SciELO - Scientific Electronic Library Online

 
vol.16 número3A Supervised Classification Approach for Detecting Packets Originated in a HTTP-based Botnet índice de autoresíndice de materiabúsqueda de artículos
Home Pagelista alfabética de revistas  

Servicios Personalizados

Revista

Articulo

Links relacionados

Compartir


CLEI Electronic Journal

versión On-line ISSN 0717-5000

CLEIej vol.16 no.3 Montevideo dic. 2013

 

Directional Pulse/Tone Based Channel Reservation with Deafness Avoidance
Lucas de M. Guimarães
University of Brasilia, Department of Computer Science,
Brasilia, Brazil, 70910-900
lucasmg@cic.unb.br
Jacir L. Bordim
University of Brasilia, Department of Computer Science,
Brasilia, Brazil, 70910-900
bordim@unb.br

Abstract

The use of directional antennas in support of ad hoc networks has been considered a promising alternative to improve spatial division multiple access and throughput. In general, directional Medium Access Control (MAC) protocols are based on IEEE 802.11 standard, which was designed for omnidirectional communication. When applied to directional communication, the standard imposes a number of constraints to the directional MAC protocol. In order to harvest the benefits of directional communications, MAC protocols tailored for directional antennas have to be devised. In particular, MAC protocols that are able to deal with deafness and channel reservation latency are highly desirable. This work proposes a technique that enables channel reservation and mitigates deafness using pulse/tone signals in the context of directional communications. At its heart, the proposed technique incorporates a deafness predictions scheme that helps nodes to overcome its effects. Analytical results show that the proposed technique is able to improve throughput up to 40% when compared to other prominent directional MAC protocols. Simulation results show that the proposed scheme improves fairness and throughput up to 350% and 76%, respectively.

Portuguese abstract:
O uso de antenas direcionais em redes ad hoc tem sido considerado uma proeminente alternativa para prover melhorias ao reuso do espaço aéreo e à vazão. Em geral, os protocolos MAC direcionais se baseiam no padrão IEEE 802.11 que por sua vez foi projetado à luz de comunicações omnidirecionais. Quando aplicado às comunicações direcionais, o padrão impõe uma série de limitações aos protocolos MAC direcionais. Para melhor aproveitar os benefícios das comunicações direcionais, faz-se necessário o desenvolvimento de protocolos projetados levando em consideração as características das antenas direcionais. Em particular, é desejável que estes protocolos MAC sejam capazes de amenizar o problema de surdez de antenas, bem como a latência imposta pela reserva de canal. Este trabalho propõe uma técnica que possibilita a reserva de canal por meio de sinais pulse/tone, atenuando ainda os efeitos do problema de surdez de antenas. A técnica proposta incorpora um mecanismo de predição de surdez que auxilia os nós a superar os efeitos do problema. Os resultados teóricos mostram que a técnica proposta é capaz de prover ganho de até 40

Keywords: Distributed Systems and Networks, Directional Communications, Channel Reservation, Deafness Problem, Receiver-initiated Communications, Pulse/Tone.
Portuguese keywords: Redes e Sistemas Distribuídos, Comunicações Direcionais, Reserva de Canal, Problema de Surdez de Antenas, Comunicações iniciadas pelo receptor, Pulso/Tom

Received: 2013-03-01, Revised: 2013-11-05 Accepted: 2013-11-05

1 Introduction

Nodes in a wireless network usually share a common, unlicensed, communicating channel. Such channels are generally borrowed from the ISM (Industrial, Scientific, and Medical) bands, which are free for non-commercial use. The IEEE 802.11 standard is perhaps the most successful example [ 1]. The IEEE 802.11 describes the operations of the data link, Medium Access Control sublayer (MAC), and physical layers of a wireless local area network. The channel reservation mechanism employed by the IEEE 802.11 MAC sublayer has been the focus of several studies [ 2] [ 3]. The main task of a MAC protocol is to allow multiple nodes to communicate in an efficient way [ 4]. According to [ 5], the efficiency of a MAC protocol can be characterized as being proportional to the amount of successful transmissions. Traditionally, studies related to wireless networks assume that the devices are empowered with omnidirectional antennas [ 6]. To avoid DATA frame collisions, and hence improve throughput, most medium access control mechanism performs channel reservation based on control frames, such as RTS/CTS (Request to Send/Clear to Send) frames [ 1]. Despite its benefits, channel reservation based on control frames also imposes severe constraints in terms of spatial reuse, once the nodes overhearing these frames are not allowed to communicate. These constraints have a direct impact on network throughput and delay [ 2] [ 3]. In order to improve network performance, alternatives such as packet aggregation schemes have been explored [ 7]. Another possibility to improve spatial division is to equip mobile devices with a directional antenna [ 8]. A directional antenna has the ability to direct its beam towards the intended source/destination. The direction is selected such that the signal strength is maximized [ 5]. Some of the main advantages of directional antennas use are interference reduction; higher transmission range; better signal quality; and improvement on spatial reuse. In order to better profit these advantages, directional MAC protocols should be able to explore these features in a positive way.

As described by references [ 9] [ 10] [ 11] [ 12], the development of an efficient directional MAC protocol is not trivial due to directional hidden and directional exposed terminal problems. On top of that, directional communications also suffer from “deafness” problem [ 11]. As the directional antennas are typically half-duplex, when a node points its antenna direction towards a particular sector/direction, the signals arriving from other sectors/directions are not captured. It is important to state that both deafness and directional hidden terminal problem have no solution for a model that considers single radio and single channel [ 13]. More precisely, the deafness problem may cause several packet losses which impacts on network delay and throughput [ 14]. In some specific cases, the deafness problem may lead even to deadlock situations [ 15].

In this context, this work proposes a deafness mitigation technique that explores the use of pulse/tone signals in replacement to the RTS/CTS frames of the IEEE 802.11. Pulse and tone signals can be sent and received in a fraction of the time spent with RTS/CTS control frames. For this reason, pulse and tone signals have been explored in the literature in different contexts, such as channel reservation and to avoid control frame collisions [ 14] [ 16] [ 17]. The proposed scheme, termed Directional Pulse/Tone Based Channel Reservation With Deafness Avoidance (DPTCR-DA), presents a novel channel reservation and deafness avoidance scheme. At its core, the DPTCR-DA is able to efficiently employ pulse and tone signals to replace the expensive RTS/CTS frames for channel reservation purposes. Using pulse and tone signals, a receiver initiated scheme is devised to reduce the deafness impact on directional communications. Analytical results show that the proposed technique is able to improve throughput up to 40% when compared to other prominent directional MAC protocols. Aiming to evaluate the proposed technique, it was held several simulations on the EXata Simulator [ 18]. These simulations results have shown that the DPTCR-DA is able to improve throughput and fairness while reducing jitter effects. More precisely, the DPTCR-DA improved fairness and throughput up to 350% and 76% respectively, as compared with similar strategies.

The rest of this document is organized as follows: Section 2 presents IEEE 802.11 standard characteristics which are closely related to the scope of this work. This section also presents a review of directional communications, deafness problem and existing directional MAC protocols. Section 3 describes the proposed deafness alleviation technique along with an example of its operation. Section 4 presents the evaluated scenarios, simulation environment, theoretical and empirical results. Finally, Section 5 presents the conclusions of this work and points some directions for further investigations.

2 Preliminaries

This section presents the IEEE 802.11 standard [ 1], as well as motivation, advantages and problems of the use of directional communications. Also, it presents an explanation of the deafness problem and related works in what concerns to directional MAC protocols.

2.1 IEEE 802.11 standard

The building blocks provided by the IEEE 802.11 [ 1] standard has been used in many directional MAC mechanisms, such as [ 9] [ 19] [ 20]. In this section, we review some key elements of the IEEE 802.11 standard that are closely related to this work. These elements are the following:

  • Channel Reservation;
  • Virtual Carrier Sensing;
  • Backoff.

2.1.1 Channel Reservation

In the IEEE 802.11, channel reservation based on RTS/CTS frames is optional and aims to minimize losses due to data packets collisions. This technique consists of an attempt to reserve the channel before sending DATA frames in order to avoid collisions. Control frames include, among other information, the source and duration of the intended communication. Neighboring nodes overhearing the RTS and/or the CTS, postpone their transmission until the “duration” (this refers to the value of the duration field contained in a received RTS/CTS frame) time is elapsed. Consider the network topology shown in Figure 1. Suppose that nodes A and B wish to communicate. Then, as shown in Figure 1, DATA and ACK frames follow the successful exchange of RTS and CTS frames. The use of RTS/CTS, DATA/ACK frames is commonly termed as 4-way handshake.

