Computer Science ›› 2017, Vol. 44 ›› Issue (5): 53-60.doi: 10.11896/j.issn.1002-137X.2017.05.010

Previous Articles     Next Articles

High-throughput MAC Protocol for Industrial Convergent Wireless Networks

XU Yi-da and XU Chao-nong   

  • Online:2018-11-13 Published:2018-11-13

Abstract: Convergent topology is a widely used topology in industrial wireless sensor networks,and its throughput is adversely influenced by the hidden terminal problem.Nowadays,channel reservation scheme is utilized to deal with the notorious hidden terminal problem.However,the increasing data rate in the physical layer introduces relatively short packets,which results in the relative increase of the overhead of the channel reservation scheme.Since IEEE 802.11 DCF cannot effectively deal with the two problems mentioned above simultaneously,we proposed a novel protocol,termed as APCSMA,for convergent topology.Specifically,the channel reservation scheme is eliminated to deal with the relatively short packets,and an opportunistic transmission scheme is employed to deal with the hidden terminal problem.A necessary condition has been developed for the optimal transmission probability to maximize the per-node throughput.Together with the assumption of uniformly distributed nodes,the optimal transmission probability is derived under the primary interference model.Then,the performances of our protocol are thoroughly investigated in terms of network throughput,delay and energy efficiency.Our analytical results verified by simulations and the results demonstrate the efficiency of the proposed protocol in practical industrial convergent wireless networks.

Key words: MAC,Convergent,Hidden terminal,Channel reservation,Interference model

[1] YANG Y T,LIANG W,ZHANG X L,et al.Time synchronization method of wireless network for factory automation[J].Journal of Computer Research and Development,2014,51(3):511-518.(in Chinese) 杨雨沱,梁炜,张晓玲,等.面向工厂自动化无线网络的时间同步方法[J].计算机研究与发展,2014,51(3):511-518.
[2] ORAN S,EITAN A.An efficient polling MAC for wirelessLANs [J].IEEE/ACM Transactions on Networking,2011,4(9):439-451.
[3] MA M,ZHU Y,CHENG T H.A bandwidth guaranteed polling MAC protocol for Ethernet passive optical networks [C]∥Proc.of IEEE INFOCOM 2003.San Francisco:IEEE,2003:22-31.
[4] CAI Q,DING H W,LIU Q L,et al.An effective polling MAC scheme for wireless sensor networks [J].Information Technology Journal,2013,12(22):6631-6635.
[5] JIANN C G,PEI K L,YIN S C,et al.On 5G radio access architecture and technology[J].IEEE Wireless Communications,2015,2(5):2-5.
[6] XU C N,LI C,WANG Z G,et al.DLSOMAC:a MAC protocol oriented to distributed wireless link scheduling technology [J].Acta Automatica Sinica,2014,40(12):2747-2755.(in Chinese) 徐朝农,李超,王智广,等.DLSOMAC:一个面向分布式无线链路调度技术的MAC协议[J].自动化学报,2014,40(12):2747-2755.
[7] VICTOR S,MARK H,CHEN B R,et al.Simulating the power consumption of large-scale sensor network applications [C]∥Proc.of the 2nd International Conference on Embedded Networked Sensor Systems.Baltimore,USA,ACM,2004:188-200.
[8] CANO C,BELLALTA B,CISNEROS A,et al.Quantitativeanalysis of the hidden terminal problem in preamble sampling WSNs [J].Ad Hoc Networks,2011,10(1):19-36.
[9] ZIOUVA E,ANTONAKOPOULOS T.CSMA/CA performance under high traffic conditions:throughput and delay analysis [J].Computer Communications,2002,25(3):313-321.
[10] MAGISTRETTI E,GUREWITZ O,KNIGHTLY E W.802.11ec:Collision avoidance without control messages [C]∥Proc.of Mobicom 2012.ACM,Istanbul,Turkey,2012:65-76.
[11] ZHANG X,SHIN K G.Gap sense:lightweight coordination of heterogeneous wireless devices [C]∥Proc of IEEE INFOCOM 2013.IEEE,Turin,Italy,2013:3094-3101.
[12] CHEBROLU K,DHEKNE A.Esense:communication throughenergy sensing [C]∥Proc.of Mobicom 2009.IEEE,Beijing,China,2009:85-96.
[13] J X Y,W J L,L M Y,et al.Hitchhike:riding control on preambles [C]∥Proc.of Infocom 2014.IEEE,Toronto,Canada,2014:2499-2507.
[14] SOUVIK S,ROMIT R C,SRIHARI N.CSMA/CN:carriersense multiple access with collision notification[C]∥Proc.of the Mobicom 2010.ACM,Chicago,USA,2010:25-36.
[15] JAMIESON K,BALAKRISHNAN H.PPR:partial packet recovery for wireless networks [C]∥Proc of SigComm 2007.ACM,Kyoto,Japan,200:409-420.
[16] KIM H,HOU J C.Improving protocol capacity for UDP/TCP traffic with model-based frame scheduling in IEEE802.11-opera-ted WLANs [J].IEEE Journal of Selected Areas on Communications,2004,22(10):1987-2003.
[17] CALIF,CONTI M,GREGORI E.Dynamic tuning of the IEEE 802.11 protocol to achieve a theoretical throughput limit [J].IEEE/ACM Transactions on Networking,2000,8(6):785-799.
[18] BONONI L,CONTI M,GREGORI E.Runtime optimization of IEEE 802.11 wireless LANs performance [J].IEEE Transaction on Parallel and distributed system,2004,15(1):66-80.
[19] JAMALI A,HEMAMI S M S,BERENJKOUB M,et al.Anadaptive MAC protocol for wireless LANs [J].Journal of Communications and Networks,2014,16(3):311-321.
[20] DINESH B,EMILY M,SACHIN K.Full duplex radios [C]∥Proc of Sigcomm 2013.ACM,Hong Kong,2013:375-386.
[21] LINHE K,XUE L.mZig:enable multi-packet reception in ZigBee [C]∥Proc of Mobicom 2015.ACM,Paris,2015:552-565.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75 .
[2] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[3] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[4] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[5] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99 .
[6] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105 .
[7] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111 .
[8] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[9] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121 .
[10] WANG Zhen-chao, HOU Huan-huan and LIAN Rui. Path Optimization Scheme for Restraining Degree of Disorder in CMT[J]. Computer Science, 2018, 45(4): 122 -125 .