Computer Science ›› 2014, Vol. 41 ›› Issue (12): 60-66.doi: 10.11896/j.issn.1002-137X.2014.12.014

Previous Articles     Next Articles

Distributed Collision-resolvable MAC Protocol for Wireless LANs with Interference Cancellation Support

SHEN Hu,LV Shao-he,WANG Xiao-dong and ZHOU Xing-ming   

  • Online:2018-11-14 Published:2018-11-14

Abstract: Medium access control is critical to wireless network performance.We introduced a novel collision resolution method based on known interference cancellation,and proposed a new MAC protocol named as CR-MAC.Basically,AP tries to decode all the data packets in a collision by combining partial retransmissions and known interference cancellation.Hence,the collided transmission can be fully utilized,and less retransmission is required.The simulation results show that CR-MAC performs much better than IEEE 802.11 DCF in terms of both the aggregation throughput and the expected packet delay under various network settings.

Key words: Interference cancellation,Medium access control,Collision resolving,Packet retransmission

[1] Cheng Y C,Bellardo J,Benk P,et al.Jigsaw:Solving the Puzzle of Enterprise 802.11 Analysis [C]∥Proceedings of the ACM Conference on Applications,Technologies,Architectures and Protocols for Computer Communications (SIGCOMM).2006:39-50
[2] Khurana S,Kahol A,Jayasumana A P.Effect of Hidden Terminals on the Performance of IEEE 802.11 MAC Protocol [C]∥Proceedings of the IEEE Conference on Local Computer Networks (LCN).1998:12-20
[3] Chatzimisios P,Boucouvalas A C,Vitsas V.Effectiveness ofRTS/CTS Handshake in IEEE 802.11a Wireless LANs [J].IET Electronics Letters,2004,40(14),2004:915-916
[4] Xu K,Gerla M,Bae S.Effectiveness of RTS/CTS Handshake in IEEE 802.11 Based Ad Hoc Networks [J].Ad Hoc Network,Elsevier,2003,1(1):107-123
[5] Li T,Han M K,Bhartia A,et al.CRMA:Collision-ResistantMultiple Access [C]∥ Proceedings of the ACM Conference on Applications,Technologies,Architectures and Protocols for Computer Communications (SIGCOMM).2011:61-72
[6] Cali F,Conti M,Gregori E.Dynamic Tuning of the IEEE 802.11 Protocol to Achieve a Theoretical Throughput Limit [J].ACM Transaction on Network,2000,8(12):785-799
[7] He Y,Yuan R,Sun J,et al.Semi-Random Backoff:Towards Resource Reservation for Channel Access in Wireless LANs [C]∥Procee-dings of the IEEE International Conference on Network Protocols (ICNP).2009:21-30
[8] Zeng Z,Gao Y,Tan K,et al.Chain:Introducing Minimum Controlled Coordination into Random Access MAC [C]∥Procee-dings of the IEEE International Conference on Computer Communications (INFOCOM).2011:2669-2677
[9] Tan K,Fang J,Zhang Y,et al.Fine Grained Channel Access in Wireless LAN [C]∥Proceedings of the ACM Conference on Applications,Technologies,Architectures and Protocols for Computer Communications (SIGCOMM).2010:147-158
[10] Sen S,Choudhury R R,Nelakuditi S.No time to countdown:Migrating backoff to the frequency domain [C]∥Proceedings of the ACM Annual International Conference on Mobile Computing and Networking (MOBICOM).2011:241-252
[11] Feng X J,Zhang J,Zhang Q,et al.Use Your Frequency Wisely:Explore Frequency Domain for Channel Contention and ACK [C]∥Proceedings of the IEEE International Conference on Computer Communications (INFOCOM).2012:549-557
[12] Verdu S.Multiuser Detection [M].Cambridge UniversityPress,1998
[13] Halperin D,Anderson T E,Wetherall D.Taking the Sting Out of Carrier Sense:Interference Cancellation for Wireless LANs [C]∥ Proceedings of the ACM Annual International Conference on Mobile Computing and Networking (MOBICOM).2008:339-350
[14] Sen S,Santhapuri N,Choudhury R R,et al.Successive Interference Cancellation:A Back-of-the-Envelope Perspective [C]∥Proceedings of the ACM SIGCOMM Workshop on Hot Topics in Networks (HOTNETS).2010:1-6
[15] Gollakota S,Katabi D.ZigZag Decoding:Combating HiddenTerminals in Wireless Networks [C]∥Proceedings of the ACM Conference on Applications,Technologies,Architectures and Protocols for Computer Communications (SIGCOMM).2008:159-170
[16] Qin C,Santhapuri N,Sen S,et al.Known Interference Cancellation:Resolving Collisions due to Repeated Transmissions [C]∥Proceedings of the IEEE Workshops on Wireless Mesh Network (WIMESH).2010
[17] Jiang C,Shi Y,Hou Y T,et al.Squeezing the Most Out of Interference:An Optimization Framework for Joint Interference Exploitation and Avoidance [C]∥Proceedings of the IEEE International Conference on Computer Communications (INFOCOM).2012:424-432
[18] IEEE Std.802.11,IEEE Standard for Wireless LAN medium access control (MAC) and physical layer (PHY) specifications [S].IEEE Computer Society,1999
[19] Jamieson K,Balakrishnan H.PPR:Partial Packet Recovery forWireless Networks [C]∥ Proceedings of the ACM Conference on Applications,Technologies,Architectures and Protocols for Computer Communications (SIGCOMM).2007:409-420
[20] Bianchi G.Performance analysis of the IEEE 802.11 distributed coordination function [J].IEEE Journal on Selected Areas in Communications (JSAC),2000,18(3):535-547
[21] Malone D,Duffy K,Leith D.Modeling the 802.11 DistributedCoordination Function in Nonsaturated Heterogeneous Conditions [J].IEEE/ACM Transactions on Networking,2007,15(1):159-172
[22] Chatzimisios P,Vitsas V,Boucouvalas A C.Throughput and Delay Analysis of IEEE 802.11 protocol [C]∥ Proceedings of the IEEE International Workshop on Network Applicances (IWNA).2002:168-174

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!