You are on page 1of 7

Impact of Relay Positions on MAC

Performance of Multihop Cellular Networks


Varsha Sharma and R.C. Jain
AbstractWhen relaying functionality is included in cellular networks, the resulting system is called Multihop Cellular Network
(MCN). MCNs were proposed to combine the advantages of conventional cellular networks (CCNs) and multihop ad-hoc
networks. Medium access control (MAC) in MCNs is different from that in CCNs and Ad-hoc networks. In this paper we present
an overview of relaying in MCNs, and propose a reservation based MAC procedure for MCNs with fixed relays. We have
analyzed the performance of MCNs using the proposed MAC by varying the position and number of relay nodes in the cell.
Index TermsConventional Cellular Network, Multihop Cellular Network, MAC, Relaying


1 INTRODUCTION
Thesizeoftheannualcellularcommunicationsbusinessin
the world has grown tremendously in less than 10 years.
The cellular network has gone through three generations.
Cellular, wirelesscable, and other telecommunications
and broadcasting corporations are increasing the voice
capacity of their networks and are adding new data fea
tures so that customers with wireless modulation
demodulationdevicesinportablepersonalcomputersand
workstations can access electronic mail and facsimile,
written graphic, audio and video messages. For the cellu
lar industry, selection of the most appropriate access me
thod is a challenging task. This task is focused on the
choicebetweentimedivisionmultipleaccess(TDMA)and
spreadspectrum code division multiple access (CDMA)
architectures.
One approach to increase the capacity of conventional
cellular networks (CCNs) is to install more base stations
(BSs) or to reduce the cell radius. This is not an efficient
solutionbecausethecostofinstallingbasestationsishigh.
An alternative solution is to use relay nodes to establish
multihopcommunicationpathsbetweenmobileterminals
(MTs) and their corresponding base stations (BSs). When
relaynodes(RNs)areintegratedintoconventionalcellular
networkstheresultingsystemisknownasmultihopcellu
lar network (MCN). RNs do not have a wired connection
to the backhaul. Thus, the costs of the backplane that
servesastheinterfacebetweentheBSandthewiredback
haul network can be eliminated for RNs. MCN concept
wasfirstproposedbyLinandHsu[1]tocombinetheben
efits of conventional cellular networks and ad hoc net
works.ThefundamentalgoalofMCNsistobreakasingle
long communication link into many shorter links to re
duce the required transmission power of MTs. The re
duced transmission power results in lower interference
level. Fig.1. shows the comparison between CCN and
MCN. MTA can directly communicate with the BS using
singlehop communication as in CCNs. MTB communi
cates with the BS using two hop communication using a
RN.
Existing architectures and protocols proposed for MCNs
are very diverse and different in several aspects. Relay
nodescanbepreinstalledbynetworkoperatorsorsimply
beotheridleMTswhoarenottransmittingtheirowndata.
Also depending on how radio resources are allocated for
routing paths of active connections, different protocols at
the medium access control and routing layers can be de
signed. Radio resources for MTs at different hops may be
allocated in timedivision duplex (TDD) or frequency
divisionduplex(FDD)mode[2].











Fig.1. CCN vs. MCN

ThefocusofthispaperisonevaluatingtheMACprotocol
performanceofacellularnetworkwithrelays(MCNs)by
varyingthepositionandnumberofrelaysinthecell.Rest
of this paper is organized as follows: Section II gives the
classification of relaying schemes used in MCNs, Section
III gives a brief overview of medium access control, Sec
tion IV describes TDDCDMA, Section V describes the
importanceofpowercontrolinCDMAnetworks,Section
VI describes the system model used for simulation, The
MAC protocol for MCNs is described in section VII, Re

Varsha Sharma is with School of Information Technology, RGPV, Bhopal,
India

R.C. Jain is with Samrat Ashok Technological Institute, Vidisha, India




MT-RN link RN-BS MT-BS link
MTA MTB
BS RN
JOURNAL OF COMPUTING, VOLUME 4, ISSUE 1, JANUARY 2012, ISSN 2151-9617
https://sites.google.com/site/journalofcomputing
WWW.JOURNALOFCOMPUTING.ORG 43

sults are discussed in section VIII. Finally section IX con
cludesourwork.

