration of the SB-MAC using a DTMC.

In the DTMC, there are all together W + 1 number of states; state 0 to W−1 correspond to the backoff counter values of the tagged user, while an auxiliary state r corresponds to the situation where the backoff counter has been reset. Using conventional state transition notations, all possible transitions in the DTMC and their corresponding transition probabilities can be written as follows:
  1. (a)

    P{k|k + 1} = 1 −p b ; k [0, W − 2],

  2. (b)

    P{r|k} = p b ; k [1, W −1],

  3. (c)

    P{k|0} = q k ;k [0, W − 1],

  4. (d)

    P{k|r} = P {k|0}; k [0, W − 1].


The first expression corresponds to the event that the backoff timer is decreased by one upon detecting the channel to be idle, while the second expression corresponds to the event that the backoff counter is reset upon finding the channel to be busy. In these expressions, p b is the probability that the channel is found to be busy. Its mathematical definition is given in (8). The last two expressions correspond to the events that a random slot is selected for initiating the backoff procedure upon completing the previous backoff cycle (backoff counter reached zero) and upon resetting the backoff counter (channel is detected to be busy), respectively. The transition probabilities are equal in those last two expressions.

In the DTMC, let the stationary distribution of the probabilities that a tagged user is in state k, k [0, W − 1], and r be b k and b r , respectively. It will be shown that a closed-form solution exists for this DTMC. Note that
b k = 1 α 1 α W α W ( k + 1 ) { b 0 + b r } + ( 1 p b ) b k + 1 ; 0 k W 2 , 1 α 1 α W { b 0 + b r } ; k = W 1
b r = p b ( b 1 + b 2 + · · · + b W 1 ) = p b ( 1 b 0 b r ) = p b ( 1 b 0 ) 1 + p b .
To express (2) with a single expression for all k, it can be rewritten in a different style. For the special case when W is 4, b k for k [0,3] can be rewritten, after few steps of manipulations, as follows:
b 3 = α 1 p b 0 ( 1 p b ) 0 z , b 2 = α 1 p b 0 + α 1 p b 1 ( 1 p b ) 1 z , b 1 = α 1 p b 0 + α 1 p b 1 + α 1 p b 2 ( 1 p b ) 2 z , b 0 = α 1 p b 0 + α 1 p b 1 + α 1 p b 2 + α 1 p b 3 · ( 1 p b ) 3 z ,
where z = 1 α 1 α 4 ( b r + b 0 ) . Therefore, jointly considering the relations in (3) and (4), a recursive relation of b k in (2) can simply be expressed as follows:
b k = b 0 + p b 1 + p b 1 α 1 α W ( 1 p b ) W ( k + 1 ) j = k W 1 α 1 p b W ( j + 1 ) .
From (3) and (4), it is evident that the probability of being in any of the states in the DTMC can be represented as a function of b0. Therefore, b0 can be obtained using the following normalization condition:
k = 0 W 1 b k + b r = 1 .
Upon solving (5)
b 0 = ( Υ p b ) ( Υ 1 ) ( 1 + p b ) ( Υ p b ) ,
Υ = 1 α 1 α W · 1 α ( 1 + p b ) · α W + 1 1 α 1 + ( 1 p b ) W + 1 1 p b .
The probability of transmission (τ) of the tagged user in a generic slot is equal to b0 because it is allowed to transmit only when its backoff counter reaches zero. Then, given the parameter τ, the probability p b that the channel remains busy when there are N contending users in the network is given by
p b = 1 ( 1 τ ) N .
Rearranging (6) and (8), the following nonlinear system can be defined and solved numerically to get the values of the two unknowns τ and p b :
τ b 0 = 0 p b 1 + ( 1 τ ) N = 0

Renewal-reward process-based network model

Given the transmission probability τ, performances of interest, including network throughput efficiency and broadcast reliability, can be calculated using the renewal reward process-based network model in which the packet transmission process is approximated by a renewal process [10]. In such an approximation, transmission attempts from N contending users, each of which transmits packet with probability τ, are considered to be independent events which repeat over time. The outcome space for every attempt is {I,S,C}, where I corresponds to the event that there is no access attempt (the channel is idle), S corresponds to the event that the attempt was successful, and C corresponds to the event that the attempt ended in a collision. Considering the outcome space for the events, the inter event duration T can be estimated as follows:
E [ T ] = x ( I , S , C ) P x T x ,
where P x is the probability that the outcome of the event is x and T x is the duration for which x lasts. With the assumption that all N contending users can hear each others transmission (i.e., connected single-hop network), P x can be obtained as follows:
P x = ( 1 τ ) N ; x = I , ( 1 τ ) N 1 ; x = S , 1 P I P S ; x = C.
Moreover, T x can be obtained as in [8] considering the signaling mechanism specified for broadcast DCF in [5]:
T x = σ ; x = I , ( L H + E [ PL ] ) / R d + DIFS + δ ; x = S or C ,

where σ is the duration of a physical slot, E PL is the expected payload length, L H is the time required to transmit header (both PHY and MAC header), R d is the raw data rate of the channel, and δ is the propagation delay.

