- Research Article
- Open Access
Performance Analysis of a Cluster-Based MAC Protocol for Wireless Ad Hoc Networks
© Jesús Alonso-Zárate et al. 2010
- Received: 6 November 2009
- Accepted: 30 March 2010
- Published: 10 May 2010
An analytical model to evaluate the non-saturated performance of the Distributed Queuing Medium Access Control Protocol for Ad Hoc Networks (DQMANs) in single-hop networks is presented in this paper. DQMAN is comprised of a spontaneous, temporary, and dynamic clustering mechanism integrated with a near-optimum distributed queuing Medium Access Control (MAC) protocol. Clustering is executed in a distributed manner using a mechanism inspired by the Distributed Coordination Function (DCF) of the IEEE 802.11. Once a station seizes the channel, it becomes the temporary clusterhead of a spontaneous cluster and it coordinates the peer-to-peer communications between the clustermembers. Within each cluster, a near-optimum distributed queuing MAC protocol is executed. The theoretical performance analysis of DQMAN in single-hop networks under non-saturation conditions is presented in this paper. The approach integrates the analysis of the clustering mechanism into the MAC layer model. Up to the knowledge of the authors, this approach is novel in the literature. In addition, the performance of an ad hoc network using DQMAN is compared to that obtained when using the DCF of the IEEE 802.11, as a benchmark reference.
- Medium Access Control
- Data Packet
- Medium Access Control Protocol
- Busy Period
- Distribute Coordination Function
The IEEE 802.11 Standard for Wireless Local Area Networks (WLANs) defines both the physical (PHY) and the Medium Access Control (MAC) layer specifications . Since its first release version in 1999, several amendments (referred to as the extensions a, b, g, e, or n, among others) have been added to the standard, incorporating more sophisticated PHY layer schemes to attain higher performance in WLAN. However, the foundations of the MAC protocol have survived across the evolution of the standard. Despite few modifications, for example, the 802.11e to provide Quality of Service, its operation remains almost unaltered. Unfortunately, as data transmission rates grow, the MAC protocol overhead is becoming a bottleneck for the performance of next generation wireless networks . For this reason, it is necessary to develop new protocols with reduced overhead that can attain higher performance.
This was the main motivation for the design of the Distributed Queuing MAC protocol for Ad Hoc Networks (DQMAN) presented in  as an innovative MAC protocol that combines the functionalities of both the network and the MAC layers to achieve high performance in wireless ad hoc networks. DQMAN combines a distributed dynamic clustering algorithm based on Carrier Sensing Multiple Access (CSMA) with a near-optimum infrastructure-based MAC protocol for WLANs; the Distributed Queuing with Collision Avoidance (DQCA) protocol . DQCA, in its turn, is based on the Distributed Queuing Random Access Protocol (DQRAP)  which was originally designed for the distribution of Cable TV signals. By integrating a spontaneous, temporary, and dynamic clustering mechanism into the MAC layer, DQMAN extends the stability and high efficiency of DQCA to a completely distributed ad hoc network without infrastructure. Results presented in  show that DQMAN is very efficient in outperforming the 802.11 Standard in single-hop networks operating in saturation conditions, that is, when all the stations of the network are in the transmission range of one another and they always have at least one data packet to transmit. However, saturation conditions only represent partially the performance of a practical network, which will not be working at the saturation point continuously. This is the motivation for this paper, where we present a novel theoretical model of DQMAN to evaluate its performance in non-saturation conditions for single-hop networks. With this model we derive the non-saturation throughput, the average transmission delay, and the average time that each node operates in the different modes of operation in a DQMAN network. This last calculation is very important in energy-constrained networks in order to optimize the clustering algorithm from an energetic point of view. It is worth mentioning that this paper focuses on single-hop networks, while the simulation-based performance evaluation of DQMAN in multihop settings was presented in  and its theoretical analysis remains an open topic for future research.
The remainder of the paper is organized as follows. A description of DQMAN is presented in Section 2. Section 3 is dedicated to the description of the analytical model. In Section 4, we use the model to evaluate the performance of a DQMAN network in terms of throughput, delay, and clustering metrics. Then, the model is validated in Section 5 by comparing the theoretical results with those obtained via computer simulations. Then, the performance of DQMAN is compared to that of the IEEE 802.11 MAC protocol in Section 6, demonstrating the suitability of DQMAN to be considered for implementation in next generation wireless networks. Finally, Section 7 concludes the paper and outlines future lines for research.
