14
A new adaptive receiver-initiated scheme for mitigating starvation in wireless networks A. Leonardi a,, S. Palazzo a , C. Rametta a , E.W. Knightly b a Dipartimento di Ingegneria Elettrica, Elettronica ed Informatica, University of Catania, Italy b Department of Electrical and Computer Engineering, Rice University, Houston, TX, United States article info Article history: Received 6 September 2010 Received in revised form 22 August 2011 Accepted 5 September 2011 Available online 1 October 2011 Keywords: MAC CSMA/CA Receiver-initiated Evaluation Wireless Starvation Simulation abstract Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) has been adopted by the IEEE 802.11 standard and provides good performance when all transmitters are within the range of each other. Unfortunately, in multi-hop topologies, the asymmetric view of the channel state leads to a throughput distribution where a few flows may capture all the available bandwidth while many other flows get very low throughput and sometime meet starvation. To address this problem, in this paper we describe a solution called Carrier Sense Multiple Access with Collision Avoidance by Receiver Detection (CSMA/CARD) which makes use of collisions sensed by a receiver at the physical layer to help the handshake mechanism and mitigate the effect of such problem. More specifically, we propose a mech- anism based on historical observations, where collisions can be used by the receiver to pre- dict whether some sender attempted to initiate a transmission. The receiver then reacts accordingly by participating itself in a handshake sequence. We show some interesting results, obtained through analysis and simulations, when the CSMA/CARD is compared to the IEEE 802.11 protocol. Ó 2011 Elsevier B.V. All rights reserved. 1. Introduction Carrier Sense Multiple Access (CSMA) has been used in different packet-radio network protocols [18]. CSMA protocols require each station to listen to the channel before attempting to transmit in order to avoid having simultaneous transmissions over the same channel. Several studies have demonstrated that when all nodes are within the transmission range of each other, CSMA protocols provide fair access opportunities to all flows. Unfortunately, in a multi-hop topology where nodes are not in the range of each other, channel state information is ineluctably incomplete because some transmitters are not able to sense when other nodes are transmitting [14]. This lack of awareness leads to poor performance, affecting transmissions in different ways, even if coordination enhancements like RTS/CTS control packet exchanges, as in CSMA/CA, are used [3]. In particular, the possibility to acquire the channel becomes different among the termi- nals and a throughput distribution occurs in which a few flows capture all bandwidth while several other flows get very low or even zero throughput [11]. To address this problem, this paper discusses a solution called Carrier Sense Multiple Access with Collision Avoid- ance by Receiver Detection (CSMA/CARD) whose basic idea has been introduced in [19]. This solution is based on a novel receiver-initiated mechanism which exploits some information at the physical level. We demonstrate, via analysis and simulations, that the detection of two or more overlapped signals at a potential receiver, when coupled with an appropriate mechanism, can be effective in 1570-8705/$ - see front matter Ó 2011 Elsevier B.V. All rights reserved. doi:10.1016/j.adhoc.2011.09.005 Corresponding author. Tel.: +39 0957382391; fax: +39 0957382397. E-mail addresses: [email protected] (A. Leonardi), spalazzo@ dieei.unict.it (S. Palazzo), [email protected] (C. Rametta), knightly@ rice.edu (E.W. Knightly). Ad Hoc Networks 11 (2013) 625–638 Contents lists available at SciVerse ScienceDirect Ad Hoc Networks journal homepage: www.elsevier.com/locate/adhoc

Ad Hoc Networks · Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) has been adopted by the IEEE 802.11 standard and provides good performance when all transmitters

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Ad Hoc Networks · Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) has been adopted by the IEEE 802.11 standard and provides good performance when all transmitters

Ad Hoc Networks 11 (2013) 625–638

Contents lists available at SciVerse ScienceDirect

Ad Hoc Networks

journal homepage: www.elsevier .com/locate /adhoc

A new adaptive receiver-initiated scheme for mitigating starvationin wireless networks

A. Leonardi a,⇑, S. Palazzo a, C. Rametta a, E.W. Knightly b

a Dipartimento di Ingegneria Elettrica, Elettronica ed Informatica, University of Catania, Italyb Department of Electrical and Computer Engineering, Rice University, Houston, TX, United States

a r t i c l e i n f o a b s t r a c t

Article history:Received 6 September 2010Received in revised form 22 August 2011Accepted 5 September 2011Available online 1 October 2011

Keywords:MACCSMA/CAReceiver-initiatedEvaluationWirelessStarvationSimulation

1570-8705/$ - see front matter � 2011 Elsevier B.Vdoi:10.1016/j.adhoc.2011.09.005

⇑ Corresponding author. Tel.: +39 0957382391; faE-mail addresses: [email protected] (A. L

dieei.unict.it (S. Palazzo), [email protected] (Crice.edu (E.W. Knightly).

Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) has been adopted by theIEEE 802.11 standard and provides good performance when all transmitters are within therange of each other. Unfortunately, in multi-hop topologies, the asymmetric view of thechannel state leads to a throughput distribution where a few flows may capture all theavailable bandwidth while many other flows get very low throughput and sometime meetstarvation. To address this problem, in this paper we describe a solution called CarrierSense Multiple Access with Collision Avoidance by Receiver Detection (CSMA/CARD) whichmakes use of collisions sensed by a receiver at the physical layer to help the handshakemechanism and mitigate the effect of such problem. More specifically, we propose a mech-anism based on historical observations, where collisions can be used by the receiver to pre-dict whether some sender attempted to initiate a transmission. The receiver then reactsaccordingly by participating itself in a handshake sequence. We show some interestingresults, obtained through analysis and simulations, when the CSMA/CARD is comparedto the IEEE 802.11 protocol.

� 2011 Elsevier B.V. All rights reserved.

1. Introduction

Carrier Sense Multiple Access (CSMA) has been used indifferent packet-radio network protocols [18]. CSMAprotocols require each station to listen to the channelbefore attempting to transmit in order to avoid havingsimultaneous transmissions over the same channel.

Several studies have demonstrated that when all nodesare within the transmission range of each other, CSMAprotocols provide fair access opportunities to all flows.Unfortunately, in a multi-hop topology where nodes arenot in the range of each other, channel state informationis ineluctably incomplete because some transmitters are

. All rights reserved.

x: +39 0957382397.eonardi), spalazzo@

. Rametta), knightly@

not able to sense when other nodes are transmitting [14].This lack of awareness leads to poor performance, affectingtransmissions in different ways, even if coordinationenhancements like RTS/CTS control packet exchanges, asin CSMA/CA, are used [3]. In particular, the possibility toacquire the channel becomes different among the termi-nals and a throughput distribution occurs in which a fewflows capture all bandwidth while several other flows getvery low or even zero throughput [11].

To address this problem, this paper discusses a solutioncalled Carrier Sense Multiple Access with Collision Avoid-ance by Receiver Detection (CSMA/CARD) whose basic ideahas been introduced in [19]. This solution is based on anovel receiver-initiated mechanism which exploits someinformation at the physical level. We demonstrate, viaanalysis and simulations, that the detection of two or moreoverlapped signals at a potential receiver, when coupledwith an appropriate mechanism, can be effective in

Page 2: Ad Hoc Networks · Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) has been adopted by the IEEE 802.11 standard and provides good performance when all transmitters

626 A. Leonardi et al. / Ad Hoc Networks 11 (2013) 625–638

providing extra channel state information for a protocollike the IEEE 802.11 DCF [30]. Using this information, thereceiver can initiate an action to help the handshake mech-anism and to avoid the starvation of some flows whichmay occur in some network scenarios.

In [19] we have already shown that the mechanismproposed alleviates the problem of starvation. However,results in [19] also show that when the number of con-tending nodes increases, the number of collisions amongpackets increases as well, and consequently it may happenthat CSMA/CARD does not behave as desired.

