DOI QR코드

DOI QR Code

Modeling and Analyzing Per-flow Throughput in IEEE 802.11 Multi-hop Ad Hoc Networks

  • Lei, Lei (College of Electronic and Information Engineering, Nanjing University of Aeronautics and Astronautics) ;
  • Zhao, Xinru (College of Electronic and Information Engineering, Nanjing University of Aeronautics and Astronautics) ;
  • Cai, Shengsuo (College of Electronic and Information Engineering, Nanjing University of Aeronautics and Astronautics) ;
  • Song, Xiaoqin (College of Electronic and Information Engineering, Nanjing University of Aeronautics and Astronautics) ;
  • Zhang, Ting (College of Electronic and Information Engineering, Nanjing University of Aeronautics and Astronautics)
  • Received : 2016.07.17
  • Accepted : 2016.08.18
  • Published : 2016.10.31

Abstract

In this paper, we focus on the per-flow throughput analysis of IEEE 802.11 multi-hop ad hoc networks. The importance of an accurate saturation throughput model lies in establishing the theoretical foundation for effective protocol performance improvements. We argue that the challenge in modeling the per-flow throughput in IEEE 802.11 multi-hop ad hoc networks lies in the analysis of the freezing process and probability of collisions. We first classify collisions occurring in the whole transmission process into instantaneous collisions and persistent collisions. Then we present a four-dimensional Markov chain model based on the notion of the fixed length channel slot to model the Binary Exponential Backoff (BEB) algorithm performed by a tagged node. We further adopt a continuous time Markov model to analyze the freezing process. Through an iterative way, we derive the per-flow throughput of the network. Finally, we validate the accuracy of our model by comparing the analytical results with that obtained by simulations.

Keywords

1. Introduction

IEEE 802.11 multi-hop ad hoc networks have gained worldwide acceptance and popularity in the past decade. The mandatory contention based medium access control (MAC) protocol defined in the IEEE 802.11 standard is the Distribution Coordination Function (DCF) [1]. It employs a combination of the carrier sense multiple access with collision avoidance (CSMA/CA) and the binary exponential backoff (BEB) to resolve channel contentions among competing flows. Meanwhile, it provides two channel access modes, which are the basic access mode and the optional request-to-send/clear-to-send (RTS/CTS) handshaking mode. Although the DCF protocol was originally designed for the purely single-hop independent basic service set (IBSS) of wireless local area networks (WLAN), it has already become the de facto standard of multi-hop ad hoc networks [2].

With the increasing demand for high-speed multimedia communications [3-4], the saturation throughput performance of the wireless network has become more and more important. Consequently, considerable research attention has been focused on modeling and analyzing the saturation throughput performance of IEEE 802.11 ad hoc networks. Among them, the most significant one was done by G. Bianchi, which adopts a discrete Markov chain to model the backoff progress and derives the saturation throughput of the network by the stationary transmission probability of the node [5]. This pioneering work has also motivated substantial subsequent research.

The most important assumption taken by the Bianchi’s model is that the packets collide with constant probability and collisions may only occur at the start instant of the packet transmission. Since the DCF protocol adopts the physical and virtual carrier sense mechanisms to resolve packet collisions, this assumption is reasonable in single-hop network scenarios. However, it is quite different in multi-hop network scenarios. Collisions induced by the jammers within the carrier sense range of the transmitter only occur at the start instant of the packet transmission, whereas collisions induced by the jammers hidden to the transmitter may occur during the whole packet transmission period. Meanwhile, the transmission periods of the flows in multi-hop senarios may overlaps with each other. Therefore, it is also difficult to analyze the time duration of the freezing process of the node, i.e., the time duration that the node senses the channel busy and deffers its own transmissions.

In this paper, we present a four-dimensional Markov chain model that adopts the fixed-length channel slot as the unit of time to analyze the per-flow throughput performance of IEEE 802.11 multi-hop ad hoc networks. We classify collisions occurring in the whole transmission process into instantaneous collisions and persistent collisions. The instantaneous collisions refer to the collisions that can only occur at the start of each transmission process and the collisions that persist during the whole transmission process are called the persistent collisions. We calculate the expected time interval for freezing of the backoff counter and freezing probability with the help of the continuous time Markov model in an iterative way. By means of the proposed model, the per-flow throughput performance of IEEE 802.11 multi-hop ad hoc networks is derived. Finally, we validate the accuracy of our model via extensive simulations.

The rest of the paper is organized as follows. Section 2 reviews related work. Section 3 introduces the preliminaries that are vital to the work in this paper. Section 4 presents our analytical model and derives the expressions of the conditional collision probability, the transmission probability in a generic fixed-length channel slot, and the per-flow throughput. Validations of the analytical model are carried out in Section 5. Finally, we conclude this paper in Section 6.