2 RELAYING
The major goal of adding relay nodes (RNs) in conven
tionalcellularnetworksistoincreasecoverageandcapac
ity.Whenthedirectpathbetweensource anddestination
is blocked by some obstacle, reliable communication
might be possible via the available RNs through several
routes.Relaynodesareusedasrepeaters,bridgesorrou
ters. Relay nodes can assist communications to and from
MTs at the cell edge or MTs experiencing deep fading in
their home base station. The capacity enhancement of
multihop relaying comes from the decrease in path loss
due to the use of multiple hops to transmit data to/from
the corresponding BS compared to the singlehop trans
missioninCCNs.RNsstorethedatareceivedfromtheBS
andforwardtotheMTsviawirelesslinks,andviceversa.
The medium access control (MAC) is in charge of intro
ducing the relay resources into the frame structure of an
existingprotocol[3].

2.1 In-Band vs. Out-of-Band Relaying
The multihop relaying method for cellular wireless net
works was considered by the Third Generation Partner
ship Project (3GPP) under the name opportunitydriven
multiple accesses (ODMA). In ODMA and similar relay
ing methods different hops on a routing path share the
wirelesschannel(e.g.incodedomain)inTDDmode(e.g.,
TDD codedivisionmultiple access). We refer to this me
thodasinbandrelaying.Theadvantageofinbandrelay
ing is that no modification of MTs is required, and MTs
can serve as RNs if they are not transmitting their own
data[2].
MTscanalsobeequippedwithmultipleradios/interfaces
tocommunicatewithdifferentwirelesssystemsondiffer
ent frequency bands. For example, an MT may have two
interfaces, one for 3G cellular and the other for IEEE
802.11 (WiFi) networks. In other words, the RNMT links
could use an unlicensed band (e.g. IEEE 802.11x) rather
thanthelicensedbandusedfortheBSMTlinks,yielding
substantial gains from load balancing through RNs. This
implementation is called outofband relaying [4]. With
this multiple radio/interface capability, MTs can enjoy
highdataratesusingtheWiFiinterfacewhentheyarein
thecoverageareasofWiFihotspots.IfanMTexperiences
bad channel conditions, its data can be relayed via other
MTsbyusingthehighrateWiFiinterface.
2.2 Fixed vs. Mobile Relaying
The RNs might be fixed network elements deployed by
the service provider, which have lower cost and transmit
power compared with the BSs. This type of RNs is re
ferred to as fixed relays. Fixed relays will be less expen
sivethanthecellularBSortheWLANAps,astheydonot
requireawiredbackhaulconnection.Alternatively,aMT
can play the role of data forwarding for other MTs. This
type of relay nodes are called mobile relays. A combina
tion of mobile relays and fixed relays is also possible
inMCNswhichisreferredtoashybridrelays[5].
3 WIRELESS MEDIUM ACCESS ALTERNATIVES
Wireless networks have evolved around voice or data
applications, and as a result we can divide them into
voice and dataoriented networks. The access methods
adopted by voice and data oriented networks are quite
different. Voiceoriented networks are designed for rela
tively long telephone conversations as the main applica
tion. The wireless access methods evolved for interaction
with these networks assigns a slot of time, a portion of
frequency or a specific code to a user preferably for the
entire length of the conversation. We refer to these tech
niques as fixedassignment channel access methods or
channel partitioning techniques. The three basic fixed
assignment multipleaccess methods are FDMA, TDMA,
and CDMA. Data networks were originally designed for
burstsofdataforwhichthesupportingnetworkdoesnot
haveaseparatesignalingchannel.Werefertotheaccess
methods used for these networks as randomaccess me
thodsaccommodatingrandomlyarrivingpacketsofdata.
Certainlocalareadatanetworksalsotaketurnsinaccess
ing the medium as in the case of token passing and pol
lingschemes.Insomeothercases,therandomaccessme
chanismsareusedtotemporarilyreservethemediumfor
transmittingthepacket[6].
The choice of an access method will have a great impact
onthecapacityandQoSprovidedbyanetwork.Theim
pact of multiple access schemes is so important that we
commonly refer to various voiceoriented wireless sys
tems by their channel access method. A network that is
identified with an access technique often uses other ran
dom or fixedassignment techniques as apart of its over
alloperation[6].
4 TDD-CDMA
We have considered TDDCDMA cellular network in our
work because of its advantages over other type of net
works. CDMA is primarily an airinterface or radio
transmission technology and access technique that is
basedondirectsequencespreadspectrumtechniques.
An important design parameter related to the access me
thod is the difference between the carrier frequencies of
the forward (downlinkcommunication between the base
station and mobile terminals) and reverse (uplink
communicationbetweenthemobileterminalandthebase
station) channels. If both forward and reverse channels
usethesamefrequencybandforcommunications,butthe
forward and reverse channels employ alternating time
slots, the system is referred to as employing TDD. If the
forward and reverse channels use different carrier fre
quencies that are sufficiently separated, the duplexing
scheme is referred to as FDD. With TDD, because only
one frequency carrier is needed for a duplex operation,
we can share more of the RF circuitry between the for
wardandthereversechannels[6].
For the multimedia application such as streaming au
JOURNAL OF COMPUTING, VOLUME 4, ISSUE 1, JANUARY 2012, ISSN 2151-9617
https://sites.google.com/site/journalofcomputing
WWW.JOURNALOFCOMPUTING.ORG 44

