You are on page 1of 10

BROADEN: an Efficient Collision-Free MAC Protocol for

Ad Hoc Wireless Networks

Tiantong You Chi-Hsiang Yeh Hossam Hassanein


School of Computing Dept of Electrical and Computer Eng. School of Computing
Queen’s University Queen’s University Queen’s University
Kingston, ON K7L 3N6, Canada Kingston, ON K7L 3N6, Canada Kingston, ON K7L 3N6, Canada
you@cs.queensu.ca yeh@ece.queensu.ca hossam@cs.queensu.ca

Abstract Recently, a lot of research has been done on local wireless


MAC protocols [4-17]. The IEEE 802.11 [8-10] protocol,
In this paper, we present a new collision free MAC which defines the MAC and physical layer standards for
protocol – multi-channel Binary-countdown-carrier-sense / license-free industrial, scientific and medical (ISM) bands
Request-to-send (RTS) / Object-to-send (OTS) / Agree-to- [3] allocated by the Federal Communications Commission
send (ATS) / Disagree-to-send (DTS) / Ensure-to-send (ETS) (FCC) in the USA, is the most popular MAC for wireless
/ Neaten-to-send (NTS) (BROADEN) for ad hoc wireless LANs. It consists of Distributed Coordination Function
networks that can achieve 100% collision free performance. (DCF) and Point Coordination Function (PCF). The DCF is
Furthermore, it can totally solve the “exposed terminal”, based on the CSMA/CA mechanism and solves the “hidden
“hidden terminal”, and “moving terminal” problems. It will terminal” problem [4] efficiently with the Request-to-send
also decrease the bandwidth consumed per transmitted data message and Clear-to-send message. In this case, all the
packet and thus improve the network's performance in neighboring nodes that heard any one of these two messages
decreasing the average delay of packet sending, dropping will reserve the media for data packet sending. In the
discard ratio, and increase the network's throughput scheme, the transmission radius for all the packets (including
significantly. Finally, the scheme can enable different data packets, function packets, etc) is fixed. The “exposed
packets with different priorities access the media according nodes” problem [5] still exists in the scheme, and this wastes
to their priority level and thus gain their desired QoS. lots of media bandwidth.
To solve the “hidden terminal”, “exposed terminal”, and
“moving terminal” problem [6,7] thoroughly, Yeh proposed
1. Introduction a ROC scheme [6], in which nodes around the sender do not
need to reserve the time for data sending when they hear the
In the ad-hoc [1] type of wireless network, portable Request-to-send message. Instead, a node sends an Object-
devices are brought together to form a network on the fly. to-send (OTS) message to neighboring nodes. When the
Usually every node is able to communicate with every other node is receiving or planning to receive data packets.
node when all nodes are spread around a relatively small Neighboring nodes then refrain from transmission. In the
geographic range. However, nodes may spread over a larger ROC scheme, the sending of RTS, OTS, and CTS is through
geographic range than the communication signal can reach. a separate control channel. . To improve the throughput of
In this case nodes may have to communicate over multiple the network, [6] also proposed to use variable-radius to
hops. There is only one medium that is shared by all the replace the fixed –radius in data packet sending.
nodes that are in the same radio communication range, and In this paper, we introduce a 100% collision free MAC
the radio frequency bandwidth is limited. As well, packet protocol – BROADEN which is a special case of our
collisions are unavoidable due to the fact that traffic arrivals proposed CSMA/CP [19] for the ad-hoc wireless networks.
are random and there is non-zero propagation time between In particular, we propose the Binary-count-down-carrier-
transmitters and receivers. Therefore, Medium Access sense/Request-to-send (RTS) / Object-to-send (OTS) /
Control (MAC) schemes are used to coordinate access to the Agree-to-send (ATS) / Disagree-to-send (DTS) / Ensure-to-
single channel in the network. Mobile terminals have to send (ETS) / Neaten-to-send (NTS) (BROADEN) protocol,
contend for the medium access themselves. Carrier Sense where ETS and NTS contain the final contracted data
Medium Access (CSMA) [2] is the main mechanism to sending plan between the sender and destination that should
implement medium access. Consequently, transmissions of be recorded by the neighboring mobile stations (MTs). With
packets from distinct mobile terminals are more prone to this proposed protocol, we can completely protect the
overlap, resulting in packet losses. Retransmissions may be packets from collision not only in the control channel, but
required and noticeable delays can result. also from the data channel if we count the nodal mobility

