ArticlePDF Available

Performance evaluation of multihop ad hoc WLANs

Authors:

Abstract

Ongoing technological advances in portable devices, coupled with the need for continuous connectivity while mobile, have made ad hoc networks a compelling research and development topic, particularly in a challenging multimedia multihop scenario. The ability of IEEE 802.11's ad hoc mode of operation, as a dominating wireless local area network (WLAN) protocol, to serve multihop networks requires thorough investigation. In this article, through considering crucial real-life physical phenomena and avoiding as many confining assumptions as possible, system performance measures such as delay and packet failure rate are evaluated. As a result, the importance of adequate selection of the system parameters toward performance improvement is underscored. Moreover, the simulation results imply that by complementing through priority provisions, coordination, route reservation, clustering, and optimum channel coding considerations, the IEEE 802.11 medium access control (MAC) protocol can survive in a multihop scenario. The custom simulation environment developed features modularity, comprising traffic generator, mobility, wireless channel, and IEEE 802.11 protocol modules, and is capable of accommodating many more of the physical phenomena involved.
IEEE Communications Magazine • March 2005 107
0163-6804/05/$20.00 © 2005 IEEE
TOPICS IN ADHOC NETWORK
INTRODUCTION
Mobile computing continues to enjoy rapid
growth thanks to ongoing technological advances
in portable devices, which have led to lowering
power consumption and lengthening the battery
life span. Simultaneously, the need for continu-
ous connectivity while roaming has put ad hoc
networks at the center of attention of researchers
and the industry over the past few years. Porta-
bility and mobility are greatly consistent with the
infrastructureless nature of ad hoc networks.
This has made mobile ad hoc networks
(MANETs) a compelling research topic. On the
other hand, viewed as either a standalone net-
work or a last-mile wireless connection to the
Internet, ad hoc networks have the capability of
expansion through multihopping. Multihop
MANETs, in situations where they are supposed
to support multimedia, present a challenge in
many aspects. This is attributed to the fact that
applications of different natures demand differ-
ent treatments. Multihop MANETs [1, 2] have
features that distinguish them from wired and
infrastructured wireless networks. These features
can be enumerated as: unpredictable link prop-
erties, node mobility, limited battery life, route
maintenance, security, hidden terminal, exposed
terminal, and capture effect.
In a multihop ad hoc network, nodes commu-
nicate with each other using several wireless
links, and there is no fixed infrastructure such as
a base station. Each node in the network also
acts as a router, forwarding data packets to
other nodes. One of the important challenges in
the design of multihop ad hoc networks (not our
concern here) is the development of routing pro-
tocols that can efficiently find routes between
two communication nodes [3]. In multihop ad
hoc networks, due to the numerous variables
involved, system multidimensionality grows sig-
nificantly, thus making analytical modeling a
harder task. Turning to simulation enables us to
investigate a greater number of phenomena and
possibly more involved models regarding traffic,
channel, and so on. In such a complex system,
adequate selection of the system parameters can
lead to considerable improvement in perfor-
mance, especially for time-sensitive applications.
Among similar attempts in the literature, [4]
studies the performance of the multihop ad hoc
IEEE 802.11 wireless LAN (WLAN) in various
mobility and traffic volumes. It proposes a piggy-
back reservation protocol in which neighbors
that hear the data packet are blocked and avoid
colliding by returning acknowledgment (ACK).
Furthermore, they learn about the next packet
transmission time. Likewise, neighbors of the
receiver that hear the ACK will avoid transmit-
ting at the time when the receiver is scheduled
to receive the next data packet. Another related
work [5] compares two different feedback mech-
anisms, explicit (per hop) vs. end-to-end ACK,
in multihop scenarios. The concept of adaptive
clustering application to multihop ad hoc net-
works was introduced in [6]. In the proposed
architecture, nodes are organized into nonover-
lapping clusters. The clusters are independently
controlled and dynamically reconfigured as
nodes move. Adaptive clustering uses code sepa-
ration among different clusters. However, the
Farshad Eshghi, Ahmed K. Elhakeem, and Yousef R. Shayan, Concordia University
ABSTRACT
Ongoing technological advances in portable
devices, coupled with the need for continuous
connectivity while mobile, have made ad hoc
networks a compelling research and develop-
ment topic, particularly in a challenging multi-
media multihop scenario. The ability of IEEE
802.11’s ad hoc mode of operation, as a domi-
nating wireless local area network (WLAN) pro-
tocol, to serve multihop networks requires
thorough investigation. In this article, through
considering crucial real-life physical phenomena
and avoiding as many confining assumptions as
possible, system performance measures such as
delay and packet failure rate are evaluated. As a
result, the importance of adequate selection of
the system parameters toward performance
improvement is underscored. Moreover, the sim-
ulation results imply that by complementing
through priority provisions, coordination, route
reservation, clustering, and optimum channel
coding considerations, the IEEE 802.11 medium
access control (MAC) protocol can survive in a
multihop scenario. The custom simulation envi-
ronment developed features modularity, com-
prising traffic generator, mobility, wireless
channel, and IEEE 802.11 protocol modules,
and is capable of accommodating many more of
the physical phenomena involved.
Performance Evaluation of
Multihop Ad Hoc WLANs
ESHGHI LAYOUT 2/16/05 11:03 AM Page 107
IEEE Communications Magazine • March 2005
108
work is not particularly about the IEEE 802.11
protocol. A very recent related work [7] discuss-
es priority considerations that are implemented
through queuing and contention window manip-
ulations. The motivation for our work herein is
to compensate for the fact that all the past simu-
lation efforts have adopted too many restrictive
assumptions, and to find out if 802.11’s ad hoc
mode can serve as the core building block of a
multihop MANET. We have tried to develop a
thorough simulation environment spanning both
medium access control (MAC) and physical
(PHY) layers that considers mobility and varying
wireless channel as well as forward error correc-
tion (FEC) using turbo coding.
The simulation is arranged in a module-based
manner where each independently implemented
module copes with one unique process, while
exchanging data with other modules through some
defined function values. This makes module
replacement/augmentation task quite simple. Aim-
ing at time-sensitive applications, our goal is to
evaluate the performance measures of the system
such as end-to-end delay and packet failure rate in
different situations (e.g., traffic, mobility) and
against different choices of system parameters
(e.g., fragmentation factor, buffer length, retrans-
mission limit). The article is organized as follows.
A topological description of the system is present-
ed. Traffic generation, mobility, channel, and
802.11 protocol modules are introduced. Key
assumptions made throughout the simulation are
intermittently mentioned when discussing the mod-
ules. Computer simulation results are presented
afterward. Concluding remarks then appear.