The use of RTS/CTS in directional communication has been first considered in [ 9] [ 19]. In directional environments, these control frames can be sent either in directional or in omnidirectional mode, depending on the neighboring information available [ 21]. When using only directional communications, directional RTS (DRTS) and directional CTS (DCTS), directional hidden terminal and deafness problems may arise, which have no solution for a model that considers single radio and single channel [ 13].



Figure 1: Channel reservation and virtual carrier sensing: a) topology; b) Frames Diagram


However, a successful DRTS/DCTS (or RTS/CTS) exchange minimizes data frame collisions. Nevertheless, control frame collision can still occur. The RCA protocol [ 16] uses pulse/tone signals to avoid control frame collisions. As RTS/CTS frames have a considerable impact on network throughput, the RCA uses a 6-way handshake (pulse-tone-RTS-CTS-DATA-ACK) in order to decrease the amount of control frame collisions [ 16]. A directional version of RCA was proposed in [ 20]. On the other hand, this proposal further increases network latency. In [ 22], we proposed a technique to reduce latency by using pulse/tone signals instead of RTS/CTS frames. The benefit of the proposed scheme is that it maintains RTS/CTS features, since it also minimizes data frame collisions. This paper proposes an extension of our previous work, which explores pulse/tone signals to mitigate the deafness problem.

2.1.2 Virtual Carrier Sensing

The IEEE 802.11 allows a host to verify the status of medium in two different ways: physical or virtual carrier-sense. When the channel state is sensed busy by either mechanism, the channel is considered busy and, otherwise, idle. Physical carrier sensing is a costly operation in terms of power consumption [ 23]. Also, physical carrier sensing may not provide information regarding the amount of time an ongoing communication will last. As explained above, the RTS/CTS have information about the duration time of the communication. Thus, a neighboring node overhearing an RTS/CTS frame sets the channel as busy for the duration contained in the control frames, as node C does in Figure 1. This feature is implemented via the Network Allocation Vector (NAV). The NAV has a counter that represents the remaining time of the current communication. When the NAV is not set, the physical carrier sense is then used to ensure that the channel is idle.

The use of directional virtual carrier sensing (DVCS) was proposed by [ 19]. For this, DVCS as well as DMAC (Directional MAC Protocol) [ 9] uses DNAV structure which is a directional version of NAV. The main difference between DVCS and DMAC is that the first one is able to operate with both directional and omnidirectional antennas. A number of directional MAC protocols in the literature use the DVCS and inherit some of the IEEE 802.11 standard characteristics [ 6].

2.1.3 Backoff

As IEEE 802.11 standard uses CSMA/CA MAC protocol, it inherits its exponential backoff [ 1]. Exponential backoff aims to minimize frame collision probability by forcing every node to choose a number (b  ) in the range [0, CW  ], where CW denotes contention window. After b  idle slots (a slot is considered to last 20 μs   [ 1]), the node is able to engage in communication. If this packet collides, the CW (contention window) is doubled in a way that a further collision has a lower probability to occur since the chosen number will be now in the range [0, 2⋅CW  ]. The next subsection presents the motivations, advantages and problems of directional communications.

2.2 Directional Communications

Owing to its beamforming capability of concentrating energy towards a given sector, a directional antenna presents several advantages over omnidirectional counterparts, particularly in terms of spatial reuse [ 5] [ 6] [ 9]. This feature minimizes interferences and allows for increasing transmission range. In this work, it is considered the use of switched beam antenna (Figure 2) with characteristics similar to those described in [ 21]. A switched beam antenna consists of dividing the antenna in n  sectors, where each one covers an angle equal to 360∕n∘ . Switched beam antennas are expected to be produced at a much lower cost, while being able to provide most of the benefits of a more sophisticated system [ 11]. Hence, switched beam antennas seems to be a feasible option as a first generation technology to be used in ad hoc networks. It is important to state that switched beam antennas use is assumed in a number of related works [ 5] [ 6] [ 9] [ 20]. Although the technique proposed in this work is able to operate with other antenna types, it was assumed the use of switched beam antennas due to the aforementioned reasons. In particular, it is assumed that the receiver, empowered with a directional antenna, is capable of estimating the angle of arrival (AOA) and received signal strength (RSSI) of an incoming signal. Also, a directional antenna is able to operate either in omnidirectional or in directional mode. This work assumes that directional and omnidirectional beam have the same transmission range, which can be accomplished by reducing the transmission power when operating in directional mode [ 5].



Figure 2: Switched beam antenna


As mentioned in Section 1, the utilization of directional antennas also imposes some limitations to the network, as the well known deafness problem. Such limitations will be discussed in the next subsection.

2.2.1 Deafness Problem

In general, a directional antenna is usually considered to be half-duplex. As described in [ 15], a node that uses a directional antenna is considered “deaf” in all other directions except the one it is beamformed. This problem was identified by [ 9].



Figure 3: Scenario where deafness occurs


Consider the scenario illustrated in Figure 3, where all transmissions occur in directional mode. In the figure, node X  wants to communicate with node S  . However, node S  is beamforming towards D  because of an ongoing communication. Thus, node S  is “deaf” to X  in this moment. In this case, it is said that the node X  and the flow X  → S  are suffering from deafness. The presented situation causes a diminishment of throughput and an increase of the transmission time for each packet that X  tries to transmit to S  . When deafness problem occurs frequently for the same node, this situation is called persistent deafness [ 24].

Deafness problem has a direct impact on the network performance, leading to higher delay time, unfair assignment of network resources, increase of backoff window and even specific situations of deadlock [ 14] [ 15]. So, the need of mitigating the consequences of deafness problem has become paramount. Indeed, some of existing directional MAC protocols developed mechanisms which aim to perform this task. In what follows we review some directional MAC protocols and techniques which are closely related to this work.

2.3 Existing Directional MAC protocols

One of the earliest and important technique related to directional communications is the DVCS (Directional Virtual Carrier Sensing – 2002) [ 19]. This technique of carrier sensing evokes a directional version of NAV (DNAV). DVCS also supports interoperability between devices that operate with omnidirectional and directional antennas. It is important to state that DVCS is a technique instead of a protocol. In this sense, the DVCS can be coupled to different MAC protocols. When DVCS was proposed [ 19], it was coupled to the IEEE 802.11. In this work we consider that the DVCS is coupled to IEEE 802.11 standard. In the meantime, DMAC (Directional MAC protocol – 2002) [ 9] arose. This protocol proposed that the frames RTS/CTS, DATA/ACK should be sent only in directional mode, which makes the DMAC to suffer from deafness problem. In order to mitigate the latency introduced due to deafness, ToneDMAC (Tone Directional MAC – 2005) [ 14] resorted to the use of pulse/tone signals (sent in omnidirectional mode) in a control channel. However, this protocol did not address fairness. In turn, RI-DMAC (Receiver Initiated Directional MAC – 2006) [ 24] proposed the use of receiver initiated communications with the frame RTR coupled to a deafness prediction mechanism, which is based on next packet information. Although RI-DMAC achieves fairness improvements in certain conditions, it also fails when the packets being sent are not in sequence. In other words, RI-DMAC is not able to improve fairness in scenarios where alternate flows originate from a node having its backoff window growing due to deafness.

The CW-DMAC (Control Window Directional MAC – 2010) [ 13] proposes the use of RTS/CTS frames in omnidirectional mode, including in these frames information about the sector that will be used for that communication. This protocol does not address fairness, but it reduces the unnecessary backoff window increase due to deafness. The DC-DMAC (Dual Channel Directional MAC – 2010) [ 11] also proposed the use of RTS/CTS in omnidirectional mode (in a control channel). This protocol relies on a geometric concept based on the antenna range to identify deafness occurrence in many cases. In this way, DC-DMAC is able to reduce the losses caused by deafness. However, this protocol does not provide a fair assignment of network resources. The DVCS-DA (Directional Virtual Carrier Sensing with Deafness Avoidance – 2012) [ 25] resorts to receiver initiated communications with the RTR frame combined to a traffic flow oriented deafness prediction mechanism. Unlike RI-DMAC, the DVCS-DA is able to provide fair use of the network resources, even in cases where the next packet information fails. Table 1 shows a summary of what was discussed above.