Proceedings of the 28th Annual IEEE International Conference on Local Computer Networks (LCN’03)
0742-1303/03 $ 17.00 © 2003 IEEE
factor. Furthermore, it could solve the “exposed terminal”, synchronization between neighboring competing nodes, and
“hidden terminal”, and “moving terminal” problems as a the asynchrony between the nodes several hops away will
bundle thus improves the network's performance not affect or have trivial effect on the function of our
dramatically. CSMA/IC protocol. To reach the local synchronization
This paper is organized as follows. The next section requirement, we propose a simple synchronization
discusses the Carrier Sense Media Access / ID Countdown mechanism in our CSMA/IC. That is, every MTs will initiate
(CSMA/IC) protocol which is a preliminary mechanism we and maintain a sync-clock by hearing the media for Sync-
propose at [20] for our BROADEN protocol. Section 3 beacon-signal (SB) from neighboring MTs. Fig. 2 shows the
discuss the BROADEN protocol. Performance evaluation of time format of our CSMA/IC. The time period is formatted
protocols using simulation will be discussed in Section 4. In to equal length (by agreement policy) super-frames and each
Section 5, we conclude the paper. super-frame begins by a time slot of medium sensing,
followed by Sync-beacon sending slot (the SB signal is sent
2. CSMA/IC PROTOCOL during this period), a series of time slots used for ID count
down, and finally the data sending period. The MTs can only
2.1. Basic Mechanism for CSMA/IC compete for the media at the start point of the super-frame
In the CSMA/IC protocol, the transmission radius is fixed periodically, depending on their own sync-clock. To
to certain unified value and the sensing radius is twice or synchronize the MTs sync-clock locally, every MT will send
more that of the transmission radius. This could be achieved a sync-beacon signal occasionally (not necessary every time)
by simply setting the noise signal-sensing threshold lower, in the Sync-beacon sending slot. That is, whether the MT
or we could accompany the data sending with an extra will send the SB signal this round will be decided randomly
“Tone signal” as in DBTMA [15], which has twice of the with the probability, which is anti-proportion to the
data transmission radius. As Fig. 1 shows, circle 1 is the neighboring nodal density. The surrounding MTs will adjust
maximum transmission range of node “a”; the nodes outside their sync-clock when they hear the SB signal. If the MT
this range or on the edge of this range cannot receive the hears two asynchronous SB signals (from nodes hidden to
data clearly. We suppose that the collision radius is the same each other), it will send the SB signal next round based on
as the transmission radius. The radius of circle 2 is the the first SB signal previously heard, and other MTs (hidden
sensing radius which is twice or more that of radius 1. The nodes) will adjust their sync-clock according to the new
nodes inside the sensing radius, but outside the transmission round SB signal. So, some MTs even though they have no
radius, can sense (not hear) the sending signal of the sender data packets to send will send an SB signal and not go
and thus suppress sending to avoid collision. further to the ID countdown time period after sending the SB
Our CSMA/IC protocol is based on a binary countdown signal.
media access mechanism. First, the system needs to be Before competing or sending the Sync-beacon signal, the
synchronized so that mobile-stations (MTs) could compete node first senses the medium during the “Media sensing
for the media beginning at the same time point. External slot”. If the medium is not idle (e.g., a neighboring node is
devices like a satellite Global Positioning System (GPS) or sending data), it will quit the current competition and wait
the access points etc. or internal devices like some elected for the next round. Otherwise, the node will trigger the ID
MT (i.e. Mobile Point Coordinator –MPC [18],) could be countdown mechanism right after the SB sending slot. For
used to make the synchronization. Even through these each packet that will be sent, the node will create an equal
mechanisms are (potentially) available, the synchronization length binary number (its value must be unique in the
in the ad hoc wireless network is one of the hardest problems
to solve. Fortunately, our CSMA/IC only requires local
Competition Competition Competition
period period period

Time
Binary countdown period
2
1 control packet
a b
Time
Binary countdown slots
Sync-beacon slot
Media sensing slot

Fig. 2 The frame format for the control channel of


Fig. 1 The communication range and sensing range BROADEN.

Proceedings of the 28th Annual IEEE International Conference on Local Computer Networks (LCN’03)
0742-1303/03 $ 17.00 © 2003 IEEE
surrounding nodes). The higher value of the binary number Theorem 2: If the nodes can sense the signal sending of
means higher priority. Thus we can encrypt the packet’s each other, with the CSMA/IC, there are no two nodes or
priority (packet type and waiting time) to the binary number. more with different binary numbers, which could win the
Corresponding to the binary number, the Inter Frame Space media at the same time.
(IFS) consists of slots of time that match every bit of the Proof: We compare two different binary number values
unique binary number. During competition, at the time slot that are of equal-bit length (for a small value binary number,
that represents the “0” bit in the binary number, the node the high position bit could use “0” to make the binary
will sense the medium. When it senses that the media is number fixed bit long) bit by bit from the highest bit position
busy, it will quit the competition, otherwise the node will to the lowest bit position. We must be able to find the
continue competing for the medium. At the time slot that highest bit position that has a different bit value. The bit
represents the bit “1” in the binary number, the node will value in the binary number with the higher value must be
send a buzz signal. The nodes that finish processing the “1”, and the binary number with lower value must be “0”. At
entire binary number win the media and send the packet. So, the corresponding time slot, the node with the bit value “0”
in this competition, the node with the higher value of binary will sense the medium and sense signal sending from the
number always wins the media. node with the bit value “1” and quit. So, two or more
winners with different binary codes could not co-exist at the
2.2 Analysis of CSMA/IC same time. In our proposed CSMA/IC, the binary code the
In the ad-hoc wireless network, the medium is shared by node used to compete for the media must be unique, thus
all the MTs. The sending signal by itself dominates the guaranteeing one sender in the same sensing range.
signal from neighboring nodes. So, there is no way to detect To show some advantages of CSMA/IC, we compare it
the collision when the node is sending a signal. There are with the CSMA/CA mechanism defined in the IEEE 802.11.
two sources of data collision. One source comes from the In both mechanisms, before sending a packet, there is time
“hidden terminal”. The other is the concurrently sent signal. overhead to compete for the medium. The competing
The CSMA/IC protocol can achieve 100% collision free overhead in IEEE 802.11 consists of IFS plus a variable
performance with the following two thereon. As described in number of time slots, which is randomly created from the
last section, the sensing radius in CSMA/IC is twice or more Collision Window (CW) – a parameter reflecting the traffic
that of the collision radius. situation. Let’s say the length of IFS is equal to 3 time-slots,
Theorem 1: All “hidden terminals” of a sending node and the maximum CW is 128, then the length of competing
could sense the signal sending of the sending node except if overhead of IEEE 802.11 will vary from 3+0 to 3+128. In
there is the concurrent sending in CSMA/IC. the CSMA/IC, the length of competing overhead is a
Proof: The destination of the legal packet sending must constant value (16 time-slots is enough). So, the length of
be inside the maximum transmission radius (J). Then, the competing overhead in a binary count down mechanism is
distance between the sender and destination must be smaller acceptable. Furthermore, it makes the synchronization more
than J. The “hidden terminals” which are the nodes that efficient. Because the length of competing overhead is
could interfere with the data reception of the destination constant, and the length of a function packet is constant, then
node must be in the range of destination’s collision area. So, we can slice the time into units equal to a constant
the distance between destination and the “hidden terminal” competing overhead time + time to send a function packet. If
must be smaller or equal to the collision radius that is equal we try to use the synchronization in the CSMA/CA, we have
to transmission radius (J). So, the distance between the to slice the time into the sections equal to 3+128+time to
sender and any “hidden terminal” must smaller than 2J - in send the packet. The bandwidth wasting in competing
the sensing range. As Fig. 1 shows, the node “b” is the overhead is significant even when network traffic is light
furthest node that may interfere with the furthest receiver of (especially when the size of the sending packet is small).
node “a”. But node “b” is in the sensing range of node “a”- Using CSMA/IC, we can achieve collision-free MAC, but
they could sense the sending of each other if they send at the to synchronize the wireless ad-hoc networks we need
different time. external devices. There is another potential trade off that
wastes the medium resource in binary count down. That is,