DQMAN has been designed as a layer-2 mechanism for wireless ad hoc networks where a number of users are equipped with half-duplex radio stations and share a single common radio channel with any arbitrary bandwidth. The key idea behind DQMAN is that whenever a station seizes the channel to transmit its data packets by executing a distributed access mechanism similar to that of the Distributed Coordination Function (DCF) of the IEEE 802.11 Standard , it establishes a temporary one-hop cluster structure. The station which successfully seizes the channel becomes a temporary clusterhead and it coordinates the data transmissions of all the stations within its transmission range for a bounded period of time. The protocol running within each cluster is a variation of the near-optimum DQCA protocol for infrastructure-based WLANs  which, despite requiring the presence of a central point coordinator, operates in a completely distributed manner. The way the clustering algorithm is combined with an infrastructure-based protocol in DQMAN constitutes an innovative concept design within the context of MAC protocols for wireless ad hoc networks. It allows extending the ideas of DQCA to infrastructureless networks and it could be easily generalized to extend any other centralized MAC protocol to an infrastructureless network. Accordingly, the model presented in this paper could be easily extended to any other MAC protocol based on the concept design of DQMAN. In the next sections, we review both the clustering algorithm and the MAC protocol of DQMAN.
2.1. Clustering Algorithm
Traditionally, clustering algorithms have been designed based on the idea that the more stable the cluster set, the better the network will perform [7–9]. The process of reclustering a part of the network may entail a high cost in terms of resources due to the fact that one clusterhead reassignment could trigger the re-configuration of the entire network. This could happen, for example, when the topology changes due to the mobility of the stations. This is known as the ripple effect of reclustering and it has been traditionally avoided, especially in the case of large mobile ad hoc networks. However, when mobility is present, cluster stability is difficult to attain. In addition, if some stations are to be a priori elected as clusterheads, it is difficult to design efficient criteria for selecting clusterheads in an extremely dynamic and changing environment as in the case of mobile wireless networks. As demonstrated in , the optimal clusterhead set problem is NP-complete, that is, it cannot be solved in polynomial time and, therefore, suboptimal clustering must be carried out in a dynamic environment. This is the main motivation for the passive, spontaneous, and dynamic clustering mechanism considered in DQMAN. Clusters are spontaneously created without explicit control information exchange whenever a station has data to transmit. The cluster structure is maintained for as long as there is data traffic pending to be transmitted among all the stations associated to a cluster. Therefore, the cluster structure is dynamically established and broken up according to the aggregate traffic load and the mobility of the network.
Considering the clustering techniques compared and discussed in [8, 11], and particularly the approach in , where the concept of passive clustering was first presented, the clustering algorithm of DQMAN was designed on the basis of the following:
avoiding explicit clustering overhead,
enabling future integration with legacy IEEE 802.11 networks, that is, backwards compatibility to a certain extent,
sharing in a fair manner the responsibility of becoming clusterhead among all the stations of the network.
The clustering algorithm of DQMAN is based on a one-hop hierarchical master-slave architecture wherein any station can operate in one of the following three modes: master, slave, or idle. Any station should be able to switch from one mode of operation to another according to the dynamics of the network. For clarity of explanation, it will be used hereafter the single terms master and slave to denote stations operating in either master or slave mode. The terms station and mode will be dropped to clarify the discussion.
Cluster membership is implicit and soft-binding and thus there is no explicit process of association and disassociation from the cluster. A station implicitly belongs to a cluster as long as it receives and is able to decode the control packets broadcast by the master. The master does not need any knowledge of the cluster members of its cluster. This is a key feature of the overall mechanism as it minimizes the control load and facilitates its use in highly dynamic and unpredictable environments.
Despite the hierarchical master-slave cluster structure, all the communications are done in a peer-to-peer fashion between any pair of source and destination stations. Note that the term destination in this context refers to the next-hop destination of a packet (which will be specified by the routing protocol) and not necessarily to its final destination station. Routing is out of the scope of the basic definition of DQMAN, but any existing routing protocol could be applied on top of DQMAN without any restriction. Therefore, the master just acts as an indirect coordinator of the peer-to-peer communications within the cluster but it has no explicit control on the access to the channel.
