Skip to main content

Optimizing the performance of non-fading and fading networks using CSMA with joint transmitter and receiver sensing

Abstract

We consider a mobile ad hoc network where packets belonging to specific transmitters arrive randomly in space and time according to a 3-D Poisson point process, and are upon arrival transmitted to their intended destinations using the carrier sensing multiple access (CSMA) MAC protocol. A packet transmission is considered successful if the received SINR is above a predefined threshold for the duration of the packet. A simple fully-distributed joint transmitter-receiver sensing scheme is proposed for the CSMA protocol to improve its performance in both non-fading and fading networks. The outage probability of this enhanced version of CSMA is derived and optimized with respect to the sensing thresholds. In order to derive a mathematical expression for the optimal sensing thresholds, the inherent hidden and exposed node problems of CSMA are considered and efficiently balanced. The performance of this improved CSMA protocol is compared to the other flavors of CSMA, and shown to bring about significant performance gain.

Introduction

Medium access control (MAC) layer design is commonly applied to address the problem of allocating scarce resources in a wireless network. Various MAC protocols are proposed in order to share the communication channel in the most efficient manner, in order to minimize the destructive interference. One such protocol that has gained great popularity is carrier sensing multiple access (CSMA). This protocol is successfully employed in the IEEE 802.11 standard family, and many enhancements have been proposed and implemented in order to minimize the inherent hidden and exposed node problems [13]. Nevertheless, there is still room for improvement, in particular in networks with high density of simultaneous transmissions. This provides the motivation behind our study.

Numerous studies have evaluated the performance of the CSMA protocol, evaluating its performance in terms of throughput and bit error rate [46]. Much of this study confirms CSMA’s superiority over other protocols, such as ALOHA, with natural tradeoffs in other domains such as transmission rate and delay [1, 6]. Also, many extensions have been proposed to improve the performance of CSMA [79]. However, the conventional model used in most of these studies assumes that the topology of the network is known, and that multiple links cannot communicate simultaneously. Such assumptions are not realistic for mobile ad hoc networks (MANETs). The closest model to a real-life ad hoc network is that used in [10, 11], where users are assumed to be Poisson distributed in space and each transmitter communicates with its own receiver using ALOHA, while allowing for simultaneous communication between links. This model was embraced in [12], and is also applied in our study.

Choosing the right value for CSMA’s sensing threshold (which the backoff decision is based on) is of great importance for the performance of this protocol. Many studies have proposed various adaptation schemes to find the optimal carrier sensing threshold of CSMA to enhance the throughput and the transmission reliability in dynamically changing networks [1315]. In [2], a novel analytical model was introduced for determining the optimal carrier sensing range in ad hoc networks by minimizing the sum of the hidden and exposed terminal areas. The optimization is done in terms of aggregate throughput, yielding that the optimal carrier sensing range is approximately equal to the interference range. The study of [16] further improves the carrier sensing capability of CSMA by adding fairness to the equation, while retaining the throughput performance. The shortcoming of this study is that only six node pairs are considered in the performance evaluation, limiting the applicability of the results to a randomly distributed ad hoc network with high density of simultaneous transmissions. Moreover, it is shown in [7] that the optimal algorithm is for the senders to keep the product of their transmit power and carrier sensing threshold equal to a constant. However, this algorithm is not distributed, and is dependent on the estimation of signal powers. Another algorithm for maximizing the throughput is to decrease the sensing range as long as the network remains sufficiently connected [17]. An improved carrier sensing threshold adaptation algorithm was proposed in [8], where each node chooses the sensing threshold that maximizes the number of successful transmissions in its neighborhood. The drawback of this technique is that it relies on the collection of information over a period of time, which entails higher complexity, and introduces delays. Zhu et al. derive in [9] the optimal sensing threshold of the conventional CSMA protocol to be β t =ρ(1 +β1/α)α, where ρ represents the transmitted signal strength, α is the path loss exponent, and βis the minimum required signal-to-interference-plus-noise ratio (SINR) threshold for correct reception of packets. The optimized CSMA protocol was evaluated on a real test-bed in [18].

In [12], a new version of the CSMA protocol is proposed, denoted CSMARX, where the receiver (as opposed to the transmitter in CSMATX) performs the channel sensing and makes the backoff decision. The sensing thresholds of both CSMATX and CSMARXare optimized in a non-fading ad hoc network. It is shown that for lower densities, applying a sensing threshold may not provide any improvement compared to having no sensing at all. For higher densities, however, significant reduction in the outage probability can be obtained by setting the sensing threshold of the transmitter in CSMATX, β t , or of the receiver in CSMARX, β r , equal to the communication threshold, β, i.e., β t opt β r opt β.

Having considered the performance of CSMATXand CSMARX, a natural question then becomes: Can we improve the performance of CSMA further if we allow both the transmitter and its receiver to sense the channel, and subsequently let them collectively decide whether or not to initiate transmission of each packet? And moreover, what are the optimal sensing thresholds that minimize the outage probability of this new flavor of CSMA both in the absence and presence of fading?

Hence, in the following, we will analyze the impact of a joint backoff decision making on the performance of the CSMA protocol. Following the same style of notation as in [12], we refer to this modified flavor of CSMA as CSMATXRX. The analytical framework used in the present study is inspired from [12], with the addition of allowing for a joint backoff decision making mechanism, and adding fading effects to the network model. The concept of a joint backoff decision making was first introduced in [19], where only a non-fading network was considered, and the MAC protocols did not allow for multiple backoffs and retransmissions, something that simplified the analysis significantly. Not only is the analysis of the present article useful for future improvements made to CSMA, it also provides us with a fundamental understanding of the hidden and exposed node problems, which are the main sources of imperfection of this protocol. This in-depth understanding is used to derive the optimal sensing thresholds of CSMATXRX, something that would otherwise be too complicated to achieve. The hidden node problem occurs whenever a new node is unable to detect an ongoing transmission, so that it initiates its transmission and thereby causes outage for an already active packet. The exposed node problem is characterized by transmissions being prevented even though they could have taken place without harm to other ongoing transmissions. A decrease in one of these two problems, results in an increase in the other, and vice versa. Choosing optimal values for the sensing thresholds β t and β r will provide a balance between the hidden and exposed node problems, thus improving the network performance.

