Channel Allocation for Averting the Exposed Terminal Problem in a Wireless Mesh Network

Similar documents
Coordinated carrier aggregation for campus of home base stations

A new MAC protocol for reducing effect of needless transmission deferment induced by missed RTS/CTS handshake

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem

Throughput Improvement by Adjusting RTS Transmission Range for W-LAN Ad Hoc Network

IEEE s Wireless LAN Mesh Network Technology

Mohammad Hossein Manshaei 1393

Ad Hoc WLAN Throughput Improvement by Reduction of RTS Range Emilia Weyulua, Taro Iwabuchib, Misu Takeshic, Masaki Hanadad, Moo Wan Kime

Multichannel Outage-aware MAC Protocols for Wireless Networks

Implementation of an Algorithmic To Improve MCDS Based Routing In Mobile Ad-Hoc Network By Using Articulation Point

A Route Selection Scheme for Multi-Route Coding in Multihop Cellular Networks

An efficient traffic management framework for multi-channel wireless backbone networks

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm

On the Complexity of Broadcast Scheduling. Problem

Low-Energy-Consumption Ad Hoc Mesh Network Based on Intermittent Receiver-driven Transmission

A Medium Access Control Protocol with Retransmission using NACK and Directional Antennas for Broadcasting in Wireless Ad-Hoc Networks

Literature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks

Reducing the Size of Routing Tables for Large-scale Network Simulation

Admission Control in Time-Slotted Multihop Mobile Networks

WITH the evolution and popularity of wireless devices,

ON THE COMPLEXITY OF THE BROADCAST SCHEDULING PROBLEM

Standardization Trend for Super 3G (LTE)

Battery Power Management Routing Considering Participation Duration for Mobile Ad Hoc Networks

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network

Complementary Graph Coloring

Survey of the State of P2P File Sharing Applications

Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks

A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment

COMP3331/9331 XXXX Computer Networks and Applications Final Examination (SAMPLE SOLUTIONS)

A Survey on Modified RTS/CTS Mechanism

Transmission Control Protocol over Wireless LAN

Distributed Call Admission Control for Ad Hoc Networks

Performance anomaly of b

Time Slot Assignment Algorithms for Reducing Upstream Latency in IEEE j Networks

SENSOR-MAC CASE STUDY

SUMMERY, CONCLUSIONS AND FUTURE WORK

Network Routing Protocol using Genetic Algorithms

Wireless MACs: MACAW/802.11

Routing. 4. Mar INF-3190: Switching and Routing

A Study on Delay, Throughput and Traffic Measurement for Wi-Fi Connected Stations Based on MAC Sublayer

Implementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM)

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks

Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks

ECE/CSC 570 Section 001. Final test. December 11, 2006

Data and Computer Communications. Chapter 13 Wireless LANs

Multiple Access Links and Protocols

Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol

Special Articles on PREMIUM 4G Introduction of LTE Advanced

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Collision Probability in Saturated IEEE Networks

British Journal of Science 1 September 2011, Vol. 1 (1) A Study of Routing Algorithms in Wireless Mesh Networks

Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies

Fairness Enhancement Scheme for Multimedia Applications in IEEE e Wireless LANs

DISJOINT PATH ROUTING FOR MULTI-CHANNEL MULTI-INTERFACE WIRELESS MESH NETWORK

The Medium Access Control Sublayer

31.6 Powers of an element

and coverage as the nodes can act both as clients and routers. In this paper, the clients are distributed using four different

Packet Estimation with CBDS Approach to secure MANET

International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.1, January Shin-ichi Kuribayashi

(INTERFERENCE AND CONGESTION AWARE ROUTING PROTOCOL)

Ulrich Fiedler, Eduard Glatz, 9. March Executive Summary

Wireless Sensor Networks 8th Lecture

Recover-Forwarding Method in Link Failure with Pre-established Recovery Table for Wide Area Ethernet