 

2. Related Work

There have been considerable attempts to model the saturation throughput performance of the IEEE 802.11 DCF protocol. G. Bianchi [5] proposed a discrete bidimensional Markov chain to model the binary exponential backoff procedure and computed the saturation throughput of IEEE 802.11 DCF. Due to its simplicity and accuracy, the Markov chain model has become an important tool to analyze the performance of MAC protocols in wireless networks and has motivated substantial subsequent studies [6-10]. Parallel to the Markov chain models, some researchers also obtained the transmission probability with simplified backoff rule assumptions and then evaluate the performance of the MAC protocols [11-15].

Although extensive simulations have validated the accuracy of the models, they share a common assumption that all nodes have the same view of channel, which greatly simplifies the performance analysis. In a single-hop network, nodes are synchronized and the collisions only occur at the start instant of the packet transmission. However, nodes in multi-hop wireless networks cannot hear each other, which is referred to as the hidden terminal problem [16-18]. As a result, a node in a multi-hop wireless network may start its transmission while some other nodes are transmitting and thus, collisions can take place during the whole transmission process. Furthermore, due to the spatial reuse property of the wireless medium, there may coexist multiple transmissions of which the number can vary at any time and the packets may partially overlap in time. Generally speaking, modeling and analyzing performance for IEEE 802.11 multi-hop ad hoc networks remains an open issue.

Many researchers focus on the aggregate throughput or the mean throughput per node analysis in multi-hop networks [19-21]. Unfortunately, in a multi-hop wireless network, the performance of each flow may differ significantly from each other. Therefore, both the mean throughput and the aggregate throughput performance appear to be a gross metric without due details. On the other hand, per-flow throughput analysis in IEEE 802.11 multi-hop ad hoc networks has attracted wide attention. Researchers presented a continuous time Markov chain where each state is a set of links that can coexist. This method was first provided in [22] to analyze the throughput performance in CSMA/CA packet radio networks. It is also employed in [23] to study fairness issues in CSMA/CA based ad hoc networks. M. Garetto, etc. [24] proposed an analytical framework which combines the continuous time Markov chain model with Bianchi’s work to capture the effect of BEB scheme. Through an iterative way, the per-flow throughput in a CSMA multi-hop wireless network was accurately predicted. The authors also use Lorenz curves and the Gini index, which are used in the economics literature to quantify a society’s distribution of wealth to individuals, to evaluate the network’s distribution of throughput to flows.

In [25], the authors pointed out the existing techniques which use Bianchi’s notion of the variable slot inherently unable to be used in a hidden terminal scenario and propose a novel method of modeling time that uses a fixed-length channel slot as the unit of time. Although the simulation results show a very close match with the throughput, the conditional collision probability, and the transmission probability, the method proposed in [25] only intends to a simple topology where two senders communicate with one receiver and cannot apply to more complex topologies. Similar topologies were also studied in [26,27]. The authors in [26] used two separate renewal processes to model two sets of nodes which are hidden from each other and a four-state discrete time Markov chain to model the channel activities. With the model, the total network throughput and the individual node throughput were estimated. In [27] a parallel space-time Markov chain model with some intermediate states between any two consecutive backoff states was presented to model the interaction of nodes in the presence of hidden terminals. Through this model, the throughput performance of IEEE 802.11 DCF in multi-hop ad hoc networks was evaluated.

 

3. Preliminaries

3.1 Fixed Length Slot

Conventionally, researchers adopt the notion of the variable slot which is first introduced in [5]. The length of a slot depends on the channel state, e.g. a collided transmission, a successful transmission and an idle backoff slot of duration σ. The backoff slot size σ depends on the physical layer parameters accounting for the propagation delay, the time needed to switch from the receiving to the transmitting state, and the time to signal to the MAC layer the state of the channel. The classification of the channel state and the notion of variable slot are originally introduced for purely single-hop wireless networks where all nodes have a common view of the channel state. In such a fully connected network, collisions can only occur when two or more nodes transmit simultaneously. The channel becomes busy because of either a collided or a successful transmission. Hence, the time duration that the tagged node spends on the freezing procedure is for either a collided or a successful transmission. Thus, the interval of a slot can be easily obtained.

