You are on page 1of 6

Soft Reservation Multiple Access with Priority Assignment

( S W P A ) : A Novel MAC Protocol for QoS-Guaranteed


Integrated Services in Mobile Ad-Hoc Networks’
Chang Wook Ahn*, C h u g Gu Kang*, and You Ze Cho**

* School of Electrical Engineering, Korea University


#1-5 Ka, Anam-dong, Sungbuk-ku, Seoul 136-701, KOREA
** School of Electrical Engineering, Kyungpook National University
Sangyukdong, BukgqTaegu 702-701, KOREA
E-mail: cc&ana@mail.korea.ac.kr
Absrruct - A new medium access control (MAC)protocol Soft - the battery power becomes wasteful and furthermore, the
Reservation Multiple Access with Priority Assignment (SRMAPA) integrated services cannot be efficiently supportd. So, several
-
protoeol is introduced for supporting the integrated services of authors have proposed the MAC protocols of synchronous
real-time and non-real-time applications in mobile ad-hoc networks. version to circumvent the disadvantages inherent in the
The SRMAPA protocol allows the distributed nodes to contend for
and reserve time slots with a RTS/CTS-like “collision-avoidance” asynchronous approach. Examples of such protocols include
handshake and “soft reservation” mechanism augmented with Five Phase Reservation Protocol (FPRP) [9], Hop Reservation
distributed and dynamic access priority control, which virtually Multiple Access (HRMA) [lo], and Collision Avoidance Time
achieves capability of the distributed scheduling to guarantee the Allocation (CATA) [111. In these approaches, the HTP can be
QoS requirements of the integrated services. We have handled by the RTS/CTS-like “collision-avoidance”
demonstrated via simulation studies that the multiplexinggain can handshakes as in the asynchronous approach while the
be significantly improved without much compromising the system exposed-terminal does not cause any problem.
complexity. We also have shown that the proposed back-off
mechanism designed for the delay-constrainedservices is useful for
While many years ago, most of researchers focused on the
further improving the channel utilization. design of MAC protocol to support the data services only,
recent developments have indicated the need for mobile ad-hoc
networks to support the integrated services, including both real-
I. INTRODUCTION time and non-real-time services [12]. Some of the
Mobile ad-hoc networks are the multi-hop wireless packet aforementioned protocols are based on a reservation scheme [S-
networks in which all nodes cooperatively maintain network 111 to support real-time applications. More specifically, once a
connectivity without aid of any infrastructure networks. In node succeeds in slot reservation, a transmitter can transmit
other words, all nodes in the mobile ad-hoc networks can be collision-free data packets on the reserved time slots until the
mobile and communicate with one another either directly or reservation is terminated. Especially under the integrated
through intermediate nodes with no fixed infkstructure. Since service applications, however, most of these protocols do not
nodes in the mobile ad-hoc networks communicate via multi- provide any means to guarantee the quality of service (QoS) in
hop radio, they suffer from the well-known hidden-texminal an absolute manner. Such a limit is mainly attributed to the fact
problem (HTP) and less well-known exposed-terminal problem that there is no proper means to realize the dynamic slot
(ETP), which severely affect the channel utilization. reservation on demand without any centralized controller in the
There have been the numerous medium access control mobile ad-hoc network, as opposed to the infiastmcture
(MAC) protocols that attempted to solve the HTP and ETP network in which the radio resource can be allocated to meet
problems. In addition to the Carrier Sensing Multiple Access the QoS requirements with a proper mechanism of packet
with Collision Avoidance (CSMNCA) scheme [l], many of scheduling if all nodes can successfully exchange the control
those including Busy Tone Multiple Access (BTMA) [2], information with the centralized station. This issue becomes
Multiple Access with Collision Avoidance (MACA) [3], more complicated for the integrated service applications,
Multiple Access with Collision Avoidance for Wireless including both real-time and non-real-time sessions. Up until
networks (MACAW) [4], and Floor Acquisition Multiple now, [121 is one of a few ideas that address this issue in detail.
Access (FAMA) [5] are developed. Although these protocols A new medium access control (MAC) protocol - Soft
are considered as useful solutions against the conventional HTP Reservation Multiple Access with Priority Assignment
and ETP, they still suffer from the different types of HTP and (SRMAPA) protocol - is introduced for supporting the
ETP [6]. Some different types of protocols, including Dual integrated services of voice and data applications in mobile ad-
Busy Tone Multiple Access (DBTMA) [7l, Multiple Access hoc networks. A main objective of this protocol is provision of
with Collision Avoidance with Piggyback Reservation a means to guarantee the QoS requirements for the real time
(MACAPR) [SI are also developed as the advanced services in a flexible and simple manner while maximizing the
technologies which are considered as an excellent solution to statistical multiplexing gain in the integrated service
the HTP and ETP. applications. The SRMAPA protocol adopts a unique, yet
We note that all the aforementioned protocols are based on simple frame structure that allows the distributed nodes to
the totally asynchronous approach and thus, the network-wide contend for and reserve for time slots with a RTSICTS-like
common frame structure to coordinate the medium access handshake and soft reservation mechanism. Here, “soft
among independent nodes is not defined. In these approaches, reservation” is a unique concept that allows for any urgent node