dio/video or web services, the downlink traffic will be
thebottleneck of the system. On the other hand, the up
link traffic may be bursty and irregular when mobile us
ers use the application like file uploading services. The
code division multiple access system with time division
duplex mode (TDDCDMA) is a promising solution to
copewiththetrafficasymmetryproblem.Theresourceof
TDDCDMAisdividedinbothtimeandcodedomain.In
a cell of a TDDCDMA system, the base station and all
mobiles occupy a single band employing a direct se
quencespreadingwaveform.Thebidirectionalcommuni
cation between base and mobiles is accomplished by a
TDDscheme.EachslotinTDDcarriestrafficfordifferent
mobilestationseparatedbyCDMAcode[7].
5 POWER CONTROL
By power control we mean the algorithms, protocols and
techniques that are employed in a wireless network to
dynamically adjust the transmit power of either the MT
or BS for reducing interference. When power control is
implemented properly, it can improve the quality of
communications by increasing the SIR. Two types of
power control are implemented an open loop and a
closedloop.
5.1 Open-loop and Closed-loop Power Control
Open loop power control is usually implemented on the
reverse link. In open loop power control, the MT meas
ures the quality of a reference channel from the base sta
tion.TheremaybeavarietyofmeasuressuchasRSS(Re
ceivedSignalStrength)orBER(BitErrorRate).IftheRSS
or BER are above certain thresholds, the mobile terminal
willautomaticallyreduceitstransmitpower.Ifthesignal
quality is not good, the MT will increase its transmit
power. The decision on reducing or increasing the trans
mit power on the reverse channel is based on the mea
surement of the signal quality on the forward channel.
These channels are not usually correlated, and a good
signal reception on the forward channel does not neces
sarilymeanthesameonthereversechannel.TheMThas
nomeansofdeterminingwhetherithasachievedthegoal
ofminimizingthetransmitpower.
Closed loop power control eliminates the disadvantages
of open loop power control by implementing a feedback
mechanismbetweentheBSandMT.TheBSmeasuresthe
quality of the signal received from the MT and indicates
whatactionstheMTshouldtakeviacontrolsignalingon
theforwardchannel.
5.2 Centralized and Distributed Power Control
The goal of any power control scheme should be to un
iformlyrendertheSIR(SignaltoInterferenceRatio)ofall
users to a value, which is usually the maximum possible
SIR in the system. In terms of how such an optimization
can be done are two approaches Centralized and Distri
buted.
In centralized power control scheme, a central controller
intheBScontrollerhasknowledgeofalltheradiolinksin
thesystem.Thatis,thetransmitpowers,receivedpowers,
SIRs and BERs for all MTBS combinations are known to
thiscentralizedcontroller.Anoptimizationalgorithmcan
be implemented to maximize the minimum SIR in the
system and minimize the maximum SIR in the system,
therebyequalizingtheSIRofallradiolinks.
IndistributedpowercontroltheMTsadjusttheirtransmit
powersindiscretesteps.Thepoweradjustmentsmadeby
theMTSresultinthetransmitpowersiterativelyconverg
ing to the optimum power control solution. Ideally this
should result in all the MTs having the same SIR after a
numberofadjustments.Inpractice,theadjustmentstothe
powerlevelsarealsodiscrete(instepsofafewdB).
Inthispaperwehaveusedclosedloop,distributedpow
ercontrol.
6 SYSTEM MODEL AND THE PROPOSED MAC
A cellular system, with a BS at the center of each cell, is
consideredinthenetworkdesign.Wehaveconsidered19
cellswithhexagonalshape.These19cellsarearrangedin
twotierfashion.Eachcellisdividedintotwolayers,inner
layer and outer layer. Fixed RNs are placed at the boun
dary separating the inner layer and outer layer. For sim
plicityweconsiderascenariowhereatmosttwohopsare
allowed.InnerLayeristheareacontiguoustotheBSand
the MTs in this area communicates to the BS directly us
ing a singlehop. Outer Layer surrounds the inner layer
andtheMTslocatedinthisareacommunicatetotheBSin
two hops with the help of relay nodes located at the
boundary separating the inner layer and the outer layer.
One hop is for the MTRN and one hop is for the RNBS
communication. We have considered fixed relay nodes
(RNs)placedsymmetricallyasinfigure2.




