System model

Our network model considers a mobile network where packets are distributed randomly in space and time according to a 3-D Poisson point process (PPP). At a snapshot in time, the network consists of transmitter-receiver pairs distributed randomly on a 2-D plane according to a homogeneous spatial PPP with density λs [nodes/m2]. At each transmitter, a series of packets, each with a fixed duration T, arrives according to an independent 1-D PPP in time with intensity λt[packets/sec/node]. If we only consider the arrival of new packets in space, the packet density is λ=λsλtT. As this network model entails two independent Poisson distributions, we would have to average over both the spatial and temporal statistics to obtain the outage probability, making the mathematical analysis infeasible. Thus, we consider our wireless network from an alternative point of view: Upon the arrival of each packet, it is assigned to a transmitter node, which is then randomly placed on a 2-D plane (uniformly distributed in area A), as illustrated in Figure 1. Upon the formation of each packet and according to the specified MAC protocol, it is transmitted with constant power ρ to its intended receiver a fixed distance R away. When the packet has been served (successfully or not), the corresponding transmitter-receiver pair disappears from the plane. As long as the maximum number of backoffs, M, and retransmissions, N, is not reached, the packet is placed back in the packet arrival queue, with a new transmission time. The retransmitted packet will be located in a new position, which is justified by our assumption of high mobility.

Figure 1
figure 1

Each new packet arrival is assigned to a transmitter-receiver pair, which is then located randomly on a 2-D plane.

Such a 3-D representation of the network model simplifies our study, as it allows us to consider a single random process describing both the temporal and spatial variations of the system, something that facilitates analyses that previously have been perceived as too complicated to perform. Note that the temporal PPP of packet arrivals at each node is independent of the PPP of transmitter locations in space. Due to the high mobility assumption in our network, different sets of packets are active between times t0 and t0 + T. Since the waiting time from one transmission attempt to the next is set to be greater than T, we have that there are no spatial and temporal correlations between retransmission attempts. Moreover, note that the fixed distance of R between each transmitter-receiver pair does not affect the Poisson distribution of the interferers. That is, from the point of view of each node (receiver or transmitter), the interfering transmitters have a random topology following a PPP, meaning that many of the interfering transmitters could be at a random distance less than R away. Also, setting the distance between each transmitter-receiver pair to a fixed value, does not impact our analysis and results, as we are considering the lower bound to the outage probability. To prove this claim, consider the general expression for the probability of an erroneous packet reception in an interference-limited PPP network, where d denoting the distance between a transmitter and its own receiver, is a random variable:

P error ( d ) = Pr SINR β E d 1 e k d 2 ; where k = λΠ β 2 / α 1 e k E d d 2 1 e k E d [ d ] 2 ,
(1)

where we have used: E d d 2 =var(d)+ E d d 2 . Replacing E d [d] by a fixed value R yields the error expression we use in our analyses and thereby confirms that our assumption on the fixed transmitter-receiver distance does not impact the lower bound outage probability analysis significantly. Also, it is worthwhile noting that the whole network with a fixed R could be viewed as a snapshot of a multi-hop wireless network, where R is the bounded average inter-relay distance. For more details on this 3-D model, please refer to [12].

Our traffic model has the following main attributes, which will be significant in our derivations;

Our network is highly mobile, meaning that different and independent sets of nodes are observed on the plane from one slot (of duration T) to the next.

The waiting time between each retransmission attempt, t wait , is by design ensured to be more than T. Because of the high mobility assumption, new channel instances are observed between transmission attempts, and thus there are no temporal correlations between retransmissions.

Upon retransmission of a packet, it is treated as a new packet arrival and placed in a new location, resulting are no spatial correlations between retransmission attempts.

For the channel model, we consider both non-fading and fading networks. In the former, only path loss attenuation effects are considered, with path loss exponent α>2. Each receiver potentially sees interference from all transmitters, and these independent interference powers are added to the channel noise η to cause signal degradation. The introduction of fading adds a new source of randomness to the model, namely the channel coefficients h ij . The SINR in a non-fading network and the SINRfin a fading network are given respectively as

SINR = ρ R α η + i ( t ) ρ r i α SINR f = ρ R α h 00 η + i ( t ) ρ r i α h 0 i ,
(2)

where r i is the distance between the node under observation and the i th interfering transmitter; h00represents the fading effects between the receiver under observation, RX0, and its designated transmitter; h0i is the fading coefficient between RX0 and the i th interfering transmitter. The summation is over all active interferers on the plane at a given time instant t.

MAC protocol

The channel access is driven by the CSMATXRXprotocol. This protocol operates as follows: When the transmitter has a packet to transmit, it performs physical carrier sensing of the interference power, Pint, in the channel (i.e., the radio measures the energy received on its available radio channel). Based on this measurement, and its knowledge on the distance R to its own receiver, the transmitter calculates the expected received SINR by using Equation (2), where the denominator is replaced by the measured Pint. If this expected received SINR is below the required threshold β t , the channel is considered busy and the transmitter refrains from transmission. If it is above β t , a request-to-send (RTS) signal is sent to the receiver, which then performs a similar channel sensing of the interference power around itself. If this measured SINR at the receiver is below the required sensing threshold β r , it informs its transmitter to cancel the transmission; if the measured SINR is above β r , a clear-to-send (CTS) signal is sent to the transmitter, which then initiates the packet transmission.

Once a transmission is initiated, there is still a probability that the packet is received in error at its destination, i.e., the received SINR is below βat some t(0,T). In this case, the packet is retransmitted. Each packet is given M backoffs and N retransmissions before it is dropped and counted to be in outage.

Note that the main difference between the proposed CSMATXRX protocol and the CSMA/CA protocol used in the IEEE 802.11 standard is that in the latter, all nodes hear the RTS and CTS signals, whereas in CSMATXRX, the communication of control signals occurs between a transmitter and its own receiver only (e.g., by using coding or separate frequency bands). Such isolated signaling scheme has a few benefits: (a) collision between the control signals is avoided, (b) delays in the decision-making stage are reduced, and (c) the situation where nodes unnecessarily decide to back off due to the detected RTS/CTS signal (even though their packets would have been received correctly at their own receivers) is mitigated.

Performance metric

Our performance metric is outage probability, which is defined as the probability that a packet is received erroneously at its receiver after M backoffs and N retransmissions. Outage probability is closely related to the ubiquitous metric Transmission Capacity, given as

S = λ b ( 1 P out ) ,
(3)

where b is the average rate that a successful packet achieves, with units [bits/s/Hz per packet]. The unit of S is [bits/s/Hz/m2]. In the following sections, we derive the outage probability of CSMATXRXboth in the absence and in the presence of fading. In Section 5, the sensing threshold of the transmitter, β t , and that of the receiver, β r , are both optimized.

