Next Article in Journal / Special Issue
On the Relevance of Using OpenWireless Sensor Networks in Environment Monitoring
Previous Article in Journal
Microfluidic Systems for Pathogen Sensing: A Review
Previous Article in Special Issue
Secure Cluster Head Sensor Elections Using Signal Strength Estimation and Ordered Transmissions
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Medium Access Control for Opportunistic Concurrent Transmissions under Shadowing Channels

1
Department of Electrical and Computer Engineering, Auburn University, Auburn, AL 36849, USA
2
Center for u-Manufacturing, Pohang University of Science and Technology, Pohang, Korea
*
Author to whom correspondence should be addressed.
Submission received: 12 June 2009 / Revised: 16 June 2009 / Accepted: 17 June 2009 / Published: 18 June 2009
(This article belongs to the Special Issue Wireless Sensor Technologies and Applications)

Abstract

:
We study the problem of how to alleviate the exposed terminal effect in multi-hop wireless networks in the presence of log-normal shadowing channels. Assuming node location information, we propose an extension of the IEEE 802.11 MAC protocol that sched-ules concurrent transmissions in the presence of log-normal shadowing, thus mitigating the exposed terminal problem and improving network throughput and delay performance. We observe considerable improvements in throughput and delay achieved over the IEEE 802.11 MAC under various network topologies and channel conditions in ns-2 simulations, which justify the importance of considering channel randomness in MAC protocol design for multi-hop wireless networks.

1. Introduction

A Media Access Control (MAC) protocol is designed for coordinating access to shared channel(s) among multiple users in order to avoid collisions and achieve efficient use of the medium. It has been shown that the IEEE 802.11 MAC [1], although widely adopted, suffers low throughput performance in the multi-hop wireless network environment [24]. In the IEEE 802.11 MAC, the nodes around a transmitter and the target receiver are regarded as potentially interfering nodes. The virtual carrier sensing mechanism is used to prevent these nodes from initiating their transmissions. However, there are scenarios that some of the neighboring nodes' transmissions will not cause collision with, and will not be interfered by the ongoing transmission, but are still forbidden to transmit. Such nodes are termed “exposed terminals” and in such situations the channel spectrum is not efficiently utilized. It has attracted considerable interest to solve or alleviate the exposed terminal problem, since the IEEE 802.11 MAC is becoming the most popular MAC protocol for single- and multi-hop wireless networks.
There have been considerable research efforts on this aspect. For example, MAC protocols requiring additional hardware or PHY capacities are shown to be helpful [5, 6]. In addition, there have been proposals on tuning the carrier sensing range [79], controlling the transmit power [1012], and modifying the behavior of the IEEE 802.11 MAC [1315]. However, these studies are conducted assuming deterministic wireless propagation models, such as the free-space propagation model or the two-ray ground reflection model [16]. In these models, path loss is determined by the distance between the transmitter and receiver deterministically. However, due to obstacles, multi-path propagation, and mobility, randomness such as shadowing or fading exists in most wireless networks and should be considered in MAC protocol design.
In a wireless network environment, factors such as reflection, diffraction, and scattering affect the propagation of radio waves. In addition to power attenuation, “large-scale shadowing” and “small-scale fading” are usually experienced by radio signals. Small-scale fading describes the rapid fluctuation of the signals over a short period of time or distance. On the other hand, large-scale shadowing represents a random effect which occurs over a large number of measurement locations which have the same distance between the transmitter and the receiver, but have different levels of obstacles on the propagation path. It is well-known that the log-normal shadowing propagation model captures this effect. The log-normal shadowing propagation model describes the random variation of the received power around the mean (nominal) value, and the power variation in decibel (dB) follows a normal distribution [16].
Figure 1 illustrates the transmission ranges when the two-ray ground reflection model (left) and the log-normal shadowing propagation model (right) are used. Under the deterministic channel model, transmission range of a node is circular for a given transmit power, as shown in the left figure in Figure 1. Under shadowing channels as in a typical wireless network environment, the transmission range is not circular anymore. As can be observed in the right figure, although Node B is within the mean transmission range of the center node (the dotted circle), it may not receive the center node's transmission due to shadowing. On the other hand, although Node C is out of the mean transmission range of the center node, it can receive the center node's transmission. The free space or two-ray ground reflection channels do not model the actual radio propagation precisely, and such inaccuracy may have a considerable impact on the MAC protocol performance since the set of one-hop neighbors is not deterministic anymore. Such randomness caused by shadowing effects should be taken into account in the MAC protocol design to avoid potential collisions and leverage spacial reuse.
Motivated by these observations, in this paper we study the problem of how to mitigate the exposed terminal problem in the presence of log-normal shadowing channels. We propose a location-assisted extension to the IEEE 802.11 MAC protocol for opportunistically scheduling “concurrent” transmissions in the neighborhood of a “free” transmission, i.e., the transmission between the two nodes that first win the channel with RTS/CTS handshake. We assume node location information as in many prior works (e.g., the class of geographic routing protocols [17, 18]). We assume that such location information can be obtained via the global positioning system (GPS) if such service is available, or by using an effective localization scheme proposed in the literature [19]. However, our main objective is to exploit location information for improved network-wide performance, while localization is not the focus of this paper.
We first derive an analysis on the success probability of concurrent transmissions from exposed nodes, which depends on i) the distance between the tagged transmitter and receiver, ii) the distance between the receiver and other interfering nodes, iii) the path-loss exponent, and iv) the parameters of log-normal shadowing. If the computed success probability is larger than a prescribed threshold, concurrent transmissions of exposed nodes are allowed by the proposed scheme. Furthermore, we develop an extension to the IEEE 802.11 MAC to incorporate the above analysis for validating the feasibility of a concurrent transmission, and for scheduling feasible concurrent transmissions. We also describe a simple scheme to estimate the channel parameters if they are not known a priori or if the channels are not stationary. Finally, we implement the proposed location-assisted MAC protocol in ns-2 and compare its performance with the original IEEE 802.11 MAC with extensive simulation studies. We observe considerable gains in throughput and delay achieved by the proposed MAC protocol over IEEE 802.11 MAC, which not only demonstrate the efficacy of the proposed scheme, but also justify the importance of considering channel randomness in MAC protocol design.
The remainder of this paper is organized as follows. In Section 2, we review related work on improving the IEEE 802.11 MAC performance. In Section 3, we discuss the shadowing channel model and success probability of a concurrent transmission. We present the location-assisted MAC extension in Section 4 and evaluate its performance with extensive ns-2 simulations in Section 5. Section 6 concludes this paper.