SYSTEM DESCRIPTION
A number of ntot nodes with limited buffer size
are uniform-randomly located inside a rectangu-
lar area, laid diagonally between (xmin,ymin) and
(xmax,ymax). These upper and lower limits, togeth-
er with the transmitter’s wireless range, determine
whether a single-hop or multihop scenario is dealt
with for the source-destination communicating
pair of each call. All nodes broadcast their trans-
missions omnidirectionally. As mentioned earlier,
routing is the first concern that distinguishes sin-
gle-hop from multihop. Since our main emphasis
in this article is the interaction of PHY and MAC
layers, we try to make the routing algorithm as
simple and straightforward as possible. As such,
we assume that all nodes are aware of each other’s
geographical location. This can be achieved
through location information (probably acquired
by global positioning system, GPS) exchange
among the nodes and certainly results in some
bandwidth cost. The routing strategy is then
defined as follows. Each node with a packet ready
to be sent picks another node as its intermediate
destination, provided that it is inside the source
node’s coverage area and has the least Euclidean
distance to the packet’s final destination. While
the latter may not be the best routing strategy (in
terms of cost and reliability), in most cases it
leads to the least number of hops traversed and is
of course easy to implement. However, any other
routing algorithm [8] can easily be incorporated
in our simulation environment. The most impor-
tant point that will not be further discussed is the
bandwidth cost of whatever routing strategy is
used. This degrades system performance below
the presented results. In the initialization phase,
some nodes are uniform-randomly selected as
mobile and the rest are left as fixed nodes. The
mobility status will prevail for the whole simula-
tion time. The parameter
along with v, mobile node’s speed, represent the
mobility volume of the system. In a similar way,
uniform-randomly selected nodes are responsi-
ble for generating traffic, while all nodes might
serve as forwarding and final destination nodes
at any time during the simulation. A parameter
representing the population of traffic generating
(active) nodes is defined as
This parameter may serve as the system’s traffic
volume indicator as well. Each active node is
pre-assigned a node as its final destination that
remains unchanged throughout the course of
simulation. This is not considered a simplifying
or restrictive assumption since all the nodes are
randomly located over the network area.
SIMULATION MODULES
TRAFFIC GENERATION
Considering voice connection as a representative
of real-time applications, the packet generation
model employed is an on-off traffic model. This
model has been used extensively in the literature
to model voice communications (e.g., [9]), mostly
because it can efficiently imitate silence/talk spurt
periods of human conversation and can easily be
simulated. Figure 1a illustrates the traffic genera-
Pn
n
mobile active
tot
=.
Pn
n
mobile mobile
tot
=
nn
nn
Figure 1. a) On-off traffic generation model; b) Gilbert model for time variations of the channel.
ACT IDL
0
(a)
r b/s
α
1 α
1 β
βG B
(b)
α'
1 α'
1 β'
β'
Since our main
emphasis in this
article is the
interaction of
physical and MAC
layers, we try to
make the routing
algorithm as simple
and straightforward
as possible. As such,
we assume that all
nodes are aware of
each other’s
geographical
location.
ESHGHI LAYOUT 2/16/05 11:03 AM Page 108
IEEE Communications Magazine • March 2005 109
tion model. While in the active state (ACT in the
figure), the model acts as a constant bit rate
(CBR) source generating rb/s, and while in the
idle state (IDL in the figure), no packet is gener-
ated. Parameters αand βare self-loop transition
probabilities in IDL and ACT states, respectively.
The slot time of the model, tslot, is considered
long enough to accommodate the longest packet
size generated above the node’s link layer. The
average idle and active states dwell times are cal-
culated as TIDL = tslot(1 – α)–1 and TACT = tslot (1
β)–1, respectively. Upon packet generation at
the source node, vector function
pkt(SEQ_NO,CP_VER,HOP_VER) is responsi-
ble for carrying over all the information pertinent
to the generated packet, such as generating node
identity, final destination node identity (specified
at the transport or higher layers), intermediate
node identity (specified at the network layer as a
result of routing strategy application), packet
location in the queue, and temporal information.
Each packet is uniquely identified by its 3-tuple
identifier (SEQ_NO,CP_VER, HOP_VER) as
explained shortly.
MOBILITY
A special case of a random walk mobility model
(with constant speed and limited movement
directions) was adopted to predict mobile nodes’
movements throughout the network. The model
features completely random and memoryless
mobility; as such, it might not be suitable for all
kinds of applications. A complete treatment of
mobility models in ad hoc networks and the
importance of model choice regarding perfor-
mance results can be found in [10]. In our model,
all nodes designated as mobile periodically (each
/vs where the input parameter denotes dis-
placement step length in meters) update their
locations. This moves the mobile node as much
as along either the x or y axis. Large-scale fad-
ing and shadowing phenomena are directly relat-
ed to the macro movements of the nodes, so
they are handled in the mobility module. Using a
two-slope curve model [11] and log-normal dis-
tribution for path loss and shadowing, respec-
tively, we have
(1)
In Eq. 1, nPL and λrepresent terrain-dependent
path loss exponent and wavelength, respectively,
and Xis a normal random variable in dB. Parame-
ter d0denotes the breakpoint distance below which
the environment has free space characteristics. For
simplicity we do not consider correlation in shad-
owing from one location to another. The displace-
ment, distance, and large-scale fading between all
pairs of nodes are calculated and used for channel
bit error rate (BER) evaluation as follows.
THE CHANNEL MODEL
In this module the small-scale behavior of the
channel, in particular multipath fading as its
major contributor, is simulated. The two impor-
tant parameters that quantify channel behavior
with regard to fading classes are coherence
bandwidth (Bc) and coherence time (Tc). Less
conservative expressions for the coherence band-
width and coherence time are [12]
(2)
In Eq. 2 στdenotes the delay spread of the wire-
less channel and fm, vm, fc, and Cdenote maxi-
mum Doppler frequency, maximum mobile
speed, carrier frequency, and light speed respec-
tively, which are related through fm= vmfc/C.
The power spectral density of the direct
sequence spread spectrum (DSSS) signal in
802.11 is limited to around 20–22 MHz using a
transmit spectrum mask [13]. This bandwidth
translates to a 9–10 ns delay spread through
applying Eq. 2. While this value of delay spread
may fall into the rural area range, suburban and
urban areas show higher delay spreads [14] and
subsequently lower coherence bandwidths. To
avoid frequency band variations of the signal
strength, at this point we adopt the flat fading
channel assumption, which may not be valid for
all terrain situations. Regarding the coherence
bandwidth and for the system under study, val-
ues of C= 108m/s, fc= 2.4 GHz, and v= 10
m/s give a coherence time of Tc= 5.29 µs. Com-
pared to the symbol period of 1 µs, the wireless
channel can conventionally be considered slow
fading. However, since we are concerned about
packet rather than symbol (bit herein), depend-
ing on the packet length, a packet may experi-
ence several channel conditions. So at any time
we consider the channel as a time-invariant sta-
tionary process with different statistics during
different coherence time units. In order to
model the time variations of the channel, a two-
state Markov model (Gilbert model) is adopted.
Markovian modeling of fading channels is exten-
sively found in the literature (e.g., [15]). Most of
these references agree on the suitability of the
first order Markov chain in modeling slow to
medium fading channels, while higher-order
Markov chains are needed for faster fading
channels. Moreover, limiting Markov states to
two as good and bad channel states has been
common due to its efficient trade-off between
accuracy and simplicity, and of course its ease of
computer simulation. However, good and bad
states have been defined in a variety of ways
such as having fixed low and high BERs, experi-
encing no and deep fade, or non- and erroneous
BTC
vf
cc
mc
≈≈
1
5
0 423
στ
,..
Pd Pd n d
dXdd
LL
() ( ) log (, );= +
+≥
010
0
10 0
σ
00
10
20 4
Pd d
L() log=
π
λ
;.dd<0
nn
nn
Figure 2. Random access and data transmission in IEEE 802.11 ad hoc
mode of operation using the optional RTS/CTS channel reservation scheme.
123 j
Tra nsmitter
DIFS
Slot time
RTS SIFS DATA
Receiver CTSSIFS
Others NAV(RTS)
NAV(CTS)
NAV(DATA)
Defer access
ACKSIFS
ESHGHI LAYOUT 2/16/05 11:03 AM Page 109
IEEE Communications Magazine • March 2005
110
packet delivery. We assume that a mobile node
along its movement alternatively experiences
either a line of sight (LOS) or Rayleigh fading
channel along its target node. Figure 1b shows
the embedded channel model in our simulation
with α′ and β′ denoting the self-loop probabili-
ties of bad (B) and good (G) states. By equating
Tcin Eq. 2 to the model’s slot time, the average
dwell times of the bad and good states are TB=
Tc(1 – α′)–1 and TG= Tc(1 – β′)–1, respectively.
In the good state the received power (PRG) is
calculated from the transmitted power (PT) as
PRG= PTPL(d) where PL(d) is defined in Eq.
1 and with all powers in dB. In the bad state,
PRGserves as the average power of the received
signal with a Rayleigh distributed envelope from
which its power is calculated.
802.11 PROTOCOL IMPLEMENTATION
IEEE 802.11 protocol implementation in ad hoc
mode is discussed here. More emphasis is put on
the MAC layer while the PHY layer implemen-
tation is realized through adopting parameters
related to the specific choices of modulation,
spreading, and FEC coding.
The MAC Layer — The random backoff algo-
rithm is the contention resolution strategy in the
IEEE 802.11 WLAN protocol operating in ad hoc
or distributed coordination function (DCF) mode.
Figure 2 illustrates the channel access mechanism
through the optional request-to-send/clear-to-send
(RTS/CTS) channel reservation scheme in ad hoc
mode of operation. For a more detailed discussion
of the protocol, the reader is referred to [9, 13].
Real-time traffic, depending on the application,
requires a compromise between delay and loss.
Late packets are not worth more than lost ones.
To take care of this, and as an amendment to the
protocol toward real-time adaptability, unacknowl-
edged packets are retransmitted a limited number
of times (Rmax) before releasing the channel.
Moreover, Rmax unsuccessful retransmissions are
followed by a packet drop to avoid too much
latency of late packets. Other mechanisms that
result in packet elimination are blocking due to
the generating/target node’s full buffer, dropping
due to reaching some constraints such as time-to-
live, maximum hopping, retransmission limit,
duplication (explained below), route unavailability,
and successful reception. We also assume that
fragmentation is done at layers above MAC so we
only need to deal with single-fragment MAC pro-
tocol data units (MPDUs). The MPDU is then
prefixed with PHY layer overhead, coded, and
transmitted as the DATA packet (Fig. 2). In terms
of performance evaluation, the latter does not
seem to produce considerable discrepancy with
respect to the MAC fragmentation scheme [16].
Due to the ad hoc nature of the network, the
MAC protocol is implemented in a distributed
manner (concurrently in all nodes); thus, there are
some peculiarities that will be highlighted here.
The only verification mechanism regarding a
healthy DATA transmission is through ACK
exchange (Fig. 2), which itself may or may not fail.
Thus, situations may arise in which several copies
of the same packet are hopping to the same desti-
nation. Figure 3 illustrates such situations. In Fig.
3a node #1 sends packet A to node #3 through
intermediate node #2. Although the packet is
received correctly at node #2, its corresponding
ACK back to node #1 fails, which makes node #1
initiate a retransmission. At the same time, node
#2 will forward already queued packet A along its
route to the final destination. In Fig. 3b the same
event is illustrated, except that due to topology
changes (as a result of mobility) the retransmis-
sion of packet A is headed toward a different
intermediate node, node #4, which in turn will
forward it along its route to the final destination.
To better simulate the real-life situation and
account for the above possibilities, the following
measures are put in place:
Only the originating node can manipulate
the function pkt(.),
Upon correct reception at an intermediate
node, a new version of the packet with a dif-
ferent hop identification (HOP_VER) is pro-
duced (with this intermediate node as its
originator) and queued for further forwarding,
At the time of retransmission, if the next
intermediate node is different from the pre-
vious transmission attempt, a new version
of the packet with a different copy identifi-
cation (CP_VER) is produced (at the origi-
nating node), and the old one is discarded.
With the above provisions, the multiversion
packet phenomenon is well simulated. Since all
versions of a packet have the same unique
sequence number assigned at generation time,
flooding can be partially prevented by discarding
the packet whose sequence number (SEQ_NO)
has already been met (duplication) at each
nn
nn
Figure 3. Upon an ACK failure, retransmission is forwarded to: a) the same
previous target node; b) a new target node due to mobility and topology
change.
(a)
HOP_VER is changed
X
pkt(SEQ_NO,CP_VER_1,HOP_VER_1)
pkt(SEQ_NO,CP_VER_1,HOP_VER_1)
pkt(SEQ_NO,CP_VER,HOP_VER_2)
1
Packet A
Packet A, RE_TX
Packet A
ACK
2
1 2
3
(b)
HOP_VER is changed
CP_VER is changed
X
pkt(SEQ_NO,CP_VER_1,HOP_VER_1)
pkt(SEQ_NO,CP_VER_2,HOP_VER_1) pkt(SEQ_NO,CP_VER_2,HOP_VER_2)
pkt(SEQ_NO,CP_VER_1,HOP_VER_2)
1
Packet A
Packet A, RE_TX
Packet A
Packet A, RE_TX
ACK
2
1 4 5
3
ESHGHI LAYOUT 2/16/05 11:03 AM Page 110
IEEE Communications Magazine • March 2005 111
receiving node. The vector function node
(ID_NO), throughout the course of simulation,
encompasses the static and dynamic information
for node #ID_NO.
PHY Layer — Spreading, modulation, and coding
schemes are considered here. According to FCC
regulations, a DSSS system shall provide a pro-
cessing gain of at least 10 dB. This is accom-
plished by chipping the baseband signal at 1 MHz
with an 11-chip PN code. The DSSS system uses
baseband modulations of binary phase shift key-
ing (BPSK) or differential binary phase shift key-
ing (DBPSK) to provide 1 Mb/s data rate. The
presence of fading in wireless environments moti-
vates the use of channel codes. Channel codes
mitigate the adverse effect of fading in wireless
channels by adding redundancy and memory to
the transmission. Turbo codes are a class of error
correction codes that enable reliable communica-
tions with power efficiencies close to the theoreti-
cal limit predicted by Claude Shannon. The good
error performance of turbo codes may be com-
promised by their bandwidth and computational
(hence energy consumption) costs in certain ad
hoc applications. For instance, they cannot be
afforded in most sensor networks where nodes
feature very limited battery resources. As an illus-
trative example of turbo code application to
WLANs, our turbo coding scheme features two
identical recursive systematic convolutional (RSC)
encoders with parameters n= 2, k= 1, K= 3,
G0= 7, and G1= 5, with half of the parity bits
punctured. The decoder is Log-MAP with 8 itera-
tions. Regarding the interleaver, we consider two
types: one, which shuffles fixed short size control
packets (RTS,CTS, and ACK), is a block inter-
leaver; the other, which deals with data packets, is
a random separated interleaver. While this coding
scheme consumes half the bandwidth in the first
place, it is hoped it will retrieve much more
through BER improvement. However, there is no
claim about the optimality of this coding scheme,
and no effort is made to evaluate its efficiency
since it is not in the main theme of this work.
Now the focus is turned toward how transmission
health is assessed in our simulation. Data packets,
depending on their length and the channel coher-
ence time (Tcin Eq. 2) they face, may experience
several channel qualities. The latter information
represented by BER1, BER2, …, BERxare carried
by pkt(.) function. On the other hand, short con-
trol packets always go through a single-quality
channel (represented by a single BER) except at
rarely occurring boundary situations. The corre-
sponding BERs are extracted from the BER vs.
