Professional Documents
Culture Documents
Abstract— IEEE 802.11 MAC protocol has been the standard However, the effectiveness of IEEE 802.11 MAC in mul-
for Wireless LANs and is also implemented in many simulation tihop mobile ad hoc networks has been widely recognized
software for mobile ad hoc networks. However, IEEE 802.11 as a serious problem. The packet collision over the air is
MAC has been shown to be quite inefficient in the multihop
mobile environments. Besides the well-known hidden terminal much more severe in the multihop environments than that in
problem and the exposed terminal problem, there also exists the wireless LANs [1]–[4]. The packet losses due to such
the receiver blocking problem which may result in link/routing kind of MAC layer contentions will definitely affect the
failures and unfairness among multiple flows. Moreover, the performance of the high layer networking schemes such as
contention and interference from the upstream and downstream the TCP congestion control and routing maintenance because
nodes seriously decrease the packet delivery ratio of mulitihop
flows. All these problems could lead to the “explosion” of control a node does not know whether an error is due to the collision
packets and poor throughput performance. In this paper, we first or the unreachable address [4]–[10].
analyze these anomaly phenomena in multihop mobile ad hoc The source of the above problems comes mainly from the
networks. Then, we present a novel effective random medium MAC layer. The hidden terminals introduce collisions and
access control (MAC) protocol based on IEEE 802.11 MAC the exposed terminals lead to low spatial reuse ratio. Besides
protocol. The new MAC protocol uses an out-of-band busy
tone and two communication channels, one for control frames these two notorious problems, the receiver blocking problem,
and the other for data frames. The newly designed message i.e., the intended receiver does not respond to RTS or DATA
exchange sequence provides a comprehensive solution to all due to the interference or virtual carrier sensing operational
the aforementioned problems. Extended simulations demonstrate requirements from other ongoing transmissions, also deserves
that our scheme provides a much more stable link layer, greatly a serious attention. This problem becomes more severe in
improves the spatial reuse, and works well in reducing the packet
collisions. It improves the throughput by 7% to 20% for one-hop the multihop environments and results in packet dropping,
flows and by 2∼5 times for multihop flows under heavy traffic starvation of some traffic flows or nodes, and network layer
comparing to the IEEE 802.11 MAC. re-routing, which we will elaborate later in section III. Further-
Index Terms— Medium access control(MAC), Dual-Channel, more, for multihop flows, the contentions or interferences from
Multi-hop mobile ad hoc networks, receiver blocking problem, the upstream and downstream nodes and other flows could lead
hidden terminal and exposed terminal problems, intra-flow to poor packet delivery performance.
contention. There are many schemes proposed in the current literature
to reduce the severe collisions of DATA packets at MAC layer.
I. I NTRODUCTION BTMA [11] uses a busy tone to address the hidden terminal
Contention based medium access control (MAC) protocols problem. The base station broadcasts a busy tone signal to keep
have been widely studied for wireless networks due to the the hidden terminals from accessing the channel when it senses
low cost and easy implementation. IEEE 802.11 MAC [1] is a transmission. It relies on a centralized network infrastructure
such a protocol that has been the standard of wireless LANs which is not applicable in mobile ad hoc networks. FAMA-
and has also been incorporated in many wireless testbeds and NCS [12] uses the long dominating CTS packets to act as
simulation packages for mobile ad hoc networks. It adopts the receive busy tone to prevent any competing transmitters in
four-way handshake procedures, i.e., RTS/ CTS/ DATA/ ACK. the receiver range from transmitting. This requires any nodes
Short packets, RTS and CTS, are used to avoid collisions hearing interference keep quiet for the period of one maximum
between long data packets. The NAV (Network Allocation data packet to guarantee no collisions with the ongoing data
Vector) value carried by RTS/ CTS/ DATA/ ACK is used transmission, which is obviously not efficient especially when
to reserve the medium to avoid potential collisions (i.e., the RTS/CTS negotiation process fails or the DATA packet is
virtual carrier sensing) and hence mitigate the hidden terminal very short.
