You are on page 1of 8

JOURNAL OF COMPUTING, VOLUME 3, ISSUE 3, MARCH 2011, ISSN 2151-9617

HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/
WWW.JOURNALOFCOMPUTING.ORG 47

A CDMA Based MAC Protocol for Ad Hoc


Networks with Directional Antennas

Vahid Pourgolzari, Seyed Ali Ghorashi

Abstract—IEEE 802.11 DCF (Distributed Coordination Function) is one of the basic MAC protocols used in wireless ad hoc
networks. The DCF allows nodes to access the medium without any centralized unit and primarily assumes that omni-directional
antennas are used for packet transmission at nodes. One of the main challenges in DCF is silent area which yields to channel
spatial reuse reduction. This problem can be compensated by utilization of directional antennas. However, using directional
antennas itself leads to other problems such as new hidden terminal and deafness problems. In this paper, we propose a new
MAC protocol based on CDMA technique in which directional antennas are used. In our proposed multichannel protocol,
channels are specified by CDMA codes. One of the channels which is common in the network and called control channel is
used for RTS/CTS handshaking and other channels are used for data transmission. In the proposed protocol fewer codes are
used compaired to other CDMA based protocols and simulation results in different network topologies show that network
throughput is improved and spatial reuse of wireless channel is higher compaired to 802.11 DCF, DMAC (basic Directional
MAC) and conventional CDMA based MAC protocols based on IEEE 802.11 DCF.

Keywords— Ad hoc networks, directional antennas, medium access control, CDMA.

——————————  ——————————

1 INTRODUCTION

W ireless ad hoc networks include a number of nodes


spread out in an area which are connected by wire-
less channels without any infrastructure. Tradi-
channel increases. Additionally, directional antennas
have greater transmission range and higher gain than
omnidirectional antennas. However, directional antennas
tional MAC protocols such as IEEE 802.11 are used for in MAC protocols face new challenges including new
several years for controlling of multiple access at such hidden terminal and deafness problems. These problems
networks. IEEE 802.11 MAC is a carrier sense multiple basically occur when a transmitter is not aware of the
accesses protocol with collision avoidance (CSMA/CA) neighbor node’s activities and is investigated extensively
mechanism. This protocol is based on utilization of omni- in [3].
directional antennas for packet transmission. At this pro-
Another method to combat the channel capacity was-
tocol, while two nodes are communicating with each oth-
tage problem in common MAC protocols with omnidirec-
er, the vicinity neighbor nodes have to stay silent. Due to
tional antennas, is based on Code Division Multiple
the silent area created around the communicating nodes,
Access (CDMA) techniques. Multichannel MAC protocols
using this protocol wastes a large portion of channel ca-
may use CDMA or FDMA techniques to improve the spa-
pacity and leads to low throughput in the network. Direc-
tial reuse of wireless channel. Using CDMA technique in
tional antennas are proposed in ad hoc networks to com-
order to specify different channels, spreading codes are
pensate this problem. Using directional antennas allows
used and the antennas are omnidirectional. The main
several nodes communicate with each other simulta-
challenges in this case are code allocation mechanism and
neously without interfering; since packets are sent in a
the number of codes used in the network which may lead
particular direction, a neighbor node at the same direc-
to complexities in designing MAC protocols.
tion may only has to defer its transmission and other
beams of nodes are still permitted to transmit without In this paper we propose a new multichannel MAC
making interference. Thus, the spatial reuse of wireless protocol for ad hoc networks using directional antennas
————————————————
based on CDMA techniques. We improve the network
performance in term of throughput and try to eliminate
 Vahid Pourgolzari is with the Cognitive Telecommunications Research
Group, Department of Electrical Engineering, Shahid Beheshti University the problems caused by using directional antennas. In the
G.C., Evin 1983963113, Tehran, IRAN. proposed MAC protocol, wireless channel is divided into
 Seyed Ali Ghorashi is Assistant Professor of the Department of Electrical sub channels by using CDMA codes. RTS/CTS packets
Engineering, Cognitive Telecommunications Research Group, Shahid Be-
heshti University G.C., Evin 1983963113, Tehran, IRAN.
are sent on a common channel (code) called control chan-
nel, while data transmission occurs on different data
channels. Channel reservation for each transmission is
JOURNAL OF COMPUTING, VOLUME 3, ISSUE 3, MARCH 2011, ISSN 2151-9617
HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/
WWW.JOURNALOFCOMPUTING.ORG 48