2.1.1. Cluster Formation and Maintenance
Any idle station with data to transmit initially listens to the channel for a deterministic period of time performing the so-called Clear Channel Assessment (CCA) in a similar way to the DCF of the IEEE 802.11 for data transmission. This sensing time is referred to as the Initial Master Sensing Interval (IMSI). It is worth mentioning that in the context of the standard, this IMSI corresponds to the initial Distributed Inter Frame Space (DIFS). If the channel is sensed idle for the entire IMSI, then the station attempts to establish a Master Service Set (MSS), which is actually an implicit cluster. The station becomes master and starts broadcasting a clustering beacon (CB) every seconds. For clarity in the explanation, it is considered that this interbeacon period has a constant duration, although it could have a variable duration depending on the packet sizes and the transmission rates.
The BTs promote a minimum distance of three hops between masters and allow combating the hidden terminal problem at the cost of exacerbating the exposed terminal problem. In addition, the BTs constitute a collision detection mechanism for those stations that attempt to become master. Note that if a recently set master does not sense any BT after the transmission of the CB, this is because there are no available slaves present in its neighborhood. Two situations may produce this fact.
A collision has occurred with another station attempting to become master simultaneously.
It constitutes an isolated master with no other station in its vicinity.
In the case of success, the time elapsed between the BTs and the next CB is devoted to the exchange of data and control packets. It is worth mentioning that in the case that all the stations of the network are in the transmission range of one another (no hidden terminals) the IMSI can take the duration of a DIFS, as in the 802.11 Standard. Otherwise, in general multihop settings with the potential presence of hidden terminals, this IMSI must take the value of the maximum time that an active master will remain silent, which corresponds to the time between two consecutive BTs.
On the other hand, if an idle station senses the channel busy when attempting to get access to it for the first time or it collides when attempting to become master, it initiates a Master Selection Phase (MSP), that is, a random backoff time. This phase consists in setting up a Master Selection Silent Interval (MSSI) counter to a random value. This value must be within a MSSI window (measured in time slots) according to the algorithm presented in the next section. This operation is similar to the Binary Exponential Backoff of the IEEE 802.11 Standard, which uses the terms backoff counter and Contention Window (CW), respectively. Likewise, any station performing an MSP listens to the channel and decrements the MSSI counter by one unit after each time slot as long as the channel is sensed idle. Upon the expiration of the MSSI counter, the station attempts to establish its MSS (cluster). The algorithm to set the initial value of the MSSI counter is presented in the following section.
2.1.2. Setting the MSSI
where , that is, a uniform integer random variable between 0 and , and is a deterministic period of time. and are tunable parameters that have integer values. The purpose of the fixed minimum period of time is to reduce the probability that a station becomes master twice consecutively in time, as it was shown in . The randomized time interval reduces the probability that two or more stations attempt to become master simultaneously and collide. Since the parameter defines the size of the uniform random contention window, its value should be properly selected as a function of the number of active stations and the offered load to the network. A proper tuning of this parameter avoids either unnecessary wasted time in deferral periods or a high probability of collisions. Despite this algorithm, collisions can still occur. The collision resolution algorithm of DQMAN is described in the next section.
2.1.3. Master Collision Resolution
A collision occurs when two or more stations in the transmission range of one another attempt to become master simultaneously and their CBs collide. Any station which attempts to establish its MSS interprets that a collision with at least another station has occurred if no busy tones (BTs) from other slaves are received after the transmission of the CB. Since the corresponding CBs collide, the possible potential slaves are not able to receive them properly. The stations involved in the collision reinitiate a new MSP by selecting a new value for their respective MSSI counters as soon as the collision is detected.
2.1.4. Dynamic Reclustering
Any master reverts to idle whenever there are no more pending data transmissions among all the stations associated to its cluster (including its data traffic). A master can easily learn whether there is no data activity in the network using the MAC protocol rules and the state of the two distributed logical queues that manage both the collision resolution and the transmission of data (see Section 2.2 for an overview of the MAC protocol operation and  for the details of the protocol rules). Therefore, the cluster layout is dynamically changed along time as a function of the aggregated traffic load offered to the different sets of nodes in the network.