problem. The ACK is used as a confirmation of the successful Some multi-channel schemes based on random access have
transmission without errors. also been investigated in the last few years. One common
approach to avoid the collisions between control packets
This work was supported in part by the U.S. Office of Naval Research
under Young Investigator Award N000140210464 and by the National Science and data packets is to use separate channels for different
Foundation under Faculty Early Career Development Award ANI-0093241. kinds of packets. DCA [13] uses one control channel for
IEEE TRANSACTION ON WIRELESS COMMUNICATIONS, 2006 (TO APPEAR) 2
RTS/CTS and one or more data channels for DATA/ACK. It when applied in the multi-hop mobile ad hoc networks and the
presents one method to utilize multiple channels but does not ideal protocol behavior we may desire. Section IV describes
solve the hidden terminal problems. Dual busy tone multiple the new MAC protocol for multihop mobile ad hoc networks.
access (DBTMA) schemes [14] [15] [16] handles the hidden Simulation results are given in Section V. Finally, we conclude
terminal and exposed terminal problems. It uses the transmit the paper in section VI.
busy tone to prevent the exposed terminals from becoming
new receivers, the receive busy tone to prevent the hidden
II. BACKGROUND
terminals from becoming new transmitters, and a separate
data channel to avoid collisions between control packets and A. Transmission Range and Sensing/Interference Range
data packets. DBTMA, however, does not consider the ACK In wireless networks, the signal to noise plus interference
packets which, if used, may result in collisions with the DATA ratio (SINR) must be larger than some threshold β for the
packets while the acknowledgment (ACK) is needed for the receiver to detect the received signal correctly.
unreliable wireless links. PAMAS [17] uses a separate control
channel to transmit both RTS/CTS packets and busy tone Pi
SIN Ri = P ≥β (1)
signals. It gives a solution to the hidden terminal problem Pk + N
k6=i
and mainly focuses on power savings. MAC-SCC [18] uses
two Network Allocation Vectors (NAVs) for the data channel The received power Pr :
and the control channel, respectively. The two NAVs make α
it possible for the control channel to schedule not only the do
Pr = Po , (2)
current data transmission but also the next data transmission. d
Although it reduces the backoff time, it does not address the where do is the reference distance and Po is the received power
aforementioned problems. at the reference distance. α ≥ 2 is the power-loss exponent. In
To the best of our knowledge, there are no comprehensive the following discussions, we assume all nodes use the same
study and good solutions to all the hidden terminal problem, transmission power.
the exposed terminal problem, the receiver blocking problem,
In the transmission range, the receiver should be able to
and the intra-flow and inter-flow contention problems. All of
correctly demodulate (or decode) the signal when there is
them contribute to the poor performance of MAC protocol
no interference, i.e., the received power Pr must be larger
in the multihop wireless mobile ad hoc networks. Most of
than a threshold RXT hresh , which defines the maximum
the current schemes aggravate the receiver blocking problem
transmission distance, called the transmission range,
while alleviating the hidden terminal problem and do not fully
address the problems of multihop flows in the mobile ad hoc 1/α
Po
networks. dt = do . (3)
In this paper, we utilize two channels (dual-channel) for RXT hresh
control packets and DATA packets, separately. RTS and CTS If there is interference from another transmission at the
are transmitted in a separate control channel to avoid the receiver, the power of the interference signal Pi must be
collisions with data packets. Negative CTS (NCTS) is used smaller enough than that of the intended signal Pr , i.e.
to solve the receiver blocking problem and is also transmitted Pi ∗ CPT hresh < Pr , where CPT hresh > 1 is the capture
in the control channel. An outband receiver-based busy tone threshold. So
[14] is used to solve the hidden terminal problem. We do not 1/α
use ACK here because there is no collision to the ongoing Pr 1/α
di = dr > dr × CPT hresh = ∆c × dr , (4)
DATA packet. To address the packet error due to the imperfect Pi
wireless channel, we introduce Negative Acknowledgment
where di is the distance from the interference source to the
(NACK) signal, a continuing busy tone signal, when the
receiver, and dr is the distance from the sender to the receiver.
