The Community for Technology Leaders
RSS Icon
Issue No.03 - March (2009 vol.8)
pp: 369-383
Surendra Boppana , Qualcomm Inc., San Diego
John M. Shea , University of Florida, Gainesville
In wireless ad hoc networks (WANets), multihop routing may result in a radio knowing the content of transmissions of nearby radios. This knowledge can be used to improve spatial reuse in the network, thereby enhancing network throughput. Consider two radios, Alice and Bob, that are neighbors in a WANet not employing spread-spectrum multiple access. Suppose that Alice transmits a packet to Bob for which Bob is not the final destination. Later, Bob forwards that packet on to the destination. Any transmission by Bob not intended for Alice usually causes interference that prevents Alice from receiving a packet from any of her neighbors. However, if Bob is transmitting a packet that he previously received from Alice, then Alice knows the content of the interfering packet, and this knowledge can allow Alice to receive a packet from one of her neighbors during Bob's transmission. In this paper, we develop overlapped transmission techniques based on this idea and analyze several factors affecting their performance. We then develop a MAC protocol based on the IEEE 802.11 standard to support overlapped transmission in a WANet. The resulting overlapped CSMA (OCSMA) protocol improves spatial reuse and end-to-end throughput in several scenarios.
MAC protocols, cross-layer protocols, multi-user detection, analog network coding, physical layer network coding
Surendra Boppana, John M. Shea, "Overlapped Carrier-Sense Multiple Access (OCSMA) in Wireless Ad Hoc Networks", IEEE Transactions on Mobile Computing, vol.8, no. 3, pp. 369-383, March 2009, doi:10.1109/TMC.2008.114
[1] IEEE 802.11 WLAN Committee, IEEE Standard 802.11-2007, IEEE Standard for Information Technology-Telecommunications and Information Exchange between Systems-Local and Metropolitan Area Networks-Specific Requirements—Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE, June 2007.
[2] J.Q. Bao and L. Tong, “Performance Analysis of Slotted Aloha Random Access Ad-Hoc Networks with Multipacket Reception,” Proc. IEEE Military Comm. Conf., vol. 1, pp. 251-255, Nov. 1999.
[3] Q. Zhao and L. Tong, “Semi-Blind Collision Resolution in Random Access Wireless Ad Hoc Networks,” IEEE Trans. Signal Processing, vol. 48, pp. 2910-2920, Oct. 2000.
[4] M.M.K. Howlader and B.D. Woerner, “System Architecture for Implementing Multiuser Detector within an Ad-Hoc Network,” Proc. IEEE Military Comm. Conf., vol. 2, pp.1119-1123, Oct. 2001.
[5] R.M. de Moraes, R. Sadjadpour, and J.J. Garcia-Luna-Aceves, “A New Communication Scheme for MANETs,” Proc. Int'l Conf. Wireless Networks, Comm. and Mobile Computing, vol. 2, pp. 1331-1336, June 2005.
[6] C. Comaniciu, N.B. Mandayam, and H.V. Poor, Wireless Networks: Multiuser Detection in Cross-Layer Design. Springer, 2005.
[7] V. Naware, G. Mergen, and L. Tong, “Stability and Delay of Finite-User Slotted ALOHA with Multipacket Reception,” IEEE Trans. Information Theory, vol. 51, no. 7, pp. 2636-2656, July 2005.
[8] G. Mergen and L. Tong, “Receiver Controlled Medium Access in Multihop Ad Hoc Networks with Multipacket Reception,” Proc. IEEE Military Comm. Conf. (MILCOM '01), vol. 2, pp. 1014-1018, Oct. 2001.
[9] L.L. Xie and P.R. Kumar, “A Network Information Theory for Wireless Communication: Scaling Laws and Optimal Operation,” IEEE Trans. Information Theory, vol. 50, no. 5, pp. 748-767, May 2004.
