首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
白科  胡建平 《现代电子技术》2008,31(1):13-15,17
主要分析了在无线局域网中应用比较广泛的MAC协议DCF(分布式协调功能)协议的性能.从DCF的基本接入模式和RTS/CTS模式出发,分析了不同的节点数下分别在低速、中速、高速下两种接入模式吞吐量和延时方面的比较.通过仿真验证了低速状态下RTS/CTS在大多数情况下比基本接入模式无论在吞吐量和延时方面都更加有效,而且节点数越多的时候,情况越明显.而在高速状态下,基本接入模式要比RTS/CTS方式有效.  相似文献   

2.
A study of the effect of the optical path delay on the effectiveness of the request to send/clear to send (RTS/CTS) exchange in high-speed IEEE 802.11 wireless LAN (WLAN) over fiber networks has been carried out. It is shown that although the fiber delay might violate some of the timing boundaries of the medium access control (MAC) protocol, with a careful choice of the RTS threshold parameter, which determines when the RTS/CTS is used, these networks can benefit significantly from the four-way handshake even without the need for modifying the existing protocol.   相似文献   

3.
Effectiveness of RTS/CTS handshake in IEEE 802.11 based ad hoc networks   总被引:1,自引:0,他引:1  
Kaixin  Mario  Sang   《Ad hoc Networks》2003,1(1):107-123
IEEE 802.11 MAC mainly relies on two techniques to combat interference: physical carrier sensing and RTS/CTS handshake (also known as “virtual carrier sensing”). Ideally, the RTS/CTS handshake can eliminate most interference. However, the effectiveness of RTS/CTS handshake is based on the assumption that hidden nodes are within transmission range of receivers. In this paper, we prove using analytic models that in ad hoc networks, such an assumption cannot hold due to the fact that power needed for interrupting a packet reception is much lower than that of delivering a packet successfully. Thus, the “virtual carrier sensing” implemented by RTS/CTS handshake cannot prevent all interference as we expect in theory. Physical carrier sensing can complement this in some degree. However, since interference happens at receivers, while physical carrier sensing is detecting transmitters (the same problem causing the hidden terminal situation), physical carrier sensing cannot help much, unless a very large carrier sensing range is adopted, which is limited by the antenna sensitivity. In this paper, we investigate how effective is the RTS/CTS handshake in terms of reducing interference. We show that in some situations, the interference range is much larger than transmission range, where RTS/CTS cannot function well. Two independent solutions are proposed in this paper. One is a simple enhancement to the IEEE 802.11 MAC protocol. The other is to utilize directional antennas. Simulation results verify that the proposed schemes indeed can help IEEE 802.11 resolve most interference caused by large interference range.  相似文献   

4.
In ad hoc networks, the hidden- and the exposed-terminal problems can severely reduce the network capacity on the MAC layer. To address these problems, the ready-to-send and clear-to-send (RTS/CTS) dialogue has been proposed in the literature. However, MAC schemes using only the RTS/CTS dialogue cannot completely solve the hidden and the exposed terminal problems, as pure "packet sensing" MAC schemes are not safe even in fully connected networks. We propose a new MAC protocol, termed the dual busy tone multiple access (DBTMA) scheme. The operation of the DBTMA protocol is based on the RTS packet and two narrow-bandwidth, out-of-band busy tones. With the use of the RTS packet and the receive busy tone, which is set up by the receiver, our scheme completely solves the hidden- and the exposed-terminal problems. The busy tone, which is set up by the transmitter, provides protection for the RTS packets, increasing the probability of successful RTS reception and, consequently, increasing the throughput. This paper outlines the operation rules of the DBTMA scheme and analyzes its performance. Simulation results are also provided to support the analytical results. It is concluded that the DBTMA protocol is superior to other schemes that rely on the RTS/CTS dialogue on a single channel or to those that rely on a single busy tone. As a point of reference, the DBTMA scheme out-performs FAMA-NCS by 20-40% in our simulations using the network topologies borrowed from the FAMA-NCS paper. In an ad hoc network with a large coverage area, DBTMA achieves performance gain of 140% over FAMA-NCS and performance gain of 20% over RI-BTMA  相似文献   

5.
一种用于无线自组织网络的并发传输MAC协议   总被引:1,自引:0,他引:1  
虞万荣  王晓东  周兴铭 《电子学报》2006,34(8):1433-1437
本文提出一种工作在单信道、单发射器和单发射功率模式下的并发传输MAC协议.该协议在控制报文(RTS/CTS)和数据报文(DADA/ACK)之间插入附加控制时隙,以便相邻节点有机会交换自己的控制报文.为了保证并发传输的可靠性,协议在控制报文中包含了冲突避免信息,邻居节点根据这些信息判断自己的传输能否在不影响已有传输的情况下并发进行.模拟结果显示,与IEEE 802.11相比,CTMAC协议在网络中存在并发可能时,使系统吞吐量得到很大提高.  相似文献   