This paper proposes a deafness mitigation technique, termed Directional Pulse/Tone Based Channel Reservation with Deafness Avoidance (DPTCR-DA). The DPTCR-DA uses receiver initiated communications with tone signal coupled to a deafness prediction mechanism. Also, DPTCR-DA evokes the use of pulse/tone signals in an innovative way to perform channel reservation in both operation modes (sender initiated and receiver initiated), thus reducing network latency.


Table 1: Summary of directional MAC protocols

--------------------------------------------------------  Protocol/        Control    RTS/CTS         Another -Technique--------Channel------Mode--------frames/signals-- -DVCS--[19]---------No-------Directional---------No------- -DMAC---[9]---------No-------Directional---------No------- -ToneDMAC---[14]----Yes------Directional--------Tone------ -RI-DMAC--[24]-----No-------Directional--------RTR------- -CW--DMAC--[13]----No-----Omnidirectional-------No------- -DC--DMAC---[11]-----Yes----Omnidirectional-------No------- -DVCS--DA-[25]-----No-------Directional--------RTR------- -DPTCR----DA-------No------Directional----Pulse/Tone----

3 DPTCR-DA: Directional Pulse/Tone Based Channel Reservation with Deafness Avoidance

This section presents the details of the proposed deafness mitigation technique, named Directional Pulse/Tone Based Channel Reservation with Deafness Avoidance (DPTCR-DA). The DPTCR-DA relies on a channel reservation scheme based on pulse/tone signals instead of RTS/CTS frames. This channel reservation scheme is an extension of our previous work [ 22] and allows for significant throughput improvement as pulse/tone signals are much shorter than RTS/CTS frames. The channel reservation technique proposed has a negligible probability of failure when the antenna model is able to measure the angle of arrival (AOA) and the received signal strength indicator (RSSI) under reasonable accuracy [ 22].

Furthermore, DPTCR-DA uses a deafness prediction mechanism to decide whether a node will try to begin a receiver initiated communication using a tone signal. The referred mechanism is based on local traffic flow information, in a similar way to the used by DVCS-DA [ 25]. Pulse/tone signal based channel reservation, and the deafness prediction mechanism will be presented next.

3.1 Channel Reservation Using Pulse/Tone Signals

The use of pulse/tone signals in omnidirectional mode has been considered in [ 14] [ 17] to avoid hidden terminal problems in omnidirectional communications. Besides, pulse/tone signals have been explored in the context of directional antennas [ 20]. For this kind of environment, pulse/tone signals can be used in order to reduce the overhead introduced by RTS/CTS control frames. Precisely, the proposed scheme uses pulse and tone signals instead of RTS/CTS frames. It is assumed that pulse and tone signals are transmitted in-band using a single channel and single radio model. Also, it is assumed that pulse and tone signals can be transmitted and detected in less than 5μs  , as in [ 16] [ 20].

Recall that RTS/CTS frames allow the receiver to identify if the incoming frame is destined for it or not. The main challenge when using pulse and tone signals is to provide means to identify the transmitter/receiver, as well as to estimate the duration of the communication, in order to update DNAV properly. As pulse/tone signals carry no information, ways to identify the transmitter, receiver and duration of the communication need to be devised. Means to deal with the above challenges are presented in the subsequent sections.


Table 2: Notations used in this work

--------------------------------------------------------------------------------  R(a,b)   RSSI level at node a of the signal originated from node b.  A(a,b)   AOA  at node a of the sig∘nal originated from node b.  ϵ        AOA  measure precision ().  τ        RSSI measure precision (dB ).  Pf       Prediction error probability.  G        Graph which represents the network topology.  Δ (G )    Maximum  degree of graph G. Considered to be equal to 10.  TM T     Theoretical Maximum  Throughput (Mbps ).  TM Tri   Theoretical Maximum  Throughput for receiver initiated communications (Mbps).  TRTS     RTS/DRTS   transmission time (μs).  TCTS     CTS/DCTS   transmission time (μs).  TDAT A   Data packet transmission time (μs).  TACK     ACK  transmission time (μs).  TBo      Expected backoff time (μs).  TDIFS    DCF  Interframe Space time of IEEE 802.11b standard (μs).  TSIFS    Short Interframe Space time of IEEE 802.11b standard (μs).  TRTR     RTR  transmission time (μs).  Psz      Payload size of data packet (bytes).  CWMin    Minimum  backoff window size.  Tslot     Time slot size.  Rc       Channel transmission rate (Mbps).  TPulse    Pulse transmission time (μs).  TTone    Tone transmission time  (μs).  TTone-ri  Tone transmission time, for tones used in receiver initiated communications (μs). -Tsync----Pulse/Tone-transmission/detection-time--(assumed-to be-at most-5μs).--------

3.1.1 Pulse/Tone Based Channel Reservation: An Example

Channel reservation using pulse/tone signals is similar to the IEEE 802.11 standard coupled with DVCS [ 19]. Therefore, channel reservation using pulse/tone signals also uses a 4-way handshake as the example illustrated in Figure 3. In this example, it is assumed that node S  has a DATA frame to send to node D  . Following the IEEE 802.11, the transmitting node S  waits its backoff time and then tries to initiate a communication by sending a pulse signal in directional mode to D  . Assume that node D  is able to identify the source node and the duration of the intended communication from the received pulse. Then, node D  checks if it is able to send the tone back to S  , that is, if the direction toward S  is available. Using a similar approach, node D  replies with a tone signal in directional mode to S  . After a successful exchange of pulse/tone signals, DATA/ACK frames are exchanged. Clearly, for the above scenario to work properly, ways to estimate the source and destination node, as well as to predict the communication duration are needed. In what follows, we discuss how such information can be obtained from the pulse/tone exchange.

3.1.2 Estimation of Duration, Source and Destination from a Pulse/Tone

The mechanism which predicts the signal source, destination and duration constitutes an important piece of channel reservation using pulse/tone signals technique, since it allows to perform the channel reservation relying on physic layer signals instead of MAC layer frames. In ad hoc settings, each node needs to acquire knowledge about its vicinity [ 6]. To accomplish this, broadcast messages are issued at regular intervals. Therefore, it is not hard for each node to store in its routing table the Received Signal Strength (RSSI) and Angle of Arrival (AOA) information of its neighbors [ 19]. The proposed mechanism makes the channel reservation using physical layer signals possible as AOA assists to estimate the direction of the incoming signal, while RSSI assists to estimate the distance to the transmitter. Also, this mechanism assumes that the antenna is able to manage its energy in a way that its transmission power be proportional to the distance of the destination node. When receiving a signal, the receiver can check the AOA and RSSI on its routing table to infer the transmitter’s ID, thus identifying the signal source. Due to the antenna transmission power management, if the RSSI is high, it means that this signal is not bound for the current node, thus allowing the identification of signal destination. Therefore, the proposed mechanism performs channel reservation in the same cases as DVCS does. It will be shown that the failure probability of the proposed scheme is negligible.

In which concerns to duration, channel reservation using pulse/tone signals requires that TPulse = TT one  is proportional to base 2 logarithm of the data packet size that will be transmitted. The duration time TPulse  is such as: TPulse = TTone = Tsync + ⌈log Psz⌉                          2 , where Psz  is the payload size of data packet to be transmitted and Tsync  denotes pulse/tone detection time. Any node that overhear a pulse or a tone signal can update its DNAV properly, since the proposed technique limits the possible packet size as follows: Every packet has size 2i  , 0 ≤ i < 11  or equal to 1500  . This limitation of 1500  bytes is due to the MTU (Maximum Transmission Unit) of the Ethernet standard (IEEE 802.3) be equal to 1492  or to 1500  (Ethernet Version 2), since in general it is assumed the use of Ethernet. Using AOA and RSSI information, the presented scheme attains the same behavior as when DRTS/DCTS are used. The proposed technique dramatically reduces channel reservation latency, once pulse and tone signals are transmitted in a fraction of the DRTS/DCTS time.

From the above discussion, it is clear that the goodness of the proposed mechanism is associated with the accuracy of the AOA and RSSI. This issues are discussed in the subsequent section.

