6 research outputs found

    Belaidลพio ryลกio tinklลณ terpฤ—s prieigos valdymo tyrimas

    Get PDF
    Over the years, consumer requirements for Quality of Service (QoS) has been growing exponentially. Recently, the ratification process of newly IEEE 802.11ad amendment to IEEE 802.11 was finished. The IEEE 802.11ad is the newly con-sumer wireless communication approach, which will gain high spot on the 5G evolution. Major players in wireless market, such as Qualcomm already are inte-grating solutions from unlicensed band, like IEEE 802.11ac, IEEE 802.11ad into their architecture of LTE PRO (the next evolutionary step for 5G networking) (Qualcomm 2013; Parker et al. 2015). As the demand is growing both in enter-prise wireless networking and home consumer markets. Consumers started to no-tice the performance degradation due to overcrowded unlicensed bands. The un-licensed bands such as 2.4 GHz, 5 GHz are widely used for up-to-date IEEE 802.11n/ac technologies with upcoming IEEE 802.11ax. However, overusage of the available frequency leads to severe interference issue and consequences in to-tal system performance degradation, currently existing wireless medium access method can not sustain the increasing intereference and thus wireless needs a new methods of wireless medium access. The main focal point of this dissertation is to improve wireless performance in dense wireless networks. In dissertation both the conceptual and multi-band wireless medium access methods are considered both from theoretical point of view and experimental usage. The introduction chapter presents the investigated problem and itโ€™s objects of research as well as importance of dissertation and itโ€™s scientific novelty in the unlicensed wireless field. Chapter 1 revises used literature. Existing and up-to-date state-of-the-art so-lution are reviewed, evaluated and key point advantages and disadvantages are analyzed. Conclusions are drawn at the end of the chapter. Chapter 2 describes theoretical analysis of wireless medium access protocols and the new wireless medium access method. During analysis theoretical simula-tions are performed. Conclusions are drawn at the end of the chapter. Chapter 3 is focused on the experimental components evaluation for multi-band system, which would be in line with theoretical concept investigations. The experimental results, showed that components of multi-band system can gain sig-nificant performance increase when compared to the existing IEEE 802.11n/ac wireless systems. General conclusions are drawn after analysis of measurement results