SNR curve in the additive white Gaussian noise
(AWGN)/BPSK case with the above employed
coding scheme [17, Fig. 5.26]. Accordingly, the
packet error rate (PER) for all packet sizes is
(3)
where LTc denotes the equivalent bit length of
Tc, mod(a,b) accounts for the remainder of
dividing aby b, and xis the number of coher-
ence times fitted within one packet.
SIMULATION RESULTS
In this section the effects of different choices of
MAC layer parameters as well as other external
network parameters (e.g. mobility, traffic load,
etc.) on the system performance are simulated.
In particular, packet length, maximum lifetime
of a packet (time-to-live, TTL), maximum num-
ber of times a packet is retransmitted (ReTXmax),
and a node’s maximum buffer size (Qmax) are
examined. This is done in different network con-
ditions by varying the percentage of active nodes
(Pactive), percentage of mobile nodes (Pmobile),
and mobile node speed (v). However, due to
space limitations, only some of the produced
results are presented herein. Regarding other
parameters, the total number of nodes present
in the network (ntot), node traffic generating
rate, and network geographical dimensions
remain fixed at 30, 64 kb/s, and 400 m ×400 m,
respectively, throughout the simulation. Also,
throughout the simulation the following values
PER BER BER
x
LL
m
L
m
x
iTc Tc
=−
=
11 1
1
1
() ( );
mod( , )
= i RTS CTS ACK DATA,,, ,
nn
nn
Table 1. Parameters used in the simulation.
Network parameters
ntot 30
Node’s coverage radius 150 m
Network area 400 m ×400 m
Displacement step ()5 m
Simulation time 10.0 s
Source model parameters
Node’s traffic generation rate 64 kb/s
Avg. talk-spurt/silence period 1.0/1.35 s
Max. packet length (uncoded) 8000 bits
Channel parameters
Path loss exponent (nPL)3.2
Breakpoint distance (d0) 10 m
Standard deviation of 8 dB
shadowing (σ)
β′/α′ 0.967/0.9
IEEE 802.11 standard parameters for DSSS WLANs
LRTS/CTS/ACK 20/14/14 octets
OHMAC/PHY 34/24 octets
DIFS/SIFS/slot time 50/10/20 µs
Channel rate 1 Mb/s
Miscellaneous parameters
Transmitter power (PT) 17 dBm
Noise floor (NF)–80 dBm
Simulation slot time 10 µs
Maximum hopping 4 hops
Since we are aiming
at real-time
application support,
a larger area means
more hops, which
in turn contributes
to unfavorable delay
accumulation. The
area is limited such
that the majority of
the source-to-
destination
transmissions can
take place with the
number of hoppings
less than
HOP_LMT = 4.
ESHGHI LAYOUT 2/16/05 11:03 AM Page 111
IEEE Communications Magazine • March 2005
112
were assigned to the above parameters unless
they are the parameter subject to variation; TTL
= 0.4 s, v= 30 m/s, Pactive = 0.5, Pmobile = 0.75,
ReTXmax = 4, and Qmax = 5. These values reflect
high traffic load and relatively fast mobility. To
give a sense of traffic volume, Pactive = 0.5
means, when counting in MAC/PHY/FEC over-
heads and idle/active periods, 15 nodes each
generating on average 60 kb/s continuously, and
this should be compared against 1 Mb/s channel
capacity. Moreover, in multihop situations, gen-
erated traffic is multiplied by a factor of number
of hops to final destination, which is lower than
the effective channel reuse factor. A per user
traffic rate of 64 kb/s can be representative of a
wide variety of real-time applications. A 400 m ×
400 m area together with a node’s 150 m cover-
age radius (which is a typical coverage radius for
wireless interfaces in the market) represent our
intended multihop scenario. Since we are aiming
at real-time application support, a larger area
means more hops, which in turn contributes to
unfavorable delay accumulation. The area is lim-
ited such that the majority of source-to-destina-
tion transmissions can take place with the
number of hoppings less than HOP_LMT = 4.
However, the simulation environment developed
has no limitation in handling areas of larger
sizes. Regarding the number of nodes, 30 users
in the area above would be a normal user popu-
lation (of course, in certain application scenar-
ios) and ensures reasonable availability of
intermediate nodes toward the final destination
as well. However, as mentioned earlier, in most
of the simulations Pactive was set to 0.5 to yield a
high traffic load scenario. Parameters used in
the simulation are tabulated in Table 1. The
parameters of the source and channel models
are chosen to be consistent with the correspond-
ing parameters in [9]. The other parameters are
partially acquired from [11] and Cisco WLAN
specification guides. The simulation time is fixed
at 10.0 s to accommodate a good number of gen-
erated packets and TTL periods, and for the
network to reach its steady state. In all the simu-
lation results, each point is acquired by applying
the batch means method [18] over 24 (6 ×4)
simulation runs to obtain a good level of confi-
dence. Two major measures considered herein
as performance indicatives are end-to-end (e.t.e.)
delay and packet failure rate (PFR), wherein
such a delay has been presented as normalized
with respect to the subject DATA packet trans-
mission time. The delay includes the time dura-
tion from the moment of packet generation until
its healthy reception. Not included are packeti-
zation delay, interleaving delay in turbo encod-
ing, propagation delay, delays related to turbo
decoder iterations, and other packet processing
times at intermediate and destination nodes.
However, these delays are both fixed and negli-
gible compared to random transmission and
queuing delays. In each simulation run, e.t.e.
delay is calculated by averaging over all healthy
received packets. Packet failure rate is the ratio
of the number of packets dropped to the total
number of generated packets throughout the
duration of simulation . Different limit violations
in the aggregate contribute to the total number
of dropped packets. Figures 4–6 illustrate how
the above mentioned performance measures are
affected by varying DATA packet length
(LDATA). In Fig. 4, a group of curves correspond-
ing to different values of TTL, 0.1–0.4 s, are
drawn. In the left plot, the normalized delay is
decreased by adopting longer packet lengths and
lower TTL values. However, this decrease
becomes less significant upon passing LDATA =
nn
nn
Figure 4.Performance measures of the system versus DATA packet length with time-to-live (TTL) as a parameter: a) normalized
delay; b) packet failure rate.
DATA packet length (uncoded,bits)
V = 30 m/s ; Pmobile = 0.75 ; Pactive = 0.5 ; ReTXmax = 4 ; Qmax = 5
(a)
20001000
0
20
Normalized delay (w.r.t. packet transmission time)
40
60
80
100
120
3000 4000 5000 6000 70008000
TTL = 0.1 s
TTL = 0.2 s
TTL = 0.3 s
TTL = 0.4 s
%80 Conf_int
DATA packet length (uncoded,bits)
V = 30 m/s ; Pmobile = 0.75 ; Pactive = 0.5 ; ReTXmax = 4; Qmax = 5
(b)
1000
0.6
0.65
Packet failure rate (PFR)
0.7
0.75
0.8
0.85
0.9
0.95
70008000
6000
4000
3000
20005000
TTL = 0.1 s
TTL = 0.2 s
TTL = 0.3 s
TTL = 0.4 s
%80 Conf_int
ESHGHI LAYOUT 2/16/05 11:03 AM Page 112
IEEE Communications Magazine • March 2005 113
4000 bits. The fact that the channel favors longer
packets all the way points to the effectiveness of
the FEC scheme employed, and that probably a
higher rate turbo coding might be also sufficient.
In the right plot, packet failure rate mostly
decreases with higher TTLs as may be expected.
