SlideShare a Scribd company logo
1 of 8
226                                                                 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO. 1, JANUARY 2009




      An Adaptive Power Controlled MAC Protocol for
                Wireless Ad Hoc Networks
                                              Pan Li, Xiaojun Geng, and Yuguang Fang



   Abstract—Transmission power control (TPC) has been exten-                   close a transmitter may be to its intended receiver. Second,
sively used not only to save energy, but also to improve the                   the spatial reuse of the network is low. According to IEEE
network throughput in wireless ad hoc networks. Among the                      802.11 MAC, when one node is transmitting, the other nodes
existing throughput-oriented TPC protocols, many can achieve
significant throughput improvement but have to use multiple                     in its physical carrier sensing range should keep silent to
channels and/or multiple transceivers, and others just require                 avoid interference. Thus, even those transmissions that will
a single channel and a single transceiver but can only have                    not interfere with the ongoing one are still blocked.
limited throughput enhancement. In this paper, we propose a                       Since in some cases the nodes in ad hoc networks have lim-
new adaptive transmission power control protocol, ATPMAC,
which can improve the network throughput significantly using a                  ited power, energy is indeed a very important issue. Many pro-
single channel and a single transceiver. Specifically, by controlling           tocols are proposed to save the power consumption, like those
the transmission power, ATPMAC can enable several concurrent                   in [6] [7] [8]. In these protocols, nodes transmit RTS/CTS at
transmissions without interfering with each other. Moreover,                   the same maximum power, and transmit DATA/ACK at the
ATPMAC does not introduce any additional signalling overhead.                  minimum power needed for successful transmission, which
We show by simulations that ATPMAC can improve the network
throughput by up to 136% compared to IEEE 802.11 in a random                   depends on the link distance, as well as the interference level
topology.                                                                      at the receiver. By doing this, the transmission power can be
                                                                               saved. Unfortunately, the spatial reuse is pretty low, and many
   Index Terms—Wireless ad hoc networks; MAC protocol;
transmission power control.                                                    collisions happen between the control packets (RTS/CTS)
                                                                               and the data packets (DATA/ACK) due to different physical
                                                                               carrier sensing ranges. Thus, the network throughput cannot
                          I. I NTRODUCTION
                                                                               be improved.

A      WIRELESS ad hoc network is a network where nodes
      communicate with each other via wireless medium di-
rectly or indirectly with the help of other nodes. It has gained
                                                                                  On the other hand, there are also some papers focusing
                                                                               on the throughput enhancement. [9] [10] propose to use
                                                                               two channels, and two transceivers, to improve the network
popularity recently due to its easy and quick deployment                       throughput. Significant improvements over IEEE 802.11 MAC
with low cost. In ad hoc networks, the wireless channel is                     are observed in simulations. However, the use of multi-channel
shared by all the nodes, and hence a medium access control                     and multi-transceiver introduces additional hardware cost and
(MAC) protocol is needed to coordinate their transmissions                     implementation complexity.
to reduce the collision. Although it was initially standardized
                                                                                  Recently, Jia et al. [5] and Ding et al. [4] propose δ-PCS
for wireless local area networks (WLANs), IEEE 802.11 DCF
                                                                               and DEMAC, respectively, to improve the network throughput
(Distributed Coordination Function), known as Carrier Sense
                                                                               using a single channel and a single transceiver. These two
Multiple Access with Collision Avoidance (CSMA/CA), with
                                                                               protocols try to adjust the transmission power for each packet
an optional use of RTS/CTS [2], is now also widely used as
                                                                               so that the transmission can be successful and at the same time
the MAC protocol in wireless ad hoc networks.
                                                                               it will not cause too much interference to other transmissions.
   However, the IEEE 802.11 MAC has two main disadvan-
                                                                               Since δ-PCS and DEMAC still work under the same decision
tages when used in ad hoc networks. First, energy is used
                                                                               rule as IEEE 802.11, they only achieve limited improvement.
inefficiently. IEEE 802.11 MAC uses the same transmission
power for all nodes to transmit all their packets, no matter how                  Muqattash and Krunz [11] also propose in a throughput-
                                                                               oriented MAC protocol utilizing a single channel and a
   Manuscript received September 7, 2008; revised December 24, 2007;           single transceiver, called POWMAC. Different from the above
accepted January 10, 2008. The associate editor coordinating the review of
this paper and approving it for publication was T. Hou.
                                                                               protocols, POWMAC uses a new decision rule: when a node
   This work was supported in part by the U.S. National Science Foundation     overhears other nodes’ transmissions, it is still allowed to carry
under grants CNS-0721744 and DBI-0529012. The work of Fang was also            out its own DATA transmission as long as it does not interfere
supported in part by the National Science Council (NSC), R.O.C., under
the NSC Visiting Professorship with contract number NSC-96-2811-E-002-
                                                                               with the ongoing ones. Thus, according to POWMAC, several
010 and Chunghwa Telecom M-Taiwan Program M-Taoyuan Project under              transmissions can happen concurrently.
Contract Number 97SC06.                                                           However, POWMAC cannot gain dramatic improvement
   P. Li and Y. Fang are with the Department of Electrical and Computer
Engineering, University of Florida, Gainesville, Florida 32611-6130 (e-mail:   on network throughput due to the following two reasons.
lipanleo@ufl.edu, fang@ece.ufl.edu).                                             First, it introduces additional signalling overhead. Specifically,
   X. Geng is with the Department of Electrical and Computer Engi-             N (N > 1) concurrent transmissions require N RTS/CTS
neering, California State University, Northridge, CA 91330 (e-mail: xj-
geng@csun.edu).                                                                exchanges. This overhead gets more serious when the channel
   Digital Object Identifier 10.1109/T-WC.2009.070993                           rate for data transmission increases. Second, several concur-
                                                            1536-1276/09$25.00 c 2009 IEEE
LI et al.: AN ADAPTIVE POWER CONTROLLED MAC PROTOCOL FOR WIRELESS AD HOC NETWORKS                                                 227



rent DATA transmissions may not take place if they are not          where Pt and Pr are the transmitted power and the received
synchronized due to the existence of propagation delay. We          power, respectively, Gt and Gr are the gain factors for the
will discuss this further later.                                    transmitter antenna and the receiver antenna, respectively, ht
   In this paper, we propose a new adaptive transmission            and hr are the antenna heights of the transmitter and the
power controlled MAC protocol, called ATPMAC, to enhance            receiver, respectively, d is the distance between transmitter and
the network throughput using a single channel and a single          receiver, L is the system loss factor not related to propagation
transceiver. ATPMAC adopts the same decision rule as POW-           (L ≥ 1), λ is the wavelength, h(·) is a function, and γ is the
MAC to enable concurrent transmissions. But, ATPMAC does            path loss exponent.
not incur any additional signalling overhead, i.e., only one
RTS/CTS exchange for N (N > 1) concurrent transmissions.                  III. T HE P ROPOSED MAC P ROTOCOL : ATPMAC
Moreover, ATPMAC provides two solutions to the synchro-                According to IEEE 802.11 MAC protocol, every node has
nization problem mentioned above so that the concurrent             to carry out the physical carrier sensing before transmitting
DATA transmissions can happen even though the propagation           RTS, CTS, or DATA packets (but not ACK packets). If the
delay exists. By doing this, ATPMAC can achieve significant          channel is sensed to be busy, then the nodes cannot transmit
throughput improvement over IEEE 802.11, which is up to             those packets. As a result, the spatial reuse is pretty low
136% in a random topology as we will show by simulations.           because each time the channel can be used by only one pair of
   The rest of this paper is organized as follows. In Section       transmitter and receiver, even though some other transmissions
II, we briefly introduce the operations of IEEE 802.11 DCF           may not interrupt the ongoing transmission. The exposed
protocol and the power propagation model. Section III details       terminal problem can be such an example.
our proposed ATPMAC protocol. Some simulation results are              In this paper, we propose a single-radio, single-channel, and
shown in Section IV. We finally conclude this paper in section       single-rate MAC protocol to improve the spatial reuse by con-
V.                                                                  trolling the transmission power so that several transmissions
                                                                    can be allowed at the same time without interfering with each
                      II. P RELIMINARIES                            other. This is an adaptive transmission power control MAC
A. IEEE 802.11 MAC                                                  protocol, which we call ATPMAC. The idea here is that a
   The fundamental access method of the IEEE 802.11 MAC is          new transmission can still be allowed as long as it does not
a DCF (Distributed Coordination Function) known as Carrier          interfere with the ongoing transmission.
Sense Multiple Access with Collision Avoidance (CSMA/CA)               ATPMAC does not use any new control packets other than
with an option of RTS/CTS. The four-way handshake proce-            RTS and CTS. Neither does it incur any other signalling
dure (RTS/CTS/DATA/ACK), which is used to deal with the             overhead than one RTS/CTS handshake before a DATA trans-
hidden terminal problem, is as follows. Before a node begins to     mission. Instead, one RTS/CTS handshake can be followed by
transmit, it should first sense the channel to determine whether     several concurrent DATA transmissions, which do not interfere
there is any ongoing transmission. If the channel is busy, the      with each other. Specifically, in ATPMAC, the nodes that
node shall defer until the channel is sensed idle for a period      overhear RTS or CTS can make a decision on whether they
of DIFS. Then the node randomly chooses a backoff period            can transmit DATA packets to their intended receivers based
according to the contention window and starts a backoff timer       on some useful information carried by RTS/CTS.
to backoff. The backoff timer decreases by 1 after the channel         We will first introduce a table maintained by each node
is idle for the duration of a slot. If the channel is sensed busy   in Section III-A, and then explain in details how ATPMAC
during any slot in the backoff interval, the backoff timer will     works when a node overhears CTS and RTS, respectively, in
be suspended. It can be resumed only after the channel is idle      Section III-B and Section III-C. After that, we will introduce
for a period of DIFS again. After the backoff timer reduces         how we tune the physical carrier sensing threshold in order for
to 0, the sender transmits a RTS omnidirectionally. After           ATPMAC to work more effectively in Section III-D, and give
correctly receiving the RTS, the receiver responses with a          some more discussions in Section III-E, respectively. We also
CTS after a period of SIFS. Similarly, after correctly receiving    compare ATPMAC with POWMAC at the end of this section.
the CTS, the sender begins to transmit the data a period of
SIFS later. This transmission ends after the receiver correctly     A. A Table Maintained by Each Node
receives the data and responses with an ACK. All four kinds            As shown in Table I, each node maintains a table to keep
of frames contain an estimated duration of the rest time of the     some information of their neighboring nodes. “Node ID” is the
transmission. Other nodes that receive these frames update          MAC address of a neighboring node. “Min Power”, denoted
their NAVs (Network Allocation Vector) with the duration.           by Pmin , is the minimum transmission power required to suc-
Every NAV decreases by 1 after a time slot. Those nodes are         cessfully send a packet to that neighboring node when it does
only allowed to transmit after they sense the channel idle for      not suffer from any other interferences. “Max Power”, denoted
a period of DIFS after their NAVs expire.                           by Pmax , is the maximum transmission power allowed for
                                                                    the current node keeping this table to transmit packets when
B. Power Propagation Models                                         that neighboring node is engaged in one transmission. “NAV”
   The power propagation models are used to predict received        is the time that the neighboring node will finish its ongoing
signal strength. A general model [13] is given as follows:          transmission. Each time a node overhears a packet from one
                                                     1              of its neighboring nodes, it updates this table. The details will
             Pr (d) = Pt h(Gt , Gr , ht , hr , L, λ) γ     (1)      be introduced later.
                                                    d
228                                                            IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO. 1, JANUARY 2009