3.1.3 Estimation Accuracy

The goal of this subsection is to show that, under reasonable AOA and RSSI accuracy, prediction errors are negligible. For the convenience of the readers, the major notations used in this subsection are listed in Table 2. Suppose, without loss of generality, that node x  has at least two neighbors y  and z  , such that:

|R (x,z) - R(x,y)| < τ ;                                 (1) |A(x,y)- A (x,z)| < ϵ.                                 (2)

In the case where Inequalities 1 and 2 occur, the signal source prediction mechanism of x  may predict the wrong source, since it cannot distinguish a pulse or tone signal incoming from y  or z  in this case. Note that this prediction error conditions can occur for more than two nodes at the same time. The presented analysis addresses this case by considering all pairs of x  ’s neighbors as candidates to be y  and z  . Therefore, Pf  is defined as follows:

Pf = ((|R (x,z)- R(x,y)| < τ)∩                             (3)       (|A(x,y)- A(x,z)| < ϵ)).

Due to the two events described in Inequality 3 be assumed as independent, we have:

Pf = P (|R(x,z)- R (x,y)| < τ)*                              (4)        P(|A(x,y)- A(x,z)| < ϵ).

Hence, by considering the Two-Ray channel propagation loss and using the parameters described in Table 3, it was possible to compute the prediction error probability (Pf  ) for various values of ϵ  and τ  , as described in [ 22]. Table 4 displays the calculated Pf  values. By observing Table 4, one can notice that Pf  has a low prediction error probability for all considered RSSI and AOA accuracy values. It is important to state that the RSSI precision has been reported to be as lows as 0.1  dB [ 12]. According to [ 26] [ 27], the AOA estimation can achieve a precision better than 1∘ for the antenna model considered in this paper. In this case (ϵ = 1  , τ = 0.1  ), Pf  has an almost negligible error probability, less than 10-3  . It should be noted that in the presented Pf  calculus, it is considered that G  is a regular graph of degree Δ (G)  what tends to increase Pf  smoothly. Thus, Pf  value is still lower than the presented in Table 4, which is already an almost negligible probability. These considerations end the presentation of channel reservation using pulse/tone signals. Next, it will be presented the deafness prediction mechanism, which is responsible for triggering receiver initiated communications, thus mitigating losses due to deafness.


Table 3: Parameters used for EXata and for Pf  calculation

------------------------------------------ -----Parameter------Transmitter--Receiver--        Power         15 dBm       N/A    Antenna Gain        0 dB       0 dB    Antenna Height     1.5 m       1.5 m -Antenna-Sensitivity----- 94-dBm---- 94-dBm--


Table 4: Calculated Pf  for various values of ϵ  and τ

---∘----------------------- -ϵ (-)2-τ-(d-B2)----Pf-(%-)5---  10-1   10-2    7.4⋅10 -4  10     10-2    7.38 ⋅10-3   1-2   10-1   7.254⋅10-4  10-1   10-1    7.13 ⋅10-3  10     10-1   7.119⋅10 -2   1-2   10     6.9955 ⋅10-3  10-1    1     5.008⋅10 -2  10      1     4.9992 ⋅10-1 --1------1-----4.9124-⋅10---

3.2 Deafness Prediction Mechanism

The deafness prediction mechanism plays an important role for DPTCR-DA. It determines which flow is suffering from deafness problem for longer time, if there is any. In other words, it is verified which neighbor is waiting for more time to send a data frame. So, deafness prediction depends on the instant of reception of the last frame, and the deafness threshold (Ti  ) for each flow i  , where i  denotes the flow index. For example, a node performs deafness prediction verifying Ei  for each flow i  incident to that node, where Ei  denotes the waited time for the flow i  . A flow is predicted as suffering from deafness if the waited time (Ei  ) is higher than the deafness threshold (Ti  ), in other words, if Ei > Ti  .

It is important to state that the deafness threshold is a function that depends on the expected interval between packets (Iiesp  ). Deafness threshold can be defined as: Ti = α* Iiesp  , where α  is an estimated factor. For each flow i  , α  can be based on the information contained in the active flow table. Other possible ways to perform this estimation are described by [ 25].

3.3 DPTCR-DA Behavior

As other protocols that use receiver initiated communications, the proposed technique (DPTCR-DA) has two operation modes (depicted in Figure 4), namely:

 
Standard Mode: used in when deafness is not forecast. This mode uses sender initiated communications, in a similar way to the one exemplified in Figure 4. In this mode, DPTCR-DA relies on the use of pulse/tone signals instead of frames to perform channel reservation [ 22]. Using the results of the previous section, channel reservation with pulse/tone signals can be achieved with an almost negligible probability of failure. Thus, the DPTCR-DA is able to attain a lower latency as compared to RI-DMAC and DVCS. As described by [ 25], after a successful transmission of a data frame, the sender node will perform the deafness estimation. In case of indication of deafness occurrence, the sender node enters in deafness mitigation mode. In this mode, pulse and tone are used in a similar way to the RTS/CTS frames. When receiving a tone, the node verifies if the source of the tone is the destination of the current frame. If this occurs, then this frame is sent and the communication proceeds normally.
 
Deafness Mitigation Mode: is triggered in the case that deafness prediction mechanism indicates that a neighbor node is suffering from deafness [ 25]. The behavior of this mode consists of sending a tone to the neighbor node that is suffering from deafness, as illustrated in Figure 3. In this case, the communication has a 3-way handshake (Tone-DATA-ACK). This mode performs receiver initiated communications. It is important to state that pulse/tone signals used in sender initiated communications and this tone used in receiver initiated communication signal are different, in such a way that by receiving a signal, a node can identify the kind of signal that is being received. This differentiation can be accomplished by varying these signals as regards to phase, frequency or amplitude, as described by [ 28]. This work assumes that these signals (pulse, tone, and receiver initiated communication tone) are transmitted in-band in different narrow portions of the band. For instance, it is considered that pulse is transmitted in high frequency portion of the band, tone is transmitted in low frequency portion of the band, while tone-ri (receiver initiated communication tone) is transmitted in mean portion of the band, as described in [ 16]. Here, the tone-ri signal is used to update DNAV properly, and to start a receiver initiated communication in order to mitigate deafness losses. The time transmission duration of the tone-ri is: TTone-ri = Tsync + ⌈log2Psz⌉ , where Tsync  denotes the synchronization time and the Psz  denotes the size of the DATA frame payload. This duration is necessary to the scheme of channel reservation based on pulse/tone signals proposed in [ 22] to work properly. This scheme allows DNAV to be properly updated also for the receiver initiated communications of DPTCR-DA. According to [ 16] [ 20], 5μs  is enough for tone synchronization. Tones retransmissions do not occur when the node is operating on deafness mitigation mode.




Figure 4: Different types of communications, for the topology of Figure 3: a) sender initiated; b) receiver initiated


An example of DPTCR-DA operation is available in Figure 4. Consider the topology displayed in Figure 3. Also, consider the existence of two data flows: X →  S  and S → D  . It is also assumed that all packets are sent in directional mode and that some packets of each one of the flows were already successfully transmitted. In other words, node S  already “knows” the existence of both data flows. In the beginning, node S  waits its backoff time and try to start a sender initiated communication (standard mode) sending a pulse signal towards D  . Node D  verifies that it is the destination of the pulse signal and sends a tone back to S  . Then, S  and D  exchange successfully DATA/ACK frames. In the meantime, node X  also tries to start a sender initiated communication (standard mode) to S  by sending a pulse signal. However, node S  is deaf for X  in this moment, since S  is beamforming towards D  . So, node S  cannot hear the pulse signals sent by node X  , thus causing the growing of exponential backoff window of node X  . This situation persists until the deafness prediction mechanism of node S  estimates that flow X → S  may be suffering from deafness. This mean that node S  estimated that node X  has packets to send to S  (identified as deafness by deafness prediction mechanism of node S  ). Therefore, S  enters in deafness mitigation mode, and sends a tone to node X  , trying to start a receiver initiated communication. When receiving the tone signal, node X  verifies that the destination of that signal is node X  , thus cancelling its backoff time and sending DATA frame to S  . So, the communication proceeds normally. Note that by using receiver initiated communications, DPTCR-DA may allow a better fairness in network resources assignment, as will be shown in Section 4.

4 Numerical and Empirical Results

This section analyzes the DPTCR-DA performance by comparing it with the DVCS [ 19] and RI-DMAC [ 10] protocols. The analytical analysis is presented below, followed by the simulation results.