Fig. 2. Cell with Fixed Relay Nodes

Previous work on reservation based MAC schemes in
cellularnetworkshavefocusedonCCNs,whereaMTcan
be directly connected to the BS. However, a MT in MCN
cannot always be connected to the BS directly.A brief re
view of some reservation based MAC schemes is pre
sentedin[9].

Outer Layer
Inner Layer
RN1
RN3
RN2
RN4
Base Station
JOURNAL OF COMPUTING, VOLUME 4, ISSUE 1, JANUARY 2012, ISSN 2151-9617
https://sites.google.com/site/journalofcomputing
WWW.JOURNALOFCOMPUTING.ORG 45

In the proposed MAC scheme time is divided into fra
meswith frame duration of 10ms. Each frame is divided
into 15 time slots. Since we are using TDD duplexing
mode, the first 7 time slots are for uplink transmission
and last 8 slots are for downlink transmission. Each time
slothasmultiplecodeslots.Acodeslotcanbeeitherfree
for contention or reserved by some MT for information
transmission. MTs in the inner layer can communicate
with the BS directly like CCNs using one hop transmis
sion.MTsintheouterlayercancommunicatewiththeBS
with the help of a Relay node (RN) using two hop trans
mission. One hop is for the MTRN and one hop is for
theRNBScommunication.

