- Research Article
- Open Access

# Modeling Energy Consumption of Dual-Hop Relay Based MAC Protocols in Ad Hoc Networks

- Rizwan Ahmad
^{1}Email author, - Fu-Chun Zheng
^{2}and - Micheal Drieberg
^{1}

**2009**:968323

https://doi.org/10.1155/2009/968323

© Rizwan Ahmad et al. 2009

**Received:**16 April 2009**Accepted:**25 November 2009**Published:**22 March 2010

## Abstract

Given that the next and current generation networks will coexist for a considerable period of time, it is important to improve the performance of existing networks. One such improvement recently proposed is to enhance the throughput of ad hoc networks by using dual-hop relay-based transmission schemes. Since in ad hoc networks throughput is normally related to their energy consumption, it is important to examine the impact of using relay-based transmissions on energy consumption. In this paper, we present an analytical energy consumption model for dual-hop relay-based medium access control (MAC) protocols. Based on the recently reported relay-enabled Distributed Coordination Function (rDCF), we have shown the efficacy of the proposed analytical model. This is a generalized model and can be used to predict energy consumption in saturated relay-based ad hoc networks. This model can predict energy consumption in ideal environment and with transmission errors. It is shown that using a relay results in not only better throughput but also better energy efficiency.

## Keywords

- Medium Access Control
- Data Packet
- Relay Node
- Active Node
- Medium Access Control Protocol

## 1. Introduction

Next generation networks (NGN) (or 4G, as they are better known) are to provide voice, data and multimedia access to users on an "anytime" and "anywhere" basis. This vision of 4G forms the requirement to achieve high throughput, high energy efficiency and low latency to provide quality of service (QoS) and efficient utilization of the scarce bandwidth. Therefore 4G networks are expected to result in a better quality of life and environment. Another important requirement for next generation networks is backward compatibility with existing networks. In today's world, due to reasons such as cost and lack of infrastructure, it may not be possible for all to adapt new networks at once and make the existing ones obsolete. This may happen eventually with time; however, we expect to have a hybrid of the new and existing networks for quite some time. It is of high importance to have smooth interaction between existing networks and next generation networks. This intermediate period where both networks will coexist is an important step towards complete transition to next generation networks which ensures a better quality of life and environment. For developed and developing countries which have made much investment on existing networks and due to high number of users, it may take longer to completely migrate to next generation networks. However for underdeveloped countries who still lacks infrastructure the adaptation may be easy but there are cost constraints for them as well.

Carvalho et al. [3] model node's energy consumption in a single-hop IEEE 802.11 ad hoc network as shown in Figure 1
. Carvalho calculated the average service time of a packet transmitted in a saturated ad hoc network. Results show that passive modes (idle, overhear, receive) dominate the energy consumption and transmission of large payloads is more advantageous. However, this model treats receiving and idle state in the same way and gives no consideration for channel condition. Wang et al. [4] proposed a model for energy efficiency in IEEE 802.11 DCF and tried to maximize energy efficiency based on packet size and contention window. They have considered channel errors on the data packet only, which is not reflective of the real situation. Ergen and Varaiya presented a model in [5] for decomposition of energy consumption in IEEE 802.11. They derived the formula for the amount of energy consumed by a node in order to transmit 1 MB of data in a network with *n* nodes in ideal channel conditions. This model can differentiate receiving and idle states. However none of the above models are suitable for the relay based MAC protocols and they require significant modifications for the later situation.

In this paper, we propose a generalized model for energy consumption and address the energy concerns of using relay based MAC protocols, as it is important to examine the impact of using a relay on energy consumptions compared to IEEE 802.11 DCF. Use of relay requires justification both from throughput and from energy perspectives. In addition to this, another concern of importance is the impact of relay nodes on the energy efficiency as relay nodes will utilize their own energy reserve to help other nodes.