2. Related Work

The IEEE 802.11 MAC protocol is widely adopted in various wireless networks. Although the hidden-terminal problem is effectively solved by the virtual carrier sensing mechanism, the exposed-terminal problem still exists, causing reduced utilization of wireless medium. There have been considerable prior work on improving the spatial reuse of IEEE 802.11 MAC. For example, there are schemes focused on analyzing and adjusting the carrier sensing range [79, 20, 21] and control the transmission power [1012, 22, 23]. Some researchers tried to modify the behavior of current IEEE 802.11 MAC protocol [13, 24] or the physical layer [14]. Some MAC protocols took advantage of additional hardware devices or advanced physical layer technologies such as an additional transceiver, multiple-input and multiple-output (MIMO), and directional antennas [5, 6, 25, 26].
To improve spatial reuse, Ye, Yi and Sikdar [20] proposed a scheme called Aggressive Virtual Carrier Sensing (AVCS) for activating idle nodes within a reserved range. The basic idea is that any node that receives RTS or CTS packet but not both considers the channel is idle and is free to send. The AVCS scheme may cause additional collisions since the exposed nodes do not consider status and location of their target receiver. Note that the use of directional antennas can also improve spatial reuse, since the area consumed by a transmission is reduced due to the more focused transmissions [5, 6, 26]. However, scheduling of node transmissions become non-trivial since one needs to coordinate the directions of the transmitting antenna and receiving antenna in order to establish a link.
Some researchers show that manipulating carrier sensing range can be helpful. Zhu, et al. [21] proposed to tune the physical carrier sensing threshold to enlarge the sensing range, such that the entire interference area is covered. With properly tuned physical carrier sensing threshold, all potential interfering nodes will be eliminated, and there is no need for the RTS/CTS handshake. Power control can be used to reduce the interference area such that more concurrent transmissions can be allowed. In [12], Zhou and Nettles suggested a power control scheme that can eliminate hidden nodes and limit exposed nodes by balancing the carrier sensing range and interference range. The achieved performance improvements, however, are modest as observed in the simulation results presented in this paper.
In the MACA-P scheme, a control gap is introduced between the RTS-CTS exchange and the subsequent DATA-ACK exchange, which is used for exposed nodes to transmit their RTS-CTS and for the alignment of the scheduled DATA frame transmission with the current DATA frame transmission [13]. Although some improvements in throughput is achieved in simulations, the additional fixed control gap increases the overall control overhead of IEEE 802.11-like MACs. Such overhead was shown to be as high as 40% in a sensor platform [27], another limiting factor on the IEEE 802.11 MAC performance [4].
In [28], Shukla, Chandran-Wadia, and Iyer presented a simple scheme to enable nodes to identify themselves as exposed terminals and opportunistically schedule transmission of a small frame without RTS-CTS exchange. Note that this scheme does not verify the feasibility of scheduled transmissions and the case of multiple scheduled transmissions is not considered, which may cause collision among themselves and high cumulative interference at the current receiver. Simulation results in [28] showed small throughput improvement when the number of nodes is large.
The idea of location assisted MAC for concurrent transmissions was exploited in our prior work [15], which considers the two-ray ground propagation model. This work is an extension of the scheme in [15] by considering wireless channel dynamics, i.e., shadowing channels. Although shadowing channels were considered in several studies of the connectivity problem of wireless networks [29, 30], most existing MAC schemes adopt the deterministic channel model [15, 31]. Due to channel dynamics in typical wireless environments, the neighbors of a node are not deterministic anymore, which would have considerable impact on MAC protocol design and performance. We propose an opportunistic MAC considering shadowing channels and demonstrate its performance with ns-2 simulations. The performance gain over the IEEE 802.11 MAC is largely due to the consideration of channel dynamics in the MAC design.

3. Success Probability under Shadowing Channels

3.1. Log-normal Shadowing Channel Model

The free space and two-ray ground reflection models were widely used in prior work. According to such channel models, the transmission range of a node is circular, and all of the nodes within the disk are one-hop neighbors. In typical wireless network environments, however, the variations in the received powers as measured by different receivers with the same distance from a same transmitter are random and independent [32], and can be characterized by the log-normal slow fading [16]. Consider a pair of transmitter and receiver where the distance between them is d. According to the log-normal shadowing propagation model, the received power of the intended signal at the receiver in dB, denoted as Pr,dB, is represented by [16]:
P r , d B = P 0 , d B 10 β log ( d d 0 ) + X r
where P0,dB is the reference power measured at a distance of d0 in dB, d0 is the reference distance, β is the path-loss exponent, and Xr represents a normal random variable with zero mean and standard deviation σdB. That is, Xr is a random variable with the following normal probability density function,
f X r ( x ) = 1 2 π σ d B exp ( x 2 2 σ d B 2 )
In (1), the received power consists of two parts: the deterministic attenuation depending on the distance between the transmitter and the receiver, and the probabilistic part Xr. The variation of the received power is determined by the standard deviation σdB. Note that typically σdB ranges from 4 dB to 12 dB in outdoor environments [33]. Due to the probabilistic part Xr, the transmission range of a sending node is not circular anymore, as shown in Figure 1. The received power can be expressed in unit of Watts as follows:
P r = P 0 10 β log ( d d 0 ) + 0.1 X r = C ( Y r d β )
where P0 is the reference power measured at d0 in unit of Watts, C = P 0 d 0 β is a constant, and Yr = 10(0.1 Xr) represents a log-normal random variable with zero mean and standard deviation σ = ( ln 10 10 ) σ d B.