Performance in the absence of fading

In this section, we assume no fading effects in the channel, i.e., the signal degradation is due to path loss only, as described in Section 2. First, we explain the method of analysis as well as the key steps of the mathematical derivations, before the result of the analysis is presented in Subsection 3.2.

Method of analysis

Denoting the SINR based on the transmitter’s sensing by SINR t , and that based on the receiver’s sensing by SINR r , the outage probability of CSMATXRXis given as

P out ( CSMA TXRX ) = Pr SINR t and SINR r below thresholds during M backoffs and N + 1 retransmissions = Pr SINR t < β t SINR r < β r at t = 0 M 1 Pr SINR t < β t SINR r < β r at t = 0 M Pr SINR r < β at some t [ 0 , T ) N + 1 .
(4)

Due to the distance dependence of the interference, in order to derive expressions for the above terms, we apply the concept of guard zones [10]. Defining s r to be the distance between the receiver under observation, RX0, and its closest interferer, TX i , that causes the SINR to fall just below the threshold β r , yields

s r = R α β r η ρ 1 α .
(5)

Based on Equation (5), β t corresponds to s t and β to s. Denote the circle of radius s r around RX0 by B(RX0,s r ), and the circle of radius s t around TX0 by B(TX0,s t ). Following Equation (4) and the concept of guard zones, we have that if there exists at least one transmission inside B1=B(TX0,s t )B(RX0,s r ) upon the arrival of TX0-RX0, this transmitter-receiver pair would back off from transmission. The area of B1 is shown as the lightly shaded area in Figure 2, and is given as Π s t 2 +Π s r 2 A ol ( s t , s r ), where A ol (s t ,s r ) denotes the area of overlap B(TX0,s t )∩B(RX0,s r ), and is simply derived to be

A ol ( s t , s r ) = 0 ; s r + s t < R Π s t 2 ; s r > R + s t Π s r 2 ; s t > R + s r s r 2 cos 1 R 2 + s r 2 s t 2 2 R s r + s t 2 cos 1 R 2 + s t 2 s r 2 2 R s t 1 2 ( s t + s r R ) ( s t s r + R ) ( s t + s r + R ) ( s t + s r + R ) ; otherwise
(6)
Figure 2
figure 2

Geometrical illustration of sensing zones B ( RX 0 , s r )and B(TX 0 , s t ).

Once TX0 and RX0 jointly decide to transmit, there is still a probability that their packet is in error upon its arrival due to an ongoing transmission inside B(RX0,s) that was not detected in the backoff decision-making stage. That is, the packet is in error at the start, if an active transmission is detected inside B( RX 0 ,s) B ( TX 0 , s t ) B ( RX 0 , s r ) ¯ . This area is marked as the darkly shaded region in Figure 2, and is given by

A rx | active ( s t , s r ,s)= 0 ; s r s Π s 2 Π s r 2 A ol ( s t , s ) ; s r < s and s t < R s r Π s 2 Π s r 2 A ol ( s t , s ) + A ol ( s t , s r ) ; s r < s and s t < R + s r Π s 2 A ol ( s t , s ) ; otherwise
(7)

Now, given the packet transmission of TX0-RX0 is initiated and it is not in error at the start of its transmission, there is a probability that a new interferer, TX i , enters the plane at some t(0,T), is located inside B(RX0,s), and thus causes error for the packet of RX0. Since TX i would back off if it or its receiver detect the transmission of TX0, this means that in order for TX i to cause outage for RX0, it must be placed inside B 2 =B( RX 0 ,s) B ( TX 0 , s t ) ¯ , while its receiver RX i is located outside of B(TX0,s r ). This probability is denoted as Pduring, and is given in the following subsection.

Due to the Poisson distribution of interferers, we apply the expression Perror = 1 − exp{ − λcsmaA}, where A is the detection area depending on the particular error probability to be calculated. Moreover, the density λcsma is given as

λ csma = λ m = 0 M 1 P b m ; for N = 0 λ m = 0 M 1 P b m + ( 1 P b M ) P rt 1 n = 0 N 1 P rt n ; for N 1 = λ 1 P b M 1 P b + ( 1 P b M ) P rt 1 1 P rt N 1 P rt ,
(8)

where P b is the backoff probability, Prt 1is the probability that the packet is received in error at its first transmission attempt, and P rt is the probability that the packet is received erroneously in a retransmission attempt. The reason we distinguish between Prt 1 and P rt is that due to the backoff decision making stage, the area where there is a probability of detecting an active interferer during a transmission is smaller in the first transmission than in the following retransmissions.

Outage probability in non-fading networks

Based on the above derivations, we are now able to mathematically express the outage probability of CSMATXRX in a non-fading network. This is given by the following theorem.

Theorem 1

The outage probability of CSMATXRXin the absence of fading with varying sensing thresholds is given by

P out ( CSMA TXRX ) = P b M + 1 P b M P rt 1 P rt N ,
(9)

where:

P b is the backoff probability, approximated by the solution to

P ~ b = 1 e λ 1 P ~ b M + 1 P ~ b M P ~ rt 1 1 P ~ rt N 1 P ~ rt Π s t 2 + Π s r 2 A ol ( s t , s r ) ,
(10)

where A ol (s t ,s r )is given by Equation (6).

P rt = P rx + (1 − P rx ) Pduringis the probability that a packet is received in error in a retransmission attempt. P rx is the probability that the packet is in error at the start of each of its retransmissions, approximated by

P ~ rx = 1 e λ 1 P ~ b M + 1 P ~ b M P ~ rt 1 1 P ~ rt N 1 P ~ rt Π s 2 ,
(11)

Pduring is the probability that an error occurs at some t(0,T), approximated by

P ~ during = 1 e λ 1 P ~ b M 1 P ~ b + 1 P ~ b M P ~ rt 1 1 P ~ rt N 1 P ~ rt G active ( s t , s r ) ,
(12)

where Gactive(s t ,s r ) is given as

G active = 0 ; s t R + s s t R s γ ( r ) 2 Π γ ( r ) P ( active | r , ϕ ) r dr ; R s t < R + s 0 R s t 0 2 Π P ( active | r , ϕ ) rdϕdr + R s t min ( s r , s ) γ ( r ) 2 Π γ ( r ) P ( active | r , ϕ ) r dϕdr + 2 s r min ( s r , s ) γ ( r ) ζ ( r ) P ( active | r , ϕ ) r dr + min ( s r , s ) s 2 Π 2 ζ ( r ) r dr ; otherwise
(13)

