Professional Documents
Culture Documents
Abstract— Physical carrier sensing is an effective mechanism idle otherwise. In the virtual carrier sensing, each user regards
of medium access control (MAC) protocols to reduce collisions in the channel busy during the period indicated in the MAC
wireless networks, and the size of the carrier sensing range has header of the MAC frames, such as RTS (ready to send), CTS
a great impact on the system performance. Previous studies have
shown that the MAC layer overhead plays an important role in (clear to send), DATA, and ACK (acknowledgement) defined
determining the optimal carrier sensing range. However, vari- in the IEEE 802.11 protocol.
able transmission ranges and receiver sensitivities for different The virtual carrier sensing mechanism can only notify the
channel rates and the impact of multihop forwarding have been nodes in the transmission range of the occupied medium, in
ignored. In this paper, we investigate the impacts of these factors which a transmission can be decoded correctly if the interfer-
as well as several other important factors, such as SINR (signal
to interference plus noise ratio), node topology, hidden/exposed ence level is small enough. Transmissions outside of this range
terminal problems and bidirectional handshakes, on determining can introduce enough interference to corrupt the reception in
the optimum carrier sensing range to maximize the throughput many cases. In addition, some ongoing transmissions may
through both analysis and simulations. The results show that if not be decoded correctly due to other transmissions nearby,
any one of these factors is not addressed properly, the system resulting in the failure of the virtual carrier sensing. Hence
performance may suffer a significant degradation. Furthermore,
considering both multirate capability and carrier sensing ranges, virtual carrier sensing cannot rule out collisions from inside of
we propose to use bandwidth distance product as a routing the transmission range and is incapable of avoiding collisions
metric, which improves end-to-end throughput by up to 27% from outside of the transmission range.
in the simulated scenario. Physical carrier sensing range, in which a transmission is
heard but may not be decoded correctly, can be much larger
I. I NTRODUCTION than the transmission range and hence it can be more effective
Wireless ad hoc networks have wide applications in many than the virtual carrier sensing in avoiding the interference
situations wherever wireless communication and networking especially in the multihop networks. However, large carrier
are preferred for convenience and/or low cost, such as wire- sensing range reduces spatial reuse and affects the aggregate
less mesh networks and sensor networks. In such networks, throughput because any potential transmitters, which sense
medium access control (MAC) protocol plays a key role to a busy channel, are required to keep silent. Therefore, the
coordinate the users’ access to the shared medium. The IEEE optimum carrier sensing range should balance the spatial reuse
802.11 [1] protocol is a kind of CSMA/CA (carrier sense and the impact of collisions in order to optimize the system
multiple access with collision avoidance) MAC protocols and performance.
it has been the standard of the wireless LANs. The 802.11 The IEEE 802.11 a/b/g protocols provide multiple channel
DCF (distributed coordination function) protocol has been also rates in wireless multihop ad hoc networks. Different channel
widely studied in the wireless multihop ad hoc networks due rates have different transmission ranges, requirements of SINR
to its simple implementation and distributed nature. (signal to interference plus noise ratio) and receiver sensitivity.
Carrier sensing is a fundamental mechanism in CSMA/CA Does each rate require a different optimum carrier sensing
protocols. Each user senses the channel before a transmission threshold? How can we set the carrier sensing threshold when
and defers the transmission if it senses a busy channel to multiple rates coexist? Furthermore, multiple forwardings are
reduce the collision. This mechanism consists of physical common for multihop flows and may force a significant change
carrier sensing and virtual carrier sensing. In the physical of the optimum carrier sensing threshold from the case when
carrier sensing, the channel is determined busy if the sensed only one-hop flows are considered. Higher channel rates result
signal power is larger than a carrier sensing threshold CSth or in shorter transmission delay but also have shorter ranges.
We must be careful to select the appropriate channel rate
This work was supported in part by the U.S. Office of Naval Research to maximize the system performance in terms of end-to-
under Young Investigator Award N000140210464 and by the National Science
Foundation under Faculty Early Career Development Award ANI-0093241 and end delay/throughput and power consumption, which are all
under grant DBI-0529012. important performance metrics for multihop flows. To optimize
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the Proceedings IEEE Infocom.
D3 3.2 15
N3 N2 D2 ( − d c 2 , 3d c 2) ( dc 2 , 3dc 2)
N3 N2 3 10
SINR (dB)
2.8
X
5
( dt cos α , d t sin α ) 2.6
D4 D0 D1 D0
N1( d c , 0) 2.4 0
α
N4 N0
N1 N4( − d c , 0) N0(0, 0)
2.2 -5
2 3 γ 4 5 2 3 γ 4 5
D5 D6
5 25
Tcs (dB)
3
15
2
Fig. 1. Interference model 10
1
0 5
2 3 γ 4 5 2 3 γ 4 5
where γ is the path loss exponent and typically 2 ≤ γ ≤ 5. Fig. 2. Carrier sensing threshold with Shanon Capacity
SINR is equal to
P0 1
SIN R = 6 = γ (3) In the following subsections, we will discuss how to select X
i=1 Pi + PN 6 d0
+ PN
to maximize the aggregate throughput using Shannon Capacity
i=1 di P0
and the 802.11 data rates, respectively.
