13,314 research outputs found
How do Wireless Chains Behave? The Impact of MAC Interactions
In a Multi-hop Wireless Networks (MHWN), packets are routed between source
and destination using a chain of intermediate nodes; chains are a fundamental
communication structure in MHWNs whose behavior must be understood to enable
building effective protocols. The behavior of chains is determined by a number
of complex and interdependent processes that arise as the sources of different
chain hops compete to transmit their packets on the shared medium. In this
paper, we show that MAC level interactions play the primary role in determining
the behavior of chains. We evaluate the types of chains that occur based on the
MAC interactions between different links using realistic propagation and packet
forwarding models. We discover that the presence of destructive interactions,
due to different forms of hidden terminals, does not impact the throughput of
an isolated chain significantly. However, due to the increased number of
retransmissions required, the amount of bandwidth consumed is significantly
higher in chains exhibiting destructive interactions, substantially influencing
the overall network performance. These results are validated by testbed
experiments. We finally study how different types of chains interfere with each
other and discover that well behaved chains in terms of self-interference are
more resilient to interference from other chains
Throughput Analysis of CSMA Wireless Networks with Finite Offered-load
This paper proposes an approximate method, equivalent access intensity (EAI),
for the throughput analysis of CSMA wireless networks in which links have
finite offered-load and their MAC-layer transmit buffers may be empty from time
to time. Different from prior works that mainly considered the saturated
network, we take into account in our analysis the impacts of empty transmit
buffers on the interactions and dependencies among links in the network that is
more common in practice. It is known that the empty transmit buffer incurs
extra waiting time for a link to compete for the channel airtime usage, since
when it has no packet waiting for transmission, the link will not perform
channel competition. The basic idea behind EAI is that this extra waiting time
can be mapped to an equivalent "longer" backoff countdown time for the
unsaturated link, yielding a lower link access intensity that is defined as the
mean packet transmission time divided by the mean backoff countdown time. That
is, we can compute the "equivalent access intensity" of an unsaturated link to
incorporate the effects of the empty transmit buffer on its behavior of channel
competition. Then, prior saturated ideal CSMA network (ICN) model can be
adopted for link throughput computation. Specifically, we propose an iterative
algorithm, "Compute-and-Compare", to identify which links are unsaturated under
current offered-load and protocol settings, compute their "equivalent access
intensities" and calculate link throughputs. Simulation shows that our
algorithm has high accuracy under various offered-load and protocol settings.
We believe the ability to identify unsaturated links and compute links
throughputs as established in this paper will serve an important first step
toward the design and optimization of general CSMA wireless networks with
offered-load control.Comment: 6 pages. arXiv admin note: text overlap with arXiv:1007.5255 by other
author
Interference in Poisson Networks with Isotropically Distributed Nodes
Practical wireless networks are finite, and hence non-stationary with nodes
typically non-homo-geneously deployed over the area. This leads to a
location-dependent performance and to boundary effects which are both often
neglected in network modeling. In this work, interference in networks with
nodes distributed according to an isotropic but not necessarily stationary
Poisson point process (PPP) are studied. The resulting link performance is
precisely characterized as a function of (i) an arbitrary receiver location and
of (ii) an arbitrary isotropic shape of the spatial distribution. Closed-form
expressions for the first moment and the Laplace transform of the interference
are derived for the path loss exponents and , and simple
bounds are derived for other cases. The developed model is applied to practical
problems in network analysis: for instance, the accuracy loss due to neglecting
border effects is shown to be undesirably high within transition regions of
certain deployment scenarios. Using a throughput metric not relying on the
stationarity of the spatial node distribution, the spatial throughput locally
around a given node is characterized.Comment: This work was presented in part at ISIT 201
- …