    ๊ณ ๋ฐ€๋„ ๋ฌด์„ ๋žœ ๋™์‹œ ์ „์†ก ํ–ฅ์ƒ ๊ธฐ๋ฒ•

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ (๋ฐ•์‚ฌ)-- ์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› ๊ณต๊ณผ๋Œ€ํ•™ ์ „๊ธฐยท์ปดํ“จํ„ฐ๊ณตํ•™๋ถ€, 2017. 8. ์ตœ์„ฑํ˜„.๋ฌด์„  ํ†ต์‹ ์— ๋Œ€ํ•œ ์ˆ˜์š”๊ฐ€ ์ฆ๊ฐ€ํ•จ์— ๋”ฐ๋ผ, Wi-Fi๋กœ ํ”ํžˆ ์•Œ๋ ค์ง„ IEEE 802.11 ํ‘œ์ค€ ๊ธฐ๋ฐ˜ ๋ฌด์„ ๋žœ(WLAN, Wireless Local Area Network)์€ ์–ด๋””์—์„œ๋‚˜ ์ฐพ์•„๋ณผ ์ˆ˜ ์žˆ๋Š” ๊ธฐ์ˆ ๋กœ ๊ฑฐ๋“ญ๋‚ฌ๋‹ค. ์ด๋กœ ์ธํ•ด ๋ฌด์„ ๋žœ์˜ ๊ณ ๋ฐ€ํ™”, ์ฆ‰ ๊ณต๊ฐ„์ ์œผ๋กœ ์ธ์ ‘ํ•œ ๋งŽ์€ AP(Access Point)์™€ STA(station)๋“ค์ด ๋™์ผํ•œ ์ฃผํŒŒ์ˆ˜ ์ฑ„๋„์„ ์‚ฌ์šฉํ•˜๋ฉฐ ์ด๋กœ ์ธํ•ด ํ•œ ๋‹จ๋ง์ด ์–ป์„ ์ˆ˜ ์žˆ๋Š” ์„ฑ๋Šฅ์ด ์ œํ•œ๋˜๋Š” ํ˜„์ƒ์ด ๋‘๋“œ๋Ÿฌ์ง€๊ณ  ์žˆ๋‹ค. ๋”ฐ๋ผ์„œ ์ด๋Ÿฌํ•œ ๊ณ ๋ฐ€๋„ ๋ฌด์„ ๋žœ ํ™˜๊ฒฝ์—์„œ๋Š” ๋‹จ์ผ ์ „์†ก์— ๋Œ€ํ•œ ์ŠคํŽ™ํŠธ๋Ÿผ ํšจ์œจ ๋ฟ๋งŒ ์•„๋‹ˆ๋ผ ์ฃผํŒŒ์ˆ˜ ์ž์›์˜ ๊ณต๊ฐ„ ์žฌ์‚ฌ์šฉ(spatial reuse)์˜ ์ค‘์š”์„ฑ ๋˜ํ•œ ๊ฐ•์กฐ๋œ๋‹ค. ์ฆ‰, ํŠน์ • ๊ณต๊ฐ„ ๋‚ด์—์„œ ์–ผ๋งˆ๋‚˜ ๋งŽ์€ ๋™์‹œ ์ „์†ก์ด ๊ฐ€๋Šฅํ•œ์ง€๊ฐ€ ์ค‘์š”ํ•œ ์ด์Šˆ๋กœ ์ž๋ฆฌ๋งค๊น€ํ•˜๊ณ  ์žˆ๋‹ค. ๋ณธ ํ•™์œ„๋…ผ๋ฌธ์—์„œ๋Š” ๊ณ ๋ฐ€๋„ ๋ฌด์„ ๋žœ ํ™˜๊ฒฝ์—์„œ ๋” ๋งŽ์€ ๋™์‹œ ์ „์†ก์„ ์„ฑ๊ณต์‹œํ‚ค๊ธฐ ์œ„ํ•˜์—ฌ ๋‹ค์Œ๊ณผ ๊ฐ™์€ ์„ธ ๊ฐ€์ง€ ์ „๋žต์„ ๊ณ ๋ คํ•œ๋‹ค. (i) ๋งค์ฒด์ ‘๊ทผ์ œ์–ด(MAC, Medium Access Control) ๊ณ„์ธต์˜ ACK(Acknowledgment) ๋ฐ CTS(Clear-To-Send) ํ”„๋ ˆ์ž„์— ๋Œ€ํ•œ ์†ก์‹  ์ „๋ ฅ ์ œ์–ด, (ii) ๋ฐ˜์†กํŒŒ ๊ฐ์ง€ ์ž„๊ณ„๊ฐ’(CST, Carrier-Sense Threshold) ์ ์‘, (iii) ๋™์‹œ ์†ก์‹  ๋ฐ ์ˆ˜์‹  (STR, Simultaneous Transmit and Receiver), ์ฆ‰ ๋™์ผ๋Œ€์—ญ ์ „์ด์ค‘ ํ†ต์‹ (in-band full duplex). ์ฒซ๋ฒˆ์งธ๋กœ, ๋ณธ ํ•™์œ„ ๋…ผ๋ฌธ์—์„œ๋Š” ๋ฐ์ดํ„ฐ ํ”„๋ ˆ์ž„์— ์˜ํ•œ ๋™์ผ ์ฑ„๋„ ๊ฐ„์„ญ(CCI, Co-Channel Interference)๋ณด๋‹ค ๋œ ์กฐ๋ช…๋˜์–ด ์™”๋˜ MAC ACK ํ”„๋ ˆ์ž„์— ์˜ํ•ด ๋ฐœ์ƒํ•˜๋Š” CCI์— ์ฃผ๋ชฉํ•œ๋‹ค. ํ™•๋ฅ ์  ๊ธฐํ•˜ ๋ถ„์„(stochastic geometry analysis)์„ ๊ธฐ๋ฐ˜์œผ๋กœ ACK ํ”„๋ ˆ์ž„์˜ ์†ก์‹  ์ „๋ ฅ ์กฐ์ ˆ์˜ ํ•„์š”์„ฑ์„ ํ™•์ธํ•˜์˜€์œผ๋ฉฐ, ์ด๋ฅผ ๋ฐ”ํƒ•์œผ๋กœ ๋™์  ACK ํ”„๋ ˆ์ž„ ์†ก์‹  ์ „๋ ฅ ์ œ์–ด ์•Œ๊ณ ๋ฆฌ์ฆ˜์ธ Quiet ACK(QACK)์„ ์ œ์•ˆํ•œ๋‹ค. QACK์€ ๋ฐ์ดํ„ฐ ํ”„๋ ˆ์ž„ ์ˆ˜์‹  ์ค‘ ์ˆ˜ํ–‰๋˜๋Š” CCI ๊ฒ€์ถœ ๋ฐ CCI ์ „๋ ฅ ์ถ”์ • ๊ธฐ๋ฒ•๊ณผ ACK ํ”„๋ ˆ์ž„ ์ „์†ก ํ†ต๊ณ„๋ฅผ ํ™œ์šฉํ•˜์—ฌ ์„ธ๋ฐ€ํ•˜๊ณ  ์‹ ์†ํ•˜๊ฒŒ ACK ํ”„๋ ˆ์ž„์˜ ์†ก์‹  ์ „๋ ฅ์„ ์กฐ์ ˆํ•œ๋‹ค. ๋”๋ถˆ์–ด, QACK์„ ๋ฐ”ํƒ•์œผ๋กœ CTS ํ”„๋ ˆ์ž„ ์†ก์‹  ์ „๋ ฅ์„ ์กฐ์ ˆํ•˜์—ฌ ๋” ๋งŽ์€ ๋™์‹œ ์ „์†ก์ด ์‹œ๋„๋  ์ˆ˜ ์žˆ๊ฒŒ ํ•˜๋Š” Quiet CTS(QCTS)๋ผ๋Š” ์•Œ๊ณ ๋ฆฌ์ฆ˜ ๋˜ํ•œ ์ œ์•ˆํ•œ๋‹ค. QACK์˜ ์‹คํ˜„ ๊ฐ€๋Šฅ์„ฑ๊ณผ ์„ฑ๋Šฅ์€ SDR(Software-Defined Radio) ๊ธฐ๋ฐ˜ ํ”„๋กœํ† ํƒ€์ž…์„ ํ†ตํ•ด ๊ฒ€์ฆํ•˜๋ฉฐ ๊ธฐ์กด ๋ฐฉ์‹ ๋Œ€๋น„ ์•ฝ 1.5๋ฐฐ ๋†’์€ ์ˆ˜์œจ์„ ์–ป์„ ์ˆ˜ ์žˆ์Œ์„ ํ™•์ธํ•œ๋‹ค. ๋ณด๋‹ค ์ผ๋ฐ˜์ ์ธ ๋ฌด์„ ๋žœ ํ™˜๊ฒฝ์—์„œ์˜ QACK ๋ฐ QCTS์˜ ์„ฑ๋Šฅ์€ ns-3๋ฅผ ์‚ฌ์šฉํ•œ ๋‹ค์–‘ํ•œ ์‹œ๋ฎฌ๋ ˆ์ด์…˜์„ ํ†ตํ•ด ํ‰๊ฐ€ํ•œ๋‹ค. ๋‹ค์Œ์œผ๋กœ, ๋™์‹œ์— ๋” ๋งŽ์€ ๋™์‹œ ์ „์†ก์ด ์‹œ๋„๋  ์ˆ˜ ์žˆ๋„๋ก ๊ฐ„์„ญ์›(interferer node)๊ณผ ๋ชฉ์  ๋…ธ๋“œ(destination node)์— ๋”ฐ๋ผ CST๋ฅผ ์ œ์–ดํ•˜๋Š” โ€‹โ€‹CST ์ ์‘ ๋ฐฉ๋ฒ•, FACT(Fine-grained Adaptation of Carrier-sense Threshold)๋ฅผ ์ œ์•ˆํ•œ๋‹ค. ์ œ์•ˆํ•˜๋Š” ๋ฐฉ๋ฒ•์€ ๋ฌด์„ ๋žœ ํ‘œ์ค€์—์„œ ์ด๋ฏธ ์ •์˜๋˜์–ด ์žˆ๋Š” ๊ธฐ๋Šฅ์„ ์‚ฌ์šฉํ•˜๋ฏ€๋กœ ์ƒ์šฉ ๋ฌด์„ ๋žœ ๊ธฐ๊ธฐ์—์„œ ์‰ฝ๊ฒŒ ๊ตฌํ˜„ํ•  ์ˆ˜ ์žˆ๋‹ค. ๋˜ํ•œ FACT ๋ฐ ๋‹ค๋ฅธ CST ์ ์‘ ๊ธฐ๋ฒ•๊ณผ ํ•จ๊ป˜ ๋™์ž‘ํ•  ์ˆ˜ ์žˆ๋Š” CCA(Clear Channel Assessment) ์˜ค๋ฒ„ํ—ค๋“œ ๊ฐ์†Œ ๊ธฐ๋ฒ•์„ ์ œ์•ˆํ•˜๋ฉฐ, ์ œ์•ˆํ•œ ๊ธฐ๋ฒ•๋“ค์˜ ์„ฑ๋Šฅ์„ ns-3 ์‹œ๋ฎฌ๋ ˆ์ด์…˜์„ ํ†ตํ•ด ๋น„๊ตํ‰๊ฐ€ํ•œ๋‹ค. ์‹œ๋ฎฌ๋ ˆ์ด์…˜ ๊ฒฐ๊ณผ๋ฅผ ํ†ตํ•ด ์ œ์•ˆํ•œ ๋ฐฉ๋ฒ•์ด ๊ธฐ์กด ๋ฐฉ๋ฒ•์— ๋น„ํ•ด ๋„คํŠธ์›Œํฌ ์ „์ฒด ์ˆ˜์œจ์„ ํฐ ํญ์œผ๋กœ ํ–ฅ์ƒ์‹œํ‚ฌ ์ˆ˜ ์žˆ์Œ์„ ํ™•์ธํ•œ๋‹ค. ๋งˆ์ง€๋ง‰์œผ๋กœ, ๋ฌด์„ ๋žœ์—์„œ STR์„ ๊ฐ€๋Šฅํ•˜๊ฒŒํ•˜๋Š” ์ƒˆ๋กœ์šด MAC ํ”„๋กœํ† ์ฝœ, ์ฆ‰ MASTaR(MAC Protocol for Access points in Simultaneous Transmit and Receive mode)๋ฅผ ๊ธฐ์กด ๋ฌด์„ ๋žœ ํ‘œ์ค€์„ ์ค€์ˆ˜ํ•˜๋Š” ๋ฐฉ๋ฒ•์œผ๋กœ ์ œ์•ˆํ•œ๋‹ค. ๋˜ํ•œ MASTaR ๋™์ž‘์„ ์œ„ํ•ด ํ•„์š”ํ•œ ๋ฌผ๋ฆฌ๊ณ„์ธต์—์„œ ๋””์ง€ํ„ธ ์ž๊ฐ€ ๊ฐ„์„ญ ์ƒ์‡„(SIC, Self-Interference Cancellation) ์ „๋žต์„ ์ œ์•ˆํ•˜๋ฉฐ ๊ทธ ์‹คํ˜„ ๊ฐ€๋Šฅ์„ฑ๊ณผ ์„ฑ๋Šฅ์„ 3์ฐจ์› ๊ด‘์„  ์ถ”์ (3D-ray tracing) ๊ธฐ๋ฐ˜ ์‹œ๋ฎฌ๋ ˆ์ด์…˜์„ ํ†ตํ•ด ๋‹ค์–‘ํ•œ ์ธก๋ฉด์—์„œ ํ‰๊ฐ€ํ•œ๋‹ค. ์‹œ๋ฎฌ๋ ˆ์ด์…˜ ๊ฒฐ๊ณผ๋Š” ํ˜„์žฌ ๋ฌด์„ ๋žœ MAC ํ”„๋กœํ† ์ฝœ๋ณด๋‹ค ์ตœ๋Œ€ 2.58๋ฐฐ ๋†’์€ ์ˆ˜์œจ์ด MASTaR๋ฅผ ํ†ตํ•ด ์–ป์–ด์งˆ ์ˆ˜ ์žˆ์Œ์„ ๋ณด์ธ๋‹ค. ์š”์•ฝํ•˜๋ฉด, ๋ณธ ํ•™์œ„๋…ผ๋ฌธ์—์„œ๋Š” ACK ๋ฐ CTS ํ”„๋ ˆ์ž„์˜ ์†ก์‹  ์ „๋ ฅ ์ œ์–ด ์•Œ๊ณ ๋ฆฌ์ฆ˜๊ณผ CST ์ ์‘ ๋ฐ STR์„ ์œ„ํ•œ ํ”„๋กœํ† ์ฝœ์„ ์ œ์•ˆํ•œ๋‹ค. ์ œ์•ˆํ•œ ์•Œ๊ณ ๋ฆฌ์ฆ˜ ๋ฐ ํ”„๋กœํ† ์ฝœ์˜ ์‹คํ˜„ ๊ฐ€๋Šฅ์„ฑ๊ณผ ์„ฑ๋Šฅ์€ ์ˆ˜์น˜ ํ•ด์„, 3์ฐจ์› ๊ด‘์„  ์ถ”์ , ns-3 ๊ธฐ๋ฐ˜ ์‹œ์Šคํ…œ ์ˆ˜์ค€(system-level) ์‹œ๋ฎฌ๋ ˆ์ด์…˜, SDR ๊ธฐ๋ฐ˜ ํ”„๋กœํ† ํƒ€์ž… ๋“ฑ ๋‹ค์–‘ํ•œ ๋ฐฉ๋ฒ•๋ก ์„ ํ†ตํ•ด ์ž…์ฆํ•œ๋‹ค.With increasing demand for wireless connectivity, IEEE 802.11 wireless local area network (WLAN), a.k.a. Wi-Fi, has become ubiquitous and continues to grow in number. This leads to the high density of WLAN, where many access points (APs) and client stations (STAs) operate on the same frequency channel. In a densely deployed WLAN, greater emphasis is placed on the importance of spatial reuse as well as spectral efficiency. In other words, it is of particular importance how many simultaneous transmissions are possible in a given area. In this dissertation, we consider the following