However, in a multi-hop wireless network, nodes outside the physical carrier sense range of each other can start their transmission independently and the packets may partially overlap in time. The length of the slot that includes the freezing process is thus variable. Therefore, we compute the freezing probability and expected interval of the freezing process by means of the continuous time Markov chain model and replace the time interval with a succession of fixed-length slots. Besides, the packet transmission process is also divided into a series of fixed-length slots. We view the channel as a succession of fixed length slots, of which the length equals to σ, no matter what the channel state is like. Indeed, all the performance metrics such as the transmission probability, collision probability, saturation throughput, etc. are evaluated based on the notion of the fixed length slot. In the following sections, the term slot refers to the fixed length slot without specific explanation.

3.2 Collision Zones

Here, we introduce the concepts of the instantaneous collision zone and the persistent collision zone. According to the two-ray ground propagation model, the relationship between the transmit power Ptx and the received power Prx can be characterized as

where ht and hr are the antenna heights of the transmitter and the receiver, respectively; Gt and Gr are the antenna gains of the transmitter and receiver, respectively; and d is the distance between the transmitter and the receiver. For successful reception, the signal-to-interference-plus-noise ration (SINR) at the receiver should be greater than the threshold SINRrx. Assume all nodes have the same type of radio and the identical transmission power. Then, the transmission of a jammer located within a distance of

from the receiver can collide with the current transmission. Let rtx, rcs and rco denote the transmission range, the physical carrier sense range and the collision range, respectively. In practice, SINRrx is usually set to 10dB, and rcs is usually approximate to 2.2rtx. Hence, by means of equation (2), we can conclude that the collision range of the receiver will exceeds the physical carrier sense range of the transmitter when d>0.79rtx.

As shown in Fig. 1, when the transmitter of flow 1 (node A) starts to transmit to its receiver (node B), any transmission in the collision range of node B will collide with the packet from node A. However, once node A has started its transmission, all the nodes in the physical carrier sense range of node A will sense a busy channel and then defer their transmission to avoid collisions. In other words, the collision due to the jammers that locate in both the physical carrier sense range and the collision range of node A (shown as the shaded area in Fig. 1) can only occur at the start instant of the transmission process of node A. Therefore, we define the instantaneous collision zone as the area within both the physical carrier sense range of the transmitter and the collision range of the receiver.

Fig. 1.Collision zones of receiver

Furthermore, we illustrate the concept of persistent collision zone. As shown in Fig. 1, there may exist jammers (e.g., node C) located in the collision range of node B but outside the physical carrier sense range of node A when d>0.79rtx. Since node C cannot sense the transmission of node A, the packet from node A can be collided at any time as long as node C starts to transmit during the whole transmission duration of node A. Hence, we define the persistent collision zone as the area within the collision range of the receiver and outside the physical carrier sense range the transmitter, which is shown as the dotted area in Fig. 1.

3.3 Per-flow Throughput

With the notion of fixed length slot, all the performance metrics used are redefined. As shown in Fig. 2, the transmission probability τ is defined as the probability that the tagged node starts its transmission in a generic fixed length slot. The collision probability is the probability that one or more interfering nodes start their transmissions while the tagged node is transmitting a packet at a generic fixed length slot. As analyzed above, the collision probability in the first transmission slot is different from that in the remaining transmission slots. Here, we denote pc1 and pc2 as the collision probability in the first transmission slot and any one of the remaining transmission slot, respectively. The packet will be successfully received if it is not collided during the whole transmission process. Let ps be the probability that the packet will be successfully received, and the per-flow throughput is given by

Fig. 2.Redefined performance metrics

 

4. Analytical Model

In this section, we propose a four-dimensional Markov chain model based on the notion of fixed length slot. To obtain the freezing probability pf(n) and the number of slots in a freezing process, M(n), we leverage an iterative technique which is originally presented in [24]. More specifically, we first assume a Poisson point schedule process of each node and obtain the first guess of pf(n) and M(n). Then with pf(n) and M(n), we derive the per-flow throughput through our four-dimensional Markov chain model. Next, with the per-flow throughput, we update pf(n) and M(n). New pf(n) and M(n) are used again in the four-dimensional Markov chain model to calculate the per-flow throughput. Thus, the process is repeated until convergence is reached.

4.1 Fixed Length Slot Based Markov Chain Model

In the Markov chain model shown in Fig. 3, the state of the tagged node can be described as {i, j, k, l}, where

Fig. 3.The total Markov chain model for the tagged node

In the DCF protocol, a node senses the channel before transmitting a packet. As discussed above, we view the channel as a succession of fixed length slots, σ. If the channel is idle for a period of time equal to σ, we call it the backoff slot. Thus the backoff counter decrements at the end of each backoff slot, which is referred to as the backoff process in this paper. However, when the channel is sensed busy, the node will freeze its backoff counter and start a freezing process (shown as the dotted line circle in Fig. 3) until the channel is sensed idle again. In this study, we assume that the tagged node starts the freezing process with probability, pf(n) , for each backoff slot and the freezing process will last for M(n) slots as shown in Fig. 4. After the freezing process ends, the tagged node will go to the next backoff slot with probability 1. When the backoff time counter reaches zero, the node will enter into either the collision process with a probability of pc1(n) or the successful transmission process with a probability of 1-pc1(n). Note that the node can also go into the collision process with a probability of pc2(n) due to the persistent collisions at any slot of a successful transmission process. The packet is successfully received if and only if none of the slots in the successful transmission process is collided.