In this paper we propose an improved version of CSMA/CARD which introduces a PHY-aware mechanism that,according to historical observations, allows to adaptivelyconsider the dynamics of the number of nodes and the traf-fic conditions in the neighborhood.

The performance evaluation of the adaptive CSMA/CARD mechanism is carried out by comparing an appropri-ate existing contention-based protocol without the PHY-aware mechanism against the same protocol with thePHY-aware mechanism. We have here selected the IEEE802.11 DCF due to its design simplicity and its consoli-dated analysis, as well as the expected familiarity of read-ers with this well-known protocol.

The rest of the paper is organized as follows. In Section 2we provide a description of related works already existingin the literature, and we outline the distinguished approachof our solution as compared to them. In Section 3 we firstshow two illustrative application scenarios, next we de-scribe the protocol mechanism and highlight, with the helpof some pseudo-code, the main algorithms. In Section 4some analytical results are derived and discussed. In Section5 we analyze the performance of the proposed mechanismas compared to a classical approach like IEEE 802.11 DCF. Fi-nally, in Section 6 some concluding remarks are drawn.

2. Related work

In the past, several solutions have been proposed tocounteract the so-called hidden terminal problem in sin-gle-channel networks [17,27,7]. An example is CarrierSense Multiple Access with Collision Avoidance (CSMA/CA) [15] which is an improvement of CSMA and suggestsa bi-directional handshake mechanism between each sen-der and receiver to detect collisions. A sender initiates aRequest-To-Send packet (RTS) to the receiver, and the re-ceiver replies with a Clear-To-Send packet (CTS) if it re-ceives the RTS correctly. An RTS-CTS handshakemechanism derived from CSMA/CA, has been standardizedand adopted by the IEEE 802.11 committee [6,30].

More recently, different techniques have been proposedin the literature to improve the throughput performance ofthe IEEE 802.11 protocol while preventing the hidden ter-minal problem. In particular, a major effort has been spenton the modification of the IEEE 802.11 MAC layer timersand handshake mechanisms [3] with the purpose ofachieving more spatial reuse. In addition, there have alsobeen papers that aimed at improving the IEEE 802.11MAC bandwidth efficiency by exploiting the physical layercapture effect [28,20,5]. However, despite the numerous

modifications suggested to improve their throughput per-formance, the IEEE 802.11 MAC protocol and its variantscan suffer severe unfairness problems in multi-hop adhoc networks, due to location-dependent contention issuesand the backoff mechanisms.

Designing the appropriate backoff mechanism has beenwidely studied for achieving specific fairness guarantees[21,12,23,2]. However, irrespective of which backoff mech-anism is used, the underlying channel access scheme re-mains largely inefficient. This is because the prevailingcontention resolution mechanisms are sender-initiatedwhereas, in most cases, the receiver has better knowledgeof the channel state than the sender, and consequently canhelp to reduce the contention.

Different receiver-initiated MAC protocols have beenproposed in literature. Bharghavan et al. [3] suggested touse a Request-for-Request-To-Send (RRTS) packet mecha-nism initiated by the receiver to alleviate the unfairnessproblem. Receivers which decode an RTS packet and can-not reply with a CTS, because one of its neighbor nodeshas already started a transmission, wait until their NAV ex-pires. Once this occurs, the receivers transmit an RRTSpacket to the senders, requesting the RTS to be sent back.In this way, the RRTS packet can help reduce the extrabacking-off inefficiency and the consequent unfairness atthe expense of introducing more overhead due to the RRTSpacket itself.

Talucci and Gerla [26] proposed the MAC-BI as the firstfully receiver-initiated MAC protocol that exhibits lessoverhead than MACAW in [3]. Fullmer and Garcia-Luna-Aceves [9] suggested further improvements beyond theMAC-BI in order to achieve better throughput performancein single-hop networks with high load. Garcia-Luna-Acevesand Tzamaloukas [1] advanced the work on the 802.11MAC even further and proposed several data-collision-freereceiver-initiated MAC protocols. The data-collision-freeproperty in [1] is achieved by adding some short controlpackets to the handshake mechanism and modifying thecurrent 802.11 timing parameters.

Despite their claimed benefits, receiver-initiatedschemes have not seen wide application in practice. Thisis primarily because fully receiver-initiated schemes cansometimes initiate many unnecessary handshake packetsthat waste the network bandwidth (although this is alsotrue in the case of fully sender-initiated schemes).Moreover, the receiver-initiated schemes introduced sofar require a per-receiver traffic estimator that should suc-cessfully work under dynamic topology and traffic environ-ments. Another important reason why receiver-initiatedprotocols have not seen wide acceptance is that the state-of-the-art receiver-initiated protocols cannot interoperatewith the current widely deployed IEEE 802.11 MAC devices.

As opposed to other contention-based MAC protocols,the mechanism described in this paper is peculiar for theapproach it follows and for its ability to overcome theshortcomings of classical receiver-initiated MAC protocols.More specifically, the mechanism that we introduce doesneither imply a fully receiver-initiated scheme nor a fullysender-initiated scheme thereby avoiding the disadvan-tages of the two protocol classes which have beendiscussed above.

Page 3: Ad Hoc Networks · Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) has been adopted by the IEEE 802.11 standard and provides good performance when all transmitters

Fig. 1. Symmetric Incomplete State (SIS). A and D represent thetransmitters, while B and C represent the receivers.

A. Leonardi et al. / Ad Hoc Networks 11 (2013) 625–638 627

The new protocol we propose makes use of collisions atthe physical layer in order to predict the existence of a po-tential sender in a timely manner. Actually, other ap-proaches which use collisions at the physical layer havebeen largely studied in several recent works, though withdifferent aims. As an example, in [29,24], the authors pro-pose two methods to detect collisions in order to differen-tiate between losses due to channel noise and losses due topacket collisions. In [25], a mechanism which exploits col-lision detection based on signal correlation, is presentedand evaluated, with the purpose of attempting to approxi-mate the CSMA/CD behavior in wireless networks. In [8],the authors use collision detection to propose a new back-off algorithm which substitutes the binary exponentialbackoff implemented in the classical IEEE 802.11 DCF.

As compared to other similar solutions, the scheme wepropose does not require any traffic estimator [1,26]. Thisallows easier implementation with minimal modifications(only network driver changes are needed), simple protocoldesign, and interoperability with legacy devices imple-menting the 802.11 standard.1

3. CSMA/CARD

In this section we describe the CSMA/CARD, CarrierSense Multiple Access with Collision Avoidance by Recei-ver Detection, whose basic mechanism has been intro-duced in [19]. CSMA/CARD makes use of events occurringat the physical layer (collisions) in order to mitigate thelow performance shown by CSMA/CA protocols, such asthe one implemented in the IEEE 802.11 DCF. Low perfor-mance arises in topologies where the different transmittersare out of range; in such type of topologies, in fact, thechannel state information becomes incomplete and thepossibility to acquire the channel becomes uneven amongthe terminals.

We start describing the topologies where CSMA/CA ap-proaches fail, then, for the sake of completeness, we pres-ent an overview of the CSMA/CARD basic algorithm, andfinally we introduce an adaptive technique which furtherimproves the performance of CSMA/CARD as compared tothe results obtained in [19].

3.1. Scenarios

The Symmetric Incomplete State (SIS) and AsymmetricIncomplete State (AIS) are two exemplary scenarios whichhave been introduced in [10].