receiver determines that the received DATA packet is corrupted 1/α
The quantity ∆c = CPT hresh > 1 defines a zone where other
and in error. The sender will not misinterpret this NACK signal
transmissions will interfere the receiving activities.
because there are no other receivers in its sensing range and
When the receiver is maximum transmission distance dt
hence no interfering NACK signals, and it will assume that
away from the sender, the minimum interference distance,
the transmission is successful if no NACK signal is sensed.
dimin , which allow correct demodulation at the receiver and
Furthermore, our protocol has an inherent mechanism to solve
the interference power Pimin are
the intra-flow contention and could achieve optimum packet
α
scheduling for chain topology. It turns out that this protocol dt Pt
has solved almost all aforementioned problems and does not dimin = ∆c ×dt , Pimin = Pt = .
dimin CPT hresh
require synchronized transmission at the MAC layer as in [19] (5)
[20]. So the sender should be able to sense the interference with
The rest of this paper is organized as follows. Section II power level Pimin before transmission, i.e., the interference
presents the basic concepts of the physical model which are from dimin away, to avoid potential interference to other on-
important to design the MAC protocol. Then, Section III elabo- going transmission. Considering the probability that there are
rates the source of collisions in the IEEE 802.11 MAC protocol more than one interfering transmissions in the neighborhood
IEEE TRANSACTION ON WIRELESS COMMUNICATIONS, 2006 (TO APPEAR) 3
the hidden node of the other. Besides the hidden terminal, the
exposed terminal of the transmitter should not initiate any new
transmission either during the ongoing transmission to avoid
collision with the short packets CTS or ACK. This leads to
F A B C D E significant inefficiency of the spatial reuse.
0 1 2 3 4 5 6
F. The Desired Protocol Behavior
The desired MAC protocol for mobile ad hoc networks
should resolve the hidden/exposed terminal problem and the
receiver blocking problem. It should guarantee that there is
only one receiver in the range of a transmitter and only one
Fig. 2. Chain topology transmitter in the range of a receiver. The exposed nodes
can start to transmit in spite of the ongoing transmission.
The hidden nodes cannot initiate new transmissions but may
This will therefore result in serious unfairness among flows receive packets. Thus, to maximize the spatial reuse, it should
and severe packet discarding. allow multiple receivers in the range of any receiver to receive
For example, in Fig. 1, when D is transmitting to E, A sends and multiple transmitters in the range of any transmitter
RTS to B but will not receive the intended CTS from B. This to transmit. The transmitter should also know whether its
is because B cannot correctly receive A’s RTS due to collision intended receiver is blocked or is outside of its transmission
from D’s transmission. Then, A keeps doubling contention range when it does not receive the returned CTS to avoid
window and retransmitting until it discards the packet. If D discarding packets and the undesirable behavior at the higher
has a burst of traffic to E, it will continuously occupy the protocol layer, such as false alarms of route failures.
channel which will starve the flow from A to B.
The hidden terminal problem only makes the receiver G. Limitation of IEEE 802.11 MAC Using Single Channel
blocking problem worse. In the above example, even if A
The collisions between RTS, CTS, DATA and ACK are
has a chance to transmit a packet to B, its hidden terminal
the culprits preventing the MAC protocol from achieving the
D could start transmission and collide with A’s transmission
aforementioned desired behavior. The exposed terminal cannot
at B because D cannot sense A’s transmission. Therefore, A
initiate new transmissions which may prevent the current
almost has no chance to successfully transmit a packet to B
transmitter from correctly receiving the ACK. The hidden
when D has packets destined to E.
terminal which cannot correctly receive the CTS or sense the
transmission may initiate a new transmission which collides
D. Intra-Flow Contention with the current ongoing transmission. Furthermore, it should
Intra-flow contention is the contention from the transmis- not become a receiver because its CTS/ACK may introduce
sions of packets at upstream and downstream nodes along the collisions at the receiver of the current transmission. Its DATA
path of the same flow. The packet at each hop along the path packet reception may also be corrupted by the ACK packet
may encounter collisions and be discarded. Thus, the packets from the current receiver. If the intended receiver of a new
which reach the last few nodes of the path is much fewer than transmission is in the range of the ongoing transmission, it
those at the first few nodes. And the resource consumed by may not be able to correctly receive RTS and/or sense the
those discarded packets is wasted. busy medium, and hence will not return the CTS. Thus, the
Another abnormality is that packets continuously accumu- intended sender cannot distinguish whether it is blocked or out
late at the first few hops of the path. The reason is that the of the transmission range.