6.1 MAC procedure for MTs in the inner layer
MTs in the inner layer can communicate with the BS us
ing single hop communication i.e. they can directly com
municate with the BS without using relays. The MAC
procedureforMTilisdividedintocontentionandreserva
tionprocess.Powercontrolisexecutedatthebasestation.
a) DuringthedownlinksubframedlsMTil listensto
the broadcast by BS. The broadcast contains the
information about free and reserved code slots
andsomeadditionalinformation[8].
b) During the next uplink subframe uls MTil selects
thefirstfreecodeslotinatimeslotfortransmis
sionofitscontentionpacketwithprobabilityp.
c) MTil calculates the required transmit power. The
required transmit power in dBm, for a MTil to
transmitinagiventimeslotxisdeterminedby
P
rcqMT
I
=
cont
+P
IntI
+PL
MT
I

contistheEb/No(ratioofbitenergytonoisedensi
ty)indBforcontentionpackets,Pintfistheinterfe
rencelevelatthebasestationfortimeslotx,PLMTil
is the estimated path loss between MTil and the
basestationindB,where
PL
MT
I
= K
PL
+1ulog
10
(u) +X
KPL is the constant of path loss in dB because of
the background noise, is pathloss exponent, d
denotes the distance between MTil and the BS in
km and X is for shadowing effect. MTil transmits
its contention packet to BS using the calculated
transmit power with permission probability Pp.
MTil can transmit more than one contention pack
etstoBSusingcodeslotsinothertimeslotsinthe
uplinksubframeuls.
d) Whencontentionpacketissuccessfullyreceivedat
the BS in a particular code slot, that code slot is
convertedintoareservedcodeslotforMTilforin
formationtransmissioninthe(uls+1)
st
uplinksub
frame and the BS will inform about this reserva
tion to MTil in (dls+1)
st
downlink subframe. If no
contentionpacketofMTilisreceivedatBS,orthere
is no free code slot, the MTil will buffer its voice
packets and will repeat the contention process in
the (uls+1)
st
uplink subframe and select another
freecodeslotforcontention.
e) Inthem
th
uplinksubframe,MTil transmitsitsin
formation packet in its reserved code slot. If BS
finds that the transmit power of MTil is greater
than the power control upper threshold, then BS
will inform MTil to reduce its transmit power by
some predefined value. If transmit power of MTil
is less than the power control lower threshold,
then BS will inform MTil to increase its transmit
power by some predefined value. These power
control instructions are sent by the BS in the
downlink broadcast in the (m+1)
th
downlink sub
frame. In the (m+1
)th
uplink subframe MTil adjusts
its transmit power accordingly. When MTil com
pletesitstransmission,itwillinformtheBStofree
thecorrespondingreservedcodeslot.

6.2 MAC procedure for MTs in the outer layer
ForMTsintheouterlayer,thecontentionprocedurecon
sists of two phases: MTRN phase and RNBS conten
tionphase.TheRNsreceivepacketsfromMTsandrelays
those packets to BS. For avoiding selfinterference at the
RN,thetransmissionandreceptionbytheRNshouldnot
bedoneonthesamefrequencyatthesametime.Forthis,
two different time slots should be used for MTRN
transmissionandRNBStransmission.
When MTol has information to send the following steps
areperformed
a) MTol selects a suitable RN, by determining the
pathlossandselectsRNwiththeminimumpath
loss.
b) During the downlink subframe dls, MTlol listens
tothedownlinkbroadcastbyRN.
c) During the uplink subframe uls MTol selects the
first free code slot in a time slot and determines
the required uplink transmit power in the same
way as MTil and transmits its contention packet
totheselectedRNwithpermissionprobabilityPp
usingthecalculatedtransmitpower.
d) IfthecontentionpacketofMTolissuccessfullyre
ceived at the RN in a particular code slot, that
code slot wil be reserved for MTol, and MTol can
transmit its information(voice) packet to RN in
the (uls+1)
th
uplink sub frame using the reserved
code slot in the corresponding timeslot. After
this,RNbufferstheinformationpacketsreceived
from MTol for a maximum time period of Tmax
and starts its contention process to send conten
tionpacketstotheBS.
e) TheRNBScontentionprocessissameasthatof
MTilRNcontentionprocess.Duringthe(m+1)
th
downlink subframe RN listens to the broadcast
from BS and during the (m+1)
th
uplink subframe
RN selects a free code slot for transmission of
contention packet to BS and calculates the re
quired transmit power. RN then transmits its
contention packet to BS with the calculated
transmitpower.
f) If the contention packet of RN is successfully re
ceived at the BS in a particular code slot, that
JOURNAL OF COMPUTING, VOLUME 4, ISSUE 1, JANUARY 2012, ISSN 2151-9617
https://sites.google.com/site/journalofcomputing
WWW.JOURNALOFCOMPUTING.ORG 46