three strategies to increase the number of successful simultaneous transmissions: (i) Transmit power control for medium access control (MAC) acknowledgment (ACK) and clear-to-send (CTS) frames, (ii) carrier sense threshold (CST) adaptation, and (iii) simultaneous transmit and receive (STR), i.e., in-band full-duplex communication. First, this dissertation sheds light on the co-channel interference (CCI) caused by 802.11 MAC ACK frames, which has been less studied than the CCI caused by data frames. Based on stochastic geometry analysis, we propose Quiet ACK (QACK), a dynamic transmit power control algorithm for ACK frames. Fine-grained transmit power adjustment is enabled by CCI detection and CCI power estimation in the middle of a data frame reception. A power control algorithm for clear-to-send (CTS) frame transmission, namely Quiet CTS (QCTS) is also proposed based on QACK. Our prototype using software-defined radio shows the feasibility and performance gain of QACK, i.e., 1.5X higher throughput than the legacy 802.11 WLAN. The performance of QACK and QCTS is further evaluated in more general WLAN environments via extensive simulations using ns-3. Second, a fine-grained CST adaptation method, which controls CST depending on both interferer and destination nodes, is proposed to improve spatial reuse in WLAN. The proposed method utilizes pre-defined functions in the WLAN standard, thus making itself easily implementable in commercial WLAN devices. Supplementary clear channel assessment (CCA) method is also proposed to further enhance network performance by reducing CCA overhead. The performance of the proposed methods is comparatively evaluated via ns-3 simulation. Simulation results show that the proposed methods significantly improve network throughput compared with the legacy method. Finally, a novel MAC protocol that enables STR in 802.11 WLAN, namely MASTaR, is proposed based on standard-compliant methods. Also, a digital self-interference cancellation (SIC) strategy is proposed to support the operation of MASTaR. The feasibility and the performance of MASTaR are extensively evaluated via 3D ray tracing-based simulation. The simulation results demonstrate that significant performance enhancement,e.g., up to 2.58X higher throughput than the current 802.11 MAC protocol, can be achieved by an STR-capable access point. In summary, we propose an algorithm for ACK and CTS transmission power control and two protocols each for CST adaptation and STR which enhance the efficiency of WLAN by