transmission at the first few hops encounters less contention To summarize, many aforementioned problems cannot be
than that at subsequent nodes. One simple example, as shown solved if a single channel is used in the IEEE 802.11 MAC
in Fig. 2, is the chain topology with more than 5 hops where protocol.
nodes are separated by fixed length a little less than the
maximum transmission distance. The first node is interfered IV. DUCHA: A N EW D UAL -C HANNEL MAC P ROTOCOL
by three subsequent nodes. This number is four for the second In this section, we present the new dual-channel MAC
node and 5 for the third node. This means the first node could protocol (DUCHA) for multi-hop mobile ad hoc networks.
inject more packets into the chain than the subsequent nodes
could forward. Li et al. have discussed this phenomena in [21]
A. Protocol Overview
and indicated that 802.11 MAC fails to achieve the optimum
throughput for the chain topology. To achieve the desired protocol behavior, we utilize dual-
channel for DATA and control packets, separately. DATA is
transmitted over the data channel. RTS and CTS are transmit-
E. Inter-flow Contention ted over the control channel. Negative CTS (NCTS) is used
Inter-flow contention happens when two or more flows pass to solve the receiver blocking problem and is also transmitted
through the same region. The transmission of packets in this in the control channel. An outband receiver based busy tone
region encounters the interference and collisions not only from [11] [14] is used to solve the hidden terminal problem. ACK is
the packets of its own flow but also from other flows. This unnecessary here because our protocol can guarantee that there
region becomes the bottleneck and could make it more severe is no collision to DATA packets. To deal with wireless channel
IEEE TRANSACTION ON WIRELESS COMMUNICATIONS, 2006 (TO APPEAR) 5
Then B returns NCTS to A because it senses busy medium in The out-of-band busy tone signal prevents any hidden nodes
the DATA channel. The duration field of NCTS contains the from initiating new DATA transmission in the DATA channel.
estimate for the remaining busy period in the DATA channel There is no collision for NACK signal, i.e., the continuing
which takes to finish D’s transmission. When A receives the busy tone, either, because there is only one DATA receiver in
NCTS, it defers its transmission and stop the unnecessary the sensing range of any ongoing sender in the DATA channel.
retransmissions. It retries the transmission after the period After successful RTS/CTS exchange between the sender and
indicated in the duration field of NCTS. Once the RTS/CTS its intended receiver, all other nodes in the sensing range of
exchange is successful between A and B, A begins to transmit the sender can sense its transmission in the DATA channel and
DATA packet to B. B will correctly receive the DATA packet thus are restricted from becoming DATA receivers.
because there is no hidden terminal problem for receiving The control overhead could be reduced although we intro-
DATA packets. duce a new NCTS packet and a new NACK signal. First,
4) Improvement of spatial reuse: As discussed above, the NCTS is only transmitted when the intended receiver can
exposed terminals could transmit DATA packets. Furthermore, not receive DATA packet. It can save a lot of unnecessary
in our protocol, the hidden terminal could receive DATA retransmitted RTS packets as discussed in Section IV-C.3.
packets though it cannot transmit. In Fig. 1, D is the hidden Second, NACK signal occurs only when the DATA packet is
terminal of A when A is transmitting DATA packet to B. After corrupted due to channel fading, and hence its transmission
the RTS/CTS exchange between E and D is successful in the frequency is also much smaller than that of ACK packets
control channel, E could transmit DATA packets to D. Since in the 802.11 MAC protocol. Third, there is no collision for
D is out of A’s sensing range and B is out of E’s sensing DATA packets and hence the transmissions of RTS and CTS
range, both D and E could correctly receive the intended DATA for corrupted DATA packets are saved.