4.1 Theoretical Analysis

The theoretical analysis aims to compare the maximum total throughput of the DPTCR-DA and DVCS enhanced with the IEEE 802.11 standard. The presented analytical results are based on the theoretical maximum throughput calculation for DPTCR-DA, comparing it against DVCS and RI-DMAC. Both sender and receiver initiated communications are addressed in the theoretical analysis.

4.1.1 Sender Initiated Communications

Both RI-DMAC and DVCS rely on RTS/CTS communication when sender initiated communications are employed. Hence, the theoretical results shown for DVCS applies to RI-DMAC and vice-versa. In which concerns to DVCS, the theoretical maximum throughput calculation can be obtained using the same methodology as described in [ 29]. Considering the notations defined in Table 2, the average transmission time (Ttot  ) is defined as follows:

Ttot = TDIFS + TRTS + TCTS + TDAT A + TACK + 3⋅TSIFS + TBo,

where:

            20-⋅8- TRTS = 192+  Rc  ,

TCTS = 192+ 14-⋅8,              Rc

              (Psz-+62)-⋅8 TDATA = 192+      Rc     ,

TACK = 192+ 14-⋅8,              Rc

      CWmin-- TBo =    2   *Tslot.

Using the equations aforementioned, the theoretical maximum throughput (T M T  in Mbps) can be expressed as:

       8* P TM T = ----sz.         Ttot
(5)

Table 5 shows the theoretical maximum throughput values for the DVCS and RI-DMAC computed with Equation 5. The table shows the TMT for channel transmission rates of 1  , 2  and 11  Mbps, following the specifications of the IEEE 802.11b [ 1]. The packet size considered were 128  , 256  , 512  , 1024  and 1500  bytes. The TMT calculation for the DPTCR-DA, using the same set of channel transmission rate and packet size values were conduced. As the DPTCR-DA relies on pulse and tone signal instead of RTS/CTS, the Ttot  is calculated as follows:

Ttot = TTone + TPulse +TDIF S + TDAT A +TACK + 3⋅TSIFS + TBo
(6)

where:

T     = T    = T    + ⌈log P  ⌉.  P ulse   Tone   sync     2  sz

Using Equations 5 and 6 it is possible to calculate DPTCR-DA theoretical maximum throughput, which are displayed in Table 6. This table also shows the throughput improvement when employing the DPTCR-DA, as compared against the DVCS and RI-DMAC. As the TPulse + TTone < TRTS + TCTS  relation always holds, the DPTCR-DA allows for throughput improvements in all evaluated cases. The improvement gets higher when short packet size and higher transmission rate are considered. In such cases, the time spent exchanging control frames consumes a higher portion of Ttot  . As displayed in Table 6, the referred improvement can be as high as 40.65%  (Psz = 128  , Rc = 11  ).


Table 5: Calculated theoretical maximum throughput of IEEE 802.11b for sender initiated communications

----------------------------------------------------------------------------------------   Psz      Rc     TRTS   TDIFS   TSIFS   TCTS   TDATA   TACK    TBo     Ttot     T M T -(bytes)--(Mbps)---(μs)----(μs)----(μs)----(μs)----(μs)----(μs)---(μs)-----(μs)-----(Mbps-)--   128       1      352     50     10     304     1712    304    310    3062     0.3344   256       1      352     50     10     304     2736    304    310    4086     0.5012   512       1      352     50     10     304     4784    304    310    6134     0.6678   1024      1      352     50     10     304     8880    304    310    10230    0.8008 --1500------1------352-----50-----10-----304----12688----304----310----14038----0.8548---   128       2      272     50     10     248     952     248    310    2110     0.4853   256       2      272     50     10     248     1464    248    310    2622     0.7811   512       2      272     50     10     248     2488    248    310    3646     1.1234   1024      2      272     50     10     248     4536    248    310    5694     1.4387 --1500------2------272-----50-----10-----248-----6440----248----310----7598-----1.5793---   128      11    206.54    50     10    202.18  330.18   202.18   310   1331.09    0.7693   256      11    206.54    50     10    202.18  423.27   202.18   310   1424.18    1.4380   512      11    206.54    50     10    202.18  609.45   202.18   310   1610.36    2.5435   1024     11    206.54    50     10    202.18  981.82   202.18   310   1982.73    4.1317 --1500-----11----206.54----50-----10----202.18---1328---202.18---310--2328.9091---5.1526---


Table 6: Calculated theoretical maximum throughput of DPTCR-DA for sender initiated communications

---Psz------Rc----TPulse---TDIFS--TSIFS---TTone--TDATA----TACK---TBo-----Ttot----T-M-T---Improvement-   (bytes)  (Mbps )   (μs)    (μs)    (μs)   (μs)    (μs)    (μs)   (μs)   (μs)    (Mbps )      (%) ---128------1-------12-----50------10-----12-----1712-----304----310---2430----0.4214-----26.0082---    256      1       13     50      10     13     2736     304    310   3456    0.5926     18.2292    512      1       14     50      10     14     4784     304    310   5506    0.7439     11.4057    1024      1       15     50      10     15     8880     304    310   9604    0.8530      6.5181    1500      1       16     50      10     16    12688     304    310   13414   0.8946      4.6518 ---128------2-------12-----50------10-----12-----952------248----310---1614----0.6344-----30.7311---    256      2       13     50      10     13     1464     248    310   2128    0.9624     23.2142    512      2       14     50      10     14     2488     248    310   3154    1.2987     15.5992    1024      2       15     50      10     15     4536     248    310   5204    1.5741      9.4158    1500      2       16     50      10     16     6440     248    310   7110    1.6878      6.8636 ---128------11------12-----50------10-----12----330.18--202.18--310---946.36---1.0820-----40.6532---    256      11      13     50      10     13    423.27   202.18   310  1041.45   1.9665     36.7493    512      11      14     50      10     14    609.45   202.18   310  1229.64   3.311     30.9626    1024      11      15     50      10     15    981.82   202.18   310   1604    5.1072     23.6114    1500      11      16     50      10     16     1328   202.18   310  1952.18   6.1470     19.2978 ---------------------------------------------------------------------------------------------------

4.1.2 Receiver Initiated Communications

The theoretical analysis for the receiver initiated communications is similar to that presented above. However, in this analysis the DPTCR-DA is compared against the RI-DMAC only, as the DVCS does not support receiver initiated communications. Because DPTCR-DA receiver initiated communications inherits some characteristics of IEEE 802.11b, the presented analysis is also based on [ 29]. In this case, note that backoff time is not included in Ttot  calculation, since the receipt of an RTR frame cancels the remaining backoff time. The receiver initiated TMT (TM Tri  ), when considering the notations presented in Table 2, can be defined as:

Ttot = TDIF S + TRTR + 2⋅TSIFS + TDATA + TACK,
(7)

where:

            20 ⋅8 TRTR = 192+ -----.              Rc

The TDAT A  and TACK  follows from previous definitions and the theoretical maximum throughput for receiver initiated communications (TM Tri  in Mbps) was calculated by using the following equation:

         8*Psz- TM Tri =  Ttot .
(8)

The results of this calculation are displayed at Table 7. In this calculation, the considered values of packet size and channel transmission rate were the same used for sender initiated communications. An analogous calculation was performed to compute the TMT of DPTCR-DA. Note that backoff time is not included in Ttot  calculation again, once the receipt of a tone-ri cancels the remaining backoff time. Therefore, the average total transmission time (Ttot  ) is now defined as follows:

Ttot = TDIFS + TTone- ri + TDAT A +TACK + 2⋅TSIFS,
(9)

where

TTone-ri = Tsync + ⌈log2Psz⌉.

These equations allow the calculation of TM T     ri  for DPTCR-DA. The results of this calculation are shown in Table 8. The packet size and channel transmission rate were the same as those in the sender initiated case. Table 8 also shows the throughput improvement that DPTCR-DA provides when compared against RI-DMAC. As before, the relation T       < T  Tone- ri    RTR  always holds. Similar to sender initiated communications, DPTCR-DA improvement raises when packet size is short and channel transmission rate is high. As already explained, this occurs because in these cases the time spent with RTR represents a higher portion of T  tot  . The throughput improvement provided by DPTCR-DA for receiver initiated communications can be as high as 31,6%  , which shows that the DPTCR-DA provides significant gains as compared to the RI-DMAC. The simulation results will be presented in the next subsection.