where PN is the noise level and normally it is much less than
Once X is determined, CSth can be set as the power
the power level of the closest interference. It can be shown
level sensed at distance dc to guarantee any new concurrent
that when α is in the range [0, π/6], SINR is an increasing
transmission happens at least dc away. Let Tcs denote the ratio
function of α when γ ≥ 2. Since we consider the worst case,
of RXth to CSth :
SINR should be calculated at α = 0 and d0 = dt , i.e.,
1 1 1 2 RXth
SIN R = (X−1)γ + (X+1)γ + √ 2 γ2 Tcs = = Xγ (8)
( X2 −1)
2
+ 3X CSth
2
2 (4) B. Maximum Throughput and Optimum Carrier Sensing
+ √ 2 γ2 + PPN0
( X
2 +1)
2
+ 3X
2
Range under Shannon Capacity
Using Shannon Capacity formula, the achievable channel
Given a requirement of SINR for a coding/modulation
rate rc can be obtained given a certain SINR and a bandwidth
scheme and the corresponding achievable channel rate rc (bps),
W (hz):
X is determined. The achievable data rate rd (bps) equals
rc = W log2 (1 + SIN R) (9)
Lpl
rd = LH +Lpl
(5) 1 Lpl
Tpreamble + S∝ (10)
rc d2t X 2 Tpreamble + LH +Lpl
W log2 (1+SIN R)
where Tpreamble in seconds is a preamble of a packet regard-
less of the channel rate, such as the physical layer preamble Thus
for synchronization purpose at the receiver and the short Tpreamble X 2 X2
interframe spacing SIF S at the MAC layer. LH consists of arg max S = arg min +
X X LH + Lpl W log2 (1 + SIN R)
protocol overheads in bits from different protocol layers, such (11)
as MAC and IP layers, and Lpl is the size of the payload in When X is small, log2 (1 + SIN R) increases along with X
bits we wish to transmit. and is faster than X 2 . When X is large, log2 (1 + SIN R)
To calculate the maximum aggregate throughput, we need increases along with X and is slower than X 2 . Thus there is an
to know the total number of concurrent transmissions. For a optimum value of X to maximize S. By letting the derivation
topology with an area of A and with concurrently transmitting of Equation (11) with respect to X equal 0, the optimum value
pairs as shown in Fig. 1, each transmit-receive
√ pair occupies of X can be solved given values of Tpreamble , LH and Lpl .
a nonoverlapping area of A0 = 23 d2c by ignoring the border The results are shown in Fig. 2 at Tpreamble = 0 and LH = 0.
effect. For a general topology, A0 is proportional to d2c . Thus When Tpreamble > 0 and LH > 0, X and Tcs could be
the total number of allowed concurrent transmissions is smaller. We are not going to further discuss the impact of these
A 1 1 protocol overheads on the carrier sensing range under Shannon
∝ 2 = 2 2 (6)
A0 dc dt X Capacity. However, as we will discuss below, when the discrete
Thus the aggregate throughput S is proportional to data rates of the standard IEEE 802.11 are considered, the
requirement of SIN R, other than these protocol overheads,
rd 1 Lpl plays the major role to determine the optimum carrier sensing
S∝ = 2 2 (7)
d2t X 2 dt X Tpreamble + LH +Lpl
range.
rc
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the Proceedings IEEE Infocom.
TABLE I 40 40
SINR (dB)
S IGNAL - TO - NOISE RATIO AND RECEIVER SENSITIVITY 24.56
30
18.80 30
Tcs (dB)
Rates (Mbps) SINR (dB) Receiver sensitivity (dBm) 20 10.79
X
54 24.56 -65 6.02
20
48 24.05 -66 10
36 18.80 -70
0 10
24 17.04 -74 2 3 4 5 2 3 4 5
γ γ
18 10.79 -77
12 9.03 -79 -94 1.4
CS thresh (dBm)
-96
6 6.02 -82 1.2
-98
1
30 40 -100
γ=2
γ=3 30 -102 0.8
20 γ=4 2 3 4 5 2 3 4 5
Tcs (dB)
γ γ
γ=5 20
X
0 0
-3 0 10 20 30 -3 0 10 20 30
SINR (dB) SINR (dB) We define a normalized maximum carrier sensing distance as
the ratio of dc (i) to dc (6), representing the relative size of
Fig. 3. Carrier sensing threshold with different SINR
the optimum carrier sensing range at different channel rates to
that at 6M bps, and
1
C. Maximum Throughput and Optimum Carrier Sensing dc (i) CSth (i) γ
Range under the Discrete Channel Rates of the IEEE 802.11 = (13)
dc (6) CSth (6)
For a certain channel rate rc , there is a requirement of By setting RXth with the value of the receiver sensitivity,
SINR. For example, Table I shows the requirements of SINR (i)
we plot CSth and ddcc(6) in Fig. 4. We can observe that although
of some products for different channel rates [16]. Given the the optimum value of X has a big difference at different
SINR, we can derive the value of X according to Equation channel rates, the carrier sensing threshold and the carrier
(4). Smaller X violates the requirement of SINR and larger sensing range does not have much difference for different
X decreases the spatial reuse and the aggregate throughput. channel rates and the difference ranges from 0 to 2 dB.