6.
In this paper, we develop a model-based frame scheduling scheme, called MFS, to enhance the capacity of IEEE 802.11-operated wireless local area networks (WLANs) for both transmission control protocol (TCP) and user datagram protocol (UDP) traffic. In MFS each node estimates the current network status by keeping track of the number of collisions it encounters between its two consecutive successful frame transmissions, and computes accordingly the current network utilization. The result is then used to determine a scheduling delay to be introduced before a node attempts to transmit its pending frame. MFS does not require any change in IEEE 802.11, but instead lays a thin layer between the LL and medium access control (MAC) layers. In order to accurately calculate the current utilization in WLANs, we develop an analytical model that characterizes data transmission activities in IEEE 802.11-operated WLANs with/without the request to send/clear to send (RTS/CTS) mechanism, and validate the model with ns-2 simulation. All the control overhead incurred in the physical and MAC layers, as well as system parameters specified in IEEE 802.11, are figured in. We conduct a comprehensive simulation study to evaluate MFS in perspective of the number of collisions, achievable throughput, intertransmission delay, and fairness in the cases of TCP and UDP traffic. The simulation results indicate that the performance improvement with respect to the protocol capacity in a WLAN of up to 300 nodes is 1) as high as 20% with the RTS/CTS and 70% without the RTS/CTS in the case of UDP traffic and 2) as high as 10% with the RTS/CTS and 40% without the RTS/CTS in the case of TCP traffic. Moreover, the intertransmission delay in MFS is smaller and exhibits less variation than that in IEEE 802.11; the fairness among wireless nodes in MFS is better than, or equal to, that in IEEE 802.11.  相似文献   

7.
In order to improve cross-layer optimization, we propose a multiple access collision avoidance protocol that combines RTS/CTS with scheduling algorithms to support the multicast routing protocol. We avoid collision by including additional information in the RTS. The proposed scheme, together with extra benefits, such as power saving, reliable data transmission and higher channel utilization compared with CSMA or multiple unicast, enables the support of multicast services in mobile ad hoc networks.  相似文献   

8.
在Ad Hoc网络中,隐藏终端和暴露终端的存在,严重影响了网络的通信能力。但是通常只采用RTS/CTS对话的MAC层机制不能完全解决隐藏终端和暴露终端的影响,正如单纯的分组侦听的MAC机制在全连通的网络中并不安全一样。为了解决这些问题,介绍一种新的MAC层协议——双忙音多址接入(DBTMA)机制。他的运行借助2个窄带带外忙音。通过使用RTS分组和接收端的接收忙音完全解决了隐藏终端的影响,接收端的CTS分组和接收忙音解决了暴露终端的影响。发送端建立的忙音保护了RTS分组,提高了接收RTS成功的概率,因此也就提高了吞吐量。  相似文献   

9.
In this paper, we present a novel contention-based medium access control (MAC) protocol, namely, the Channel Reservation MAC (CR-MAC) protocol. The CR-MAC protocol takes advantage of the overhearing feature of the shared wireless channel to exchange channel reservation information with little extra overhead. Each node can reserve the channel for the next packet waiting in the transmission queue during the current transmission. We theoretically prove that the CR-MAC protocol achieves much higher throughput than the IEEE 802.11 RTS/CTS mode under saturated traffic. The protocol also reduces packet collision, thereby saving the energy for retransmission. We evaluate the protocol by simulations under both saturated traffic and unsaturated traffic. Our simulation results not only validate the theoretical analysis on saturated throughput, but also reveal other good features of the protocol. For example, under saturated traffic, both the saturated throughput and fairness measures of the CR-MAC are very close to the theoretical upper bounds. Moreover, under unsaturated traffic, the protocol also achieves higher throughput and better fairness than IEEE 802.11 RTS/CTS.  相似文献   

10.
针对MIMO链路Ad Hoc网络,提出了支持MIMO的线程化拓扑未知多址接入协议(MIMO-T-TTMA).MIMO-T-TTMA将时间扩展多址接入(TSMA)协议和时分多址接入(TDMA)协议以时间交替的方式相结合,进而为网络中节点分配时隙.在MIMO-T-TTMA中,每个节点被分配了若干时隙,每个分配时隙中,节点通过交互请求发送/允许发送(RTS/CTS)分组来确定发送使用的数据流数,而当RTS/CTS交互失败或者当前时隙为未分配时隙时,节点仍依一定的概率发送一个数据流,以提高网络的吞吐量.为了评估协议的性能,推导了MIMO-T-TTMA的吞吐量.数值结果表明,与已有的协议相比,MIMO-T-TTMA在节点度较大时具有较高的吞吐量,并且,吞吐量随节点度的变化比较平稳,因此,MIMO-T-TTMA适用于拓扑常发生剧烈变化的Ad Hoc网络.  相似文献   