done on the control channel. Neighbor nodes monitor the reservation MAC protocol with (N+2) codes (N codes for
control channel which is common in the whole network, data, one common code for control messages and one
and identify the code used in a communication between code for broadcasting) is proposed in [9]. The code is allo-
two nodes. Our main idea is based on using fewer codes cated to each node after compromise using control pack-
and a simple way for code allocation in the network. We ets. In [10] a new CDMA-Based MAC protocol with (N+1)
focus on improving the spatial reuse of wireless channel codes is proposed in which the number of codes to have a
and try to obtain the maximum throughput, using mini- pairwise transmission in the network are at least equal to
mum possible number of codes. By extensive simulations half of the number of nodes. Chan et al. in [12] offer a
we show that proposed protocol outperforms traditional MAC protocol based on IEEE 802.11 DCF. They use DS
MAC protocols using directional antennas, DMAC, IEEE CDMA technique and nodes can access the channel, using
802.11 DCF, and a new CDMA based MAC protocol pro- three states defaind for channel. They eliminate the interfe-
posed in [10] in terms of throughput and special reuse, rence using limited simultaneous communication between
particularly in condensed networks. nodes.
The rest of the paper is organized as follow: In sec- 2.1 IEEE 802.11 DCF
tion 2 the related works about directional and CDMA IEEE 802.11 DCF (Distributed Coordination Function)
based MAC protocols are reviwed and a brief descrip- is a carrier sense based multiple access method with colli-
tion of IEEE 802.11 DCF and basic directional MAC sion avoidance mechanism. When a packet is ready to be
protocols are discussed. In section 3, the proposed sent, transmitter has to listen to channel before sending its
multichannel MAC protocol is described and simula- packet. If the channel is idle, transmitter waits for a time
tion results are explained in section 4. Then, section 5 interval called DIFS and chooses a random backoff inter-
concludes the paper. val. Backoff interval is used for channel contention resolu-
tion and is selected from a range of [0, CW] where CW is
2 RELATED WORKS the contention window. After waiting for DIFS, the node
stars to decrement its backoff counter slot by slot. If the
Using directional antennas in ad hoc networks has
channel becomes busy while backoff process is in
been investigated in many researches. Nasipuri et al. in
progress, the backoff counting is stopped. When channel
[1] proposed a MAC protocol using directional antennas
is idle once again, the node restarts counting after a DIFS
in IEEE 802.11. In their method, the gain of directional
time from its previous stopped value. When the counter
and omnidirectional antennas is the same and also
value reaches 0, the node sends its packet.
RTS/CTS packets are transmitted omnidirectionally. In
[2], Ko et al. offer another MAC protocol using directional In order to prevent hidden terminal problem before
antennas in which RTS packet is transmitted directionally sending DATA and ACK packets, 802.11 uses RTS and
and CTS is sent in omni mode. In their proposed protocol, CTS handshaking mechanism. With this scheme, trans-