ν(r) and P(active|r,ϕ), which is the probability that the RX i is not in error upon its arrival, are given as

P ( active | r , ϕ ) = 1 1 Π cos 1 r 2 + 2 R 2 s r 2 2 Rr cos ϕ 2 R r 2 + R 2 2 Rr cos ϕ
(14)
ν ( r ) = cos 1 r 2 + 2 R s t s t 2 2 Rr ζ ( r ) = cos 1 r 2 2 R s t s t 2 2 Rr γ ( r ) = cos 1 r 2 + R 2 s t 2 2 Rr .
(none1)

Prt 1=Prx|active + (1−Prx|active) Pduringis the probability that the packet is received in error at its first transmission attempt. Prx|active is the probability that the receiver is in outage at the start of the packet, although it decides to initiate its transmission, approximated by

P ~ rx | active = P ~ rx A rx | active ( s t , s r , s ) Π s 2 ,
(15)

with Arx|active(s t ,s r ,s)given by Equation (7).

For more details on the derivation of Equations (10) and (14), please refer to [12]. Optimization of the sensing thresholds is carried out in Section 5, and comparison between CSMATXRXwith the other CSMA versions is performed in Section 6.

Performance in the presence of fading

In this section, we add fading effects to the path loss attenuation, as described in Section 2. Due to the independence of the channel fading coefficients on distance, we can no longer operate with the closest interferer for the derivation of the outage probability. Instead, we must consider the dominant interferer, which is a single interferer whose received interference power (affected by the distance and the random channel coefficients) alone is strong enough to result in outage for the packet under observation.

Similar to Section 3, we first explain the method of analysis as well as the key steps of the mathematical derivations, before the result of the analysis is presented in Subsection 4.2.

Method of analysis

The outage probability expression in the case of fading is the same as Equation (9), with the difference that P b , Prt 1, and P rt are replaced by their average values with respect to the fading coefficients, namely P ¯ b , P ¯ rt 1 , and P ¯ rt . Based on the same reasoning as in the non-fading case in Section 3, the density of packets attempting to access the channel is

λ csma = λ 1 P ¯ b M 1 P ¯ b + ( 1 P ¯ b M ) P ¯ rt 1 1 P ¯ rt N 1 P ¯ rt .
(16)

The probability that a given transmitter-receiver pair, TX0-RX0, backs off is given by the probability that the SINR at the start of the packet is below β t at the transmitter, or below β r at the receiver, or both. Hence,

P ¯ b = P ¯ b 1 ( β t ) + P ¯ b 1 ( β r ) Pr ( TX 0 beg. RX 0 beg. )
(17)

P ¯ b 1 ( β t ) and P ¯ b 1 ( β r ) are derived by using a modified version of the guard zone concept discussed in Section 3. With an SINR constraint of β(β t ,β r ), define the distance to the dominant interferer (given h00and h0i) as

s f ( h 00 , h 0 i )= h 0 i 1 / α h 00 R α β η ρ 1 / α .
(18)

Consequently, we have that the average number of dominant interferers within a distance sf(h00,h0i) away and with arrival time during (−T,0)is approximated by Π λcsmasf(h00,h0i)2. Due to the Poisson distribution of packets, the backoff probability then becomes

P ¯ b 1 ( β ) 1 E e Π λ csma s f ( h 00 , h 0 i ) 2 1 exp Π λ csma E s f ( h 00 , h 0 i ) 2 .
(19)

Assuming a strictly interference-limited network (i.e., η≈0) with Poisson distributed packets, we have

P ¯ b 1 ( β ) 1 exp Π λ active E h 0 i 2 / α E h 00 R α β 2 / α ,
(20)

where λ active =λ 1 P ¯ b M + ( 1 P ¯ b M ) P ¯ rt 1 1 P ¯ rt N 1 P ¯ rt . Note that in order to find λactive only the first term of Equation (8) is multiplied by (1 P ¯ b ), because once a packet transmission is initiated (the second term in Equation (8)), no further decision-making is performed for each retransmission attempt. Furthermore, knowing that for Rayleigh fading channels, E h 00 2 / α and E h 0 i 2 / α are Gamma functions, we may apply the result [20]

E h 00 2 / α E h 0 i 2 / α = 2 Π / α sin ( 2 Π / α ) ,
(21)

which is inserted back into Equation (20).

To derive the backoff probability, we return to our geometrical analysis again. We assume that B( TX 0 , s t f ) and B( RX 0 , s r f ) are approximately circular regions, as shown in Figure 2. With P ¯ b 1 (β) given by Equation (19), Pr(RX0beg.∩TX0beg.)is derived to be

Pr ( RX 0 beg. TX 0 beg. ) = Pr ( RX 0 beg. ) Pr ( TX 0 beg. ¯ ) × Pr ( RX 0 beg. | TX 0 beg. ¯ ) = P ¯ b 1 ( β r ) 1 P ¯ b 1 ( β t ) × P ¯ b 1 ( β r ) Π s r f 2 A ol ( s t f , s r f ) Π s r f 2 .
(22)

Inserting this expression back into Equation (17), yields the backoff probability of CSMATXRX.

Once a transmission has been initiated, there is a probability that the packet is in error at the start of its first transmission attempt. This is denoted by Prx|active(h00,h0i). Using geometry again, this probability is given as the probability that an active interferer already exist on the plane inside B(RX0,sf), that was not detected during the backoff decision-making stage. That is, the interferer TX i must be located inside A rx | active ( s t f , s r f , s f ), which is shown as the darkly shaded area in Figure 2 and is approximated by Equation (7).

To derive the probability that a packet is received in error at some time during its transmission, denoted by P ¯ during , we use the Poissonianity of interferers and apply the following expression:

P ¯ during = E h 00 , h ii 1 exp ∫∫ A μ f r dr .
(23)

where μf is the expected density of dominant interferers, TX i , for the packet at RX0. This is given as

μ f = E density of active dominant interferers for RX 0 = Pr TX i placed at ( x , y ) · Pr ( TX i RX i activated | ( x , y ) ) · Pr ( TX i causes error at RX 0 | TX i active at ( x , y ) )
(24)
= λ 1 e h ii R α r α β t 1 e h ii R α r α β r e h 00 R α r α β .
(25)

Outage probability in fading networks

Based on the derivations given above, we arrive at the following theorem.