111111 111100 110000 110000 100100 100001


a b c d e f a b c d e f
111110 111000 100000 101000 100010 100000

Fig. 3 Scenario of media access competition by binary Fig. 4 Another scenario of media access competition
countdown which waste media resource

Proceedings of the 28th Annual IEEE International Conference on Local Computer Networks (LCN’03)
0742-1303/03 $ 17.00 © 2003 IEEE
in one communication range, there may be no winner; the
winner may lay several hops away - that would not happen
in CSMA/CA defined in the IEEE 802.11 protocol. As Fig. 3
shows, when node “a”, “b”, “c”, “d”, “e”, and “f” want to e
access the medium at the same time, they use the binary key f
as shown in the figure. When the process starts, node “f”
first senses that the medium is busy at time slot 2 and quits,
node “e” quits at time slot 3, and so on. Finally, only node
“a” wins the medium.
d
In the case shown in Fig. 4, the node’s layout is the same b a c
as in Fig. 3, but if the binary code is modified to the value as
shown in the figure, the performance will be different. In the
second time slot, node “b” is beaten by node “a” and quits.
So, node “c” survives even though its binary code is smaller g
than node “b”. In the fourth time slot, node “d” is beaten by
node “c” and quits, then node “e” survives and beats node r
“f”. So, in this case, even the value of the binary code h
decreases from node “a” to node “f”, but finally, node “a”,
“c”, and “e” all win the competition and send at the same
time without collision.
The CSMA/IC protocol has good performance in single Fig. 5 Example of currently data sending in data channel
hop ad-hoc wireless networks, e.g., a conference setting. All
the nodes pack into one room; they are all located in each The performance of the data channel will be optimized (no
other’s transmission range, no matter the sensing range. exposed terminal or hidden terminal problems and accurate
However, in multi-hops ad-hoc wireless networks, the radius transmission which could achieve several concurrent
nodes are spread in large area. In the whole sensing area transmissions in the same sensing range) by the negotiation
(which is 4 times the transmission area), only one node at in the control channel. As Fig. 5 shows, when node “a” is
most could be allowed to send at one time. The bandwidth sending a packet to node “b”, instead of using maximum
cost is too high, especially for the large size data packet. The transmission radius r, it uses the transmission radius “a o
“exposed terminal” problem still exists. To solve the b”. Thus at the same time, node “c” could send a packet to
“exposed terminal” problem entirely and thus improve the node “d” with transmission radius “c o d”; node “e” sends
networks performance dramatically, we also propose a new packet to node “f”; and node “g” sends a packet to node “h”.
protocol – CSMA/IC. In this new protocol, the entire Here, node “a” and node “c” are “exposed terminals” to each
channel has been separated into two channels: a control other, and both of them are “exposed terminals” to node “g”.
channel and a data channel. The packet sending (normally Any receiver must return an ACK when it receives a data
large size) in the data channel is based on the schedule but packet to confirm reception. If the sender does not receive
the function packet sending (fixed small size) in the control the ACK after sending the data packet, it will regard the data
channel is based on CSMA/IC. Considering the relatively packet has suffered collision and will re-schedule to send it
small size of a function packet, the bandwidth occupied in again. If the sender tries several times without any response,
the control channel is reasonable. the destination will be regarded as shutting down or moving
out of sender’s maximum transmission radius and thus be
3. BROADEN PROTOCOL deleted from sender’s database. The ACK will be sent
through the control channel.
3.1. Basic Mechanism of BROADEN Opposite to the data packet sending in the data channel
In our BROADEN protocol, the wireless channel has been (based on a schedule), the access to the control channel is
separated into two channels: the data channel (occupying based on BROADEN. When a node wants to announce a
80% or more of total bandwidth) and the control channel sending schedule in the data channel, it sends RTS in the
(occupying 20 or less of total bandwidth). In the data control channel to ask for the neighboring nodes’ feedback.
channel, the mechanism to access the medium is based on The surrounding nodes will either keep silent or send back
the negotiated scheme that can be made in the control OTS, ATS, and DTS to express their attitudes to the sending
channel. In the data channel, when the time comes, the node schedule in the RTS. After modifying the schedule, the RTS
will send the indicated data packet at the scheduled time sender then sends ETS to announce the final sending
period, with the indicated transmission radio range in the schedule to the neighboring nodes. The destination sends
data channel no matter whether the neighboring nodes send NTS to announce the corresponding final receiving schedule
or not (the transmission range of the data packet is variable, to the surrounding nodes.
depending on the negotiation result of the control channel).