code slot will be reserved for the RN for the
transmissionofvoicepacketbufferedbytheRN.
If the RNBS contention is not successful, RN
will repeat the same contention process until the
contentionissuccessful
g) When RN transmits its buffered voice packet to
BS, BS executes the same power control process
as in the case of MTilBS communication. If
there are multiple packets in the buffer of RN,
thenRNwilltransmitthesepacketstoBSinFIFO
order. When MTol finish its transmission, MTol
will inform RN, and RN will inform BS, to free
thecorrespondingreservedslot.
7 SIMULATION ASSUMPTIONS AND RESULTS
For simplicity we have assumed stationary MTs in our
simulations,i.e.theMTsdonotchangetheirposition.We
have used voice packet data in our experiments. The
source of voice has a rate of 8 Kbps. The Markov two
statemachineisusedtomodelthevoicedata.Twostates
arerequiredbecausevoiceisaseriesoftalkspurtswhich
are separated by silence gaps. The average duration of
talk spurts and silence gaps are set to 1 second and 1.3
secondsrespectively.Ifthenumber oferrorsoccurringin
areceivedpacketisgreaterduetolargeinterference,that
packet is corrupted; otherwise it is decoded and success
fully received at the BS (RN). The upper and lower limit
of transmit power for power control are set to 2dB and 1
dB respectively. For voice transmission, voice packets re
maining in the MSs/RNs buffer longer than Tmax have to
be dropped as they require timely delivery. Tmax is set to
.02seconds.
In our previous work, we have compared the perfor
manceofCCNsandMCNs[8].
ForperformanceevaluationofMCNsusingtheproposed
MAC protocol, we have considered four performance
metrics: Throughput, Capacity, Packet Drop Probability
and Power Outage Probability. The cell radius is set to a
constantvalueof1.0kmandthenumberofsimultaneous
userssupportedpercellisvariedfrom30to70.Wehave
varied the position of relay nodes in cell from 0.3*cell ra
diusto0.7*cellradius.Forstudyingtheimpactofnumber
of RNs on MAC performance of MCNs we have varied
RNsfrom2to6.

7.1 Throughput
The throughput is defined in terms of packets received
pertimeslot.Thecellthroughputisdefinedasthesumof
eachusersthroughputwithinacell.
FromFig.3,wefindthatthethroughputofMCNisbetter
when relay nodes are placed in the middle (0.4*R or
0.5*R) of the cell. From Fig.7, we find that, when more
RNsareusedthethroughputisbetter.

7.2 Capacity
The capacity of a cellular system is normally defined as
thenumberofsimultaneouscallswithanacceptablequal
ity of service in a cell. We have considered capacity in
terms of average mobile terminals supported per time
slot. From Fig.4, we findthat when RNs are placed near
thecenterofthecell(closetothebasestation),thecapaci
tyofMCNsisless.WhenRNsareplacedinthemiddleof
thecellornearcellboundaryMCNshavehighercapacity.
FromFig.8,wefindthat,whenthenumberofsimultane
ous users per cell is low, increasing the number of RNs
has not much effect on capacity. However, when the
number of simultaneous users per cell is high increasing
the number of RNs can increase the capacity considera
bly.

7.3 Packet Drop Probability
Packets can be dropped when there is excessive delay or
thevoicepacketshavetostayinthebufferofRNslonger
thanTmax. becausetheyrequiretimelytransmission.Pack
et drop probability is defined as the the ratio of number
of dropped packets to the total number of generated
packets.ItisclearfromFig.5thatpacketdropprobability
of MCNs is lower when RNs are placed in the middle
positionsinthecell.FromFig.9,itisclearthat,forlarger
numberofRNs,thepacketdropprobabilityislow.