                            TABLE I
            S OME INFORMATION OF NEIGHBORING NODES .
                                                                            Besides, we also add another new field called “Interference
                                                                         Level” in our CTS frame, which is the maximum average
      Node ID       Min Power (Pmin )    Max Power (Pmax )   NAV         interference level each neighboring node is allowed to generate
                                                                         to receiver j. Denote “Interference Level” by Pinterf . We can
B. Overhearing CTS                                                       obtain
                                                                                                          i
                                                                                                        Pr
  In this subsection, we introduce how ATPMAC works when                                j              SIN R− Pnoise
a node overhears CTS.                                                                 Pinterf     =
                                                                                                       N · (1 + β)
  When a receiver j receives RTS from a transmitter i, it can                                          i
                               i                                                                      Pr − SIN R · Pnoise
detect the reception power Pr , and obtain the transmission                                       =                                  (6)
          i                                                                                           N · (1 + β) · SIN R
power Pt , which is a new field we add in RTS frames.
According to the power propagation model in (1), we have                 where SINR is the signal-to-interference and noise ratio re-
                                                                         quired to support a certain data rate (SINR is a constant since
                               i         Pti
                              Pr = C ·       ,                     (2)   we do not consider rate adaptation here), N is the number
                                         dγ
                                          ij                             of the neighboring nodes of the receiver j, which can be
where dij is the distance between node i and node j, and C               obtained by checking the number of nodes in Table I, and
is a constant.                                                           β(β > 0) indicates the interference caused by the nodes out
   Denote the receiver sensitivity by RXth . Then, by assum-             of the transmission range, which is about 0.5 for the two-ray
ing the physical channel is symmetric, the minimum power                 propagation model and uniformly distributed terminals [14].
required for the receiver j to successfully transmit a packet to           After a CTS is sent out, some neighboring nodes of the
                          i
the transmitter i, i.e., Pmin as mentioned before, satisfies              receiver j may overhear it and hence can update their infor-
                                                                                                  j
                                            i
                                                                         mation about node j. Pmin is calculated similar to (4), i.e.,
                                          Pmin
                           RXth = C ·           .                  (3)                                   Ptj · RXth
                                           dγij                                                  j
                                                                                                Pmin =             .                 (7)
                                                                                                             j
                                                                                                           Pr
From (2) and (3), we can get
                                                                         Then, next time when a neighboring node k wants to send
                           i        Pti · RXth                           packets to node j, it can carry out the transmission only if its
                          Pmin =           i
                                               .                   (4)
                                         Pr                                                                          k
                                                                         maximum allowed transmission power, Pallow , is no smaller
                                                                                j
                     i
   After obtaining Pmin , the receiver j should check in Table           than Pmin .
I to find those active neighboring nodes denoted by set S, i.e.,             Since this CTS contains the transmission power of receiver
                                                                         j, denoted by Ptj , for a neighboring node k, we have
                     S = {k     |   N AV k > tnow }
                                                                                                    j          Ptj
                k
where N AV is the time that neighboring node k will finish                                          Pr = C ·        ,                 (8)
                                                                                                               dγ
                                                                                                                jk
its ongoing transmission, and tnow is the current time. Then,
the maximum allowed transmission power of the receiver j,                and                                      j
              j                                                                                                 Pmax
denoted by Pallow , is                                                                          Pinterf = C ·         .              (9)
                                                                                                                 dγjk
                                   k
          j               mink∈S {Pmax }         if S = ∅
         Pallow =                                                  (5)   where djk denotes the distance between receiver j and the
                          PMAX                   if S = ∅                                           j
                                                                         neighboring node k, and Pmax is the maximum transmission
          k
where Pmax is the maximum transmission power of node                     power allowed for node k to transmit packets without affecting
j at which j’s transmission will not interfere with k’s, ∅               the reception of the following DATA packets at receiver j.
stands for the empty set, and PMAX is the maximum allowed                From (8) and (9), we obtain
transmission power of the nodes. We will present how to
          k                                                                                   j          Pinterf · Ptj
obtain Pmax shortly.                                                                         Pmax =           j    .                 (10)
        j                     i                                                                             Pr
   If Pallow is less than Pmin , then the receiver j is not
allowed to reply with CTS because this CTS will definitely                   After successfully overhearing the CTS from node j, a
not received by the transmitter. Otherwise, CTS is transmitted           neighboring node k will update the NAV field in Table I for
                                                         j
after a period of SIF S with the transmission power Pallow .             node j. If node k does not want to send out any packets, it does
                                                                                                  j
Thus, this CTS transmission will not interfere with j’s active           not set its NAV. With Pallow defined in (5), even later it has
neighboring nodes’ transmissions, and it is possible that this           some packets to transmit, those transmissions will not interfere
CTS could be correctly received.                                         with j’s reception. Or, if it has a DATA packet for node j,
   The same as RTS frame, our CTS frame also contains its                node k will set its NAV in the same way as that defined in
transmission power. Since the CTS frame defined in IEEE                   IEEE 802.11 standard. If the neighboring node k has a DATA
802.11 standard only has the MAC address of the frame’s                  packet for some node l other than node j, it will also set its
                                                                                    k         l
receiver, we add a new field called “Transmitter Address” in              NAV if Pallow < Pmin . It can carry out the transmission a
our CTS frame to put in the MAC address of the frame’s                   period of SIFS later only if the maximum transmission power
transmitter. By doing this, other nodes overhearing CTS from             of node k is no smaller than the minimum transmission power
the receiver j can update their information about j kept in              required to transmit packets to node l. Thus, there is a good
Table I. We will introduce this process later.                           chance that some neighboring nodes of receiver j can transmit
LI et al.: AN ADAPTIVE POWER CONTROLLED MAC PROTOCOL FOR WIRELESS AD HOC NETWORKS                                                                        229



                                                                                   Transmission 1     RTS      CTS            DATA             ACK
                                                                                                       SIFS           SIFS           SIFS       SIFS

                                                                                                                                                  SIFS
                                                                                   Transmission 2                        DATA        ACK

                                                                                   Transmission 3                              DATA               ACK

                                                                                  Fig. 2. An example that three concurrent transmissions have DATA packets
                        i         j        k         l                            of different lengths.

                                                                                  power of the ACK packet. Thus, node i can calculate the
                                                                                  maximum average interference level each neighboring node is
                                                                                                                  i
                                                                                  allowed to node i, denoted by Pinterf , in a way similar to (6),
                                                                                  i.e.,
Fig. 1. An example that two concurrent transmissions happen after a CTS                                        j
                                                                                                 i            Pr − SIN R · Pnoise
is overheard. The big circle is the carrier sensing range, and the small circle                Pinterf =                          .
is the transmission range.                                                                                    N · (1 + β) · SIN R
                                                                                                                   j
                                                                                  Besides, node i also updates Pmin in Table I according to (7).
DATA packets at the same time as node i, and the spatial reuse
can be highly improved.                                                              Next time, when node i has a RTS packet to transmit, it
                                                                                  will put Pti and Pinterf in two new fields of the RTS frame,
                                                                                                      i
   For example, as shown in Fig. 1, node j is both in the
                                                                                  respectively, i.e., “Transmission Power” and “Interference
transmission range of node i and in that of node k; node k is
outside the transmission range, but within the carrier sensing                    Level”. Any neighboring node that overhears this RTS will
                                                                                  update their Pmin , Pmax , and N AV i in Table I accordingly.
                                                                                                   i     i
range of node i; node l is within the transmission range of node
                                                                                  After successfully overhearing the RTS packet from node i, if
k, and outside the carrier sensing range of node i. Assume
there are two flows, one from node i to node j, and the other                      a neighboring node k does not want to send out any packets,
                                                                                  it will not set its NAV. Or, if it has a DATA packet for node
from node k to node l. According to IEEE 802.11, there can
be only one transmission at a time. However, according to our                     i, node k will set its NAV in the same way as that defined in
                                                                                  IEEE 802.11 standard. If the neighboring node k has a DATA
proposed ATPMAC, these two flows may happen at the same
                                                                                  packet for some node l other than node j, it will also set
time after node k overhears a CTS from node j.                                                   k         l
                                                                                  its NAV if Pallow < Pmin . It can carry out the transmission
   Moreover, it is possible that different transmissions have
                                                                                  a period of 2 ∗ SIF S + TCT S later only if the maximum
DATA packets of different lengths. Should they be carried out
                                                                                  transmission power of node k is no lower than the minimum
concurrently? We contend that they should still be allowed to.
                                                                                  transmission power required to transmit packets to node l.
As shown in Fig. 2, there are three transmissions beginning
                                                                                  Thus, there is a good chance that some neighboring nodes of
at the same time. The DATA packet of transmission 1 is
                                                                                  transmitter i can transmit DATA packets at the same time as
longer than that of transmission 2, and shorter than that of
                                                                                  node i, and the spatial reuse can be highly improved.
transmission 3. However, all the three DATA packets are still
able to be followed by ACK packets since the receiver does                           For example, as shown in Fig. 3, node j and node l are
not need to do the physical carrier sensing before transmitting                   both in the transmission range of node k; node i is in the
the ACK packets.                                                                  transmission range of node j, but outside the carrier sensing
   Besides, if a neighboring node k of receiver j is allowed                      range of node k; node l is in the transmission range of node k,
to transmit a DATA packet to node l, it is still possible                         but outside the carrier sensing range of node j. Assume there
that node l cannot successfully receive the DATA packet,                          are two flows, one from node j to node i, and the other from
or node k cannot successfully receive the ACK packet. If                          node k to node l. According to IEEE 802.11, node j and node
node k performs according to IEEE 802.11, it will double                          k will fairly contend with each other for the channel and there
its contention window and retransmit the data again. This may                     is only one transmission at a time. However, according to our
lead to the starvation of node k if node i and node j keep using                  proposed ATPMAC, two DATA transmissions from node j and
the channel, which is unfair. As a result, in our MAC protocol,                   node k, respectively, may happen at the same time after one
node k does not double its contention window if this DATA                         node overhears a RTS from the other, and two ACKs from
transmission is not successful. Thus, after the transmission of                   node i and node l, respectively, may also both be received
node i and node j terminates, node k can contend for the                          successfully.
channel with node i and j fairly.                                                    Besides, as we have explained in Section III-B, even if
                                                                                  several transmissions have DATA packets of different lengths,
                                                                                  they are still allowed to happen at the same time; even if the
C. Overhearing RTS                                                                DATA transmission of a neighboring node k (or j) overhearing
  Next, we introduce how ATPMAC works after a node                                a RTS fails, node k (or j) does not double its contention
overhears RTS.                                                                    window.
  We add a new field in our ACK frames called “Transmission                           Furthermore, let us consider a special case when both
Power” to put in the transmission power Ptj of the ACK                            overhearing a RTS and overhearing a CTS occur to the same
packets. So, when node i receives an ACK from node j, it                          node which plans to have a DATA transmission. Assume a
                                j
can obtain the reception power Pr , as well as the transmission                   node overhears a RTS packet and is allowed to carry out DATA
230                                                                    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO. 1, JANUARY 2009



                                                                                   i       j       RTS    CTS                DATA                 ACK

                                                                                       k       l     RTS      CTS                DATA                 ACK

                                                                                  Fig. 4. An example that two transmissions in Fig. 1 are partially overlapping.