packets. Thus DUCHA could greatly increase spatial reuse
by allowing multiple transmitters or multiple receivers in the V. P ERFORMANCE E VALUATION
sensing range of each other to communicate. At the same time, A. Simulation Environments
there are no collisions for DATA packets as well as the NACK
signals because there is only one transmitter in its intended We now evaluate the performance of our DUCHA protocol
receiver’s sensing range and only one receiver in its intended and compare it with the IEEE 802.11 scheme. The simulation
transmitter’s sensing range. tool is one of the widely used network simulation tools –
5) Inherent mechanism to solve the intra-flow contention ns2. The propagation model is the two-ray ground model. The
transmission range of each node is approximately 250m. The
problem: In our DUCHA protocol, the receiver of DATA
data rate for the IEEE 802.11 protocol is 1Mbps. And the
packets have the highest priority to access the channel for
next DATA transmission. When one node correctly receives a data rates for the DUCHA protocol are 220Kbps and 780Kbps
for the control and data channel, respectively. The length of
DATA packet, it could immediately start the backoff procedure
for the new transmission while the upstream and downstream the physical preamble is 192bits. The length of NACK signal
nodes in its sensing range are prevented from transmitting is 150µs. The data packet size is 1000bytes. The capture
threshold is 10dB.
DATA packets during the NACK period. In fact, this could
achieve optimum packet scheduling for chain topology and it In our simulation study, several important performance
is similar for any single flow scenario. metrics are evaluated, which are described below:
For example, in Fig. 2, node 1 has the highest priority to • Aggregate end-to-end throughput – The sum of data
access the channel when it receives one packet from node 0 packets delivered to the destinations.
and hence immediately forwards the packet to node 2. For the • Aggregate one-hop throughput – The sum of all the
same reason, node 2 immediately forwards the received packet packets delivered to the destinations multiplied by the
to node 3. Then node 3 forwards the received packet to node hops they pass. This metric measures the total resource
4. Because node 0 can sense node 1 and 2’s transmissions, efficiently utilized by the applications or the traffic. If all
it will not interfere with these two nodes. Node 0 could not flows are one-hop flows, this is the same as the aggre-
send packets to node 1 either when node 3 forwards packet gate end-to-end throughput, referred to as the aggregate
to 4 because node 1 is in the interference range of node 3. throughput in the figures.
When node 4 forwards packet to 5, node 0 could have chance • Transmission efficiency of DATA packets – The ratio
to send packet to node 1. In general, nodes which are 4 hops of the aggregate one-hop throughput to the number of
away from each other along the path could simultaneously the transmitted DATA packets. This metric reflects the
send packets to their next hops. Thus the procedure could resource wasted by the collided DATA packets and the
utilize 1/4 of the channel bandwidth, the maximum throughput discarded DATA packets due to the overflow of queue at
which can be approached by the chain topology [21]. the intermediate nodes of the path.
• Normalized control overhead – The ratio of all kinds of
control packets including RTS, CTS, NCTS and ACK to
D. Remarks on the proposed protocol the aggregate one-hop throughput.
There is no collision for DATA packets in the proposed The collided DATA packets and the discarded DATA packets
protocol because there is only one DATA transmitter in the have also been evaluated in some cases. The collided DATA
sensing range of any ongoing receiver in the DATA channel. packets are those transmitted but corrupted by the hidden
IEEE TRANSACTION ON WIRELESS COMMUNICATIONS, 2006 (TO APPEAR) 7
0.15
240m 320m 240m
A B C D 0.1
0.075
Fig. 4. One simple topology 802.11
0.05 DUCHA
0.025
terminals. The discarded DATA packets are those discarded 0
0 0.1 0.2 0.3 0.4 0.5
due to continuous failed retransmissions of RTS or DATA Offered load (Mbps)
packets.