3.2. Success Probability of the Concurrent Transmission

We next derive the success probability of a transmission in the presence of other interfering transmissions. Suppose that there are N interfering transmitters around a tagged receiver, and that the distance between interfering Node i and the receiver is ri. The distance between the tagged transmitter and receiver is d. Similar to (3), the interference by interfering Node i, Pi, is represented by:
P i = P 0 10 β log ( r i d 0 ) + 0.1 X i = C ( Y i r i β )
where Yi is a log-normal random variable with zero mean and standard deviation σ. From (4), the cumulative interference PI measured at the receiver amounts to:
P I = i = 1 N P i = i = 1 N C ( Y i r i β )
From (3) and (5), we obtain the signal-to-interference ratio (SIR) at the tagged receiver as:
1 SIR = P I P r = i = 1 N C ( Y i r i β ) C ( Y r d β ) = i = 1 N ( d r i ) β ( Y i Y r )
In order to receive and decode the packet successfully, the SIR at the tagged receiver should be greater than a threshold TSIR. The probability of such an event is:
P succ = Pr { SIR > T SIR } = Pr { 1 Y r i = 1 N ( d r i ) β Y i < 1 T SIR }
Let Ut = (d/rs)β Yi, which is a log-normal random variable with mean μi = β ln (d/rs) and variance
σ2. Furthermore, let V = i = 1 N U i. Since Ui's are independent, V can be approximated by a log-normal random variable W with the following mean μw and variance σ w 2 according to the Fenton-Wilkinson approximation method [34]:
{ μ w = log ( i = 1 N e μ i ) + σ 2 σ w 2 2 σ w 2 = log [ ( e 2 σ 2 1 ) i = 1 N e 2 μ i ( i = 1 N e μ i ) 2 + 1 ]
Finally, (W/Yr) is a log-normal random variable with mean μw and variance ( σ w 2 + σ 2 ).
By utilizing the logistic distribution for the cumulative distribution function (CDF) of the log-normal distribution [35], F ( x ; μ , σ ) = [ ( e μ x ) π / ( σ 3 ) + 1 ] 1, we finally obtain the success probability of the transmission as:
P succ = [ ( T SIR e μ w ) π 3 ( σ w 2 + σ 2 ) + 1 ] 1

3.3. The Case of a Single Interfering Node

In networks that are not very dense, the number of interfering nodes around a receiver is usually small. Consider the case of a single interfering node, e.g., the one that is the closest to the tagged receiver among all interfering notes. The interfering power of this node may dominate the overall interfering power from all other interfering nodes. Letting the distance between the single interfering transmitter and the target receiver be r, the success probability in (7) is reduced to:
P succ = Pr { Y i Y r < 1 T SIR ( r d ) β } = Pr { Z < 1 T SIR ( r d ) β }
where Z = Yi/Yr represents a log-normal random variable with zero mean and variance 2σ2. Applying the logistic distribution, we find the success probability to be:
P succ = { [ T SIR ( d r ) β ] π / ( σ 6 ) + 1 } 1
As an example, we plot the success probability Psucc for different σ's by evaluating (11) in Figure 2. The parameters are selected as TSIR = 10 and β = 4 to emulate a typical wireless sensor network scenario. The mean interference range R I = d T SIR β = 35.6 m. We find that Psucc is a decreasing function of σ when r > RI, but an increasing function of σ when r < RI. For example, consider the two extreme cases when σ = 0 and σ = ∞. When σ = 0, the channel is a deterministic one; the received power depends on the distance only and does not have any randomness. Equation (11) becomes a step function as: P succ = { 0 , r < R I 1 , r > R I. That is, there is a perfect channel with the distance is within RI, and there is no connection atall when the distance is larger than RI. This is the deterministic disk model used in many prior studies. On the other hand, when σ = ∞, the success probability tends to be 1/2 in all cases. It means that the success probability is no longer dependent on the distances d and r.

4. MAC Protocol for Scheduling Concurrent Transmissions

In this section, we describe an extension of the location-assisted MAC protocol presented in our prior work [15], for scheduling concurrent transmissions under log-normal shadowing channels. The key elements of the proposed protocol include identifying an exposed node, validating, and scheduling a concurrent transmission. For completeness, we present the MAC protocol briefly in this section and refer interested readers to [15] for more details. The core module of the extension, the validation of concurrent transmissions, is based on the analysis presented in the previous section. We also show how to estimate the channel parameters when they are not known a priori.

4.1. Identifying an Exposed Terminal

When a node first overhears an RTS and then a DATA frame from the same transmitter, it can be identified as an exposed terminal with regard to the overheard transmission. In practice, exposed terminals can be identified before receiving the complete frame as follows.
The IEEE 802.11 PHY frame structure when direct spread spectrum sequencing (DSSS) is used is shown in Figure 3. As soon as the physical layer convergence protocol (PLCP) header, which precedes the current MAC DATA frame, is completely received and verified (by checking HEC, a 16-bit CRC code), the exposed node will know the MPDU (MAC protocol data unit) length. The exposed node can determine if the MAC frame is DATA from the length information since DATA frames are always longer than control frames (i.e., RTS, CTS, and ACK). By comparing the Length value with that in the preceding RTS, the exposed node can infer if the RTS and the DATA frame are from the same sender. It can further validate its inference if the interval between the DATA frame and the RTS is (SIFS + CTS + SIFS) plus some propagation delay.

4.2. Validating a Scheduled Transmission

Suppose that a node (called “free transmitter”) wins the channel and is transmitting to a one-hop neighbor (called “free receiver”). When a node near the free transmitter identifies itself as an exposed terminal, it can validate the feasibility of its concurrent transmission with a probabilistic approach based on location information and the shadowing channel model. We call such a node a “scheduled transmitter” and its target receiver “scheduled receiver” if the concurrent transmission is successfully scheduled.
When testing the feasibility of concurrent transmission, we focus on the case of two (free and scheduled) transmitters and two (free and scheduled) receivers. This simplification can be justified by the fact that the chance of having multiple interfering transmitters in the neighborhood of a tagged receiver is usually small in many wireless networks. When the path loss exponent is large, usually the interference power from the nearest one dominates the overall interference power. If an identified exposed node has a frame to transmit, it will evaluate the following four probabilities:
  • PDATA1 – the success probability of the free DATA frame;
  • PDATA2 – the success probability of the scheduled DATA frame;
  • PACK1 – the success probability of the free ACK frame;
  • PACK2 – the success probability of the scheduled ACK frame.
Under log-normal shadowing channels and with location information available, each of the probabilities can be calculated using (11). Table 1 shows the validation procedure validate schdTx(), where Pth is a prescribed threshold. In order to schedule the concurrent transmission, each of the above probabilities should be greater than Pth. As Pth is increased, there will be fewer scheduled transmissions allowed.