enriching simultaneous transmission. The feasibility and the performance of the algorithm and protocols are demonstrated via various methodologies including numerical analysis, 3D ray-tracing, ns-3 based system-level simulation, and prototype using a software-defined radio.1 Introduction 1 1.1 Motivation 1 1.2 Overview of Existing Approaches 3 1.2.1 Transmit power control for CCI reduction 3 1.2.2 CST adaptation for better spatial reuse 3 1.2.3 MAC protocol for STR in WLAN 4 1.3 Main Contributions 7 1.3.1 Quiet ACK: ACK Transmit Power Control 7 1.3.2 FACT: CST adaptation scheme 8 1.3.3 MASTaR: MAC protocol for STR in WLAN 8 1.4 Organization of the Dissertation 9 2 Quiet ACK: ACK Transmit Power Control in IEEE 802.11 WLANs 10 2.1 Introduction 10 2.2 Numerical Analysis 12 2.2.1 System Model 13 2.2.2 AISR Expansion by ACK Power Control 18 2.2.3 Optimization of ACK Outage Tolerance 19 2.3 QACK: Proposed ACK power Control 21 2.3.1 CCI Detection and CCI Power Estimation 22 2.3.2 Link Margin Estimation 26 2.3.3 ACK Power Adjustment 29 2.3.4 Conditional QACK Enabling/Disabling 30 2.4 Prototyping-Based Feasibility Evaluation 30 2.4.1 Feasibility of CCI Detection and CCI Power Estimation 30 2.4.2 Throughput Enhancement by QACK 33 2.5 Simulation-based Performance Evaluation 34 2.5.1 Two BSS Topology 35 2.5.2 Multiple BSS Environment 38 2.5.3 Coexistence with Legacy Devices 41 2.6 Quiet CTS: Proposed CTS Power Control 41 2.6.1 Problem Statement 41 2.6.2 CTS Power Control 42 2.6.3 Relationship with Quiet ACK 44 2.6.4 Simulation Results 45 2.7 Summary 48 3 FACT: Fine-Grained Adaptation of Carrier Sense Threshold in IEEE 802.11 WLANs 49 3.1 Introduction 49 3.2 Preliminaries 50 3.2.1 IEEE 802.11h Transmit Power Control (TPC) 50 3.2.2 IEEE 802.11ah Basic Service Set (BSS) Color 52 3.3 FACT: Proposed CST Adaptation Scheme 52 3.3.1 Basic Principle 53 3.3.2 Challenges and Solutions 54 3.3.3 Specification 54 3.3.4 Transmit Power Adjustment 56 3.3.5 Conditional Update of CST 57 3.4 Blind CCA and Backoff Compensation 57 3.4.1 Blind CCA 58 3.4.2 Backoff Compensation 59 3.5 Performance Evaluation 59 3.6 Summary 63 4 MASTaR: MAC Protocol for Access Points in Simultaneous Transmit and Receive Mode 64 4.1 Introduction 64 4.2 Preliminaries 68 4.2.1 Explicit Block ACK 68 4.2.2 Capture Effect 69 4.3 MASTaR: Proposed MAC Protocol 70 4.3.1 PTX Identification 70 4.3.2 Initial Training 73 4.3.3 Link Map Management 73 4.3.4 Secondary Transmission 74 4.4 Feasibility Study 76 4.4.1 Analog SIC and Channel Modeling 76 4.4.2 Digital SIC for WLAN 79 4.5 Performance Evaluation 83 4.5.1 Simulation with UDP Data Traffic 87 4.5.2 Simulation with Voice and Data Traffic 100 4.6 Summary 102 5 Concluding Remarks 103 5.1 Research Contributions 103 5.2 Future Work 104 Abstract (In Korean) 110Docto