                                                                                  k becomes a hidden terminal to the transmission from node i
                         i             j          k              l                to node j. However, if node k does not transmit RTS when
                                                                                  node j is receiving RTS from node i, then node k will receive
                                                                                  CTS from node j and begins to transmit DATA packet at the
                                                                                  same time as node i. If node k transmits RTS when node j is
                                                                                  receiving RTS from node i, its transmission will not interfere
                                                                                  with node j’s reception if node k is a little bit further away
Fig. 3. An example that two concurrent transmissions happen after a RTS           from node j. In this case, the transmission from node i to node
is overheard. The big circle is the carrier sensing range, and the small circle   j and that from node k to node l can be partially overlapping,
is the transmission range.
                                                                                  as shown in Fig. 4.
                                                                                     Moreover, there would be another problem if the physical
transmission. If later this node overhears a CTS packet and is
                                                                                  carrier sensing range is larger than the transmission range.
not allowed to carry out the transmission any more, then it
                                                                                  For example, as shown in Fig. 3, assume node l is within the
does not carry out the transmission as planned and waits until
                                                                                  carrier sensing range of node j. If node k wins the channel
the channel is idle without doubling its contention window.
                                                                                  and transmits RTS to node l, node j can correctly receive
Again, this is for the fairness issue.
                                                                                  this packet and plans to transmit DATA packet at the same
                                                                                  time as node k. However, a period of SIFS later node j will
D. Tuning the Physical Carrier Sensing Threshold                                  overhear the CTS from node l, and hence will set its NAV with
   IEEE 802.11 standard defines two important concepts:                            a length of EIFS after the CTS transmission is finished, which
transmission range and physical carrier sensing range, which                      prevents it from transmitting DATA packet to node i. We call
are determined by receiver sensitivity and physical carrier                       this problem the transmitter blocking problem. Similarly, if
sensing threshold, respectively. Two nodes within the trans-                      node i is within the carrier sensing range of node k, node k
mission range of each other can communicate directly, and                         cannot transmit its DATA packet as it has planned after node
two nodes within the physical carrier sensing range of each                       k first receives RTS from node j, and then overhears CTS
other cannot transmit packets at the same time.                                   from node i. However, by setting the physical carrier sensing
   As shown in [15], physical carrier sensing range has a                         range to the same as the transmission range, this problem can
great impact on the network throughput. On one hand, the                          be overcome.
increase of physical carrier sensing range can alleviate the
hidden terminal problem, which helps increase the throughput.                     E. More Discussions
On the other hand, as physical carrier sensing range increases,                      As we discussed in Section III-B and Section III-C, one
the spatial reuse decreases, which impairs the throughput. As                     node overhearing RTS or CTS will wait for a period of
a result, there exists an optimal physical carrier sensing range                  TCT S + 2 ∗ SIF S or SIF S, respectively, to initiate a DATA
with respect to a certain transmission range, which is usually                    transmission. However, taking the propagation delay into con-
larger than the transmission range.                                               sideration, we need to recalculate this waiting time. Otherwise,
   Certainly, this is true for wireless networks using IEEE                       our proposed ATPMAC may not work effectively.
802.11. However, with respect to our proposed ATPMAC, we                             For example, there are two concurrent transmissions in Fig.
contend that this is not necessarily the case. As shown in Fig.                   5. Due to different propagation delays, if the DATA packet
1, if node k wins the contention with node i for the channel,                     from node k arrives earlier at node j than that from node i,
it will start the four-way handshake (RTS/CTS/DATA/ACK)                           then node j will start to receive node k’s DATA packet instead
with node l. Since node j is in the carrier sensing range of                      of node i’s. Even if the reception power of the DATA packet
node l, it will keep silent for a period of EIF S after the ACK                   from node i is much higher than that of the DATA packet
from node l is received by node k. Thus, when node i attempts                     from node k, node j still cannot correctly receive from node i
to send RTS to node j, it cannot respond with CTS, which is                       according to IEEE 802.11 standard. In this case, node j cannot
the receiver blocking problem. Due to this problem, ATPMAC                        receive any packet. The same thing happens to node l if node
cannot increase the throughput much because it relies on node                     i’s DATA packet arrives at node l a little bit earlier than node
j’s CTS to schedule the concurrent transmissions.                                 k’s DATA packet.
   To address this problem, we propose to set physical carrier                       We find that there are two solutions to this problem due
sensing threshold equal to receiver sensitivity such that the                     to the imperfect synchronization between concurrent DATA
carrier sensing range is the same as the transmission range.                      transmissions.
Thus, in Fig. 1, if node j successfully receives a RTS from                          Solution One: We can address this problem if every node
node i, it can still reply with a CTS even if node l is                           knows the exact locations of their two-hop neighboring nodes.
transmitting an ACK to node k. Besides, we notice that node                       Again, there are two cases:
LI et al.: AN ADAPTIVE POWER CONTROLLED MAC PROTOCOL FOR WIRELESS AD HOC NETWORKS                                                              231



  i         j     RTS      CTS               DATA               ACK        k       l       RTS   CTS             DATA                ACK
                  SIFS              SIFS             SIFS       SIFS
                                                                               i       j     RTS    CTS              DATA                ACK
 k          l                          DATA           ACK
                                                                          Fig. 6.   Another example that two transmissions in Fig. 1 are partially
                                                                          overlapping.
Fig. 5.     A problem when we consider the propagation delay.

                                                                          if a node is able to turn to receive a new packet with much
      •   Overhearing CTS: As shown in Fig. 1, if node k over-
                                                                          higher reception power when it has already begun to receive
          hears CTS from node j, then, in order for node j and
                                                                          a packet, our problem shown in Fig. 5 can be solved.
          node l to be able to receive the DATA packet from node
                                                                             Fortunately, there do exist such designs that support the
          i and node k, respectively, we need
                                                                          capture of a stronger new packet. One example is Lucent’s
                                           k
                tji + SIF S + tij ≤ tjk + Twait + tkj                     physical layer (PHY) design with “Message-In-A-Message”
                                                                          (MIM) support [3], where a MIM receiver is able to correctly
          and
                                                                          detect and capture a strong frame during its reception of a
                        k
                 tjk + Twait + tkl ≤ tji + SIF S + til                    weak frame [12].
                   k
                                                                             Besides, with enhanced capture capability, some transmis-
          where Twait is node k’s waiting time before it trans-           sions that cannot happen according to IEEE 802.11 can now
          mits its DATA packet after overhearing a CTS, and               be carried out. For example, in Fig. 1, if node k transmits RTS
          tmn (m, n ∈ {i, j, k, l}) is the propagation delay from         before node i does, node j will not be able to receive the RTS
          node m to node n. Assume tmn = tnm . Thus, we need              from node i according to IEEE 802.11 standard. However,
                       k
          to choose a Twait satisfying                                    with the enhanced capture capability discussed above, the
                                   k
                             T1 ≤ Twait ≤ T2                       (11)   transmission between node i and node j may be carried out
                                                                          as shown in Fig. 6.
          where T1 = SIF S + 2(tji − tjk ), and T2 = SIF S +                 In our proposed ATPMAC, we use the second solution as
          tji + til − tjk − tkl .                                         the default one while making the first solution as an option.
      •   Overhearing a RTS: Similarly, as shown in Fig. 3, if node
          k overhears RTS from node j, then, in order for node i
          and node l to be able to receive the DATA packet from           F. Comparison with POWMAC
          node j and node k, respectively, we need                           The proposed ATPMAC seems similar to POWMAC [11]
                                                      k
                                                                          in the sense that in both protocols the nodes overhearing
          tji + 2 · SIF S + CT S + tij + tji ≤ tjk + Twait + tki          some transmissions are still allowed to carry out their own
          and                                                             transmissions as long as they will not interfere with the
                                                                          ongoing ones. However, as we have shown above, ATPMAC
                 k
          tjk + Twait + tkl ≤ tji + 2 · SIF S + CT S + tij + tjl          has several advantages over POWMAC:
                                     k
          Thus, we need to choose a Twait satisfying                         • Firstly, our proposed ATPMAC has much smaller over-

                                   k
                                                                               head than POWMAC. In ATPMAC, N (N ≥ 1) concur-
                             T3 ≤ Twait ≤ T4                       (12)        rent DATA transmissions only need one RTS/CTS hand-
     where T3 = 2 · SIF S + CT S + 3tij − tjk − tki , and                      shake. In contrast, according to POWMAC, N concurrent
     T4 = 2 · SIF S + CT S + 2tij + tjl − tjk − tkl .                          DATA transmissions should be proceeded by N RTS/CTS
                                                                               handshakes.
  This solution has two limitations. First, it requires some
                                                                             • Secondly, POWMAC suffers from the problem shown
position information, which results in higher cost. Second, it
                                                                               in Fig. 5, which is caused by propagation delay, while
can only make concurrent transmissions happen after CTS is
                                                                               ATPMAC has addressed that. Notice that this problem
overheard and RTS is overheard if T1 ≤ T2 in (11), and T3 ≤
                                                                               is one source of ineffectiveness in POWMAC because
T4 in (12), respectively, i.e.,
                                                                               several transmissions may not be able to be carried out
                         tij + tkl ≤ tkj + til                     (13)        concurrently as planned.
                                                                             • Thirdly, ATPMAC is much simpler than POWMAC. It is
and                                                                            much easier to implement ATPMAC than to implement
                         tij + tkl ≤ tki + tjl                     (14)        POWMAC, yet ATPMAC can achieve better performance
                                                                               than POWMAC as we will show in Section IV.
respectively, which means it can only address the problem in
                                                                             We notice that ATPMAC also has some limitations. For
certain scenarios.
                                                                          example, ATPMAC does not take node mobility into con-
   Solution Two: By carefully looking into this problem, we
                                                                          sideration, hidden problems still exist, and so on. We will
find that it is related to the capture capability of the nodes.
                                                                          investigate these issues in the future.
Specifically, according to IEEE 802.11 standard, if a node first
receives a packet, and then another packet arrives, the new
packet can only be considered as interference, no matter how                                IV. P ERFORMANCE E VALUATION
high the reception power of this new packet is. In other words,             In this section, we use NS2 (version 2.29) to evaluate the
a node can only receive the packet that arrives first. However,            proposed ATPMAC protocol and compare its performance
232                                                             IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO. 1, JANUARY 2009


                               TABLE II
                                                                                                        1600
                       S IMULATION PARAMETERS .

        Parameters                         Value                                                        1400                 ATPMAC
                                                                                                                             POWMAC
        Channel frequency                  2.4 GHz                                                                           IEEE 802.11
        Data rate                          1 Mbps                                                       1200
        Basic rate                         1 Mbps
        SINR threshold                     4 dB




                                                                            Network Throughput (kbps)
                                                                                                        1000
        Packet size                        2000 bytes
        Transmission range                 250 meters
        Carrier sensing range              250 meters                                                    800

        RTS retry limit                    7
                                                                                                         600

                    d ij         d jk            d kl
                                                                                                         400


                i          j                 k          l                                                200


Fig. 7. A simple topology where every node is a one-hop neighbor of the                                       0
other three nodes.                                                                                                0   100       200         300    400      500       600
                                                                                                                                                  Data Sending Rate (kbps)
                                                                                                                                                                              700   800   900   1000

                                                                                                                                      (a)
with POWMAC [11], and IEEE 802.11 MAC. We compare
                                                                                                        1200
ATPMAC with POWMAC because the latter one is also a
transmission power control MAC protocol based on a single-                                                                  ATPMAC
                                                                                                                            POWMAC
channel, single-transceiver design, and it shares some common                                           1000                IEEE 802.11

features with ATPMAC. We do not compare ATPMAC with
those protocols like [6] [7] because their main objective is to                                          800
                                                                            Network Throughput (kbps)
save energy and they can achieve comparable throughput to
that of IEEE 802.11 MAC at best. Neither do we compare
                                                                                                         600
ATPMAC with those protocols with multi-channel and/or
multi-transceivers [9] [10].
   Besides, as we mentioned before, POWMAC suffers from                                                  400

the problem shown in Fig. 5 due to the existence of propa-
gation delay. In order to make fair comparisons, we improve                                              200
POWMAC by addressing this problem when we implement it.
Some of our simulation parameters are shown in Table II.
                                                                                                              0
                                                                                                                  0   100       200         300    400      500       600     700   800   900   1000
                                                                                                                                                  Data Sending Rate (kbps)

A. A One-hop Scenario                                                                                                                 (b)

   We first conduct simulations in a one-hop scenario shown                                              800

in Fig. 7, where the distances between node i and node j,
between node j and node k, and between node k and node l,                                               700


are denoted by dij , djk , and dkl , respectively. There are two
                                                                                                        600
flows in this network, one from node i to node j, and the
other from node k to node l.
                                                                           Network Throughput (kbps)




                                                                                                        500                                                          ATPMAC
   Case 1: dij = 35 meters, djk = 135 meters, and dkl = 35                                                                                                           POWMAC
                                                                                                                                                                     IEEE 802.11

meters. In this case, the two flows can happen concurrently                                              400

without interfering with each other according to both ATP-
MAC and POWMAC, while only one flow can be carried out                                                   300

at a time according to IEEE 802.11 MAC.
                                                                                                        200
   The network throughput is shown in Fig. 8(a). Since the
proposed ATPMAC does not introduce any additional over-                                                 100
head, the network throughput of ATPMAC is almost two times
that of IEEE 802.11 MAC. POWMAC achieves about 82%                                                        0
                                                                                                              0       100      200         300     400      500       600    700    800   900   1000
higher throughput than IEEE 802.11 MAC due to the increased                                                                                       Data Sending Rate (kbps)
                                                                                                                                      (c)
overhead. Thus, the network throughput of ATPMAC is higher
than that of POWMAC by up to 10%.                                         Fig. 8.   Performance of ATPMAC, POWMAC, and IEEE 802.11 MAC
   Case 2: dij = 90 meters, djk = 85 meters, and dkl = 35                 (corresponding to the topology shown in Fig. 7). (a), (b), and (c) are the
                                                                          performance in Case 1, Case 2, and Case 3, respectively.
meters. The network throughput is shown in Fig. 8(b). Accord-
ing to ATPMAC, two flows can be carried out concurrently
only if node i and node j exchange RTS/CTS before node                    50% more than that of IEEE 802.11 MAC. POWMAC has
k and node l. Since about half of the time node i transmits               a similar case in the sense that only half of the time can
RTS before node k and half of the time node k before node                 two transmissions happen concurrently. Because of additional
i, and thus, the network throughput of ATPMAC is about                    overhead, the network throughput of POWMAC is about 32%
LI et al.: AN ADAPTIVE POWER CONTROLLED MAC PROTOCOL FOR WIRELESS AD HOC NETWORKS                                                                                          233