However, TTL 0.3 s shows turning points in
4000- and 6000-bit packet lengths. By trading
delay for loss or vice versa, we may end up with
different choices in the ranges of 0.2 TTL
0.4 s and 4000 LDATA 6000 bits. Figure 5
shows the effect of varying queue size and
DATA packet length on system performance
measures. Looking at the delay plot, all the
curves similarly descend by a climbing packet
length. The descents become less significant and
particularly indistinguishable beginning at the
4000-bit packet length. The closeness of the
curves for Qmax 3 suggests that beyond Qmax =
3, this parameter is not a decisive factor in delay
performance. On the PFR side, it seems that
6000-bit packet length is the best choice for all
queue lengths. Similar to the delay performance,
not much is gained by enlarging the queue
beyond Qmax = 3. This means that the parame-
ter pair (Qmax = 3, LDATA = 6000 bits) gives the
best combined delay-PFR performance. In the
last two figures, the two parameters subject to
variation control the dwelling time of the packet
in the system (in fact ReTXmax has a similar
effect). A longer stay of the packet in the system
(due to a higher TTL, queue size, or retransmis-
sion limit) on one hand may increase its chances
of successful delivery, while on the other hand it
decreases other packets’ chances by making
them violate the system parameters limits. The
multiple crossings of PFR plots at some points
stem from these conflicting effects.
The impact of mobility on system perfor-
mance can be evaluated by varying either the
number of mobile users in the system (Pmobile) or
the speed of mobile users (v). A higher Pmobile
(at fixed speed) is translated to deeper topology
changes since it involves more nodes. However,
since the topology changes take place in a com-
pletely random manner, considering the fixed
speed, in an average sense one should not expect
any wide fluctuations of performance measures
for different mobility volumes. On the other
hand, a higher node’s speed means faster and
more frequent topology changes of the network.
It also means that a particular long enough
packet may experience more channel qualities
due to shrinking channel coherence time.
Because of the powerful FEC scheme used,
many packets that would otherwise be complete-
ly faded can be recovered. The delay plot of Fig.
6 shows slightly higher delays for higher speeds
while maintaining the same descending pattern
with respect to packet length. Since the delay
measure only deals with successfully received
packets, it cannot clearly reflect the phenomenon
described above. The PFR plot illustrates how
longer packets may benefit from faster mobility.
It also shows that LDATA = 6000 bits can be a
good choice for different node speeds.
To better visualize the impact of adequate
selection of system parameters and traffic load
on performance, Fig. 7 illustrates performance
measures corresponding to another set of choic-
es: TTL = 0.25 s, v= 30 m/s, Pmobile = 0.75,
ReTXmax = 2, Qmax = 4, and different load con-
ditions. The selected values are intended to
improve the combined delay-PFR performance.
All the earlier graphs should be compared
against the diamonds (Pactive = 0.5) in Fig. 7. To
evaluate the performance under different traffic
loads, the ratio of active users (generating traf-
nn
nn
Figure 5. Performance measures of the system vs. DATA packet length with maximum queue length (Qmax) as a parameter:
a) normalized delay; b) packet failure rate.
DATA packet length (uncoded, bits)
(a)
Pactive = 0.5 ; TTL = 0.4 s ; Pmobile = 0.75 ; v = 30 m/s ; RE_TX_LIMIT = 4
700080001000
0
20
Normalized delay (w.r.t. packet transmission time)
40
60
80
100
120
6000
5000
4000
3000
2000
DATA packet length (uncoded, bits)
(a)
Pactive = 0.5 ; TTL = 0.4 s ; Pmobile = 0.75 ; v = 30 m/s ; RE_TX_LIMIT = 4
700080001000
0.55
0.6
Packet failure rate (PFR)
0.65
0.7
0.75
0.8
0.85
0.9
60005000400030002000
Qmax = 1
Qmax = 3
Qmax = 5
Qmax = 7
%80 Conf_int
Qmax = 1
Qmax = 3
Qmax = 5
Qmax = 7
%80 Conf_int
ESHGHI LAYOUT 2/16/05 11:03 AM Page 113
IEEE Communications Magazine • March 2005
114
fic) is varied over Pactive = 0.1–0.5. In Fig. 7, as
expected, all the plots in general show more
degradation with higher loads. Again, delay plot
favors longer DATA packets; interestingly, 6000-
bit packet could be the best choice for all traffic
volumes regarding the PFR performance.
Finally, in interpreting the quantities of the
performance measures, it should be noted that
the results pertain to pure basic 802.11 protocol,
and no extra efforts such as revising the proto-
col, optimizing the FEC scheme employed, or
clustering have been made.
CONCLUSION
In order to investigate the survivability and per-
formance of IEEE 802.11’s DCF and the signifi-
cance of adequate selection of the system
parameters in a multihop scenario, an inclusive
simulation was performed. The simulation, com-
nn
nn
Figure 6. Performance measures of the system vs. DATA packet length with the mobile nodes' speed (v) as a parameter:
a) normalized delay; b) packet failure rate.
DATA packet length (uncoded, bits)
(a)
TTL = 0.4 s ; Pmobile = 0.75 ; Pactive = 0.5 ; ReTXmax = 4 ; Qmax = 5
700080001000
0
20
Normalized delay (w.r.t. packet transmission time)
40
60
80
100
120
60005000400030002000
DATA packet length (uncoded, bits)
(b)
TTL = 0.4 s ; Pmobile = 0.75 ; Pactive = 0.5 ; ReTXmax = 4 ; Qmax = 5
700080001000
0.6
0.65
Packet failure rate (PFR)
0.7
0.75
0.8
0.85
60005000400030002000
v = 0.1 m/s
v = 10 m/s
v = 20 m/s
v = 30 m/s
%80 Conf_int
v = 0.1 m/s
v = 10 m/s
v = 20 m/s
v = 30 m/s
%80 Conf_int
nn
nn
Figure 7. Performance measures of the system vs. DATA packet length with the percentage of active nodes (Pactive) as a parameter and
a different choice of other parameters: a) normalized delay; b) packet failure rate.
DATA packet length (uncoded bits)
(a)
TTL = 0.25 s ; Pmobile = 0.75 ; v = 30 m/s ; ReTXmax = 2 ; Qmax = 4
70008000
1000
0
10
Normalized delay (w.r.t. packet transmission time)
20
30
40
50
60
70
6000500040003000
2000
Pactive = 0.1
Pactive = 0.25
Pactive = 0.5
%80 Conf_int
DATA packet length (uncoded bits)
(b)
TTL = 0.25 s ; Pmobile = 0.75 ; v = 30 m/s ; ReTXmax = 2 ; Qmax = 4
700080001000
0.2
0.3
Packet failure rate (PFR)
0.4
0.5
0.6
0.7
0.8
0.9
60005000400030002000
Pactive=0.1
Pactive=0.25
Pactive=0.5
%80 Conf_int
ESHGHI LAYOUT 2/16/05 11:03 AM Page 114
IEEE Communications Magazine • March 2005 115
prising traffic generation, mobility, wireless chan-
nel, and IEEE 802.11 MAC protocol, was intend-
ed to evaluate system performance measures,
such as delay and packet failure rate, of special
interest to real-time applications. Here we do not
consider throughput, since the maximum band-
width available cannot be clearly defined due to
the multichannel nature of multihop ad hoc
WLANs. Most of the results corresponding to the
performance measures above do not demonstrate
a monotonic trend against the parameters consid-
ered. While a higher TTL, queue size, and
retransmission limit allow a particular packet to
stay longer in the system and have more chances
of delivery, it contributes to a more crowded sys-
tem and in turn more chances of collision, queue
overflow (for later coming packets), TTL viola-
tion (for earlier arriving packets), and thus final
failure. These conflicting issues signify the impor-
tance and necessity of adequate selection of the
parameters involved. The only monotony seen is
the decrease in normalized delay vs. packet
length. The nonlinear declining behavior, general-
ly more profound for short packet lengths
although dependent on the other parameters, is
basically due to the effectiveness (or maybe over-
sufficiency) of the FEC scheme employed.