In addition, whenever a slave mishears a number of CBs from the master, it reverts to idle. Note that this happens if the master has either moved away from the slave (or vice versa) or the former has been switched off. It is worth mentioning that due to the channel fading and shadowing, a CB can be lost without implying that the connection with the master has been permanently lost. For these cases, it is convenient to consider that a master is not reachable if more than one CB is lost. Without loss of generality, and unless otherwise stated, it will be henceforth considered that a slave disassociates from the master if it mishears two consecutive CBs.
In addition, in order to avoid potential static cluster settings under heavy traffic conditions, any master reverts to idle after a bounded period of time regardless of the waiting data to be transmitted within its cluster. This is referred to as the Master Time Out (MTO) mechanism; any master decrements its MTO counter by one unit after the transmission of each CB, that is, after each MAC frame. Upon expiration of the counter, the station always reverts to idle mode regardless of the data activity of the network. The criteria to determine the value of this maximum time has been comprehensively studied in , showing a tradeoff between fairness, in terms of sharing the responsibility of being master among all the users of the network, and maximum performance in terms of throughput.
2.2. The MAC Protocol
Within the context of DQMAN, the clustering beacon (CB) described before gets the form of a control packet, named Feedback Packet (FBP). This FBP can be seen as the CB with additional control information necessary for the protocol operation. Therefore, the FBP is periodically broadcast by the master within each cluster, defining the time-frame structure depicted in Figure 2. All the stations within a cluster are synchronized with this time structure. Every frame is divided into three parts.
A contention window (CW), further divided into m access minislots (typically 3 ) wherein slaves with data ready to transmit must send an Access Request Sequence (ARS). These sequences are pseudo-noise- (PN-) coded signals that allow the master station to decide whether each of the m minislots is in one out of three possible states: (i) empty, (ii) success, corresponding to the fact that just one ARS has been sent, or (iii) collision, when more than one (no matter how many) ARS have been sent within the same minislot. A mechanism to ensure the proper operation of the detection of the state of each minislot is the subject of a patent .
A data part devoted to an almost collision-free transmission of data packets. The duration of this part depends on both the data transmission rate and the bit length of the data packets, which could change dynamically along time.
- (3)A control part devoted to the exchange of the following control signaling:
ACK packets sent by any destination station upon the reception of a data packet,
the FBP broadcast by the master of the cluster. This packet contains the minimum control feedback information required to execute the rules of the protocol at each slave,
in-band busy tones (BTs) transmitted by the slaves associated to a master. Since busy tones do not have to contain any information, they can be simple pseudo-random sequences, following the same operation as the ARS.
Short Interframe Spaces (SIFSs) are left between the different parts of the frame and after the transmission of the ACK and FBP packets in order to process the payload of the packets, tolerate RF turn-around times, and to compensate possible non-negligible propagation delays.
At the end of each MAC frame, all the stations use the feedback information attached to the FBP to execute the rules of DQCA. The details of these rules are out of the scope of this paper, but the interested reader is referred to  for a detailed description. However, for the sake of completeness, an overview of the protocol operation is presented herein. A station willing to get access to transmit a data packet must check the state of a distributed queue named Collision Resolution Queue (CRQ) and wait until it is empty. When this condition is fulfilled, the station must randomly select one of the m access minislots and transmit an ARS. The stations which collide with other ARSs from other stations are queued into the CRQ. Orderly in time, they try to solve their collisions in the following frames following a blocked-access m- branch tree splitting algorithm. Whenever a station which sends an ARS in an access minislot succeeds, it enters the Data Transmission Queue (DTQ). Orderly in time, the stations in the DTQ transmit their data packets in the data part of the frame. The only information a station needs to keep track of the queues are the total amount of stations queuing in each of the two queues and its position in any of the queues. This information can be simply stored using four integer numbers, which are recorded and updated in each station of the network in a distributed way. It is worth emphasizing that master stations do not need to contend for the channel. Whenever a master station has data to transmit, it just enters into the next position of the DTQ. However, for the sake of the integrity of the rules executed by all the stations, it must report a "virtual" successful access request in the corresponding FBP.
In this section we present a theoretical model of DQMAN under non-saturation conditions for single-hop networks. This constitutes the main contribution of this paper.
3.1. Network Model
An infrastructureless wireless network formed by n stations is considered, all of them within the transmission range of one another (single-hop network). For the sake of simplicity and in order to focus on the layer-2 performance, a non-fading channel is considered. All the stations generate Poisson-distributed data messages whose length is an exponential random variable with average L b bits. These messages are fragmented into packets of fixed length L bits and buffered into infinite-size buffers before being transmitted through the radio interface. Exactly one packet of length L is transmitted within the data part of each single MAC frame. Therefore, where corresponds to the average number of frames needed to transmit a message. Traffic generation is homogeneously distributed among the stations and the aggregated message arrival rate is (messages/frame). A common and constant transmission rate is considered for all the stations.
The duration of each superslot is different and depends on the current state of the network. In particular,
the duration of the superslot when there is no cluster established (the network is idle) is denoted by and is a constant value equal to the duration of a slot. The probability of having an idle superslot is ,
the duration of a superslot when a cluster is successfully established, is a random variable that depends on the traffic load and its value is denoted by . The probability of having this event in a given slot is denoted by ,
where is the duration of the IMSI interval, is the time required to transmit a FBP, is the duration of a SIFS, and is the duration of an access minislot. Recall that a collision among masters is detected by a recently set up master station if there is no busy tone (which has duration ) within the BT slot of the first MAC frame.
This definition of the average duration of a superslot will allow us to evaluate the performance of the network later in Section 4. In order to compute the value of (2), we present a theoretical model of DQMAN to obtain the value of the following:
3.2. DQMAN Theoretical Model
The superslot structure has been introduced as an abstraction tool to model the operation of the entire network. Superslots allow defining the operation of the entire network as a semi-Markovian process with three different states. Changes in the state of the network occur at the end of each superslot. Having this model in mind, the proposed analytical model consists of two parts:
transitions between states in the network, that is, the clustering mechanism are modeled with an embedded Markov chain that extends the chain in Figure 4 to consider the operation details of DQMAN,
once a cluster is running, the performance of the network can be modeled with classical queuing theory , modeling the operation of the modified DQCA protocol used within DQMAN.
We describe and analyze these two models in the following sections.
3.2.1. Clustering Model
The sojourn time at each of the states is the average time spent at each state, which might be different for each state. These sojourn times depend on the state transition probabilities at the end of each superslot. In their turn, these transitions between the different states of the chain are driven by the aggregate offered traffic load and both the network and channel states, which can be either idle or busy. Recall that since all the stations are within the transmission range of one another, both the network and the channel states are the same for all of them. Therefore, and according to the superslot definition, transitions of the chain take place at the end of each superslot, which has no constant value.
In order to analyze this model, the probability of collision whenever a station attempts to become master is denoted by p and it is assumed to have a constant value, as previously done in [16–18] when modeling the performance of the IEEE 802.11. Then, the channel state can be expressed as a function of two probabilities.
With these equations we can fully characterize the embedded Markov chain that models the clustering algorithm of DQMAN to compute the values of , , and , which are necessary to compute (2). We will calculate them later in Section 4.
3.2.2. The DQMAN Busy Period
The remaining parameter necessary for the computation of (2) is the value of E[T S ]. This parameter corresponds to the average lifetime of a cluster once a station is set to master. In order to compute this value later in Section 4, we have to characterize the operation of DQMAN once a cluster is set.
The Enable Transmission Interval (ETI) is the time elapsed from the actual arrival time of a message at the head of the MAC scheduler to the beginning of the next frame, when the contention process can start. This ETI is modeled with a non-queuing infinite server system. The traffic offered by the slaves passes through two concatenated queuing systems. The first queuing system models the collision resolution subsystem and the second represents the data transmission subsystem. In addition, since the traffic offered by the master avoids the contention process with other stations, another non-queuing infinite server system is added to the model. It is the Empty Minislot Interval (EMI) and it represents the average time elapsed from the moment a message arrives at the head of the MAC scheduler to the moment when there is at least one empty minislot wherein the master can report a successful "virtual" access request. The input to the data transmission subsystem is the total aggregated traffic load .
is the average duration of the ETI. This latency is added by the framed nature of the protocol and, since the arrivals at the MAC layer are completely independent of the framed nature of the protocol, its average duration is equal to 0.5 MAC frames. In other words, it will be necessary to wait in average for half the duration of a frame to initiate the contention process,
The calculations of these parameters are presented throughout the following sections.
(1) Average Empty Minislot Interval for Masters
(2) Average Data Transmission Subsystem Delay
(3) Average Collision Resolution Subsystem Delay for Slaves
(4) Average Data Collision Delay
In this section we use the model presented in the previous section to evaluate the performance of a DQMAN network in terms of throughput, average transmission delay, and average time spent in each of the modes of operation.
4.1. Throughput Analysis
is the duration of each one of the m access minislots and the added unit is included to take into account for the busy tone minislot. and are the duration of the transmission of the data and ACK packets, respectively. is the data packet-length transmitted in each frame expressed in bits. In order to compute the value of this expression, it is necessary to obtain the values of , , , and E[ ]. Recall that the values of and have deterministic values.
The set of expressions (35), (37), and (38) form a nonlinear system that can be solved by means of numerical methods constrained to the condition that all the probabilities are within the interval . Once the parameter is obtained, it is easy to calculate the parameters and , which are required to compute the total throughput of the network as expressed in (29).
4.2. Average Message Transmission Delay Analysis
The average message transmission delay is defined as the time elapsed from the moment a message arrives at the MAC layer (is generated from this point of view) to the moment when the last fragment (data packet) of the message is successfully acknowledged by the destination at the MAC level.
If the station is operating either in master or slave modes (with probabilities and , resp.) at the moment of the arrival, then the average delay is equal to E . This term corresponds to the average message transmission delay during a busy period (when a cluster is running) and it can be calculated with (10) derived before.
This approximation has been validated through computer simulation and its validity is due to the uniform MSSI mechanism and the fully distributed and independent operation of the stations.
with E , E , and E the average time that a station operates in master, slave, and idle mode, respectively. These average periods of time operating in each of the modes can be obtained by multiplying the steady state probabilities of being in each state of the embedded Markov chain by the average sojourn time at each state. The average sojourn at each state is computed as follows.
This equation considers that, for the duration of a collision, the rest of the stations which are not involved in the collision remains idle and waits for the channel to become idle.
Note that this expected value depends on the probability of colliding when attempting to become master: in the case of success, a station which becomes master will operate in this mode during a complete DQMAN busy period, and in the case of a collision, a master will operate as such for the time required to detect the collision.
The accuracy of the theoretical model of DQMAN for non-saturation traffic conditions in single-hop networks is assessed in this section. Results obtained with the analysis have been compared to the ones obtained through computer simulations using a custom-made C++ simulator. The fact that DQMAN is very different from any standard led us to develop our own simulator rather than using any well-known simulator such as ns-3, ns-2, or OMNet, among many others. Our simulator reproduces the operation of the network and the rules of the clustering and MAC protocol without using any mathematical expression for the MAC layer. It should be mentioned that the proposed model is valid in steady state conditions and thus all the analytical curves presented in this section are valid as long as . In the limit where , the non-saturation model provides the same results as the saturation model presented in .
System Parameters for Analysis and Simulation.
Data Packet Length (MPDU)
Average Message Length (exponential distribution)
Data Tx. Rate
Control Tx. Rate
ACK and FBP packets
Access Minislots (m)
ARS and SIFS
The value of has been set to 64 to reduce the probability of collision. Recall that a collision occurs when more than one of these stations attempt to become master simultaneously. Any data transmission is successful with a constant probability . Without loss of generality, it will be considered hereafter that . Different values of this probability constitute just a scaling factor of the total throughput. This assumption focuses the attention on the MAC performance, leading to upper bound values for the actual throughput.
Each of the points in the plots shown in the next sections has been obtained by simulating 10 minutes of real operation of the network and averaging the results of 25 independent simulations to ensure the statistical independence of the results. In addition, the first minute of each simulation has not been considered for statistics in order to avoid the possible transitory effects. The main results are presented and discussed in the next section.
The performance of DQMAN under non-saturation conditions is compared in this section to that of the DCF of the IEEE 802.11 Standard. In the light of a fair comparison, the 802.11 DCF has been also implemented in the same C++ simulator.