                                2500
                                                                                                  synchronization problem. In other words, the performance gain
                                           ATPMAC
                                           POWMAC                                                 of ATPMAC over POWMAC is in fact larger that what we
                                           IEEE 802.11
                                2000
                                                                                                  have shown.
                                                                                                                        V. C ONCLUSION
                                                                                                     In this paper, we propose a new adaptive transmission
 Aggragated Throughput (kbps)




                                1500
                                                                                                  power controlled MAC protocol, known as ATPMAC, which
                                                                                                  can significantly improve the network throughput using a
                                                                                                  single channel and a single transceiver. Our simulations show
                                1000
                                                                                                  that ATPMAC can improve the throughput by up to 136%
                                                                                                  compared to IEEE 802.11 MAC.
                                500
                                                                                                     We must realize that there are some limitations on ATP-
                                                                                                  MAC. First, it does not address the mobility issue. Second,
                                                                                                  hidden terminal problems still exist. We will investigate these
                                  0                                                               issues in the future.
                                       0        500      1000               1500    2000   2500
                                                         Data Sending Rate (kbps)


                                                                                                                               R EFERENCES
Fig. 9. The network throughput of ATPMAC, POWMAC, and IEEE 802.11
in a multi-hop scenario.                                                                           [1] http://www.cisl.columbia.edu/grads/ozgun/ProjectApplication.html.
                                                                                                   [2] Wireless LAN medium access control (MAC) and physical layer (PHY)
more than that of IEEE 802.11 MAC. Thus, the network                                                   specifications, IEEE Standards Working Group, 1999.
                                                                                                   [3] J. Boer, H. Bokhorst, W. Diepstraten, A. Kamerman, R. Mud, H. Driest,
throughput of ATPMAC is more than that of POWMAC by                                                    and R. Kopmeiners, Wireless LAN with enhanced capture provision,
up to 13%.                                                                                             U.S. Patent 5987033, Nov. 1999.
   Case 3: dij = 135 meters, djk = 40 meters, and dkl = 35                                         [4] P. Ding, J. Holliday, and A. Celik. “Demac: an adaptive power control
                                                                                                       MAC protocol for ad-hoc networks,” in Proc. IEEE 16th International
meters. In this case, neither ATPMAC nor POWMAC can                                                    Symposium on Personal, Indoor and Mobile Radio Communications
make two transmissions happen concurrently due to the seri-                                            (PIMRC’05), Berlin, Germany, Sept. 2005.
ous interference between two flows. The network throughput                                          [5] L. Jia, X. Liu, G. Noubir, and R. Rajaraman, “Transmission power con-
                                                                                                       trol for ad hoc wireless networks: throughput, energy and fairness,” in
is shown in Fig. 8(c). ATPMAC achieves almost the same                                                 Proc. IEEE Wireless and Communications and Networking Conference,
throughput as that of IEEE 802.11 MAC, while POWMAC                                                    New Orleans, LA, USA, Mar. 2005.
has degradation of about 20%. Thus, the network throughput                                         [6] E. Jung and N. Vaidya, “A power control MAC protocol for ad hoc
                                                                                                       networks,” in Proc. ACM MobiCom, Atlanta, Georgia, USA, Sept. 2002.
of ATPMAC is more than that of POWMAC by up to 12%.                                                [7] P. Karn, “MACa: a new channel access method for packet radio,” in
                                                                                                       Proc. 9th ARRL Computer Networking Conference, London, Ontario,
B. A Multi-hop Scenario                                                                                Canada, 1990.
                                                                                                   [8] A. Lim and S. Yoshida, “A power adapted MAC (PMAC) scheme for
   We than evaluate the performance of ATPMAC, POWMAC,                                                 energy saving in wireless ad hoc networks,” IEICE Trans. Fundamentals
and IEEE 802.11 MAC in a multi-hop scenario. We use a                                                  of Electronics, Commun. and Computer Sciences, vol. E88-A, no. 7, pp.
                                                                                                       1836–1844, July 2005.
1000m x 1000m 2D topology where there are 50 randomly dis-                                         [9] J. Monks, V. Bharghavan, and W. Hwu, “A power controlled multiple ac-
tributed nodes. Ten nodes are chosen to be CBR (Constant Bit                                           cess protocol for wireless packet networks,” in Proc. IEEE International
Rate) sources and their destination nodes are randomly chosen.                                         Conference on Computer Communications (INFOCOM’01), Anchorage,
                                                                                                       Alaska, USA, Apr. 2001.
The network uses AODV (Ad Hoc OnDemand Distance Vector                                            [10] A. Muqattash and M. Krunz, “Power controlled dual channel (PCDC)
Routing) routing protocol. The simulation parameters are the                                           medium access protocol for wireless ad hoc networks,” in Proc. IEEE In-
same as those shown in Table II except that the data rate is 2                                         ternational Conference on Computer Communications (INFOCOM’03),
                                                                                                       San Francisco, California, USA, Mar. 2003.
Mbps and the SINR is 7db [1]. Fig. 9 shows the simulation                                         [11] A. Muqattash and M. Krunz, “Powmac: a single-channel power-control
result. We can see that ATPMAC can achieve up to 136%                                                  protocol for throughput enhancement in wireless ad hoc networks,”
higher throughput than that of IEEE 802.11, and 32% higher                                             IEEE J. Select. Areas Commun., vol. 23, no. 5, pp. 1067–1084, May
                                                                                                       2005.
throughput than that of POWMAC. This is because in multi-                                         [12] T. Nadeem, L. Ji, A. Agrawala, and J. Agre, “Location enhancement to
hop networks ATPMAC can make concurrent transmissions                                                  ieee 802.11 DCF, in Proc. IEEE International Conference on Computer
happen whenever possible without introducing any additional                                            Communications (INFOCOM’05), Miami, FL, USA, Mar. 2005.
                                                                                                  [13] T. Rappaport, Wireless Communications: Principles and Practice
overhead, while POWMAC allows concurrent transmissions                                                 (Second Edition). Prentice-Hall PTR, 2002.
at the cost of more signaling overhead, i.e., N RTS/CTS                                           [14] T. Rappaport and L. Milstein, “Effects of radio propagation path loss on
exchanges for N concurrent transmissions. This overhead                                                DS-CDMA cellular frequency reuse efficiency for the reverse channel,”
                                                                                                       IEEE Trans. Veh. Technol., vol. 41, Aug. 1992.
becomes more significant when the data rate increases.                                             [15] H. Zhai and Y. Fang, “Physical carrier sensing and spatial reuse in
   As a remark, we must note that the actual performance                                               multirate and multihop wireless ad hoc networks,” in Proc. IEEE In-
of the original POWMAC should be worse than what we                                                    ternational Conference on Computer Communications (INFOCOM’06),
have shown above, because it does not address the imperfect                                            Barcelona, Spain, Apr. 2006.

More Related Content

What's hot

International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...journal ijrtem
 
Qo s oriented distributed routing protocols : anna university 2nd review ppt
Qo s   oriented  distributed routing  protocols : anna university 2nd review pptQo s   oriented  distributed routing  protocols : anna university 2nd review ppt
Qo s oriented distributed routing protocols : anna university 2nd review pptAAKASH S
 
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...ijcsit
 
A novel pause count backoff algorithm for channel access
A novel pause count backoff algorithm for channel accessA novel pause count backoff algorithm for channel access
A novel pause count backoff algorithm for channel accessambitlick
 
MESSAGE ROUTING IN WIRELESS AND MOBILE NETWORKS USING TDMA TECHNOLOGY
MESSAGE ROUTING IN WIRELESS AND MOBILE NETWORKS USING TDMA TECHNOLOGYMESSAGE ROUTING IN WIRELESS AND MOBILE NETWORKS USING TDMA TECHNOLOGY
MESSAGE ROUTING IN WIRELESS AND MOBILE NETWORKS USING TDMA TECHNOLOGYijwmn
 
Implementing Energy Efficient Strategies in the MANET on-demand routing Proto...
Implementing Energy Efficient Strategies in the MANET on-demand routing Proto...Implementing Energy Efficient Strategies in the MANET on-demand routing Proto...
Implementing Energy Efficient Strategies in the MANET on-demand routing Proto...IJEEE
 
Review on variants of Power Aware AODV
Review on variants of Power Aware AODVReview on variants of Power Aware AODV
Review on variants of Power Aware AODVijsrd.com
 
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...IJECEIAES
 
NS2 Projects 2014 in HCL velachery
NS2 Projects 2014 in HCL velacheryNS2 Projects 2014 in HCL velachery
NS2 Projects 2014 in HCL velacherySenthilvel S
 
Iaetsd increasing network life span of manet by using
Iaetsd increasing network life span of manet by usingIaetsd increasing network life span of manet by using
Iaetsd increasing network life span of manet by usingIaetsd Iaetsd
 
QOD PHASE-1 FINAL PPT
QOD PHASE-1 FINAL PPTQOD PHASE-1 FINAL PPT
QOD PHASE-1 FINAL PPTAAKASH S
 
Modified q aware scheduling algorithm for improved fairness in 802.16 j networks
Modified q aware scheduling algorithm for improved fairness in 802.16 j networksModified q aware scheduling algorithm for improved fairness in 802.16 j networks
Modified q aware scheduling algorithm for improved fairness in 802.16 j networksIJCNCJournal
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...ijceronline
 

What's hot (19)

Ijcnc050203
Ijcnc050203Ijcnc050203
Ijcnc050203
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
94
9494
94
 
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
 
Qo s oriented distributed routing protocols : anna university 2nd review ppt
Qo s   oriented  distributed routing  protocols : anna university 2nd review pptQo s   oriented  distributed routing  protocols : anna university 2nd review ppt
Qo s oriented distributed routing protocols : anna university 2nd review ppt
 
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
 
A novel pause count backoff algorithm for channel access
A novel pause count backoff algorithm for channel accessA novel pause count backoff algorithm for channel access
A novel pause count backoff algorithm for channel access
 
MESSAGE ROUTING IN WIRELESS AND MOBILE NETWORKS USING TDMA TECHNOLOGY
MESSAGE ROUTING IN WIRELESS AND MOBILE NETWORKS USING TDMA TECHNOLOGYMESSAGE ROUTING IN WIRELESS AND MOBILE NETWORKS USING TDMA TECHNOLOGY
MESSAGE ROUTING IN WIRELESS AND MOBILE NETWORKS USING TDMA TECHNOLOGY
 
Implementing Energy Efficient Strategies in the MANET on-demand routing Proto...
Implementing Energy Efficient Strategies in the MANET on-demand routing Proto...Implementing Energy Efficient Strategies in the MANET on-demand routing Proto...
Implementing Energy Efficient Strategies in the MANET on-demand routing Proto...
 