Table 7: Theoretical maximum throughput of RI-DMAC for receiver initiated communications

------------------------------------------------------------------------   Psz      Rc     TRTR   TDIFS   TSIFS  TDAT A   TACK     Ttot    TM Tri -(bytes)--(Mbps)---(μs)----(μs)----(μs)----(μs)----(μs)----(μs)---(Mbps-)-   128       1      352     50     10     1712     304     2438    0.4200   256       1      352     50     10     2736     304     3462    0.5916   512       1      352     50     10     4784     304     5510    0.7434   1024      1      352     50     10     8880     304     9606    0.8528 --1500------1------352-----50-----10-----12688----304-----13414----0.8946--   128       2      272     50     10      952     248     1542    0.6641   256       2      272     50     10     1464     248     2054    0.9971   512       2      272     50     10     2488     248     3078    1.3307   1024      2      272     50     10     4536     248     5126    1.5981 --1500------2------272-----50-----10-----6440-----248-----7030----1.7069--   128      11    206.54    50     10    330.18  202.18  808.91   1.2659   256      11    206.54    50     10    423.27  202.18    902    2.2705   512      11    206.54    50     10    609.45  202.18  1088.18   3.7641   1024     11    206.54    50     10    981.82  202.18  1460.55   5.6089 --1500-----11----206.54----50-----10-----1328---202.18--1806.73---6.6418--


Table 8: Theoretical maximum throughput of DPTCR-DA for receiver initiated communications

----------------------------------------------------------------------------------------   Psz      Rc    TT one-ri  TDIFS   TSIFS  TDAT A   TACK     Ttot   T M Tri  Improvement -(bytes)--(Mbps)----(μs)-----(μs)----(μs)----(μs)-----(μs)-----(μs)---(Mbps-)------(%-)-----   128       1       12       50     10     1712     304     2098    0.4880     16.2059   256       1       13       50     10     2736     304     3123    0.6558     10.8549   512       1       14       50     10     4784     304     5172    0.7919     6.5352   1024      1       15       50     10     8880     304     9269    0.8838     3.6357 --1500------1-------16-------50-----10-----12688----304----13078----0.9175-----2.5692----   128       2       12       50     10      952     248     1282    0.7987     20.2808   256       2       13       50     10     1464     248     1795    1.1409     14.4290   512       2       14       50     10     2488     248     2820    1.4525     9.1489   1024      2       15       50     10     4536     248     4869    1.6825     5.2783 --1500------2-------16-------50-----10-----6440-----248-----6774----1.7715-----3.7792----   128      11       12       50     10    330.18  202.18   614.36  1.6670     31.6670   256      11       13       50     10    423.27   202.18   708.45   2.8907     27.3194   512      11       14       50     10    609.45   202.18   895.64   4.5732     21.4982   1024     11       15       50     10    981.82   202.18    1269    6.4555     15.0942 --1500-----11-------16-------50-----10-----1328----202.18---1616.18---7.4249-----11.7898----

4.2 Empirical Analysis

This section presents an empirical analysis of the DPTCR-DA, DVCS and RI-DMAC. The empirical results are compared with the theoretical ones to validate the referred analysis. As it will be shown, the use of pulse/tone signals instead of frames for both sender and receiver initiated communications provides significant improvement for all evaluated cases. For this evaluation, the EXata simulator, version 2.0, was used [ 18]. The EXata simulator has a number of features, such as realistic antenna models and patterns, propagation models (free space, two-ray), the IEEE 802.11b standard and a number of other protocols in the TCP/IP stack. The EXata simulator also addresses the features contained in Qualnet and GloMoSim [ 18]. It is important to recall that these simulators are widely used in related studies.

The EXata incorporates the DVCS and the RI-DMAC has been implemented. The scenarios considered for the empirical analysis are depicted in Figure 5. The figure shows three different scenarios: (i  ) the first scenario, depicted in Figure 4, aims to validate the T M T  values obtained in the simulation with the analytical results; (ii  ) the second scenario (Figure 4) aims to show that DNAV setting are properly updated when DPTCR-DA is used – node 3  shall receive the control messages exchanged by nodes 1  and 2  ; and (iii  ) the third scenario (Figure 4) illustrates a case where nodes 2  and 4  may be deaf towards the direction of node 1  . This last scenario aims to show that DPTCR-DA can mitigate deafness. Every arrow in Figure 5 represents a CBR flow. Although DPTCR-DA is able to operate with other antenna types, in the simulations it was assumed the use of a switched beam antenna with 8 sectors of 45∘ . Packet size and channel transmission rate values has the same values used in the theoretical analysis. The other relevant EXata parameters are shown at Table 3. Also, it was assumed that ϵ = 1∘ and τ = 0.1  dB, once these values are reasonable for the antenna considered in this work [ 12] [ 26] [ 27]. Each one of the presented results is the average of 20 simulations. The presented results evaluate DVCS, RI-DMAC and DPTCR-DA in terms of fairness, end-to-end delay, jitter and throughput, which are widely used metrics [ 9]. In the presented analysis, mobility was not addressed as is commonly accepted for MAC layer protocol evaluations [ 10] [ 19].





Figure 5: Evaluated scenarios


4.2.1 Scenario 1

As illustrated in Figure 4.2, this scenario has two nodes and a CBR flow (1 → 2  ). For this flow, the considered packet arrival interval (Ig  ) was defined as 1  ms. The packet size and the transmission data rate values considered were the same used in theoretical analysis. In the first scenario, DPTCR-DA was compared against DVCS as deafness does not occur in this setting. Thus, in this case RI-DMAC (and DVCS-DA) will have the same behavior of DVCS, since the sender initiated communications of RI-DMAC and DVCS-DA are based on DVCS scheme. Results for the first scenario are displayed in Table 9 for channel transmission rate (Rc  ) of 1  , 2  and 11  Mbps. As can be seen, the simulated values for DPTCR-DA are similar to those obtained in the theoretical calculation (Tables 5 and 6). As shown in Table 9, in all considered cases, DPTCR-DA attained higher throughput than DVCS scheme. In the best case, the obtained throughput improvement was over 35%  higher than that experienced by the DVCS. As in the theoretical analysis, the DPTCR-DA attains better results when Rc  is high and Psz  is low. Note that the above results are consistent with the theoretical analysis.


Table 9: Measured throughput

-------------------------------------------------------                  Throughput   Throughput   Psz      Rc                             Improvement                     DVCS      DPTCR  -DA  (bytes)  (Mbps)    (Mbps )      (Mbps)        (% ) --128-------1-------0.3382-------0.4191-------23.9208----   256       1       0.5056       0.5904       16.7721   512       1       0.6716       0.7421       10.4973   1024      1       0.8036       0.8519       6.0104   1500      1       0.8571       0.8939       4.2935 --128-------2-------0.4877-------0.6292-------29.0137----   256       2       0.7841       0.9562       21.9487   512       2       1.1268       1.2929       14.7408   1024      2       1.4412       1.5701       8.9439   1500      2       1.5816       1.6848       6.5250 --128------11-------0.7625-------1.0240-------34.2951----   256      11      1.4270       1.9374      35.7673   512      11       2.5242       3.2902       30.3462   1024     11       4.1073       5.0616       23.2342   1500     11       5.1277       6.1029       19.0183 -------------------------------------------------------

4.2.2 Scenario 2

The second scenario consists of four nodes and two CBR flows: 1 → 2  and 3 → 4  as shown in Figure 4. Again, the DPTCR-DA is compared against DVCS as both RI-DMAC and DVCS have similar characteristics when deafness does not occur. The simulation results for this scenario are displayed in Figures 6,  7,  8. These figures show the DPTCR-DA and DVCS comparison in terms of throughput, jitter and end-to-end delay, respectively. In all addressed cases, DPTCR-DA was able to attain a superior performance than DVCS. Indeed, when using DPTCR-DA, it was able to provide throughput improvement up to 23%  and 20%  for flows 3 → 4  and 1 → 2  , respectively. The jitter reduces ≈ 45%  and ≈ 50%  for flows 3 → 4  and 1 → 2  , respectively. Compared to the DVCS, the end-to-end delay obtained by the DPTCR-DA diminishes ≈ 576%  and ≈ 173%  for flows 3 → 4  and 1 → 2  , respectively.

The above results shows that the DPTCR-DA allows neighboring nodes to correctly set their DNAV counter, once flows 1 → 2  and 3 → 4  are being served simultaneously. The correct DNAV update indicates also that the mechanism which predicts the signal source and duration works properly, as expected for the considered precisions of angle of arrival (ϵ = 1∘ ) and received signal strength (τ = 0.1  dB).