We consider the same scenario as the one used for the model validation presented in the previous section. Three different networks have been evaluated in this case:
a network where the stations execute the DQMAN protocol,
a network where the stations execute the basic access mode of the IEEE 802.11,
a network where the stations execute the collision avoidance mode of the IEEE 802.11 with RTS/CTS handshake between source and destination.
For the network running the IEEE 802.11 MAC protocol, the minimum backoff window has been set to 64 and 3 backoff stages have been considered. Accordingly, and in order to obtain a fair comparison between both protocols, the parameters of the MSP of DQMAN have been set to and . The lengths of the RTS and CTS packets have been set to 20 and 14 bytes, respectively, and the duration of the DIFS and SIFS to 50 s and 10 s, respectively. In this case, a constant message length of 1500 bytes has been considered, which means that just one packet is transmitted once the channel is successfully seized.
The basic access method shows a maximum throughput operational point close to the 14 Mbps. These values represent an improved saturation throughput of 2 Mbps (17%) with respect to the collision avoidance mode. However, for higher offered loads, the throughput of the basic access model decreases asymptotically to a stable value of approximately 8.5 Mbps, which is below the saturation throughput of the collision avoidance access mode. The main reason for this performance is that the probability of collision increases with the offered traffic load. Therefore, the longer duration of collisions in the basic access mode yields lower throughput when compared to the collision avoidance mode where collisions are confined to control packets (RTS packets). On the other hand, DQMAN reaches the saturation conditions at an approximate traffic load of 17.8 Mbps and it remains stable at this value for higher traffic loads. This represents an improvement of 30% and 50% with respect to the peak of throughput attained by the collision avoidance and basic access modes of the standard, respectively. However, under heavy traffic conditions, DQMAN outperforms any of the two access modes of the standard in at least 85%. The reason for this improved performance of DQMAN resides in the fact that it eliminates backoff periods devoted to the transmission of data and collision of data packets are completely avoided. Note that in DQMAN contention-based access is confined to the clustering phases.
DQMAN has been presented in the literature as a high-performance MAC protocol for wireless ad hoc networks. In this paper we have developed a theoretical model to evaluate the performance of DQMAN in wireless infrastructureless ad hoc single-hop networks under non-saturation conditions. The model includes the whole operation of DQMAN taking into account the integration of a near-optimum MAC protocol with a passive clustering algorithm. An embedded Markov chain has been used to model the clustering algorithm of a DQMAN station. Then, the average time spent at each state has been calculated by integrating classical queuing theory into the model. Combining the two analyses, the performance of the network has been evaluated in terms of throughput, average time spent in each mode of operation (idle, master, or slave), and average message transmission delay. In addition, computer link-level simulations have been used to validate the accuracy of the model and to show that DQMAN outperforms the IEEE 802.11 Standard in terms of throughput and average message transmission delay.
Our ongoing and future work is aimed at implementing the protocol in a testbed to evaluate the performance of DQMAN in a real network in the light of its commercial application.
This work was partially funded by the Research Projects NEWCOM++ (ICT-216715), R2D2 (CP6-013), CENTENO (TEC2008-06817-C02-02), and COOLNESS (218163-FP7-PEOPLE-2007-3-1-IAPP) and by Generalitat de Catalunya (2009-SGR-940).