An important observation is that apart from
the maximum delay, which was constrained by
the TTL (i.e., chosen to fulfill the delay require-
ment of a variety of time-sensitive applications),
the results of other performance measurements
do not seem promising for real-time applica-
tions. This is not surprising, given the worst case
deployment scenario of this article. Multihop ad
hoc networking, high traffic load, lack of coordi-
nation among nodes, no facility for route reser-
vation or clustering, and other issues all
contribute to such a worst case. Nevertheless,
future advances in the aforementioned areas will
make the IEEE 802.11 ad hoc mode of opera-
tion a viable approach to handling real-time traf-
fic in wireless environments.
ACKNOWLEDGMENT
The authors would like to express their gratitude
to series editor Prof. Silvia Giordano and the
reviewers, whose constructive comments led to
the article’s quality upgrade and producing more
accurate simulation results.
REFERENCES
[1] H. Wu et al., “Speech Support in Wireless, Mobile, and
Multihop Networks,” Proc. Nat. Sci. Council, ROC(A),
vol. 24, no. 6, 2000, pp. 441–49.
[2] S. Xu and T. Saadawi, “Does the IEEE 802.11 MAC Pro-
tocol Work Well in Multihop Wireless Ad Hoc Net-
works,” IEEE Commun. Mag., June 2001, pp. 130–37.
[3] P. Mohapatra, J. Li, and C. Gui, “QoS in Mobile Ad Hoc
Networks,” IEEE Wireless Commun., June 2003, pp. 44–52.
[4] C. R. Lin and M. Gerla, “Real-Time Support in Multihop
Wireless Networks,” Wireless Networks, no. 5, 1999,
pp. 125–35.
[5] M. Kazantzidis and M. Gerla, “End-to-end vs. Explicit
Feedback Measurement in 802.11 Networks,” Proc. 7th
Int’l. Symp. Comps. and Commun., 2002, pp. 429–34.
[6] C. R. Lin and M. Gerla, “Adaptive Clustering for Mobile
Wireless Networks,” IEEE JSAC, Sept. 1997, pp. 1265–75.
[7] K. Sundaresan, H. Y. Hsieh, and R. Sivakumar, “IEEE 802.11
over Multihop Wireless Networks: Problems and New Per-
spectives,” Ad Hoc Networks, no. 2, 2004, pp. 109–32.
[8] J. Broch et al., “A Performance Comparison of Multi-
Hop Wireless Ad Hoc Network Routing Protocols,”
MobiCom, Dallas, Texas, USA, Oct.1998, pp. 85–97.
[9] B. P. Crow et al., “IEEE 802.11 Wireless Local Area Net-
works,” IEEE Commun. Mag., Sept. 1997, pp. 116–26.
[10] T. Camp, J. Boleng, and V. Davies, “A Survey of Mobil-
ity Models for Ad Hoc Network Research,” Wireless
Commun. & Mobile Comp., Special Issue on Mobile Ad
Hoc Networking: Research, Trends, and Applications,
vol. 2, no. 5, 2002, pp. 483–502.
[11] M. J. Ho et al., “RF Challenges for 2.4 and5 GHz
WLAN Deployment and Design,” WCNC, vol. 2, Mar.
2002, pp. 783–88.
[12] T. S. Rappaport, Wireless Communications: Principles
and Practice, 2nd ed., Prentice Hall PTR, 2002.
[13] Wireless Medium Access Control (MAC) and Physical
Layer (PHY)Specifications, ANSI/IEEE Std. 802.11,
LAN/MAN Standards Committee of the IEEE Computer
Society, 1999.
[14] T. A. Wysocki and H. J. Zepernick, “Characterization of
the Indoor Radio Propagation Channel at 2.4 GHz,” J.
Telecommun. and Info. Tech., no. 3–4, 2000, pp.
84–90.
[15] H. S. Wang and P. C. Chang, “On Verifying the First-
Order Markovian Assumption for a Rayleigh Fading
Channel Model,” IEEE Trans. Vehic. Tech., vol. 45, no.
2, May 1996, pp. 353–57.
[16] F. Eshghi, “Performance Evaluation of Multihop Ad
Hoc Wireless LANs,” Ph.D. dissertation, Concordia
Univ., Montreal, Quebec, Canada, Apr. 2004.
[17] L. Hanzo, T. H. Liew, and B. L. Yeap, Turbo Coding, Turbo
Equalisation and Space-Time Coding, Wiley, 2002.
[18] A. Leon-Garcia, Probability and Random Processes for
Electrical Engineering, Addison-Wesley, 1994.
BIOGRAPHIES
FARSHAD ESHGHI (farshade@ieee.org) received his Ph.D.
degree in electrical engineering from Concordia University,
Montreal, Canada, in 2004, during study toward which he
has been stydying the IEEE 802.11 WLAN protocol. Since
then he has been working on different issues regarding
wireless ad hoc networks as a post-doctoral fellow at Con-
cordia. Prior to starting the Ph.D. program, he worked on
various electronic circuit design projects in different com-
panies. His main research interests include wireless com-
munications, WLAN access protocols, routing, and
performance evaluation.
AHMED K. ELHAKEEM [SM] (ahmed@ece.concordia.ca)
received his Ph.D. degree from the Southern Methodist
University, Dallas, Texas, in 1979.He spent the next two
years working as a visiting professor in Egypt, after which
he moved to Ottawa, Canada, in 1982. He assumed
research and teaching positions in Carleton and Manitoba
Universities and later moved to Concordia University in
1983, where he is now a professor in the Electrical and
Computer Engineering Department. He has published
numerous papers in IEEE and international journals in the
areas of spread spectrum and networking. He is a well-
known expert in these areas and serves as a consultant to
various companies. His current research interests include
interconnected wireless LANs, error correction for IP multi-
cast,wideband networks, switching architectures , CDMA
networks, multiprotocols, software radios, and reconfig-
urable networks, He is a co-author of the book Fundamen-
tals of Telecommunications Networks (Wiley, 1994). He
has chaired and organized numerous technical sessions in
IEEE conferences, and was Technical Program Chairman
for IEEE Montech ‘86 in Montreal, Canada. More recently,
he was the key Guest Editor for four issues of IEEE Journal
on Selected Areas in Communications on CDMA, CDMA I,
II, III and IV, appearing in May and June 1994, and Octo-
ber and December 1996. He was the Communications
chair of IEEE Montreal and TCCC Representative to ICC
‘99, He served as an associate editor for IEEE Communica-
tions Letters (1996–1999), and is a professional engineer
of Ontario.
YOUSEF R. SHAYAN (yshayan@ece.concordia.ca) received his
Ph. D. in 1990 in electrical engineering from Concordia
University. Since 1988 he has worked in several wireless
communication companies. He has been with SR Telecom,
Spar Aerospace, Harris, EMS Technologies, and BroadTel
Communications as senior engineer, senior manager and
vise president of engineering. In 2001 he joined the
Department of Electrical and Computer Engineering of
Concordia University as associate professor. His research
interests include wireless communications, error control
coding, and modulation techniques.
An important
observation is that
apart from the
maximum delay,
which was con-
strained by the TTL,
the results of other
performance
measure do not
seem promising in
view of real-time
applications. This is
not surprising, given
the worst case
deployment
scenario of
this article.