Figure 6: Throughput comparison between DPTCR-DA and DVCS, for Mbps




Figure 7: Jitter comparison between DPTCR-DA and DVCS, for Mbps




Figure 8: End-to-end delay comparison between DPTCR-DA and DVCS, for Mbps


4.2.3 Scenario 3

The third scenario consists of five nodes and four CBR flows as depicted in Figure 4. For all the considered flows, the packet arrival interval (Ig  ) in this scenario were 4  , 5  and 6  ms. The packet size was considered to be equal to 1024  bytes, and date transmission rate was considered to be equal to 2  Mbps. Note that this scenario may cause nodes 2  and 4  to be deaf to the incoming packets from node 1  . Thus, the goal of this scenario is to show that DPTCR-DA is able to mitigate deafness problem in cases where there are alternate flows. The results in terms of throughput for each flow are displayed in Table 10. This table also displays the fairness index values. It is important to state that the fairness index is defined in this work as the Jain index [ 30] (Equation 10). The Jain index provides values in the interval [0,1], since it is a normalized index. Therefore, a higher value of fairness index means a fair assignment of network resources [ 30]. Let, thi  denote the throughput of the flow i  . So, the fairness index can be defined as follows [ 30]:

 ∑n -(-i∑=1thi)2- n ⋅  ni=1th2i
(10)


Table 10: Flow throughput and fairness index for various protocols

---Technique/-----I-------Flow-1-→-2---------Flow-2 →-3---------Flow-1 →-4---------Flow-4-→-5------Fairness-     Protocol    (mgs)  Throughput (Kbps )  Throughput (Kbps) Throughput (Kbps)  Throughput (Kbps)   Index --DPTCR---DA-----6---------311.1105-----------725.7313-----------313.5964------------730.1281--------0.8624--   DPTCR  -DA     5         357.5906           651.6369           357.9443            647.7588        0.9225   DPTCR  -DA     4        418.4422           578.1706           418.5690           576.2043       0.9752 ---RI-DMAC-------6---------66.8295------------1321.9703------------66.5679-----------1323.8066-------0.5503--    RI-DMAC       5         68.6008            1321.3789            68.5395           1321.6764       0.5517    RI-DMAC       4         69.3540            1319.3879            68.0835           1322.2799       0.5519 ---------------------------------------------------------------------------------------------------------      DVCS        6         67.4337            1324.8763            65.8449           1328.8588       0.5501      DVCS        5         70.1337            1322.2012            69.2376           1323.0414       0.5525 -----DVCS--------4---------67.0369------------1325.5814------------68.2906-----------1324.5164-------0.5509--

As expected, the simulation results show that RI-DMAC protocol behaves just like DVCS in this case. This occurs since RI-DMAC deafness prediction is based on next packet information. However, in this case node 1  has more than one flow, which causes the occurrence of alternate packets in the queue of node 1  . As can be inferred from Table 10, RI-DMAC and DVCS have an unfair assignment of network resources. Nodes 2  and 4  are deaf to node 1  , thus leading to a low throughput of flows 1 → 2  and 1 → 4  . On the other hand, the DPTCR-DA is able to mitigate deafness in this case because DPTCR-DA uses network resources in a fairer way. This can be inferred from Table 10 where a more equal division among throughput flows can be observed. Note that the throughput of flows 1 → 2  and 1 → 4  is more than 4.5  times higher (350%  higher) than when using DVCS or RI-DMAC. In which concerns to fairness index, in all cases, the DPTCR-DA presented better results than RI-DMAC and DVCS. DPTCR-DA is able to provide a fairness index nearly 76%  higher than RI-DMAC or DVCS, which indicates a remarkable improvement on the fairness of network resources assignment.

Although DPTCR-DA provides a better fairness than RI-DMAC, it has a lower network throughput than RI-DMAC, as shown in Table 11. Such reduction is mainly due to the time spent to mitigate deafness. Clearly, fairness and throughput are contrasting parameters. One can easily improve throughput at the expense of fairness. As deafness cannot be handled by RI-DMAC in this case, the overall network throughput is higher (at the expense of flows 1 → 2  and 1 → 4  ). It is important to state that, in a multihop scenario, it is paramount to improve packet relay time. This is accomplished by DPTCR-DA, while RI-DMAC and DVCS would not be able to cope with that.

The empirical evaluation was also held in terms of jitter and end-to-end delay. The results for these metrics are displayed in Tables 12 and 13. In terms of jitter, DPTCR-DA is able to provide a decrease of ≈ 85%  for flows 1 → 2  and 1 → 4  when compared to RI-DMAC or DVCS. Following the same trend of throughput results, flows 2 → 3  e 4 → 5  have a lower performance when DPTCR-DA is used. As regards to end-to-end delay, the use of DPTCR-DA causes a loss of performance for flows 2 → 3  and 4 → 5  . As stressed in Table 13, the flows that are impaired by deafness problem (1 → 2  and 1 → 4  ) presented an end-to-end delay by ≈ 15%  lower using DPTCR-DA.

This section presented a detailed evaluation of the DPTCR-DA, showing its strengths in a number of scenarios and conditions. As compared to the DVCS and RI-DMAC, the DPTCR-DA was able to improve throughput, reduce jitter and end-to-end delay in all sender initiated scenarios. In deafness prone scenarios, the results have shown that the DPTCR-DA was able to mitigate deafness and provide significant gains in terms of fairness, jitter, end-to-end delay and throughput of the affected flows. Clearly, DPTCR-DA is able to provide significant improvements by efficiently exploring the directional communication characteristics.


Table 11: Total network throughput evaluation

----------------------------------------------------------- -Technique/Protocol--Ig-(ms)--Total Network-Throughput (Kbps-)     DPTCR  -DA         6                2080.5663     DPTCR  -DA         5                2014.9306 ----DPTCR---DA---------4----------------1991.3861------------      RI-DMAC          6                2779.1743      RI-DMAC          5                2780.1956 -----RI-DMAC----------4----------------2779.1053------------        DVCS           6                2787.0137        DVCS           5                2784.6139 -------DVCS-----------4----------------2785.4253------------


Table 12: Jitter evaluation

--------------------------------------------------------------------   Technique/    Ig   Flow 1 → 2  Flow 2 → 3  Flow 1 → 4  Flow 4 → 5 ---Protocol----(ms)---Jitter-(s)----Jitter (s)---Jitter (s)---Jitter (s)-  DPTCR   -DA     6     0.0166      0.0111       0.0165       0.0112   DPTCR  -DA      5     0.0188      0.0085      0.0189       0.0086 --DPTCR---DA------4-----0.0210------0.0063------0.0209-------0.0062----    RI- DMAC        6     0.1170      0.0032      0.1163       0.0032    RI- DMAC        5     0.1111      0.0022      0.1137       0.0022 ---RI- DMAC--------4-----0.1153------0.0012------0.1167-------0.0012----     DVCS         6     0.1235      0.0032      0.1197       0.0032     DVCS         5     0.1129      0.0022      0.1128       0.0022 ----DVCS---------4-----0.1104------0.0012------0.1209-------0.0012----


Table 13: End to end delay evaluation

--------------------------------------------------------------------   Technique/    Ig   Flow 1 → 2  Flow 2 → 3  Flow 1 → 4  Flow 4 → 5 ---Protocol----(ms)---Delay-(s)----Delay (s)---Delay (s)---Delay-(s)--   DPTCR  -DA      6     12.7109      11.8034      12.7089     11.8123   DPTCR  -DA      5     12.3863      10.2246      12.3664     10.2354 -DPTCR----DA-----4----12.0136------8.3448------12.0209------8.3493----    RI- DMAC        6     14.3829      7.7548      14.3385      7.7517    RI- DMAC        5     14.4015      5.3078      14.2632      5.3229 ---RI- DMAC--------4-----14.1756------2.9031------14.2974------2.8731----     DVCS         6     14.6670      7.7059      14.6966      7.7217     DVCS         5     14.2693      5.3293      14.3723      5.2949 ----DVCS---------4-----14.0397------2.8788------14.2293------2.8219----

5 Conclusion

The use of directional antennas has been considered a promising alternative to improve spatial division and throughput. However, to realize its benefits, efficient directional MAC protocols are needed. This work shows the benefits as well the problems associated with directional communications. Among the problems discussed, the deafness is one which has received considerable attention in the literature.