Fig. 4.The freezing process

Although IEEE 802.11 DCF defines two channel access mechanisms, we only focus on the analysis of the basic access mechanism for two reasons: (1) the basic access mechanism is mandatory, whereas RTS/CTS handshaking mechanism is an optional variant; (2) The hidden terminal problem analyzed in this study still exists in the RTS/CTS handshaking mechanism. Furthermore, our work is ready to be extended to the RTS/CTS handshaking mechanism. In Fig. 3, Ds and Df represent the number of slots for a successful transmission process and a collision process, respectively. Indeed, since the sending node relies on the reception of the ACK frame to determine if the packet is successfully received, both the successful transmission process and the collision process consist of D slots for the basic access mechanism.

After a failed transmission, the backoff stage increases, and the contention window (CW) size doubles until to the maximum size (CWmax). When the packet reaches a specific retry limit, it will be discarded and the backoff stage will be resumed to the initial backoff stage. Let Wi denote the contention window size of the ith backoff stage and m denote the retry limit, then CWmax can be simplified to Wmax. Therefore, Wi can be expressed as

where m' =log2(Wmax/W0).

For writing convenience, we define the transition probability from state “a” to state “b” as p(b|a). Then based on the analysis above, the non null one-step transition probabilities of the model are

Next, we try to find a solution for the Markov chain. Let p(i, j, k, l) be the probability of a node occupying the state {i, j, k, l} at a generic slot. Actually, it is different for each sending node. For notational simplicity, we drop n from the expression pn(i, j, k, l). Based on the non null one-step transition probabilities analysis, for the backoff process, we note the following relation

For k = Wj-1, we have

where ps(n) is the probability that the packet will be successfully received by the destination node. Thus, we can obtain the probability of any state in the backoff process

Note that the backoff stage increases after a fail transmission until to a specific retry limit, i.e.,

Then, we can further express the probability of any state in the backoff process as a function of p(0, 0, 0, 0)

Hence, for a generic slot, the probability of node n being in the backoff process is

Since the node sends the packet when the backoff counter reaches zero, the transmission probability in a slot, τ(n), can be derived as

It is an important metric for the performance evaluation of the IEEE 802.11 ad hoc network, and it will be used for calculating the collision probabilities.

From the second and the third equation in (5), we obtain the probability of any state in the freezing process as

For the successful transmission process, we have

where j∈ [0, m]. The first equation in (14) represents that there is no collision at the first slot of the transmission process. The other equation in (14) denotes the fact that there is no persistent collision at any other slot of the successful transmission process. Hence, by means of equations (9) and (14), the probability that the tagged node is in the successful process at a generic slot is

For the collision process, we have

where j∈[0, m]. It represents that node n can go into the collision process from either the backoff process with a probability of pc1(n) or the successful transmission process with a probability of pc2(n). Then by substituting equation (9) into equation (16), we can derive the probability that node n remains in the collision process as follows

Thus, the probability that the tagged node is in the transmission process in a generic slot can be expressed as

By adopting the normalization condition, we have

For writing convenience, we assume

Then, substituting equations (10), (11), (13), (15) and (17) into equation (19), we can obtain

Given the length of the packet, D can be obtained as

where H, E[P], and ACK represent the time period the node needs to transmit the MAC and PHY frame header, the packet, and the ACK frame, respectively.

4.2 Collision Probabilities

As discussed above, we note that when d is larger than 0.79rtx, the collision range of the receiver exceeds the physical carrier sense range of the transmitter thus leading to two different kinds of collisions. Here, we aim to calculate the collision probability at the first slot of the transmission process, pc1, and the collision probability at any other slot of the transmission process, pc2.