For a given N, nonlinear system in (9) can be solved numerically to get two unknowns τ and p b . Based on these values, P x in (11) can be calculated. For a given E[P], T x in (12) can be obtained. Once both P x and T x have been obtained, E[T] in (10) can be calculated. Upon estimation of E[T], network throughput efficiency () can be calculated using the expected reward E[R] per renewal event duration E[T] as follows:
= E [ R ] E [ T ] ,
where E[R] = P s ·E[PL]. Likewise, the broadcast reliability (), the probability that the transmitted packet does not collide with other packets, can be calculated easily using the following relation when the probability of success (P s ) in the renewal packet transmission process is known:
= P s .

Performance results and discussions

Model validation

A custom discrete-event simulator is developed in MATLAB which can adequately represent the channel access arbitration details of the legacy B-MAC. By making some necessary changes, it is used to simulate SB-MAC. Note that the analytical model derived in the previous section is independent of any specific PHY-layer technology. Hence, detailed PHY implementations have intentionally been ignored in the simulator as developed here.

For the purpose of model validation, the numerically obtained results have been compared with the simulation results. For both numerical analysis and simulation, a channel error-free distributed network with no hidden-terminals has been used consisting of a varying number of broadcast users, each having a never-empty MAC queue (this situation literally corresponds to the case of saturated packet arrival). Note that collisions are the only reason of packet loss in the aforementioned settings. Unless otherwise stated, the following are the default parameters (with corresponding values in parentheses) used in the current study: channel rate (6 Mbps); standard contention window size (16); physical slot duration (9 μ s); PHY header (20 μ s); MAC header (28 Bytes); DIFS (34 μ s); payload PL (128 Bytes); and propagation delay (1 μ s).

As can be noted from Table 1, the simulated resultsb show good match with the analytical results for all configurations of contention window size, contending population size, α, and payload length. This confirms that the analytical model as developed here is accurate enough to be used for quick and easy numerical performance analysis.
Table 1

Comparison of analytical and simulation results



























































































Comparison of SB-MAC and B-MAC

Once the accuracy of the analytical model had been validated, it was used to generalize the results ( and ) for different network parameters. The generalized results were then compared with the corresponding performance results of B-MAC considering two different cases: (1) standard contention window, and (2) nonstandard contention window.

Case 1: standard contention window

Recall that α is the protocol parameter in SB-MAC. It can be assigned any value greater than zero and less than one. The selection of α value, however, has immediate implications for the performances of interest, and , as shown in Figures 4 and 5.
Figure 4

Network throughput efficiency of SB-MAC and B-MAC in a distributed IEEE 802.11 network with various number of contending users.

Figure 5

Broadcast reliability of SB-MAC and B-MAC in a distributed IEEE 802.11 network with various number of contending users.

From Figure 4, it is apparent that when there are few number of users in the network, roughly on the order of contention window size, it is beneficial to use higher value of α because it can maintain higher . For example, among the considered α values, 0.2 to 0.8, attains its maximum when α is 0.8 and the number of contending users is less than or roughly equal to the size of contention window (16). As the ratio of contending users over contention size increases, it is beneficial to use lower values for α to maintain a graceful .

As shown in Figure 5, it would be desirable to use lower α value to enhance in SB-MAC. The lower the value of α, the higher will be the chance of selecting collision-free earlier contention slot. For example, among the various α values considered, reliability is best when α is 0.2. The desirability of lower α values for better is common to as well, expect for the case when the contending population size is less than (or in the order of) the size of the contention window used.

Beside the SB-MAC performance in terms of and , Figures 4 and 5 also show these performance for the B-MAC. Contrary to the performance trend in SB-MAC, both and in B-MAC severely decrease with an increase in contending population size. A simple comparison reveals that the SB-MAC performs better over the entire range of considered contending population, irrespective of the values specified for α. It is interesting to highlight that the performance gain that SB-MAC offers over B-MAC increases with increase in contending population size. For example, SB-MAC offers an enhancement of approximately 230% in along with 75% enhancement in when the number of contending users is three times the size of the contention window.