Thus, by Equation (7), the protocol overheads Tpreamble and
LH do not impact the optimum value of X. D. Impact of Random Topology
The optimum value of X and Tcs for different SINR are The optimum carrier sensing threshold discussed above only
given in Fig. 3. We also illustrate in Fig. 4 the optimum considers a special case, i.e., nodes are always available at
carrier sensing range for 4 discrete channel rates 6, 18, 36, the desired location whenever they are needed to make it
and 54Mbps with the requirement of SINR in Table I. From possible for the scheduled transmissions in Fig. 1. However,
the figure, we can observe that the larger the SINR requirement the situation rarely happens in practice. First, in a random
is, the larger X is. X changes in a large range for different topology, the possibility that the nodes are located at the
values of SIN R and so does Tcs . desired places is small. Second, even it happens, the chance
Fortunately, this does not mean that the optimum carrier is still small for all of them successfully contend for the
sensing range changes in a large range because the trans- channel for concurrent transmissions. Therefore, considering 6
mission range and RXth also change in a large range for concurrent interference nodes is too conservative to maximize
different channel rates. Table I shows the requirements of the spatial reuse in random topology.
receiver sensitivity of the same product for different channel Another extreme is to only consider one possibly nearest
rates. RXth should be larger than or equal to the requirement interference node, like node N1 to the transmit-receive pair N0
of receiver sensitivity. This actually represents a common and D0 in Fig. 1. The nearest interference distance is dc − dt ,
knowledge that higher channel rates sustains in a smaller range and let X , CSth
and Tcs denote the corresponding X, CSth
for the 802.11 products. The optimum value of carrier sensing and Tcs , respectively. We have
threshold CSth can be obtained according to the given RXth γ
dc − dt
and the corresponding optimum value of Tcs for a certain SIN R = = (X − 1)γ (14)
channel rate by the following equation, dt
Given the requirements of SIN R, we can use the same
RXth
CSth = (12) method as that in Section II-C to derive the carrier sensing
Tcs
threshold CSth for different channel rates. We have X <
Let i ∈ {6, 18, 36, 54} denote the index of dc (i) and X, CSth > CSth and Tcs < Tcs . CSth can be 1 to 6
CSth (i) at channel rate 6, 18, 36, and 54M bps, respectively. dB higher than CSth . The corresponding maximum carrier
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the Proceedings IEEE Infocom.
channel rate requires a smaller X and hence a larger exposed-
area ratio. And even for the highest channel rate 54M bps
allowed in 802.11a/g, the exposed-area ratio cannot be ignored
D
Xdt C when γ > 3 because δ = 24% and 56% when X = 10
( X − 1) dt
C and 5, respectively. Let alone that we have not considered
A B a worse case but a common situation in a random topology
A B where the distance between the transmitter and its intended
receiver is less than the maximum transmission distance dt .
The interference range should be smaller because the received
signal has a greater power. Therefore, the exposed terminal
(a) (b) problem cannot be ignored.
Therefore, to alleviate the exposed terminal problem and
Fig. 5. Tradeoff between exposed terminal problem and hidden terminal
problem increase the spatial reuse, it is necessary to decrease the
carrier sensing range. However, this may expose a part of
the interference range out of the carrier sensing range and
sensing distance is 50% to 94%, and the area of carrier sensing results in hidden terminal problem. The smaller the carrier
range is 25% to 89% of the original values depending on the sensing range, the less the exposed terminal problem and the
values of path loss exponent γ and channel rate rc . Thus a more severe the hidden terminal problem. Apparently, there
higher carrier sensing threshold CSth may greatly increase is a tradeoff between the exposed terminal problem and the
the spatial reuse without introducing severe collisions. hidden terminal problem in order to increase spatial reuse and
alleviate the collisions at the same time.
E. Tradeoff between Exposed Terminal Problem and the Hid-
den Terminals Problem F. Carrier Sensing Range and Strategies for Bidirectional
In the analysis of Section II-B and II-C, we have considered Handshakes
all the interference at the worst case to calculate X and CSth . The interference model discussed in Section II focuses
There will be almost no hidden terminal problems, because all on one-way DATA transmissions. However, wireless links
interference nodes which may contribute enough interference are not reliable due to collisions, wireless channel errors
to corrupt the received packets fall in the carrier sensing range and mobility. MAC layer acknowledgements are necessary
and are required to defer their own transmissions. Notice that to check the link reliability and in most cases, link layer
the physical carrier sensing does not completely solve the retransmissions are more efficient than end-to-end retrans-
hidden terminal problem. For example in Fig. 5(b), there is missions for such unreliable links. Besides, the bidirectional
an obstruct between node A and C. C may not be able to handshake has already been adopted by the IEEE 802.11 MAC
sense the transmission of A and hence may initiate a new protocols which define a two-way DATA/ACK handshake and
transmission, resulting in a collision at node B. a four-way RTS/CTS/DATA/ACK handshake for each data
As we have indicated in the previous subsection that this packet transmission. Therefore, the receivers may also transmit
carrier sensing threshold may be too conservative. Here, we CTS/ACK and the interference at node D0 in Fig. 1 becomes
point out another reason that the large carrier sensing range worse, hence the original interference model in Equation (3)
impacts the spatial reuse. As shown in Fig. 5(a), node C’s is not always effective to avoid the collisions.
transmission to D will not introduce enough interference to When bidirectional handshakes are considered, the follow-
corrupt B’s reception. However, node C senses A’s transmis- ing three problems have not been well addressed in that
sion and defers its own transmission. This results in poor interference model. The first problem is the packet colli-
spatial reuse and is commonly called the exposed terminal sion. The second one is the receiver blocking problem [17],
problem. [18]. This problem describes the situation that the transmitter
From the point of view of the intended receiver B in Fig. keeps (re)transmitting RTS or DATA frames when the in-
5(a), we call the range as the interference range of B, in which tended receiver senses a busy channel due to other ongoing
any point has a closer distance to B than (X − 1)dt . Any transmissions and does not or cannot respond with CTS or
single interference node out of this range may not corrupt ACK frames. After the retransmission times exceeds a certain
B’s received packet from A. To measure the impact of the threshold [1], the transmitter will drop the data packet, declare
exposed terminal problem, we define an exposed-area ratio the link failure and hence route repair will be executed. We call
δ as the ratio of the area of carrier sensing range to that of this receiver as a blocked receiver. The third one is unfairness
interference range minus 1 and resulting from the previous two problems.