the transmitter knows the receiver’s location. Takai et al. mitter informs its intended receiver and the neighbor
[3] are proposed a directional virtual carrier sensing me- nodes about ongoing transmission. RTS, CTS, and DATA
chanism which uses DNAV mechanism in which direc- packets also include the remaining time value of ongoing
tional RTS and CTS transmission is used. In [4] choud- transmission. When a neighbor node receives any of these
hury et al. offer DMAC protocol in which all packets are packets, it has to avoid starting new transmission during
transmitted directionally. They also propose directional this time period. This is called virtual carrier sensing and
multihop RTS transmission. New hidden terminal and each node has a variable called NAV (Network Allocation
deafness problems are studied extremely in their paper. Vector). When a node receives any of RTS, CTS and DA-
ToneDMAC protocol is proposed in [5] to handle the TA packets, it updates the value of NAV with the remain-
deafness problem. In this protocol, control and data ing time value particularized in the received packet. Col-
channels are used and RTS, CTS, data, and ACK packets lision is detected when transmitter doesn’t receive CTS
are transmitted on the data channel. Control channel is packet. If a collision is detected, the node doubles its CW
used for tones assignment. Tones must be transmitted in and chooses a new backoff interval to restart its transmis-
a allocated control channel as well as a data channel that sion. On each collision, CW is doubled until reaches its
may lead to complexity in the protocol. Korakis et al. in maximum threshold, called CWmax. Fig. 1 summarizes
[6] propose CDR-MAC protocol in which the RTS is part of IEEE 802.11 MAC protocol. This figure represents
transmitted directionally sequentially in a circular man- the MAC process in a network of three nodes. Sender
ner until it scans all the area around the transmitter, but it node has a frame to send. As the medium is free, it can
suffer from the large amount of overhead due to circular transmit its RTS frame after a DIFS, which is answered by
transmission of packets. In [7], a code allocation scheme is the CTS from B after a SIFS. The sender receives CTS from
proposed for CDMA based radio networks in which the receiver and after a SIFS sends its data packet. The
codes are assigned to each transceiver pair. According to receiver receives the data packet successfully and re-
this mechanism, each node has to maintain a list of sponds with ACK after SIFS and communication finishes,
neighbours codes. Fantacci et al. propose a CDMA based successfully. Neighbor nodes also receive RTS/CTS pack-
MAC protocol in [8] in which data is transmitted with the ets. If any of these nodes would like to start transmission
receiver’s code. The major disadvantage of this kind of proto- with one of the transmitter or receiver, it has to defer its
cols is that they cannot support multicast services [10]. A dual transmission and update its NAV table with the time spe-
JOURNAL OF COMPUTING, VOLUME 3, ISSUE 3, MARCH 2011, ISSN 2151-9617
HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/
WWW.JOURNALOFCOMPUTING.ORG 49