Proceedings of the 28th Annual IEEE International Conference on Local Computer Networks (LCN’03)
0742-1303/03 $ 17.00 © 2003 IEEE
3.2. Detailed Mechanism of BROADEN period from a certain time on, so, the destination could
Any mobile station (MT) will maintain three tables: always choose a time period from the RTS).
(1) MT table – which is used to record the neighboring The neighboring nodes, except the destination, will again
MTs when receiving any signal from them and the value of check their receiving duty table to see whether the time
the geographical distance from this MT. The MT will period in RTS conflicts with their own receiving or
broadcast a so-called “hello message” periodically with a scheduling of receiving duty. If it does conflict (this rarely
prescribed maximum transmission range to communicate the happens because the sender already checks before sending
message and thus announce its existence to its neighbors. RTS, but nodal mobility may cause the RTS sender to use
This will force the MT sending signal and avoid the MT some inaccurate geographical information and thus lead to
keeping silent for so long that it becomes regarded as un- conflict), the neighboring MT will send an object-to-send
contactable - shutting down or moving out of maximum (OTS) message, which may contain a suggested time period.
communication range. The neighboring MT will renew the The destination, when it receives the RTS will, like other
corresponding MT record in its MT table according to the neighboring nodes, check the receiving duty table, but most
message it receives. Because the sender uses a fixed importantly it will check the sending duty table to see
transmission radius to send this message, the distance whether other sending or scheduled sending will affect this
between the sender and receiver could be calculated by scheduling time. If the time period in RTS does not conflict
testing the strength of the received signal. The value will with other sending, the destination will respond back with
also be recorded to the MT table. Besides the “hello agree-to-send (ATS), otherwise, it will respond back with
message”, other messages that have a fixed transmission disagree-to-send (DTS) which may also contain some
range can also be used to renew the distance record of the suggested time periods that will be safe for receiving this
corresponding MT in the MT table. scheduled data packet. After collecting the surrounding
(2) Receiving duty table – which is used to record the nodes’ OTS and ATS or DTS, the RTS sender analyses the
scheduled receiving events that are currently taking place or message, and then broadcasts the final ensure-to-send (ETS)
will happen. For every receiving event, three pieces of message to announce the scheduled sending. All the
information are recorded: receiving MT ID, start receiving surrounding nodes (including the destination) will record the
time and receiving duration. sending duty in their sending duty table when they receive
(3) Sending duty table – which is used to record the the ETS. The destination will also broadcast neaten-to-send
current or future scheduled sending events whose (NTS) to announce the scheduled receiving duty when it
transmission range will cover me. For every event, it also receiving the ETS. The surrounding nodes (including the
records the sending MT ID, start sending time and sending sender) will record the receiving duty in their receiving duty
duration. table. In the next paragraph, we will discuss the binary count
When the MT plans to send a data packet, if the data down mechanism in the BROADEN protocol.
packet has a destination (unicasting) it will first search the The OTS may not be valuable in the unicasting situation
MT table to check whether the destination MT is in its one- because sending of RTS and ETS already calculate
hop range or not. If the destination is not in the MT table, accurately the possible receivers’ position before sending the
then the data packet will be discarded or will be assigned a packets. But it will be valuable in the multi-casting or
relaying MT as destination (this will be studied in the ad hoc broadcasting situation. When a node plans to make a
wireless network routing in the future). From the MT table, schedule to send a broadcasting-type or multi-casting-type of
the sender will determine the accurate transmission radius. If data packet, all the neighboring nodes or multi-destinations
the intending data packet is a broadcasting or a multi-casting will regard themselves as the destination of the ETS. They
packet, the transmission range will set to the maximum all record the sender to the sender duty list, and themselves
transmission range or the transmission range that can reach to the receiver duty list. The destinations could send the NTS
the furthest destination. The sender will search the receiving or keep silent. If all of the neighboring nodes respond back
duty table to find some time periods, in which sending the with NTS, it could increase the traffic load of the network,
data packet with this transmission radius will not bother but all the nodes around the destinations will know the
other nodes’ receiving. After that, the sender will search the receiving schedule and thus help to initialize an accurate
sending duty table to make sure that the destination is not sending schedule. In the second case, if the destination keeps
sending a packet at those time periods (deleting the conflict silent, some neighboring nodes of the destination will not
periods). When searching the sending duty table, all the record the corresponding receiving to the receiving duty list.
destinations of Multicasting or all the nodes surrounding the So, in the latter case, before sending the RTS, the node scans
broadcasting node will be counted. The sender will put the the receiving duty list but may still miss some receiving
message of scheduling transmission radius and possible node messages. That will cause the missing node to send
sending periods in the request-to-send (RTS) function OTS to correct the schedule. When the neighboring node
packet, and broadcast the RTS with the prescribed fixed receives the broadcasting RTS, it could send both the OTS
transmission range through the control channel (Note: In the (find itself is scheduled to receive a packet by checking the
RTS, the last time period is always an infinite length time receiving duty list) and DTS (find its receiving could be

Proceedings of the 28th Annual IEEE International Conference on Local Computer Networks (LCN’03)
0742-1303/03 $ 17.00 © 2003 IEEE
bothered by other sending by checking the sending duty list). means the sending of real-time packets can be scheduled
The later is used to object to the sending. The former is not earlier than the non-real-time packets. After sending the
only used to object to the sending, but also to announce a RTS, the neighboring nodes may respond with OTS, or the
missing receiving to the receiving duty list. destination may respond with ATS or DTS. OTS has higher
For each control packet every node will create a unique priority than ATS or DTS, so the OTSs can always be sent
equal length binary number that consists of a priority before DTS or ATS, one by one without collision. After
number plus the unique MAC ID. The priority of function finishing sending the RTS, the RTS sender also joins the
packet is created based on the differentiation of function competition for ETS sending without delay. Because the
packet type and the data packet it relates to, and packet ETS has lower priority than the ATS, DTS and OTS, it
waiting time. Converting the unique MAC ID creates the always sends after the neighboring nodes finish sending
second part of the binary number that makes the whole OTS, ATS, and DTS.
binary number unique. For example, considering a 16 bit If the ETS wins the medium without hearing the ATS or
binary number if we assign the first 4 bits for the priority, DTS from the destination, it means that either the destination
then we could have 16 different priority classes, the higher has already shut down or moved out of communication area,
priority is assigned a higher value. We assign the next 12 or other neighboring nodes that are hidden from the ETS
bits for the unique node’s MAC ID, which can contain 4096 sender blocked the sending of ATS or DTS (as shown in Fig.
different node’s IDs in the same wireless LAN or the same 6). In the figure, node “a” sends a RTS to node “b”, and
transmission range. If some “authority centers” have been begins competing for ETS sending. However the sending of
implemented such as Mobile Point Coordinator (MPC) [18] DTS or ATS from node “b” is blocked by the higher priority
or Virtual Base Station (VBS), we can make the length of of function packet sending from nodes “d” or “f”. In this
second part of binary number variable to match the density case, the RTS sender may wait for some time for the
of the LAN whose value is announced by the authority responding message of DTS or ATS till time has expired and
center to make it concurrent. Thus, we can have smaller size then cancel the plan if the RTS is for a unicast transmission.
binary numbers to make the competing overhead even If the RTS is multicasting (contains a schedule for several
smaller if the nodal density of the wireless LAN is sparse. data packets, which will be sent to several destinations), the
To simplify the issue, we make the length of second part RTS sender may send out ETS that only ensures the sending
fixed (12 bits) and normally 12 bits is enough to represent plans of destinations that responded back ATS or DTS in
the unique MAC ID in wireless LANs. For example, if node time. For the ATS or DTS that respond after ETS, the RTS
“12” tries to compete for the medium for sending a packet of sender could send an extra ETS in multicasting. The
category class "3", this packet sending competition could be destination of ETS will respond with NTS to announce the
represented by the binary number 0011,0000,0000,1100. data-receiving plan after receiving the ETS. Although, the
In the competition, a lower priority function packet will NTS has higher priority than the ATS or DTS, it always
lose the competition and quit in the same range. In the case sends in the last step of the mechanics because it is a
of same priority packets, the lower MAC ID node will lose respond packet to the relatively lower priority function
and quit. In our BROADEN protocol, the priority sequence packet ETS whose priority is beyond the OTS, ATS, and
of some function packets is defined as follows: (higher DTS. But after the ETS, the NTS must follow immediately
priority with larger binary numbers) RTS < ETS < ATS = (if not beaten by OTS, ATS, or DTS) to announce the
DTS < OTS < NTS < ACK. sending – receiving schedule. Compared to CSMA/CA, one
The RTS has the lowest priority compared to other obvious advantage of our BROADEN is it could arrange
function packets, and in the RTS, it could still differentiate sequential responses from neighboring nodes easily and
different classes of data packets with different priorities. For efficiently. But in CSMA/CA, when a node finishes sending
example, we give the RTS for real-time data packets higher RTS, it must wait for several time units for neighboring
priority than the RTS for non-real-time data packets. This nodes to respond back with ATS, DTS, and OTS - the
number of this kind of packet sending is unpredictable. So,
how long a node waits before it could send the ETS is a
problem in CSMA/CA.
c In the function priority definition, the ACK has the
highest priority, because when a node sends out a data
a b d g packet, it expects the feedback can come back immediately
e f without delay. A response message, like OTS, has higher
priority than messages like ATS or DTS, because when the
sender sends out RTS, it expects the destination sends the
ATS or DTS after the OTS, which is sent by the objector
nodes around the RTS sender. With this collision-free
Fig. 6 One scenario of media competition in the control protocol, any number of OTS messages can be collected one
channel in multi-hop case by one until a DTS or ATS is received. So, the RTS sender