The main contribution of this paper is the generalized analytical energy model for relay based MAC protocols in ideal channel, channel with transmission errors and the decomposition of energy. In this paper we have used relay-enabled Distributed Coordination Function (rDCF) [6] as a case study to show the efficacy of the proposed energy model. Therefore it is a matter of high importance for MAC protocol developers to have an idea on the energy consumption while still in design phase. We have shown results of energy consumption with different number of nodes and rate combinations for relay links. Furthermore we have shown the impact of variable packet length (expected payload) on energy consumption. Decomposition of energy for various operations is also shown and will help in the design of energy efficient MAC protocols. This is particularly useful for devising energy saving mechanisms and policies for existing and new protocols. The energy model will benefit the application of relay based MAC protocols (e.g., rDCF) in energy critical areas such as sensor networks and integration with next generation networks.

## 2. Energy Model

In [7] authors have used Markov chain model of [8] to show the energy consumption of relay based ad hoc networks. In this paper, we have proposed an energy model to accommodate relay based transmissions by using an improved model proposed by Wu et al. [9]. This is a more accurate model for saturation throughput, which requires the throughput model of [8] to incorporate a finite retry limit. We further improve it by considering transmission errors. The following challenges have been addressed in the paper: ( ) how to incorporate relay nodes, ( ) treatment of relay node, ( ) how relay nodes differ from other nodes in energy consumption behavior, and ( ) impact on energy in the presence of transmission errors.

### 2.1. System Model

We consider a wireless network of nodes based on IEEE 802.11 MAC that can support multiple transmission rates and supports relay based transmissions.

The wireless medium is shared among multiple contending nodes, that is, a single physical channel is available for wireless transmission. We make use of the control packets to solve the hidden terminal problem and to improve the system performance. Another assumption in this model is that the collision can only take place at the initializing control packet. For the modeling of energy, we assume saturated network where nodes always have packets to transmit. In addition to this we assume that there is always a relay available to help. All nodes are capable of being relays for other nodes. The relay nodes simply forward the packets and reduce the overall transmission time via dual-hop transmission at higher data rates. They are not required to contest for access as once a source node acquires the medium the transmission is done via the relay. These assumptions lead to the following [7–9] equations:

Here, (1) shows the probability
that a node transmits in a randomly chosen slot depends on the conditional probability of packet failure *p*, where
is the minimum contention windows,
is the maximum backoff stage and
is the retry limit. Equation (2) gives the packet failure probability in terms of collision (i.e.,
) and packet errors (
), where *n* is the total number of nodes. This equation differs from [7–9] where probability of failure is only due to collisions. From this equation we can see that the packet failure is due to collision, transmission errors or both. Here the probability of having failure due to both is almost negligible. Equations (1) and (2) are a nonlinear system which can be solved numerically to find *p* and
. Equation (3) gives
which is the probability that there is at least one transmission in the considered slot time. In expression (4),
is the probability of a successful transmission. The total energy in joules consumed by Node
to successfully transmit and receive 1 MB of data can then be defined as

In (5) is the energy consumed in Joules/MB. This is the ratio of expected energy (in Joules) consumed by Node in one slot to the expected data (in MB) successfully transmitted and received by node in one slot. Equation (6) gives the expression for expected data (in MB) transmitted and received by a node in one slot, where is the packet size in MB. In (5) slot refers to a transmission slot and successful transmission includes transmission by source, forwarding by relay and reception by destination.

*transmit*,

*receive*and

*listen*(idle/overhearing) as shown in Figure 2. Active nodes transmit, receive and listen during a transmission whereas non active nodes only listen to transmission. Next, we use this system model to derive the energy analysis in ideal channel and in channel with transmission errors. Based on the physical states we define operations for active and non active nodes involved.

