Towards Concurrent Communication in Wireless Networks
نویسندگان
چکیده
Avoiding collisions is one of the key roles of mediaaccess (MAC) protocols. Since MACAW and 802.11, carrier sense and exchange of request-to-send (RTS) and clearto-send (CTS) packets have been used to prevent concurrent communication in wireless networks. Yet these approaches have significant cost: they prevent all concurrent communication, even exchanges that might not result in loss; they reduce end-to-end throughput in a multi-hop network; and control traffic imposes control overhead on networks with small data payloads such as 802.15.4. In this paper, we show that RTS/CTS is almost never desirable in modern wireless networks that support power control and channel capture. We use four-node experiments with 802.15.4 radios to show that concurrent communication is often possible, depending on node locations and transmit powers. We validate an SINRbased propagation model against these experiments and use simulation to systematically explore how node location affects the ability to communicate. Given optimal power settings, when two sources are outside some minimal distance, they can communicate concurrently with two receivers more than 80% of the time. An optimal algorithm requires perfect knowledge of the channel and transmission state, so we then sketch Gain-Adaptive Power Control, a MAC protocol that provides significant benefit with only local and prior information. Compared to optimal, we show that this practical MAC can transmit concurrently 75% of the time, but requires a larger minimum source separation. We also show that least one sender can capture the channel 77–88% of the time, regardless of source and receiver location, so the cost of failed concurrent communication is only slightly worse than RTS/CTS. These results provide compelling evidence that future MAC protocols should exploit power control and channel capture.
منابع مشابه
IMNTV-Identifying Malicious Nodes using Trust Value in Wireless Sensor Networks
Security is the major area of concern in communication channel. Security is very crucial in wireless sensor networks which are deployed in remote environments. Adversary can disrupt the communication within multi hop sensor networks by launching the attack. The common attacks which disrupt the communication of nodes are packet dropping, packet modification, packet fake routing, badmouthing atta...
متن کاملMLCA: A Multi-Level Clustering Algorithm for Routing in Wireless Sensor Networks
Energy constraint is the biggest challenge in wireless sensor networks because the power supply of each sensor node is a battery that is not rechargeable or replaceable due to the applications of these networks. One of the successful methods for saving energy in these networks is clustering. It has caused that cluster-based routing algorithms are successful routing algorithm for these networks....
متن کاملQuasi Random Deployment Strategy for Reliable Communication Backbones in Wireless Sensor Networks
Topology construction and topology maintenance are significant sub-problems of topology control. Spanning tree based algorithms for topology control are basically transmission range based type construction algorithms. The construction of an effective backbone, however, is indirectly related to the placement of nodes. Also, the dependence of network reliability on the communication path undertak...
متن کاملVehicular Networks: A Survey on Architecture, Communication Technologies and Applications
The Intelligent Transportation System (ITS) provides wireless and mobile communication between vehicles and infrastructure to improve the safety of transportation and make the journey more enjoyable. This system consists of many fixed and mobile nodes (Vehicles, Trains, Vessels, Air planes), Wireless and Wired Telecommunication Technologies to exchange information between mobile nodes or betwee...
متن کاملAn Adaptive LEACH-based Clustering Algorithm for Wireless Sensor Networks
LEACH is the most popular clastering algorithm in Wireless Sensor Networks (WSNs). However, it has two main drawbacks, including random selection of cluster heads, and direct communication of cluster heads with the sink. This paper aims to introduce a new centralized cluster-based routing protocol named LEACH-AEC (LEACH with Adaptive Energy Consumption), which guarantees to generate balanced cl...
متن کاملTarget Tracking with Unknown Maneuvers Using Adaptive Parameter Estimation in Wireless Sensor Networks
Abstract- Tracking a target which is sensed by a collection of randomly deployed, limited-capacity, and short-ranged sensors is a tricky problem and, yet applicable to the empirical world. In this paper, this challenge has been addressed a by introducing a nested algorithm to track a maneuvering target entering the sensor field. In the proposed nested algorithm, different modules are to fulfill...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007