The first one, shown in Fig. 1, is characterized by short-term unfairness (s.t.u.) and long-term fairness. The originof s.t.u., mainly resides in the exponential backoff mecha-nism and in the probability of control packet loss perceivedby both transmitters, A and D. Each transmitter is notaware of the activity of the other transmitter, consequentlyit is possible that a packet is sent (for example from A)when another transmission is already started (from D). Inthis case, the receiver B cannot answer due to the NAV allo-

1 Specifically, devices using the 802.11 standard implementation simplydiscard the RRTS packets.

cation [30], consequently the transmitter (A) is forced todouble its own contention window, so decreasing its possi-bility to acquire the channel in the near future, while theother (D), after a successful transmission, reduces its con-tention window to the minimum value. This condition,where a flow dominates the other in the channel conten-tion, remains until the disadvantaged transmitter (A), oncethe retry limit is reached, drops the packet and puts itscontention window to the minimum value. At this point,the two transmitters have the same probability to acquirethe channel. In a long term, if the traffic offered is the samefor the two transmitters, each of them, in the average, willaccess the channel for the 50% of the time. Such short-termunfairness affects real-time traffic (voice, video, etc.)quality.

More problematic is the Asymmetric Incomplete State,shown in Fig. 2, which causes the starvation of a flow tothe advantage of the other one which captures all thechannel bandwidth. The fundamental difference with theprevious topology is the asymmetric perception of thechannel state from the two transmitters. In particular,transmitter A does not sense any packets belonging to flowfCD, and consequently, fully ignores the activity of the otherflow. On the other hand, sender C knows exactly when tocontend for the channel, through the control packets sentby the receiver of flow fAB. Therefore, sender A has to dis-cover an available time-slot randomly without any coordi-nation with sender C, resulting in many attempts of senderA without any response back from receiver B. Most of theserandom attempts occur in the middle of a transmission offlow fCD and result in collision at receiver B. Consequently,sender A is forced to timeout and to repeatedly double its

Fig. 2. Asymmetric Incomplete State (AIS). A and C represent thetransmitters, while B and D represent the receivers.

Page 4: Ad Hoc Networks · Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) has been adopted by the IEEE 802.11 standard and provides good performance when all transmitters

628 A. Leonardi et al. / Ad Hoc Networks 11 (2013) 625–638

contention window, thus reducing the chances of attempt-ing a new transmission in the next available time slot. As aconsequence, the throughput of flow fAB approaches zero,even if the fraction of time sensed busy by sender A is zero.

3.2. Basic mechanism

CSMA/CARD can be considered a hybrid solution, bothsender-and-receiver-initiated, where each receiver canpredict the existence of a potential sender in a timely man-ner while minimizing the probability of false predictionsand maximizing that of true ones. The approach for coun-teracting such a challenge is by making use of the eventsoccurring at the physical layer. In particular, detection ofsignificant received signal power variations can be proba-bilistically interpreted as handshake messages initiatedby a potential sender. The receiver then, anticipating a sen-der-initiated handshake attempt, reacts accordingly (oncethe channel is sensed idle) by participating itself in thehandshake sequence.

Specifically, whenever a collision is detected2 at a node(two packets are transmitted simultaneously within therange of this node), the node can assume that, with a certainprobability, the collision took place with an RTS packet whichwas intended for it, and it broadcasts a Request-for-Request-To-Send (RRTS) packet accordingly. Bharghavan et al. [3] hada similar receiver cooperation approach as the one proposedhere in the context of CSMA/CA protocols which does not relyon physical layer events, but it works only if the RTS is cor-rectly decoded by the receiver (i.e., in the SIS case).

Note that CSMA/CARD is based on IEEE 802.11 DCFmechanisms, and we will use in the following the sameterminology and most of the parameters already used inIEEE 802.11 DCF. If not differently specified, the value ofthe parameters (DIFS, SIFS, EIFS, RTS and CTS size) are thesame of those in [30].

Now, denote a potential receiver by R and the set of allits potential sending neighbors by SR. Upon an RTS trans-mission by a node S 2 SR, R will send back a CTS if R is inthe idle state. Otherwise, if R is not in the idle state, wecan distinguish two different cases depending on whetherR is able to decode the RTS or not.

3.2.1. Decodable RTSIn this case, the CSMA/CARD behaves in the same way

as described in [3]. R is able to decode the RTS packet ofS but it cannot reply because it is in a defer state due to an-other transmission sensed within its radio range. Thismeans that R has the NAV allocated and it cannot act untilits expiration [30]. Right after R’s NAV expires, R contendsthe channel at the minimum contention window, CWmin

([0,31]), and it sends an RRTS packet to S. When the RRTSpacket is received by S, S defers for a SIFS period and itsends back an RTS packet to R. Any node Ni R SR which re-ceives the RRTS packet will set its NAV to:

2 Please refer to [19] where the authors show how to use the knownmethods of the detection theory [16] to solve the collision detectionproblem. Other approaches, based on transmission time information and RFenergy, signature correlation, Received Signal Strength, can be found in[29,25,24], respectively.

NAVðRRTSÞ ¼ SIFSþ RTSþ SIFSþ CTS: ð1Þ

When R receives the RTS, it will answer with a CTS becausethe channel has been reserved thanks to the RRTS.

The temporal evolution of the channel state perceivedfrom the receiver R, the transmitter S and the other nodes,Ni, within the radio range of R, is represented in Fig. 3.

This mechanism can be applied to the SIS topology(Fig. 1) where it has been demonstrated [10] that it par-tially mitigates the observed short-term unfairness.

3.2.2. Non-decodable RTSThe main novelty of CSMA/CARD concerns the manage-

ment of the case when the RTS cannot be decoded becauseit has been corrupted by other concurrent transmissions.From now on we will investigate this scenario.

In this case, R detects a collision for the duration of anRTS packet while R is not already in the process of anothertransmission procedure (i.e., R has not just sent or receiveda CTS or a DATA packet). Suppose that the collision in-volves an RTS packet sent from a potential sender S 2 SR

(the case when the collision is due to other packets thanRTS will be considered later). In such a case, R broadcastsan RRTS packet deferring at the minimum contention win-dow, CWmin([0,31]), after R’s NAV expires by an Extended-IFS (EIFS) period [30] (this time has been defined in theIEEE 802.11 DCF standard as the time to wait after a colli-sion). The RRTS is sent broadcast because in this case thereceiver does not know the address of the sender.

When the interested node S receives R’s RRTS, it willcontend for sending an RTS to R at the minimum conten-tion window size CWmin([0,31]). As it is possible, there ismore than one potential sender to R, sending such an RTStakes place by contention where a node S would start con-tending after deferring for a DIFS period. Consequently,upon the reception of the RRTS, all the other nodes inNi R SR will set their NAV for a period of time equal to:

NAVðRRTSÞ ¼ DIFSþ CWmin þ RTSþ SIFSþ CTS: ð2Þ

Fig. 4 illustrates the temporal evolution of the proposedmechanism. This procedure can be applied to the AIStopology, shown in Fig. 2.

Analytical and simulation results presented in [19]show that CSMA/CARD, when applied to the AIS scenario,achieves almost perfect fairness.

We report in Table 1 the most significant resultsobtained in [19]. In particular we report the value of the

Fig. 3. CSMA/CARD behavior when the RTS received is decodable.

Page 5: Ad Hoc Networks · Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) has been adopted by the IEEE 802.11 standard and provides good performance when all transmitters

Fig. 4. CSMA/CARD behavior when the RTS received is non-decodable.

Table 1Collision probability and normalized throughput achieved in AIS scenario.

CSMA/CA CSMA/CARD

p(A) 0.9364 0.5602TP(A) 0.0093 0.4170TP(C) 0.7961 0.4385

Fig. 5. Situation of starvation for the pair 3–4 without a right choice oftimeout.

A. Leonardi et al. / Ad Hoc Networks 11 (2013) 625–638 629

collision probability calculated for A, p(A), and the normal-ized throughput of node A and C, respectively TP(A) andTP(C), when the CSMA/CA and CSMA/CARD are considered.The analytical results show that the collision probabilityevaluated for node A using the CSMA/CA approach is al-most 1; it means that the flow fAB is starved while, usingthe CSMA/CARD approach, this value of collision probabil-ity drops down to about 50%. Moreover, the value ofthroughput calculated for flow fAB is almost the same ofthat evaluated for fCD.