7.4 Power Outage Probability
Power Outage probability, is the probability that a MT
reachesitsmaximumtransmitpower.Highpoweroutage
probabilityleadstohigherpacketlossduetointerference.
Thepoweroutageprobabilityisdefinedastheratioofthe
number of packets transmitted with power greater than
the upper limit to the total number of transmitted pack
ets.Fromfig.6,itisclearthatpoweroutageprobabilityof
MCNs is lower when RNs are placed near cell boundary.
ForMTsnearthebasestation,therequiredtransmitpow
er is low. For MTs near the cell boundary, the required
transmit power is high. Hence by placing relay nodes
near the cell boundary, MTs near the cell boundary can
relaytheirpacketsthroughRNswithlesstransmitpower
and hence the power outage probability becomes low.
From Fig. 10, we find that for larger number of RNs, the
poweroutageprobabilityislowerthanforlessnumberof
RNs.















Fig.3.ImpactofRNPositionsonThroughput
0
2
4
6
8
10
30 40 50 60 70
T
h
r
o
u
g
h
p
u
t
No.ofSimultaneoususersperCell
0.3*R
0.4*R
0.5*R
0.6*R
0.7*R
JOURNAL OF COMPUTING, VOLUME 4, ISSUE 1, JANUARY 2012, ISSN 2151-9617
https://sites.google.com/site/journalofcomputing
WWW.JOURNALOFCOMPUTING.ORG 47














Fig.4.ImpactofRNPositionsonCapacity

Fig.5.ImpactofRNPositionsonPacketDropProbability






Fig.6.ImpactofRNPositionsonPowerOutageProbab.






Fig.7.Impactofno.ofRNsonThroughput












Fig.8.Impactofno.ofRNsonCapacity





Fig.9.Impactofno.ofRNsonPacketDropprobability

Fig.9.Impactofno.ofRNsonPacketDropProbability

Fig.8.Impactofno.ofRNsonPowerOutageProbability




Fig.10.Impactofno.ofRNsonPowerOutageProbability
8 CONCLUSION
In this paper, we have discussed the various relaying
schemesforMCNsandproposeareservationbasedMAC
protocol for multihop cellular networks. We have used
CDMA as access scheme and TDD mode of duplexing.
For evaluating the performance of multihop cellular net
works using the proposed MAC protocol we have consi
dered the performance metrics, of throughput, capacity,
packet drop probability and power outage probability.
Theresultsindicatethat,thereisonlyaslightvariationin
thevaluesofthroughput,capacity,packetdropprobabili
0
0.5
1
1.5
2
2.5
3
3.5
4
4.5
30 40 50 60 70
C
a
p
a
c
i
t
y
No.ofSimultaneousUsersperCell
0.3*R
0.4*R
0.5*R
0.6*R
0.7*R
0
0.05
0.1
0.15
0.2
0.25
0.3
0.35
30 40 50 60 70
P
a
c
k
e
t

D
r
o
p

P
r
o
b
a
b
i
l
i
t
y
No.ofSimultaneousUsersperCell
0.3*R
0.4*R
0.5*R
0.6*R
0.7*R
0
0.05
0.1
0.15
0.2
30 40 50 60 70
P
o
w
e
r

o
u
t
a
g
e

P
r
o
b
a
b
i
l
i
t
y
No.ofSimultaneousUsersperCell
0.3*R
0.4*R
0.5*R
0.6*R
0.7*R
0
1
2
3
4
5
6
7
8
30 40 50 60 70
T
h
r
o
u
g
h
p
u
t
No.ofSimultaneousUsersperCell
2RNs
4RNs
6RNs
0
0.5
1
1.5
2
2.5
3
3.5
4
4.5
30 40 50 60 70
C
a
p
a
c
i
t
y
No.ofSimultaneousUsersperCell
2RNs
4RNs
6RNs
0
0.05
0.1
0.15
0.2
0.25
0.3
0.35
30 40 50 60 70
P
a
c
k
e
t