2 These problems are related with the carrier sensing strate-
π(Xdt )2 X
δ= − 1 = −1 (15) gies. There are largely two carrier sensing strategies in the
π((X − 1)dt )2 X −1 IEEE 802.11. The strategy I is to forbid a node from trans-
It is easy to show that δ decreases from 3 to 0.05 when X mitting if it senses a busy channel. The strategy II is to
increases from 2 to 40. From Fig. 4, we know that a smaller allow a node to transmit at any situations even if it senses
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the Proceedings IEEE Infocom.
C
a busy channel. In the 802.11, the first strategy is adopted for D
transmissions of RTS, DATA and CTS frames. The second one
is adopted for transmissions of ACK frames to acknowledge
the successfully transmitted DATA frames. Xdt
( X −1)dt
We use a simple topology to illustrate these problems, i.e., A B F E
the linear topology A—— B · · · · · · C —— D. We first discuss ( X +1)dt
the packet collision problem. Suppose D cannot sense A’s
transmission and is out of B’s interference range. However,
C is close enough to B so that C(or B)’s transmission will
corrupt B(or C)’s reception. When A is transmitting to B, D Fig. 6. Large carrier sensing range with carrier sensing strategy II for
may initiate a transmission to C. And it is the same for A CTS/ACK
when D is transmitting to C. If one or both of A and D are
transmitting DATA frames, B or C, which first finishes the
reception of the DATA frame, will return an ACK frame which -3dB:
does not require carrier sensing beforehand and will corrupt ∼
X =X +1 (17)
the reception at the other. To alleviate this problem, we may
propose to use the short frames RTS/CTS before DATA/ACK For example in the previous four-node topology, the two
since CTS requires carrier sensing beforehand. However, the receivers B and C are thus far enough from each other and
carrier sensing strategy of CTS frames makes the receiver the ACK frames cannot corrupt each other’s reception. Second,
blocking problem worse. when RTS/CTS are used, using the carrier sensing strategy II
for CTS/DATA/ACK frames to address the receiver blocking
The receiver blocking problem exists when the intended
problem and RTS still adopts the carrier sensing strategy I.
receiver does not return an ACK frame due to a collision.
For example in the same topology as before, B is far enough
It also exists for the carrier sensing strategy I even when the
from the transmitting node C and can correctly decode a RTS
intended receiver can correctly decode the received packet but
or DATA frame from A. Moreover, it does not prevent from
could not respond due to the carrier sense rule. For example
returning a CTS or ACK frame. The new carrier sensing range
in the previous topology, suppose that A and C are out of
is shown in Fig. 6.
each other’s sensing range, and B and C are out of each
Apparently, the cost is to aggravate the exposed terminal
other’s interference range and cannot corrupt each other’s
problem and sacrifice the spatial reuse in a more general
received packets. However, B and C can sense each other’s
topology. However, the packet collision and dropping due to
transmission. When C is transmitting a long DATA frame to
hidden terminals and blocked receivers have been significantly
D, A may initiate a transmission to B by a RTS frame. Since
improved. Moreover we expect a more stable performance for
B senses a busy channel, it does not return a CTS frame so
higher layer protocols, such as much less retransmission and
that A keeps retransmitting the RTS frame. A also doubles its
timeouts for TCP traffic, and much less false link failures
contention window size for each failure of RTS transmission
and unnecessary rerouting activities, and the unfairness due
and has lower channel access probability. If C has a lot of data
to these two problems can also be greatly alleviated.
packets destined to D and occupies the channel for a long time,
Other problems for the large carrier sensing range are as
A will be starved. Apparently this is unfair to A due to the
follows. First, it requires a small sensing threshold. We do not
MAC contention.
know the achievable carrier sensing sensitivity of the current
To alleviate these problems as much as possible for the bidi- products. In the following studies, we assume that the current
rectional handshakes, it is necessary to be more conservative products or future technologies could support the small carrier
to set the carrier sensing range than the interference model sensing threshold, i.e., Tlcs times more sensitive than the
in Fig. 1 especially for the interference model at the worst original value. The new value of Tcs is T cs and equals
case. First, to address the packet collision problem, we need
to consider the interferences from node Di (1 ≤ i ≤ 6) which
X
can be at most dt closer to D0 than Ni . Denote the new value T
cs = Tcs /Tlcs , Tlcs = ( )γ (18)
X
of X as X. Following the similar procedures in Section II-A,
When γ = 3, Tlcs = 5.28, 3.75 and 2.91dB for X = 2, 3 and
the SINR at the worst case satisfies
4, respectively. Second, the larger carrier sensing range means
1 1 1 2 that there may exist more nodes contending for the shared
= + +
2 √
γ
(X−2
) γ
γ
SIN R X 2 channel. The collision probability like that in wireless LANs
3X
X
2 −1 + 2 −1
increases with the number of active nodes [19], [20].
