A High-Throughput MAC A High-Throughput MAC Protocol for Wireless Protocol for Wireless Ad Hoc NetworksAd Hoc Networks
Wanrong Yu, Jiannong Cao, Xingming Zhou, Wanrong Yu, Jiannong Cao, Xingming Zhou, Xiaodong Wang, Keith C. C. Chan, Alvin T. S. Chan,Xiaodong Wang, Keith C. C. Chan, Alvin T. S. Chan,and H.V. Leongand H.V. Leong
School of Computer, National University of Defense School of Computer, National University of Defense Technology, Changsha, ChinaTechnology, Changsha, ChinaDepartment of Computing, Department of Computing, HongKong Polytechnic UniversityHongKong Polytechnic University
IEEE Transaction on Wireless IEEE Transaction on Wireless Communications,Communications,Vol. 7, No.1, January 2008Vol. 7, No.1, January 2008
OutlineOutline
IntroductionIntroduction CTMACCTMAC Performance evaluationPerformance evaluation ConclusionsConclusions
Inefficiency of IEEE Inefficiency of IEEE 802.11802.11
Background and Background and related workrelated work Effort has been made on Effort has been made on
increasing the throughput of increasing the throughput of MANETsMANETs– Adding additional control gapAdding additional control gap– Transmission power control (TPC)Transmission power control (TPC)
Additional control gapAdditional control gap
To add control gap between To add control gap between between RTS/CTS and DATA between RTS/CTS and DATA packets for scheduled transmissionpackets for scheduled transmission– [6]:MACA-P, IEEE PerCom 2003[6]:MACA-P, IEEE PerCom 2003– [7]:enhancement of MACA-P, [7]:enhancement of MACA-P,
BoradNets 2004BoradNets 2004 Do not consider tolerable Do not consider tolerable
interferenceinterference
Transmission power Transmission power controlcontrol TPC is used per-packet to increase TPC is used per-packet to increase
the spatial channel reusethe spatial channel reuse– [5]: A power control MAC protocol for [5]: A power control MAC protocol for
ad hoc networks, ACM/Kluwer Wireless ad hoc networks, ACM/Kluwer Wireless Networks, 2005Networks, 2005
– [12]: POWMAC, IEEE J. Select Areas [12]: POWMAC, IEEE J. Select Areas Commun., 2005Commun., 2005
Latency in change of transmission Latency in change of transmission power is huge [11], which make power is huge [11], which make TPC-based solutions difficult to use TPC-based solutions difficult to use in practicein practice
Goal of the paperGoal of the paper
To propose a MAC protocol works To propose a MAC protocol works onon– Single channelSingle channel– Single transceiverSingle transceiver– Single transmission powerSingle transmission power
Basic operation of Basic operation of CTMACCTMAC
Masterpair
Slavepair
CTMACCTMAC
In CTMAC, every node maintains In CTMAC, every node maintains an Active Neighbor List (ANL)an Active Neighbor List (ANL)
For node i, ANLFor node i, ANLii contains contains
Address of u
Channel gain
bewteen i and u
Starting time of DATA and
ACK
To distinguish the
transmitter and receiver
Maximum tolerable
interference of u
Handshakes in CTMAC: Handshakes in CTMAC: case 1case 1 RTS-CTSRTS-CTS
– Successful in information exchangeSuccessful in information exchange– The receiver agrees with the sender The receiver agrees with the sender
and reply a normal CTSand reply a normal CTS
Handshakes in CTMAC: Handshakes in CTMAC: case 2case 2 RTS-CTS-ATS (adjust-to-send)RTS-CTS-ATS (adjust-to-send)
– The slave receiver modify the value The slave receiver modify the value of Tof Tdatadata and T and Tackack declared by the declared by the sender in RTSsender in RTS
– The slave receiver includes the new The slave receiver includes the new value in CTSvalue in CTS
– The slave sender has to inform its The slave sender has to inform its neighbors the new value by ATSneighbors the new value by ATS
Handshakes in CTMAC: Handshakes in CTMAC: case 3case 3 RTS-NCST-ATS (abort-to-send)RTS-NCST-ATS (abort-to-send)
– The slave receiver finds it is The slave receiver finds it is implssible to continue the slave implssible to continue the slave transmissiontransmission
– The slave sender informs its The slave sender informs its neighbor by ATSneighbor by ATS
Minimum reaching powerMinimum reaching power
Accumulated interference powerAccumulated interference power
Total future interference that Total future interference that node v can tolerate, Pnode v can tolerate, Prxrx is the is the raching powerraching power
Tolerable interference Tolerable interference estimation estimation
Tolerable interference Tolerable interference estimationestimation Maximum tolerable interference that Maximum tolerable interference that
each future neighboring node can addeach future neighboring node can add
α is the ratio between the interference α is the ratio between the interference caused by nodes outside and inside caused by nodes outside and inside the transmission range the transmission range – α = 0.5 for two ray models and uniform α = 0.5 for two ray models and uniform
distributed nodesdistributed nodes
Concurrent Concurrent transmisson controltransmisson control RC0: requirement of timeRC0: requirement of time
– For the slave sender to check if the For the slave sender to check if the master transmission’s ACG is long master transmission’s ACG is long enough for exchanging of control enough for exchanging of control packetspackets
RC1: for slave transmitterRC1: for slave transmitter– Check if transmission will collide with Check if transmission will collide with
any scheduled transmissionany scheduled transmission– For all u in ANL, check if For all u in ANL, check if
Concurrent Concurrent transmission controltransmission control RC2: for slave receiverRC2: for slave receiver
– To determine if the accumulated To determine if the accumulated should not violate the slave should not violate the slave receiver’s SINRreceiver’s SINR
– RC3: ACK transmissionRC3: ACK transmission
– To postpone the transmission of ACKTo postpone the transmission of ACK
Parameters in the Parameters in the simulationsimulation
Line topologyLine topology
Throughput of line Throughput of line topologytopology
Random grid topologyRandom grid topology
800 meter square area800 meter square area The square is split into n*n small The square is split into n*n small
squaressquares one node placed in a small square one node placed in a small square
randomlyrandomly mm transmission pairs transmission pairs
Throughput (m=2)Throughput (m=2)
Throughput (m=3)Throughput (m=3)
Throughput (m=4)Throughput (m=4)
Cluster topologyCluster topology
An area of 400*400 mAn area of 400*400 m 16 nodes, split into 4 equal groups16 nodes, split into 4 equal groups Each group occupying a 100*100 Each group occupying a 100*100
squaresquare The receiver is selected from The receiver is selected from
another cluster with a probability of another cluster with a probability of pp
Throughput (p=0.25)Throughput (p=0.25)
Throughput (p=0)Throughput (p=0)
Random topologyRandom topology
1000*1000 meter area1000*1000 meter area 100 nodes placed randomly100 nodes placed randomly M end-to-end flowsM end-to-end flows Size of control gap is 640B Size of control gap is 640B
Throughput at random Throughput at random topologytopology
ConclusionConclusion
CTMACCTMAC– Is based on a single transceiver Is based on a single transceiver
circuitrycircuitry– Operates over a single channelOperates over a single channel– Works on single transmission powerWorks on single transmission power
Thank you!!Thank you!!