cified in RTS/CTS packets. After finishing the ongoing is idle to transmit, using a specified beam, it chooses a
transmission, a random backoff interval is selected after a random backoff value. When the backoff counter reaches
DIFS time and then, the neighbor node sends its packet. zero, RTS packet is sent to the receiver. The receiver lis-
tens to the channel in its omnidirectional mode and de-
termines the direction of arrival of receiving signal.
Neighbor nodes that receive the RTS, update their DNAV
tables [4] to defer their transmition at that direction. The
receiver determines its direction of arrival while receives
the RTS, in order to reply the CTS at that direction. Then
the receiver checks the DNAV table to see if it is safe, if
the channel remains free during SIFS time interval, the
CTS is transmitted to sender. The sender waits for the
CTS and if CTS is received, it initiates the transmission of
Fig. 1. Channel access mechanism in IEEE 802.11 MAC protocol. DATA. The receiver transmits an ACK on receiving the
DATA, successfully. Other nodes that receive one of these
2.2 Directional MAC Protocol
packets, update their DNAV table, accordingly. To de-
Directional MAC or DMAC protocol is used in ad hoc
scribe the channel capacity wastage due to utilizing direc-
networks in which directional antennas are used for data
tional antennas, we use the linear scenario shown in Fig. 3
transmission. In this protocol, the information about vi-
[3]. In this scenario, nodes A, B, and C are transmitter
cinity nodes is received from upper layers, while receiv-
ing the packet to be transmitted. In this protocol, packets nodes and nodes D, E, and F are the receiver ones. We
are transmitted directionally but listening to the channel assume that all nodes share the same channel and the
is done omnidirectionally.Sending RTS/CTS omnidirec- sensing area is also the same. Using directional MAC pro-
tionally, reduces the communication range of directional tocol, just one of the three transmissions can occur and
antennas. Also, omnidirectional transmission of RTS/CTS the network losses a high capacity of wireless channel.
packets may decrease the spatial reuse of wireless chan-
nel. Directional transmission of RTS/CTS packets allows
for long distance transmission but may cause deafness
problem. Fig. 2 shows a topology in which omnidirec-
tionally and directionally transmission of RTS/CTS pack-
ets are compared. Suppose that A and B are communicat-
ing with each other while RTS/CTS packets are sent om-
nidirectionally. If C has a packet to send and starts to
communicate with E, for example, it may interfere with
B’s reception. In order to avoid this situation, C has to
defer its transmission. Now, assume that RTS/CTS pack-
ets are sent directionally. E is going to start a communica-
tion with A while A is transmitting to B, therefore E sends Fig. 3. Example of linear topology to describe channel capacity was-
an RTS to A. Node A has formed its beam towards B’s tage using directional antennas (first scenario).
direction, therefore, A doesn’t receive E’s RTS and it
doesn’t reply with a CTS, consequently. This is an exam-
ple of deafness problem and it occurs in DMAC protocol 3 PROPOSED PROTOCOL
when RTS/CTS packets are transmitted directionally. In this paper, we propose a new CDMA based MAC
protocol, for ad hoc networks in which directional anten-
nas are used. In our protocol similar to DMAC, each node
has an antenna with M beams. We assume there are M+1
codes (or channels) in the network; a common code is
used for RTS and CTS handshaking between nodes, and
other M codes are used for data and ACK transmission.
Similar to IEEE 802.11, RTS/CTS handshaking occurs in
omnidirectional mode, and data and ACK packets are
transmitted in directional mode. In our proposed proto-
col, we assume that each node knows its neighbors’ loca-
tions as well as their beam number in which communica-
Fig. 2. Comparison between omnidirectionally and directionally tion to each neighbor takes place. Such information can
transmission of RTS/CTS packets. receive from upper layers. As in DMAC protocol, the
Similar to 802.11, when the sender finds that the channel DNAV variable at each node, (Network Allocation Vector

© 2011 Journal of Computing Press, NY, USA, ISSN 2151-9617


http://sites.google.com/site/journalofcomputing/
JOURNAL OF COMPUTING, VOLUME 3, ISSUE 3, MARCH 2011, ISSN 2151-9617
HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/
WWW.JOURNALOFCOMPUTING.ORG 50

that involves the duration of ongoing transmission), will Node D


be updated at each transmission. Here, because of send- Neighbor Node Node’s Beam Neighbor’s Beam Code number
ing RTS/CTS packets omnidirectionally in a common
code, we do not have deafness problem. A 4 2 1
B 3 1 1
3.1 Information Table
At each node the information of neighbor nodes are
stored in a table called information table [6]. Each row in For example as for C’s table, A and C can communicate
the information table of a node comprises four fields. The with beams 3 and 1 respectively. Node C receives the
first field is the neighbor’s ID. The second one is the beam code No. 1 from A with mentioned beams.
number of itself and the third one contains neighbors
beam number by which this beam of the node and its
3.2 RTS/CTS Transmission
neighbor may communicate. The last field in the table is Each node has to check its information table before
the code number of the received packet from its neighbor starts any communication in a specified direction. If the
(if it has any). RTS/CTS packets include the code number code number field is set to 0, node can send its packet
which is going to be used for the ongoing data transmis- using code No.1. If it’s set to n (the number of received
sion. When a node transmits an RTS or CTS to another code from two other nodes), the node must use the
station, the frame header comprises the corresponding (n+1)th code in its RTS to prevent collision at that direc-
beam pairs. Each neighbor node that receives one of these tion. When the receiver receives the RTS packet, it checks
frames checks out its information table to find the beams the received code number at the RTS. The receiver checks
through which it can receive packets from two communi- out its information table in a similar way. If it hasn’t re-
cating nodes. If one of these beams coincides with the ceived any RTS/CTS packet at that direction, it is possible
respective beam of the RTS and CTS frames, then the to use this code and CTS packet which includes the same
neighbor defers its transmission by this beam using the code that is placed into RTS is sent to the transmitter to
same code. The code number field in the information ta- start data transmission. If the code inserted in the RTS
ble of each node is updated whenever the neighbor node packet is not allowed to be used by the receiver, the re-
receives a control packet with a specified code number of ceiver replies its CTS packet with another suitable code
an ongoing transmission. Fig. 3 shows an example of de- number. While a neighbor node receives the Mth code in
scribed mechanism. Node A is communicating with B which M is the number of beams, the next permissible
using the code No.1, and nodes C and D are neighbor code for this neighbor node is the first code if it has any
nodes that receive the control packets from A and B. packet to transmit. The advantage of this process is to
Nodes D and B know the beam numbers of both A and B allow neighbor nodes to be informed about codes used in
by which they communicate with each other. Their in- the round neighbor nodes. Therefore, neighbor nodes
formation table is shown in Table 1. avoid using the same code in one direction. With this ar-
chitecture, the channel is reserved for ongoing data
transmission while RTS/CTS handshaking occurs over
the common code. The code number field is reset after
finishing the time duration specified in the DNAV varia-
ble. It is set with the last received control packet. A code
allocation example is shown in Fig. 4.

Fig. 3. An example of two communicating nodes and neighbor’s


information table.

TABLE 1
INFORMATION TABLES OF NODES C AND D IN FIG. 3
Node C Fig. 4. An example of code allocation

Neighbor Node Node’s Beam Neighbor’s Beam Code number


Fig. 4 shows an example of code assignment in a topology
A 1 3 1 with 5 nodes. Suppose that A and B are communicating
with each other using code No.3. Nodes C, D and E can
B 3 1 1
hear this communication. While communication between
A and B is in progress, C can’t use code No. 3 in its first
beam if has a packet to transmit at that direction. With the
same way, D and E cannot communicate using the same
code with forth and first beam for D and the forth beam
JOURNAL OF COMPUTING, VOLUME 3, ISSUE 3, MARCH 2011, ISSN 2151-9617
HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/
WWW.JOURNALOFCOMPUTING.ORG 51

for E. Now assume that D is going to send data to C while municate pairwise. The simulation parameters are shown
the communication between A and B is emerging. The in Table 3.
communication between nodes D and C is performed
using beams 4 and 1, respectively. They must use the
code No. 4 to communicate at this direction. Note that
node E first receives CTS from B and knows their code
number and then receives RTS from D. Now if node E is
going to send data, using its beam No. 4 while both nodes
A and B, and C and D are communicating with each oth-
er, it must put the code No.1 in its RTS packet to commu-
nicate at that direction. Table 2 shows the comparison
between the proposed protocol and Directional MAC pro-
tocol. The tables show the beam numbers of three neigh-
bor nodes by which they are allowed to transmit at the
same time with A and B. Notice that by using IEEE 802.11
while communication between A and B is in progress, all
three neighbor nodes must stay in silent mode. For exam-
ple using directional MAC node C cannot use its first
beam while communication between A and B is in
progress. D must defer any transmission with its first and
forth beam as well.
TABLE 2
COMPARISON BETWEEN THE PROPOSED PROTOCOL AND DI-
RECTIONAL MAC PROTOCOL IN THE EXAMPLE OF FIG. 4

Fig. 5. Simulation scenarios.