Theorem 2

The outage probability of CSMATXRXin the presence of Rayleigh fading with varying sensing thresholds is given by

P out ( CSMA TXRX ) = P ¯ b M + 1 P ¯ b M P ¯ rt 1 P ¯ rt N ,
(26)

where:

P ¯ b P ¯ b 1 ( β t )+ 1 P ¯ b 1 ( β t ) P ¯ b 1 ( β r ) Π s r f 2 A ol ( s t f , s r f ) Π s r f 2 is the average backoff probability, where P ¯ b 1 ( β t ) is approximated by the solution to

P ¯ b 1 ( β t ) = 1 e λ 1 P ¯ b M + 1 P ¯ b M P ¯ rt 1 1 P ¯ rt N 1 P ¯ rt Π R 2 β t 2 / α 2 Π / α sin ( 2 Π / α ) ,
(27)

P ¯ rt = E h 00 P ¯ rx + 1 P ¯ rx P during ( h 00 ) is the probability that a packet is received in error in a retransmission attempt. P ¯ rx is the average probability that the packet is in error at the start of each of its retransmissions, approximated by

P ¯ rx = 1 e λ 1 P ¯ b M + 1 P ¯ b M P ¯ rt 1 1 P ¯ rt N 1 P ¯ rt Π R 2 β 2 / α 2 Π / α sin ( 2 Π / α ) ,
(28)

Pduring(h00) is the probability that an error occurs at some t(0,T), approximated by

P ~ during ( h 00 ) = 1 e λ active 0 2 Π 1 e E [ h ii ] R α r α β t × 1 e E [ h ii ] R α r α β r e h 00 R α r α β r dr .
(29)

P ¯ rt 1 = E h 00 P rx | active ( h 00 ) + 1 P rx | active ( h 00 ) n Pduring(h00)]is the probability that the packet is received in error at its first transmission attempt, with Prx|active(h00)approximated by

P ~ rx | transmit ( h 00 ) = E h 0 i P ¯ rx A rx | active s t f ( h 00 , h 0 i ) , s r f ( h 00 , h 0 i ) Π s f ( h 00 , h 0 i ) 2 ,
(30)

where s t f ( h 00 , h 0 i ) is given by Equation (18).

Optimization of the sensing thresholds is carried out in the next section, and comparison between CSMATXRXwith the other CSMA versions is performed in Section 6.

Optimizing the sensing thresholds

In order to find the optimal sensing thresholds of CSMATXRX, β t opt , and β r opt , such that the outage probability is minimized, we must in principle differentiate the outage probability expressions given in Theorems 1 and 2 with respect to s t and s r , and set each equal to 0. However, because of the complexity of our equations, this turns out to be a nontrivial task. Hence, we attack our optimization problem from another angle; we evaluate the total outage probability of CSMATXRXbased on the change in the exposed and hidden node problems.

The hidden node problem of CSMA occurs during an active packet transmission when a newly arriving transmitter, TX i , is located too close to the receiver under observation, RX0, while TX i and RX i are simultaneously too far away from TX0 to detect its transmission. That is, TX i initiates its transmission and causes outage for RX0 because TX0 is hidden to it and its receiver. The probability of such an event occurring is

Pr ( hidden node ) Pr ( RX 0 mid. | TX i beg. RX i beg. ¯ ) .
(none2)

The exposed node problem occurs when a packet transmission is backed off even though its transmission would not have contributed to any outages. This is the case when the interferer TX i or its receiver RX i are located too close to the active transmission of TX0, but far enough from RX0 to not cause any errors for it. That is,

Pr ( exposed node ) Pr ( TX i beg. RX i beg. | RX 0 mid. ¯ ) .
(none3)

The exposed node problem is a direct consequence of the transmitter making the backoff decision.

Optimization in the absence of fading

In a non-fading network, we note that Pout(CSMATXRX)is a convex function of s t and s r for low densities. As a simplified proof for this claim, we note that the total outage probability of CSMATXRXmay for high densities be approximated by the summation of error probability expressions, which are of the form P error =1 e λ csma Π s 2 . Differentiating this expression twice with respect to s={s t ,s r }yields

d 2 P error d s 2 = 2 Π λ csma e Π λ csma s 2 1 2 Π λ csma s 2 .
(31)

For 2Π λcsmas2<1, we have that d 2 P error d s 2 >0, indicating convexity. Hence, we may conclude that for low enough values of the density (where our approximate expressions are more accurate), Perror (and thereby Pout(CSMATXRX)) is a convex function of s.

This means that in order to obtain β t opt and β r opt (equivalently s t opt and s r opt ), we may minimize the outage probability with respect to each variable separately. Starting from Equation (9), we have that the derivative of the outage probability for arbitrary values of M and N with respect to the sensing radius s t (equivalently s r ) is

d P out ( CSMA TXRX ) d s t = M P b M 1 1 P rt N + 1 d P b d s t + ( N + 1 ) P rt N ( 1 P b M ) ( 1 P rx ) × d P during d s t ,
(32)

where P rt =P rx + (1−P rx ) Pduring. The optimal value for s t is then the solution to d P out ( CSMA TXRX ) d s t =0, which must be solved numerically.

In order to find a closed-form expression for the optimal values of s t and s r , we consider the particular case of M=1and N=0. This yields

P out ( CSMA TXRX )= P rx + ( 1 P rx ) P during ; s r < s P b + ( 1 P b ) P during ; otherwise
(33)

First set s t to be a fixed value (e.g., s t =0as in [12]). We know from [12] that the optimal s r that minimizes the outage probability of CSMARXis s r opt =s, which corresponds to β r opt =β. The intuition behind this is as follows:

For s r <sB(RX0,s r )<B(RX0,s)lower probability of backoff higher probability that outage occurs during an active transmission. Note that the reduction in the backoff probability does in fact not result in a reduction in the probability that outage occurs during a transmission, because even though B(RX0,s r )<B(RX0,s), any active transmissions inside B(RX0,s)upon the arrival of TX0-RX0 will contribute to the outage. Hence, if s r <s, the total outage probability will be higher than its minimum value.