2
+
2 √ 2
γ + PN
P0 To address the collision problem in one carrier sensing
3X
2 +1 + −1
X
2 range, there are already several methods. First, four-way
(16) handshake instead of two-way handshake could be used to
can be well approximated
The numerical results show that X reduce the long collision periods of DATA frame transmissions
by X + 1 with less than 1% error when SINR is larger than if the collision probability is high and the DATA frame is
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the Proceedings IEEE Infocom.
long. Second, some schemes [21]–[26] controlling the traffic
delivered to the MAC layer according to the channel status can
be used to efficiently reduce the collision probability. Third,
we can maintain the value of X but reduce both the carrier D
sensing range and transmission range in order to reduce the A C
B
node density in each carrier sensing range.
G. Optimum Carrier Sensing Range
In short, large carrier sensing range with appropriate sensing
strategies for different MAC frames can efficiently address
the hidden terminal problem and receiver blocking problem Fig. 7. Multiple carrier sensing thresholds may result in collisions
but aggravate the exposed terminal problem and decrease the
spatial reuse. The optimum carrier sensing range with a radius
d∗c = X ∗ dt must balance the impact of both collisions and Fig. 7, a transmit-receive pair A and B, which have a large
spatial reuse, where carrier sensing range corresponding to a certain channel rate,
senses an idle channel and then A transmits the DATA frames.
= µ(X + 1)(0 < µ ≤ 1)
X ∗ = µX (19) During the transmission period, another transmitter C in the
previous transmitter’s sensing range also senses an idle channel
Simulation studies with considerations of all previously afore-
due to a smaller carrier sensing range. The new transmission
mentioned factors will be conducted in Section IV to identify
from C may introduce a collision at the previous intended
the optimum value of carrier sensing threshold.
receiver B.
III. U TILIZE M ULTIRATE C APABILITY OF 802.11 IN With a common carrier sensing threshold, the receive thresh-
W IRELESS M ULTIHOP A D H OC N ETWORKS old RXth must be set appropriately. First, RXth must be
In this section, we study the impact of multihop forwarding larger than or equal to the receiver sensitivity RXse required
on the optimum carrier sensing threshold as well as how to by the adopted channel rate. Second, to alleviate collisions as
maximize the spatial reuse ratio for multihop flows when much as possible, one more requirement may be enforced, i.e.,
multiple rates coexist in wireless multihop ad hoc networks. the power level of the received signal must be larger than or
Different from the previous section where the objective is equal to CSth Tcs . According to these two requirements, we
∗
to maximize the aggregate one-hop throughput, the end-to- can set the common carrier sensing threshold CSth as
end performance in terms of delay, throughput and energy ∗
CSth = max RX se (i)
Tcs (i) (20)
consumption of multihop flows deserves more attention. We ∗
first discuss how to set the carrier sensing threshold for a RXth (i) = CSth Tcs (i) ≥ RXse (i)
multirate wireless ad hoc networks. Then we study the impact where i is the index of different channel rates.
of different channel rates on the end-to-end performance.
According to the analysis and the carrier sensing model in B. How to Choose Next hops, Channel Rates and Set the
the previous section, the optimum end-to-end throughput and Carrier Sensing Threshold for Multihop Flows
the corresponding carrier sensing threshold are derived for a For a single hop network like a wireless LAN, it seems
multihop flow. Finally we propose to utilize the bandwidth simple to maximize the end-to-end throughput and minimize
distance product as a metric to determine the forwarding nodes the end-to-end delay for a flow. The solution is just to use
of multihop flows to maximize the spatial reuse ratio when the highest achievable channel rate between the source and
multiple rates coexist. the destination. However, if there exist some users far away
from the access point or their intended receivers, only very
A. How to Set the Carrier Sensing Threshold for Multirate low channel rates are available. Deploying a relay access
802.11 MAC protocol point at an appropriate place or utilizing another user as a
In this paper, we argue that the multirate 802.11 MAC forwarding node can utilize higher channel rates over multiple
protocol should adopt a single carrier sensing threshold for hops instead of a low channel rate over one single hop and
all channel rates for three reasons. First, a single carrier hence may achieve much better performance.
sensing threshold keeps the Physical/MAC protocols simple. In wireless multihop ad hoc networks, destinations are
The achievable channel rate is subject to distance, mobility and often out of the sources’ transmission range and packets need
channel fading and is time variable. Hence multiple carrier to be forwarded through multiple hops before reaching the
sensing thresholds for different channel rates may greatly destinations. Selecting the next hop with the highest channel
increase the complexity of the protocols. Second, as discussed rate can increase the throughput at each hop. However, packets
above, the optimum carrier sensing thresholds do not change must travel through more hops due to the short transmission
much for different channel rates. A single threshold will not range of high channel rates and hence the end-to-end delay
sacrifice the performance much. Third, multiple carrier sensing and throughput are not necessarily improved. To determine
thresholds may introduce additional collisions. For example in the best candidate of the next hop, it is necessary to introduce
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the Proceedings IEEE Infocom.
5000
a metric consisting of information of both channel rates and 54Mbps rd=rc
hop distances. 4000 rd(1000bytes)
18Mbps 11Mbps
BDiP (Mbps X m)
1) End-to-end transmission delay and energy efficiency 3000
Suppose there is a perfect packet scheduling algorithm. 6Mbps
Queueing delay is equal to zero and the MAC layer backoff pe- 2000
riod is also decreased to a minimum value and can be ignored.