Collisions & Virtual collisions in IEEE networks

Cluster Head Selection using Vertex Cover Algorithm

Figure.2. Hidden & Exposed node problem

An Efficient Scheduling Scheme for High Speed IEEE WLANs

Computer Communication III

Reliable Time Synchronization Protocol for Wireless Sensor Networks

A Hybrid Improvement Heuristic for the Bin Packing Problem

Subject: Adhoc Networks. Navodaya Institute of Technology, Raichur Page 1

A Localized Algorithm for Reducing the Size of Dominating Set in Mobile Ad Hoc Networks

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol

Evaluation of the backoff procedure of Homeplug MAC vs. DCF

Dual Power Management for Network Connectivity in Wireless Sensor Networks

A Rate-adaptive MAC Protocol Based on TCP Throughput for Ad Hoc Networks in fading channels

Chapter 16 Networking

Evaluation of adaptive rate control scheme for ad-hoc networks in fading environments

A QUANTITATIVE ANALYSIS OF HANDOVER TIME AT MAC LAYER FOR WIRELESS MOBILE NETWORKS

Random Assignment Protocols

A MAC Protocol based on Dynamic Time Adjusting in Wireless MIMO Networks

Maximum Traffic Scheduling and Capacity Analysis for IEEE High Data Rate MAC Protocol

Physical Carrier Sensing and Spatial Reuse in Multirate and Multihop Wireless Ad Hoc Networks

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks

Unit 7 Media Access Control (MAC)

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks

A Vector Space Equalization Scheme for a Concept-based Collaborative Information Retrieval System

Fair data flows scheduling schema for multihop wireless ad hoc networks

Data Communications. Data Link Layer Protocols Wireless LANs

Two-Tier WBAN/WLAN Healthcare Networks; Priority Considerations

Supporting Growth in Society and Industry Using Statistical Data from Mobile Terminal Networks Overview of Mobile Spatial Statistics

CSMA based Medium Access Control for Wireless Sensor Network

TMMAC: A TDMA Based Multi-Channel MAC Protocol using a Single. Radio Transceiver for Mobile Ad Hoc Networks

Lecture 6. Reminder: Homework 2, Programming Project 2 due on Thursday. Questions? Tuesday, September 13 CS 475 Networks - Lecture 6 1

The MAC layer in wireless networks

A motion planning method for mobile robot considering rotational motion in area coverage task

Direct Routing: Algorithms and Complexity

Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

Addressing Asymmetric Link in Wireless Mesh Networks

Node selection in Peer-to-Peer content sharing service in mobile cellular networks with Reduction Bandwidth

Transcription:

Channel Allocation for Averting the Exposed Terminal Problem in a Wireless Mesh Network The wireless stations in a CSMA/CA wireless LAN access system connect directly to each other to form a wireless mesh network. To avert the exposed terminal problem that arises in such networks, we researched a channel allocation scheme. This reseach was conducted jointly with Professor Masakazu Sengoku, Faculty of Engineering, Niigata University. Takatoshi Sugiyama. Introduction Networks formed by connections of wireless station peers are called ad hoc networks or wireless mesh networks. Such networks are being widely researched as a new form of network that differs from the cellular networks that have previously been used commercially. For wireless mesh networks that adopt wireless LANs, in particular, one expectation is flexible expansion of the area in which devices connected to a wireless LAN can be used. The use of those devices, such as the N9iL and other PASSAGE DUPLE terminals, has increased greatly in the last few years. Another expectation is easy construction of tentative wireless networks when disaster strikes. When the Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) wireless LAN access system is used to construct a wireless mesh network, however, the hidden terminal problem and the exposed terminal problem may arise and greatly degrade communication quality. Two approaches to the exposed terminal problem, which is highly likely to have a particularly strong effect on communication quality, are improvement of the CSMA/CA protocol and the use of multiple channels. The former approach is being widely studied, but almost no work is being directed to the latter. DoCoMo had shown the equivalence of the problem of channel allocation for preventing exposed terminals to the vertex coloring problem of graph theory * for analyzing the number of channels required for networks in which the number of wireless stations is or less []. Channel allocation increases in complexity with the number of wireless stations, so networks of more than wireless stations require a different analytical method. We therefore investigated a channel allocation method for averting the exposed terminal problem in a wireless mesh network of more than wireless stations in collaboration with Professor Masakazu Sengoku of Niigata University, who has expertise in graph theory [2][3]. In this article, we first apply an approximate analytical method that has previously been studied to the vertex coloring problem to a wireless mesh network, and describe those effects and the optimization results of that method. We then propose a method of selecting disconnect links that can reduce the effects of the exposed terminal problem while minimizing degradation of network performance when the number of channels that can be used is limited. 2. Exposed Terminal Problem in Wireless Mesh Networks 2. Hidden Terminal Problem and Exposed Terminal Problem In the Institute of Electrical and Electronics Engineers (IEEE) 82. *2 specifications, which are widely used in wireless LANs, the wireless stations detect each other by the carrier transmitted by each based on the CSMA/CA scheme to implement station multiple access control. The control is explained briefly below. * Graph theory: A theory used extensively in research on networks and algorithm. A field that studies the various properties of graphs that comprise nodes and edges (connections between nodes). *2 IEEE 82.: An international standard specification for wireless LAN defined by the IEEE organization in the United States. 54