4.3. The Location-Assisted MAC Protocol

The operation of the proposed location-assisted MAC protocol is illustrated in Figure 4. First, an exposed node is identified by examining the PHY PLCP frame header, as described in Section 4.1. Once an exposed node is identified, it will try to validate its concurrent transmission, by executing the validation procedure shown in Table 1.
If this test is passed, the exposed node will attempt its scheduled transmission as follows. First, schdTx_margin is calculated:
schdTx _ margin = ( free _ duration ) SIFS CTSSIFS ( PLCP _ reading _ time ) ( schd _ data _ duration ) SIFS ACK ( round trip _ prop _ delay )
where free_duration is the value in the duration field of the preceding RTS frame. If p = chdTx_margin is negative, the scheduled transmission will be canceled. That is, the concurrent DATA transmission cannot be aligned with the free DATA transmission. Otherwise, in order to avoid the case of multiple scheduled transmissions in a small neighborhood, a random delay td is introduced as:
t d = [ ( rando m _ integer ) % t d max ] × a SlotTime
where t d max = ( schdT x _ m arg i n ) / aSlotTime .
During the back-off period td, the exposed node will keep on detecting if there is a single transmission (i.e., the free transmission) or multiple transmissions (e.g., a scheduled transmission from another exposed node with a smaller td value, in addition to the free transmission). Such events can be detected by a sudden increase in received power or bit error rate when decoding the free transmission. If the latter case is detected, the exposed node will not attempt the concurrent transmission; otherwise, it will start sending its DATA frame, which carries the information Tinfo, defined as:
T info = t d max t d aSlotTime
When a scheduled transmission is received, the scheduled receiver will return an ACK after a delay of SIFS + Tinfo x aSlotTime, in order to align its ACK with the ACK from the free transmission.
The proposed scheme assumes location information is available for neighboring nodes. Such location information can be distributed by defining a specific control message. When a node's location is changed, it broadcasts the newly defined control message to all neighbors to update its location information stored at these nodes. Alternatively, we can modify the RTS frame format to piggyback the locations of the sender and its target receiver. When a node overhears an RTS, it extracts the location information, and stores them in a location table. Nodes will also exchange their location table with neighbors so that the location of two-hop neighbors are all known after some initialization phase.

4.4. Estimation of Channel Parameters

So far we have assumed that the channel parameters, i.e., both β and σdB, are known. In practice, these parameters may not be given a priori. After the initial deployment, the nodes need to measure received signal powers and estimate these parameters, assuming the location information of neighboring nodes are known. We describe how to estimate β and σdB in the following.
According to the shadowing channel model, the received power Pr,dB is governed by (1), and Xr is normally distributed. Thus, (1) can be categorized as the ANOVA (Analysis of Variance) model I (also known as a fixed-effects model ANOVA) [36]. During network operation, each node computes the distance to other transmitters based on location information, and measures the received powers. Assume that a node has made a set of nT observations, which consists of ni observations P r , d B i j, j = 1,…,ni, for each corresponding distance di,i = 1, 2, …, N. Note that i = 1 N n i = n T. According to the least squares criterion, the sum of the squared deviations of the observations around the expected values, denoted by Q, should be minimized:
Q = i = 1 N Q i = i = 1 N j = 1 n i ( P r , d B i j μ i ) 2
where Q i = j = 1 n i ( P r , d B i j μ i ) 2.
Differentiating Q with respect to μi, we obtain that:
d Q d μ i = d Q i d μ i = j = 1 n i [ 2 ( P r , d B i j μ i ) ]
Setting the derivatives to zero and replacing μi with the least squares estimator μ̂i, we obtain that:
μ ^ i = 1 n i j = 1 n i P r , d B i j
Since μi = P0,dB − 10β log ( d i d 0 ) according to the attenuation model (i.e, Xr is zero mean), the estimator of the path loss exponent β, denoted as β̂, can be obtained as follows:
β ^ = μ ^ i P 0 , d B 10 log ( d i d 0 ) = ( 1 n i ) j = 1 n i P 0 , d B P r , d B i j 10 log ( d i d 0 )
With (16), we next derive σ ^ d B 2, the estimator of σ ^ d B 2. Since the expected value of mean square error (MSE) is equal to σ ^ d B 2, we derive σ ^ d B 2 as:
σ ^ d B 2 = MSE = i = 1 N j = 1 n i [ P r , d B i j μ ^ i ] 2 n T N

5. Simulation Results

In order to evaluate the performance efficiency of the proposed MAC scheme, we implement it using the ns-2 simulator version 2.30 [33] and compare its performance with the original IEEE 802.11 MAC via extensive simulations. We adopt the “Propagation/Shadowing” module among the three ns-2 propagation models in the simulations. The channel and transceiver parameters are chosen to emulate a wireless network with a short transmission range of 26.9 m. For validating a scheduled transmission, Pth is set to 0.5 for the results reported in this section. We choose the shadowing standard deviation of 0.01 dB, for the case of near-deterministic channels, and 4 dB (the default value in ns-2) for the case of moderate shadowing channels. We perform our simulations using the chain, grid, and random topologies as in prior work [14, 21, 25]. The Ad Hoc On Demand Distance Vector (AODV) protocol is used for routing in the simulations [37].
During each simulation, the source nodes start to generate Constant Bit Rate (CBR) traffic at 10 seconds and the simulation terminates after 10 minutes simulation time. The estimation of β and described in Section 4.4 is incorporated in the simulations. Through our simulations, we found that the number of failed concurrent transmissions is generally very small for all the case examined, even though the detection mechanism for multiple exposed nodes was not adopted (see Section 4.3). This is due to the fact that the networks have moderate density and the chance of having multiple exposed nodes for a free transmission is relatively negligible. Therefore the detection mechanism is not used for the results presented in this section. For network-wide performance, goodput, i.e., the total number of successfully received bytes at the agent level, and end-to-end delay of all received frames are measured for the data sessions. Each simulation is repeated ten times with different random seeds and the average of the ten trials are presented with 95% confidence intervals plotted as error bars in the figures.