3.3. Adaptive CSMA/CARD

Performance results obtained for random topologies in[19] show that CSMA/CARD alleviates the problem of star-vation. However, it is possible to observe that in severalcases (high density of nodes and specific topologies) tuningthe number of RRTS sent is a key factor in order to obtainbetter performance. This is due to the fact that, when thenumber of nodes contending for the channel increases,the number of collisions among packets increases as well,and consequently it may happen that RRTS packets aresent in response to collisions that are not due to an RTSbut to other packets originated by neighbor nodes (notethat this occurs only in the AIS topologies).

This wrong behavior of CSMA/CARD leads to an increaseof collisions due to RRTS packets and could be fixedthrough a mechanism which adaptively adjusts the proba-bility to send RRTS.

3.3.1. Probability to send RRTSIn order to tune the probability to send RRTS, we have

created an algorithm which takes into account the numberof responses to the RRTS received in the past. This algo-rithm, which runs in the receiver, relies in a variable, calledprobability to send RRTS, PRRTS, and two constants, K+ and K�,which represent the increment and decrement factors.

When a collision occurs, the receiver station sends anRRTS with a probability, PRRTS, and starts a timer which rep-

resents the estimated time the receiver station has to waitin order to receive an answer to the RRTS sent. The timerexpires after an interval equal to:

timeout ¼ TXðRRTSÞ þ dþ DIFSþ CWmin þ TXðRTSÞ þ d;

ð3Þ

where TX (RRTS) and TX (RTS) represent the time neededto transmit an RRTS and RTS respectively, and d representsthe propagation time. Each time the receiver does notreceive a response by the expiration of the timeout, thePRRTS is decreased by K�, until a threshold value calledThresholdmin. Otherwise, if a response arrives by the expira-tion of the timeout, the PRRTS is increased by K+, until amaximum value called Thresholdmax.

In the first case, this mechanism limits the number ofRRTS which will be sent in the future, when the collisionsperceived in the past are not due to potential senders,while in the second case, it increases the probability tosend RRTS if the situation of starvation occurs.

The values of K+, K�, PRRTS, Thresholdmin and Thresholdmax

will be discussed in Section 5.

3.3.2. Tuning timeoutThe CSMA/CARD mechanism described until now is

effective only when the potential transmitter can answerthe RRTS almost immediately. Otherwise, when the trans-mitter is in defer state due to other on-going transmissionsaround its coverage area, it is possible that the estimatedtime chosen by the receiver to finalize the handshake, ascalculated in Eq. (3), is not sufficient and consequentlythe timeout expires before the reception of an answer tothe RRTS.

In order to solve this problem, the CSMA/CARD, beforedecreasing the PRRTS, checks if the lack of answer to theRRTS could be solved by increasing the value of the time-out. Correspondingly, the algorithm increases the value ofNAV (RRTS), included in the packet RRTS, which specifiesto the neighbor nodes the period of time in order to settheir NAV.

We can better explain the importance of this improve-ment by looking at Fig. 5. Let us assume all the sendersare backlogged. Using a classical CSMA/CA approach or aCSMA/CARD without the right tuning of the timeout, theflow 3–4 reaches very low values of throughput, some-times close to zero. This is because node 4, once a collisionhas been detected, waits for the end of the communicationbetween 5–6, and then it sends an RRTS. Unfortunately,node 3 cannot answer this RRTS because it is in a deferstate due to the communication between 1–2. Conse-quently, the channel will be occupied again by the

Page 6: Ad Hoc Networks · Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) has been adopted by the IEEE 802.11 standard and provides good performance when all transmitters

Fig. 6. Pseudo-code of the procedure called after a collision.

630 A. Leonardi et al. / Ad Hoc Networks 11 (2013) 625–638

communication between 5–6. This situation can be solvedincreasing the period of time that the other nodes shoulddefer their transmission, and consequently the timeout. Inparticular, once the RRTS is received, node 5 sets its NAVto the following value:

NAVðRRTSÞ ¼ DIFSþ k � CWmin þ RTSþ SIFSþ CTS; ð4Þ

while the receiver 4 will wait for the answer for a period oftime equal to:

timeout ¼ TXðRRTSÞ þ dþ DIFSþ k � CWmin þ TXðRTSÞ þ d:

ð5Þ

Note that when k = 1, Eq. (4) becomes Eq. (2), i.e. themechanism behaves as in the basic mode. The rightchoice of the value of the parameter k will be discussedin Section 5.

3.4. Algorithms

In this section we describe the main algorithms whichrealize the procedures described above. More specifically,some of these algorithms use new functions, others usemodifications of the classical IEEE 802.11 functions.

3.4.1. Handle_collision()Once a collision has occurred, the algorithm checks if

the node (in this case the receiver) is not already involvedin another transmission, i.e., there are no control packets(CTS or ACK) ready to be sent. Then, a random number isgenerated and compared to the value of PRRTS. If theresponse is positive (i.e., the receiver is able to send anRTS), it checks a boolean variable called Inc._NAV and inaccordance with its value the receiver chooses to use eitheran extended NAV (RRTS) (see Eq. (4)) or a standard one (seeEq. (2)). After that, it sets the value of timeout accordingly.Then, the node prepares the RRTS packet with destinationBROADCAST (note that we are in the AIS case) and the cho-sen NAV (RRTS). It waits a period of time equal to EIFS andthen it starts a backoff with a value of contention window

equal to CWmin. At the expiration of the backoff, if the chan-nel is free, the packet will be transmitted and a timer ofduration timeout starts. Pseudo-code of the handle_collision() algorithm is reported in Fig. 6.

3.4.2. Receive_RTS()When a node receives an RTS, it checks if this RTS has

been sent in response to an RRTS. If this is the case, thealgorithm increases the value of PRRTS by K+, and it checksif the new value is less than Thresholdmax. Then, the variableRRTS_replied, which takes into account the number ofconsecutive successful transmissions, is updated. IfRRTS_replied reaches the value of RRTS_replied_limit andthe value Inc._NAV is TRUE, this means that with high prob-ability the congestion occurred in the past has terminated,and consequently the variable Inc._NAV could be set toFALSE (this will set the following NAV (RRTS) to a standardvalue). Moreover, the variable RRTS_no_replied is set tozero. Finally, a CTS is sent. The value of RRTS_replied_limitwill be discussed in Section 5. Pseudo-code of thereceive_RTS() algorithm is reported in Fig. 7.

3.4.3. Handle_timer()If the timer expires without response to the RRTS, it

means that the collision sensed is due to either noise orcontention among packets belonging to other flows, orthe potential sender cannot reply because the channelsensed is busy. Accordingly, the PRRTS (if its value is higherthan Thresholdmin) is decreased by K�. Then, the variableRRTS_no_replied, which takes into account the number ofconsecutive unsuccessful transmissions, is increased andif it reaches the value RRTS_no_replied_limit, it is possibleclue that the channel sensed by the transmitter is con-gested. Consequently, if Inc._NAV is set to FALSE, it willbe set to TRUE, otherwise, it means that increasing theduration field has not improved the situation, conse-quently the NAV is brought to its previous value, and thevalue of RRTS_no_replied_limit is doubled. This last actionallows to wait until a possible congestion around the

Page 7: Ad Hoc Networks · Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) has been adopted by the IEEE 802.11 standard and provides good performance when all transmitters

Fig. 7. Pseudo-code of the procedure called after an RTS has been received.

Fig. 8. Pseudo-code of the procedure called after the expiration of the timeout.

A. Leonardi et al. / Ad Hoc Networks 11 (2013) 625–638 631

sender is finished. Then, the variable RRTS_no_replied is setto zero. Finally, the variable RRTS_replied is set to zero. Thevalue of RRTS_no_replied_limit will be discussed in Section5. Pseudo-code of the handle_timer() algorithm is reportedin Fig. 8.