11.
We propose and evaluate the performance of a new MAC-layer protocol for mobile ad hoc networks, called the Slow Start Power Controlled (abbreviated SSPC) protocol. SSPC improves on IEEE 802.11 by using power control for the RTS/CTS and DATA frame transmissions, so as to reduce energy consumption and increase network throughput and lifetime. In our scheme the transmission power used for the RTS frames is not constant, but follows a slow start principle. The CTS frames, which are sent at maximum transmission power, prevent the neighbouring nodes from transmitting their DATA frames at power levels higher than a computed threshold, while allowing them to transmit at power levels less than that threshold. Reduced energy consumption is achieved by adjusting the node transmission power to the minimum required value for reliable reception at the receiving node, while increase in network throughput is achieved by allowing more transmissions to take place simultaneously. The slow start principle used for calculating the appropriate DATA frames transmission power and the possibility of more simultaneous collision-free transmissions differentiate the SSPC protocol from the other MAC solutions proposed for IEEE 802.11. Simulation results indicate that the SSPC protocol achieves a significant reduction in power consumption, average packet delay and frequency of RTS frame collisions, and a significant increase in network throughput and received-to-sent packets ratio compared to IEEE 802.11 protocol.  相似文献   

12.
ADCF:IEEE 802.11 DCF协议的自适应简便算法   总被引:7,自引:0,他引:7  
本文提出了一种自适应型IEEE802.11 DCF协议:ADCF。该协议根据网络规模的变化,动态调节RTS/CTS机制的门限值,优化系统性能。在分析DCF协议的基础上,本文给出了一种估算网络规模的简便算法。仿真结果表明,该算法计算准确快捷。  相似文献   

13.
Transmission power control (TPC) has great potential to increase the throughput of a mobile ad hoc network (MANET). Existing TPC schemes achieve this goal by using additional hardware (e.g., multiple transceivers), by compromising the collision avoidance property of the channel access scheme, by making impractical assumptions on the operation of the medium access control (MAC) protocol, or by overlooking the protection of link-layer acknowledgment packets. In this paper, we present a novel power controlled MAC protocol called POWMAC, which enjoys the same single-channel, single-transceiver design of the IEEE 802.11 ad hoc MAC protocol but which achieves a significant throughput improvement over the 802.11 protocol. Instead of alternating between the transmission of control (RTS/CTS) and data packets, as done in the 802.11 scheme, POWMAC uses an access window (AW) to allow for a series of request-to-send/clear-to-send (RTS/CTS) exchanges to take place before several concurrent data packet transmissions can commence. The length of the AW is dynamically adjusted based on localized information to allow for multiple interference-limited concurrent transmissions to take place in the same vicinity of a receiving terminal. Collision avoidance information is inserted into the CTS packet and is used to bound/ the transmission power of potentially interfering terminals in the vicinity of the receiver, rather than silencing such terminals. Simulation results are used to demonstrate the significant throughput and energy gains that can be obtained under the POWMAC protocol.  相似文献   

14.
Performance analysis of the IEEE 802.11 distributed coordinationfunction   总被引:1,自引:0,他引:1  
The IEEE has standardized the 802.11 protocol for wireless local area networks. The primary medium access control (MAC) technique of 802.11 is called the distributed coordination function (DCF). The DCF is a carrier sense multiple access with collision avoidance (CSMA/CA) scheme with binary slotted exponential backoff. This paper provides a simple, but nevertheless extremely accurate, analytical model to compute the 802.11 DCF throughput, in the assumption of finite number of terminals and ideal channel conditions. The proposed analysis applies to both the packet transmission schemes employed by DCF, namely, the basic access and the RTS/CTS access mechanisms. In addition, it also applies to a combination of the two schemes, in which packets longer than a given threshold are transmitted according to the RTS/CTS mechanism. By means of the proposed model, we provide an extensive throughput performance evaluation of both access mechanisms of the 802.11 protocol  相似文献   

15.
Compared with unicast, multicast over wireless ad‐hoc networks do not support reliability due to their inability to exchange request‐to‐send/clear‐to‐send (RTS/CTS) and ACK packets with multiple recipients. Although several media access control (MAC) layer protocols have been proposed to provide reliable multicast, these introduce additional overhead, which degrades system performance. A novel MAC protocol for reliable wireless multicast is proposed in this paper. By adapting orthogonal frequency division multiple access characteristics in CTS and ACK packets, the protocol achieves reliability over wireless multicast with minimized overhead.  相似文献   

16.
In this paper, we propose a comprehensive solution for power control in mobile ad hoc networks (MANETs). Our solution emphasizes the interplay between the MAC and network layers, whereby the MAC layer indirectly influences the selection of the next-hop by properly adjusting the power of route request packets. This is done while maintaining network connectivity. Channel-gain information obtained mainly from overheard RTS and CTS packets is used to dynamically construct the network topology. Unlike the IEEE 802.11 approach and previously proposed schemes, ours does not use the RTS/CTS packets to silence the neighboring nodes. Instead, collision avoidance information is inserted in the CTS packets and sent over an out-of-band control channel. This information is used to dynamically bound the transmission power of potentially interfering nodes in the vicinity of a receiver. By properly estimating the required transmission power for data packets, our protocol allows for interference-limited simultaneous transmissions to take place in the neighborhood of a receiving node. Simulation results indicate that, compared to the IEEE 802.11 approach, the proposed protocol achieves a significant increase in the channel utilization and end-to-end network throughput and a significant decrease in the total energy consumption.  相似文献   

17.
IEEE 802.11 MAC uses RTS/CTS mechanism to avoid DATA packet collisions. RTS/CTS mechanism has been introduced to solve the problems of carrier sense multiple access (CSMA) in ad hoc networks such as hidden/exposed node problem. However, it creates a new problem called masked node problem. In this paper, a collision reduction mechanism named RTS/CTS/TTM with resume is introduced. This mechanism aims to minimize the probability of DATA packet collisions due to the masked nodes in an ad hoc network. We develop a new control packet called time-to-mask (TTM), which contains the time that the node will be masked. The proposed mechanism has been evaluated with a mathematical analysis and a simulation on a small IEEE 802.11 ad hoc network. The numerical results indicate that the RTS/CTS/TTM with resume reduces the probability of DATA packet collision.  相似文献   

18.
在Ad Hoc网络中.隐藏终端和暴露终端的存在严重影响了网络的通信能力。双忙音多址接入(DBTMA)协议是采用RTS/CTS对话机制来预约信道,通过引入两个窄带带外忙音信号来避免分组间冲突,解决了隐藏终端和暴露终端问题。本文在两个方面进一步对DBTMA进行改进:第一,使用一个控制分组RTS来预约信道,通过目的节点所发接收忙音来响应RTS分组;第二,采用时隙ALOHA协议对RTS分组进行传输,通过改进,提高了控制分组成功传输的概率,经仿真研究分析表明,提高了网络的吞吐量,增强了网络性能。  相似文献   

19.
One way to improve the throughput of a wireless ad hoc network at the media access (MAC) layer is to allow as much as possible concurrent transmissions among neighboring nodes. In this paper, we present a novel high-throughput MAC protocol, called Concurrent Transmission MAC(CTMAC), which supports concurrent transmission while allowing the network to have a simple design with a single channel, single transceiver, and single transmission power architecture. CTMAC inserts additional control gap between the transmission of control packets (RTS/CTS) and data packets (DATA/ACK), which allows a series of RTS/CTS exchanges to take place between the nodes in the vicinity of the transmitting or receiving node to schedule possible multiple, concurrent data transmissions. To safeguard the concurrent data transmission, collision avoidance information is included in the control packets and used by the neighboring nodes to determine whether they should begin their transmissions. Also, to isolate the possible interference between DATA packets and ACK packets, a new ACK sequence mechanism is proposed. Simulation results show that a significant gain in throughput can be obtained by the CTMAC protocol compared with the existing work including the IEEE 802.11 MAC protocol.  相似文献   

20.
The IEEE 802.11 standards for wireless local area networks define how the stations of an ad-hoc wireless network coordinate in order to share the medium efficiently. This work investigates the performance of such a network by considering the two different access mechanisms proposed in these standards. The IEEE 802.11 access mechanisms are based on the carrier sense multiple access with collision avoidance (CSMA/CA) protocol using a binary slotted exponential backoff mechanism. The basic CSMA/CA mechanism uses an acknowledgment message at the end of each transmitted packet, whereas the request to send/clear to send (RTS/CTS) CSMA/CA mechanism also uses a RTS/CTS message exchange before transmitting a packet. In this work, we analyze these two access mechanisms in terms of throughput and delay. Extensive numerical results are presented to highlight the characteristics of each access mechanism and to define the dependence of each mechanism on the backoff procedure parameters.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号