Adaptive Channel Switching for Centralized MAC Protocols in Multi-hop Wireless Networks

  • Upload
    abin444

  • View
    219

  • Download
    0

Embed Size (px)

Citation preview

  • 8/7/2019 Adaptive Channel Switching for Centralized MAC Protocols in Multi-hop Wireless Networks

    1/7

    228 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 58, NO. 1, JANUARY 2010

    Adaptive Channel Switching for Centralized MACProtocols in Multihop Wireless Networks

    Sheng-Tzong Cheng, Ming-Hung Tao, and Chun-Yen Wang

    AbstractThe centralized medium access control (centralizedMAC) protocol, which utilizes an Access Point (AP) to coordinatestations in wireless networks, guarantees the quality of service(QoS) for transmission, and provides good throughput in thehighly congested network. However, the centralized MAC proto-col cannot be adopted in ad hoc networks, because it providesonly single-hop transmission. This paper proposes a multihopmechanism for centralized MAC protocols to operate on variousnetwork topologies. The proposed mechanism provides excellentthroughput for both inter-subnet and intra-subnet links, andalleviates the hidden terminal problem. Experimental resultsreveal that the optimal configuration on the proposed mecha-nism and the comparison between our mechanism and other

    multihop forwarding mechanisms. The results demonstrate thatthe proposed mechanism outperforms other multihop forwardingmechanisms in terms of throughput.

    Index TermsCentralized MAC, quality-of-service, multihopmechanism, network topologies, hidden terminal problem.

    I. INTRODUCTION

    CONVENTIONAL MAC protocols in wireless networks

    are categorized as distributed MAC protocols or central-

    ized (infrastructure based) MAC protocols. Distributed MAC

    protocols, such as Distributed Coordination Function (DCF) inIEEE 802.11 [1], realize the multihop wireless networks with

    good mobility, but do not guarantee the QoS of a time-boundedservice, since they adopt the contention-based access scheme.

    Conversely, centralized MAC protocols, such as Point Coordi-

    nation Function (PCF) in IEEE 802.11 [1], arrange the trans-mission in single hop wireless networks to achieve the QoS

    requirements of the time-bounded service. Centralized MAC

    protocols have a higher system throughput than distributed

    MAC protocols, but do not supply the multihop transmission;

    the origin of this restriction is the hidden terminal problem

    resulting from the discordance between subnets.

    An efficient method for centralized MAC protocols to

    solve the hidden terminal problem between subnets provides

    multiple channels or frequencies for transmission. However,most investigations on multi-channel systems focus on eitherthe multi-channel design for distributed ad-hoc networks [2]

    [3] [4] [5] [6] [7] [8] or optimizing the system utilization

    Paper approved by M. Zorzi, the Editor for Wireless Multiple Access of theIEEE Communications Society. Manuscript received April 19, 2005; revisedJanuary 11, 2007.

    S.-T. Cheng is with the Department of Computer Science and Informa-tion Engineering, National Cheng-Kung University, Tainan, Taiwan (e-mail:[email protected]).

    M.-H. Tao is with the SoC Technology Center, Industrial TechnologyResearch Institute, Hsinchu, Taiwan (e-mail: [email protected]).

    C.-Y. Wang is with the Information and Communications Research Lab,Industrial Technology Research Institute, Hsinchu, Taiwan.

    Digital Object Identifier 10.1109/TCOMM.2010.01.070054

    by parallel transmission using multiple channels in a subnet

    [9] [10] [11]. Only a few investigations on multi-channelsystems concern the multi-channel architecture for multihop

    transmission in centralized wireless networks [12] [13]. K.

    Mizuno et al. provides a feasible solution to the hidden ter-

    minal problem and developed a multihop relaying scheme for

    centralized MAC protocols [12]. It also realizes an end-to-end

    QoS guarantee for the time-bounded service. However, in their

    protocol, initializing a WLAN is complex, and registering a

    new wireless terminal (WT) is time-consuming (chain topolo-

    gies are preferred in this protocol). Moreover, a large number

    of channels is required to achieve good throughput for thesystem, implying that a WT needs many transceivers. Thus,the implementation cost of this protocol, and the power con-

    sumption of each WT are both high. The multiple-frequency

    forwarding mechanism proposed by J. Peetz [13] eliminates

    the restriction of the one hop configuration in HiperLAN/2 by

    employing Multiple Frequency Forwarder Wireless Terminals

    (MF-WTs). An MF-WT needs to be located in an area with

    two or more overlapping subnets, and join these overlapping

    subnets asynchronously by switching the frequency between

    these subnets. The inter-subnet links are therefore created and

    the multihop functionality is achieved through these inter-

    subnet links. However, because the MF-WT must be locatedin an area with overlapping subnets, many network topologies

    have no MF-WT available. Additionally, since the throughputof the inter-subnet link depends on the number of MF-WTs

    and the synchronization between these MF-WTs, the inter-

    subnet links cannot easily have high throughput.