Fig. 6. End-to-End throughput for the 9-node chain topology
B. Simple Scenarios
2
To verify the correctness of our protocol, we first investigate
20 0.6
0.4
10
0.2
0 0
0 20 40 60 80 100 120 0 0.5 1 1.5
(a) Total offered load (pkts/s) (b) Total offered load (Mbps)
15 0.6
10 0.4
5 0.2
0 0
0 10 20 30 40 50 60 0 0.5 1 1.5
(c) Offered load of flow 1 from A to B (pkts/s) (d) Total offered load (Mbps)
slower in our protocol than in IEEE 802.11 MAC and it is 20 flows with the same CBR/UDP traffic in the network. We
improved by 7% to 20% when the minimum source-destination use pre-computed shortest path with no routing overhead. All
distance increases from 0m to 200m. results are averaged over 30 random simulations.
This is reasonable. For example, A and B are the source- 1) Aggregate End-to-End Throughput: We observe from
destination pair. The larger the distance between A and B, the Fig. 8(a) that when the minimum hop-count for each flow
larger the hidden area where nodes cannot sense A’s trans- increases, the aggregate end-to-end throughput of both proto-
mission but can sense B’s transmission. So in IEEE 802.11 cols decreases. This is reasonable because packets of multihop
MAC, the hidden terminal problem becomes more severe when flows have to pass more links and thus consume more resource
the distance between A and B becomes larger. On the other for the same arriving traffic.
hand, in IEEE 802.11 MAC, all the nodes in the sensing range The throughput of IEEE 802.11 MAC reduces more dra-
of A or B should not transmit anything, i.e., both sensing matically than that of DUCHA when the minimum hop-
ranges of A and B could not be reused by other transmissions. count for each flow increases. The improvement of throughput
However, in our protocol DUCHA, the exposed area, where comparing to the IEEE 802.11 MAC is about 2 and 5 times,
nodes can sense the sender’s transmission but not the receiver’s respectively, for the scenarios where the minimum of the hop-
transmission, could be reused for new senders, and the hidden counts for all flows are 3 and 5.
area, where nodes can sense the receiver’s transmission but not 2) Aggregate One-Hop Throughput: Our protocol DUCHA
the sender’s transmission, could be reused for new receivers. has much higher aggregate one-hop throughput than the IEEE
Thus the larger the source-destination distance is, the higher 802.11 MAC as shown in Fig. 8(b). This implies that DUCHA
the system capacity our protocol DUCHA could obtain than could effectively utilize much more resource of the wireless
the IEEE 802.11 MAC. ad hoc networks than IEEE 802.11 MAC does.
In fact, most of the current routing algorithms maximize The resource efficiently utilized by the flows greatly de-
the distance between the upstream node and the downstream creases in IEEE 802.11 MAC when the hop count of each flow
node when selecting a path to reduce the hop-count, the delay increases, while our protocol DUCHA maintains a relatively
and the power consumption for delivering the packets from the high resource utilization ratio for multihop flows with different
source to the destination. Our protocol DUCHA also gives a hop counts. And our protocol even efficiently utilize more
good solution to the intra-flow contention problem and could resource when the hop count for each flow increases. This
achieve optimum packet scheduling for the chain topology. implies that IEEE 802.11 MAC is not appropriate for multihop