5.1. Channel Parameter Estimation

We first examine the scheme for estimating channel parameters as described in Section 4.4. During each simulation, the channel parameters β and σdB are specified in the TCL script file and used in modeling log-normal shadowing channels for each transmission [33]. We assume that the proposed MAC protocol is not aware of the values, and uses the scheme described in Section 4.4 to estimate the parameters based on received signal powers.
We consider a network with a chain topology, where eight nodes are placed in a row with 20 m separation between adjacent nodes. The average transmission range is 26.9 m. The 8-node chain network has two CBR sessions: one from Node 1 to Node 8 with 1,000-byte frames and the other from Node 8 to Node 1 with 700-byte frames. We trace the estimated value of β and σdB at an intermediate node every 0.01 second for 45 seconds after the sessions are started.
The simulation results are plotted in Figure 5. We observe that in general the estimation schemes are quite effective. The estimated values quickly converge to the actual values set in the TCL scripts. Specifically, the estimation of path exponents β is more accurate than that of the standard deviation σdB for a given number of samples of received power. Furthermore, the convergence of β estimation is much faster than that of σdB. The convergence is also slower when σdB becomes larger. This is because when the channel exhibits high randomness (as indicated by the larger σdB value), more samples are needed to get an accurate estimate. We define the convergence ratio for σdB estimation as:
R σ = 1 | σ d B σ ^ d B σ d B |
For the worst case when σdB = 6, the convergence ratio at 30 seconds is 95.31%. After 45 seconds, the convergence ratio becomes 97.83%. On the other hand, the convergence ratios for the cases of σdB = 2 dB and σdB = 4 dB become very close to 1 after a few seconds of estimation, due to the lower randomness of the channels.
Similar results are observed when other topologies are used, but are omitted for brevity. The estimation algorithms can be continuously executed due to its low complexity. The estimated values can be updated for every frame received. We conjecture that the proposed approach is also applicable to the case of time-varying channels where the parameters vary over time, as long as they conform to the log-normal slow fading channel model.

5.2. Chain Networks

We next examine the throughput and delay performance of the proposed scheme using the chain topology, as shown in Figure 7(a). The distance between two adjacent nodes is set to 20 m. The forward flow (from Node 1 to Node N) is a CBR session with 1,000-byte packets, while the backward flow (from Node N to Node 1) is a CBR session with 700-byte packets. The data rates are set to 90Kb/s, 80Kb/s, 70Kb/s, and 60Kb/s for the 6-, 8-, 10-, and 12-node chain networks, respectively. These data rates are found via extensive simulations, which achieves the maximum throughput the the corresponding chain network. The mean transmission range is equal to 26.9 m, while the mean carrier sensing range is equal to 59.3 m. When the distance between the transmitter and the receiver is 20 m, the mean interference range is computed to be 35.6 m.
Consider first the case that β = 4 and σdB = 0.01 dB. In this case, the received power is almost the same as the mean value, with low randomness exhibited. Since the mean transmission range if 26.9 m, a transmitter hardly reaches other nodes except for its two one-hop neighbors. For example, in the case that Node k + 1 and Node k + 2 concurrently transmit to Nodes k and k + 3, respectively, the success probabilities of the two transmissions are PDATA1 ≈ 1, PDATA2 ≈ 1, PACK1 ≈ 1, and PACK2 ≈ 1. And both transmissions are successful with high probability.
Figure 7 shows the throughput and delay results for the chain network when σdB = 0.01 dB. We observe considerable throughput improvements achieved by the proposed protocol over the IEEE 802.11 MAC. We define the throughput improvement ratio as:
R thput = ( thoughput _ proposed ) ( thoughtput _ 820.11 ) ( thoughput _ 802.11 )
The proposed scheme achieves 42.32%, 64.83%, 71.82%, and 47.32% throughput improvement ratios for the 6-, 8-, 10-, and 12-node chain networks, respectively. In addition, the average end-to-end delay is also drastically reduced for all the cases. We define the delay ratio as:
R d = ( delay _ proposed ) ( delay _ 802.11 )
From Figure 8(b), we find that the proposed scheme achieves delay ratios of 19.49%, 28.63%, 22.98%, and 25.84% for the 6-, 8-, 10-, and 12-node chain networks, respectively. Most concurrent transmissions are successful in this case.
We next consider the case of β = 4 and σdB = 4 dB. Due to the increased σdB, the variation of the received power becomes larger. The one-hop distance may be longer in this case, a phenomenon also observed in the work on connectivity in the presence of log-normal shadowing [29, 30]. In the concurrent transmission scenario, the free and scheduled transmitters are regarded as the interfering node for each other's target receiver. Thus, the possibility of feasible concurrent transmission decreases. For example, when d = 20 and r = 40, the success probabilities are PDATA1 = PDATA2 = PACK1 = PACK2 = 0.5376. This is smaller than that when σdB = 0.01 dB. Consequently, there are fewer feasible concurrent transmissions when σdB gets large.
Figure 8 shows the simulation results when σdB = 4 dB, where the achieved throughput improvement ratios are 12.21%, 17.27%, 25.10%, and 21.02%, respectively. From Figure 9(b), we find the ratios of the average end-to-end delays are 89.87%, 88.97%, 81.38%, and 87.91%, respectively. Compared to the case of σdB = 0.01 dB, the number of scheduled transmissions are smaller. However, the proposed MAC protocol still achieves considerable improvements in both end-to-end throughput and delay.

5.3. Grid Networks

We next examine the performance of the proposed scheme using grid topologies as shown in Figure 7(b). In the grid networks, 36, 64, 100, and 144 nodes are deployed in rows and columns, respectively. The distance from neighbor nodes in the right, left, upper and lower directions is 20 m. As shown in 7(b), half of the border nodes are selected as senders, and the corresponding node on the opposite boarder is the target receiver. A half of the sources transmit a CBR traffic of 1,000-byte frames to the border node on the opposite side, while the rest of sources transmit 700-byte frames.
Throughput and delay results for the case of σdB = 0.01 dB are plotted in 9. From the figure, we find that the proposed scheme achieves throughput improvement ratios of 20.40%, 10.77%, 12.98%, and 13.88%, for the 36-, 64-, 100-, and 144-node networks, respectively. In addition, we find from 10(b) that the ratios of the average end-to-end delay with the proposed MAC to that of the IEEE 802.11 MAC are 70.33%, 82.07%, 86.82%, and 88.07%, respectively.
The simulation results for the case of σdB = 4 dB for the grid networks are presented in 10. We find that normalized throughput improvements of 22.90%, 24.38%, 38.85%, and 61.74% are achieved. We also find from 11(b) that the ratios of the average end-to-end delay with the proposed MAC to that of the IEEE 802.11 MAC are 85.23%, 91.41%, 87.12%, and 84.36%, respectively. The proposed MAC protocol achieves considerable improvements in both throughput and delay for the grid networks with a regular topology structure.