- IEEE, Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE Std. 802.-11-99, August, 1999Google Scholar
- Xiao Y, Rosdahl J: Throughput and delay limits of IEEE 802.11. IEEE Communications Letters 2002, 6(8):355-357. 10.1109/LCOMM.2002.802035View ArticleGoogle Scholar
- Alonso-Zárate J, Kartsakli E, Skianis C, Verikoukis C, Alonso L: Saturation throughput analysis of a cluster-based medium access control protocol for single-hop ad hoc wireless networks. Simulation: Transactions of the Society for Modeling and Simulation International 2008, 84(12):619-633. 10.1177/0037549708099232View ArticleGoogle Scholar
- Alonso-Zárate J, Kartsakli E, Verikoukis C, Cateura A, Alonso L: A near-optimum cross-layered distributed queuing protocol for wireless LAN. IEEE Wireless Communications 2008, 15(1):48-55.View ArticleGoogle Scholar
- Xu W, Campbell G: A near perfect stable random access protocol for a broadcast channel. Proceedings of the IEEE International Conference on Communications (ICC '92), 1992 1: 370-374.Google Scholar
- Alonso-Zárate J, Verikoukis C, Kartsakli E, Alonso L: Performance enhancement of DQMAN-based wireless ad hoc networks in multi-hop scenarios. Proceedings of the 3rd International Symposium on Wireless Pervasive Computing (ISWPC '08), May 2008, Santorini, Greece 425-429.Google Scholar
- Prehofer C, Bettstetter C: Self-organization in communication networks: principles and design paradigms. IEEE Communications Magazine 2005, 43(7):78-85.View ArticleGoogle Scholar
- Yu JY, Chong PHJ: A survey of clustering schemes for mobile ad hoc networks. IEEE Communications Surveys and Tutorials 2005, 7(1):32-48.View ArticleGoogle Scholar
- Wei D, Chan HA: A survey on cluster schemes in ad hoc wireless networks. Proceedings of the 2nd International Conference on Mobile Technology, Applications and Systems, January 2005, GuangZhou, China 62.Google Scholar
- Li C: Clustering in packet radio networks. Proceedings of the IEEE International Conference on Communications (ICC '85), 1985 283-287.Google Scholar
- Wei D, Chan HA: A survey on cluster schemes in Ad Hoc wireless networks. Proceedings of the 2nd International Conference on Mobile Technology, Applications and Systems, November 2005 1-8.Google Scholar
- Kwon T, Gerla M, Varma VK, Barton M, Hsing TR: Efficient flooding with passive clustering—an overhead-free selective forward mechanism for ad hoc/sensor networks. Proceedings of the IEEE 2003, 91(8):1210-1220. 10.1109/JPROC.2003.814920View ArticleGoogle Scholar
- Alonso J, Verikoukis C, Alonso L: Fairness enhancement in a self-configuring cluster-based wireless ad hoc network. Proceedings of the 8th International Symposium on Wireless Personal Multimedia Communications (WPMC '05), September 2005, Aalborg, DenmarkGoogle Scholar
- Campbell G, et al.: Method and apparatus for detecting collisions and controlling access to a communications channel. US patent no. US6408009 B1, June 2002Google Scholar
- Kleinrock L: Queuing Systems. John Wiley & Sons, New York, NY, USA; 1976.Google Scholar
- Bianchi G: Performance analysis of the IEEE 802.11 distributed coordination function. IEEE Journal on Selected Areas in Communications 2000, 18(3):535-547. 10.1109/49.840210View ArticleGoogle Scholar
- Wu H, Peng Y, Long K, Cheng S, Ma J: Performance of reliable transport protocol over IEEE 802.11 wireless LAN: analysis and enhancement. Proceedings of the Annual Joint Conference on the IEEE Computer and Communications Societies (INFOCOM '02), June 2002 599-607.Google Scholar
- Alizadeh-Shabdiz F, Subramaniam S: Analytical models for single-hop and multi-hop ad hoc networks. Mobile Networks and Applications 2006, 11(1):75-90. 10.1007/s11036-005-4462-4View ArticleGoogle Scholar
- Alonso-Zárate J, Gregoratti D, Giotis P, Verikoukis Ch, Alonso L: Medium access control priority mechanism for a DQMAN-based wireless network. IEEE Communications Letters 2009, 13(7):495-497.View ArticleGoogle Scholar
- Alonso L, Agustí R, Sallent O: Near-optimum MAC protocol based on the distributed queueing random access protocol (DQRAP) for a CDMA mobile communication system. IEEE Journal on Selected Areas in Communications 2000, 18(9):1701-1718. 10.1109/49.872957View ArticleGoogle Scholar
- Yeo J, Youssef M, Agrawala A: Characterizing the IEEE 802.11 traffic: the wireless side. University of Maryland, College Park; 2004.http://www.cs.umd.edu/Library/TRs/CS-TR-4570/CS-TR-4570.pdfGoogle Scholar
- IEEE Std. 802.11g, Supplement to Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications; Further High-Speed Physical Layer Extension in the 2.4GHz Band, 2003Google Scholar
This article is published under license to BioMed Central Ltd. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.