For s r >sB(RX0,s r )>B(RX0,s)higher probability of backoff lower probability that outage occurs during an active transmission. However, this decrease is less than the increase in the backoff probability, because the change in the area of B(RX0,s r )is larger than the decrease in the circumference of the circle around TX i where RX i can be located. Hence, the total outage probability increases as s r increases beyond s.

Assuming that s r opt =s, we have that Pout(CSMATXRX) is a function of s t only. In order to find the optimal sensing radius of the transmitter, s t opt , we use the outage probability of CSMARXaas a reference. The probability that TX0 is hidden to both TX i and RX i is lower than the probability that it is hidden only to RX i , which is the case in CSMARX. Hence, the transmitter sensing of CSMATXRXreduces the hidden node problem, as the area around RX0 where the activation of an interferer will and cause outage, is reduced. For a non-fading network, this yields the following approximation:

P ~ during P ~ during RX ( 1 e λ csma A ol ( s t , s r ) ) ,
(34)

where A ol (s t s r ) is the area of overlap between B(TX0s t )and B(RX0s r ), as illustrated in Figure 2 and given by Equation (6). The exposed node problem occurs when TX i -RX i are located inside B(TX0s t ), but outside of B(RX0s). Compared to CSMARX, we have

P ~ b P ~ b RX + ( 1 e λ csma ( Π s t 2 A ol ( s t , s r ) ) ) ,
(35)

where P ~ b RX is the backoff probability of CSMARXas derived in [12], and A ol (s t s r )is given by Equation (6).

Now, we note that P ~ b RX and P ~ during RX , which were derived in [12], are functions of s and s r only (and not of s t ), which yields:

P out ( CSMA TXRX ) d s t = ( 1 P during ) d P b d s t + ( 1 P b ) d P during d s t = + ( 1 P during ) λ e λ Π s t 2 A ol ( s t , s r opt ) × d d s t ( Π s t 2 A ol ( s t , s r opt ) ) ( 1 P b ) λ e λ A ol ( s t , s r opt ) d A ol ( s t , s r opt ) d s t .
(36)

Setting this derivative equal to 0, we obtain:

( 1 P b ) e λ A ol ( s t , s r opt ) d A ol ( s t , s r opt ) d s t ( 1 P during ) e λ Π s t 2 A ol ( s t , s r opt ) 2 Π s t d A ol ( s t , s r opt ) d s t = 0 .
(37)

We have that d A ol ( s t , s r ) d s t =2 s t cos 1 s t 2 R when s r =sR. For sR (i.e., for small values of β), we have that s t opt =0, i.e., it is beneficial to have no transmitter sensing at all, as is the case in CSMARX. For s>R, s t opt is found numerically as the nonzero solution to Equation (37), which is plotted in Figure 3 for β=10 dB. The reason we apply a high value for β(compared to the value of 0 dB that has been applied before), is to emphasize the benefit of the transmitter sensing.

Figure 3
figure 3

Derivative of the outage probability of CSMA TXRX for λ =0 01, β =10 dB, M =1, and N =0.

The point where the outage probability is decreasing at its highest rate, i.e., the minimum point of d P out ( CSMA TXRX ) d s t , occurs for s t =sRb. This corresponds to β t =(β1/α−1)α. For this value of β t , B(RX0,s) covers B(TX0,s t ) completely, meaning that the transmitter sensing of CSMATXRXintroduces no additional exposed node problems, while at the same time providing some protection for its receiver, thus reducing the hidden node problem. That is, for s>R, s t can be increased up to (sR)without introducing any exposed node problems, meaning that in CSMATXRX it is always valid that β t opt β 1 / α 1 α .

Optimization in the presence of fading

In the case of fading, the optimization problem becomes more complicated, as we can no longer translate it to a distance problem. Intuitively, we would expect CSMATXRXto yield an optimal performance when β r =βand β t =0. The reason for this is as follows:

If β r >β, the exposed node problem is increased, while the hidden node problem is not reduced (this is partly because we do not consider the aggregate interference power in our derivations). On the other hand, if β r <β, there is no exposed node problem, but the hidden node problem is higher than when β r =β. Hence, β r opt =β.

Next, we evaluate the benefit that the transmitter sensing of CSMATXRXprovides. Since the channel coefficient from TX i to TX0 is independent from the channel coefficient from TX0 to RX i , the decision-making of the TX i based on its own channel does not provide much benefit for the packet reception at its receiver (in terms of the hidden node problem). In fact, the transmitter’s decision to back off from transmission when its receiver wishes to activate it, is only adding to the exposed node problem. Hence, β t opt =0.

In order to validate the reasoning given above, we evaluate the derivative of the outage probability in the presence of fading for M=1and N=0;

d P ¯ out ( CSMA TXRX ) d β t 1 P ¯ during d P ¯ b d β t + 1 P ¯ b d P ¯ during d β t = 0 .
(38)

First, we find the derivative of P ¯ during ;

d P ¯ during d β t = 2 Π λ E h 00 e λ 0 2 Π 1 e E [ h ii ] R α r α β t 1 e E [ h ii ] R α r α β r e h 00 R α r α β r dr × 0 1 e E [ h ii ] R α r α β t e E [ h ii ] R α r α β r e h 00 R α r α β E [ h ii ] R α r α β t 2 r dr .
(39)

Differentiating the backoff probability, P ¯ b , given by Theorem 2, yields

d P ¯ b d β t = d P ¯ b 1 ( β t ) d β t + 1 P ¯ b 1 ( β t ) P ¯ b 1 ( β r ) E h 00 , h 0 i 1 Π s r f 2 d A ol ( s t f , s r f ) d β t d P ¯ b 1 ( β t ) d β t P ¯ b 1 ( β r ) E h 00 , h 0 i 1 A ol ( s t f , s r f ) Π s r f 2 ,
(40)

where A ol ( s t f , s r f ) is given by Equation (6). Note that when (M,N)=(1,0), P ¯ b 1 ( β t ) may be expressed by the Lambert function W 0 (·), as given below;

P ¯ b 1 ( β t ) = 1 1 Πλ R 2 β t 2 / α 2 Π / α sin ( 2 Π / α ) × W 0 Πλ R 2 β t 2 / α 2 Π / α sin ( 2 Π / α ) .
(41)

Setting x=Πλ R 2 β t 2 / α 2 Π / α sin ( 2 Π / α ) , and differentiating P ¯ b 1 ( β t ) yields

d P ¯ b 1 ( β t ) d β t = W 0 ( x ) x 2 1 x · W 0 ( x ) x [ 1 + W 0 ( x ) ] = W 0 ( x ) 2 x 2 [ 1 + W 0 ( x ) ] .
(42)

Inserting these expressions back into Equation (38), the optimal value of β t can be found numerically. This is shown in Figure 4, where d P out ( CSMA TXRX ) d β t is plotted as a function of β t for various values of β r . β t opt is potentially the point where the derivative of Pout(CSMATXRX) crosses 0. As expected, d P out ( CSMA TXRX ) d β t is positive for all β t , meaning that it is always an increasing function of β t . In other words, the outage probability of CSMATXRX in the presence of fading is minimized for β r opt =β and β t opt =0.