Fig. 9. Scenario.

4. Analysis

In this Section we derive the analysis of the proposedmechanism in the scenario shown in Fig. 9. This scenariocan be considered an extension of the asymmetric incom-plete state (AIS), already shown in Fig. 2, in which we con-sider N transmitter–receiver pairs which contend for themedium with another flow, A–B. Therefore, there are Ntransmitters all of which are in the same range and alsoin the range of receiver B.3

3 It is worth pointing out that the aim of the proposed approach is tomitigate starvation occurring in scenarios similar to the AIS, consequentlythe scenario in Fig. 9 represents the most suitable to evaluate both theeffect of the proposed approach for improving the throughput of the flowA–B, and the influence of the RRTS packets on the data transmissions ofneighbor nodes.

The model we follow in this section borrows from thatderived in [4,10]. In particular, we build a model represent-ing the channel state as seen by the individual channelsources and we compute the per-flow throughput thatcan be achieved using CSMA/CARD.

According to this model, the behavior of an arbitrarystation employing a CSMA/CARD protocol can be identifiedby four different states: (i) idle, (ii) occupied by a successfultransmission of the station, (iii) occupied by a collision

Page 8: Ad Hoc Networks · Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) has been adopted by the IEEE 802.11 standard and provides good performance when all transmitters

632 A. Leonardi et al. / Ad Hoc Networks 11 (2013) 625–638

involving or not a transmission of the station, and (iv) busydue to the activity of other nodes.

The time intervals during which the station remains ineach of the four states above are denoted by r, Ts, Tc andTb, respectively.

Because we are interested to the saturation throughput,we will assume in the following that each node has alwaysa packet ready to be sent.

We start analyzing the exponential backoff mechanismassociated with the CSMA/CARD mechanism and the relatedcollision probability. As already happens in the IEEE 802.11DCF, also in the CSMA/CARD each station starts its backoffprocess after the channel has been sensed idle for a timeinterval equal to DIFS. In particular, as a first attempt, thenode tries to send a packet using a minimum contentionwindow equal to CWmin. Each time a collision occurs, thecontention window is doubled until a maximum valueCWmax, or a maximum retransmission limit, M, is reached.

If we call m the maximum number of backoff step, wehave:

m ¼ log2CWmax

CWmin

� �: ð6Þ

Assuming W the average backoff window in the saturationcase and s the probability of a node’s transmission in a slot,it follows that s ¼ 1=W . The expression of W has been cal-culated in [22] and it is given by:

W ¼1�p�pð2pÞm

1�2p � CWmin2 M P m

1�p�pð2pÞM�1

1�2p � CWmin2 M < m

8<: ; ð7Þ

where p is the probability that a transmission of the stationis not successful due to a collision.

In order to calculate p, we note that, assuming ascenario with N nodes, the probability that a transmissionis successful is the probability that none of the other N � 1nodes transmit in that time slot, i.e. 1 � p = (1 � s)N�1.

Assuming M P m, it follows that:

p ¼ 1� 1� 1� 2p1� p� p � ð2pÞm

� 2CWmin

� �N�1

: ð8Þ

Now, we derive the throughput, q, which can be calcu-lated as:

q ¼ PS

D; ð9Þ

where PS represents the probability that a node transmitsa packet successfully, and D is the average cycle time.

We denote with Ts,N the duration of a successfultransmission performed by one of the N transmitters, withTs,AB the duration of a successful transmission belonging tothe pair A–B (note that we are in the AIS configuration andconsequently we can assume that the communicationbetween A and B usually occurs after an RRTS sent by nodeB), and with Tc the time needed in order to detect a colli-sion. In particular:

Ts;N ¼ RTSþ SIFSþ CTSþ SIFSþ EfPg þ SIFSþ ACK þ DIFS;

Ts;AB ¼ RRTSþ DIFSþ CWmin=2þ RTSþ SIFSþþCTSþ SIFS

þ EfPg þ SIFSþ ACK þ DIFS;

Tc ¼ RTSþ DIFS; ð10Þ

where E{P} represents the average size of the packet. More-over, we are assuming that the propagation delay is negli-gible and we are supposing that A transmits the RTS packetsolicited by an RRTS using a constant contention window,CWmin; consequently, the average backoff time is CWmin/2.

Now we call sB and sN the probability of node B’s trans-mission and the probability of one of the N’s transmissionin a slot, respectively. Node B always transmits the RRTSpacket using CWmin, thus:

sB ¼2

CWmin; ð11Þ

and

sN ¼ð1� 2pÞ

1� p� p � ð2pÞm� 2CWmin

: ð12Þ

Moreover, knowing p and sN, we can calculate c, which rep-resents the probability that a collision occurs among thepackets sent from the N transmitters. This probability canbe calculated as the probability that at least two of the Nnodes transmit in the same time:

c ¼ 1� ð1� sNÞN � N � sN � ð1� pÞ: ð13Þ

Now we can proceed with the calculation of the through-put, qN, of the N transmitters:

qN ¼Ps;N

DN; ð14Þ

where

DN ¼ Ps;N � Ts;N þPidle � rþPc � Tc þPb;B � Ts;AB

þPb;N � Ts;N ; ð15Þ

Ps,N represents the probability that one of the N nodestransmits a packet successfully, Pidle the probability thatthe channel remains idle, Pc the probability that a collisionoccurs, Pb,B and Pb,N the probabilities that the channel isbusy due to a transmission by node B, or a transmissionby one of the other N � 1 nodes, respectively. The previousprobabilities can be calculated as:

Ps;N ¼ sN � ð1� pÞPidle ¼ ð1� sBÞ � ð1� sNÞN

Pc ¼ c

Pb;B ¼ sB � ð1� sNÞN

Pb;N ¼ ðN � 1Þ � sN � ð1� pÞ:

ð16Þ

Concerning the pair A–B, the throughput can be calculatedas:

qAB ¼Ps;AB

DAB; ð17Þ

where

DAB ¼ Ps;AB � Ts;AB þPidle � rþPc � ðTc þ Ts;NÞ þP0b;N � Ts;N;

ð18Þ

Ps,AB represents the probability that B transmits a packetsuccessfully, and P0b;N the probability that the channel is

Page 9: Ad Hoc Networks · Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) has been adopted by the IEEE 802.11 standard and provides good performance when all transmitters

1 2 3 4 5 6 7 8 90

10

20

30

40

50

60

70

80

90

100

110Th

roug

hput

[pkt

s/s]

N

A−Bothers

Fig. 10. Analytical value of CSMA/CARD throughput.

Table 2Simulation parameters.

Parameter Value

Slot time tslot 20 lsSIFS 10 lsDIFS 50 lsRTS size 36 bytesRRTS size 36 bytesCTS size 30 bytesDATA size 1000 bytesACK size 30 bytesCWmin (for CSMA/CARD) [0,31]CWmin (for CSMA/CA) [0,31]CWmax 1024Data rate 2 Mb/sThresholdmax 1Thresholdmin 0.1K+ 1.2K� 0.8PRRTS 0.5RRTS_no_replied_limit 4RRTS_replied_limit 4

A. Leonardi et al. / Ad Hoc Networks 11 (2013) 625–638 633

busy due to a transmission by the N nodes. Analogously toEq. (15), these probabilities can be calculated as:

Ps;AB ¼ sB � ð1� sNÞN

P0b;N ¼ N � sN � ð1� pÞ:

Concerning the collision time, it is composed of the timeneeded to detect a collision, Tc, as calculated above, plusthe time needed, by one of the N nodes, to perform a suc-cessful transmission, Ts,N.

In Fig. 10, we show the values of qN and qAB when thenumber of transmitters, N, varies in the range {1 . . . 9}.Results obtained in the figure show that qN and qAB startvery close to each other but, when the number of transmit-ters increases, the throughput calculated separates by asmuch as 10 packets per second. This difference is due tothe increasing packet collision and the following increaseof the average contention window, W, for the N transmit-ters which are disadvantaged with respect to node B whichsends the RRTS using a CWmin.