Proceedings of the 28th Annual IEEE International Conference on Local Computer Networks (LCN’03)
0742-1303/03 $ 17.00 © 2003 IEEE
could know the time when the message collection process is
finished. There is no necessity to reserve a time period for
OTS and ATS separately, as in CSMA/CA.
Using this BROADEN MAC protocol in ad hoc wireless
networks, multicast RTS becomes possible. When one node
sends out multicast RTS, the objectors win the medium first
and send the OTS one by one. Then, the destinations of RTS r3
send out ATS or DTS one by one. After the destination with
r1
the smallest ID sends out the ATS or DTS, or receives a
control packet whose priority is lower than ATS or DTS, it a a1 d1 d e e1
means all the response messages have finished. The schedule
initiator can send the ETS to announce the data packets
sending schedule in the future. For example assume node
“A” has several packets that are intended for b”, “c and “d”
separately, “A” sends a RTS that contains all the information
of booking message of “b”, “c”, and “d”. Nodes “b”, “c”, r2
and “d” must send back a feedback message to clear whether
the destinations are available to receive the data packet or
not at that specific time. The sender can only guarantee the
sending of a data packet not interfering with the former
reserved neighboring receiving nodes by checking the Fig. 7 Fixed data transmission range
receiving duty table. There is no way for the sender to know
in advance whether the destinations will suffer collision may cause data packets to suffer collision in the data channel
except that a destination can send a respond message to tell even if the negotiation phase finishes perfectly in the control
the sender. Furthermore, the RTS sender needs the multi channel. When the node announces the data packet-sending
destinations’ response to make sure that they are reachable. schedule of the future, some nodes are outside the
In BROADEN, if the data traffic rate is high, and the communication area and cannot hear the announcement.
control channel is enabled to timely schedule all the data Then, at the time when the node sends the data packet, some
sending, then the data sending may be scheduled to be very schedule-conflict nodes may move into the collision area
late. The time gap between the actual data sending and the and cause the collision. To solve this problem, the data-
data-sending schedule making becomes very large. sending planning mechanism can be improved by calculating
Furthermore, to make sure that some low ID nodes do not the nodal mobility factor. That is, when negotiating a future
wait for too long, we can specify that when the node packet transmission, the transmission radius will be enlarged
schedules the sending, it will not schedule the next sending to be the distance between the current location of the sender
before finishing the currently scheduled sending (continuous and the destination plus the maximum possible moving
scheduling is our future research). Using this simple method, distance before the future sending. We also need to consider
in BROADEN, the high ID node will wait for the time to the possible movement of neighboring receiving nodes. So,
come to send the scheduled data packet, and the low ID node the non-receiving area should be further enlarged. The radius
could negotiate its data sending during the high ID node’s should be calculated by equation 1. It will guarantee that
waiting time. We can define an increasing packet priority there will be no receiver located in the area included by the
mechanism to solve the starvation problem. We can also enlarged transmission radius in the scheduled packet sending
make a regulation that defines that the future-sending time. As shown in Fig. 7, node “d” plans to send a packet to
schedule must be less than a certain time from now. node “e” in the future, but at the time when node “d” starts
sending, node “d” moves to new location d1, and node “e”
3.3 Enhanced Mechanisms to Prevent Collisions moves to e1. So, node “d” will adjust its transmission radius
With the BROADEN protocol we could achieve 100% to make node “e” capable of hearing from it. But at the time
collision free activity in the control channel. The collision of when node “d” starts sending, the more distant node “a”
data packets in the data channel is due to failed negotiation which will receive some packets, moves into collision area
in the control channel that happens for several reasons. One of node “d”. So, when calculating the collision area of node
is the nodal mobility, and another is the neighboring nodes “d”, instead of radius r1, it will guarantee that no receiver
concurrent negotiation. We will discuss these two issues in will be within the radius r2 at the sending time. That is
more detail and the supplemental mechanisms to achieve the
100% collision free activity in our proposed BROADEN Rfixed = R+4*S*T
protocol in this section. where:
There is a time gap between the actual data sending time Rfixed is the fixed transmission radius,
and the sending schedule madding time. Thus nodal mobility R is the current distance between sender and destination,

Proceedings of the 28th Annual IEEE International Conference on Local Computer Networks (LCN’03)
0742-1303/03 $ 17.00 © 2003 IEEE
S is maximum nodal speed, and stage, and the testing stage. During the network initiation
T is the time duration until the scheduled data packet stage, the MTs are created one at a time. When an MT is
transmission. generated, it tries to establish its neighborhood by
communicating with the “hello” message. After all specified
With BROADEN, when all the nodes are in the single MTs have been created for 5 seconds, the simulation then
sensing range, only one pair of negotiation can be processed goes into the testing stage where data is collected for an
at any given time, and only one winner is allowed to send additional 60 seconds.
the RTS during one time period. The RTS has lowest
priority among the function type packets. Once the RTS is 4.2. Mobility model
sent, the following communication packets' priority are Every MT is in one of two mobility states: moving or
higher than the RTS, and that will block the neighboring pausing. When in the moving state, the MT moves towards
nodes sending RTS until this negotiation finishes. its target location determined in the last pause period, with a
To avoid collisions that may take place at the edge of specific speed (randomly generated with a mean equal to
transmission, we can set the maximum transmission range in Move Speed (1 grid unit/sec)). When the MT reaches its
the control channel a little larger than the maximum target location, it will reach its pausing state. The length of
transmission range in data channel. We can also regulate the pausing period is also randomly generated with a mean
choice of destination choosing regulation, which states: the equal to a user defined input parameter, Pause Time (4 sec).
maximum destination nodes to be within certain threshold During the pause period, it will determine the next target
value smaller than the maximum transmission range in the location and its moving speed. Hence, the MT’s lifetime
data channel. will consist of moving periods (each with its own speed and
direction), and pausing periods (of different time intervals)
4. SIMULATION ANALYSIS in turn. Another variable parameter related to the mobility
model is the transmission range, which is set to 100 grid
In this section, we study the performance of our units, and the sensing radius is equal to 2.1 times of
BROADEN wireless MAC protocol using simulation. We transmission range in the control channel. However, in the
compare performance of BROADEN to the single channel data channel, the sensing radius is equal to the transmission
CSMA/CA that is defined in the IEEE 802.11 standard. A radius.
packet-level simulator was developed using the Java
programming language in order to monitor, observe and 4.3. Traffic model
measure the performance of our protocol, using different There are a number of packet types: MAC function
input parameters. packets (ACK, RTS, ETS, etc.), application/data packets
(real-time and non-real-time), and management packets
4.1. Experimental setting (hello, merge request, merge response and disjoin). The
In our simulation experiments, the channel capacity is set length of the function packets and management packets is set
to 20 Mbps. All the MTs are assumed to be within a 400 u to 20 octets. The length of the data packets is set to 2000
400-unit grid. The CSMA/CA relative parameters are set as octets. The mean packet arrival rate (Ȝ) is varied from 4, to
follows: the three IFS periods, SIFS, PIFS, DIFS and the slot 80 units/second for every node. The queue size is set to 10
defer time have been set to an effective length of 2, 3, 4 and packets. In the series of testing for CSMA/CA of IEEE
1 octet for 20 Mbps, respectively. The size of the Collision 802.11, RTS_Threshold (a parameter define when to trigger
Window (CW) is between 8 and 128. When the MT suffers the RTS-CTS mechanism) is set to a value such that the
repeated collisions, the CW may reach 128. When an MT is RTS-CTS exchange is used at all times.
successful for 4 consecutive times, the CW will be halved
till it reaches 8. The parameters in BROADEN are set as 4.4. Performance metrics
follows: the length of total IFS consists of 16 time slots, The performance metrics of interest in this paper are: (1)
each time slot has the same length effect as the slot time in the transmission delay, which is measured from the time
the CSMA/CA. In our simulations, when packet when the packet is created until the time the MT receives an
transmission is attempted 3 times without receiving an ACK, ACK from the destination MT of this sent packet. We
the packet will be discarded. If the MT discards 3 packets in calculate the Average Delay (AD) of all the successfully
a row for the same destination, the destination MT is received packets. (2) The Networks Throughput, which is a
removed from the “MT table”. “Hello” messages are measure of the number of non-real-time packets sent
exchanged every 0.2 seconds. If the MT does not hear from successfully (get ACK) per second in the whole wireless
its neighboring MT for 2 seconds, it will remove it from its LAN (consist of 80 nodes). (3) The Number of blocked
“MT table”. packets per second – a metrics used to calculate the number
Each experiment tests the behavior of the system for a of packets per second blocked in the entire networks. When
given number of nodes (80 nodes) for 60 seconds. Our the average packets arrival rate (Ȝ) is set to the value higher
simulations consist of two stages: the network initiation than the maximum capacity of packets that can be sent out,

Proceedings of the 28th Annual IEEE International Conference on Local Computer Networks (LCN’03)
0742-1303/03 $ 17.00 © 2003 IEEE
the queue that is used to store the data packet temporarily BROADEN decreases by 60% and the unbalance point (the
(capacity is set to 10 packets in our experiment) will be value is 40 units/sec) is much bigger than that in CSMA/CA
filled, and after that over speed packet arrival will be (12 units/sec).
blocked. Fig. 9 shows the CR of the two MAC mechanisms.
CSMA/CA cannot avoid collisions taking place even in the Ȝ
4.5. Discussion of the results is low. When the Ȝ increases, the CR of CSMA/CA also
A number of simulation experiments were conducted in rises sharply till the maximum value (around 35%). Packet
order to study the performance of BROADEN compared to blocking prevents the CR from going up further. However in
DCF of IEEE 802.11 standard. In these two series of our proposed BROADEN, the CR stays at zero from start to
simulation experiments, we set as many as possible of the end providing proof of its 100% collision free promise.
network and simulation parameters the same. However, in Throughput results are shown in Fig. 10. Because the
the CSMA/CA simulation experiment, the channel is not “exposed node” problem is solved in the proposed protocol,
separated - the node uses the whole wireless channel for the several nodes can concurrently send packets within a same
function, data, and management packets sending. The MAC transmission range. This will improve our protocol’s
mechanism is based on Distributed-coordination-function network throughput. Furthermore, for every data packet
(DCF) has three different lengths of inter-frame spaces (IFS) transmission, BROADEN optimizes the transmission range,
and extra random number time slot extensions. Every and this also reduces the bandwidth consumed per packet
sending of data packets, which has a specific destination, sending and thus improves the network's throughput
will trigger the RTS-CTS to ease the “hidden terminal” indirectly. From Fig. 10, we can see that the network
problem but the multicasting or broadcasting packet will not. throughput of our proposed BROADEN has increased by
The transmission range is kept fixed. In the BROADEN, we more than 200% over CSMA/CA – a significant
separate the channel to two parts, 20% for the control improvement.
channel (for control packets and the “hello” message), and
80% for the data channel (data and management packets). 5. CONCLUSIONS
The data and management packets sent in the data channel is
based on scheduling, and is of variable transmission radius. In this paper, we proposed a new MAC protocol –
In all experiments, we set the real-time packet arrival rate to BROADEN for wireless ad hoc networks which can provide
0; we only observed the performance of non-real-time 100% collision free media access. The protocol can
packets. effectively solve the “exposed terminal”, “hidden terminal”
In our simulation, the size of queue used to temporarily and “moving terminal” problems. As well, the protocol is
store incoming data packets is 10. When the arrival rate 100% collision free. Simulation results show that, when
reaches a certain point, the network traffic load become compared to the DCF in IEEE 802.11, the performance of
unbalanced, thus leading to heavy collisions, and the average our BROADEN protocol superior. BROADEN, has lower
delay sharply increases. When the queue is full, the next the AD significantly and higher network throughput.
oncoming data packet will be blocked. So, when the data The BROADEN protocol makes it possible to
arrival rate is higher than the network traffic load unbalance differentiate network services in packet sending and thus
point, network performance like Average Delay, Discard achieve QoS. Use of selected nodes as mobile point
Ratio, and Network Throughput are similar and may coordinators (MPC) to achieve synchronization and
increase slowly due to the uneven character of network. bandwidth reuse with the BROADEN is one of our future
Fig. 8 shows the AD for BROADEN and CSMA/CA. We research directions.
can see that BROADEN has lower AD then CSMA/CA
when the Ȝ increases. When Ȝ is less than 16 packet/sec in References
CSMA/CA or smaller than 48 packet/sec in our proposed
BROADEN, the AD of both experiments gets relatively low [1] B. Leiner, D. Nielson, and F. A. Tobagi, Eds., Proceedings of
AD, because at these packet arrival rates, the system is in IEEE, Special issue on packet radio networks, vol. 75, Jan.
balance, the transmission ability is still over the packet 1987
arrival and the temporary packet-storing queue is in the not- [2] L. Kleinrock and F. A. Tobagi, “Packet switching in radio
full state. Fig. 11 shows the packets blocked at these packet channels, part I – Carrier sense multiple-access modes and
arrival rates are 0 or near 0. When the Ȝ is increased, the their throughput-delay characteristics,” IEEE Trans.
system is becomes unbalanced, and most of time, the packet Commun., vol. COM-23, Dec. 1975, pp. 1400-1416.
temporary storing queue is in the full state. The packet [3] Federal Communications Commision, Part 15-RADIO
arrival at the full state queue will be blocked. The AD is FREQUENCY DEVICES, Subpart D-Unlicensed Personal
Communications Service Devices, 47 CER 0.1.
increased slowly to two different maximum values – equal to [4] F.A. Tobagi and L.Kleinrock, Packet Switching in Radio
the time to send 10 packets (queue capacity) with the Channels: Part II – The Hidden Terminal Problem in CSMA
different MAC mechanisms. When the Ȝ =80 unit/sec, is and Busy-Tone Solution, IEEE Trans. On Communications
compared to DCF of CSMA/CA, the AD of our proposed COM –23, December 1975, pp. 1417 – 1433.