5.4. Random Networks

Finally we study the performance of the proposed protocol under four networks with random topology. For the random networks, 64, 81, 100, and 121 nodes are randomly deployed in a square network area, respectively (see the example in 7(c)). Multi-hop CBR traffic flows are randomly generated with randomly chosen source and destination nodes. A half of the transmitters generate CBR session with 1,000-byte frames, and the rest of them generate CBR sessions with 700-byte frames. All the other configurations of nodes are the same as those in the chain networks.
Figure 11 presents the throughput and delay curves when β = 4 and σdB = 0.01 dB, and 12 presents the throughput and delay results when β = 4 and σdB = 4 dB. From the two figures, we observe the end-to-end throughput improvement ratios of 10.22%, 12.10%, 12.09%, and 14.72% respectively for the four networks when σdB = 0.01 dB, and throughput improvement ratios of 11.18%, 12.18%, 32.93%, and 28.70% for the case when σ d B 2 = 4 dB.The proposed scheme also achieves end-to-end delay ratios of 87.96%, 92.56%, 91.25%, and 87.02% when σdB = 0.01 dB and 64.30%, 74.34%, 82.32%, and 83.21% when σdB = 4dB.
We also examined the impact of shadowing standard deviation σdB on the performance of the proposed scheme. For a 64-node network with a random topology (as shown in 7(c)), we keep all the other parameters intact while increase the standard deviation value from 0.01 dB to 12 dB. Since different network environments have different standard deviation values. Such simulations will help answer the question that under what kind of environments the proposed scheme is effective.
The throughput results are shown in 14(a) and the delay results are shown in 14(b). We find that the normalized throughput improvement ratio ranges from 10.2% to 25.2% when the standard deviation is increased from 0.01 dB to 12 dB. The net improvement, however, is more constant and ranges from 1.6 MB to 2.1 MB. We also observe that the standard deviation has very similar impact on both MAC schemes, as the two curves are roughly parallel to each other. When σdB gets larger, the throughputs of both schemes decreases. This is because when the channels become more dynamic, more packets will be lost due to transmission errors, leading to goodput degradation. From 14(b), it can be seen that generally about 0.5 s delay reduction is achieved by the proposed scheme over IEEE 802.11 MAC, except for very large standard deviation values. When standard deviation is 10 and 12 dB, both schemes achieve very small delays. We conjecture that because of the large variation of shadowing channels (and thus the transmission ranges), many packets traverse paths with smaller hop-counts, leading to smaller end-to-end delays for both schemes. Overall the proposed scheme outperforms IEEE 802.11 MAC for all the cases considered in this simulation.
As illustrated in Figure 1, the effect of log-normal fading is two-sided: (i) some nodes (e.g., Node B) that are within the transmission range, are not neighbor anymore; and (ii) some nodes (e.g., Node C) that are not a neighbor but now are neighbors (and thus exposed nodes). For the chain network considered in the simulations, Type (i) effect is more likely to happen, resulting in broken links and lost packets. Therefore the performance improvement when σdB = 4 dB is smaller than that when σdB = 0.01 dB. When the random topology is used, however, a node has more neighboring nodes within the average transmission range and some other nodes outsider but close to the average transmission range. Both Type (i) and Type (ii) events are equal-likely to happen, and we see similar improvements for both shadowing channels and near-deterministic channels.
There are many factors that affect the performance of a MAC protocol in multi-hop wireless networks, such as topologies, traffic patterns, and channel parameters. Overall our simulation results demonstrate that the proposed location-assisted MAC protocol is effective in achieving considerable throughput and delay improvements over the IEEE 802.11 MAC under various circumstances of log-normal shadowing channels. The improvements clearly justify the need and the benefits of opportunistically scheduling concurrent transmissions while considering log-normal shadowing channels.

6. Conclusions

In this paper, we presented a location-assisted MAC protocol under the presence of log-normal shadowing channels. We derived the success probability for the concurrent transmissions from exposed terminals, which is then incorporated into the MAC protocol for validating the feasibility of concurrent transmissions. Estimation techniques are also presented for estimation of channel parameters. Our simulation results showed that the proposed protocol can effectively leverage spatial reuse, and thus improve the end-to-end throughput and delay performance over IEEE 802.11 for various network topologies and channel conditions.

Acknowledgments

Shiwen Mao's work is supported in part by the National Science Foundation under Grant Number 0802113, and through the Wireless Internet Center for Advanced Technology (WICAT) at Auburn University. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation.