ESHGHI LAYOUT 2/16/05 11:03 AM Page 115
... x (20) which is simplified to (17) using the approximation in (18). ...
... The channel is characterized by a capture model. Traffic is CBR, which covers many real-time applications, e.g., voice data[18] and periodic traffic in sensor networks. Unlike previous work, the traffic generation is not controlled by the node buffer and the network stability is guaranteed, i.e., the nodes are not always busy. ...
Article
Full-text available
We employ discrete-time queueing theory to analyze wireless multihop networks and derive an explicit end-to-end (e2e) delay distribution. The analysis takes into account the scheduling scheme, which is a two-level problem including both the (global) channel access scheduler (MAC) and the (local) packet scheduler at each node. Two MAC schemes, TDMA and ALOHA, are considered. Queueing models are established in such a way that the access delay can be incorporated into the service process. Characterizing the wireless channel by a capture model, the individual nodes are modeled as GI/Geom/1 queueing systems. However, in TDMA with constant bit rate (CBR) traffic, the corresponding D/Geom/1 system has a non-integer interarrival time and thus cannot be analyzed as usual. We use an eigenvalue approach to derive closed-form queue length and delay distributions of such D/Geom/1 systems. The error-prone wireless channel transforms the smooth and deterministic CBR traffic to bursty and correlated on-off, causing correlations in the delays at different nodes. We propose an approximative approach that includes the long-distance correlations in the correlation between the neighboring nodes. Based on a set of simulation results, an empirical model for the correlation coefficient is established. Then the network is modeled as a series of independent servers, but the delay variances are scaled by the correlation coefficient. Finally, TDMA and ALOHA are quantitatively compared in terms of the delay and the delay outage probability.
... Para medir su efectividad, compararon el modelo propuesto con respecto al desempeño del protocolo DSR [31], obteniendo mejores resultados en términos de relación de entrega de paquetes y retardo de extremo a extremo. Eshghi et al. [32] Ilustración 4 -Caminos de exclusividad entre un par de nodos [33] Panichpapiboon et al. [34] amplían este concepto. En los modelos basados en reserva de rutas (Reservation Based, RB), antes de la transmisión de datos, el nodo origen solicita la reserva de los nodos intermedios pertenecientes a la ruta entre este y el nodo destino; tarea realizada a través de un proceso de descubrimiento de ruta (Route Discovery). ...
Thesis
Full-text available
Node reservation in mobile Ad-hoc networks for data transmission is an area which has not been sufficiently investigated. The following monograph presents the formulation of the NORIA model, which is focused on the reservation of the intermediate nodes during a data transmission using intelligent agents. The packets that travel over the network are analyzed by the agents, which make decisions according to their source and destination addresses. The model seeks to establish such reservations dynamically, without making prior requests before transmissions. The agents perform their actions on the routing tables of the OLSR routing protocol, to be least intrusive as possible with the regular operation of the nodes. The simulation results show that this model provides better values of delay, jitter and packet loss, against the scenario where there are no node reservation mechanism defined.
... MAC aspects for multihop communications have been considered in different research works. In [10] authors evaluate the performance of multihop ad hoc WLANs by simulation. They consider the legacy IEEE 802.11 ...
Conference Paper
We consider a wireless local area network (WLAN) in the 5 GHz band. The coverage is one of the main challenges in high-frequency wireless systems and we focus on enhancing the coverage range of such a system by relaying. So far no relaying functions are defined in IEEE 802.11 medium access control (MAC). We introduce three simple MAC schemes for multihop communications and classify them based on delay, simplicity, capacity and application. We also point out the deficiency of the actual standard regarding multihop connections. We study the outage behaviour of a single input single output (SISO) two-hop link and improve it by developing a multiple input multiple output (MIMO) system. We investigate the tradeoff between coverage range and number of relays in a two-dimensional scenario. We also discuss the tradeoffs between having relays instead of adding more access points (APs) to the system and give an estimation of the number of required APs/relays to fully cover an area. In other words we show how much range one can gain from decode-and-forward (DF) relaying in a WLAN scenario
Article
Mobile Ad Hoc Networks face great challenges due to the absence of an infrastructure to manage the network, an access to a single channel by multiple nodes, interference and the limited transmission range by the wireless media. Therefore, achieving fairness in Mobile Ad Hoc Networks is a difficult task. This paper discusses a specific Mobile Ad Hoc Network topology which leads to unfair bandwidth distribution and proposes a novel Neighbouring Transmission Rate Control (NTRC) algorithm, based on monitoring the transmission speed of the neighbouring nodes, which aims to optimise network fairness through identifying and helping starving nodes to increase their transmission rates. The proposed method is tested in a simulation environment and, according to the results; it provides a balanced distribution of network resources amongst the competing nodes. The proposed algorithm achieves 99% fairness according to Jain's fairness equation as opposed to 33% for the standard MAC protocol.
Conference Paper
It is challenging to provide QoS in wireless ad hoc networks. One of the main problems that affects QoS in wireless ad hoc networks is the multi-hop nature of the network which generates high volume of control overhead. Such overhead is necessary to create/maintain network routes. Congested routes further aggravate the existing problem by generating more control packets for performing route maintenance. In addition, established routes are not well-protected and are subject to the changes in traffic load, which further reduces the QoS provided and wastes network resources. Therefore, in this paper, we propose a flow admission control scheme at the routing layer to mitigate the above problem by taking pre-emptive measures through bandwidth and congestion estimation. The scheme can reduce unnecessary control overhead for route maintenance and select a proper route for a flow, thus improve the overall network performance. Moreover, established routes can be protected from any changes in traffic load for the duration of the route lifetime. Our extensive simulation results demonstrate that the proposed scheme achieves good network performance.
Article
Full-text available
The end-to-end performance of a simple wireless router network with batch arrivals is opti- mized in an M/G/1 queue-based, analytical model. The optimization minimizes both the mean and variance of the transmission delay (or 'response time'), subject to an upper limit on the rate of losses and nite capacity queueing and recovery buers. The trade-o between mean and variance of response time is assessed and the optimal ratio of arrival-buer size to recovery-buer size is determined, which is a critical quantity, aecting both loss rate and transmission time. Losses may be due to either full buers or corrupted data. Graphs illustrate performance in the near-optimal region of the critical parameters. Losses at a full buer are inferred by a time-out whereas corrupted data is detected immediately on receipt of a packet at a router, causing a N-ACK to be sent upstream. Recovery buers hold successfully transmitted packets so that on receiving a N-ACK, the packet, if present, can be retransmitted, avoiding an expensive resend from source. The impact of the retransmission probability is investigated similarly: too high a value leads to congestion and so higher response times, too low and packets are lost forever, yielding a dieren t penalty.
Article
Ad hoc networks suffer from unfairness when multiple flows exist in the same interference region. The unfair channel distribution among competing flows is due to the random exponential back off algorithm used by the IEEE 802.11 Medium Access Control (MAC) protocol. The protocol can lead to unfair channel utilization among different flows, as some of the nodes may capture the channel for a long period leaving the competing nodes to starve. This paper introduces a novel algorithm named Transmission Rate Control through Acknowledgements Feedback (TRCAF), which controls the channel resources distribution through feedback, included in MAC layer acknowledgements, about the status of the network. The signaling determines whether the intermediate nodes carry on transmitting or stop in order to help the starving nodes to gain access to the channel. In addition, the TRCAF algorithm integrates a scheme that improves fairness in situations where there is no information about the status of the network through monitoring the severity of packet collisions that nodes experience. Simulation results show that the TRCAF algorithm achieves 99% fairness, in contrast to the standard MAC protocol that achieves only 33% under comparable overall utilization of the channel resources.