NTT DoCoMo Technical Journal Vol. 8 No.4 2 3 Data Data (a) Hidden terminal problem 2 3 CTS CTS (b) Averting the hidden terminal problem with /CTS frames 2 3 4 CTS CTS (c) Exposed terminal problem Frame sent to the receiving station Frame arriving at a station other than the receiving station Figure Hidden terminal problem and exposed terminal problem When the packets to be transmitted by a wireless station have been generated and no carrier is detected, transmission begins immediately; if a carrier is detected, however, the wireless station stands by until no carrier is detected and then begins transmission after a randomly generated standby time passes. However, if the carrier is detected during the standby time, the standby time is not measured and nothing is transmitted until the carrier is again not detected. This CSMA/CA scheme assumes that wireless stations can detect the carriers of other wireless stations that are in the same area. If three wireless stations are arranged along a line such that the stations at the two ends (wireless station and 3 in Figure (a)) cannot detect each other s carrier, packet collision will occur at wireless station 2 in the middle. Because wireless station and wireless station 3 are hidden from each other, this situation is referred to as the hidden terminal problem. To reduce packet collision due to hidden terminals, IEEE 82. specifies a method in which Request To Send () and Clear To Send (CTS) frames are exchanged between the sending and receiving stations before data packets are transmitted, as shown in Fig. (b). While wireless station is sending data packets to wireless station 2, wireless station 3 can recognize the transmission status of wireless station because wireless station 3 can receive the CTS from the intermediate wireless station 2, thus preventing packet collision. If more wireless stations are added, a different problem arises, as shown in Fig. (c). With four wireless stations arranged in a line, each wireless station can detect only the carriers of the adjacent wireless stations. When wireless station sends packet to wireless station 2, the /CTS frame exchange at the time of data packet transmission allows wireless station 3 to receive the CTS frame from wireless station 2 and enter the standby state until the communication between wireless stations and 2 is finished. If wireless station 4 begins to send data to wireless station 3 while wireless station 3 is in this standby state, wireless station 3 will not be able to respond, so wireless station 4 will send the same packet repeatedly and those packets will be discarded. This is called the exposed terminal problem. It causes severe problems such as reduced TCP throughput. 2.2 Averting the Exposed Terminal Problem by Channel Allocation The exposed terminal problem described in the previous section results in lost packets when packet transmission takes place over two wireless links (one between wireless stations and 2 and one between wireless stations 3 and 4 in Fig. (c)) at the same time. The exposed terminal problem can be averted if, for example, channels of different frequencies are assigned to those two wireless links. In a network that has a simple configuration as in this example, a channel allocation pattern that averts the exposed terminal problem is easily discovered, but as the network configuration becomes more complex, the channel allocation pattern also becomes more complex. We have shown that the channel allocation problem for preventing exposed terminals in a wireless mesh network is equivalent to the coloring problem in graph theory[]. If we take the links in a wireless mesh network (Figure 2(a)) as the nodes of a graph, and connect the links (graph nodes) for which simultaneous communication causes an exposed terminal to generate a graph (Fig. 2(b)), the problem is changed into the vertex coloring problem, in which adjacent nodes are given different colors. Such a graph is therefore called a colored graph. Generally, the vertex coloring problem is regarded as an Non-deterministic Polynomial (NP) complete problem, a prob- 55