Thus the end-to-end delay te2e is equal to the summation of 1000 1Mbps
transmission delay th at all hops.
0
te2e = th (i) (21) 0 100 200 300 400
Hop distance (m)
500 600 700
i ∈ {all hops}
Fig. 8. Bandwidth distance product
where i is the index of hops along the path. And the hop
transmission delay th is 3
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the Proceedings IEEE Infocom.
20 20
channel in wireless networks. We must consider channel rate, γ=2
transmission distance at each hop as well as the carrier sensing γ=2
16 16 γ=3
γ=3
range and spatial reuse. γ=4
γ=4
12 12 γ=5
To maximize the end-to-end throughput of a multihop flow, γ=5
X'
X
it is necessary to maximize the spatial reuse along the path, i.e., 8 8
to schedule as many concurrent transmissions at different hops
as possible. There are two requirements to schedule successful 4 4
concurrent transmissions. First, two neighboring transmitters
0 0
along the path must be at least dc away from each other 0 10 20 30 0 10 20 30
(a) SINR (dB) (b) SINR (dB)
so that there is only one transmitter in each carrier sensing
range to satisfy the carrier sensing requirement. Second, the Fig. 10. Spatial reuse ratio for multihop flows (a) at worst case, (b) in a
concurrent transmissions at upstream and downstream nodes single chain topology with one way traffic
cannot introduce enough interference to corrupt the reception
at the considered transmit-receive pair.
Let N1 denote the spatial reuse ratio of a multihop flow the interference model used in Equation (16) for the worst
where N is the hop distance between two nearest concurrent case with bidirectional handshakes, and
and successful transmissions along the path, and
dc dt , (dh ≤ dt )
N ≤ X (30)
N ≥ (28) dh
dh
rd
where x is the ceiling function of x and is equal to Smax ≥ , (dh ≤ dt ) (31)
X ddht
the nearest integer greater than or equal to x. Thus, for a
chain topology with a common distance dh at each hop, the If all hop distances equal the same value or the hop distances
maximum end-to-end throughput for a multihop flow with at are set as dh , these two equations can be simplified as
least N hops is
rd rd N ≤ X and Smax ≥ rd , and rd is the maximum
X
X
Smax = ≤ dc (29)
N dh achievable end-to-end throughput for a multihop flow with at
hops under the used interference model. Thus, X
least X
because there can be only one successful transmission in each can represent the spatial reuse ratio for multihop flows.
N hops and hence the spatial reuse ratio for the chain topology Generally, there are less interferences than the worst case.
is N1 . For a regular chain topology with a common hop distance, if
The equality in the above two inequalities holds only we only consider the interference from one nearest upstream
when the carrier sensing range is set to satisfy the second transmission and one nearest downstream transmission, and let
requirement discussed above. That is to say, there should be denote the value of X,
X Equation (16) becomes
no hidden terminal problem or receiver blocking problem as
discussed in Section II-F due to the transmission at N hops
1 1 γ + 1 γ + PPN (one way traffic)
= (X −1) X 0
(32)
away along the path. This maximum end-to-end throughput 1 1
SIN R X γ + γ +
PN
is shown in Fig. 9, where we suppose dc = 1400m is ( −2)
X P0 (two way traffic)
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the Proceedings IEEE Infocom.
Therefore the achievable maximum end-to-end throughput of forwarding nodes to optimize the performance in a multirate
a multihop flow is rd
when dh = dt . Notice that X may network.
X
not be the optimum value of X that should satisfy X ≤ X in
A. ns2 extensions and simulation setup
a general topology, and depends on many factors as we have
discussed in Section II. We have developed several important extensions to ns2 to
and X along with different require- obtain more accurate results. First, the interferences are added
Fig. 10 shows both X
up instead of checking them one by one when determining
ment of SINR. When SINR = 10dB and γ = 4(for distant
the SINR. Second, the incoming signal is regarded decodable
field) which are the default settings in ns2, the spatial reuse
even when the node senses a busy channel at time instant
ratio is 13 and hence the maximum end-to-end throughput
of the first bit of the incoming frame if the SINR is high
is 13 of the bandwidth for a chain topology with at least 3
enough. Originally, ns2 only considers the capture effect when
hops. This is larger than the findings in [2] and [5] which
the interference comes after the intended signal. Third, ns2
shows the spatial reuse ratio is 14 . There are two reasons for
is extended to support multiple channel rates, i.e., the MAC
the throughput loss. First, these papers study the four-way
layer has the appropriate settings of a SINR requirement, a
handshake RTS/CTS/DATA/ACK and the throughput suffers
receiver threshold and a transmission range for each channel
from the receiver blocking problem as we discussed in Section
rate. Fourth, the extensions provide an option not to sense
II-F. Second, these papers use ns2 for simulation studies and
the channel before sending a CTS or a DATA frame to a
a MAC frame is discarded if there is already an interference
correctly received RTS or CTS frame when RTS/CTS are used.
when receiving the first bit of the frame even when SINR
Originally, ns2 discards a successfully received RTS frame if
is high enough in the current version of ns2. Fig. 10 also
the channel is sensed busy. We denote this option as CSSII
shows that larger γ can achieve better spatial reuse ratio and
(carrier sensing strategy II as discussed in Section II-F) in the
hence higher end-to-end throughput because the interference
following subsections.
vanishes more quickly along with the distance. However, larger
γ results in shorter transmission distance, and hence requires We adopt the requirements of SINR and receiver sensitiv-
more forwardings and consumes more energy for each packet ities in Table I unless otherwise indicated, and the receiver
to reach the destination. threshold is set as the value of the corresponding receiver
sensitivity for each channel rate. The default two ray ground
Furthermore, Smax in the above equations only consider
propagation model in ns2 is used, i.e., the path loss exponent
multihop flows with at least N hops. For a multihop flow
γ = 2 when the distance is less than 86m and γ = 4
with fewer hops, we have
otherwise, and the transmit power is set as 6dBm. The
rd
Smax = (nh ≤ N ) (34) transmission ranges are hence determined. In the simulations,
nh the channel rates 54, 36, 18, and 6Mbps are studied, and their
where nh is the number of hops of the multihop flow. transmission radii are 89, 119, 178, and 238m, respectively.