    FDT-MAC e FDMR-MAC : protocolos de controle de acesso ao meio projetados para explorar o potencial das comunicaรงรตes full-duplex

    Get PDF
    Tese (doutorado)โ€”Universidade de Brasรญlia, Instituto de Ciรชncias Exatas, Departamento de Ciรชncia da Computaรงรฃo, 2020.A crescente demanda de vazรฃo em redes mรณveis cada vez mais densas impulsiona a pesquisa em tecnologias capaz de atendรช-la. Dentre as redes sem fio, as comunicaรงรตes full-duplex surgem como uma alternativa neste contexto. Para organizar as comunicaรงรตes de maneira eficiente quando se utiliza full-duplex, hรก diversas opรงรตes de protocolos de controle de acesso ao meio. Entretanto, muitos destes protocolos se baseiam em premissas utilizadas pelo padrรฃo IEEE 802.11, que fora projetado para comunicaรงรตes half-duplex. Assim, estes protocolos acabam por nรฃo explorar de modo apropriado o potencial das comunicaรงรตes full-duplex. Neste contexto, este trabalho propรตe duas tรฉcnicas de controle de acesso ao meio que visam obter uma maior vazรฃo do que a obtida com os protocolos existentes. Cada uma das tรฉcnicas utiliza uma abordagem diferente para obter esse aumento na vazรฃo. A primeira tรฉcnica (FDT-MAC) visa reduzir o tempo despendido em uma comunicaรงรฃo, fazendo uso de sinais pulso e tom, ao invรฉs de quadros, em sua reserva de canal. Para avaliar o FDT-MAC, foi realizada uma extensรฃo de modelos matemรกticos existentes para que eles contemplem as caracterรญsticas das comunicaรงรตes full-duplex, tais como os efeitos da auto-interferรชncia. Assim, foi realizada a comparaรงรฃo do FDT-MAC com um protocolo do estado da arte de comunicaรงรตes full-duplex (FD-MAC). O FDTMAC obteve ganhos em termos de vazรฃo de atรฉ 149% em redes saturadas, indicando sua relevรขncia. Alรฉm disso, foi proposta uma polรญtica de alocaรงรฃo de tamanho de quadros de dados em comunicaรงรตes full-duplex, visando reduzir a ociosidade da rede. Foram feitas avaliaรงรตes relacionadas ร  vazรฃo da polรญtica proposta. Quando a polรญtica รฉ incorporada ao FDT-MAC, hรก ganho de atรฉ 63% em comparaรงรฃo com o FDT-MAC sem a polรญtica incorporada. A segunda contribuiรงรฃo deste trabalho foi a proposta do FDMR-MAC, o qual emprega uma tรฉcnica inovadora de reserva de canal aliada a escalonamento de quadros de