L,2 L 5,6 2 5 L 3,5 L 4,5 L 2,3 L 2,4 (a) Example of a wireless mesh network L,2 L 3,4 L 5,6 (b) Derived colored graph 3 4 L 3,5 L 3,4 L 4,5 L 2,3 L 2,4 6 Number of channels required 9 8 7 6 5 LF SL DS RLF 4 IG 3 IG2 2 5 5 Figure 2 Colored graph for a wireless mesh network Figure 3 Number of channels required for the coloring algorithm lem for which the optimum combination cannot be immediately derived, and there is no algorithm for efficiently discovering the least number of colors to achieve coloring. For that reason, much research is being done on approximation algorithms for solution of the vertex coloring problem. In the work reported here, we apply four algorithms of the previously proposed fixed-order, one-time coloring type[4], and one of the varied-order iterated coloring type to a wireless mesh network to verify the effects of those algorithms. 3. Approximation Algorithms for the Coloring Problem The approximation algorithms verified in this work are listed below. ) Largest First (LF) Coloring begins with the highest-degree *3 graph node and proceeds in order of descending node degree. When multiple nodes have the same degree, one is selected by an arbitrary process. 2) Smallest Last (SL) Nodes are removed in order of the lowest node degree, and when a node is removed, coloring is done in the reverse order. When multiple nodes have the same degree, one is selected by an arbitrary process. 3) DSatur (DS) Coloring is done in order of highest wireless station saturation. Saturation is the number of colors used by adjacent nodes. A high-degree node is taken as the initial node. When there are nodes of equal saturation, the node of highest degree among them is selected. When multiple nodes have the same degree, one is selected by an arbitrary process. 4) Recursive Largest First (RLF) Nodes that can be given the same color are selected in order of highest node degree. The initial node is selected in the same way as for the LF algorithm, but the next node is selected from among the nodes that are not adjacent to the initial node. 5) Iterated Greedy (IG) Once the graph is colored, the order is changed group by group (set of nodes that have the same color) and the coloring is iteratively revised. We performed many verifications for the combinations introduced in reference [5], and did detailed studies with the two low-color-count methods listed below. a) IG Coloring is performed 5 times in order of high-node-count Coloring is performed 2 times in order of low-node-count Coloring is performed in random group order with a probability of.. b) IG 2 Coloring is performed 5 times in order of high-node-count Coloring is performed 2 times with the group order reversed. Coloring is performed in random group order with a probability of.. The results for a 3-wireless station network are shown in Figure 3. The horizontal axis in that figure represents the com- *3 Degree: A term from graph theory that refers to the number of edges that connect to one node. 56