Proceedings of the 28th Annual IEEE International Conference on Local Computer Networks (LCN’03)
0742-1303/03 $ 17.00 © 2003 IEEE
[5] P. Karn, “MACA –A new Channel Access Method for Packet [13] J. L. Sobrinho and A. S. Krishnakumar, “Real-time traffic over
Radio, “ in ARRL/CRRL Amateur Radio 9th Computer the IEEE 802.11 medium access control layer, “ Bell Labs
Networking Conference, pp 134-140, ARRL, 1990 Tech. J., vol. 1, Autumn 1996, pp. 172-187.
[6] Yeh, C. –H., “ROC: Awireless MAC prtocol for solving the [14] J. L. Sobrinho and A. S. Krishnakumar. Quality-of-Service in
moving Terminal problem,” Proc IEEE Int’l Conf. Wireless ad hoc carrier sense multiple access networks. IEEE Journal
LANs and Home Networks, Dec. 2001, pp.182-189 on Selected Areas in Communications, 17(8), August 1999,
[7] Yeh, C. –H., “Variable-radius routing protocols for high pp. 1353–1368.
throughput, low power, and small latency in ad hoc wireless [15] Z. Haas and J. Deng, “Dual Busy Tone Multiple Access
networks,” Proc. IEEE Int’l conf. Wireless LANs and Home (DBTMA): a new Medium Access Control for Packet Radio
Networks, Dec. 2001, pp. 215-227. Networks,” IEEE International Conference on Universal
[8] IEEE Standard for Wireless LAN LAN Medium Access Control Personal Communications, October 1998
(MAC) and Physical Layer (PHY) Specifications, IEEE [16] Z. Haas and J.Deng, “A collision-free medium access control
Standard 802.11, 1997 scheme for ad-hoc networks,” WCNC’99, September 1999
[9] The Institute of Electrical and Electronics Engineers, Inc. IEEE [17] F.Talucci, M.Gerla and L.Fratta, “MACABI (MACA By
Std 802.11 - Wireless LAN Medium Access Control (MAC) Invitation): A Receiver Oriented Access Protocol for Wireless
and Physical Layer (PHY) specifications, 1999. Multiple Networks,” in PIMRC ’97, Helsinki, Finland,
[10] Benny Bing, “High-Speed Wireless ATM and LANs” by September 1-4, 1997
Artech House publishers [18] T.You, H.Hassanein, H.T.Mouftah “Infrastructure-Based
[11] G.Anastasi, L.Lenzini, and E.Mingozzi, “Stability and MAC in Wireless Mobile Ad-Hoc Networks” WLN’02,
Performance Analysis of HIPERLAN”, Proceedings of IEEE November 2002
GLOBECOM, 1998 [19] T.You, C.Yeh, H.Hassanein, “A new class of Collision
[12] T. Wilkinson, T.G.C.Phipps, Stephen K.Barton; A report on Prevention MAC Protocols for Wireless Ad Hoc networks”
HIPERLAN Standardization”, International Journal of ICC’03, May 2003
wireless Information Networks; Vol.2; No 2; 1995 [20] T.You, C.Yeh, H.Hassanein, “CSMA/IC: a New Class of
Collision-free MAC Protocols for Wireless Ad Hoc Networks”
ISCC’03, June 2003

Average Delay of successful sent data Data packets networks throughput


packets 4000
500
3500
400 3000
2500
(unit/sec)

300 2000
msec

1500
200
1000
100 500
Ȝ(unit/sec)
Ȝ(unit/sec) 0
0
4 8 12 16 24 32 40 48 56 64 72 80
4 8 12 16 24 32 40 48 56 64 72 80
Our proposed BROADEN protocol
Our proposed BROADEN protocol
DCF of CSMA/CA
DCF of CSMA/CA

Fig. 8 Average delay Fig. 10 Network throughput

Collision Rate of sent data packets Number of arrival data packet that has
40 been blocked
6000
35
5000
30
(unit/sec)

25 4000
(%)

20 3000
15 2000
10
1000
5 Ȝ(unit/sec) Ȝ(unit/sec)
0
0
4 8 12 16 24 32 40 48 56 64 72 80
4 8 12 16 24 32 40 48 56 64 72 80
Our proposed BROADEN protocol
Our proposed BROADEN protocol DCF of CSMA/CA
DCF of CSMA/CA

Fig. 9 Collision ratio Fig.11 Number of data packets

Proceedings of the 28th Annual IEEE International Conference on Local Computer Networks (LCN’03)
0742-1303/03 $ 17.00 © 2003 IEEE

You might also like