References and Notes

  1. Wireless LAN Media Access Control (MAC) and Physical Layer (PHY) Specifications. IEEE.; New York, NY, USA, Sept 1999.
  2. Li, J.; Blake, C.; Couto, D.; Lee, H.I.; Morris, R. Capacity of Ad Hoc Wireless Networks. Proc. ACM MobiCom'01 2001, 61–69. [Google Scholar]
  3. Xiao, Y. IEEE 802.11 Performance Enhancement via Concatenation and Piggyback Mechanisms. IEEE Trans. Wireless Commun. 2005, 5, 2182–2192. [Google Scholar]
  4. Li, Y.; Mao, S.; Panwar, S.; Midkiff, S. On the Performance of Distributed Polling Service-based Wireless MAC Protocols. IEEE Trans. Wireless Commun. 2008, 7, 4635–4645. [Google Scholar]
  5. Park, J.-S.; Nandan, A.; Gerla, M.; Lee, H. SPACE-MAC: Enabling Spatial Reuse Using MIMO Channel-aware MAC. In Proc. IEEE ICC'05; Seoul, Korea, May 2005; pp. 3642–3646. [Google Scholar]
  6. Wang, Y.; Garcia-Luna-Aceves, J. Spatial Reuse and Collision Avoidance in Ad Hoc Networks with Directional Antennas. In Proc. IEEE GLOBECOM'02; Taipei, Taiwan, Nov 2002; pp. 112–116. [Google Scholar]
  7. Deng, J.; Liang, B.; Varshney, P. Tuning the Carrier Sensing Range of IEEE 802.11 MAC. In Proc. IEEE GLOBECOM'04; Dallas, TX, USA, Nov/Dec 2004; pp. 2987–2991. [Google Scholar]
  8. Yang, X.; Vaidya, N. On Physical Carrier Sensing in Wireless Ad Hoc Networks. In Proc. IEEE INFOCOM'05; Miami, FL, USA, Mar 2005; pp. 2525–2535. [Google Scholar]
  9. Zhai, H.; Fang, Y. Physical Carrier Sensing and Spatial Reuse in Multirate and Multihop Wireless Ad Hoc Networks. In Proc. IEEE INFOCOM'06; Barcelona, Spain, Apr 2006; pp. 1–12. [Google Scholar]
  10. Monks, J.; Bharghavan, V.; Hwu, W.-M. A Power Controlled Multiple Access Protocol for Wireless Packet Networks. In Proc. IEEE INFOCOM'01; Anchorage, AK, USA, Apr 2001; pp. 219–228. [Google Scholar]
  11. den Heuvel-Romaszko, S.V.; Blondia, C. Enhancements of the IEEE 802.11, A MAC Protocol for Ad Hoc Network with History of Power Adjustment. In Proc. ACM MobiCom'05; Cologne, Germany, June 2005; pp. 48–54. [Google Scholar]
  12. Zhou, Y.; Nettles, S. Balancing the Hidden and Exposed Node Problems with Power Control in CSMA/CA-based Wireless Networks. In Proc. IEEE WCNC'05; New Orleans, LA, USA, Mar 2005; pp. 683–688. [Google Scholar]
  13. Acharya, A.; Misra, A.; Bansal, S. MACA-P: A MAC for Concurrent Transmissions in Multi-hop Wireless Networks. In Proc. IEEE Pervasive Computing and Communications (PerCom'03).; Dallas–Fort Worth, TX, USA, Mar 2003; pp. 505–508. [Google Scholar]
  14. Mittal, K.; Belding, E. RTSS/CTSS: Mitigation of Exposed Terminals in Static 802.11-based Mesh Networks. In Proc. IEEE Workshop on Wireless Mesh Networks (WiMesh'06); Reston, VA, USA, Sept 2006; pp. 3–12. [Google Scholar]
  15. Hur, S.M.; Mao, S.; Hou, Y.; Nam, K.; Reed, J. Exploiting Location Information for Concurrent Transmissions in Multihop Wireless Networks. IEEE Trans. Veh. Commun. 2009, 58, 314–323. [Google Scholar]
  16. Rappaport, T. Wireless Communications: Principles and Practice., 2nd ed.; Prentice Hall PTR: Indianapolis, IN, USA, 2001. [Google Scholar]
  17. Stojmenovic, I. Position Based Routing in Ad Hoc Networks. IEEE Commun. Mag. 2002, 40, 128–134. [Google Scholar]
  18. Chen, M.; Leung, V.; Mao, S.; Xiao, Y.; Chlamtac, I. Hybrid Geographical Routing for Flexible Energy-Delay Tradeoffs. In IEEE Trans. Veh. Technol.; Accepted for publication.
  19. Mao, G.; Fidan, B. Localization Algorithms and Strategies for Wireless Sensor Networks; IGI Global: Hershey, PA, USA, 2009. [Google Scholar]
  20. Ye, F.; Yi, S.; Sikdar, B. Improving Spatial Reuse of IEEE 802.11 Based Ad Hoc Networks. In Proc. IEEE GLOBECOM'03; San Francisco, CA, USA, Dec 2003; pp. 1013–1017. [Google Scholar]
  21. Zhu, J.; Guo, X.; Yang, L.; Conner, W. Leveraging Spatial Reuse in 802.11 Mesh Networks with Enhanced Physical Carrier Sensing. In Proc. IEEE ICC'04; Paris, France, Jun 2004; pp. 4004–4011. [Google Scholar]
  22. Cesana, M.; Maniezzo, D.; Bergamo, P.; Gerla, M. Interference Aware (IA) MAC: An Enhancement to IEEE 802.11b DCF. In Proc. IEEE VTC Fall-2003; Orlando, FL, USA, Oct 2003; pp. 2799–2803. [Google Scholar]
  23. Yeh, C.-H.; The, Heterogeneous. Hidden/exposed Terminal Problem for Power-Controlled Ad Hoc MAC Protocols and Its Solutions. In Proc. IEEE VTC Fall-2004; Los Angeles, CA, USA, Sept 2004; pp. 2548–2554. [Google Scholar]
  24. Shukla, D.; Chandran-Wadia, L.; Iyer, S. Mitigating the Exposed Node Problem in IEEE 802.11 Ad Hoc Networks. In Proc. IEEE ICCCN'03; Dallas, TX, Oct 2003; pp. 157–162. [Google Scholar]
  25. Haas, Z.; Deng, J. Dual Busy Tone Multiple Access (DBTMA)-a Multiple Access Control Scheme for Ad Hoc Networks. IEEE Trans. Commun. 2002, 50, 975–985. [Google Scholar]
  26. Takata, M.; Bandai, M.; Watanabe, T. An Extended Directional MAC for Location Information Staleness in Ad Hoc Networks. Proc. 25th IEEE International Conference on Distributed Computing Systems Workshops 2005, Toronto, Canada, Jun. 2005; pp. 899–905.
  27. Woo, A.; Culler, D. A Transmission Control Scheme for Media Access in Sensor Networks. Proc. ACMMobiCom'01 2001, 221–235. [Google Scholar]
  28. Shukla, D.; Chandran-Wadia, L.; Iyer, S. Mitigating the Exposed Node Problem in IEEE 802.11 Ad Hoc Networks. In Proc. IEEE ICCCN'03; Dallas, TX, USA, Oct 2003; pp. 157–162. [Google Scholar]
  29. Miorandi, D.; Altman, E. Coverage and Connectivity of Ad Hoc Networks Presence of Channel Randomness. In Proc. IEEE INFOCOM'05; Miami, FL, Mar 2005; pp. 491–502. [Google Scholar]
  30. Hekmat, R.; Mieghem, P. Connectivity in Wireless Ad-hoc Networks with a Log-normal Radio Model. Mob. New. Appl. 2006, 11, 351–360. [Google Scholar]