Review on variants of Power Aware AODV
Review on variants of Power Aware AODVReview on variants of Power Aware AODV
Review on variants of Power Aware AODV
 
S09 S02 P04
S09 S02 P04S09 S02 P04
S09 S02 P04
 
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
 
NS2 Projects 2014 in HCL velachery
NS2 Projects 2014 in HCL velacheryNS2 Projects 2014 in HCL velachery
NS2 Projects 2014 in HCL velachery
 
Iaetsd increasing network life span of manet by using
Iaetsd increasing network life span of manet by usingIaetsd increasing network life span of manet by using
Iaetsd increasing network life span of manet by using
 
QOD PHASE-1 FINAL PPT
QOD PHASE-1 FINAL PPTQOD PHASE-1 FINAL PPT
QOD PHASE-1 FINAL PPT
 
Modified q aware scheduling algorithm for improved fairness in 802.16 j networks
Modified q aware scheduling algorithm for improved fairness in 802.16 j networksModified q aware scheduling algorithm for improved fairness in 802.16 j networks
Modified q aware scheduling algorithm for improved fairness in 802.16 j networks
 
40520130101003
4052013010100340520130101003
40520130101003
 
Ijetr021145
Ijetr021145Ijetr021145
Ijetr021145
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 

Viewers also liked

A novel estimation based backoff algorithm in the ieee
A novel estimation based backoff algorithm in the ieeeA novel estimation based backoff algorithm in the ieee
A novel estimation based backoff algorithm in the ieeeambitlick
 
Multi hop wireless-networks
Multi hop wireless-networksMulti hop wireless-networks
Multi hop wireless-networksambitlick
 
Label based dv-hop localization against wormhole attacks in wireless sensor n...
Label based dv-hop localization against wormhole attacks in wireless sensor n...Label based dv-hop localization against wormhole attacks in wireless sensor n...
Label based dv-hop localization against wormhole attacks in wireless sensor n...ambitlick
 
Independent tasks scheduling based on genetic
Independent tasks scheduling based on geneticIndependent tasks scheduling based on genetic
Independent tasks scheduling based on geneticambitlick
 
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...ambitlick
 
Dynamic framed slotted aloha algorithms using fast tag estimation
Dynamic framed slotted aloha algorithms using fast tag estimationDynamic framed slotted aloha algorithms using fast tag estimation
Dynamic framed slotted aloha algorithms using fast tag estimationambitlick
 
Effective and efficient shape based pattern
Effective and efficient shape based patternEffective and efficient shape based pattern
Effective and efficient shape based patternambitlick
 
Backbone nodes based stable routing for mobile ad hoc networks
Backbone nodes based stable routing for mobile ad hoc networksBackbone nodes based stable routing for mobile ad hoc networks
Backbone nodes based stable routing for mobile ad hoc networksambitlick
 

Viewers also liked (8)

A novel estimation based backoff algorithm in the ieee
A novel estimation based backoff algorithm in the ieeeA novel estimation based backoff algorithm in the ieee
A novel estimation based backoff algorithm in the ieee
 
Multi hop wireless-networks
Multi hop wireless-networksMulti hop wireless-networks
Multi hop wireless-networks
 
Label based dv-hop localization against wormhole attacks in wireless sensor n...
Label based dv-hop localization against wormhole attacks in wireless sensor n...Label based dv-hop localization against wormhole attacks in wireless sensor n...
Label based dv-hop localization against wormhole attacks in wireless sensor n...
 
Independent tasks scheduling based on genetic
Independent tasks scheduling based on geneticIndependent tasks scheduling based on genetic
Independent tasks scheduling based on genetic
 
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...
 
Dynamic framed slotted aloha algorithms using fast tag estimation
Dynamic framed slotted aloha algorithms using fast tag estimationDynamic framed slotted aloha algorithms using fast tag estimation
Dynamic framed slotted aloha algorithms using fast tag estimation
 
Effective and efficient shape based pattern
Effective and efficient shape based patternEffective and efficient shape based pattern
Effective and efficient shape based pattern
 
Backbone nodes based stable routing for mobile ad hoc networks
Backbone nodes based stable routing for mobile ad hoc networksBackbone nodes based stable routing for mobile ad hoc networks
Backbone nodes based stable routing for mobile ad hoc networks
 

Similar to An adaptive power controlled mac protocol for

A dynamic performance-based_flow_control
A dynamic performance-based_flow_controlA dynamic performance-based_flow_control
A dynamic performance-based_flow_controlingenioustech
 
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...pijans
 
IJCTET2015123106
IJCTET2015123106IJCTET2015123106
IJCTET2015123106ijctet
 
TCP with delayed ack for wireless networks
TCP with delayed ack for wireless networksTCP with delayed ack for wireless networks
TCP with delayed ack for wireless networksambitlicksolutions
 
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONIEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONranjith kumar
 
Improving the network lifetime of mane ts through cooperative mac protocol de...
Improving the network lifetime of mane ts through cooperative mac protocol de...Improving the network lifetime of mane ts through cooperative mac protocol de...
Improving the network lifetime of mane ts through cooperative mac protocol de...Pvrtechnologies Nellore
 
Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...
Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...
Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...BRNSSPublicationHubI
 
ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET ijac journal
 
An Implementation and Analysis of RTS/CTS Mechanism for Data Transfer in Wire...
An Implementation and Analysis of RTS/CTS Mechanism for Data Transfer in Wire...An Implementation and Analysis of RTS/CTS Mechanism for Data Transfer in Wire...
An Implementation and Analysis of RTS/CTS Mechanism for Data Transfer in Wire...iosrjce
 
Distributed Utility-Based Energy Efficient Cooperative Medium Access Control...
Distributed Utility-Based Energy Efficient Cooperative Medium  Access Control...Distributed Utility-Based Energy Efficient Cooperative Medium  Access Control...
Distributed Utility-Based Energy Efficient Cooperative Medium Access Control...IJMER
 
A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...
A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...
A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...cscpconf
 
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...csandit
 
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksEfficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksCSCJournals
 

Similar to An adaptive power controlled mac protocol for (20)

A dynamic performance-based_flow_control
A dynamic performance-based_flow_controlA dynamic performance-based_flow_control
A dynamic performance-based_flow_control
 
Mac
MacMac
Mac
 
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...
 
IJCTET2015123106
IJCTET2015123106IJCTET2015123106
IJCTET2015123106
 
TCP with delayed ack for wireless networks
TCP with delayed ack for wireless networksTCP with delayed ack for wireless networks
TCP with delayed ack for wireless networks
 
mn paper
mn papermn paper
mn paper
 
01306496
0130649601306496
01306496
 
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONIEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
 
Improving the network lifetime of mane ts through cooperative mac protocol de...
Improving the network lifetime of mane ts through cooperative mac protocol de...Improving the network lifetime of mane ts through cooperative mac protocol de...
Improving the network lifetime of mane ts through cooperative mac protocol de...
 
Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...
Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...
Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...
 
ShortPaper
ShortPaperShortPaper
ShortPaper
 
ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET
 
An Implementation and Analysis of RTS/CTS Mechanism for Data Transfer in Wire...
An Implementation and Analysis of RTS/CTS Mechanism for Data Transfer in Wire...An Implementation and Analysis of RTS/CTS Mechanism for Data Transfer in Wire...
An Implementation and Analysis of RTS/CTS Mechanism for Data Transfer in Wire...
 
B010611015
B010611015B010611015
B010611015
 
Distributed Utility-Based Energy Efficient Cooperative Medium Access Control...
Distributed Utility-Based Energy Efficient Cooperative Medium  Access Control...Distributed Utility-Based Energy Efficient Cooperative Medium  Access Control...
Distributed Utility-Based Energy Efficient Cooperative Medium Access Control...
 
Bf33335340
Bf33335340Bf33335340
Bf33335340
 
Bf33335340
Bf33335340Bf33335340
Bf33335340
 
A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...
A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...
A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...
 
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...
 
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksEfficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
 

More from ambitlick

DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...
DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...
DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...ambitlick
 
Low cost Java 2013 IEEE projects
Low cost Java 2013 IEEE projectsLow cost Java 2013 IEEE projects
Low cost Java 2013 IEEE projectsambitlick
 
Ambitlick ns2 2013
Ambitlick ns2 2013Ambitlick ns2 2013
Ambitlick ns2 2013ambitlick
 
Low cost Java IEEE Projects 2013
Low cost Java IEEE Projects 2013Low cost Java IEEE Projects 2013
Low cost Java IEEE Projects 2013ambitlick
 
Handling selfishness in replica allocation
Handling selfishness in replica allocationHandling selfishness in replica allocation
Handling selfishness in replica allocationambitlick
 
Mutual distance bounding protocols
Mutual distance bounding protocolsMutual distance bounding protocols
Mutual distance bounding protocolsambitlick
 
Moderated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroupsModerated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroupsambitlick
 
Efficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secretsEfficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secretsambitlick
 
IEEE -2012-13 Projects IN NS2
IEEE -2012-13 Projects IN NS2  IEEE -2012-13 Projects IN NS2
IEEE -2012-13 Projects IN NS2 ambitlick
 
Adaptive weight factor estimation from user review 1
Adaptive weight factor estimation from user   review 1Adaptive weight factor estimation from user   review 1
Adaptive weight factor estimation from user review 1ambitlick
 
Integrated institutional portal
Integrated institutional portalIntegrated institutional portal
Integrated institutional portalambitlick
 
Mutual distance bounding protocols
Mutual distance bounding protocolsMutual distance bounding protocols
Mutual distance bounding protocolsambitlick
 
Moderated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroupsModerated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroupsambitlick
 
Efficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secretsEfficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secretsambitlick
 
Comments on “mabs multicast authentication based on batch signature”
Comments on “mabs multicast authentication based on batch signature”Comments on “mabs multicast authentication based on batch signature”
Comments on “mabs multicast authentication based on batch signature”ambitlick
 
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...ambitlick
 
Energy efficient protocol for deterministic
Energy efficient protocol for deterministicEnergy efficient protocol for deterministic
Energy efficient protocol for deterministicambitlick
 
A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
A Privacy-Preserving Location Monitoring System for Wireless Sensor NetworksA Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
A Privacy-Preserving Location Monitoring System for Wireless Sensor Networksambitlick
 

More from ambitlick (20)

DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...
DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...
DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...
 
Low cost Java 2013 IEEE projects
Low cost Java 2013 IEEE projectsLow cost Java 2013 IEEE projects
Low cost Java 2013 IEEE projects
 
Ambitlick ns2 2013
Ambitlick ns2 2013Ambitlick ns2 2013
Ambitlick ns2 2013
 
Low cost Java IEEE Projects 2013
Low cost Java IEEE Projects 2013Low cost Java IEEE Projects 2013
Low cost Java IEEE Projects 2013
 
Handling selfishness in replica allocation
Handling selfishness in replica allocationHandling selfishness in replica allocation
Handling selfishness in replica allocation
 
Mutual distance bounding protocols
Mutual distance bounding protocolsMutual distance bounding protocols
Mutual distance bounding protocols
 
Moderated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroupsModerated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroups
 
Efficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secretsEfficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secrets
 
IEEE -2012-13 Projects IN NS2
IEEE -2012-13 Projects IN NS2  IEEE -2012-13 Projects IN NS2
IEEE -2012-13 Projects IN NS2
 
Adaptive weight factor estimation from user review 1
Adaptive weight factor estimation from user   review 1Adaptive weight factor estimation from user   review 1
Adaptive weight factor estimation from user review 1
 
Integrated institutional portal
Integrated institutional portalIntegrated institutional portal
Integrated institutional portal
 
Embassy
EmbassyEmbassy
Embassy
 
Crm
Crm Crm
Crm
 
Mutual distance bounding protocols
Mutual distance bounding protocolsMutual distance bounding protocols
Mutual distance bounding protocols
 
Moderated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroupsModerated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroups
 
Efficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secretsEfficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secrets
 
Comments on “mabs multicast authentication based on batch signature”
Comments on “mabs multicast authentication based on batch signature”Comments on “mabs multicast authentication based on batch signature”
Comments on “mabs multicast authentication based on batch signature”
 
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
 
Energy efficient protocol for deterministic
Energy efficient protocol for deterministicEnergy efficient protocol for deterministic
Energy efficient protocol for deterministic
 
A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
A Privacy-Preserving Location Monitoring System for Wireless Sensor NetworksA Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
 

Recently uploaded

Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 

Recently uploaded (20)

Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 

An adaptive power controlled mac protocol for

  • 1. 226 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO. 1, JANUARY 2009 An Adaptive Power Controlled MAC Protocol for Wireless Ad Hoc Networks Pan Li, Xiaojun Geng, and Yuguang Fang Abstract—Transmission power control (TPC) has been exten- close a transmitter may be to its intended receiver. Second, sively used not only to save energy, but also to improve the the spatial reuse of the network is low. According to IEEE network throughput in wireless ad hoc networks. Among the 802.11 MAC, when one node is transmitting, the other nodes existing throughput-oriented TPC protocols, many can achieve significant throughput improvement but have to use multiple in its physical carrier sensing range should keep silent to channels and/or multiple transceivers, and others just require avoid interference. Thus, even those transmissions that will a single channel and a single transceiver but can only have not interfere with the ongoing one are still blocked. limited throughput enhancement. In this paper, we propose a Since in some cases the nodes in ad hoc networks have lim- new adaptive transmission power control protocol, ATPMAC, which can improve the network throughput significantly using a ited power, energy is indeed a very important issue. Many pro- single channel and a single transceiver. Specifically, by controlling tocols are proposed to save the power consumption, like those the transmission power, ATPMAC can enable several concurrent in [6] [7] [8]. In these protocols, nodes transmit RTS/CTS at transmissions without interfering with each other. Moreover, the same maximum power, and transmit DATA/ACK at the ATPMAC does not introduce any additional signalling overhead. minimum power needed for successful transmission, which We show by simulations that ATPMAC can improve the network throughput by up to 136% compared to IEEE 802.11 in a random depends on the link distance, as well as the interference level topology. at the receiver. By doing this, the transmission power can be saved. Unfortunately, the spatial reuse is pretty low, and many Index Terms—Wireless ad hoc networks; MAC protocol; transmission power control. collisions happen between the control packets (RTS/CTS) and the data packets (DATA/ACK) due to different physical carrier sensing ranges. Thus, the network throughput cannot I. I NTRODUCTION be improved. A WIRELESS ad hoc network is a network where nodes communicate with each other via wireless medium di- rectly or indirectly with the help of other nodes. It has gained On the other hand, there are also some papers focusing on the throughput enhancement. [9] [10] propose to use two channels, and two transceivers, to improve the network popularity recently due to its easy and quick deployment throughput. Significant improvements over IEEE 802.11 MAC with low cost. In ad hoc networks, the wireless channel is are observed in simulations. However, the use of multi-channel shared by all the nodes, and hence a medium access control and multi-transceiver introduces additional hardware cost and (MAC) protocol is needed to coordinate their transmissions implementation complexity. to reduce the collision. Although it was initially standardized Recently, Jia et al. [5] and Ding et al. [4] propose δ-PCS for wireless local area networks (WLANs), IEEE 802.11 DCF and DEMAC, respectively, to improve the network throughput (Distributed Coordination Function), known as Carrier Sense using a single channel and a single transceiver. These two Multiple Access with Collision Avoidance (CSMA/CA), with protocols try to adjust the transmission power for each packet an optional use of RTS/CTS [2], is now also widely used as so that the transmission can be successful and at the same time the MAC protocol in wireless ad hoc networks. it will not cause too much interference to other transmissions. However, the IEEE 802.11 MAC has two main disadvan- Since δ-PCS and DEMAC still work under the same decision tages when used in ad hoc networks. First, energy is used rule as IEEE 802.11, they only achieve limited improvement. inefficiently. IEEE 802.11 MAC uses the same transmission power for all nodes to transmit all their packets, no matter how Muqattash and Krunz [11] also propose in a throughput- oriented MAC protocol utilizing a single channel and a Manuscript received September 7, 2008; revised December 24, 2007; single transceiver, called POWMAC. Different from the above accepted January 10, 2008. The associate editor coordinating the review of this paper and approving it for publication was T. Hou. protocols, POWMAC uses a new decision rule: when a node This work was supported in part by the U.S. National Science Foundation overhears other nodes’ transmissions, it is still allowed to carry under grants CNS-0721744 and DBI-0529012. The work of Fang was also out its own DATA transmission as long as it does not interfere supported in part by the National Science Council (NSC), R.O.C., under the NSC Visiting Professorship with contract number NSC-96-2811-E-002- with the ongoing ones. Thus, according to POWMAC, several 010 and Chunghwa Telecom M-Taiwan Program M-Taoyuan Project under transmissions can happen concurrently. Contract Number 97SC06. However, POWMAC cannot gain dramatic improvement P. Li and Y. Fang are with the Department of Electrical and Computer Engineering, University of Florida, Gainesville, Florida 32611-6130 (e-mail: on network throughput due to the following two reasons. lipanleo@ufl.edu, fang@ece.ufl.edu). First, it introduces additional signalling overhead. Specifically, X. Geng is with the Department of Electrical and Computer Engi- N (N > 1) concurrent transmissions require N RTS/CTS neering, California State University, Northridge, CA 91330 (e-mail: xj- geng@csun.edu). exchanges. This overhead gets more serious when the channel Digital Object Identifier 10.1109/T-WC.2009.070993 rate for data transmission increases. Second, several concur- 1536-1276/09$25.00 c 2009 IEEE
  • 2. LI et al.: AN ADAPTIVE POWER CONTROLLED MAC PROTOCOL FOR WIRELESS AD HOC NETWORKS 227 rent DATA transmissions may not take place if they are not where Pt and Pr are the transmitted power and the received synchronized due to the existence of propagation delay. We power, respectively, Gt and Gr are the gain factors for the will discuss this further later. transmitter antenna and the receiver antenna, respectively, ht In this paper, we propose a new adaptive transmission and hr are the antenna heights of the transmitter and the power controlled MAC protocol, called ATPMAC, to enhance receiver, respectively, d is the distance between transmitter and the network throughput using a single channel and a single receiver, L is the system loss factor not related to propagation transceiver. ATPMAC adopts the same decision rule as POW- (L ≥ 1), λ is the wavelength, h(·) is a function, and γ is the MAC to enable concurrent transmissions. But, ATPMAC does path loss exponent. not incur any additional signalling overhead, i.e., only one RTS/CTS exchange for N (N > 1) concurrent transmissions. III. T HE P ROPOSED MAC P ROTOCOL : ATPMAC Moreover, ATPMAC provides two solutions to the synchro- According to IEEE 802.11 MAC protocol, every node has nization problem mentioned above so that the concurrent to carry out the physical carrier sensing before transmitting DATA transmissions can happen even though the propagation RTS, CTS, or DATA packets (but not ACK packets). If the delay exists. By doing this, ATPMAC can achieve significant channel is sensed to be busy, then the nodes cannot transmit throughput improvement over IEEE 802.11, which is up to those packets. As a result, the spatial reuse is pretty low 136% in a random topology as we will show by simulations. because each time the channel can be used by only one pair of The rest of this paper is organized as follows. In Section transmitter and receiver, even though some other transmissions II, we briefly introduce the operations of IEEE 802.11 DCF may not interrupt the ongoing transmission. The exposed protocol and the power propagation model. Section III details terminal problem can be such an example. our proposed ATPMAC protocol. Some simulation results are In this paper, we propose a single-radio, single-channel, and shown in Section IV. We finally conclude this paper in section single-rate MAC protocol to improve the spatial reuse by con- V. trolling the transmission power so that several transmissions can be allowed at the same time without interfering with each II. P RELIMINARIES other. This is an adaptive transmission power control MAC A. IEEE 802.11 MAC protocol, which we call ATPMAC. The idea here is that a The fundamental access method of the IEEE 802.11 MAC is new transmission can still be allowed as long as it does not a DCF (Distributed Coordination Function) known as Carrier interfere with the ongoing transmission. Sense Multiple Access with Collision Avoidance (CSMA/CA) ATPMAC does not use any new control packets other than with an option of RTS/CTS. The four-way handshake proce- RTS and CTS. Neither does it incur any other signalling dure (RTS/CTS/DATA/ACK), which is used to deal with the overhead than one RTS/CTS handshake before a DATA trans- hidden terminal problem, is as follows. Before a node begins to mission. Instead, one RTS/CTS handshake can be followed by transmit, it should first sense the channel to determine whether several concurrent DATA transmissions, which do not interfere there is any ongoing transmission. If the channel is busy, the with each other. Specifically, in ATPMAC, the nodes that node shall defer until the channel is sensed idle for a period overhear RTS or CTS can make a decision on whether they of DIFS. Then the node randomly chooses a backoff period can transmit DATA packets to their intended receivers based according to the contention window and starts a backoff timer on some useful information carried by RTS/CTS. to backoff. The backoff timer decreases by 1 after the channel We will first introduce a table maintained by each node is idle for the duration of a slot. If the channel is sensed busy in Section III-A, and then explain in details how ATPMAC during any slot in the backoff interval, the backoff timer will works when a node overhears CTS and RTS, respectively, in be suspended. It can be resumed only after the channel is idle Section III-B and Section III-C. After that, we will introduce for a period of DIFS again. After the backoff timer reduces how we tune the physical carrier sensing threshold in order for to 0, the sender transmits a RTS omnidirectionally. After ATPMAC to work more effectively in Section III-D, and give correctly receiving the RTS, the receiver responses with a some more discussions in Section III-E, respectively. We also CTS after a period of SIFS. Similarly, after correctly receiving compare ATPMAC with POWMAC at the end of this section. the CTS, the sender begins to transmit the data a period of SIFS later. This transmission ends after the receiver correctly A. A Table Maintained by Each Node receives the data and responses with an ACK. All four kinds As shown in Table I, each node maintains a table to keep of frames contain an estimated duration of the rest time of the some information of their neighboring nodes. “Node ID” is the transmission. Other nodes that receive these frames update MAC address of a neighboring node. “Min Power”, denoted their NAVs (Network Allocation Vector) with the duration. by Pmin , is the minimum transmission power required to suc- Every NAV decreases by 1 after a time slot. Those nodes are cessfully send a packet to that neighboring node when it does only allowed to transmit after they sense the channel idle for not suffer from any other interferences. “Max Power”, denoted a period of DIFS after their NAVs expire. by Pmax , is the maximum transmission power allowed for the current node keeping this table to transmit packets when B. Power Propagation Models that neighboring node is engaged in one transmission. “NAV” The power propagation models are used to predict received is the time that the neighboring node will finish its ongoing signal strength. A general model [13] is given as follows: transmission. Each time a node overhears a packet from one 1 of its neighboring nodes, it updates this table. The details will Pr (d) = Pt h(Gt , Gr , ht , hr , L, λ) γ (1) be introduced later. d