    This work proposes a multihop mechanism named adaptive

    channel switching (ACS) for centralized MAC protocols. The

    ACS mechanism efficiently utilizes the bandwidth by avoiding

    channel divisions between subnets for centralized protocols. It

    enables multihop transmission across subnets, and alleviates

    the hidden terminal problem using a 3-channel architecture.

    Furthermore, ACS can be adapted to various network topolo-gies without complicated initialization procedures or synchro-

    nization between subnets.

    I I . RELATED WORKS

    This section briefly summarizes a representative centralized

    MAC protocol, the IEEE 802.11 PCF, and also introduces two

    multi-channel mechanisms that provide the centralized MAC

    protocol the ability of multihop transmission.

    A. IEEE 802.11 PCF

    To support time-bounded services, the IEEE 802.11 stan-

    dard defines the Point Coordination Function to give stations

    0090-6778/10$25.00 c 2010 IEEE

    Authorized licensed use limited to: Amal Jyothi College of Engineering. Downloaded on July 07,2010 at 12:58:37 UTC from IEEE Xplore. Restrictions apply.

  • 8/7/2019 Adaptive Channel Switching for Centralized MAC Protocols in Multi-hop Wireless Networks

    2/7

    CHENG et al.: ADAPTIVE C HANNEL SWITC HING FOR C ENTR ALIZED M AC PROTOC OLS IN M ULTIHOP W IR ELESS NETWORKS 229

    priority access to the wireless medium, coordinated by a

    station called the Point Coordinator (PC). The time in the

    PCF is divided into repeated periods, called superframes. WithPCF, a Contention Free Period (CFP) and a Contention Period

    (CP) alternate over time, in which a CFP and the following

    CP form a superframe. During the CFP, no contention occurs

    between stations, since the stations are polled by the PC.

    If the PC receives no response from a polled station after

    waiting for PCF Interframe Space (PIFS), then it either pollsthe next station, or ends the CFP. The PC continues polling

    other stations until the CFP expires. A specific control frame,

    called CF-End, is sent by the PC as the last frame within the

    CFP to signal the end of the CFP.

    B. The KMH Mechanism

    The KMH mechanism was proposed by K. Mizuno et al.[12], and is named after the authors. The KMH mechanism

    adopts a PCF based polling scheme in a multihop wireless

    network with multiple channels, where the PC and WT each

    utilizes two or more transceivers. The station in the KMH

    mechanism has three modes for each channel: master mode,

    slave mode, and silent mode. In master mode, the station

    acts as a PC in the channel. In slave mode, the station

    acts as a WT. In silent mode, the station sets NAV, and is

    not permitted to send packets during the CFP. After NAV

    resetting, a station in silent mode can send packets until

    the next beacon frame is sent. In this manner, three modesfor each channel enable communication by all wireless links

    using PCF, and offer QoS guarantees from end-to-end. KMH

    addresses some issues, such as associating a new station to a

    network and guaranteeing the QoS, which are not described

    for considerations of space.

    C. The Multi-frequency Forwarding Mechanism

    The multi-frequency forwarding mechanism was proposed

    by J. Peetz [13]. This mechanism enables inter-subnet links,

    and extends the one-hop connectivity to a multihop ad hoc

    connectivity for the HiperLAN/2 standards [14]. Each subnet

    in HiperLAN/2 determines its operation frequency channel

    based on interference minimization based on the Dynamic

    Frequency Selection (DFS). Figure1 shows an example fora corresponding multihop network configuration consisting

    of two interconnected subnets. Both MF-WT1 and MF-WT2

    are within the coverage range of Central Controller (CC) 1and 2, where the MF-WT is the WT with the forwarding

    functionality. Therefore, increasing the number of MF-WT

    capable terminals increases the number of stable inter-subnet

    links.

    With the MT Absence function, the H/2 RLC standard

    enables WT to withdraw from communication. The WT

    transmits the message RLC MT ABSENCE to inform the

    CC that it is unavailable for a time interval of 0 63 MAC frames. When the CC re-sponds with RLC MT ABSENCE ACK, the WT changes

    to the absent state, and the absence timer is started. The

    communication between WT and CC is continued immediatelyas soon as the absence timer expires. MT Absence is applied

    for the novel interconnection concept to facilitate WTs to hold

    (a) (b) (c)

    (c) (a)(b)

    (a) RLC_MT_ABSENCE (b) RLC_MT_ABSENCE_ACK (c) RLC_MT_ALIVE

    CC1

    CC2

    MF-WT1

    MF-WT2

    Fig. 1. MF-WT operation in subnet 1 and 2.

    connection to more than one CC. The aim of the MT Alive

    procedure is to check whether a CC and WT can communicatewith each other. The MF Alive function may be used to

    indicate the presence of an MF-WT to the CC by sending anRLC MT ALIVE message after switching and synchronizing

    to the new frequency channel.