ad hoc networks while our protocol DUCHA works well and
is scalable for larger networks where the flows have larger hop
D. Random Topology for Multihop Flows counts.
In this simulation study, 60 nodes are randomly placed in a 3) Transmission Efficiency of DATA Packets: The transmis-
1000m x 300m area. The source of each flow randomly selects sion efficiency of DATA packets in our protocol is also much
one node as the destination, which is with at least certain higher than that in the IEEE 802.11 MAC. And the longer
minimum hops away, i.e., 3 or 5 hops. And there are total the path is, the greater the improvement of the transmission
IEEE TRANSACTION ON WIRELESS COMMUNICATIONS, 2006 (TO APPEAR) 9
0.2
0.05
0 0
0 0.5 1 1.5 2 0 0.5 1 1.5 2
Total offered load (Mbps) Total ofered load (Mbps)
Transmission efficiency of DATA pkts
0.2 20
0 0
0 0.5 1 1.5 2 0 0.5 1 1.5 2
Total offered load (Mbps) Total offered load (Mbps)
efficiency is, which can be observed in Fig. 8(c). ACK (NACK) signal if necessary. Our protocol solves the
In addition, our protocol maintains relatively stable trans- hidden terminal problem, the exposed terminal problem, the
mission efficiency of DATA packets for flows with different receiver blocking problem and also the intra-flow contention
hop counts while the IEEE 802.11 MAC degrades significantly problem and has much higher spatial reuse ratio than the IEEE
when the hop count for each flow increases. The reason is that 802.11 MAC. There are no collisions for DATA packets and
our protocol DUCHA not only has no collided DATA packets, NACK signal and much less control packets and discarded
but also has much less accumulated and discarded packets at DATA packets. Our protocol uses the negative CTS (NCTS)
the intermediate nodes along the paths. This means that our to notify the sender that its intended receiver is blocked
protocol could save significant resource and lower the power and cannot receive DATA packets while IEEE 802.11 MAC
consumption to deliver the same amount of DATA packets. cannot distinguish it from unreachable destination. Thus, our
4) Normalized Control Overhead: From Fig. 8(d), we ob- protocol is more friendly to the routing layer with much less
serve that the normalized control overhead is also much less unnecessary rerouting requests by providing more accurate
in our protocol than that in the IEEE 802.11 MAC. It linearly next-hop information.
increases with the offered load for the multihop flows in the Extensive simulations show that our protocol improves the
IEEE 802.11 MAC while our protocol DUCHA maintains a throughput by 7%-20% for one hop flows and by several times
small stable value. Moreover, similar to other performance for the multihop flows when it uses the same total bandwidth
metrics, the normalized control overhead maintains a relatively as that of the IEEE 802.11 MAC. In addition, our protocol
stable value for flows with different hop counts in our protocol is scalable for large networks and maintains high resource
DUCHA while in IEEE 802.11 MAC it becomes larger and utilization ratio and stable normalized control overhead while
larger when the hop count for each flow increases. This implies the IEEE 802.11 MAC does not work well for multihop flows
that our protocol has much higher efficiency to transmit DATA under heavy traffic.
packets. And IEEE 802.11 MAC does not work well for
multihop flows especially under heavy load and will result R EFERENCES
in the “explosion” of control packets, leading to more control
[1] IEEE standard for Wireless LAN Medium Access Control (MAC) and
packets and lower throughput. Physical Layer (PHY) specifications, ISO/IEC 8802-11: 1999(E), Aug.
1999.
[2] H. Zhai, X. Chen, and Y. Fang, “How Well Can the IEEE 802.11
VI. C ONCLUSIONS Wireless LAN Support Quality of Service?” accepted for publication
This paper first identifies the sources of dramatic perfor- in IEEE Transaction on Wireless Communications, 2004.
[3] H. Zhai, Y. Kwon, and Y. Fang, “Performance Analysis of IEEE 802.11
mance degradation of IEEE 802.11 MAC in multihop ad hoc MAC Protocols in Wireless LANs,” Wiley Wireless Communications and
networks and then presents a new MAC protocol DUCHA Mobile Computing, vol. 4, p 917-931, Dec. 2004.
using dual channels, one is for control packets and the other [4] H. Zhai, J. Wang, X. Chen, and Y. Fang, “Medium Access Control
in Mobile Ad Hoc Networks: Challenges and Solutions,” accepted for
is for DATA packets. Busy tone signal is used to solve the publication in Wiley Wireless Communications and Mobile Computing,
hidden terminal problem and also used to transmit the negative Sept. 2004.
IEEE TRANSACTION ON WIRELESS COMMUNICATIONS, 2006 (TO APPEAR) 10
[5] J. Broch, D.A. Maltz, D.B. Johnson, Y. Hu, and J. Jetcheva, “A per-
formance Comparison of Multihop Wireless Ad Hoc Network Routing
Protocols,” Proc. ACM/IEEE MobiCom, Oct. 1998.
[6] C. Perkins, E.M. Royer, S.R. Das, M.K. Marina, “Performance Com-
parison of Two On-demand Routing Protocols for Ad Hoc Networks,”
IEEE Personal Communications, pp. 16-28, Feb. 2001.