  • 3. 228 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO. 1, JANUARY 2009 TABLE I S OME INFORMATION OF NEIGHBORING NODES . Besides, we also add another new field called “Interference Level” in our CTS frame, which is the maximum average Node ID Min Power (Pmin ) Max Power (Pmax ) NAV interference level each neighboring node is allowed to generate to receiver j. Denote “Interference Level” by Pinterf . We can B. Overhearing CTS obtain i Pr In this subsection, we introduce how ATPMAC works when j SIN R− Pnoise a node overhears CTS. Pinterf = N · (1 + β) When a receiver j receives RTS from a transmitter i, it can i i Pr − SIN R · Pnoise detect the reception power Pr , and obtain the transmission = (6) i N · (1 + β) · SIN R power Pt , which is a new field we add in RTS frames. According to the power propagation model in (1), we have where SINR is the signal-to-interference and noise ratio re- quired to support a certain data rate (SINR is a constant since i Pti Pr = C · , (2) we do not consider rate adaptation here), N is the number dγ ij of the neighboring nodes of the receiver j, which can be where dij is the distance between node i and node j, and C obtained by checking the number of nodes in Table I, and is a constant. β(β > 0) indicates the interference caused by the nodes out Denote the receiver sensitivity by RXth . Then, by assum- of the transmission range, which is about 0.5 for the two-ray ing the physical channel is symmetric, the minimum power propagation model and uniformly distributed terminals [14]. required for the receiver j to successfully transmit a packet to After a CTS is sent out, some neighboring nodes of the i the transmitter i, i.e., Pmin as mentioned before, satisfies receiver j may overhear it and hence can update their infor- j i mation about node j. Pmin is calculated similar to (4), i.e., Pmin RXth = C · . (3) Ptj · RXth dγij j Pmin = . (7) j Pr From (2) and (3), we can get Then, next time when a neighboring node k wants to send i Pti · RXth packets to node j, it can carry out the transmission only if its Pmin = i . (4) Pr k maximum allowed transmission power, Pallow , is no smaller j i After obtaining Pmin , the receiver j should check in Table than Pmin . I to find those active neighboring nodes denoted by set S, i.e., Since this CTS contains the transmission power of receiver j, denoted by Ptj , for a neighboring node k, we have S = {k | N AV k > tnow } j Ptj k where N AV is the time that neighboring node k will finish Pr = C · , (8) dγ jk its ongoing transmission, and tnow is the current time. Then, the maximum allowed transmission power of the receiver j, and j j Pmax denoted by Pallow , is Pinterf = C · . (9) dγjk k j mink∈S {Pmax } if S = ∅ Pallow = (5) where djk denotes the distance between receiver j and the PMAX if S = ∅ j neighboring node k, and Pmax is the maximum transmission k where Pmax is the maximum transmission power of node power allowed for node k to transmit packets without affecting j at which j’s transmission will not interfere with k’s, ∅ the reception of the following DATA packets at receiver j. stands for the empty set, and PMAX is the maximum allowed From (8) and (9), we obtain transmission power of the nodes. We will present how to k j Pinterf · Ptj obtain Pmax shortly. Pmax = j . (10) j i Pr If Pallow is less than Pmin , then the receiver j is not allowed to reply with CTS because this CTS will definitely After successfully overhearing the CTS from node j, a not received by the transmitter. Otherwise, CTS is transmitted neighboring node k will update the NAV field in Table I for j after a period of SIF S with the transmission power Pallow . node j. If node k does not want to send out any packets, it does j Thus, this CTS transmission will not interfere with j’s active not set its NAV. With Pallow defined in (5), even later it has neighboring nodes’ transmissions, and it is possible that this some packets to transmit, those transmissions will not interfere CTS could be correctly received. with j’s reception. Or, if it has a DATA packet for node j, The same as RTS frame, our CTS frame also contains its node k will set its NAV in the same way as that defined in transmission power. Since the CTS frame defined in IEEE IEEE 802.11 standard. If the neighboring node k has a DATA 802.11 standard only has the MAC address of the frame’s packet for some node l other than node j, it will also set its k l receiver, we add a new field called “Transmitter Address” in NAV if Pallow < Pmin . It can carry out the transmission a our CTS frame to put in the MAC address of the frame’s period of SIFS later only if the maximum transmission power transmitter. By doing this, other nodes overhearing CTS from of node k is no smaller than the minimum transmission power the receiver j can update their information about j kept in required to transmit packets to node l. Thus, there is a good Table I. We will introduce this process later. chance that some neighboring nodes of receiver j can transmit
  • 4. LI et al.: AN ADAPTIVE POWER CONTROLLED MAC PROTOCOL FOR WIRELESS AD HOC NETWORKS 229 Transmission 1 RTS CTS DATA ACK SIFS SIFS SIFS SIFS SIFS Transmission 2 DATA ACK Transmission 3 DATA ACK Fig. 2. An example that three concurrent transmissions have DATA packets i j k l of different lengths. power of the ACK packet. Thus, node i can calculate the maximum average interference level each neighboring node is i allowed to node i, denoted by Pinterf , in a way similar to (6), i.e., Fig. 1. An example that two concurrent transmissions happen after a CTS j i Pr − SIN R · Pnoise is overheard. The big circle is the carrier sensing range, and the small circle Pinterf = . is the transmission range. N · (1 + β) · SIN R j Besides, node i also updates Pmin in Table I according to (7). DATA packets at the same time as node i, and the spatial reuse can be highly improved. Next time, when node i has a RTS packet to transmit, it will put Pti and Pinterf in two new fields of the RTS frame, i For example, as shown in Fig. 1, node j is both in the respectively, i.e., “Transmission Power” and “Interference transmission range of node i and in that of node k; node k is outside the transmission range, but within the carrier sensing Level”. Any neighboring node that overhears this RTS will update their Pmin , Pmax , and N AV i in Table I accordingly. i i range of node i; node l is within the transmission range of node After successfully overhearing the RTS packet from node i, if k, and outside the carrier sensing range of node i. Assume there are two flows, one from node i to node j, and the other a neighboring node k does not want to send out any packets, it will not set its NAV. Or, if it has a DATA packet for node from node k to node l. According to IEEE 802.11, there can be only one transmission at a time. However, according to our i, node k will set its NAV in the same way as that defined in IEEE 802.11 standard. If the neighboring node k has a DATA proposed ATPMAC, these two flows may happen at the same packet for some node l other than node j, it will also set time after node k overhears a CTS from node j. k l its NAV if Pallow < Pmin . It can carry out the transmission Moreover, it is possible that different transmissions have a period of 2 ∗ SIF S + TCT S later only if the maximum DATA packets of different lengths. Should they be carried out transmission power of node k is no lower than the minimum concurrently? We contend that they should still be allowed to. transmission power required to transmit packets to node l. As shown in Fig. 2, there are three transmissions beginning Thus, there is a good chance that some neighboring nodes of at the same time. The DATA packet of transmission 1 is transmitter i can transmit DATA packets at the same time as longer than that of transmission 2, and shorter than that of node i, and the spatial reuse can be highly improved. transmission 3. However, all the three DATA packets are still able to be followed by ACK packets since the receiver does For example, as shown in Fig. 3, node j and node l are not need to do the physical carrier sensing before transmitting both in the transmission range of node k; node i is in the the ACK packets. transmission range of node j, but outside the carrier sensing Besides, if a neighboring node k of receiver j is allowed range of node k; node l is in the transmission range of node k, to transmit a DATA packet to node l, it is still possible but outside the carrier sensing range of node j. Assume there that node l cannot successfully receive the DATA packet, are two flows, one from node j to node i, and the other from or node k cannot successfully receive the ACK packet. If node k to node l. According to IEEE 802.11, node j and node node k performs according to IEEE 802.11, it will double k will fairly contend with each other for the channel and there its contention window and retransmit the data again. This may is only one transmission at a time. However, according to our lead to the starvation of node k if node i and node j keep using proposed ATPMAC, two DATA transmissions from node j and the channel, which is unfair. As a result, in our MAC protocol, node k, respectively, may happen at the same time after one node k does not double its contention window if this DATA node overhears a RTS from the other, and two ACKs from transmission is not successful. Thus, after the transmission of node i and node l, respectively, may also both be received node i and node j terminates, node k can contend for the successfully. channel with node i and j fairly. Besides, as we have explained in Section III-B, even if several transmissions have DATA packets of different lengths, they are still allowed to happen at the same time; even if the C. Overhearing RTS DATA transmission of a neighboring node k (or j) overhearing Next, we introduce how ATPMAC works after a node a RTS fails, node k (or j) does not double its contention overhears RTS. window. We add a new field in our ACK frames called “Transmission Furthermore, let us consider a special case when both Power” to put in the transmission power Ptj of the ACK overhearing a RTS and overhearing a CTS occur to the same packets. So, when node i receives an ACK from node j, it node which plans to have a DATA transmission. Assume a j can obtain the reception power Pr , as well as the transmission node overhears a RTS packet and is allowed to carry out DATA
  • 5. 230 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO. 1, JANUARY 2009 i j RTS CTS DATA ACK k l RTS CTS DATA ACK Fig. 4. An example that two transmissions in Fig. 1 are partially overlapping. k becomes a hidden terminal to the transmission from node i i j k l to node j. However, if node k does not transmit RTS when node j is receiving RTS from node i, then node k will receive CTS from node j and begins to transmit DATA packet at the same time as node i. If node k transmits RTS when node j is receiving RTS from node i, its transmission will not interfere with node j’s reception if node k is a little bit further away Fig. 3. An example that two concurrent transmissions happen after a RTS from node j. In this case, the transmission from node i to node is overheard. The big circle is the carrier sensing range, and the small circle j and that from node k to node l can be partially overlapping, is the transmission range. as shown in Fig. 4. Moreover, there would be another problem if the physical transmission. If later this node overhears a CTS packet and is carrier sensing range is larger than the transmission range. not allowed to carry out the transmission any more, then it For example, as shown in Fig. 3, assume node l is within the does not carry out the transmission as planned and waits until carrier sensing range of node j. If node k wins the channel the channel is idle without doubling its contention window. and transmits RTS to node l, node j can correctly receive Again, this is for the fairness issue. this packet and plans to transmit DATA packet at the same time as node k. However, a period of SIFS later node j will D. Tuning the Physical Carrier Sensing Threshold overhear the CTS from node l, and hence will set its NAV with IEEE 802.11 standard defines two important concepts: a length of EIFS after the CTS transmission is finished, which transmission range and physical carrier sensing range, which prevents it from transmitting DATA packet to node i. We call are determined by receiver sensitivity and physical carrier this problem the transmitter blocking problem. Similarly, if sensing threshold, respectively. Two nodes within the trans- node i is within the carrier sensing range of node k, node k mission range of each other can communicate directly, and cannot transmit its DATA packet as it has planned after node two nodes within the physical carrier sensing range of each k first receives RTS from node j, and then overhears CTS other cannot transmit packets at the same time. from node i. However, by setting the physical carrier sensing As shown in [15], physical carrier sensing range has a range to the same as the transmission range, this problem can great impact on the network throughput. On one hand, the be overcome. increase of physical carrier sensing range can alleviate the hidden terminal problem, which helps increase the throughput. E. More Discussions On the other hand, as physical carrier sensing range increases, As we discussed in Section III-B and Section III-C, one the spatial reuse decreases, which impairs the throughput. As node overhearing RTS or CTS will wait for a period of a result, there exists an optimal physical carrier sensing range TCT S + 2 ∗ SIF S or SIF S, respectively, to initiate a DATA with respect to a certain transmission range, which is usually transmission. However, taking the propagation delay into con- larger than the transmission range. sideration, we need to recalculate this waiting time. Otherwise, Certainly, this is true for wireless networks using IEEE our proposed ATPMAC may not work effectively. 802.11. However, with respect to our proposed ATPMAC, we For example, there are two concurrent transmissions in Fig. contend that this is not necessarily the case. As shown in Fig. 5. Due to different propagation delays, if the DATA packet 1, if node k wins the contention with node i for the channel, from node k arrives earlier at node j than that from node i, it will start the four-way handshake (RTS/CTS/DATA/ACK) then node j will start to receive node k’s DATA packet instead with node l. Since node j is in the carrier sensing range of of node i’s. Even if the reception power of the DATA packet node l, it will keep silent for a period of EIF S after the ACK from node i is much higher than that of the DATA packet from node l is received by node k. Thus, when node i attempts from node k, node j still cannot correctly receive from node i to send RTS to node j, it cannot respond with CTS, which is according to IEEE 802.11 standard. In this case, node j cannot the receiver blocking problem. Due to this problem, ATPMAC receive any packet. The same thing happens to node l if node cannot increase the throughput much because it relies on node i’s DATA packet arrives at node l a little bit earlier than node j’s CTS to schedule the concurrent transmissions. k’s DATA packet. To address this problem, we propose to set physical carrier We find that there are two solutions to this problem due sensing threshold equal to receiver sensitivity such that the to the imperfect synchronization between concurrent DATA carrier sensing range is the same as the transmission range. transmissions. Thus, in Fig. 1, if node j successfully receives a RTS from Solution One: We can address this problem if every node node i, it can still reply with a CTS even if node l is knows the exact locations of their two-hop neighboring nodes. transmitting an ACK to node k. Besides, we notice that node Again, there are two cases:
  • 6. LI et al.: AN ADAPTIVE POWER CONTROLLED MAC PROTOCOL FOR WIRELESS AD HOC NETWORKS 231 i j RTS CTS DATA ACK k l RTS CTS DATA ACK SIFS SIFS SIFS SIFS i j RTS CTS DATA ACK k l DATA ACK Fig. 6. Another example that two transmissions in Fig. 1 are partially overlapping. Fig. 5. A problem when we consider the propagation delay. if a node is able to turn to receive a new packet with much • Overhearing CTS: As shown in Fig. 1, if node k over- higher reception power when it has already begun to receive hears CTS from node j, then, in order for node j and a packet, our problem shown in Fig. 5 can be solved. node l to be able to receive the DATA packet from node Fortunately, there do exist such designs that support the i and node k, respectively, we need capture of a stronger new packet. One example is Lucent’s k tji + SIF S + tij ≤ tjk + Twait + tkj physical layer (PHY) design with “Message-In-A-Message” (MIM) support [3], where a MIM receiver is able to correctly and detect and capture a strong frame during its reception of a k tjk + Twait + tkl ≤ tji + SIF S + til weak frame [12]. k Besides, with enhanced capture capability, some transmis- where Twait is node k’s waiting time before it trans- sions that cannot happen according to IEEE 802.11 can now mits its DATA packet after overhearing a CTS, and be carried out. For example, in Fig. 1, if node k transmits RTS tmn (m, n ∈ {i, j, k, l}) is the propagation delay from before node i does, node j will not be able to receive the RTS node m to node n. Assume tmn = tnm . Thus, we need from node i according to IEEE 802.11 standard. However, k to choose a Twait satisfying with the enhanced capture capability discussed above, the k T1 ≤ Twait ≤ T2 (11) transmission between node i and node j may be carried out as shown in Fig. 6. where T1 = SIF S + 2(tji − tjk ), and T2 = SIF S + In our proposed ATPMAC, we use the second solution as tji + til − tjk − tkl . the default one while making the first solution as an option. • Overhearing a RTS: Similarly, as shown in Fig. 3, if node k overhears RTS from node j, then, in order for node i and node l to be able to receive the DATA packet from F. Comparison with POWMAC node j and node k, respectively, we need The proposed ATPMAC seems similar to POWMAC [11] k in the sense that in both protocols the nodes overhearing tji + 2 · SIF S + CT S + tij + tji ≤ tjk + Twait + tki some transmissions are still allowed to carry out their own and transmissions as long as they will not interfere with the ongoing ones. However, as we have shown above, ATPMAC k tjk + Twait + tkl ≤ tji + 2 · SIF S + CT S + tij + tjl has several advantages over POWMAC: k Thus, we need to choose a Twait satisfying • Firstly, our proposed ATPMAC has much smaller over- k head than POWMAC. In ATPMAC, N (N ≥ 1) concur- T3 ≤ Twait ≤ T4 (12) rent DATA transmissions only need one RTS/CTS hand- where T3 = 2 · SIF S + CT S + 3tij − tjk − tki , and shake. In contrast, according to POWMAC, N concurrent T4 = 2 · SIF S + CT S + 2tij + tjl − tjk − tkl . DATA transmissions should be proceeded by N RTS/CTS handshakes. This solution has two limitations. First, it requires some • Secondly, POWMAC suffers from the problem shown position information, which results in higher cost. Second, it in Fig. 5, which is caused by propagation delay, while can only make concurrent transmissions happen after CTS is ATPMAC has addressed that. Notice that this problem overheard and RTS is overheard if T1 ≤ T2 in (11), and T3 ≤ is one source of ineffectiveness in POWMAC because T4 in (12), respectively, i.e., several transmissions may not be able to be carried out tij + tkl ≤ tkj + til (13) concurrently as planned. • Thirdly, ATPMAC is much simpler than POWMAC. It is and much easier to implement ATPMAC than to implement tij + tkl ≤ tki + tjl (14) POWMAC, yet ATPMAC can achieve better performance than POWMAC as we will show in Section IV. respectively, which means it can only address the problem in We notice that ATPMAC also has some limitations. For certain scenarios. example, ATPMAC does not take node mobility into con- Solution Two: By carefully looking into this problem, we sideration, hidden problems still exist, and so on. We will find that it is related to the capture capability of the nodes. investigate these issues in the future. Specifically, according to IEEE 802.11 standard, if a node first receives a packet, and then another packet arrives, the new packet can only be considered as interference, no matter how IV. P ERFORMANCE E VALUATION high the reception power of this new packet is. In other words, In this section, we use NS2 (version 2.29) to evaluate the a node can only receive the packet that arrives first. However, proposed ATPMAC protocol and compare its performance
  • 7. 232 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO. 1, JANUARY 2009 TABLE II 1600 S IMULATION PARAMETERS . Parameters Value 1400 ATPMAC POWMAC Channel frequency 2.4 GHz IEEE 802.11 Data rate 1 Mbps 1200 Basic rate 1 Mbps SINR threshold 4 dB Network Throughput (kbps) 1000 Packet size 2000 bytes Transmission range 250 meters Carrier sensing range 250 meters 800 RTS retry limit 7 600 d ij d jk d kl 400 i j k l 200 Fig. 7. A simple topology where every node is a one-hop neighbor of the 0 other three nodes. 0 100 200 300 400 500 600 Data Sending Rate (kbps) 700 800 900 1000 (a) with POWMAC [11], and IEEE 802.11 MAC. We compare 1200 ATPMAC with POWMAC because the latter one is also a transmission power control MAC protocol based on a single- ATPMAC POWMAC channel, single-transceiver design, and it shares some common 1000 IEEE 802.11 features with ATPMAC. We do not compare ATPMAC with those protocols like [6] [7] because their main objective is to 800 Network Throughput (kbps) save energy and they can achieve comparable throughput to that of IEEE 802.11 MAC at best. Neither do we compare 600 ATPMAC with those protocols with multi-channel and/or multi-transceivers [9] [10]. Besides, as we mentioned before, POWMAC suffers from 400 the problem shown in Fig. 5 due to the existence of propa- gation delay. In order to make fair comparisons, we improve 200 POWMAC by addressing this problem when we implement it. Some of our simulation parameters are shown in Table II. 0 0 100 200 300 400 500 600 700 800 900 1000 Data Sending Rate (kbps) A. A One-hop Scenario (b) We first conduct simulations in a one-hop scenario shown 800 in Fig. 7, where the distances between node i and node j, between node j and node k, and between node k and node l, 700 are denoted by dij , djk , and dkl , respectively. There are two 600 flows in this network, one from node i to node j, and the other from node k to node l. Network Throughput (kbps) 500 ATPMAC Case 1: dij = 35 meters, djk = 135 meters, and dkl = 35 POWMAC IEEE 802.11 meters. In this case, the two flows can happen concurrently 400 without interfering with each other according to both ATP- MAC and POWMAC, while only one flow can be carried out 300 at a time according to IEEE 802.11 MAC. 200 The network throughput is shown in Fig. 8(a). Since the proposed ATPMAC does not introduce any additional over- 100 head, the network throughput of ATPMAC is almost two times that of IEEE 802.11 MAC. POWMAC achieves about 82% 0 0 100 200 300 400 500 600 700 800 900 1000 higher throughput than IEEE 802.11 MAC due to the increased Data Sending Rate (kbps) (c) overhead. Thus, the network throughput of ATPMAC is higher than that of POWMAC by up to 10%. Fig. 8. Performance of ATPMAC, POWMAC, and IEEE 802.11 MAC Case 2: dij = 90 meters, djk = 85 meters, and dkl = 35 (corresponding to the topology shown in Fig. 7). (a), (b), and (c) are the performance in Case 1, Case 2, and Case 3, respectively. meters. The network throughput is shown in Fig. 8(b). Accord- ing to ATPMAC, two flows can be carried out concurrently only if node i and node j exchange RTS/CTS before node 50% more than that of IEEE 802.11 MAC. POWMAC has k and node l. Since about half of the time node i transmits a similar case in the sense that only half of the time can RTS before node k and half of the time node k before node two transmissions happen concurrently. Because of additional i, and thus, the network throughput of ATPMAC is about overhead, the network throughput of POWMAC is about 32%
  • 8. LI et al.: AN ADAPTIVE POWER CONTROLLED MAC PROTOCOL FOR WIRELESS AD HOC NETWORKS 233 2500 synchronization problem. In other words, the performance gain ATPMAC POWMAC of ATPMAC over POWMAC is in fact larger that what we IEEE 802.11 2000 have shown. V. C ONCLUSION In this paper, we propose a new adaptive transmission Aggragated Throughput (kbps) 1500 power controlled MAC protocol, known as ATPMAC, which can significantly improve the network throughput using a single channel and a single transceiver. Our simulations show 1000 that ATPMAC can improve the throughput by up to 136% compared to IEEE 802.11 MAC. 500 We must realize that there are some limitations on ATP- MAC. First, it does not address the mobility issue. Second, hidden terminal problems still exist. We will investigate these 0 issues in the future. 0 500 1000 1500 2000 2500 Data Sending Rate (kbps) R EFERENCES Fig. 9. The network throughput of ATPMAC, POWMAC, and IEEE 802.11 in a multi-hop scenario. [1] http://www.cisl.columbia.edu/grads/ozgun/ProjectApplication.html. [2] Wireless LAN medium access control (MAC) and physical layer (PHY) more than that of IEEE 802.11 MAC. Thus, the network specifications, IEEE Standards Working Group, 1999. [3] J. Boer, H. Bokhorst, W. Diepstraten, A. Kamerman, R. Mud, H. Driest, throughput of ATPMAC is more than that of POWMAC by and R. Kopmeiners, Wireless LAN with enhanced capture provision, up to 13%. U.S. Patent 5987033, Nov. 1999. Case 3: dij = 135 meters, djk = 40 meters, and dkl = 35 [4] P. Ding, J. Holliday, and A. Celik. “Demac: an adaptive power control MAC protocol for ad-hoc networks,” in Proc. IEEE 16th International meters. In this case, neither ATPMAC nor POWMAC can Symposium on Personal, Indoor and Mobile Radio Communications make two transmissions happen concurrently due to the seri- (PIMRC’05), Berlin, Germany, Sept. 2005. ous interference between two flows. The network throughput [5] L. Jia, X. Liu, G. Noubir, and R. Rajaraman, “Transmission power con- trol for ad hoc wireless networks: throughput, energy and fairness,” in is shown in Fig. 8(c). ATPMAC achieves almost the same Proc. IEEE Wireless and Communications and Networking Conference, throughput as that of IEEE 802.11 MAC, while POWMAC New Orleans, LA, USA, Mar. 2005. has degradation of about 20%. Thus, the network throughput [6] E. Jung and N. Vaidya, “A power control MAC protocol for ad hoc networks,” in Proc. ACM MobiCom, Atlanta, Georgia, USA, Sept. 2002. of ATPMAC is more than that of POWMAC by up to 12%. [7] P. Karn, “MACa: a new channel access method for packet radio,” in Proc. 9th ARRL Computer Networking Conference, London, Ontario, B. A Multi-hop Scenario Canada, 1990. [8] A. Lim and S. Yoshida, “A power adapted MAC (PMAC) scheme for We than evaluate the performance of ATPMAC, POWMAC, energy saving in wireless ad hoc networks,” IEICE Trans. Fundamentals and IEEE 802.11 MAC in a multi-hop scenario. We use a of Electronics, Commun. and Computer Sciences, vol. E88-A, no. 7, pp. 1836–1844, July 2005. 1000m x 1000m 2D topology where there are 50 randomly dis- [9] J. Monks, V. Bharghavan, and W. Hwu, “A power controlled multiple ac- tributed nodes. Ten nodes are chosen to be CBR (Constant Bit cess protocol for wireless packet networks,” in Proc. IEEE International Rate) sources and their destination nodes are randomly chosen. Conference on Computer Communications (INFOCOM’01), Anchorage, Alaska, USA, Apr. 2001. The network uses AODV (Ad Hoc OnDemand Distance Vector [10] A. Muqattash and M. Krunz, “Power controlled dual channel (PCDC) Routing) routing protocol. The simulation parameters are the medium access protocol for wireless ad hoc networks,” in Proc. IEEE In- same as those shown in Table II except that the data rate is 2 ternational Conference on Computer Communications (INFOCOM’03), San Francisco, California, USA, Mar. 2003. Mbps and the SINR is 7db [1]. Fig. 9 shows the simulation [11] A. Muqattash and M. Krunz, “Powmac: a single-channel power-control result. We can see that ATPMAC can achieve up to 136% protocol for throughput enhancement in wireless ad hoc networks,” higher throughput than that of IEEE 802.11, and 32% higher IEEE J. Select. Areas Commun., vol. 23, no. 5, pp. 1067–1084, May 2005. throughput than that of POWMAC. This is because in multi- [12] T. Nadeem, L. Ji, A. Agrawala, and J. Agre, “Location enhancement to hop networks ATPMAC can make concurrent transmissions ieee 802.11 DCF, in Proc. IEEE International Conference on Computer happen whenever possible without introducing any additional Communications (INFOCOM’05), Miami, FL, USA, Mar. 2005. [13] T. Rappaport, Wireless Communications: Principles and Practice overhead, while POWMAC allows concurrent transmissions (Second Edition). Prentice-Hall PTR, 2002. at the cost of more signaling overhead, i.e., N RTS/CTS [14] T. Rappaport and L. Milstein, “Effects of radio propagation path loss on exchanges for N concurrent transmissions. This overhead DS-CDMA cellular frequency reuse efficiency for the reverse channel,” IEEE Trans. Veh. Technol., vol. 41, Aug. 1992. becomes more significant when the data rate increases. [15] H. Zhai and Y. Fang, “Physical carrier sensing and spatial reuse in As a remark, we must note that the actual performance multirate and multihop wireless ad hoc networks,” in Proc. IEEE In- of the original POWMAC should be worse than what we ternational Conference on Computer Communications (INFOCOM’06), have shown above, because it does not address the imperfect Barcelona, Spain, Apr. 2006.