TABLE 3
SIMULATION PARAMETERS
Parameter Value
Time slot 9µs
RTS length 20 bytes
CTS length 14 bytes
Data length 1024 bytes
ACK length 14 bytes
DIFS 34µs
SIFS 16µs
Sending Rate 5.5 Mbps (variable)
4 PERFORMANCE EVALUATION
Packet Arrival rate 100~200 Packets/s (variable)
In this section, we evaluate our proposed protocol in
Simulation Time 180 s
comparison with Directional MAC, IEEE 802.11 DCF, and
a new CDMA based MAC technique proposed in [10]. In
our simulations, we assume that the channel is error free, 4.1 Scenario (a)
the propagation delay is zero, nodes in the network are This scenario is a linear topology in which λ is set to 300
all in the same sensing area. We also assume that packets packet/s and transmitter nodes, A and C communicate
arrive in a Poisson process with packet arrival rate of λ. with B and D, respectively and we assume that nodes are
The measured metric is the aggregate throughput of the in their coverage range. Fig. 6 shows the aggregate
network and. we consider four topologies. The first three throughputs versus sending rate in the scenario (a). While
considered topologies are shown in Fig. 5. The first one is one of A or C obtains the channel to communicate with B
a linear topology which also shows hidden terminal prob- or D, the rest of nodes defer their transmission. This hap-
lem due to asymmetry in gain [4]. The second scenario is pens when we use DMAC and 802.11 DCF protocols, but
a topology with 6 nodes to describe spatial reuse of wire- by using the proposed protocol as well as the considered
less channel using IEEE 802.11 DCF. The third scenario is CDMA based MAC protocol, we get similar results as
a topology with 4 nodes to show the spatial reuse of they both use only two channels and nodes A and C can
channel using DMAC and IEEE 802.11 DCF. the fourth communicate simultaneously without interfering. As-
scenario is a random scenario in which nodes are com- sume that node A is far enough from C and D, therefore it
JOURNAL OF COMPUTING, VOLUME 3, ISSUE 3, MARCH 2011, ISSN 2151-9617
HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/
WWW.JOURNALOFCOMPUTING.ORG 52

cannot sense the communication between nodes C and D


for a similar reason. If A has a packet to send to B since A
cannot sense the existing transmission, A senses the
channel as idle and starts to transmit. When DMAC pro-
tocol is used, a collision happens at D due to the fact that
D is receiving data with high directional gain with a beam
directed toward C and also A. Using our protocol, while
C and D are communicating with each other, this never
happens. Note that RTS/CTS handshakings occur on dif-
ferent channel.

Fig. 8. Aggregate throughput versus the packet arrival rate in scena-


rio (b)