dados com o objetivo de elevar a probabilidade p de serem estabelecidas comunicaรงรตes em que os nรณs emissor e receptor possuam quadros de dados a serem transmitidos um ao outro. Dessa forma, o FDMR-MAC รฉ capaz de aumentar a vazรฃo em atรฉ 72% quando comparado com o FD-MAC. Os resultados obtidos nas avaliaรงรตes realizadas ao longo deste trabalho indicam a relevรขncia das suas contribuiรงรตes (FDT-MAC e FDMR-MAC).The growing demand for throughput in wireless mobile networks leveraged the research into technologies able to cope with it. Full-duplex communications arise as a viable alternative in this context. Several medium access control (MAC) protocols were proposed aiming to manage full-duplex communications properly. However, many of these MAC protocols are build upon the IEEE 802.11, which is designed to operate under half-duplex conditions. Therefore, these protocols may not be able to entirely exploit the full-duplex communications potential. In this context, this work proposes two MAC techniques with different approaches and a common goal: raise throughput when compared with existing MAC techniques designed for full-duplex communications. The first one (FDT-MAC) resorts to pulse and tone signals instead of frames to perform channel reservation. In order to evaluate FDT-MAC, it was necessary to extend existing mathematical models in such a way that they address full-duplex communications characteristics, as self-interference. Therefore, FDT-MAC was compared with a state of art MAC protocol (FD-MAC) designed for full-duplex communications. FDT-MAC improved throughput up to 149% under saturated network conditions. Also, it was proposed a data frame size allocation policy that aims to enhance channel usage for full-duplex communications. Evaluations of the proposed policy were performed in terms of throughput. When the proposed policy is coupled with FDT-MAC, a throughput improvement up to 63% is achieved comparing to FDT-MAC without the proposed policy. The second contribution of this work was the proposal of FDMR-MAC technique. The FDMR-MAC employs an innovative channel reservation scheme coupled with data frame scheduling to raise the probability of establishing communications in which sender and receiver nodes have data frames to send one to another. Hence, in the evaluated scenarios, FDMR-MAC was able to enhance throughput up to 72% when compared with FD-MAC. The results achieved throughout this work indicate the relevance of its main contributions (FDT-MAC and FDMR-MAC)
    corecore