[7] S. Xu and T. Safadawi, “Does the IEEE 802.11 MAC Protocol Work
Well in Multihop Wireless Ad Hoc Networks?” IEEE Communications
Magazine, pp. 130-137, June 2001.
[8] X. Chen, H. Zhai, J. Wang, and Y. Fang, “TCP Performance over Mobile
Ad Hoc Networks,” Canadian Journal of Electrical and Computer
Engineering (CJECE) (Special Issue on Advances in Wireless Commu-
nications and Networking), Vol. 29, No. 1/2, p129-134, January/April
2004.
[9] H. Zhai, X. Chen, and Y. Fang, “Alleviating Intra-flow and Inter-flow
Contentions for Reliable Service in Mobile Ad Hoc Networks,” in Proc.
IEEE MILCOM, Nov. 2004.
[10] H. Zhai, J. Wang, and Y. Fang, “Distributed Packet Scheduling for
Multihop Flows in Ad Hoc Networks,” in Proc. IEEE WCNC, March,
2004.
[11] F.A. Tobagi and L. Kleinrock, “Packet switching in radio channels: Part
II–The hidden terminal problem in carrier sense multiple-access and the
busy-tone solution,” IEEE Trans. Commun., vol. COM-23, pp. 1417-
1433, Dec. 1975.
[12] C. L. Fullmer and J.J. Garcia-Luna-Aceves, “Solutions to Hidden
Terminal Problems in Wireless Networks,” Proc. ACM SIGCOMM 97,
Sept. 1997.
[13] S.-L. Wu, C.-Y. Lin, Y.-C. Tseng, and J.-P. Sheu, “A New Multi-Channel
MAC Protocol with On-Demand Channel Assignment for Mobile Ad
Hoc Networks,” Int’l Symp. on Parallel Architectures, Algorithms and
Networks (I-SPAN), 2000.
[14] Z.J. Haas and J. Deng, “Dual Busy Tone Multiple Access (DBTMA) - A
Multiple Access Control for Ad Hoc Networks,” IEEE Trans. Commun.,
vol. 50, pp. 975-985, June 2002.
[15] Z.J. Haas and J. Deng, “Dual Busy Tone Multiple Access (DBTMA):
Performance Results,” Proc. IEEE WCNC, Sept. 1999.
[16] S. Wu, Y. Tseng and J. Sheu, “Intelligent medium access for mobile
ad hoc networks with busy tones and power control,” IEEE Journal on
Selected Areas in Communications, Vol. 18, pp. 1647 -1657, Sept. 2000.
[17] S. Singh and C. S. Raghavendra, “PAMAS - Power Aware Multi-
Access Protocol with Signalling for Ad Hoc Networks,” Computer
Communications Review, July 1998.
[18] Y. Li, H. Wu, D. Perkins, N. Tzeng, and M. Bayoumi, “MAC-SCC:
Medium Access Control with a Separate Control Channel for Multi-
hop Wireless Networks,” 23rd International Conference on Distributed
Computing Systems Workshops (ICDCSW’03), May 2003.
[19] L. Bao, J.J. Garcia-Luna-Aceves, “Distributed Channel Access Schedul-
ing for Ad Hoc Networks”, Submitted for publication inIEEE Transac-
tions on Networking.
[20] J. So and N. H. Vaidya, “A Multi-Channel MAC Protocol for Ad Hoc
Wireless Networks,” Technical Report, Jan. 2003.
[21] J. Li, C. Blake, D. S. J. De Couto, H. I. Lee and R. Morris, “Capacity
of Ad Hoc Wireless Network,” Proc. ACM MobiCom, July 2001.
[22] A. Muqattash and M. Krunz, “Power Controlled Dual Channel (PCDC)
Medium Access Protocol for Wireless Ad Hoc Networks,” Proc. IEEE
INFOCOM, March 2003.
[23] J. Monks, V. Bharghavan, and W. Hwu, “A Power Controlled Multiple
Access Protocol for Wireless Packet Networks,” Proc. IEEE INFOCOM,
April 2001.