Case 2: nonstandard contention window

and of B-MAC are compared with that of SB-MAC considering various non standard contention window sizes, up to either four times smaller or larger than that of the standard contention window (16), and a typical α value (0.2). Recall that, in Figure 2, of B-MAC linearly increases with respect to contention window size (for a given number of user) until it reaches the critical threshold. Beyond that threshold it starts to decrease. Similar critical threshold exists for SB-MAC as well, as can be noted from Figure 6, but it is relatively smaller than that of B-MAC. For example, when there are 50 users in the network, the critical window for B-MAC is almost 16 times larger than the standard contention window. In case of SB-MAC, it is nearly of the same order as the standard contention window. From Figure 6 it is evident that the performance of SB-MAC in terms of is superior than that of B-MAC for any number of user population size, especially for the contention windows that are equal or smaller than the critical contention window size. Unlike , of SB-MAC monotonically increases, regardless of the number of users, with increase in the contention window sizes as can be noted from Figure 7. It is noteworthy to mention that of SB-MAC is higher than that of B-MAC for any cases of contention window and user population sizes.
Figure 6

Network throughput efficiency of SB-MAC and B-MAC in a distributed IEEE 802.11 network with various contention window sizes.

Figure 7

Broadcast reliability of SB-MAC and B-MAC in a distributed IEEE 802.11 network with various contention window sizes.


Unlike the throughput-centric design objectives in unicast contention-based MAC protocols, their broadcast counterparts should have reliability-centric design objective because they do not necessarily have MAC layer retransmission mechanisms for the lost packets. From the perspective of a MAC layer, broadcast reliability issues can be addressed by reducing the number of packet collisions as much as possible. Recently, it has been noted that the number of collisions in broadcast CSMA/CA networks can significantly be reduced by using a well scaled reverse-exponential CSSD to conduct the backoff procedure. In this article, a simple and accurate analytical model has been developed to characterize the channel access arbitration according to this approach. The model was validated using computer simulations, and it was then used to demonstrate the performance gains available from this approach in terms of easily understandable performance indicators such as network throughput efficiency and broadcast reliability.


a The performance values of interest are obtained analytically using the model in [9]. The precise definitions of the performance matrices shown are available in Section “SB-MAC”, and the assumed system parameters are summarized in Section “Performance results and discussions”.b The simulation results presented here are the mean of the results obtained from one hundred independently repeated simulations.



broadcast MAC


carrier sense multiple access


contention slot selection distribution


distributed coordination function


distributed inter frame space


degree of freedom


discrete time Markov chain


medium access control


scalable broadcast MAC.



This research was supported in part by the Basic Science Research Program through the National Research Foundation of Korea (NRF)funded by the Ministry of Education, Science and Technology (2012006327), and it was also supported in part by the Basic Research Project through a grant provided by GIST, Grant K20903001804-11E0100-00910 funded by the Ministry of Education, Science, and Technology (MEST) and the World-Class University Program through the National Research Foundation of Korea (R31-10026).

Authors’ Affiliations

Department of Computer Engineering, Chosun University
Department of Nanobio Materials and Electronics, School of Information and Communication, Gwangju Institute of Science and Technology (GIST)


  1. Wiliams B, Camp T: Comparision of broadcasting technique for mobile Ad Hoc networks. ACM Int Conf MobiHoc (New York, USA, 2002), pp. 194–205Google Scholar
  2. Zhang H, Jiang Z: Modelling and performance analysis of ad hoc broadcasting schemes. Perform. Eval 2006, 63(12):1196-1215. 10.1016/j.peva.2005.12.002View ArticleGoogle Scholar
  3. Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E: Wireless sensor networks: a survey. Comput. Commun 2002, 38(4):393-422.Google Scholar
  4. Sichitiu ML, Khil M: Inter-vehicle communication systems: a survey. IEEE Commun. Surv. Tutor 2008, 10(2):88-105.View ArticleGoogle Scholar
  5. IEEE Std. 802.11-2007: Part 11: wireless lAN medium access control and physical layer specifications,. 2007Google Scholar
  6. Jamieson K, Balakrishnan H, Tay YC: Sift: a MAC protocol for event-driven wireless sensor networks. Lecture Note Comput. Sci 2006, 3868: 260-275. 10.1007/11669463_20View ArticleGoogle Scholar
  7. Tay YC, Jamieson K, Balakkrishnan H: Collision-minimizing CSMA and its applications to wireless sensor networks. IEEE J. Sel. Areas Commun 2004, 22(6):1048-1057. 10.1109/JSAC.2004.830898View ArticleGoogle Scholar
  8. Ma X, Chen X: Performance analysis of IEEE 802.11 broadcast scheme in Ad Hoc wireless LANs. IEEE Trans. Veh. Technol 2008, 57(6):3757-3768.View ArticleGoogle Scholar
  9. Wang Z, Hassan M: Throughput-reliability tradeoff in 802.11-based vehicular saftey communications. IEEE Int Conf CCNC (Las Vegas, USA, 2009), pp. 1–5Google Scholar
  10. Bianchi G: Performance analysis of the IEEE 802.11 distributed coordination function. IEEE J. Sel. Areas Commun 2000, 8(3):535-547.View ArticleGoogle Scholar


© Pudasaini et al.; licensee Springer. 2012

This article is published under license to BioMed Central Ltd. This is an Open Access article distributed under the terms of the Creative Commons Attribution License(, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.