NTT DoCoMo Technical Journal Vol. 8 No.4 munication distance of each wireless station, the vertical axis shows the average number of colors required for the colored graph derived from the network (i.e., the number of channels required). From Fig. 3, we can see that of the 5 algorithms that we used, the IG algorithm results in the lowest number of required channels. We can also see that the number of channels required is greatest when the communication distance is near 5 m. The reason for this is that when the communication distance is small, network concatenation *4 is difficult and the number of links is small, so the scale of the colored graph is also small; and when the communication distance is large, the network becomes concatenated and the number of links and the interference both increase, so the number of channels required is also considered to increase. Conversely, when the communication distance becomes too large, the entire network approaches a complete graph *5, the carrier reaches all wireless stations, interference drops to zero and communication is possible with a single channel. 4. Disconnect link selection method for limited channels If the number of channels that can be used is limited, all of the channels required for preventing exposed terminals are not necessarily allocated. In the present work, denoting the number of channels required as N and the number of channels given as M, the method described below was used to disable some of the links and, by doing so, ameliorate the exposed terminal problem. The color (channel) numbers are represented as to M. For Interference rate Concatenation rate.8.6.98.4 Case.96 Case2 Case3.2.94 Case4 3 4 5 6 7 Case5 5 5.35.3.25.2.5..5 Figure 4 Network concatenation rate Case Case2 Case3 Case4 Case5 5 5 Figure 5 Interference rate Case : Do not disable links. Case 2: Disable links of ave sd (product of the mean and standard deviation) or less. Case 3: Disable links of ave or less. Case 4: Disable links of ave + sd (sum of the mean and standard deviation) or less. Case 5: Disable all links. N > M, the set of wireless links colored with N colors beginning from M + is denoted as V. To the wireless links of V are allocated the color from to M that have low interference. Then, we denote the average edge betweenness of the V wireless links as ave and the standard deviation as sd. Assuming the shortest path will be selected in path control, the edge betweenness is synonymous with the frequency of use of each wireless link when communication between any two nodes is the same. V wireless links are disabled according to the five cases listed below, according to the edge betweenness. We evaluated the above five methods by simulation. Assuming a m area in which 3 wireless stations are randomly distributed, networks were constructed with various communication distances. The results for the concatenation rate (the proportion of network concatenation in each trial) and the interference rate for a network in which the given number of channels is four, averaged over, trials, are shown in Figure 4 and Figure 5. We can see that disabling wireless links according to the selection criteria of Case 3 decreases the *4 Concatenation: A term from graph theory that refers to the state in which a path exists between any two nodes. In this article, it refers to a single mesh network in which there are no isolated nodes. *5 Complete graph: A term from graph theory that refers to a graph whose every node is connected to every other node. 57

interference rate without decreasing the concatenation rate so much. That is to say, using the edge betweenness can suppress interference while maintaining network concatenation. 5. Conclusion We investigated channel allocation methods that adopt colored graphs from graph theory to prevent the exposed terminal problem, which degrades communication quality in a wireless mesh network. By applying conventional coloring algorithms to wireless mesh networks, we have shown that a channel allocation method based on an iterative coloring improvement algorithm can keep the required number of channels small. We also researched a method for selecting links for disconnection that can suppress the occurrence of the exposed terminal problem without decreasing network concatenation when the number of channels that can be used is limited. B, No. 3, pp. 958-964, 25. [2] K. Ishii, K. Nakano, M. Sengoku and A. Fujiwara: A Consideration on Channel Assignment and Topology Control Using Betweenness in Mesh Networks, Proceedings of the 26 IEICE Society Conference, B-2-, p.379, Sep. 26. [3] O. Hashimoto, K. Nakano, K. Ishii, M. Sengoku and A. Fujiwara: A Consideration on Channel Assignment Considering the Exposed Terminal Problem in Wireless Mesh Networks, Technical Report of Japan Society for Simulation Technology, JSST-MM25-3, pp.3-8, Nov. 25. [4] P. M. Pardalos, T. Mavridou and J. Xue: The graph coloring problem: A bibliographic survey, in Handbook of Combinatorial Optimization, D.-Z. Du and P. M. Pardalos (Eds.), Vol. 2, pp. 33-395, 999. [5] J. C. Culberson: Iterated Greedy Graph Coloring and the Difficulty Landscape, Technical Report TR 92-7, University of Alberta Dept of Computer Science, Edmonton, Alberta Canada T6G2H, 992. References [] A. Fujiwara and Y. Matsumoto: Centralized Channel Allocation Technique to Alleviate Exposed Terminal Problem in CSMA/CA-Based Mesh Networks, IEICE TRANSACTIONS on Communications, Vol. E88-58