’ This work was supported by grant no. 1999-2-303-004-3from the interdisciplinaryresearch program of the KOSEF.

0-7803-6507-0/00/$10.00 02000 IEEE 942 VTC 2000


of real-time application to snap the radio resource fiom other while guaranteeing the delay-oriented QoS of the real time
node of the non-real-time application on a demand basis and it services. In the current design, we consider the integrated
plays an essential role of realizing the distributed scheduling services of voice and data applications. The innovative features
capability in the SRMA/PA protocol. of the S W A protocol include a unique fiame structure and
In the following section, we first discuss the system soft reservation capability to realize the distributed and
architecture and requirement to support the integrated services dynamic slot scheduling, dynamic & distributed access priority
in the mobile ad-hoc networks. The proposed SRMA/PA assignmenthpdate policy, and time-constrained backoff
protocol is described in Section 111, including the frame algorithm.
structure and operational procedure. Simulation and numerical A . Frame Structure and Soft Reservation
results are presented in Section IV to investigate the
performance of the proposed protocol. Finally, our concluding We assume that the radios used are halfduplex and the
remarks are presented in Section V. physical links are either uni-directional or bi-directional. The
transmission time scale is organized in periodic h e s , each
XI. MOBILE AD-HOC NETWORKS SYSTEM containing a fixed number of time slots. The SRMAlPA is a
REQUIREMENTFOR INTEGRATED SERVICES contention-based access scheme with the basic fiame structure
shown in Figure 1. A slot is divided into six different fields:
We consider a typical architecture of self-organizing multi- SYNC, SR (Soft Reservation), RR (Reservation Request), RC
hop wireless packet networks (mobile ad-hoc networks) in (Reservation Confirm), DS (Data Sending), and ACK fields.
which all mobile terminals (nodes) cooperatively maintain The SYNC field is used for synchronization on a slot basis. The
network connectivity with each other. To facilitate the medium SR, RR, RC, and ACK fields are intended for the
access scheme for integrated services in mobile ad-hoc corresponding control packets while DS field is used for
networks, the following requirements must be taken into transmission of data packets. In practice, the DS field should be
consideration [121: much longer than any other fields to minimize the signaling
To handle hidden- and exposed- terminal problems overhead.
To deal with shadowing problem Signaling in the SR field plays a role of setting a busy tone to
0 To realize statistical multiplexing in a fully distributed clear up the neighbor nodes for collision avoidance, i.e., the
manner same role as the RTS (Ready-To-Send) [4,11], while indicating
0 To guarantee the QoS requirement with no centralized that the corresponding slot is already reserved by some
station transmitter. Furthermore, it carries the value of access priority
The immediate problem in designing a MAC protocol for a assigned to the reserved node.
mobile ad-hoc networks is the existence of hidden and exposed When any idle node becomes active as a new packet anives
in the queue, it attempts to transmit the RR control packet for
terminals. In general, the HTPiETP can be handled by the
reservation request over any idle slot (i.e., SR field indicates
simple RTS-CTS-DATA packet exchange using the
corresponding field defined in the h e - b a s e d synchronous that the slot is not reserved by any node). For the delay-
medium access approaches. Since the frequency band of sensitive voice application, the voice terminals attempt to snap
2.4GHz or 5GHz under consideration for the wireless LANs the slots already reserved by data terminals via RR field when
their priorities are greater than those of data terminals. This is a
has adverse penetration characteristics, the shadowing problem
must be handled by some relay functions between the available concept of “soft reservation,” which has been uniquely adopted
nodes, which form a basis of the multi-hop connectivity in the as a means of realizing the distributed scheduling capability in
mobile ad-hoc network. the SRMA/PA protocol. It is the feature in constrast with the
As the integrated services have severely different data rate other protocols such as [ll] and [12], in which any slot
and traEic characteristics in nature, statistical multiplexing reserved for a particular terminal, even if it has a lower access
among these services must be realized to use the wireless priority than other terminals, is maintained until all packets in
the burst are transmitted.
resources efficiently. So a node needs to contend with other
nodes to reserve the slot dynamically without any coordination. The initial value of the priority level assigned to an
In other words, dynamic slot reservation becomes an essential individual node is determined on a basis of the service classes,
element to improve the statistical multiplexing gain among the e.g., the real time and non-real-time services, in a static manner.
various types of service classes with different QoS Once the random access attempt becomes successful, the
requirements. Without a centralized station, however, provision corresponding slot is reserved solely for the node until its
of QoS to different services must be realized in a fully packet flow (burst) is terminated. The reserved node will be
distributed manner [12]. In other words, there must be some assigned a prespecified priority, p$R) or p i R ) ,respectively
distributed control schemes to give the relative urgent data for voice and data terminals. In general, it is required that
packet high priority to access the wireless medium. This is a
quite different issue against the infrastructure network in which p:R) > p y ) to expedite the slot reservation for the delay-
the radio resources can be efficiently allocated to meet the QoS sensitive voice applications. Whenever the random access fails
requirements with a proper mechanism of packet scheduling if due to collision, access priority of the backlogged node is
all nodes can successfully exchange the control information updated depending on the urgency. A specific policy for
with the centralized station. In the mobile ad-hoc networks, priority assignmenuupdate will be presented in Part B of this
therefore, it must be considered how distributed scheduling can section. The access priority levels given after n* collision are
be realized without solely relying on the control information denoted by p,,(n) and p d ( n ) , respectively for voice and
from individual node. data terminals.
Depending on whether a terminal has a packet to transmit in
111. SRMA/PA PROTOCOL the queue, it can be either in an idle or active state. In the active
The SRMA/PA (Soft Reservation Multiple Access with state, we consider two different states: access state and reserved
Priority Assignment) protocol is a TDMA h e - b a s e d MAC state (see Figure 2). These two states depend on whether a
protocol to allocate stations to different time slots in a way that terminal is backlogged for random access before reservation
no collision occur in the mobile ad-hoc network. Its main or it has already reserved the slot for itself, respectively. When
design objective is to maximize the statistical multiplexing gain access priority of the voice terminal in the access state becomes

0-7803-6507-0/00/$10.00 02000 IEEE 943 VTC 2000


larger than that of the data terminal in the reserved state, as To avoid the repeated collisions, we employ a binary
notified via SR field, the corresponding slot is yielded to the exponential backoff algorithm [4] for the non-real-time services.
prioritized voice terminal. Towards this end, the access For the real-time services in the S W A , we consider a
priorities must be set such that piR)> pv(n) > piR)> p d ( n ) . slightly different type of binary exponential backoff algorithm,
which implements a prioritized access to meet the delay
In other words, a voice terminal can snap the slots already constraint. Towards this end, the backoff window is divided
reserved by a data terminal whenever it becomes urgent before into two different regions, each one with a length of NB1 and
the voice packet must be dropped out due to the delay
constraint. This is the soft reservation feature in the S W A NB2 , respectively for real-time and non-real-time service
protocol, which forms a basis of realizing the distributed bamc. The sizes of sub-windows, N B ~and N B ,~will be the
scheduling mechanism to maximize the statistical multiplexing design parameters.
gain for the voice/data-integrated services. Operation of the proposed algorithm is described by the
Once the reservation request packet is successfully received following procedure. First, every node checks the laxity time
over the RR field, the receiver transmits the reservation (difference between the maximum allowable access delay and
confirm packet over the RC field. We note that a role of residual lifetime) of the head-of-line (HOL) packet in the queue,
signaling on the RC field is similar to that of CTS (Clear-To- and if it exceeds Tima slots, one of the NB, slots will be
Send) in [4,11]. Basically, RR-RC-DS-ACK exchange
procedure is similar to that in MACAW [4] and it eliminates selected randomly: otherwise, one of the NBz slots will be
the HTP.Meanwhile, one major difference from CATA [111 is selected randomly to transmit the RR control packet. In other
that slot reservation (SR) field in [Ill is used by the receiver words, if a node is repeatedly collided so as not to make a
rather than transmitter to set a busy tone and it does not have a reservation within a given time limit ( Tima slots), it is given
soft reservation feature. an access priority over any other non-urgent nodes. In case that
B. Distributed & Dynamic Access Priority Assignmend two or more nodes select the same slot and thus, their packets
Update Policy are collided again, a new backoff window is specified over the
immediately following slots in which the backlogged nodes
To support the integrated services, we define the QoS of real
retry the random access.
time and non-real time services in terms of packet loss ratio and
Since the above backoff mechanism consistently gives a
packet transfer delay, respectively. As one of the unique
random access opportunity to the delay-sensitive nodes while
features in the S W A protocol, we consider distributed and
deferring it for the non-urgent nodes, it is an effective policy to
dynamic access priority assignmenthpdate policy, which
guarantee the stringent QoS requirement of the real-time
allows for dynamically sharing (reserving) the wireless
services. In this mechanism, the urgency is strictly controlled
resources among all nodes in the same Tx-Rxrange. Figure 2
shows a state transition diagram for the access priority by the design parameter Timir, which will directly affect the
assignment and update procedure. system performance along with two other parameters NB,
When a node in idle state becomes active upon occurrence of and N B 2 . In the following section, we will search for the
a new packet, transition to access state is made with the initial
proper values of these system parameters so as to maximize the
access priority assigned ( p i o ) or p r ) ). In that state, the system efficiency. In general, these values will depend on the
terminal attempts slot reservation by transmitting the W l C load.
reservation request packet over the RR field. Upon collision, In order to ensure the stability of random access over the
the voice or data terminal increases the access priority with the available RR field within the given backoff window, the
following update rule: terminals under contention must be allowed for retransmission
with a given permission probability. Since the access priorities
pv(n+1)=pv(n)+&v, Pv(O)=P$O) closely reflect the urgency of packet transfer, the ermission
p d ( n + l ) = Pd (n>+&d pd (o)= p r )
9
J 7 .
probabilities used for voice and data services after n colhsion,
&(n) and Pd(n), are specified in terms of them:
where Apv and hpd are the incremental access priorities for
the voice and data services, which dynamically reflect their
performance objectives into relative urgency of packet transfer.
We note that the residual lifetime rR for the voice service and
the queue length le are two important variables that can be
used for assessing the relative urgency for the voice and data
services, respectively. Now, the incremental access priorities
are defined as follows:
where eo) and Pio) are the initial permission probabilities
for voice and data services, respectively (31 general,
P:’) > PF) ). The initial permission probability assigned to an
where rs is the slot duration and a is the scaling individual node is determined on a basis of the service classes
in a static manner. Once the initial permission probability is
coefficient. To differentiatethe access priority between the real- assigned, the initial priority must be determined so that the
time and non-real-time services, the following constraint is permission probability may not exceed one at any instance of
imposed: collision.
pip‘ < pd (n)< piR’ = pi-) < pio) < p v ( n ) < p:R) = p$-) .
IV.SIMULATION RESULTS AND ANALYSIS
C. lime-constrained Backof Algorithm & Permission
Probabilities We have used packet-level computer simulation to evaluate
performance of the proposed protocol. Simulation environment
In spite of using the dynamic access priority assignment/ has been implemented using the stochastic selfdriven discrete-
update policy, a collision on the RR field cannot be completely event models with BONeS (Block Oriented Networks
avoided among the same type of services with the same priority. Simulator) Designer. To highlight the performance

0-7803-6507-0/00/%10.00 02000 IEEE 944 VTC 2000


characteristics of the proposed protocol, we have chosen the As shown in Figure 5, on the other hand, the SRMMA
CATA protocol [ 111 as a comparative reference, which actually protocol is still superior to the CATA protocol in delay
forms a basis for the SRMA/PA protocol in terms of frame performance of the data traffic except when the system is
structure, distributed reservation and handshake mechanism. overloaded with the voice users. At heavy load of the voice
Toward the fair comparison, the priority update policy based on traffic, data users suffer from the higher delay with SRMAPA
the laxity time for the voice services and the number of packets protocol since they have to yield their resources to the urgent
in queues for the data services is carried over to the CATA voice users on demand. In other words, a trade-off between the
protocol. Note that the CATA protocol referred in the following voice and data performance is expected to some extent.
discussion is corresponding to the accordingly modified version These observations imply that the S W A protocol has
of the original CATA protocol. significantly improved the system capacity of the real-time
A . Simulation Model service without much compromising the delay performance of
non-real-time service.
To focus on the performance of access mechanism only, we Figure 6 examines channel utilization under the different
consider a cluster of the transmitters in a certain coverage area load offered. As observed in most of the contention-
such that one can hear the other, i.e., all the transmitters are based MAC protocols, the channel becomes under-utilized as
sharing the same time slot, and the wireless channel is ideal in the traffic load increases. However, channel utilization
the sense that there is no distortion, noise, or any other performance of the SRMA/PA protocol always outperforms
interference for packet transmission. The system parameters that of the CATA protocol and it becomes more dramatic as the
used in the simulation are listed in Table 1. traffic load increases.
A voice traffic is modeled with a random pattem of ON and In Figures 7, 8, and 9, performance improvement achieved
OFF bursts, identified by a “slow” voice activity detector [13]. by the time-constrained backoff algorithm (described in Section
The ON and OFF periods are assumed to have an exponential 111-C) has been assessed for the SRMA/PA protocol. All the
distribution and they are statistically independent of one parameters used for obtaining those results are properly
another. During ON period only, the voice traffic stream is selected by exhaustive search for the different traffic load and
generated at a constant bit rate of R, . On the other hand, a they are summarized in Table 2. Figures 7, 8, and 9 show the
data traffic is modeled by a Bemoulli process such that data packet loss ratio, data packet delay, and channel utilization
terminals generate a new packet in every slot according to a performance respectively, with and without employing the
Bemoulli experiment with a parameter c d [13]. If there are time-constrained backoff algorithm for the voice traffic. For the
data traffic, a binary exponential backoff algorithm is employed
N, slots per ftame, the average data rate is given by [4]. Dotted and solid lines denote performance with and
Rd = c d R s N , bitdsec. The length of each field is fixed: 4 without backoff mechanism, respectively. It is clearly shown
bytes for SYNC, 3 bytes for SR, RR, RC, and ACK, and 64 that the proposed backoff mechanism firther improves the
bytes for DS. overall performance, amounting to roughly 10% in delay
Voice packets belonging to the real time session are dropped reduction and 5% in channel utilization. More specifically, one
if not transmitted within 20msec. Meanwhile, data packets additional voice user can be supported with the time-
belonging to the non-real-time session are not subject to any constrained backoff mechanism.
loss as the infinite length of buffer is assumed. The focus of the As opposed to observation made in Figure 6, channel
current study is to understand the service quality provided by utilization performance of the SRMA/PA protocol is steadily
the proposed protocol while maximizing the multiplexing gain improved as the number of voice users increase. Its implication
among the different types of services. To this end, the is that the time-constrained backoff algorithm employed in the
performance of main interest includes average voice packet S W A protocol may play an essential role of pushing
loss ratio, data packet delay, and channel utilization. Voice utilization of the scarce radio resources to its full capacity,
packet loss ratio is defined as the number of voice packets especially at heavy traffic load.
dropped out of all voice packets generated while data packet
delay is defined as the time between data packets generation V. CONCLUSIONS
and transmission completion. Channel utilization, on the other
hand, is defined as the average number of slots used for We have proposed here a new type of the distributed MAC
successful transmission among all the slots in a frame. protocol - the Soft Reservation Multiple Access with Priority
Assignment ( S W A ) Protocol - which is a synchronous
B. Simulation Results and Discussion version of the MAC protocol with the desirable features of
In Figures 4, 5 , and 6, solid and dotted lines denote the collision avoidance to eliminate the hidden-terminal and
performance of the SRMARA and CATA protocol, respectively. exposed-terminal problems as well as dynamic slot assignment
In these results, the time-constrained back-off algorithm has not to support both real-time and non-real-time services in mobile
been employed by the SRMAPA protocol. Figures 4 and 5 ad-hoc networks. The objective of the proposed MAC protocol
respectively show the average voice packet loss ratio and the is to maximize the statistical multiplexing gain over the
data packet delay for the different combination of data and wireless link while guaranteeing the delay requirement of the
packet traffic loads offered, subject to 20ms delay constraint for real-time service (in particular, variable bit rate voice traffic)
the voice traffic. In Figure 4, it is shown that a significant when integrated with the non-real-time data services. Attributes
improvement in the loss performance can be achieved by the in the SRMAFA protocol include the soft reservation and
SRMAPA protocol. As compared with the CATA protocol, prioritized access control features, which allow for flexible slot
furthermore, the SRMAPA is not much sensitive to the traffic assignment among the distributed nodes so as to virtually
load of data traffic offered. It is due to the prioritized dynamic implement the distributed scheduling.
slot assignment scheme with soft reservation, which allows for We have demonstrated via simulation studies that the
maintaining the voice quality steadily in the SRMAPA multiplexing gain can be significantly improved without much
protocol. Assuming that a target value of the packet voice loss compromising the system complexity. We also have shown that
ratio is 0.001, the SRMAPA protocol can support up to nine the proposed backoff mechanism considered for the delay-
voice users at the same time while system capacity of the constrained service is useful for further improving the channel
CATA protocol is limited to only two users. utilization.
Our future work will include performance comparison of the

0-7803-6507-0/00/$10.00 02000 IEEE 945 VTC 2000


SRMA/PA protocol with the idealized conflict-fkee scheduling Table 1. Simulation Parameters
scheme to investigate its underlying performance limit, and
extension of its applicability to the ATM-based broadband
.. Parainet+
, -
Zr. 1 Notatiolj 1 ~ g h l u e . : 1
wireless network, in which a more flexible means to realize the Channel bit rate I R I 960 kbps
statistical multiplexing capability is required. Transmission rate of voice senice I Rv I 32.0kbps
Transmission rate of data service Rd 28.8kbps
REFERENCES
Frame length 7F 12 Ins
Institute of Electrical and Electronics Engineers, USA.
“Part 1 1 : Wireless LAN Medium Access Control (MAC) Slot duration 7s 1 0.667ms
and Physical Layer (PHY) specifications,” IEEE Std NumberofslotsperTDMAframe I N, I I8 I
802.1 1-1997. ~~

F. A. Tobagi and L. Kleinrock, “Packet Switching in


Maximum tolerable delay for voice traffic D,, 20 ms
Radio Channels: Part I1 - The Hidden Terminal Problem Average duration of talkspurt a, 1000 ms
in Carrier Sense Multiple-Access Modes and Busy-Tone Average duration of silence PV 1350 ms
Solution,” IEEE Transaction on Communications, vol.
COM-23, no. 12, pp. 1417-1433, 1975. Parameter of Bernoulli process
P. Kam, “MACA - A New Channel Access Method for
Packet Radio,” ARRUCRRL Amateur Radio 9*
Computer Networking Conference, pp. 134-140, 1990. Initial pemission prob. for data traffic
V. Bharghavan, A. Demers, S . Shenker, and L. Zhang,
“MACAW A Media Access Protocol for Wireless Scaling coefficient for priority update a 0.1
LAN’s,’’ Proceedings of ACM SIGCOMM’94, pp. 2 12- Initial priority for voice traffic Pv( 0 ) 91
225, 1994.
Chane L. Fullmer and J. J. Garcia-Luna-Aceves, “Floor
Acquisition Multiple Access (FAMA) for packet-radio
Maximumpriorityforvoicetraffic I p:””) I 200 I
networks,” Proceedings of ACM SIGCOMM’95, 1995. Initial priority for data traffic I PY) I 11 I
S . Singh and C. S . Raghavendra, “PAMAS - Power
Maximum priority for data traffic 100
Aware Multi-Access protocol with Signalling for Ad
Hoc Networks,” Number of simulated slots 1,000,000
Zygmunt J. Haas and Jing Deng, “Dual Busy Tone
Multiple Access (DBTMA) - A New Medium Access
Control for Packet Radio Networks,” Proceedings of
ICUPC’98, pp. 973-977, 1998. LF“ 1

C. R. Lin, “Multimedia transport in multihop wireless Slot1 Slot2 Slo13 ... SlotN Sbtl
networks,” IEE Proceedings - Communications, vol. 145,
no. 5, pp. 342-346, October 1998.
C. Zhu and M. Scott Corson, “A Five-Phase Reservation
Protocol (FPRP) for Mobile Ad-Hoc Networks“,
s m c s y a , SR sollncs5”
Proceedings of INFOCOM’98, pp. 322-331, 1998. RR RClirrvrmWRC Rcrcrvnmc“
DS WSmdml ACKMxm**dp”t
Z. Tang and J. J. Garcia-Luna-Aceves, “Hop
Reservation Multiple Access (HpMA) for Ad-Hoc . *
Networks,” Proceedings of MFOCOM’99, pp. 194-201, Figure 1. Frame structure of the SRMAPA protocol
1999.
Z. Tang and J. J. Garcia-Luna-Aceves, “A Protocol for
Topology Dependent Transmission Scheduling in
Wireless Networks,” Proceedings of WCNC’99, pp.
1333-1337, 1999.
B. Xu and B. Walke, “A Multiple Access Protocol for
Ad-Hoc Wireless ATM Multihop Networks,’’
Proceedings of VTC’99, pp. 1 141- 1145,1999.
A. E. Brand and A. H. Aghvami, “Performance of a Joint
CDMMRMA Protocol for Mixed VoiceJData
Transmission for Third Generation Mobile . .-

Communication,” IEEE Joumal on Selected Areas in


Communications, Vol. 14, No. 9, pp. 1698-1707, Figure 2. State transition diagram for priority assignment and
December, 1996. update policy

Table 2. Parameters selected for the time-constrained backoff

Parameters
NBI NB2 Timi,
(# of voice users:# of data-su
(2:5), (2:6), (2:7), (4:5), (4:6) 1 5 1
... I ... ...
(4:7), (6:5), (6:6), (6:7), (85) 3 3 1
(8:6), (8:7), (10:5), (10:6), (10:7) 5 3 5

0-7803-6507-0/00/$10.00 02000 IEEE 946 VTC 2000


i i A ' ;I
.

10
I

The Number of Voice Usm (Nj

Figure 7. Performance of the S W A protocol with the time-


Figure 4. Voice packet loss ratio vs. the number of voice constrained backoff algorithm: voice packet loss ratio vs. the
users number of voice users

2 10-
2
CI
.
5-

I
2 4 6 8 10
2 4 6 8 10 The Number of Voice Usm (NJ
The Number of Voice Users (Nj

Figure 8. Performance of the S W A protocol with


Figure 5. Data packet delay vs. the number of voice users the time-constrained backoff a l g o r i k data packet
delay vs. the number of voice users

...... .....
1.0,
.. .....
&_.._.A.....
0.9 - 0.90 - ......

..........
.........
.......

0.6-
E 0.65 -
...... .....
0.60:
.....
+._..A .....
0.4
2 4 6 8 10
The Number of Voice Users (Nj

Figure 9. Performance of the SRMA/PA protocol with the


Figure 6. Channel utilization vs. the number of voice users time-constrained backoff algorithm: channel utilization vs. the
number of voice users

0-7803-6507-0/00/$10.00 02000 IEEE 947 VTC 2000

You might also like