4.3 Scenario (c)


In this scenario we evaluate the aggregate throughput
of the proposed protocol as a function of transmission
rate. Similar to scenario (a), the spatial reuse of channel is
maximum due to the fact that nodes A and B as well as
nodes C and D can communicate simultaneously. Fig. 9
shows the results with different traffic loads. With fewer
traffic loads, throughput becomes greater while transmis-
Fig. 6. Aggregate throughput versus sending rate in the scenario (a)
sion rate is less. Network throughput is maximum under
high traffic load with high data rate.
4.2 Scenario (b)
This scenario shows spatial reuse more visibly. Nodes A and
C are independent and whenever two packets are transmit-
ted simultaneously, both transmissions are supposed to be
successful. When node B wishes to transmit a packet, it
should wait for both A and C to leave the medium free, at
the same time. Since A and C are independent, their silence
times almost never coincide, and B senses the medium as
busy rather than A and C. Fig. 7 shows the throughput of
each sender versus the packet size in IEEE 802.11 DCF pro-
tocol. Aggregate throughput versus the packet arrival rate is
shown in Fig. 8. When packet arrival rate increases until
gaining network packet rate value, the total throughput of
Fig. 9. Aggregate throughput versus sending rate with different traf-
network falls down, because in this point traffic is going to
fic loads in scenario (c)
become heavy and some packets should be dropped to
avoid this issue. Using the proposed protocol and DMAC
protocol in this scenario lead to same results because three 4.4 Random Scenario
communications can occur at the same time without any In this scenario, first we consider 40 nodes randomly
interference. spread out in an area and 10 transmitters and receivers
are selected randomly among them. Fig. 10 shows the
simulation results using our proposed protocol with 4
and 6 channels, the CDMA based MAC protocol pro-
posed in [10], and DMAC protocol. Our proposed proto-
col has maximum throughput while the number of chan-
nels is less. We achieve high throughput in our proposed
protocol with more number of beams. In a specified direc-
tion it is possible to have more communications than the
number of beams at each node (which equals the number
of codes). For this reason, increasing the number if beams
lead to higher throughput in the condensed networks. To
have a pairwise communication between ten node pairs
using the CDMA based MAC protocol, the protocol has to
Fig. 7. the throughput of each sender versus the packet size using use at least ten channels. As we see from Fig. 10, the con-
IEEE 802.11 DCF protocol in scenario (b) ventional CDMA based MAC protocol with 4 channels
has the minimum throughput. By using 4 channels, only 4
simultaneous communications may occur. Using DMAC
JOURNAL OF COMPUTING, VOLUME 3, ISSUE 3, MARCH 2011, ISSN 2151-9617
HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/
WWW.JOURNALOFCOMPUTING.ORG 53

protocol may make some nodes in some directions defer channel reservation is obtained by RTS/CTS handshaking
their transmission in order to prevent collision. As we see in the control channel, using information table main-
in Fig. 10, it has lower throughput than proposed protocol tained by each node. Control packets are transmitted om-
as well as the conventional CDMA based MAC protocol nidirectionally and deafness problem is eliminated. We
with ten channels. compare the proposed protocol with 802.11 DCF, DMAC,
In the next step of random scenario, we assume a net- and new CDMA based MAC protocol and show that it
work with 20 and 50 nodes in which the maximum pair- outperforms them in term of throughput. Different para-
wise communications occur. Again, the transmitters and meters such as traffic load, transmission rate and number
receivers are selected randomly. We set the arrival packet of codes are evaluated and compared for different scena-
rate to 50 (Packets/s). As can be seen in Fig. 11, in a net- rios. Our simulation results show that using the proposed
work with 50 nodes, a high throughput can be obtained protocol improves the network throughput by fewer
using 6 channels. Whereas to have a maximum transmis- codes and less complexity.
sion between nodes (25 simultaneous transmissions) in a
network using conventional CDMA based one, 25 codes ACKNOWLEDGMENT
(channels) are needed. Fig. 11 shows the results of our
This work is supported by Iranian education and Re-
proposed protocol and the CDMA based MAC protocol
search Institute for Information and Communication
using 4 and 6 channels.
Technology (ERICT) under grant number 8974/500.