    The multi-frequency forwarding mechanism is founded on

    an intermittent presence of forwarding WTs at each subnet

    to be interconnected. Therefore, the MF-WT periodically

    withdraws from a current transmission for a certain number of

    MAC frames by using the RLC functionsMT Absence and MT Alive. Figure 1 shows the operationof two MF-WTs successfully associated with the CCs of

    two subnets. Assume that an MF-WT is alternating between

    CC1 and CC2. To leave the current CC, for example CC1,

    it sends the RLC MT ABSENCE message containing the

    parameter. When the MF-WT receives theacknowledgement from CC1, the radio connection to CC1 is

    intermitted, and the absence period counter is started from

    the following MAC frame. The Broadcast Channel (BCH)

    transmitted by CC2 then has to be detected and decoded by

    the MF-WT for synchronization.

    III. THE ADAPTIVE CHANNEL SWITCHING MECHANISM

    This section proposes a multihop mechanism called adaptive

    channel switching for centralized MAC protocols. The ACS

    mechanism has the following features: 1) it avoids channel

    divisions between subnets, allowing the system to use the

    bandwidth efficiently; 2) it enables the multihop transmissionacross subnets, and alleviates the hidden terminal problem;

    3) it eliminates the need for complex initialization and syn-chronization between subnets; 4) it can be adapted to various

    network topologies, and 5) it uses the smallest possible number

    of transceivers to realize these goals.

    Since this work describes the ACS mechanism based on

    enhancing the IEEE 802.11 PCF, the following description

    uses the term PC instead of AP, and uses the term WT

    to indicate a non-PC station. The ACS mechanism divides

    the total bandwidth into three channels, namely the Control

    Channel (C-channel), the Data Channel (D-channel), and the

    Relay Channel (R-channel). C-channel is adopted for the

    Authorized licensed use limited to: Amal Jyothi College of Engineering. Downloaded on July 07,2010 at 12:58:37 UTC from IEEE Xplore. Restrictions apply.

  • 8/7/2019 Adaptive Channel Switching for Centralized MAC Protocols in Multi-hop Wireless Networks

    3/7

    230 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 58, NO. 1, JANUARY 2010

    PC1 PC2WT1 WT2 WT3

    CPF CP

    D1

    poll

    D1

    poll

    U1

    ack

    U1

    ack

    D2+ack

    +poll

    D2+ack

    +poll

    ack

    ack

    Beacon

    frame

    Jamming

    packets CF-End

    RTS

    RTS

    CTS

    CTS

    Data

    Data

    ack

    ack

    R-mode

    Time

    Time

    C-channel packet D-channel packet R-channel packet

    WT1

    PC1

    WT2

    WT3

    PC2

    Fig. 2. An example illustrates the packet exchange in the ACS mechanism.

    exchange of control signals such as beacon frames and CF-

    End; D-channel is adopted for the transmission of data packets,

    which occupies the most system bandwidth, and R-channel is

    mainly used by the boundary stations in a subnet to relay

    packets to adjacent subnets. D-channel can be accessed incontention or contention-free ways, while R-channel can only

    be accessed with contention. Notably, each station can access

    only one channel through a particular transceiver in it, so three

    transceivers are required for each station. A station can operatein either the Free-Mode (F-mode) or the Restricted Mode

    (R-Mode). When operating in F-mode, stations send control

    signals via the C-channel and transmit data packets via the

    D-channel, they also use the R-channel to communicate with

    other stations in R-mode. When operating in R-mode, stations

    are restricted to using only the R-channel to transmit data

    packets based on the CSMA/CA and RTS/CTS mechanisms.

    Although the R-mode stations can send packets through only

    the R-channel, they can hear the data packets sent in other

    channels. Therefore, the boundary WT of a subnet can enter

    R-mode to participate in the CFP of its subnet, and relaythe outgoing packets at the same time, where the outgoing

    packets are the packets belonging to other subnets. Besidesthe data packets, the R-mode station sends RTS, CTS, ACK

    and polling response via R-channel; the station that receives

    the packets from the R-channel should respond to the sending

    station through R-channel if needed. The example in Fig. 2

    provides a good understanding of the channels and modes

    defined in the ACS mechanism.

    All stations are initially in F-mode. The PC of a subnetbroadcasts the beacon frame or CF-End message through the

    C-channel to announce the beginning or the end of a CFP. The

    Operates in F-mode

    Receives a jamming

    packet from other

    subnets

    Records the CFP

    length indicated in

    the jamming packet

    Operates in R-mode

    Receives

    a jamming packet

    from other

    subnets?

    Does the

    remaining time in

    R-mode expire?

    Records the CFP

    length indicated in

    the jamming packet

    The number of outgoing

    packets exceed Pout?

    Records the CFP

    length of its ownsubnet

    Yes

    Yes

    Yes

    No

    No

    No

    Operates in F-mode

    Receives a beacon

    frame from its PC

    The number of outgoing

    packets exceed Pout?

    Operates in R-mode

    Receives a CF-End

    frame from its PC

    Yes

    No

    Fig. 3. The flowchart illustrating the passive restriction and self-restriction(dotted portion) procedures.

    WTs that receive the beacon frame sequentially send jamming

    packets, indicating the length of CFP to their neighbors

    through the C-channel as depicted in Fig. 2. The sequence of

    the transmitting jamming packets is included in the beacon

    frame. The stations that receive the jamming packets then

    begin the passive restriction procedure, and switch to R-mode.

    An R-mode station entering the passive restriction procedure

    continues recording all incoming jamming packets (comingfrom other subnets), and returns to F-mode after the duration

    of the latest recorded CFP expires. If a PC intends to start a

    CFP, but is not allowed to send the beacon frame, i.e., it is in

    R-mode, then it immediately transmits the beacon frame to its

    WTs after switching to F-mode. If a WT returning from R-

    mode to F-mode finds that its subnet is current in CFP, then it

    immediately transmits a jamming packet to its neighbors. The

    flowchart of the passive restriction procedure is presented in

    Fig. 3 (please ignore the dotted portion of the figure at this

    stage).

    The other condition (denoted as self-restriction procedure

    in the following) for a WT to operate in R-mode is shown asthe dotted portion in Fig. 3. An F-mode WT with more than

    packets that are destined to other subnets in its next-hopswitches to R-mode if it receives the beacon frame from its

    PC, where denotes the threshold of the outgoing packets(PC is not allowed to switch to R-mode by the self-restriction

    procedure). This R-mode WT automatically returns to F-mode

    if it receives the CF-End frame from its PC. Notably, after the

    R-mode duration of a WT restricted by the passive restriction

    procedure expires, there is still a chance for the WT to remain

    in the R-mode. The chance is when the WT has more than

    outgoing packets to send and finds that the subnet iscurrently in CFP (please refer to the dotted portion mixedwith the solid portion in Fig. 3). The R-mode duration is then

    extended to the end of the CFP.

    Authorized licensed use limited to: Amal Jyothi College of Engineering. Downloaded on July 07,2010 at 12:58:37 UTC from IEEE Xplore. Restrictions apply.

  • 8/7/2019 Adaptive Channel Switching for Centralized MAC Protocols in Multi-hop Wireless Networks

    4/7

    CHENG et al.: ADAPTIVE C HANNEL SWITC HING FOR C ENTR ALIZED M AC PROTOC OLS IN M ULTIHOP W IR ELESS NETWORKS 231

    A B

    Case 1

    A B

    Case 2

    Fig. 4. The illustration of the topologies presented in the analytical model.

    The self-restriction procedure complementing the passive

    restriction procedure can increase the throughput of the inter-

    subnet link. The improvement of throughput due to the self-

    restriction procedure can be revealed by considering an ex-

    ample in Fig. 2, where a data flow is sent from PC1 to PC2.

    This data flow is blocked in halfway when PC1 starts the CFP,

    and WT2 operates in F-mode. This block occurs frequently,

    and reduces the throughput of the inter-subnet link if the self-

    restriction procedure is not introduced. The self-restriction

    procedure can force WT2 to operate in R-mode (WT3 operates

    in F-mode since it does not receive the jamming packet fromthe R-mode WT2), and facilitate the use of R-channel between

    WT2 and WT3.

    It should be noticed that the negotiated QoS may be violated

    in the situation where a WT operates in R-mode during CFP.

    It is because the traffic delivered from the PC to this WT

    (through D-channel) may collide with the traffic transmittedin adjacent subnets. Moreover, if there are too many adjacent

    R-mode stations transmitting their packets synchronously,

    the contention-based R-channel will suffer serious collisions

    which result in the QoS deterioration to inter-subnet traffic.

    A. Analytical model

    This subsection presents an analytical model for evaluating

    the relay performance of the ACS mechanism under different

    configurations and topologies. The analytical model applies

    the ACS to two topologies shown in Fig. 4: the first topology,denoted as case 1, consists of two subnets in which the

    transmission range of the PCs do not overlap, while thesecond topology denoted as case 2 comprises two subnets in

    which the transmission range of the PCs do overlap. Since the

    performance of relay transmission is the most important factor

    in evaluating a multihop mechanism, the proposed model

    focuses on analyzing the queue length of relay WTs (the gray

    nodes in Fig. 4).

    1) Analysis of the ACS mechanism in case 1 without self-

    restriction procedure: To evaluate the queue length of the

    relay WTs (the gray nodes in subnet A) in case 1, the mean

    arrival and service rates of the relay WTs are derived according

    to several assumptions mentioned below, by using the //1Markovian Birth-Death Queueing Model. The CP length is

    assumed to be much shorter than the CFP length, allowing

    all behaviors in CP to be negligible. Additionally, the relay

    WTs in subnet A (or subnet B) are assumed to spend half

    of their lifetime in R-mode, and the other half in F-mode.

    Let and denote the number of WTs in subnets A andB; and denote the number of relay WTs in subnetsA and B; denote the system bandwidth (Mbps), and

    denote the ratio of the bandwidth reserved for D-channel to

    the total bandwidth. Additionally, each WT in subnet A is

    assumed to send data streams with data rate to PC B (thepacket inter-arrival time follows the exponential distribution).

    The relay WTs in subnet A are regarded as one aggregated

    node (denoted as in the following), which is analyzed forthe mean queue length in different modes.

    The mean arrival rate of in F-mode equals , and

    should be bounded by + 12 , where denotes the channel utilization of CFP, and is formulated as

    follows.

    =(1 )

    ( + )(1) + + , (1)

    where denotes the payload size of a packet; denotesthe packet header, and denotes the probability that astation has no packets to transmit when polled. The mean

    service rate of equals 0, since only communicateswith the stations within subnet A. Therefore, [ ], themean queue length of measured at each end of F-mode

    can be calculated as:

    [ ] =

    {

    , if( )

    2

    ( +

    2 )

    , otherwise

    ,

    (2)

    where denotes the duration of a superframe.The mean arrival rate when is in R-mode is the same

    as that when it is in F-mode; the service time follows the

    exponential distribution with the mean equal to 1/(1 )(), where () denotes the channel utilizationof CP with contending stations. () is discussed byBianchi [15], and is formulated as follows.

    = ()() / ((1 ())+()() +()(1 ())),(3)

    Here, without RTS/CTS, denotes the average time that thechannel is sensed busy due to a successful transmission; denotes the average time that the channel is sensed busy byeach station during a collision; denotes the duration of anempty slot time; () denotes the probability that at leastone transmission occurs among stations in the consideredtime slot, () is the conditional probability that exact onestation transmits on the channel given that there is at least

    one transmission among stations in the considered time slot.These Bianchis parameters are given in (4) (where denotes

    the propagation delay, and denotes the minimumcontention window).

    = + + + + + + , = + + + ,() = 1 (1 )

    ,

    () =(1)1

    ()= (1)

    1

    1(1) ,

    = 2/( + 1).

    (4)

    For simplicity, is calculated under the assumption that noexponential backoff is considered. According to the //1queueing model, the mean queue length of measured ateach end of R-mode, given by [ ], can be obtained as:

    [ ] =2

    ( ). (5)

    Authorized licensed use limited to: Amal Jyothi College of Engineering. Downloaded on July 07,2010 at 12:58:37 UTC from IEEE Xplore. Restrictions apply.

  • 8/7/2019 Adaptive Channel Switching for Centralized MAC Protocols in Multi-hop Wireless Networks

    5/7

    232 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 58, NO. 1, JANUARY 2010

    Based on the assumption that stays equally in F-mode andin R-mode, [], the mean queue length of measuredat each end of superframe, can be calculated as:

    [] = ([ ] + [ ])/2. (6)

    2) Analysis of the ACS mechanism in case 1 with self-

    restriction procedure: Because of the two assumptions: stays equally in F-mode and R-mode, CP can be neglected

    compared to the duration of CFP, we can say that issure to enter F-mode after its R-mode duration expires, and

    vice versa. However, when the self-restriction procedure isapplied, probably remains in R-mode after its current R-mode duration expires. That is, the time that stays in R-mode is longer than the time it stays in F-mode. The following

    equation expresses the mean queue length of .

    [] = 1 [ ] + 2 [ ]. (7)

    where 1 and 2 denote the limiting state probabilities of stateA1 ( stays in F-mode) and A2 ( stays in R-mode) ina two-state Markov chain. The values of

    1and

    2can be

    calculated by solving the following equation,{1 + 2 = 1

    112 = 221, (8)

    where 11, 12, 21 and 22 denote the transition probabilitiesof 1 1, 1 2, 2 1, and 2 2,respectively. Since is sure to enter F-mode after its R-modeduration expires, 12 = 1 and 11 = 0. 22 is the probabilitythat remains in R-mode after its current R-mode durationexpires. In other words, 22 is the probability that the numberof packets in s queue exceeds , which denotes the

    threshold of the outgoing packets for the aggregated relaynode. If = /, then the probability that there are packetsin s queue (denoted as ) has the following expression,

    = (1 ). (9)

    Therefore, 22 can be calculated as follows.

    22 =

    =

    =(1 )

    1 = . (10)

    Consequently, 21 = 1 22 = 1 . By substituting

    12 = 1 and 21 = 1 into (8), the limiting stateprobabilities can be obtained:

    1 =1

    2 , 2 =

    1

    2 . (11)

    3) Analysis of the ACS mechanism in case 2: In this case,

    the common relay nodes of subnet A and subnet B depicted

    in the right hand side of Fig. 4 are analyzed for their queue

    length. During the analysis, these common relay nodes are

    regarded as an aggregated node denoted as . Subnets Aand B operate in CFP in turn (nodes A and B enter R-mode in

    turn) according to the ACS mechanism. To evaluate the queue

    length of , its mean arrival rate and mean service ratemust be derived based on which subnet is currently in CFP.Each node is assumed to be able to hear from other nodes

    within the same subnet.

    When subnet A operates in CFP, all nodes in subnet B

    except the common relay nodes are sure to be in R-mode. Thus

    the mean arrival rate of is equal to , and should bebounded by + /2, where denotes thenumber of the common relay nodes; the mean service rate of

    equals 0. Consequently, [ ], which denotes themean queue length of measured at each end of F-mode,can be calculated as:

    [ ] =

    {

    , if( )

    2

    ( +

    2 )

    , otherwise

    .

    (12)

    All nodes in subnet A except the common relay nodes are

    sure to be in R-mode when subnet B operates in CFP. Thus,the mean arrival rate of (denoted as

    ) equals ,and should be bounded by + (1 )( ); the mean service rate of (denoted as

    ) equals

    /2. According to the //1 queueing model,[ ], which denotes the mean queue length of measured at each end of R-mode, can be calculated as:

    [ ] = 2

    ( ). (13)

    The mean queue length of measured at each end ofsuperframe (denoted as []) can then be obtained as:

    [] = ([ ] + [ ])/2. (14)

    IV. EXPERIMENTAL RESULTS

    The ACS mechanism (with = 7/11, = 5) was com-pared with the multi-frequency forwarding mechanism, the

    KMH mechanism, and IEEE 802.11 DCF, based on enhancing

    IEEE 802.11 PCF. Three simulation scenarios were designed

    to evaluate the performance of these mechanisms operatingon different network topologies. In each scenario, the ACSmechanism was compared with other multihop mechanisms

    in terms of the throughput of the inter-subnet traffic. These

    scenarios were programmed in C++ and configured with

    the following settings. The total bandwidth of the system

    was 11Mbps, and the simulation time was 60 seconds. Thetransmission and interference ranges of a station were 40m

    and 45m, respectively. Each station had at most 50 packets

    in its queue, and routed packets according to the DSR [16]

    routing protocol. All traffic was generated from CBR sources

    generating fixed size packets (1000 bytes).

    A. The transmission range of each PC is not overlapped

    The upper portion of Fig. 5 shows the network topology

    in this scenario. PC1 coordinated the left subnet, and PC2

    coordinated the right subnet; the transmission range of each

    PC did not overlap. Dataflow 1 transmitted from WT1 to WT8

    was simulated as the inter-subnet traffic. Dataflow 2 was sent

    from WT2 to WT3, and Dataflow 3 was transmitted from WT6

    to WT7; both were simulated as the intra-subnet traffic. The

    load of each data flow was set at 1500 Kbps.

    In the topology depicted in Fig. 5 (the upper portion), the

    ACS mechanism was compared with other multihop mecha-nisms by varying the load of each dataflow from 300Kbps to

    1500Kbps. Figure 6 illustrates the variation of the cumulative

    Authorized licensed use limited to: Amal Jyothi College of Engineering. Downloaded on July 07,2010 at 12:58:37 UTC from IEEE Xplore. Restrictions apply.

  • 8/7/2019 Adaptive Channel Switching for Centralized MAC Protocols in Multi-hop Wireless Networks

    6/7

    CHENG et al.: ADAPTIVE C HANNEL SWITC HING FOR C ENTR ALIZED M AC PROTOC OLS IN M ULTIHOP W IR ELESS NETWORKS 233

    WT2

    WT1

    WT3

    WT4

    PC1

    WT5

    WT6

    WT7

    WT8

    PC2

    (40,80)

    (10,50)(40,50)

    (40,20)

    (70,50) (100,50)

    (130,80)

    (130,50)

    (130,20)

    (160,50)

    WT1 PC1 WT2 PC2 WT3 PC3 WT4

    (10,50) (40,50) (70,50) (100,50) (130,50) (160,50) (190,50)

    Dataflow 1 Dataflow 2 Dataflow 3

    Fig. 5. The topologies in the experiments.

    300 400 500 600 700 800 900 1000 1100 1200 1300 1400 15000

    1

    2

    3

    4

    5

    6

    7

    8

    9

    10x 10

    6

    Offered load (Kbps)

    Totalthroughput(bytes)

    ACS

    DCF

    MultiFKMH

    Fig. 6. The cumulative throughput of the inter-subnet traffic vs. offered loadin the first scenario.

    throughput on Dataflow 1. These results indicated that the

    ACS mechanism strongly outperformed other mechanisms in

    terms of throughput. For instance, in the case of 1200 Kbps

    load, the ACS obtained the throughput of 9.0 106 bytes, theDCF obtained the throughput of 2.81 106 bytes, the KMHobtained the throughput of 3.53 106 bytes, and the multi-

    frequency forwarding obtained 0 bytes. The multi-frequencyforwarding mechanism failed to transmit inter-subnet traffic

    since PC1 and PC2 had no overlapped coverage area. In DCF,

    the throughput did not increase with the offered load since the

    packets belonging to the same flow frequently contended with

    each other for channel access, reducing end-to-end throughput.

    B. The transmission range of each PC is overlapped

    This topology was almost the same as the topology shown

    in the upper portion of Fig. 5, but the transmission range

    of each PC was overlapped (the distance between PC1 andPC2 was 60m). WT4 and WT5 in the upper portion of Fig.

    5 were replaced by an MF-WT in the overlapped area of

    300 400 500 600 700 800 900 1000 1100 1200 1300 1400 15002

    3

    4

    5

    6

    7

    8x 10

    6

    Offered load (Kbps)

    Totalthroughput(bytes)

    ACS

    DCF

    MultiF

    KMH

    Fig. 7. The cumulative throughput of the inter-subnet traffic vs. offered loadin the second scenario.

    PC1 and PC2. the ACS mechanism was compared with othermultihop mechanisms by varying the load of each dataflow

    from 300Kbps to 1500Kbps. Figure 7 illustrates the variation

    of the cumulative throughput on Dataflow 1. The ACS still

    achieved excellent performance while the other mechanisms

    had similar performance in terms of the throughput of inter-subnet traffic. For instance, in the case of 1500 Kbps load,

    the ACS obtained the throughput of 7 106 bytes, the DCFobtained the throughput of3.0106 bytes, the multi-frequencyforwarding obtained the throughput of3.36106 bytes, and theKMH obtained the throughput of3.53106 bytes. A minimum

    gain of 3.64 106 bytes was achieved in this case.1) The WTs and PCs are distributed in a line: The lower

    portion of Fig. 5 shows the network topology in this scenario.

    The topology comprised three PCs and one dataflow going

    from WT1 to WT4. The ACS mechanism was compared withother multihop mechanisms in terms of throughput by varying

    the load of Dataflow 1 from 300Kbps to 1500Kbps. Figure 8

    illustrates the variation of the cumulative throughput on the

    dataflow. The overall throughput was higher than that in the

    previous two topologies since there was no competitor intra-

    subnet traffic. The ACS again outperformed other mechanisms

    while the DCF had the lowest throughput. For instance, in the

    case of 1500 Kbps load, the ACS obtained the throughput of11.5106 bytes, the DCF obtained the throughput of4.5106

    bytes, the multi-frequency forwarding obtained the throughput

    of 6.46 106 bytes, and the KMH obtained the throughput of8.44106 bytes. The KMH achieved the same performance asthe ACS did when the offered load was less than 1100 Kbps,but it failed to catch up to the ACS after 1100 Kbps.

    V. CONCLUSION

    This work proposed the ACS mechanism for centralized

    MAC protocols to eliminate the restriction on single-hop

    transmission. The ACS mechanism that allowed the central-ized MAC protocol to transmit data flows across subnets

    and alleviated the hidden terminal problem can be adapted

    Authorized licensed use limited to: Amal Jyothi College of Engineering. Downloaded on July 07,2010 at 12:58:37 UTC from IEEE Xplore. Restrictions apply.

  • 8/7/2019 Adaptive Channel Switching for Centralized MAC Protocols in Multi-hop Wireless Networks

    7/7

    234 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 58, NO. 1, JANUARY 2010

    300 400 500 600 700 800 900 1000 1100 1200 1300 1400 15002

    3

    4

    5

    6

    7

    8

    9

    10

    11

    12x 10

    6

    Offered load (Kbps)

    Totalthro

    ughput(bytes)

    ACS

    DCF

    MultiF

    KMH

    Fig. 8. The cumulative throughput of the inter-subnet traffic vs. offered loadin the third scenario.

    to various network topologies. The ACS mechanism alsoeliminated the need for both complex initialization procedures

    and synchronization between subnets. Experimental results

    indicated the optimal configuration on the ACS mechanism,

    and the comparison between the ACS mechanism and other

    multihop forwarding mechanisms. The comparison results

    showed that our mechanism outperformed other multihop

    mechanisms in terms of adaptability, efficiency, and bandwidthutilization.

    REFERENCES

    [1] Institute of Electrical and Electronics Engineers, Wireless LAN mediumaccess control (MAC) and physical (PHY) layer specifications, IEEE

    802.11 Standard, Nov. 1997.[2] A. Muir and J. J. Garcia-Luna-Aceves, A channel access protocol

    for multihop wireless networks with multiple channels, in Proc. IEEEICC98, Atlanta, GA, USA, June 1998, pp. 1617-1621.

    [3] J. So and N. H. Vaidya, Multi-channel MAC for ad hoc networks:handling multi-channel hidden terminals using a single transceiver, inProc. ACM MobiHoc, Tokyo, Japan, May 2004, pp. 222-233.

    [4] W. C. Hung, K. L. E. Law, and A. L. Garcia, A dynamic multi-channel MAC for ad-hoc LAN, in Proc. 21st. Biennial Symp. Commun.,Kingston, Apr. 2002, pp. 31-35.

    [5] A. Nasipuri and S. R. Das, A multichannel CSMA MAC protocol formobile multihop networks, in Proc. IEEE Wireless Commun. Netw. Conf.(WCNC), New Orleans, LA, USA, Sep. 1999.

    [6] R. Carces and J. J. Garcia-Luna-Aceves, Collision avoidance and resolu-tion multiple access for multichannel wireless networks, in Proc. IEEE

    Infocom 2000, Tel Aviv, Israel, Mar. 2000, pp. 595-602.

    [7] J. So and N. H. Vaidya, A multi-channel MAC protocol for ad hocwireless networks, Technical report, Dept. Comp. Science, Univ. ofIllinois at Urbana-Champaign, 2003.

    [8] A. Raniwala, K. Gopalan, and T. C. Chiueh, Centralized channel assign-ment and routing algorithms for multi-channel wireless mesh networks,

    Mobile Computing Commun. Review, vol. 8, no. 2, pp. 50-65, Apr. 2004.

    [9] Y. D. Lin and Y. C. Hsu, Multihop cellular: a new architecture forwireless communications, in Proc. IEEE INFOCOM, Tel Aviv, Israel,Mar. 2000, pp. 1273-1282.

    [10] H. Li, D. Yu, and Y. Gao, Spatial synchronous TDMA in multihopradio network, in Proc. IEEE 59th Veh. Technol. Conf., Milan, Italy,May 2004, pp. 1334-1338.

    [11] B. Walke, et al., Relay-based deployment concepts for wireless andmobile broadband radio, IEEE Commun. Mag., vol. 42, no. 9, pp. 80-89, Sep. 2004.

    [12] K. Mizuno, M. Katayama, and H. Suda, A new QoS-guaranteed

    multichannel MAC protocol for multihop wireless networks, in Proc. IEEE 55th Veh. Technol. Conf., Birmingham, Alabama, May 2002, pp.967-971.

    [13] J. Peetz, HiperLAN/2 multihop ad hoc communication by multiple-frequency forwarding, in Proc. Veh. Technol. Conf., Rhodes, Greece,May 2001, pp. 2118-2122.

    [14] M. Johnson, HiperLAN/2 - the broadband radio transmission tech-nology operating in the 5GHz frequency band. [Online]. Available:http://paginas.fe.up.pt/ hmiranda/cm/whitepaper.pdf. [Accessed Sep. 15,2009]]

    [15] G. Bianchi, Performance analysis of the IEEE 802.11 distributedcoordination function, IEEE J. Sel. Areas Commun., vol. 18, no. 3, pp.535-547, Mar. 2000.

    [16] D. B. Johnson, D. A. Maltz, and J. Broch, DSR: the dynamic sourcerouting protocol for multi-hop wireless ad hoc networks, Ad Hoc

    Networking, Chap. 5. Addison-Wesley, 2001, pp. 139-172.

    Sheng-Tzong Cheng received the B.S. (1985) andM.S. (1987) in Electrical Engineering from theNational Taiwan University, Taipei, Taiwan. He re-ceived the M.S. (1993) and Ph.D. (1995) in Com-puter Science from the University of Maryland,College Park, Md. He is currently a Professor inthe Department of Computer Science and Informa-tion Engineering, National Cheng Kung University,Tainan, Taiwan. His research interests are in de-sign and performance analysis of mobile computing,wireless communications, multimedia, and real-time

    systems.

    Ming-Hung Tao received the B.S. (2001) and Ph.D.(2007) in Computer Science and Information Engi-neering from the National Cheng-Kung University,Tainan, Taiwan. He is currently an Engineer inthe SoC Technology Center, Industrial TechnologyResearch Institute, Hsinchu, Taiwan. His researchinterests are in wireless broadband network, wirelessresource management.

    Chun-Yen Wang received the B.S. (2001) in Math-ematics, and Ph.D. (2006) in Computer Science andInformation Engineering from the National Cheng-Kung University, Tainan, Taiwan. He is currently anEngineer in the Information and CommunicationsResearch Lab, Industrial Technology Research In-stitute, Hsinchu, Taiwan. His research interests arein wireless broadband network, quantum computing.