In short, to maximize the end-to-end throughput of a mul- The IEEE 802.11a [30] protocol parameters are adopted in the
tihop flow, it is necessary to select a node with the highest simulations.
value of rNd as the downstream forwarding node if other
conditions are the same. The optimum value of N depends B. Optimum carrier sensing range
on the locations of interfering transmitters and hence is not In this subsection, we try to identify the optimum carrier
easy to calculate for an irregular topology. However, we know sensing range. In the simulations, there are total 150 nodes
that the optimum value of carrier sensing distance dc = Xdt randomly distributed in a 1000m × 1000m topology.
for different channel rates does not have much difference. First we identify the optimum carrier sensing threshold
From Equation (33), we can see that Smax is approximately CSth for one-hop flows. In the simulation, each node ran-
proportionally to the bandwidth distance product BDiP = domly selects one neighbor as the destination of one TCP
rd dh . Thus BDiP can be utilized to approximately represent connection. Notice that the neighborhood is smaller for a
the efficiency of throughput, delay and energy consumption higher channel rate due to its smaller transmission range. Fig.
at each hop. We will evaluate the efficiency of this metric 11 shows that the aggregate throughput achieves the maximum
to maximize the end-to-end throughput and compare it with value when CSth is in the range of [61, 76]dBm for all channel
the shortest hop algorithm for a multirate network through rates. However, such CSth is even less than RXth for several
simulations in next section. channel rates. Apparently, it starves the flows whose source
destination distance is close to the transmission radius as found
IV. S IMULATION S TUDIES from the more detailed simulation results.
In this section, we conduct ns2 simulations to study the We also identify the optimum carrier sensing threshold
impact of carrier sensing range on the system performance CSth if multihop flows exist. In the simulation, there are
and to identify the optimum carrier sensing range. We also total 20 TCP connections. The sources and the destinations
illustrate that how the carrier sensing range and spatial reuse are randomly selected under the condition that the distance
impact the maximum throughput of multihop flows and how between the source and the destination ranges from 500 to
the bandwidth distance product is used as a metric to select the 600m. The distance condition is used instead of the hop
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the Proceedings IEEE Infocom.
200
Aggregate throughput (Mbps) 6Mbps distance and the channel data rate is 6Mbps. The maximum
18Mbps throughput is found by gradually increasing the carrier sensing
150 36Mbps
54Mbps
threshold and the rate of CBR traffic from the source. As
long as 12dB < RX CSth < 19dB, i.e., 2 < X < 3, the
th
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the Proceedings IEEE Infocom.
V. C ONCLUSIONS [12] Z. Li, S. Nandi, and A. K. Gupta, “Improving MAC performance in
wireless ad hoc networks using enhanced carrier sensing (ECS),” in
In this paper, we analyze the impact of several important Third IFIP Networking, 2004.
factors on the optimum carrier sensing threshold in the mul- [13] J. Deng, B. Liang, and P. K. Varshney, “Tuning the carrier sensing range
tirate and multihop wireless ad hoc networks. Several key of IEEE 802.11 MAC,” in Proc. IEEE GLOBECOM, Dec. 2004.
[14] J. Zhu, X. Guo, L. L. Yang, and W. S. Conner, “Leveraging spatial
observations are listed as follows: reuse in 802.11 mesh networks with enhanced physical carrier sensing,”
• Multihop property must be considered to decide the in Proc. IEEE ICC, June 2004.
[15] X. Yang and N. H. Vaidya, “On the physical carrier sense in wireless
optimum carrier sensing threshold. The optimum carrier ad hoc networks,” in Proc. IEEE Infocom, March 2005.
sensing threshold for one-hop flows does not work for [16] J. Yee and H. Pezeshki-Esfahani, “Understanding wireless LAN perfor-
multihop flows. mance trade-offs.” CommsDesign.com, Nov. 2002.
[17] H. Zhai, J. Wang, Y. Fang, and D. Wu, “A dual-channel MAC protocol
• Different channel rates have similar optimal carrier sens-
for mobile ad hoc networks,” in IEEE Workshop on Wireless Ad Hoc
ing thresholds. Therefore, a single carrier sensing thresh- and Sensor Networks, in conjuction with IEEE Globecom 2004, Nov.
old for different rates could be efficient as well as simple. 2004.