Figure 4
figure 4

Derivative of the outage probability of CSMA TXRX in a fading network as a function of β t , for β =0 dB.

Numerical results

In Figures 5 and 6, the outage probability of CSMATXRX(and CSMARXfor the sake of comparison) are plotted as a function of the packet arrival density λ, for a non-fading and a fading network, respectively. Firstly, our analytical expressions are validated as they follow the simulation results tightly. Note that in the presence of fading, some discrepancies can be observed between the analytical results and simulations; this is due to the additional source of randomness coming from the channel coefficients, making the “dominant interferer” approximation used in the derivations less accurate. However, these deviations occur at high densities corresponding to a high outage probability (>0.3), which is at least an order of magnitude higher than what is often applied in practical networks.

Figure 5
figure 5

Outage probability of CSMA TXRX in a non-fading network with β t = β r = β =0 dB.

Figure 6
figure 6

Outage probability of CSMA TXRX in a fading network with β t = β r = β =0 dB.

Second, we observe that as the density increases, so does the outage probability, until the network reaches a point of saturation, where Pout≈1. By increasing the number of backoffs and retransmissions, significant performance gain can be obtained. For low densities with (M,N)=(2,1), the outage probability is up to 10 times lower than when (M,N)=(1,0). Thirdly, the addition of transmitter sensing in CSMATXRXdoes not appear to provide any improvement compared to CSMARX. In fact, CSMARX outperforms CSMATXRX by up to 20% in non-fading networks and up to 50% when fading is present. This is due to the exposed node problem caused by the transmitter sensing in CSMATXRX. That is, when M is small, the protection that the transmitter sensing provides does not counterbalance the backoff probability increase it generates.

In Figure 7, the outage probability of CSMATXRXis plotted as a function of the sensing thresholds β t and β r , for a fixed low density of λ=0.01, β=10 dB, and (M,N)=(1,0). The plot shows that β r opt =β=10 and β t opt =5.7 dB, which is also obtained by numerically solving Equation (37), thus confirming our conclusions from Subsection 5.1. Similarly, in Figure 8, the outage probability of CSMATXRX is considered in a fading network with λ=0.03, β=0 dB, and (M,N)=(1,0). Again, our derivations from Subsection 5.2 are confirmed, i.e., β r opt =β=0 dB and β t opt =0.

Figure 7
figure 7

Outage probability of CSMA TXRX as a function of the sensing thresholds, for a non-fading network with λ =0. 01, β =10 dB and ( M , N )=(1,0).

Figure 8
figure 8

Outage probability of CSMA TXRX as a function of the sensing thresholds, for a fading network with λ =0.03, β =0 dB, and ( M , N )=(1,0).

The impact of the number of backoffs, M, is illustrated in Figure 9, where the receiver sensing threshold is assumed to be constant, β r =β=0 dB, while M and the transmitter sensing threshold β t are optimized jointly. As expected, the outage probability decreases monotonically with M. For each M, there is a different value for β t opt , although the range of this is very small. Hence, we conclude that the result of Equation (37) to find s t opt analytically for M=1, can be applied as an approximation for greater values of M as well. The fact that outage probability reduces monotonically as M increases is reinforced in Figure 10, which has the same parameter values as Figure 9.

Figure 9
figure 9

Outage probability of CSMA TXRX as a function of β t and M , for a non-fading network with λ =0.1, β = β r =0 dB, and N =0.

Figure 10
figure 10

Contour plot of outage probability of CSMA TXRX as a function of β t and M , for a non-fading network with λ =0.1, β = β r =0 dB, and N =0.

Figure 11 emphasizes the effect of M on the outage probability of CSMATXRX, as compared to CSMATX and CSMARX. In this plot, we set N=0 and a high density of λ=0.1 is chosen. When only M=1 channel sensing is allowed before the packet is dropped, CSMATXRX exhibits up to 10% higher outage probability than CSMARX and up to 20% lower outage probability than CSMATX. As M increases, the benefit of the joint channel sensing of CSMATXRX becomes more evident; for M=4, CSMATXRX outperforms CSMARX by 40% and CSMATXby a factor 2. Hence, we conclude that by applying joint transmitter-receiver sensing in a network with M>1, the outage performance of CSMA can be improved beyond that of CSMARX. Moreover, the optimal sensing thresholds are β r opt =β and β t opt is found approximately as the solution to Equation (37).

Figure 11
figure 11

Outage probability of CSMA TXRX as a function of the number of backoffs, M , for a non-fading network with λ =0.1 and N =0.

The impact of retransmissions is opposite to that of backoffs. As seen from Figure 12, where the outage probability is plotted for a fixed density of λ=0.03 and M=2 backoffs, the outage probability of CSMARX reduces below that of CSMATXRX as the number of retransmissions, N, increases, e.g., when (M,N)=(2,0), CSMATXRX outperforms CSMARX by 10%, while for (M,N)=(2,3), we have 20% higher outage probability for CSMATXRXthan for CSMARX. While significant gain is obtained by increasing N from 0 to 2, little benefit is observed for N>2. Note that we have included results on the impact of M and N only in non-fading networks, as similar conclusions are drawn in fading networks.

Figure 12
figure 12

Outage probability of CSMA TXRX as a function of the number of retransmissions, N , for a non-fading network with λ =0.03 and M =2.

Conclusions

In this article, we improve the performance of CSMA in wireless ad hoc networks by introducing joint transmitter-receiver sensing and simultaneously optimizing the sensing thresholds of both the transmitter and the receiver. This protocol is denoted as CSMATXRX. Within a Poisson distributed ad hoc network, approximate analytical expressions are derived for the outage probability of CSMATXRXwith respect to the transmission density and the sensing thresholds. The optimal sensing thresholds for both the transmitter and receiver are obtained both in non-fading and fading networks, and an understanding is provided for how these optimal thresholds balance between the hidden and exposed node problems of CSMA. It is shown that using optimal sensing thresholds can provide significant performance gain for all transmission densities. Moreover, when multiple backoffs are allowed, CSMATXRX outperforms CSMARX[12], which was previously shown to provide the best performance in unslotted systems, e.g., when M=4, this improvement is 40%.