5. Performance evaluation

In this section we consider the adaptive version ofCSMA/CARD and we discuss the results obtained usingthe well-known ns-2 platform [31]. For comparison, the re-sults for the CSMA/CA protocol specified in the IEEE 802.11standard are also shown.

Each simulation was run for 100 s after a 5-s warm-upperiod. If not specified otherwise, backlogged traffic (i.e.each transmitter in the network has always packets tosend) and stationary conditions were assumed. In all thesimulations we supposed both sensing range and transmis-sion range equal to 250 m, and we used for the physicallayer the default values of the two-ray ground parameters.

Other simulation parameters are summarized in Table 2.Extensive simulations show that these values represent theoptimal values for the considered parameters in order toobtain the best performance.

5.1. Simulation scenarios

We considered two different scenarios.

5.1.1. Scenario 1This scenario is the same described in Section 4, Fig. 9.

When CSMA/CA is used in this scenario, flow A–B isstarved. If the basic mechanism of CSMA/CARD is used(assuming a contention window associated to the trans-mission of RRTS shorter than the standard one), we notethat, when N increases, the flow A–B achieves a higherthroughput as compared to the other flows. In particular,it moves from a starved state to a role of dominant flow.The adaptive CSMA/CARD, as shown in the following,solves this problem by properly adapting the probabilityto send RRTS.

5.1.2. Scenario 2In this scenario we consider a sparse topology where 25

source–destination pairs are randomly distributed insideareas of different sizes (2000 m � 2000 m, 1500 m �1500 m, 1000 m � 1000 m). Note that all the nodes haveat least one neighbor and that channel contention, hiddenterminals, and information asymmetry effects are present.This scenario allows us to describe the CSMA/CARD behav-ior and the throughput enhancements in comparison toCSMA/CA taking into account the density of nodes in theconsidered area and, consequently, the incidence of allthe possible configurations which can occur in randomcases.

5.2. Results

First of all, we compare the analytical and simulationresults and we discuss the choice of the value of theparameter k which tunes the duration of the timeout. Then,in order to show how the proposed approach outperformsthe standard CSMA/CA protocol, we compare the flows’throughput and Jain’s fairness index [13] for the scenariosshown above. In particular, our simulations highlight how,using CSMA/CA protocol, the starvation situation arisesand many flows get very low or even zero throughputand how, instead, CSMA/CARD alleviates the problem of

Page 10: Ad Hoc Networks · Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) has been adopted by the IEEE 802.11 standard and provides good performance when all transmitters

634 A. Leonardi et al. / Ad Hoc Networks 11 (2013) 625–638

starvation in all the scenarios considered, increasing thethroughput of disadvantaged connections and consider-ably reducing the number of starved flows.

Moreover, CSMA/CARD allows to better distribute thebandwidth and, consequently, achieves higher values offairness if compared to CSMA/CA.

5.2.1. Model validationFig. 11 shows the simulated and estimated values of

throughput (pkts/s) obtained by means of the simulatorand by means of Eqs. (14) and (17). We have consideredScenario 1, when the number of contenders, N, varies inthe range {1 . . . 9}. In particular, Fig. 11a shows the valueof throughput for the flow A–B, while Fig. 11b shows thevalue of the average throughput for the other flows. Firstof all, the estimated and simulated values of throughputare very close to each other. Secondly, in some cases, sim-ulated values are lower than estimated values, because thesimulator takes into account several realistic factors, suchas channel losses, which are not included in the analyticalstudy.

1 2 3 4 5 6 7 8 90

10

20

30

40

50

60

70

80

90

100

110

Thro

ughp

ut [p

kts/

s]

N

modelsimu

1 2 3 4 5 6 7 8 90

10

20

30

40

50

60

70

80

90

100

110

Thro

ughp

ut [p

kts/

s]

N

modelsimu

Fig. 11. Comparison between model and experimental resultsin Scenario 1.

5.2.2. Choice of the timeout valueAs we have already discussed in Section 3.3, a good

choice of the timeout helps to solve the situations where atransmitter cannot answer an RRTS because is in a deferstate due to other transmissions. If we assume that allnodes transmit packets of the same length and that in theaverage the collision occurs in the middle of a successfultransmission, it is convenient to choose a value of k so thatk � CWmin (which represents the additional waiting time)belongs to the interval [Ts/2,Ts], where Ts is the time intervaloccupied by a successful transmission (see Section 4).

In Fig. 12, we present the value of throughput for theconnection 3–4 shown in Fig. 5, when the parameter k var-ies in the range {1 . . . 10}. As it can be observed, connection3–4, without a good choice of parameter k, is starved.Moreover, a value of k greater than 6 does not increase fur-ther the value of throughput for the connection 3–4, ratherit may excessively slow down the other connections.Therefore, in our simulations, we have chosen a value ofk equal to:

k ¼ ½Ts=ð2 � CWminÞ� þ 1: ð19Þ

In the following, we evaluate the other parameters by con-sidering the value of the timeout calculated as discussedabove.

5.2.3. Throughput enhancementsIn Fig. 13, we concentrate our attention on the through-

put of connection A–B in Scenario 1, specifically, when thenumber of concurrent pairs increases (from 1 to 9). We ob-serve that when the CSMA/CARD is used, the connectionA–B no longer suffers starvation (i.e., throughput close tozero), reaching a value of throughput which is from threeto ten times higher than the throughput obtained withCSMA/CA. Obviously, when the number of contendingpairs increases, the throughput of pair A–B decreases, aswell as the other pairs. In the following we analyze indetail the distribution of the bandwidth among the nodes.

Fig. 14, shows the number of flows starved (i.e., thenumber of flows having a throughput close to zero) usingCSMA/CA and CSMA/CARD in 100 different random

1 2 3 4 5 6 7 8 9 100

10

20

30

40

50

60

70

Thro

ughp

ut [p

kts/

s]

k

Fig. 12. Throughput of the flow 3–4 vs. k in the scenario shown in Fig. 5.

Page 11: Ad Hoc Networks · Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) has been adopted by the IEEE 802.11 standard and provides good performance when all transmitters

1 2 3 4 5 6 7 8 90

10

20

30

40

50

60

70

80

90Th

roug

hput

of c

onne

ctio

n A−

B [p

kts/

s]

N

CSMA/CACSMA/CARD

Fig. 13. Comparison between CSMA/CA and CSMA/CARD throughput forthe connection A–B in Scenario 1.

A. Leonardi et al. / Ad Hoc Networks 11 (2013) 625–638 635

distribution of nodes in Scenario 2, and for three differentarea sizes.

First of all, we observe that CSMA/CARD reduces both themaximum and the average number of flows starved. More-over, we observe that, when CSMA/CA is used, and the areasize is reduced, the number of flows starved increases. This

10 20 30 40 50 60 70 80 90 1000

2

4

6

8CSMA/CAaverage

10 20 30 40 50 60 70 80 90 1000

2

4

6

8

Topology number (1000m x1000m)

CSMA/CARDaverage

10 20 30 400

2

4

6

8

10 20 30 400

2

4

6

8

Topology numbe

Num

ber o

f flo

ws

s

tarv

edN

umbe

r of f

low

s

sta

rved

Num

ber o

f flo

ws

s

tarv

edN

umbe

r of f

low

s

sta

rved

Fig. 14. Number of flows starved in Scenario 2 f

happens because, in the considered scenario, the number ofnodes contending for the channel increases and conse-quently the number of critical configurations which cannotbe solved by the classical CSMA/CA (e.g. AIS and SIS) in-creases as well. Instead, when CSMA/CARD is used and thearea size changes, the number of flows starved remainsabout the same (see the average number in the plots). Thestarved flows for each area size is due to some critical topol-ogies like the flow in the middle [11], which can be solvedonly with approaches different from the CSMA/CA family(e.g. multichannel or out-of-band control channel).