D
r
o
p

p
r
o
b
a
b
i
l
i
t
y
No.ofsimultaneousUsersperCell
2RNs
4RNs
6RNs
0
0.05
0.1
0.15
0.2
30 40 50 60 70
P
o
w
e
r

O
u
t
a
g
e

P
r
o
b
a
b
i
l
i
t
y
No.ofSimultaneousUsersperCell
2RNs
4RNs
6RNs
JOURNAL OF COMPUTING, VOLUME 4, ISSUE 1, JANUARY 2012, ISSN 2151-9617
https://sites.google.com/site/journalofcomputing
WWW.JOURNALOFCOMPUTING.ORG 48

tyandpoweroutageprobabilityforalltheRNpositions.
One possible reason is that all MTs in the outer layer se
lect a suitable RN by calculating the path loss to all RNs
and selects a RN with minimum path loss and hence the
exact position of RNs is not much important. However,
whenthenumberofRNsisreduced,theremaybesignifi
cantdecreaseinperformance.

REFERENCES
[1] YuChingHsuandYingDar Lin,MultihopCellular:ANovel
Architecture for Wireless Data Communications, Journal of
Communications and Networks, Vol.4, No.1, March 2002,
pp.3039.
[2] LongLe,EkramHossain,MultihopCellularNetworks:Poten
tial Gains, Research Challenges, and a Resource Allocation
Framework, IEEE Communications Magazine, September
2007,pp.6673.
[3] Rainer Schoenen, Ruediger Halfmann and Bernhard H. Walke,
MAC Performance of a 3GPPLTE Multihop Cellular
Network,ProceedingsofIEEEICCproceedings2008,pp.4819
4824.
[4] Behzad Kasiri, Hadi Meshgi, Majid Naderi and Bahman
Abolhassani, DiversityBased Relay Selection for Multihop
Cellular Networks, International Conference on Advanced
ComputerTheoryandEngineering,IEEE2008,pp.740743.
[5] XueJunLi,BoonChongSeet,PeterHanJooChong,Multihop
Cellular Networks: Technology and Economics, Computer
Networks52(2008),pp.18251837.
[6] Kaveh Pahlavan, Prashant Krishnamurthy, Principles of
WirelessNetworks,PHI,2008.
[7] Dhananjay Kumar, Chellappan C, Adaptive Call Admission
Control in TDDCDMA Cellular Wireless Networks UbiCC
Journal,Volume4,Number3,August2009,pp.834840.
[8] VarshaSharma, R.C. Jain,MACPerformanceof Conventional
and Multihop Cellular Networks, International Journal of
ComputerApplications,November2011.
[9] Varsha Sharma, R.C. Jain, A Review of Packet Reservation
MultipleAccess,inInternationalJournalofComputerScience
Issues,vol8,Issue3,No.2,May2011,pp.303312.


Varsha Sharma has completed B.E. and M.Tech in Computer
Science and Engineering from Rajiv Gandhi Proudyogiki Vishwavi-
dyalaya, Bhopal, India in 2003 and 2007 respectively. Presently she
is working as Assistant Professor in School of Information Technolo-
gy, RGPV, Bhopal, India. Her research interest is Mobile Computing,
Wireless Networking.

R. C. Jain, Ph.D., is presently Director of Samrat Ashok Technologi-
cal Institute Vidisha, India. He has more than 30 years teaching
experience and 15 years research experience. He has published
research papers in more than 100 national and international Confe-
rences and published more than 100 papers in national and interna-
tional journals. His areas of interest are Fuzzy Systems, DIP, Mobile
Computing, Data Mining and Adhoc Networks.

JOURNAL OF COMPUTING, VOLUME 4, ISSUE 1, JANUARY 2012, ISSN 2151-9617
https://sites.google.com/site/journalofcomputing
WWW.JOURNALOFCOMPUTING.ORG 49

You might also like