For future study, we wish to improve the performance of CSMA by investigating more efficient use and exchange of channel information between each transmitter and its receiver. Other possible extensions are to apply adaptive rate and power control to further improve the performance of CSMA in wireless ad hoc networks.

Endnotes

aThis protocol was evaluated in [12]. We assume low density of transmissions, where the outage probability expressions are good approximations.bThis assumes that s>R, which is the case in most networks, as it ensures that the receiver can detect its own transmitter.

References

  1. Kleinrock L, Tobagi FA: Packet switching in radio channels: Part I - Carrier sense multiple-access modes and their throughput-delay characteristics. IEEE Trans. Commun 1975, 23: 1400-1416. 10.1109/TCOM.1975.1092768

    Article  Google Scholar 

  2. Ma H, Vijaykumar R, Roy S, Zhu J: Optimizing 802.11 wireless mesh networks performance using physical carrier sensing. IEEE/ACM Trans. Network 2009, 17(5):1550-1563.

    Article  Google Scholar 

  3. Zhou Y, Nettles SM: Balancing the hidden and exposed node problems with power control in csma/ca-based wireless networks. In Proc. IEEE Wireless Communications and Networking Conference (WCNC),. (New Orleans, LA; 2005):683-688.

    Google Scholar 

  4. Ferrari G, Tonguz O: MAC protocols and transport capacity in ad hoc wireless networks: Aloha versus PR-CSMA. In Proc. IEEE Military Communications Conference,. (Boston, MA; 2003):1113-1318.

    Google Scholar 

  5. Gupta P, Kumar PR: The capacity of wireless networks. IEEE Trans. Inf. Theory 2000, 46(2):388-404. 10.1109/18.825799

    Article  MathSciNet  Google Scholar 

  6. Xie LL, Kumar PR: On the path-loss attenuation regime for positive cost and linear scaling of transport capacity in wireless networks. IEEE Trans. Inf. Theory 2006, 52: 2313-2328.

    Article  MathSciNet  Google Scholar 

  7. Fuemmeler JA, Vaidya NH, Veeravalli VV: Selecting transmit powers and carrier sense thresholds for CSMA protocols. University of Illinois at Urbana-Champaign Technical Report 2004.

    Google Scholar 

  8. Fonseca BJB: A distributed procedure for carrier sensing threshold adaptation in CSMA-based mobile ad hoc networks. In Proc. Vehicular Technology Conference (VTC),. (Dublin, Ireland; 2007):66-70.

    Google Scholar 

  9. Zhu J, Guo X, Yang L, Conner W: Leveraging spatial reuse in 802.11 mesh networks with enhanced physical carrier sensing. In Proc. IEEE International Conference on Communications (ICC),. (Budapest, Hungary; 2004):4004-4011.

    Google Scholar 

  10. Hasan A, Andrews JG: The guard zone in wireless ad hoc networks. IEEE Trans. Wirel. Commun 2005, 6(3):897-906.

    Article  Google Scholar 

  11. Weber S, Yang X, Andrews J, de-Veciana G: Transmission capacity of wireless ad hoc networks with outage constraints. IEEE Trans. Inf. Theory 2005, 51(12):4091-4102. 10.1109/TIT.2005.858939

    Article  MathSciNet  Google Scholar 

  12. Kaynia M, Jindal N, Øien GE: Performance analysis and improvement of MAC protocols in wireless ad hoc networks. IEEE Trans. Wirel. Commun 2011, 10: 240-252.

    Article  Google Scholar 

  13. Park KJ, Kim L, Hou JC: Coordinating the interplay between physical carrier sense and power control in CSMA/CA wireless networks. Department of Computer Science UIUCDCS-R-2007-2884, University of Illinois at Urbana-Champaign 2007.

    Google Scholar 

  14. Ma H, Roy S: Simple and effective carrier sensing adaptation for multi rate ad-hoc MESH networks. In IEEE International Conference on Mobile Ad Hoc and Sensor Systems, MASS,. (Vancouver, Canada; 2006):795-800.

    Google Scholar 

  15. Rossetto F, Zorzi M: Gaussian approximations for carrier sense modeling in wireless ad hoc networks. In Proc. IEEE Global Communications Conference (GLOBECOM),. (Washington, DC; 2007):864-869.

    Google Scholar 

  16. Jeong K, Lim H: Experimental approach to adaptive carrier sensing in IEEE 802.15.4 wireless networks. In Proc. AMC CoNEXT,. (Madrid, Spain; 2008). article no. 47

    Google Scholar 

  17. Muhlethaler P, Najid A: Throughput optimization in multihop CSMA mobile ad hoc networks. In Proc. IEEE European Wireless Conference,. (Barcelona, Spain; 2004).

    Google Scholar 

  18. Zhu J, Metzler B, Guo X, Liu Y: Adaptive CSMA for scalable network capacity in high-density WLAN: a hardware prototyping approach. In Proc. IEEE INFOCOM,. (Barcelona, Spain; 2006:1-10.

    Google Scholar 

  19. Kaynia M, Øien GE, Jindal N: Joint transmitter and receiver carrier sensing capability of CSMA in MANETs. In Proc. IEEE International Conference on Wireless Communications and Signal Processing (IC-WCSP),. (Nanjing, China, (Best Paper Award); 2009):1-5.

    Google Scholar 

  20. Weber S, Andrews J, Jindal N: The effect of fading, channel inversion, and threshold scheduling on ad hoc networks. IEEE Trans. Inf. Theory 2007, 53(11):4127-4149.

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mariam Kaynia.

Additional information

Competing interest

The authors declare that they have no competing interests.

Authors’ original submitted files for images

Rights and permissions

Open Access This article is distributed under the terms of the Creative Commons Attribution 2.0 International License (https://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Reprints and permissions

About this article

Cite this article

Kaynia, M., Øien, G.E. Optimizing the performance of non-fading and fading networks using CSMA with joint transmitter and receiver sensing. J Wireless Com Network 2012, 271 (2012). https://doi.org/10.1186/1687-1499-2012-271

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1186/1687-1499-2012-271

Keywords