Let ZI and ZP denote the set of transmitters in the instantaneous collision zone and the persistent collision zone, respectively. As shown in Fig. 1, the transmitter of flow 1 (node A) wants to transmit a packet to its receiver (node B). When the backoff counter of node A reaches zero, collisions will occur at node B if any other transmitter within its instantaneous collision range (i.e. node C) simultaneously transmits a frame or transmitters in the persistent collision zone (i.e., node D) are in the transmission process. In addition, if there are flows of which the transmitters are out of the physical carrier sense range of node A and the collision range of node B while the receivers are in the collision range of node B (i.e., node E), collisions can also occur due to the transmission of the ACK frames. Denote ZA as the set of the transmitters of these flows. Then, the collision probability of node n, pc1(n) can be calculated by

Since a receiver responds with the ACK frame upon receiving the packets successfully regardless of the channel state, both the collisions due to the transmitters in the persistent collision zone and the collisions due to the ACK frames exist during the whole transmission process. The collision probability pc2(n) can be obtained as

Hence, the instantaneous collision zone and the persistent collision zone only refer to the sending nodes. For simplicity, we assume that the ACK frame can be transmitted in a slot and can be successfully received since it is much shorter than the Data frame. The packet will be successfully received only if none of the slots is collided during the whole transmission process. Therefore, we have the successful probability, ps(n)

4.3 The Freezing Process

Up to now, it turns out that the only unknown variables are the freezing probability pf(n) and the number of slots in a freezing process, M(n). Here, we compute them through an iterative way which is originally proposed in [24]. The authors in [24] employed the continuous time Markov chain model to obtain the fraction of time during which the tagged node can potentially start to transmit. In the continuous time Markov chain model, the tagged node (i.e., node n) is assumed to transmit packets according to a Poisson point process with a rate of g(n) and the average length of packets transmitted from node n is 1/u(n). Each state of the continuous time Markov chain is a set of links that can coexist due to the spatial reuse property of the wireless medium. The steady-state probability can be expressed as

where Q(Φ) is the probability that there is no node transmitting a packet. Normalizing equation (27), we obtain

Since node n is assumed to schedule its transmissions according to a Poisson point process, we obtain the probability that no scheduling event starts while node n can transmit during a time interval σ as e-G(n)σ. In the four-dimensional Markov chain model, the probability can be expressed as (1-τ(n))(1-pf(n)). Thus, we have

where G(n) denotes the aggregate scheduling rate while node n can transmit i.e.,

where A(n’|n) represents the probability that one of its neighbors, say n’, is allowed to transmit, conditioned on the fact that n can transmit. Let represent the set of all transmitters that locate outside the physical carrier sense range of node n, A(n’|n) can be derived as

The probability of the channel around node n being sensed idle can be expressed as

We then establish the relationship between the continuous time Markov model and the fixed slot time based Markov chain model as shown in equations (11), (29) and (32). Given an initial guess of g(n) and u(n), we can calculate pf(n) and A(n) through equations (29) and (32), respectively. Then, with A(n), we can obtain M(n) by means of equation (11). With pf(n) and M(n), the per-flow throughput s(n) can be calculated through equation (3). Since the packet will be successfully received if there is no persistent collision when the nodes in the physical carrier sense range of node n are not transmitting, the throughput of node n can also be expressed as

Equation (33) can thus be used to update g(n). Then all the variables such as pf(n), τ(n), pc1(n), pc2(n) , ps(n), etc. in the fixed slot based Markov chain model can be updated accordingly. Note that the variables are used in turn in equation (3) to calculate a new per-flow throughput s(n) again. Thus, the procedure continues until convergence is reached.

 

5. Model validations and Analysis

In order to validate the model, we have compared the analytical results with the simulation results obtained by the QualNet simulator. We consider the topology where 30 flows randomly distributed in a square of 2000×2000m, as shown in Fig. 5. The solid lines denote the transmission pairs and the dotted lines connect the sending nodes that are in the physical carrier sense range of each other. The transmitter of the nth flow is denoted as node n. The transmission range and physical carrier sense range are set to 250m and 530m, respectively. Without loss of generality, we set the distance between the transmitter and its receiver to 200m for each flow. Then, we can obtain that the collision range for each receiver is approximate to 356m by means of equation (2). Each node always has at least one packet to send and the payload from the application layer is fixed at 256 bytes. Other parameters used to obtain the analytical results and simulation results are summarized in Table 1.

Fig. 5.A random topology of 30 flows

Table 1.The simulation parameters

5.1 Transmission Probabilities

Fig. 6 shows the analytical and simulation transmission probabilities of each flow. It can be seen that the simulation results and the analytical results are approximately matched well. We note that the transmission probabilities of the flows differ from each other significantly. Indeed, before each transmission, nodes may spend some time on the backoff process and the freezing process. The less time nodes spend on them, the higher transmission probabilities will be obtained. Fig. 7 and Fig. 8 show the analytical and simulation results of the probabilities that the nodes stay in the freezing process and the backoff process, respectively.