In this context, this paper first presents a deafness mitigation technique, termed DPTCR-DA. The DPTCR-DA is based on traffic flow information to estimate deafness occurrence. DPTCR-DA also incorporates a prominent and innovative way to perform channel reservation using pulse/tone signals instead of frames for both sender and receiver initiated communications. Thus, the DPTCR-DA constitutes a powerful deafness mitigation technique while providing remarkable improvements in terms of throughput, fairness, jitter, and end-to-end delay of the flows that are affected by the deafness problem. The DPTCR-DA also attained better performance results for all sender initiated communications in the evaluated scenarios. As future works, it would be interesting to evaluate different election policies, in which concerns to the node that receives a tone in the beginning of a receiver initiated communication. The main motivation for this evaluation is the existence of discussions about which policy is the most efficient, as described in [ 31]. Evaluation of the energy consumption gains shall be conduced as well.

Acknowledgment

This work was partially supported by CNPq.

References

<[1]   a id="Xieee2007"> IEEE, “IEEE Standard for information technology-telecommunications and information exchange between systems-local and metropolitan area networks - specific requirements - part 11: Wireless lan medium access control (mac) and physical layer (phy) specifications,” Institute of Electrical and Electronics Engineers, IEEE Standard 802.11, December 2007.

[2]    J. Bordim, A. Barbosa, M. Caetano, and P. Barreto, “IEEE802. 11b/g standard: Theoretical maximum throughput,” in Networking and Computing (ICNC), 2010 First International Conference on. IEEE, 2010, pp. 197–201.

[3]    P. Gupta and P. Kumar, “The capacity of wireless networks,” IEEE Transactions on Information Theory, vol. 46, no. 2, pp. 388–404, 2000.

[4]    S. Kumar, V. Raghavan, and J. Deng, “Medium Access Control protocols for ad hoc wireless networks: A survey,” Ad Hoc Networks, vol. 4, no. 3, pp. 326–358, 2006.

[5]    R. Ramanathan, “Antenna Beamforming and Power Control for Ad Hoc Networks,” in Mobile ad hoc networking. Wiley-IEEE Press, 2004, vol. 1, ch. 5, pp. 139–173.

[6]    P. Mohapatra and S. Krishnamurthy, AD HOC NETWORKS: technologies and protocols. Springer, 2005.

[7]    P. Azevêdo, M. Caetano, and J. Bordim, “A packet aggregation mechanism for real time applications over wireless networks,” International Journal of Networking and Computing, vol. 2, no. 1, pp. 18–40, 2012.

[8]    P. Krishnamurthy and S. Krishnamurthy, “Use of smart antennas in ad hoc networks,” in AD HOC NETWORKS: technologies and protocols. Springer, 2005, vol. 1, ch. 7, pp. 197–226.

[9]    R. Choudhury, X. Yang, R. Ramanathan, and N. Vaidya, “Using directional antennas for medium access control in ad hoc networks,” in Proceedings of the 8th annual international conference on Mobile computing and networking. ACM, 2002, pp. 59–70.

[10]   M. Takata, M. Bandai, and T. Watanabe, “RI-DMAC: a receiver-initiated directional MAC protocol for deafness problem,” International Journal of Sensor Networks, vol. 5, no. 2, pp. 79–89, 2009.

[11]    J. Bordim and K. Nakano, “Deafness resilient mac protocol for directional communications,” IEICE TRANSACTIONS on Information and Systems, vol. 93, no. 12, pp. 3243–3250, 2010.

[12]    A. Amiri Sani, L. Zhong, and A. Sabharwal, “Directional antenna diversity for mobile devices: characterizations and solutions,” in Proceedings of the sixteenth annual international conference on Mobile computing and networking. ACM, 2010, pp. 221–232.

[13]    A. Subramanian and S. Das, “Addressing deafness and hidden terminal problem in directional antenna based wireless multi-hop networks,” Wireless Networks, vol. 16, no. 6, pp. 1557–1567, 2010.

[14]    R. Choudhury and N. Vaidya, “Deafness: A MAC problem in ad hoc networks when using directional antennas,” in Network Protocols, 2004. ICNP 2004. Proceedings of the 12th IEEE International Conference on. IEEE, 2005, pp. 283–292.

[15]    G. Li, L. Yang, W. Conner, and B. Sadeghi, “Opportunities and challenges for mesh networks using directional antennas,” in Proceedings of First IEEE Workshop Wireless Mesh Networks (WiMesh’05). IEEE, 2005, pp. 106–116.

[16]    K. Shih, W. Liao, H. Chen, and C. Chou, “On avoiding RTS collisions for IEEE 802.11-based wireless ad hoc networks,” Computer Communications, vol. 32, no. 1, pp. 69–77, 2009.

[17]    Z. Haas and J. Deng, “Dual busy tone multiple access (dbtma)-a multiple access control scheme for ad hoc networks,” IEEE Transactions on Communications, vol. 50, no. 6, pp. 975 –985, jun 2002.

[18]    Scalable Network Technologies, “Simulador EXata,” URL: http://www.scalable-networks.com/exata/, 2011.

[19]    M. Takai, J. Martin, R. Bagrodia, and A. Ren, “Directional virtual carrier sensing for directional antennas in mobile ad hoc networks,” in Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing. ACM, 2002, pp. 183–193.

[20]    J. Ma, H. Sekiya, A. Nagasaki, N. Komuro, and S. Sakata, “MAC Protocol for Ad Hoc Networks Using Smart Antennas for Mitigating Hidden and Deafness Problems,” IEICE TRANSACTIONS on Communications, vol. E95-B, no. 11, pp. 3545–3555, 2012.

[21]    S. Basagni, M. Conti, S. Giordano, and I. Stojmenović, Mobile ad hoc networking. Wiley-IEEE Press, 2004.

[22]    L. Guimarães and J. Bordim, “Utilização de pulse/tone como mecanismo de reserva de canal em comunicações direcionais,” in XXXVIII Conferencia Latinoamericana en Informática. Centro Latinoamericano de Estudios en Informática, 2012, pp. 515–523.

[23]    M. Gast, 802.11 wireless networks: the definitive guide. O’Reilly Media, 2002.

[24]    M. Takata, M. Bandai, and T. Watanabe, “A receiver-initiated directional MAC protocol for handling deafness in ad hoc networks,” in IEEE International Conference on Communications (ICC’06), vol. 9. IEEE, 2006, pp. 4089–4095.

[25]    P. Dias, L. Guimarães, L. Nunes, M. Caetano, and J. Bordim, “Proposta de tratamento do problema de surdez de antenas em comunicações direcionais,” in XXX Simpósio Brasileiro de Telecomunicações. Sociedade Brasileira de Telecomunicações, 2012, pp. 540–544.

[26]    G. Giorgetti, S. Maddio, A. Cidronali, S. Gupta, and G. Manes, “Switched beam antenna design principles for angle of arrival estimation,” in Wireless Technology Conference, 2009. EuWIT 2009. European. IEEE, 2009, pp. 5–8.

[27]    J. Lee, D. Kim, C. K. Toh, T. Kwon, and Y. Choi, “A Table-driven AOA Estimation Algorithm for Switched-beam Antennas in Wireless Networks,” in 11th European Wireless Conference 2005-Next Generation Wireless and Mobile Communications and Services (European Wireless). VDE, 2005, pp. 1–6.

[28]    A. Tanenbaum, Computer Networks, 4th ed. Prentice Hall Professional Technical Reference, 2002.

[29]    J. Jun, P. Peddabachagari, and M. Sichitiu, “Theoretical maximum throughput of IEEE 802.11 and its applications,” in Second IEEE International Symposium on Network Computing and Applications, 2003. (NCA 2003). IEEE, 2003, pp. 249–256.

[30]    R. Jain, D. Chiu, and W. Hawe, A quantitative measure of fairness and discrimination for resource allocation in shared computer system. Eastern Research Laboratory, Digital Equipment Corporation, 1984.

[31]    T. Bonfim and M. Carvalho, “Reversing the IEEE 802.11 backoff algorithm for receiver-initiated MAC protocols,” in Wireless Communications and Mobile Computing Conference (IWCMC), 2012 8th International. IEEE, 2012, pp. 269–274.

Creative Commons License Todo el contenido de esta revista, excepto dónde está identificado, está bajo una Licencia Creative Commons