[18] H. Zhai, J. Wang, and Y. Fang, “Ducha: A dual-channel MAC protocol
• Higher channel data rate does not necessarily generate
for mobile ad hoc networks,” to appear in IEEE Transactions on Wireless
higher throughput. We need to be careful to utilize the Communications, 2005.
multirate capability. [19] H. Zhai, Y. Kwon, and Y. Fang, “Performance analysis of IEEE
802.11 MAC protocols in wireless LANs,” Wireless Communications
• Shortest hop routing algorithm is not appropriate for
and Mobile Computing,, vol. 4, pp. 917–931, 2004.
multirate and multihop wireless ad hoc networks. Simula- [20] H. Zhai and Y. Fang, “Performance of wireless LANs based on IEEE
tion results show that the algorithms Ard (first consider 802.11 MAC protocols,” in Proc. of IEEE International Symposium
on Personal, Indoor and Mobile Radio Communications (PIMRC’03),
the rate, then the distance) and ABDiP (maximize the September 2003.
bandwidth distance product) can improve the throughput [21] H. Zhai, X. Chen, and Y. Fang, “A call admission and rate control
by 14% and 27%, respectively. Hence, the results demon- scheme for multimedia support over IEEE 802.11 wireless LANs,” to
appear in ACM Wireless Networks, 2005.
strate that bandwidth distance product could be a good [22] ——, “A call admission and rate control scheme for multimedia support
routing metric in multirate ad hoc networks. over IEEE 802.11 wireless LANs,” in Proc. of The First International
• Maximum end-to-end throughput is derived for a mul- Conference on Quality of Service in Heterogeneous Wired/Wireless
Networks (QShine’04), Oct. 2004.
tihop flow under a certain requirement of SINR. The [23] ——, “How well can the IEEE 802.11 wireless LAN support quality
maximum throughput can be achieved only when the of service?” IEEE Transaction on Wireless Communications, vol. 4, pp.
carrier sensing threshold is appropriately set. Current 3084–3094, 2005.
[24] X. Chen, H. Zhai, X. Tian, and Y. Fang, “Supporting QoS in IEEE
ns2 version fails to do so. Several ns2 extensions have 802.11e wireless LANs,” to appear in ACM Wireless Networks, 2005.
been developed to achieve the maximum throughput. For [25] X. Chen, H. Zhai, and Y. Fang, “Enhancing the IEEE 802.11e in QoS
example, the maximum spatial reuse ratio of a multihop support: analysis and mechanisms,” in Proc, of The Second International
Conference on Quality of Service in Heterogeneous Wired/ Wireless
flow is 13 instead of 14 for the 10dB SINR requirement. Networks (QShine05), Aug. 2005.
[26] H. Zhai, J. Wang, and Y. Fang, “Providing statistical QoS guarantee
R EFERENCES for voice over ip in the IEEE 802.11 wireless LANs,” IEEE Wireless
[1] IEEE standard for wireless LAN medium access control (MAC) and Communication Magazine (Special Issue on Voice over Wireless Local
physical layer (PHY) specifications, ISO/IEC 802-11: 1999(E), Aug. Area Network), 2006.
1999. [27] Cisco aironet 802.11a/b/g wireless LAN client adapters (CB21AG and
[2] J. Li, C. Blake, D. S. J. De Couto, H. I. Lee, and R. Morris, “Capacity PI21AG) installation and configuration guide. Cisco Systems, Inc.,
of ad hoc wireless networks,” in Proc. ACM MobiCom, July 2001. 2004.
[3] X. Chen, H. Zhai, J. Wang, and Y. Fang, “TCP performance over [28] IEEE standard for wireless LAN medium access control (MAC) and
mobile ad hoc networks,” Canadian Journal of Electrical and Computer physical layer (PHY) specifications, IEEE Std 802-11b-1999, Sept. 1999.
Engineering (CJECE) (Special Issue on Advances in Wireless Commu- [29] IEEE standard for wireless LAN medium access control (MAC) and
nications and Networking), vol. 29, pp. 129–134, 2004. physical layer (PHY) specifications, IEEE Std 802-11g-2003, June 2003.
[4] H. Zhai, X. Chen, and Y. Fang, “Rate-based transport control for mobile [30] IEEE standard for wireless LAN medium access control (MAC) and
ad hoc networks,” in Proc. of IEEE Wireless Communications and physical layer (PHY) specifications, IEEE Std 802-11a-1999, 1999.
Networking Conference (WCNC’05), March 2005.
[5] H. Zhai, J. Wang, and Y. Fang, “Distributed packet scheduling for
multihop flows in ad hoc networks,” in Proc. IEEE WCNC, March 2004.
[6] H. Zhai, X. Chen, and Y. Fang, “Alleviating intra-flow and inter-flow
contentions for reliable service in mobile ad hoc networks,” in Proc. of
IEEE Military Communications Conference (Milcom’04), Nov. 2004.
[7] K. Xu, M. Gerla, and S. Bae, “How effective is the IEEE 802.11
RTS/CTS handshake in ad hoc networks?” in Proc. IEEE GlobeCom,
2002.
[8] P. Gupta and P. R. Kumar, “The capacity of wireless networks,” IEEE
Transactions on Information Theory, vol. 46, pp. 388–404, 2000.
[9] R. Hekmat and P. V. Mieghem, “Interference in wireless multi-hop
ad-hoc networks and its effect on network capacity,” in Med-hoc-Net,
September 2002.
[10] X. Guo, S. Roy, and W. S. Conner, “Spatial reuse in wireless ad-hoc
networks,” in Proc. VTC, 2003.
[11] S. Gobriel, R. Melhem, and D. Mosse, “A unified interference/collision
analysis for power-aware adhoc networks,?” in Proc. Infocom, March
2004.
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the Proceedings IEEE Infocom.