Fig. 6.Transmission probability of each flow

Fig. 7.The probability of the tagged node being in the freezing process

Fig. 8.The probability of the nodes being in the backoff process

In simulation, we measure the probability that the tagged node remains in the freezing process as the fraction of time each sending node spends on the freezing process. Let pf’ denote the probability that the tagged node is in the freezing process in a slot, it can be calculated as

This is mainly depended on the behavior of the nodes that locate in the physical carrier sense range and is less affected by the collisions the tagged node has experienced. We can see that the probability of node 28 being in the freezing process is rather low because it has only one node in its physical carrier sense range.

Fig. 8 shows simulation and analytical results of the probability of node i (i=1, 2,…30) being in the backoff process, denoted as A(i) in this paper. This quantity can be calculated by means of equation (11). In Fig. 9, the probabilities of the nodes in the backoff progress under different contention window sizes. As expected, this probability increases as the initial contention window size increases. As a result, the transmission probabilities will decrease when the initial contention window size increases for the most flows. In addition, since the transmissions of other nodes in the physical carrier sense range also make the tagged node defer its transmission, the transmission probabilities of some nodes can also increase due to the decrease of the transmission probabilities of the nodes in their physical carrier sense range.

Fig. 9.The probabilities of the nodes being in the backoff progress

Another interesting finding is that for the most flows that achieve higher transmission opportunity, the probabilities that they are in the backoff progress are higher. Hence, we can see that the transmission probabilities of these flows get lower when the initial contention window size increases because they spend more time on the backoff progress as shown in Fig. 10. Meanwhile, flows will spend less time on the freezing process when the transmission probabilities of other flows get lower as shown in Fig. 10. As a result, the transmission probabilities of the flows will get higher. Hence, we can see it from Fig. 11 that some flows get lower transmission probabilities while other flows get higher transmission probabilities when the initial contention window size increases.

Fig. 10.The probabilities of the nodes being in the freezing progress

Fig. 11.Transmission probabilities

5.2 Collision Probabilities

The simulation and analytical results of the collision probability of each flow are shown in Fig. 12. Note that the six flows that have much higher collision probability than other flows all suffer from persistent collisions. Table 2 shows the analytical instantaneous and persistent collision probabilities of the six flows.

Fig. 12.Collision probability of each flow

Table 2.The instantaneous and persistent collision probabilities

As analyzed above, the collision probability of the tagged node depends on the transmission probabilities of the interference nodes. Node 28 and node 13 locate in the persistent collision zone of node 2 and node 26, respectively. Since node 28 has a higher transmission probability than node 13 as shown in Fig. 6, we can see that the collision probability of node 2 is higher than node 26. The persistent collisions of the other four flows are induced by the interfering ACK frames. The ACK frames are transmitted only when the Data frames are received successfully. Besides, the transmission probabilities of node 28 and node 13 are higher than other interfering nodes. Hence, the transmission probabilities of the ACK frames are usually much lower than that of the Data frames from node 28 and node 13. As a result, the persistent collision probabilities caused by them are much lower. Fig. 13 shows the collision probabilities of the six flows when different initial contention window sizes are used. We can find that the collision probabilities of some flows decrease while some others increase a bit, which can also be explained with the transmission probabilities of their interfering nodes.

Fig. 13.Collision probabilities

5.3 Per-flow Throughput

Fig. 14 shows the analytical and simulation results of the saturation throughput of each flow. From the figure, we note that some flows can achieve very high throughput while some other flows get starved due to serious collisions or the lack of opportunity to transmit. The transmission probability and the collision probability are considered as the two fundamental factors that affect the throughput. Note that node 18 has a much higher transmission probability than node 19 as shown in Fig. 6. Hence, we can see that the 18th flow achieves higher throughput than the 19th flow as shown in Fig. 14 though they have almost the common nodes in their respective instantaneous collision zones and no node in their persistent collision zones. Meanwhile, note that the 28th flow has a very high transmission probability and rather low collision probability, as shown in Fig. 6 and Fig. 12. Hence, we can find that the 28th flow achieves rather high throughput.

Fig. 14.Saturation throughput of each flow

In Fig. 15, we plot the per-flow throughputs under two different contention window sizes. We find that when the contention window size increases, the throughputs of the flows that achieve high throughputs are decreased while the throughputs of the flows that achieve low throughputs are increased. This is because that the transmission probabilities of the dominating flows decrease with the increase of the contention window size, and thus provides more opportunity to other flows to transmit their packets. Besides, the collision probabilities of the flows that suffer from serious collisions are also decreased as shown in Fig. 13.

Fig. 15.Throughputs of each flow

 

6. Conclusions and Future Work

In this paper, we show that there are two different kinds of collisions in the whole transmission process, which are referred to as the instantaneous collisions and persistent collisions. Then we propose a four-dimensional Markov chain model based on the fixed length channel slot to analyze the MAC layer throughput of each flow in IEEE 802.11 multi-hop ad hoc networks. Through the model, the transmission probability, the collision probability and the throughput of each flow based on the notion of fixed length channel slot are derived. By comparing the analytical results with the simulation results, we validate the accuracy of our model. Through a further study on the transmission probability, the collision probability, and the throughput of each flow, we also find that the unfairness problem in multi-hop net works can be alleviated by increasing the contention windows for each flow.

In our future work, we will extend the model to design optimal backoff parameters to avoid the unfairness problem. We are also investigating the performance of each flow in IEEE 802.11 multi-hop ad hoc networks with heterogeneous parameters (the transmit power level, transmit rate, etc).

References

  1. D. Benyamina, A. Hafid, and M. Gendreau, "Wireless mesh networks design - a survey," IEEE Communications Surveys & Tutorials, vol. 14, no. 2, pp. 299-310, May 2012. Article (CrossRef Link) https://doi.org/10.1109/SURV.2011.042711.00007
  2. I. F. Akyildiz and X. Wang, "A survey on wireless mesh networks," IEEE Communications Magazine, vol. 43, no. 9, pp. S23-S30, Sept. 2005. Article (CrossRef Link) https://doi.org/10.1109/MCOM.2005.1509968
  3. L. Zhou, Z. Yang, H. Wang, and M. Guizani, "Impact of execution time on adaptive wireless video scheduling," IEEE Journal on Selected Areas in Communications, vol. 32, no. 4, pp. 760-772, Apr. 2014. Article (CrossRef Link) https://doi.org/10.1109/JSAC.2014.140408
  4. L. Zhou, "Mobile device-to-device video distribution: theory and application," ACM Transactions on Multimedia Computing, Communications and Applications, vol. 12, no. 3, pp. 1253-1271, June 2016. Article (CrossRef Link) https://doi.org/10.1145/2886776
  5. G. Bianchi, "Performance analysis of the IEEE 802.11 distributed coordination function," IEEE Journal on Selected Areas in Communications, vol. 18, no. 3, pp. 535-547, Mar. 2000. Article (CrossRef Link) https://doi.org/10.1109/49.840210
  6. E. Ziouva and T. Antonakopoulos, "CSMA/CA performance under high traffic conditions: throughput and delay analysis," Computer Communications, vol. 25, no. 3, pp. 313-321, Feb. 2002. Article (CrossRef Link) https://doi.org/10.1016/S0140-3664(01)00369-3
  7. C. H. Foh and J. W. Tantra, "Comments on IEEE 802.11 saturation throughput analysis with freezing of backoff counters," IEEE Communications Letters, vol. 9, no. 2, pp. 130-132, Feb. 2005. Article (CrossRef Link) https://doi.org/10.1109/LCOMM.2005.02008
  8. I. Tinnirello, G. Bianchi, and Y. Xiao, "Refinements on IEEE 802.11 distributed coordination function modeling approaches," IEEE Transactions on Vehicular Technology, vol. 59, no. 3, pp. 1055-1067, Mar. 2010. Article (CrossRef Link) https://doi.org/10.1109/TVT.2009.2029118
  9. E. Felemban and E. Ekici, "Single hop IEEE 802.11 DCF analysis revisited: accurate modeling of channel access delay and throughput for saturated and unsaturated traffic cases," IEEE Transactions on Wireless Communications, vol. 10, no. 10, pp. 3256-3266, Oct. 2011. Article (CrossRef Link) https://doi.org/10.1109/TWC.2011.072511.101227
  10. K. Ghaboosi, B. H. Khalaj, Y. Xiao, and M. Latva-aho, "Modeling IEEE 802.11 DCF using parallel space–time Markov chain," IEEE Transactions on Vehicular Technology, vol. 57, no. 4, pp. 2404-2413, July 2008. Article (CrossRef Link) https://doi.org/10.1109/TVT.2007.909304
  11. F. Calì, M. Conti, and E. Gregori, "Dynamic tuning of the IEEE 802.11 protocol to achieve a theoretical throughput limit," IEEE/ACM Transactions on Networking, vol. 8, no. 6, pp. 785-799, Dec. 2000. Article (CrossRef Link) https://doi.org/10.1109/90.893874
  12. Y. C. Tay and K. C. Chua, "A capacity analysis for the IEEE 802.11 MAC protocol," Wireless Networks, vol. 7, no. 2, pp. 159-171, Mar. 2001. Article (CrossRef Link) https://doi.org/10.1023/A:1016637622896
  13. G. Bianchi and I. Tinnirello, "Remarks on IEEE 802.11 DCF performance analysis," IEEE Communications Letters, vol. 9, no. 8, pp. 765-767, Aug. 2005. Article (CrossRef Link) https://doi.org/10.1109/LCOMM.2005.1496609
  14. B.-J. Kwak, N.-O. Song, and L. E. Miller, "Performance analysis of exponential backoff," IEEE/ACM Transactions on Networking, vol. 13, no. 2, pp. 343-355, Apr. 2005. Article (CrossRef Link) https://doi.org/10.1109/TNET.2005.845533
  15. T. Sakurai and H. L. Vu, "MAC access delay of IEEE 802.11 DCF," IEEE Transactions on Wireless Communications, vol. 6, no. 5, pp. 1702-1710, May 2007. Article (CrossRef Link) https://doi.org/10.1109/TWC.2007.360372
  16. A. Rahman and P. Gburzynski, "Hidden problems with the hidden node problem," in Proc. of 23rd Biennial Symposium on Communications, pp. 270-273, 2006. Article (CrossRef Link)
  17. S. Xu and T. Saadawi, "Does the IEEE 802.11 MAC protocol work well in multihop wireless ad hoc networks?," in Proc. of IEEE Communications Magazine, vol. 39, no. 6, pp. 130-137, Jun. 2001. Article (CrossRef Link)
  18. G. Anastasi, E. Borgia, M. Conti, and E. Gregori, "IEEE 802.11b ad hoc networks: performance measurements," Cluster Computing, vol. 8, no. 2-3, pp. 135-145, July 2005. Article (CrossRef Link) https://doi.org/10.1007/s10586-005-6179-3
  19. D. Hoang and R. A. Iltis, "Performance evaluation of multi-hop CSMA/CA networks in fading environments," IEEE Transactions on Communications, vol. 56, no. 1, pp. 112-125, Jan. 2008. Article (CrossRef Link) https://doi.org/10.1109/TCOMM.2008.050045
  20. J. He and H. K. Pung, "Performance modelling and evaluation of IEEE 802.11 distributed coordination function in multihop wireless networks," Computer Communications, vol. 29, no. 9, pp. 1300-1308, May 2006. Article (CrossRef Link) https://doi.org/10.1016/j.comcom.2005.10.007
  21. A. A. Abdullah, F. Gebali, and L. Cai, "Modeling the throughput and delay in wireless multihop ad hoc networks," in Proc. of IEEE Global Telecommunications Conference, pp. 1-6, Nov. 30 - Dec. 4, 2009. Article (CrossRef Link)
  22. R. Boorstyn, A. Kershenbaum, B. Maglaris, and V. Sahin, "Throughput analysis in multihop CSMA packet radio networks," IEEE Transactions on Communications, vol. 35, no. 3, pp. 267-274, Mar. 1987. Article (CrossRef Link) https://doi.org/10.1109/TCOM.1987.1096769
  23. X. Wang and K. Kar, "Throughput modelling and fairness issues in CSMA/CA based ad-hoc networks," in Proc. of IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies, pp. 23-34, March 13-17, 2005. Article (CrossRef Link)
  24. M. Garetto, T. Salonidis, and E. W. Knightly, "Modeling per-flow throughput and capturing starvation in CSMA multi-hop wireless networks," IEEE/ACM Transactions on Networking, vol. 16, no. 4, pp. 864-877, Aug. 2008. Article (CrossRef Link) https://doi.org/10.1109/TNET.2007.902687
  25. A. Tsertou and D. I. Laurenson, "Revisiting the hidden terminal problem in a CSMA/CA wireless network," IEEE Transactions on Mobile Computing, vol. 7, no. 7, pp. 817-831, July 2008. Article (CrossRef Link) https://doi.org/10.1109/TMC.2007.70757
  26. K.-L. Hung and B. Bensaou, "Throughput analysis and rate control for IEEE 802.11 wireless LAN with hidden terminals," in Proc. of the 11th international symposium on Modeling, analysis and simulation of wireless and mobile systems, pp. 140-147, October 27–31, 2008. Article (CrossRef Link)
  27. K. Ghaboosi, M. Latva-aho, Y. Xiao, and B. H. Khalaj, "Modeling nonsaturated contention-based IEEE 802.11 multihop ad hoc networks," IEEE Transactions on Vehicular Technology, vol. 58, no. 7, pp. 3518-3532, Sept. 2009. Article (CrossRef Link) https://doi.org/10.1109/TVT.2008.2012158