Chapter
The random access control (MAC) technique of standard WLANs is called the distributed coordination function (DCF) [3]. DCF is a carrier sense multiple access based on collision avoidance (CSMA/CA) scheme with binary slotted exponential backoff. This exponential backoff makes the system more complex, and fairness [3−13] among the stations is a major concern. This chapter shows one possible evolution of WLANs where exponential backoff is not employed. In the new techniques herein users transmit randomly but adapt themselves to traffic conditions, thus improving throughput and delay while guarantying fairness. Users in the first technique are controlled by a table which is derived from traffic measurements (table driven). In the second, users’ transmission activities are function of their buffer contents. KeywordsMAC, Table-driven WLANs, Buffer-adaptive WLANs
Article
Full-text available
The end-to-end performance of a simple wireless router network with batch arrivals is optimized in an M/G/1 queue-based, analytical model. The optimization minimizes both the mean and variance of the transmission delay (or ‘response time’), subject to an upper limit on the rate of losses and finite capacity queueing and recovery buffers. Losses may be due to either full buffers or corrupted data. The queueing model is also extended to higher order moments beyond the mean and variance of the response time. The trade-off between mean and variance of response time is assessed and the optimal ratio of arrival-buffer size to recovery-buffer size is determined, which is a critical quantity, affecting both loss rate and transmission time. Graphs illustrate performance in the near-optimal region of the critical parameters. Losses at a full buffer are inferred by a time-out whereas corrupted data is detected immediately on receipt of a packet at a router, causing a N-ACK to be sent upstream. Recovery buffers hold successfully transmitted packets so that on receiving a N-ACK, the packet, if present, can be retransmitted, avoiding an expensive resend from source. The impact of the retransmission probability is investigated similarly: too high a value leads to congestion and so higher response times, too low and packets are lost forever.
Conference Paper
Full-text available
In this paper we consider an M/G/1 queue-based analytical model. The end-to-end performance of a tandem wireless router network with batch arrivals is optimized. The mean of the transmission delay (or 'response time') is minimized subject to an upper limit on the rate of losses and finite capacity queueing and recovery buffers. The optimal ratio of arrival-buffer size to recovery-buffer size is determined, which is a critical quantity, affecting both loss rate and transmission time. The impact of the retransmission probability is investigated: too high a value leads to congestion and so higher response times, too low and packets are lost forever, yielding a different penalty
Article
Full-text available
The unlicensed industrial, scientific, and med-ical (ISM) band at 2.4 GHz has gained increased attention recently due to the high data rate communication systems de-veloped to operate in this band. The paper presents measure-ment results of fading characteristics, multipath parameters and background interference for these frequencies. Some sta-tistical analysis of the measured data is presented. The paper provides information that may be useful in design and de-ployment of communication systems operating in the 2.4 GHz ISM band, like those compliant with IEEE 802.11 standard and Bluetooth open wireless standard.
Article
Full-text available
Thesis (Ph. D.)--Concordia University, 2004. Includes bibliographical references.
Book
Against the backdrop of the emerging 3G wireless personal communications standards and broadband access network standard proposals, this volume covers a range of coding and transmission aspects for transmission over fading wireless channels. It presents the most important classic channel coding issues and also the exciting advances of the last decade, such as turbo coding, turbo equalisation and space-time coding. It endeavours to be the first book with explicit emphasis on channel coding for transmission over wireless channels. Divided into 4 parts: Part 1 - explains the necessary background for novices. It aims to be both an easy reading text book and a deep research monograph. Part 2 - provides detailed coverage of turbo conventional and turbo block coding considering the known decoding algorithms and their performance over Gaussian as well as narrowband and wideband fading channels. Part 3 - comprehensively discusses both space-time block and space-time trellis coding for the first time in literature. Part 4 - provides an overview of turbo equalisations, also referred to as turbo demodulation. The book systematically converts the lessons of Shannon's information theory into design principles applicable to practical wireless systems. It provides overall design performance studies, giving cognizance to the contradictory design requirements of bit error rate, implementational complexity, coding and interleaving delay, effective throughput, coding rate and other related systems design aspects in a comprehensive manner.
Article
In this paper, we address the evaluation of speech quality through a wireless network as perceived by the user. User perceived evaluation (in addition to the usual network metrics, including delay, throughput, packet loss statistics etc.) is critical in the design of wireless multimedia networks where speech and video play a key role and are affected by several factors, such as network performance and the encoding scheme. We use two approaches in our evaluation: small scale testbed implementation and hybrid simulation. The testbeds are implemented either by a UDP (User Datagram Protocol) connection or UCLA talk connection. The hybrid simulation is event driven and is based on the Maisie parallel simulation language. It uses speech traces for inputs and plays back the speech outputs off line. There are several advantages in using the simulation tool, mainly from the point of view of scalability and new protocol feature testing. At the same time, the real life testbed provides verification of the simulator assumptions, albeit on a small scale.
Article
The widespread use of mobile and handheld devices is likely to popularize ad hoc networks,which do not require any wired infrastructure for intercommunication. The nodes of mobilead hoc networks (MANETs) operate as end hosts as well as routers. They intercommunicatethrough single-hop and multi-hop paths in a peer-to-peer fashion. With the expanding range ofapplications of MANETs, the need for supporting Quality of Service (QoS) in these networksis becoming essential. This paper...
Article
Personal communications and mobile computing will require a wireless network infrastructure which is fast deployable, possibly multihop, and capable of multimedia service support. The first infrastructure of this type was the Packet Radio Network (PRNET), developed in the 70''s to address the battlefield and disaster recovery communication requirements. PRNET was totally asynchronous and was based on a completely distributed architecture. It handled datagram traffic reasonably well, but did not offer efficient multimedia support. Recently, under the WAMIS (Wireless Adaptive Mobile Information Systems) and Glomo ARPA programs several mobile, multimedia, multihop (M3) wireless network architectures have been developed, which assume some form of synchronous, time division infrastructure. The synchronous time frame leads to efficient multimedia support implementations. However, it introduces more complexity and is less robust in the face of mobility and channel fading. In this paper, we examine the impact of synchronization on wireless M3 network performance. First, we introduce MACA/PR, an asynchronous network based on the collision avoidance MAC scheme employed in the IEEE 802.11 standard. Then, we evaluate and compare several wireless packet networks ranging from the totally asynchronous PRNET to the synchronized cluster TDMA network. We examine the tradeoffs between time synchronization and performance in various traffic and mobility environments.
Article
The distributed coordination function (DCF) mode of the IEEE 802.11 MAC standard, though proposed for medium access in wireless local area networks, is seen as the de-facto medium access standard in multi-hop wireless networks. In this paper we contend that the unique characteristics that differentiate multi-hop wireless ad-hoc networks from local area wireless networks render the IEEE 802.11 MAC protocol inefficient in ad-hoc networks. Specifically, we focus on the band of contention and the fairness model employed by the IEEE 802.11 MAC protocol in our study. We substantiate our arguments through simulations of idealized (centralized) protocols, and consider the key changes required to adapt the IEEE 802.11 MAC protocol for multi-hop wireless networks. We then propose a simple medium access scheme within the IEEE 802.11 MAC framework, called flow based medium access (FBMA) that achieves significantly better fairness properties while adhering to the purely distributed operations of the basic IEEE 802.11 MAC scheme. We demonstrate the performance of the proposed MAC protocol through simulations.