  31. Gong, M.; Mao, S.; Midkiff, S.; Hart, B. Medium Access Control in Wireless Mesh Networks. In Wireless Mesh Networking: Architectures, Protocols and Standards., 1st ed.; Zhang, Y., Luo, J., Hu, H., Eds.; Auerbach Publications: New York, NY, USA, 2006; pp. 147–182. [Google Scholar]
  32. Kotz, D.; Newport, C.; Gray, R.; Liu, J.; Yuan, Y.; Elliott, C. Experimental Evaluation of Wireless Simulation Assumptions. Proc. the 7th ACM international symposium on Modeling, analysis and simulation of wireless and mobile systems (MSWiM'04), Venice, Italy, Oct 2004; pp. 78–82.
  33. The Network Simulator: ns-2. Available online: http://isi.edu/nsnam/ns/.
  34. Fenton, L. The sum of Log-normal Probability Distributions in Scatter Transmission Systems. IRE Trans. Commun. Syst. 1960, 8, 57–67. [Google Scholar]
  35. Swamee, P. Near Lognormal Distribution. J. Hydrologic Eng. 2002, 7, 441–444. [Google Scholar]
  36. Neter, J.; Kutner, M.; Nachtsheim, C.; Wasserman, W. Applied Linear Statistical Models, 4th ed.; McGraw-Hill/Irwin: Columbus, OH, USA, 1996. [Google Scholar]
  37. Perkins, C.; Belding-Royer, E.; Das, S. Ad Hoc On Demand Distance Vector (AODV) Routing IETF RFC 3561. 2003.
Figure 1. Transmission ranges for the two-ray ground reflection model (left) and the shadowing model (right).
Figure 1. Transmission ranges for the two-ray ground reflection model (left) and the shadowing model (right).
Sensors 09 04824f1
Figure 2. The impact of channel parameters on the success probability Psucc with TSIR = 10 and β = 4. (a) Psucc vs. r when d = 20 m. (b) Psucc vs. d when r = 35.6 m.
Figure 2. The impact of channel parameters on the success probability Psucc with TSIR = 10 and β = 4. (a) Psucc vs. r when d = 20 m. (b) Psucc vs. d when r = 35.6 m.
Sensors 09 04824f2
Figure 3. The IEEE 802.11 PHY frame structure when DSSS is used in PHY.
Figure 3. The IEEE 802.11 PHY frame structure when DSSS is used in PHY.
Sensors 09 04824f3
Figure 4. A time-line illustration of the proposed location-assisted MAC protocol.
Figure 4. A time-line illustration of the proposed location-assisted MAC protocol.
Sensors 09 04824f4
Figure 5. Channel parameter estimation in an eight-node chain network. (a) Estimated channel variance σ̂dB over time for β = 4 and σdB = 2, 4, and 6. (b) Estimated path loss exponent β̂ over time for σdB = 4 and β = 2, 3, 4.
Figure 5. Channel parameter estimation in an eight-node chain network. (a) Estimated channel variance σ̂dB over time for β = 4 and σdB = 2, 4, and 6. (b) Estimated path loss exponent β̂ over time for σdB = 4 and β = 2, 3, 4.
Sensors 09 04824f5
Figure 6. The three types of network topologies used in the ns-2 simulations. (a) Chain topology. (b) Grid topology. (c) Random topology.
Figure 6. The three types of network topologies used in the ns-2 simulations. (a) Chain topology. (b) Grid topology. (c) Random topology.
Sensors 09 04824f6
Figure 7. Simulation results for chain networks when σdB = 0.01 dB. (a) Throughput. (b) Delay.
Figure 7. Simulation results for chain networks when σdB = 0.01 dB. (a) Throughput. (b) Delay.
Sensors 09 04824f7
Figure 8. Simulation results for chain networks when σdB = 4 dB. (a) Throughput. (b) Delay.
Figure 8. Simulation results for chain networks when σdB = 4 dB. (a) Throughput. (b) Delay.
Sensors 09 04824f8
Figure 9. Simulation results for grid networks when σdB = 0.01 dB. (a) Throughput. (b) Delay.
Figure 9. Simulation results for grid networks when σdB = 0.01 dB. (a) Throughput. (b) Delay.
Sensors 09 04824f9
Figure 10. Simulation results for grid networks when σdB = 4 dB. (a) Throughput. (b) Delay.
Figure 10. Simulation results for grid networks when σdB = 4 dB. (a) Throughput. (b) Delay.
Sensors 09 04824f10
Figure 11. Simulation results for random networks when σdB = 0.01 dB. (a) Throughput. (b) Delay.
Figure 11. Simulation results for random networks when σdB = 0.01 dB. (a) Throughput. (b) Delay.
Sensors 09 04824f11
Figure 12. Simulation results for random networks when σdB = 4 dB. (a) Throughput. (b) Delay.
Figure 12. Simulation results for random networks when σdB = 4 dB. (a) Throughput. (b) Delay.
Sensors 09 04824f12
Figure 13. Simulation results for random networks when σdB is increased from 0.01 dB to 12 dB. (a) Throughput. (b) Delay.
Figure 13. Simulation results for random networks when σdB is increased from 0.01 dB to 12 dB. (a) Throughput. (b) Delay.
Sensors 09 04824f13
Table 1. The validation procedure for feasibility of a concurrent transmission.
Table 1. The validation procedure for feasibility of a concurrent transmission.
Procedure validate schdTx()
1:Calculate PDATA1, PDATA2, PACK1 and PACK2;
2:IF { (PDATA1 > Pth) AND (PDATA2 > Pth) AND (PACK1 > Pth) AND (PACK2 > Pth) }
3: Return 1; // The concurrent transmission is feasible
4:ELSE
5: Return 0; // The concurrent transmission is not feasible
6:ENDIF

Share and Cite

MDPI and ACS Style

Son, I.K.; Mao, S.; Hur, S.M. Medium Access Control for Opportunistic Concurrent Transmissions under Shadowing Channels. Sensors 2009, 9, 4824-4844. https://0-doi-org.brum.beds.ac.uk/10.3390/s90604824

AMA Style

Son IK, Mao S, Hur SM. Medium Access Control for Opportunistic Concurrent Transmissions under Shadowing Channels. Sensors. 2009; 9(6):4824-4844. https://0-doi-org.brum.beds.ac.uk/10.3390/s90604824

Chicago/Turabian Style

Son, In Keun, Shiwen Mao, and Seung Min Hur. 2009. "Medium Access Control for Opportunistic Concurrent Transmissions under Shadowing Channels" Sensors 9, no. 6: 4824-4844. https://0-doi-org.brum.beds.ac.uk/10.3390/s90604824

Article Metrics

Back to TopTop