Finally, in Fig. 15 we show the value of the throughputaveraged among the five connections having the lowest va-lue of throughput (the five connections more disadvan-taged) for the three cases of Scenario 2, when bothCSMA/CA and CSMA/CARD are used. As shown in this fig-ure, CSMA/CARD alleviates the problem of starved flows,providing a higher value of the throughput for the disad-vantaged connections in all the cases examined.

It is worth pointing out that the previous results takeinto account the effect of the timeout which acts on thenodes in the coverage area of the receiver.

5.2.4. Fairness indexWe now show the fairness improvements achievable by

using the CSMA/CARD in the two scenarios.

10 20 30 40 50 60 70 80 90 1000

2

4

6

8CSMA/CAaverage

10 20 30 40 50 60 70 80 90 1000

2

4

6

8

Topology number (1500m x1500m)

CSMA/CARDaverage

50 60 70 80 90 100

CSMA/CAaverage

50 60 70 80 90 100r (2000m x2000m)

Num

ber o

f flo

ws

s

tarv

edN

umbe

r of f

low

s

sta

rved

CSMA/CARDaverage

or 100 topologies and different area sizes.

Page 12: Ad Hoc Networks · Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) has been adopted by the IEEE 802.11 standard and provides good performance when all transmitters

1000x1000 1500x1500 2000x20000

1

2

3

4

5

6

7

8

9Av

erag

e of

the

5 lo

wes

t thr

ough

put [

pkts

/s]

Scenario

CSMA/CACSMA/CARD

Fig. 15. Comparison between CSMA/CA and CSMA/CARD averageminimum throughput in Scenario 2.

1 2 3 4 5 6 7 8 90.5

0.55

0.6

0.65

0.7

0.75

0.8

0.85

0.9

0.95

1

Inde

x of

Fai

rnes

s

N

CSMA/CACSMA/CARD

Fig. 16. Comparison between CSMA/CA and CSMA/CARD fairness index inScenario 1.

1000x1000 1500x1500 2000x20000

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

Mea

n In

dex

of F

airn

ess

Scenario

CSMA/CACSMA/CARD

Fig. 17. Comparison between CSMA/CA and CSMA/CARD fairness index inScenario 2.

636 A. Leonardi et al. / Ad Hoc Networks 11 (2013) 625–638

In the literature several fairness indexes have been pro-posed. Here we consider Jain’s fairness index [13] definedas follows:

rðs1; s2; . . . sMÞ ¼PM

i¼1si

� �2

MPM

i¼1s2i

; ð20Þ

where si, with i 6M, is the throughput for the ithconnection.

When CSMA/CARD is used in Scenario 1, it avoids starva-tion of flow A–B allowing fair access to the medium even ifthe number of contending neighbors increases. Fig. 16shows how CSMA/CARD outperforms CSMA/CA, reachingvalues of fairness index approximately equal to 1 also fora large number of contending senders in the range of recei-ver 2. When the number of nodes, N, increases, the index offairness decreases. This is due to the behavior of the flowA–B which becomes dominant in the transmissionsbecause it always uses a minimum congestion windowvalue, CWmin.

We also note that, when the number of contendingpairs increase, CSMA/CA fairly distributes the bandwidthamong the remaining transmitters (in the same range)even if the flow A–B remains starved (see Fig. 13).

In Fig. 17 we compare the values of fairness index usingCSMA/CARD and those obtained using CSMA/CA for thethree cases of Scenario 2. As expected, the CSMA/CARD be-haves better than the CSMA/CA protocol; moreover, thefairness index decreases for both protocols when the den-sity of nodes, and consequently the incidence of criticalconfigurations, such as asymmetric incomplete state andflow in the middle, increases.

6. Conclusions

In this paper a new mechanism, called CSMA/CARD, hasbeen introduced. This solution is based on a novel recei-ver-initiated mechanism which exploits some informationat the physical level. More specifically, collision sensed bythe receiver can be used to predict whether some senderattempted to initiate a transmission towards that receiver.Using this information, the receiver can initiate an action,by sending some packets called RRTS, to help to expeditethe handshake mechanism and to avoid the starvation ofsome flows.

We have discussed an adaptive version of this mecha-nism which, according to traffic conditions occurring inthe neighborhood, tunes the number of RRTS to be sentin order to reduce extra collisions due to RRTS packets,and consequently improves the performance. The resultsobtained show that the proposed mechanism alleviatesthe problem of starvation in all the scenarios considered.

References

[1] J.J. Garcia-Luna-Aceves, A. Tzamaloukas, Receiver-initiated collisionavoidance in wireless networks, ACM Wireless Networks 8 (2002)249–263.

[2] B. Bensaou, Y. Wang, C.C. Ko, Fair medium access in 802.11 basedwireless ad-hoc networks, in: Proceedings of MobiHoc 2000, Boston,MA, USA, August 2000.

Page 13: Ad Hoc Networks · Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) has been adopted by the IEEE 802.11 standard and provides good performance when all transmitters

A. Leonardi et al. / Ad Hoc Networks 11 (2013) 625–638 637

[3] V. Bharghavan, A. Demers, S. Shenker, L. Zhang, MACAW: a mediaaccess protocol for wireless LAN’s, in: Proceedings of SIGCOMM ’94,London, UK, September 1994.

[4] G. Bianchi, Performance analysis of the IEEE 802.11 distributedcoordination function, IEEE Journal on Selected Areas inCommunications 18 (3) (2000) 535–547.

[5] M. Cesana, D. Maniezzo, P. Bergamo, M. Gerla, Interference aware(IA) MAC: an enhancement to IEEE802.11b DCF, in: Proceedings ofIEEE VTC ’03, Orlando, Florida, USA, October 2003.

[6] K. Chen, Medium access control of wireless LANs for mobilecomputing, IEEE Network 8 (5) (1994) 50–63.

[7] J. Deng, Z. Haas, Dual busy tone multiple access (DBTMA) – amultiple access control scheme for ad hoc networks, IEEETransactions on Communications 50 (6) (2002).

[8] J. Deng, P.K. Varshney, J. Haas, A new backoff algorithm for the IEEE802.11 distributed coordination function, in: Proceedings ofCommunication Networks and Distributed Systems Modeling andSimulations (CNDS 04), San Diego, CA, USA, January 2004.

[9] C.L. Fullmer, J. Garcia-Luna-Aceves, FAMA-PJ: a channel accessprotocol for wireless LANs, in: Proceedings of ACM MobiCom ’95,Berkeley, CA, USA, November 1995.

[10] M. Garetto, J. Shi, E. Knightly, Modeling media access in embeddedtwo-flow topologies of multi-hop wireless networks, in: Proceedingsof ACM MobiCom 2005, Cologne, Germany, August 2005.

[11] M. Garetto, T. Salonidis, E. Knightly, Modeling per-flow throughputand capturing starvation in CSMA multi-hop wireless networks, in:Proceedings of IEEE INFOCOM 2006, Barcelona, Spain, April 2006.

[12] X. Huang, B. Bensaou, On max-min fairness and scheduling inwireless ad-hoc networks: analytical framework andimplementation, in: Proceedings of ACM MobiHoc ’01, Long Beach,CA, USA, October 2001.

[13] R. Jain, D. Chiu, W. Hawe, A quantitative measure of fairness anddiscrimination for resource allocation in shared computer systems,DEC Research Report, September 1984.

[14] Y. Jian, S. Chen, Can CSMA/CA networks be made fair? in:Proceedings of ACM MobiCom’08, San Francisco, CA, USA,September 2008.

[15] P. Karn, MACA – a new channel access method for packet radio, in:Proceedings of ARRL/CRRL Amateur Radio 9th Computer NetworkingConference, September 1990.

[16] S.M. Kay, Fundamentals of Statistical Signal Processing – DetectionTheory, Prentice-Hall, 1998.

[17] L. Kleinrock, F.A. Tobagi, Packet switching in radio channels, IEEETransactions on Communication 23 (12) (1975) 1400–1416.

[18] B.M. Leiner, D.L. Nielson, F.A. Tobagi, Issues in packet radio design,IEEE Proceedings 75 (1987).

[19] A. Leonardi, S. Palazzo, A. Kabbani, E. Knightly, Exploiting physicallayer detection techniques to mitigate starvation in CSMA/CAwireless networks, in: Proceedings of IEEE WONS’07, Obergurgl,Austria, January 2007.

[20] J.P. Monks, V. Bharghavan, W.-M.W. Hwu, A power controlledmultiple access protocol for wireless packet networks, inProceedings of IEEE INFOCOM ’01, Alaska, April 2001.

[21] T. Ozugur, M. Naghshineh, P. Kermani, C.M. Olsen, B. Rezvani, J.A.Copeland, Balanced media access methods for wireless networks,in: Proceedings of ACM MobiCom’98, Dallas, Texas, USA, October1998.

[22] J. Peng, L. Cheng, B. Sikdar, A wireless MAC protocol withcollision detection, IEEE Transactions on Mobile Computing 6 (12)(2007).

[23] K.K. Ramakrishnan, H. Yang, The ethernet capture effect: analysisand solution, in: Proceedings 19th Conference on Local ComputerNetworks (LCN ’94), Minneapolis, MN, USA, October 1994.

[24] S. Rayanchu, A. Mishra, D. Agrawal, S. Saha, S Banerjee, Diagnosingwireless packet losses in 802.11: separating collision from weaksignal, in: Proceedings of INFOCOM 2008, Phoenix, AZ, USA, April2008.

[25] S. Sen, R.R. Choudhury, S. Nelakuditi, CSMA/CN: carrier sensemultiple access with collision notification, in: Proceedings of theSixteenth Annual International Conference on Mobile Computingand Networking (MobiCom ’10), Chicago, IL, USA, September 2010.

[26] F. Talucci, M. Gerla, MACA-BI (MACA by invitation): a receiveroriented access protocol for wireless multihop networks, in:Proceedings of PIMRC’97, Oulu, Finland, 1997.

[27] C. Wu, V.O.K. Li, Receiver-initiated busy-tone multiple access inpacket radio networks, in: Proceedings of ACM SIGCOMM ’87Workshop: Frontiers in Computer Communications Technology,Stowe, VT, USA, 1987.

[28] S.-L. Wu, Y.-C. Tseng, C.-Y. Lin, J.-P. Sheu, A multi-channel MACprotocol with power control for multi-hop mobile ad hoc networks,Computer Journal 45 (1) (2002).

[29] J.-H. Yun, S.-W. Seo, Collision detection based on RF energy durationin ieee 802.11 wireless LAN, in: Proceedings of Comsware, 2006,Delhi, India, January 2006.

[30] P802.11 – Wireless LAN Medium Access Control (MAC) and PhysicalLayer Specifications, IEEE, January 1996.

[31] Network Simulator – ns2 – <http://www.isi.edu/nsnam/ns/>.

Alessandro Leonardi received the LaureaDegree in Electronics Engineering and thePh.D. in Computer and TelecommunicationsEngineering from the University of Catania,Italy, in 2002 and 2007, respectively. Since2002 he is a member of CNIT (National Inter-University Consortium for Telecommunica-tions). From September 2005 to February2006 he has been visiting the Rice NetworksGroup (Rice University, Houston TX, USA)under the guidance of Prof. Edward Knightly.Currently he is a Post Doctoral Researcher

with the Dipartimento di Ingegneria Elettrica, Elettronica ed Informatica(DIEEI) of the University of Catania. His current research interests includeprotocols and algorithms for mobile, ad hoc, sensor and mesh networks.

Sergio Palazzo was born in Catania, Italy, onDecember 12, 1954. He received his degree inelectrical engineering from the University ofCatania in 1977.Until 1981, he was at ITALTEL, Milano, wherehe was involved in the design of operatingsystems for electronic exchanges. He thenjoined CREI, which is the center of thePolitecnico di Milano for research on com-puter networks. Since 1987 he has been at theUniversity of Catania, where is now a FullProfessor of Telecommunications Networks.

In 1994, he spent the summer at the International Computer ScienceInstitute (ICSI), Berkeley, as a Senior Visitor. He is a recipient of the 2003Visiting Erskine Fellowship by the University of Canterbury, Christchurch,

New Zealand.Since 1992, he has been serving on the Technical Program Committee ofINFOCOM, the IEEE Conference on Computer Communications. He hasbeen the General Chair of the ACM MobiHoc 2006 Conference and cur-rently is a member of the MobiHoc Steering Committee. In the recentpast, he has been the Program Co-Chair of the 2005 International Tyr-rhenian Workshop on Digital Communications, focused on ‘‘DistributedCooperative Laboratories: Networking, Instrumentation, and Measure-ments’’, the General Vice Chair of the ACM MobiCom 2001 Conference,and the General Chair of the 2001 International Tyrrhenian Workshop onDigital Communications, focused on ‘‘Evolutionary Trends of the Inter-net’’.He currently serves the Editorial Board of the journal Ad Hoc Networks. Inthe recent past, he also was an Editor of IEEE Wireless CommunicationsMagazine (formerly IEEE Personal Communications Magazine), IEEE/ACMTransactions on Networking, IEEE Transactions on Mobile Computing,Computer Networks, and Wireless Communications and Mobile Com-puting. He was a Guest Editor of Special Issues in the IEEE Journal ofSelected Areas in Communications (‘‘Intelligent Techniques in High-Speed Networks’’), in the IEEE Personal Communications Magazine(‘‘Adapting to Network and Client Variability in Wireless Networks’’), inthe Computer Networks journal (‘‘Broadband Satellite Systems: aNetworking Perspective’’), in the EURASIP Journal on Wireless Commu-nications and Networking (‘‘Ad Hoc Networks: Cross-Layer Issues’’). Healso was the recipient of the 2002 Best Editor Award for the ComputerNetworks journal.His current research interests include mobile systems, wireless andsatellite IP networks, intelligent techniques in network control, multi-media traffic modeling, and protocols for the next generation of theInternet.
Page 14: Ad Hoc Networks · Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) has been adopted by the IEEE 802.11 standard and provides good performance when all transmitters

638 A. Leonardi et al. / Ad Hoc Networks 11 (2013) 625–638

Corrado Rametta received the Laurea Degreein Electronics Engineering from the Universityof Catania, Italy in 2008.Currently he is a PhD student with theDipartimento di Ingegneria IngegneriaElettrica, Elettronica ed Informatica (DIEEI) ofthe University of Catania. His current researchinterests include protocols and performanceevaluations of wireless networks.

Edward Knightly is a Professor of Electricaland Computer Engineering at Rice Universityin Houston, Texas. He received his Ph.D. andM.S. from the University of California atBerkeley and his B.S. from Auburn University.He is an IEEE Fellow, a Sloan Fellow, and arecipient of the National Science FoundationCAREER Award. He received the best paperaward from ACM MobiCom 2008. His researchinterests are in the areas of mobile and wire-less networks and high-performance anddenial-of-service resilient protocol design. He

leads the Rice Networks Group. The group’s current projects includedeployment, operation, and management of a large-scale urban multi-

hop multitier IEEE 802.11 network in a Houston under-resourced com-munity. This network, TFA Wireless, is serving over 4,000 users in severalsquare kilometers and employs custom-built programmable andobservable access points. The group is also developing a clean-slate-design hardware platform for highperformance multi-hop wireless.The TAPs/WARP platform is now operational, and ongoing researchincludes cross-layer protocol design and implementation.