### 2.2. Energy Analysis for Ideal Channels

For energy consumption in ideal channel, we know that the packet failure is only due to collision and there are no transmission errors. For the case of ideal channel
is zero. Based on the above concept of active and non active nodes we have three available states, that is, *transmit*, *receive* and *listen* (idle/overhearing). We further define operations within the three states: (a) successful transmission; (b) successful reception; (c) overhearing (reception of packets intended for other stations); (d) idle listening (when the channel is idle); (e) unsuccessful (colliding) transmissions; and (f) reception of collisions. The probabilities of different operations in an ideal channel are classified as follows:

is the probability of successful reception of packet destined for Node
, and is equal to
;
is the probability of successful reception of packet not destined for Node
, and is equal to
;
is the probability of successful reception of packet destined for relay
, and is equal to
;
is the probability of successful transmission of a packet by Node *l*, and is equal to
;
is the probability of reception of a collided packet, and is equal to
*.*
;
is the probability of collision on transmission of a packet by Node
, and is equal to
;
is the probability of idle slots, and is equal to
.

is successful reception of packets destined for node provided that there is a transmission free from collision and error. Similarly is the successful reception by relay with the same conditions. It is true as the relay is not involved in the contention process. is the successful reception by all non active overhearing nodes. The term ensures that only non active nodes are considered. is the successful transmission of a packet provided there is a transmission without any failure. is the transmission where there is no error and failure is due to collision. is the reception of collided packet. is the probability that there is no transmission.

The numerator in (5) is defined in expression (14). As evident from the nature of relay based MAC protocols, we use control packets to coordinate relays which are followed by the data and Acknowledgement (ACK) packets. As from the operations defined earlier in this section we know that in a transmission slot we have active nodes and non active nodes. In order to model this behaviour of transmitting and receiving (active nodes) or receiving only (non active nodes) control and data packets, we formulate (7) to (11) to show the working of the protocol. To calculate the energy consumed by nodes (active and non active) (7) to (11) shown above are used in (14). For ideal scenario where we have no transmission errors, it is possible to simplify (14) by substituting
. These equations are independent of the protocol. Also,
,
and
are the power consumed (in Watts) to transmit, receive and listen (idle/overhearing), respectively.
*,*
and
are the short, distributed and extended inter-frame times.
is the propagation delay and
is the slot time. In (7) and (8), reception and transmission of multiple packets is shown. Equation (7) gives a generalized equation for determining
and
, which are probabilities of successful reception of packets by relay and destination (which are active nodes). Equation (7) consists of the sum of energy consumed in receiving, transmitting and listening. Energy consumed in each of these states is the product of slot duration and respective power. Here the slot duration in transmitting and receiving of the control and data packets is the sum of their times. Where
and
are total number of control and data packets received. Similarly
and
are total number of control and data packets transmitted. The sum of
*,*
*,*
and
is the total number of control and data packets in a protocol. The same expression is used to determine
, where no transmission of packets is involved. In (8) successful transmission of a packet by an active node (source) is given. In (9) and (10),
is the time for collision of control packet (initiated from source to relay or destination) and
are
the probabilities of transmission and reception of collided packets. Equation (11) shows the listening (idle) state as a product of idle slot and idle power. Equations (7)–(11) are for the ideal case where there are no errors and are the same as in [7]. This set of equations represent a generic model and is used to show performance of relay based MAC protocols and can easily be adapted to cater for 802.11 a/b/g physical layers, with the parameters changed appropriately.

### 2.3. Energy Analysis for Channels with Transmission Errors

In this section we take into consideration the impact of transmission errors on the energy consumption. Unlike collision which occurs at the first control packet, transmission errors can occur at any packet. Therefore it is important to take into consideration that even with successful reception of one or more packets involved in the transmission a failure can still take place due to one of the following packets being in error.

For energy analysis of channel with transmission errors we add more operations to those defined earlier in Section 2.2. The additional operations due to errors are: (g) unsuccessful (error) transmissions and (h) reception of errors. The probabilities of additional operations are as follows:

is the probability of transmission of a packet in error by Node , and is equal to ; is the probability of reception of a packet in error by destined Node , and is equal to ; is the probability of reception of a packet in error by destined relay , and is equal to ; is the probability of reception of a packet in error not destined for Node , and is equal to .

These expressions together with those defined earlier will give the energy consumption in the case of transmission errors.
is the transmission of a packet in error provided there is no collision.
,
, and
are probabilities of reception of a packet destined for Node
, relay
and reception of packet not destined for Node
respectively. Reception of packet in error is conditioned on a transmission free from collision. The term
in
ensures that only non active nodes are considered. In (12) and (13),
is the average time for a particular packet in error. In this case it is showing the first packet in error. For energy consumption in channel experiencing transmission errors, we define
and
as the probabilities of transmission and reception of packets in error. In (12)
is the probability of transmitting a packet in error. Equation (13) is for determining
*,*
and
*,* which are probabilities of reception of packet (first packet) in error by relay, destination and overhearing nodes. For simplicity we have only shown (12) and (13) for the case if the first control packet is in error. The equations become more complex for following packets being in error and are shown in the appendix. Finally the energy (J/MB) is calculated by using (6), (14) and (5). Equation (14) is the sum of the products of operations/states and their probabilities.

To this point, we have shown generalized equations for the energy analysis in ideal channel and channel with transmission errors. In the following section we will apply the above energy analysis to a relay based MAC protocol.

## 3. Relay-Enabled Distributed Coordination Function

- (i)
Backward compatibility to 802.11 DCF (nonrelay mode) and requires only a firmware upgrade.

- (ii)
Control packets transmitted at the base rate of 2?Mbps.

- (iii)
Modified carrier sensing scheme (shown in Figure 3).

- (iv)
Introduction of Reservation Sub Header (RSH) (transmitted at 2?Mbps and used to broadcast duration information for the rest of packet) in DATA packets transmitted at higher rates from source to relay.

- (v)
Frequent broadcasting of willing lists (potential relay entries) between nodes.

- (vi)Relay selection based on a credit system.

Considering the fact that rDCF is backward compatible to 802.11 DCF and have the same backoff scheme, we can observe that the process of channel contention and time spent in contention for each node in rDCF is the same as in 802.11 DCF.

The modified carrier sensing scheme (shown in Figure 3) used in rDCF achieves better bandwidth utilization. A major advantage of this scheme compared to 802.11 DCF is that the nodes are blocked exactly for the data transmission duration. In 802.11 DCF, if the CTS is not received at the source due to collision or channel error, the neighbour nodes of the source are blocked for the whole duration of transmission which reduces the bandwidth utilization. Unlike the standard DCF, in rDCF if CTS/RCTS is not received, the neighbor nodes are not blocked for the whole duration of transmission. In the 802.11 DCF the source estimates the possible transmission rate and the duration, whereas in modified carrier sensing scheme of rDCF, the source first calculates (as all control packets are transmitted at base rate of 2 Mbps) the duration of the RRTS and RCTS/CTS transmissions only. The destination based on the received RRTS1 and RRTS2, decides in favour of the relay or to revert to the direct transmission. If the destination confirms to the source for a direct transmission it transmits a CTS packet or else a RCTS packet for the relay based transmission. The source extracts the agreed transmission rates from RCTS and calculates the duration of data packet and ACK. This information is made available to all overhearing nodes via the RSH attached to the data packet. This prevents the unnecessary blocking of nodes for the entire duration of transmission.

The rDCF uses the same physical characteristics such as transmission power and Receiver Signal Strength Indication (RSSI) as in IEEE 802.11 DCF. There is no power control and both control and data packets are transmitted at maximum power. Relay transmission is intended to provide higher throughput and reduced blocking time.

All the nodes maintain a willing list based on the channel quality between them and neighbouring nodes. The length of the willing list is limited to 10 entries to reduce overheads. Nodes keep updating their willing lists with better links and frequently broadcast their willing list to their neighbours. The willing list contains an entry for the credit rating of each potential relay node. This rating improves with successful relaying and degrades with inability to relay.

### 3.1. Throughput Analysis of rDCF

To analytically model rDCF, the authors in [6] have used Bianchi's model [8]. For the throughput calculation, saturated condition (i.e., every node always has data to transmit) is assumed. It further assumes that the channel is ideal (i.e., there are no hidden nodes and capture effect), and calculates the saturated throughput for Relay-Request-To-Send (RRTS)/Relay-Clear-To-Send (RCTS) access. For rDCF, the equations for the average times of channel sensed busy for collision and successful transmission, respectively, are

where
and
are the average times channel is sensed busy during collision and successful transmission. Here RRTS and RCTS are control packets for coordinating relay-enabled transmission as shown in Figure 3. In (15),
,
,
and
are the transmission times for RRTS1 (source to relay), RRTS2 (relay to destination), RCTS and ACK, respectively.
and
are interframe times and
is the propagation delay.
and
are the times for data packets of length
bytes at rates *R1* and *R2*.

### 3.2. Analysis of rDCF with Transmission Errors

Due to the nature of rDCF, we must consider all the links: the link between source and relay (with probability of bit errors and distance ), the link between relay and destination (with probability of bit errors and distance ), and the link between source and destination (with probability and distance ). As a result, the probability of packet errors for the rDCF protocol and overhead caused by packet errors can be derived as (16) and (17).

In (16), is the probability of packet errors, which is based on transmission of individual packets (control and data) involved in rDCF. Note that for packets following RRTS1 their probability of error is conditioned on successful reception of previous packets. For RRTS2 in (16), probability of error is based on the successful reception of RRTS1. In the same way total probability of error is based on the successful reception of all control and data packets.

Probability of packet error is calculated based on the bit error probability of a particular link and length of that packet. In (17) we work out the average time spent in all the packets in error, respectively.

Expressions (18) to (27) are derived and simplified based on (7) to (13) for rDCF:

where and . It is evident that for RRTS1 in error the time spent is shortest and for ACK in error the time spent is the highest.

From (18) to (27) we have derived further parameters for rDCF. In rDCF, the total number of control and data packets is six, which is the sum of , , and . This information is substituted in (7) and (8) to derive (18) to (21) for rDCF. We make use of (7) to derive (18)–(20) for rDCF. In (18) and (19), the probability of successful reception by relay and destination in rDCF is shown. In (20), the probability of successful reception by overhearing nodes in rDCF is shown. In the same way, (8) is used for the derivation of (21), showing the probability of successful transmission by the source in rDCF. Now to address collision in rDCF we make use of (9) and (10), to derive (22) and (23). Expressions (22) and (23) show the probability of reception and transmission of collided packets by destination and source nodes, respectively. Similarly, (24) to (27) shows the probability of transmission (by source) and reception (by relay, destination and overhearing nodes) of packets in error. Further we have shown the calculation for the for the RRTS1.

In Section 4, we perform rigorous performance analysis to show energy consumption, impact of change in packet length, performance under transmission errors and decomposition of energy.

## 4. Performance Analysis

Physical characteristic | IEEE 802.11 b DSSS |
---|---|

32 | |

5 | |

6 | |

DIFS | 50 |

SIFS | 10 |

EIFS | DIFS + SIFS + ACK |

Slot | 20 |

MAC header | 272 bits |

PHY header | 192 |

RTS | 160 bits/control rate + PHY header |

CTS | 112 bits/control rate + PHY header |

ACK | 112 bits/control rate + PHY header |

RRTS1 | 256 bits/control rate + PHY header |

RRTS2 | 260 bits/control rate + PHY header |

RCTS | 120 bits/control rate + PHY header |

Data Rates | 1, 2, 5.5, 11 Mbps |

Control Rate | 2 Mbps |

Propagation Delay | 1 |

Antenna height | 1.5 meters |

Transmit Power | 15 dBm |

Loss | 0 dB |

Shadowing deviation | 10 dB |

Data Rates and Modulations | BPSK @ 1 Mpbs, QPSK @ 2 Mbps, CCK5.5 @ 5.5 Mbps, CCK11 @ 11 Mbps |

Receiver Sensitivity | −94 dBm, −91 dBm, −87 dBm, −82 dBm |

### 4.1. Energy Consumption

In this section we will show the energy consumption of rDCF to analyze the effectiveness of proposed model. We will use it to calculate the energy consumption (J/MB) of rDCF. Equations (7) to (13) are modified according to the protocol and are shown for respective operations in (18) to (27). Expression (11) is used in existing form. Here , and are assigned 1.34 watts, 0.90 watts and 0.73 watts, respectively [10]. Here for the ideal case .

As observed in this section, energy consumption grows linearly with node density. Therefore, it is important to analyze the performance of relay based schemes, to see the impact on energy with change in packet length and effectiveness of the proposed method. It is also important to observe the decomposition of energy to make efficient utilization of energy.

The rDCF (11, 11) achieves maximum savings of 24.9% and 36.99% at 5 and 50 nodes, respectively, due to faster two hops of 11 Mbps in ideal channel conditions. This is evident from the following results that this model helps in predicting the energy consumption and it is encouraging to observe that using a relay not only results in higher throughput but is energy efficient as well. As a consequence of these results we conclude: ( ) relay based transmissions are energy efficient and ( ) relaying for others saves energy for the whole network.

### 4.2. Impact of Change in Packet Length

### 4.3. Performance under Transmission Errors

For the performance of rDCF (R1, R2) under transmission errors we consider bit error probabilities of different modulation schemes used in IEEE 802.11b under Additive White Gaussian Noise (AWGN). The bit error probabilities for BPSK, QPSK, CCK 5.5 and CCK 11 can be easily obtained from [12] to calculate the corresponding packet error rate. In this paper we use the two-ray ground reflection model and card specifications of ORINOCO11b in NS-2 [13]. The two-ray ground model consists of two parts: ( ) Free space path loss for distances less than the Friss cutoff distance, and ( ) The two-ray propagation loss for distances greater than . The bit error rates below were obtained using the two-ray ground model where = 230 meters and antenna height and = 1.5 meters.

For the asymmetric scenario, we have placed relay closer to source (i.e., = 400 m @ 2 Mbps with , m @ 11 Mpbs with and m @ 5.5 Mpbs with ).

We can observe much higher energy consumption for the rDCF (symmetric and asymmetric) in transmission errors as compared to rDCF (ideal). The energy consumption almost doubles for both the symmetric and asymmetric cases, whereas the symmetric and asymmetric scenarios results in similar energy consumption. The difference between the two scenarios is very small and is mainly due to the average time calculation for errors (shown in the Appendix) with different rate combinations.

## 5. Decomposition of Energy Consumed

The useful operations are successful transmission (by source) and successful reception of packets (by relay and destination).

The overhead operations which waste energy are successful reception of packets (overhearing nodes), reception of collided packet, transmission of collided packet and staying idle. It is observed that the energy consumed in successful transmission and reception of data by destination and relay is almost constant. Here it is interesting to see that most of the energy is consumed in listening/overhearing by other nodes. This increases with respect to the number of nodes. In addition to this the energy consumed in receiving collided packet and staying idle also increases with the increase in number of nodes.

Energy consumption of rDCF.

Energy consumption (J/MB) | 5 nodes | 50 nodes |
---|---|---|

rDCF (11, 5.5) Ideal | 1.75 | 16.89 |

rDCF (11, 5.5) Errors | 1.98 | 29.52 |

## 6. Conclusions

We have presented a general analytical energy model for relay based MAC protocols. This model assumes saturated environment and collision of first control packet only. This model is applicable to both ideal channel and transmission errors. This model can be used to illustrate energy consumption of any relay based MAC protocol with modification in accordance to the protocol flow and to cater for any physical layer with change in parameters. Further this model will help in devising energy saving mechanisms/policies based on the energy consumption behavior and decomposition of energy. We have used rDCF as a case to show the efficacy of our proposed analytical model. This model also shows the decomposition of energy for relay based MAC which is of interest to protocol designers. Extensive performance analysis for the relay based MAC has also been provided. We have analyzed energy consumption under the impact of varying packet sizes and rate combinations. We have shown that transmission errors can greatly escalate the energy consumption as it will give rise to overhearing again. Possible future work includes the extension of the above model to the unsaturated case and to obtain experimental results from real life scenario.

## Appendix

## Authors’ Affiliations

## References

- Nosratinia A, Hunter TE, Hedayat A: Cooperative communication in wireless networks.
*IEEE Communications Magazine*2004, 42(10):74-80. 10.1109/MCOM.2004.1341264View ArticleGoogle Scholar - Zheng H, Zhu Y, Shen C, Wang X: On the effectiveness of cooperative diversity in ad hoc networks: a MAC layer study.
*Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '05), March 2005*3: 509-512.Google Scholar - Carvalho MM, Margi CB, Obraczka K, Garcia-Luna-Aceves JJ: Modeling energy consumption in single-hop IEEE 802.11 ad hoc networks.
*Proceedings of the International Conference on Computer Communications and Networks (ICCCN '04), 2004*367-372.Google Scholar - Wang X, Yin J, Agarwal DP: Analysis and optimization of the energy efficiency in the 82.11DCF.
*Mobile Networks and Applications*2006, 11: 279-286. 10.1007/s11036-005-4479-8View ArticleGoogle Scholar - Ergen M, Varaiya P: Decomposition of energy consumption in IEEE 802.11.
*Proceedings of the IEEE International Conference on Communications (ICC '07), June 2007*403-408.Google Scholar - Zhu H, Cao G: rDCF: a relay-enabled medium access control protocol for wireless ad hoc networks.
*IEEE Transactions on Mobile Computing*2006, 5(9):1201-1214.MathSciNetView ArticleGoogle Scholar - Ahmad R, Zheng F-C, Drieberg M, Olafsson S, Fitch M: Modelling energy consumption of relay-enabled MAC protocols in ad hoc networks.
*Proceedings of the 4th International Symposium on Wireless and Pervasive Computing (ISWPC '09), February 2009, Melbourne, Australia*Google Scholar - Bianchi G: Performance analysis of the IEEE 802.11 distributed coordination function.
*IEEE Journal on Selected Areas in Communications*2000, 18: 535-547. 10.1109/49.840210View ArticleGoogle Scholar - Wu H, Peng Y, Long K, Cheng S, Ma J: Performance of reliable transport protocol over IEEE 802.11 wireless LAN: analysis and enhancement.
*Proceedings of the Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '02), 2002*2: 599-607.Google Scholar - Feeney LM, Nilsson M: Investigating the energy consumption of a wireless network interface in an ad hoc networking environment.
*Proceedings of the Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '01), April 2001*3: 1548-1557.Google Scholar - IEEE 802.11b, Part II : Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Spec: High Speed Physical layer Extension in the 2.4 GHz Band. supplement to IEEE 802.11 Standard, 1999Google Scholar
- del Prado Pavon J, Choi S: Link adaptation strategy for IEEE 802.11 WLAN via received signal strength measurement.
*Proceedings of the IEEE International Conference on Communications (ICC '03), May 2003, Anchorage, Alaska, USA*2: 1108-1113.Google Scholar - http://www.isi.edu/nsnam/ns/

## Copyright

This article is published under license to BioMed Central Ltd. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.