REFERENCES
[1] A. Nasipuri, S. Ye, J. You, and R.E. Hiromoto, “A MAC Protocol
for Mobile Ad-Hoc Networks Using Directional Ante nas,”
Proc.IEEE Wireless Comm. and Networking Conf. (WCNC ’00),
vol. 3, pp. 1214-1219, 2000.
[2] Y.B. Ko, V. Shankarkumar, and N.H. Vaidya, “Medium Access
Control Protocols Using Directional Antennas in Ad Hoc Net-
works,” Proc. IEEE INFOCOM, vol. 1, pp. 13-21, Mar 2000.
[3] M. Takai, J. Martin, A. Ren, and R. Bagrodia, “Directional Vir-
tual Carrier Sensing for Directional Antennas in Mobile Ad Hoc
Networks,” Proc. ACM MobiHoc, 2002.
[4] R. R. Choudhury, X. Yang, R. Ramanathan and N. H. Vaidya,
“Using Directional Antennas for Medium Access Control in Ad
Hoc Networks,” Proc. of ACM MobiCom, Atlanta, USA, pp: 59-
Fig. 10. Aggregate throughput as a function of transmission rate in 69, Sep. 2002.
random scenario. [5] R. Choubhury and N. Vaidya, “Deafness: A MAC Problem in
Ad Hoc Networks When Using Directional Antennas,” Proc.
12th IEEE Int’l Conf. Network Protocols (ICNP ’04), pp. 283-292,
Oct. 2004
[6] T. Korakis, G. Jakllari and L. Tassiulas, “CDR-MAC: A Protocol
for Full Exploitation of Directional Antennas in Ad Hoc Wire-
less Networks,” IEEE Transaction on Mobile Computing, Vol. 7,
No. 2, pp: 145-155, Feb. 2008.
[7] L. Hu, “Distributed Code Assignements for CDMA Packet
Radio Networks,” IEEE/ACM Transactions on Networking, Vol.
1, No. 6, December 1993.
[8] R. Fantacci, A. Ferri and D. Tarchi, “A MAC technique for
CDMA based Ad-Hoc network,” IEEE Wireless Communications
and Networking Conference, pp: 645-650, March 2005.
[9] M. Jia, H. Chen and Y. Yuan, “A Dual Reservation MAC Proto-
col based on CDMA for Ad hoc Networks, ” Asia-Pacific Confe-
rence on Communications, pp: 53-56, October 2005.
[10] T. Meshhadany and W. Ajib, “New CDMA-Based MAC Proto-
col for Ad Hoc Networks,” Vehicular Technology Conference, pp:
Fig. 11. Aggregate throughput as a function of transmission rate in 91-95, fall 2007.
random scenario. [11] Y. Su, K. Fakih, J. Diouris, and Y. Zhang, “Modeling and
Throughput Analysis for Wireless Ad hoc Networks,” Vehicular
Technology Conference, pp: 88-92, May 2008.
5 CONCLUSION [12] H. Chan, C. Wong, and R. Hsieh, " A new multiple code chan-
nels MAC protocol in DS-CDMA wireless networks ," in Radio
In this paper, a multichannel MAC protocol with direc-
and Wireless Symposium, Jan. 2009, pp. 687-690.
tional antennas is proposed. The most important feature
of the proposed protocol is the capability of communicat- Vahid Pourgolzari is a M.Sc. student in Cognitive Telecommunica-
ing more nodes at the same time using lower number of tions Research Group, at the Department of Electrical Engineering,
codes. Less complexity in Code assignment and channel Shahid Beheshti University, Tehran, IRAN. His research is focused
on wireless ad hoc networks, MAC protocols and directional anten-
reservation is another advantage of the proposed proto- nas in ad hoc networks.
col. In this protocol, code allocation mechanism and
JOURNAL OF COMPUTING, VOLUME 3, ISSUE 3, MARCH 2011, ISSN 2151-9617
HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/
WWW.JOURNALOFCOMPUTING.ORG 54

Seyed Ali Ghorashi Received his B.Sc. and M.Sc. Degrees in elec-
trical engineering from the university of Tehran, Iran, in 1992 and
1995, respectively. Then, he joined SANA Pro. Inc., where he worked
on modeling and simulation of OFDM based wireless LAN systems
and interference cancellation methods in WCDMA systems. Since
2000, he worked as a research associate at King’s College London
on “Capacity enhancement methods in Multi-leyer WCDMA systems”
sponsored by Mobile VCE. In 2003 he received his PHD at King’s
College and since then he worked at King’s College as a research
fellow. In 2006 he joined Samsung Electronics (UK) Ltd as a senior
researcher and now he is a faculty member of Cognitive Telecom-
munications Research Group, Department of Electrical Engineering,
Shahid Beheshti University G.C., at Tehran, Iran, working on wire-
less communications.

You might also like