[10] S. Boppana and J.M. Shea, “Overlapped Transmission in Wireless Ad Hoc Networks,” Proc. Int'l Conf. Comm. Circuits and Systems (ICCCAS '06), vol. 2, pp. 1309-1314, June 2006.
[11] D.S. Lun, M. Médard, R. Koetter, and M. Effros, On Coding for Reliable Communication over Packet Networks, Arxiv cs.IT/0510070, preprint, 2005.
[12] S. Chachulski, M. Jennings, S. Katti, and D. Katabi, “Trading Structure for Randomness in Wireless Opportunistic Routing,” Proc. ACM SIGCOMM '07, pp. 169-180, Aug. 2007.
[13] C. Fragouli and E. Soljanin, “Information Flow Decomposition for Network Coding,” IEEE Trans. Information Theory, vol. 52, no. 3, pp. 829-848, Mar. 2006.
[14] E. Fasolo, M. Rossi, J. Widmer, and M. Zorzi, “On MAC Scheduling and Packet Combination Strategies for Practical Random Network Coding,” Proc. IEEE Int'l Conf. Comm. (ICC'07), pp. 3582-3589, June 2007.
[15] S. Katti, H. Rahul, W. Hu, D. Katabi, M. Médard, and J. Crowcroft, “XORs in the Air: Practical Wireless Network Coding,” Proc. ACM SIGCOMM '06, pp. 243-254, Sept. 2006.
[16] R. Koetter, Network Coding Bibliography, , 2007.
[17] Y. Wu, P.A. Chou, Q. Zhang, K. Jain, W. Zhu, and S.-Y. Kung, “Network Planning in Wireless Ad Hoc Networks: A Cross-Layer Approach,” IEEE J. Selected Areas in Comm., vol. 23, no. 1, pp. 136-150, Jan. 2005.
[18] S. Deb, M. Effros, T. Ho, D.R. Karger, R. Koetter, D.S. Lun, M. Médard, and N. Ratnakar, “Network Coding for Wireless Applications: A Brief Tutorial,” Proc. Int'l Workshop Wireless Ad-Hoc Networks (IWWAN '05), May 2005.
[19] Y.E. Sagduyu and A. Ephremides, “On Joint MAC and Network Coding in Wireless Ad Hoc Networks,” IEEE Trans. Information Theory, vol. 53, no. 10, pp. 3697-3713, Oct. 2007.
[20] P.A. Chou and Y. Wu, “Network Coding for the Internet and Wireless Networks,” IEEE Trans. Signal Processing, vol. 24, no. 5, pp. 77-85, Sept. 2007.
[21] Y.E. Sagduyu and A. Ephremides, “Cross-Layer Optimization of MAC and Network Coding in Wireless Queueing Tandem Networks,” IEEE Trans. Information Theory, vol. 54, no. 2, pp.554-571, Feb. 2008.
[22] S. Zhang, S.C. Liew, and P. Lam, “Physical-Layer Network Coding,” Proc. ACM MobiCom '06, pp. 358-365, Sept. 2006.
[23] J. Zhang, K. Cai, K.B. Letaief, and P. Fan, “A Network Coding Unicast Strategy for Wireless Multi-Hop Networks,” Proc. IEEE Wireless Comm. and Networking Conf. (WCNC '07), pp. 4221-4226, Mar. 2007.
[24] S. Katti, S. Gollakota, and D. Katabi, “Embracing Wireless Interference: Analog Network Coding,” Proc. ACM SIGCOMM'07, pp. 397-408, Aug. 2007.
[25] Y. Hao, D. Goeckel, Z. Ding, D. Towsley, and K.K. Leung, “Achievable Rates of Physical Layer Network Coding Schemes on the Exchange Channel,” Proc. IEEE Military Comm. Conf. (MILCOM '07), pp. 1-7, Oct. 2007.
[26] The ns Manual, K. Fall and K. Varadhan, eds., chapter 16, The VINT Project, 2003.
13 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool