A Cross-Layer Optimization of IEEE 802.11 MAC For Wireless Multihop Networks
A Cross-Layer Optimization of IEEE 802.11 MAC For Wireless Multihop Networks
A Cross-Layer Optimization of IEEE 802.11 MAC For Wireless Multihop Networks
3K, where K = i
2
+j
2
+ ij, i and j are non-negative
integers. K is 7 (i=2, j=1) in this example [8].
sensing range in the MAC layer and the target data rate in the
physical layer.
Introducing multihop has pros and cons: it will effectively
handle the interference but this is on the cost of packet delay
caused by multihop relays. There have been some previous
researches related to these issues [5]-[7]. However, even the
most relevant work to ours did not include the backoff delay
and analytic solutions [5]. The others [6], [7] evaluate the
maximum expected throughput of a single wireless link, rather
than investigating the throughput of the path-ow composed
of multihop wireless links. Thus, direct application of these
results to our problem is rather hopeless, which motivates our
work.
II. SYSTEM MODEL
Consider a multihop wireless network adopting a single-
frequency. We assume that the nodes are located at centers
and vertices of the hexagon with the same distance away
(Figure 1). The radius of a regular hexagon is R. The number
D denotes the nearest simultaneous transmission distance,
i.e., carrier sensing range. The geometrical distribution of
simultaneous transmitters resembles cochannel base stations
in a regular hexagonal cellular system. Among the nodes,
we consider a linear topology of M nodes. All nodes are
equipped with identical half-duplex radios
2
and with omni-
directional antennas. Consider an instant, at which the channel
gain (received power divided by transmitted power) between
every receiver i and every transmitter j is given by g
ij
. We
2
This means a node cannot transmit and receive simultaneously, and it
makes the constraint that the reuse hop distance has to be at least two hops.
1089-7798/06$20.00 c 2006 IEEE
532 IEEE COMMUNICATIONS LETTERS, VOL. 10, NO. 7, JULY 2006
will denote the power of transmitter i by p
i
. The signal-to-
interference-plus-noise ratio (SIR) at the receiver i is given
by:
i
(P) =
g
ij
p
j
k=i,j
g
ik
p
k
+
, (1)
where denotes the thermal noise at receiver i. The power
vector P contains the power value of each transmitting
node. The quantity (0, 1] denotes the normalized cross-
correlation between signals from different transmitters [8].
Due to the multipath fading, the full orthogonality may not
be assured, even if orthogonal codes are employed. For
simplicity, we assume the worst case of the orthogonality
= 1. However, analyzing the other cases is straightforward.
All packets are assumed to be of the same duration. In the
MAC layer, the network adopts CSMA/CA with the Binary
Exponential Backoff (BEB) for collision resolution.
III. OPTIMAL CARRIER SENSING RANGE AND
TARGET DATA RATE
Consider a multihop wireless network, where the carrier
sensing range allows the nodes more than n = D/R hop-
distance away to simultaneously transmit. In the SIR equation
(1), we assume the channel gain g
ij
is represented by:
g
ij
=
X
ij
d
ij
, (2)
where X
ij
follows the exponential distribution with the mean
1. The number d
ij
denotes the distance between receiver i and
transmitter node j, and is the path-loss exponent. We neglect
the effect of shadowing, assuming the linear route is set up
under no deep shadowing between any links. The random part
of the channel link gain is assumed to be independent of the
other links. If the transmission power of all nodes is assumed
to be same and the receiver noise is negligible, then from
Figure 1, the SIR (1) for a receiver node i located at the
corner of a cell is approximated as [8]:
i
(P) =
X
i
R
6
j=1
Y
j
D
+
12
k=7
Y
k
(
3D)
+
18
l=13
Y
l
(2D)
+
,
(3)
where X
i
, Y
j
, . . . , Y
l
are independently and identically dis-
tributed exponential random variables.
We can get the probability that the received SIR is greater
than or equal to a target SIR . This probability denotes the
one that a node successfully transmits a packet to the next node
under the interference from other simultaneously transmitting
nodes:
Pr[
i
(P) ] =
1
2
e
1
2
(2u+v
2
)
erfc
_
u + v
2
2v
_
(4)
In the above, u and v are given by u = u
_
R
D
_
= u
_
1
n
_
and v = v
_
R
D
_
= v
_
1
n
_
, where u
and v
are functions
of . Details for deriving (4) are contained in Appendix.
In [2], the authors derived the expected number of BEB
time slots taken for a packet to be captured successfully by
the next receiver node, for a given collision probability p
c
and
the minimum contention window size W
0
:
N(p
c
, W
0
) =
1
2
_
1
1 p
c
+
W
0
1 2p
c
_
1, (5)
where p
c
<
1
2
from the stability condition of [2].
In (5), substituting p
c
= 1 Pr[
i
(P) ] and assuming
W
0
is given, we can calculate the mean time until a packet
arrives at the destination from the source, as a function of
and n:
(, n) = n
_
1
2
_
1
1 p
c
+
W
0
1 2p
c
_
1
_
t
slot
, (6)
where t
slot
is the duration for a BEB time slot. In the
above, the rst term n = D/R can be explained as follows:
Assume that the simultaneous transmission occurs at every
other node with n-hop distance away. Then 1/n denotes the
average link activity factor. The average throughput of a link
is proportional to the link activity factor. Thus transmission
time is proportional to the inverse of the link activity factor.
Assume that the data rate between two communicating
nodes is dependent on the target SIR . The amount of data
contained in a packet is bits, which is a function of .
For example, with the Shannons formula, we assume that
() = W log
2
(1 + ), where W denotes the bandwidth.
From throughput-maximization point of view, increasing has
both positive- and negative effects on the average throughput
of a link. A high increases p
c
= 1 Pr[
i
(P) ],
but increases (). As for the reuse hop n, a higher value
of n diminishes the link activity factor, while decreasing p
c
.
In summary, we have the following throughput-maximization
problem with respect to and n:
maximize
, n
()
(, n)
(7)
s.t. p
c
<
1
2
(8)
The value of
()
(,n)
denotes the effective data rate that
is dened as the data amount of a packet divided by the
expected transmission time of the packet between source and
destination
3
. The problem (7)-(8) is a nonlinear optimization
problem. The objective function (7) is neither convex nor
concave, where Karush-Kuhn-Tucker (KKT) condition cannot
be applied. Therefore, we made partial optimization on n for
a given and get a closed formula for the optimal value for
n:
n
= C(, W
0
)()
1
, (9)
where C(, W
0
) is a function of and W
0
, as given in
Appendix. Especially, in case of path loss exponent =4 and
initial window size W
0
=4, the optimal n
is given as follows:
n
= 2.83()
1
4
(10)
See Appendix for more details on (9) and (10).
Putting n
)
as a function
of target SIR.
In the gure, as the path loss exponent increases, the optimal
target SIR at which the effective data rate is maximized
3
()
(,n)
is actually the Jensen lower bound for the average data rate.
HWANG and KIM: A CROSS-LAYER OPTIMIZATION OF IEEE 802.11 MAC FOR WIRELESS MULTIHOP NETWORKS 533
0 5 10 15 20
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
Logscaled target SIR (Log
2
(1+))
)
/
,
n
)
=2
=3
=4
=5
=6
Fig. 2. The effective data rate as a function of a log-scaled target SIR.
We assume that t
slot
=1 (sec), bandwidth W=1 (Hertz), minimum contention
window size W
0
= 4 and the unit of effective data rates is bits/sec. The
dotted circles correspond to the optimal points, where n
6
j=1
(
R
D
)
Y
j
+
12
k=7
(
R
3D
)
Y
k
+
18
l=13
(
R
2D
)
Y
l
+
=
X
G
Each interference term of
_
R
D
_
Y ( = 1,
3, 2,
7, )
is a random variable following the weighted exponential
distribution, of which mean and variance are
_
R
D
_
and
_
R
D
_
2
, respectively. For a sufciently large number of
interferers, the denominator follows the Gaussian distri-
bution such that f
G
(g) =
1
v
2
exp{
1
2
(
gu
v
)
2
}, where
u = 6
_
R
D
_
{1 +
1
3
+
1
2
+
1
7
+ } and v =
_
6
_
R
D
_
2
{1 +
1
3
+
1
4
+
1
7
+ }. For = 2, 3, 4, 5
and 6, u and v converge to certain numbers. For example,
when = 4, u 7
_
R
D
_
4
and v 2.5
_
R
D
_
4
. Thus we can
have (4) as follows:
Pr[
X
G
]
=
_
0
_ x
0
1
v
2
exp{
1
2
(
g u
v
)
2
}e
x
dgdx
=
1
2
e
1
2
(2u+v
2
)
erfc
_
u + v
2
2v
_
Further, we have p
c
= 1 Pr[
i
(P) ] = 1
1
2
e
1
2
(2u+v
2
)
erfc
_
u+v
2
2v
_
.
B. Derivation of (9) and (10)
Consider, for example, that is 4. We can approximate the
value of erfc(
u+v
2
2v
) by 2 over the focused values of u, v
and .
4
Thus we can rewrite p
c
= 1 e
1
2
(2u+v
2
)
, which
is a function of n = D/R. Putting p
c
into (6), we get the
optimal value of n
= 2.83()
1
4
(11)
As the same manner, we can get n
= C(, W
0
)()
1
, where
the values of C(, W
0
) are 11.59, 3.6, 2.03 and 1.79 for =
2, 3, 5 and 6, respectively (W
0
= 4).
REFERENCES
[1] B. Crow, I. Widjaja, L. Kim, and P. Sakai, IEEE 802.11 wireless local
area networks, IEEE Commun. Mag., vol. 35, pp. 116-126, Sept. 1997.
[2] B.-J. Kwak, N.-O. Song, and L. E. Miller, Performance analysis of
exponential backoff, IEEE/ACM Trans. Networking, vol. 13, pp. 343-
355, Apr. 2005.
[3] S. Xu and T. Saadawi, Does the IEEE 802.11 MAC protocol work well
in multihop wireless ad hoc networks? IEEE Commun. Mag., vol. 39,
pp. 130-137, June 2001.
[4] R. J antti, J. Mo, and S.-L. Kim, On multihop capacity gain and media
access control in a wireless network, submitted for publication, 2006.
[5] J. Zhu, X. Guo, L. Yang, and W. Conner, Leveraging spatial reuse in
802.11 mesh networks with enhanced physical carrier sensing, in Proc.
IEEE ICC04, pp. 4004-4011.
[6] E. S. Sousa and J. A. Silvester, Optimum transmission ranges in a
direct-sequence spread-spectrum multihop packet radio network, IEEE
J. Sel. Areas Commun., vol. 8, pp. 762-771, June 1990.
[7] M. Zorzi and S. Pupolin, Optimum transmission ranges in multihop
packet radio networks in the presence of fading, IEEE Trans. Commun.,
vol. 43, pp. 2201-2205, July 1995.
[8] J. Zander and S.-L Kim, Radio Resource Management for Wireless
Networks. Norwood MA: Artech House, 2001.
4
erfc(
u+v
2
2v
) =
2
u+v
2
2v
e
t
2
dt. Note that
D
R
=
3K in
Figure 1. Under 3 K 33, the value of erfc(
u+v
2
2v
) varies from 1.9944
to 1.9949 (=1). The higher and K make the function erfc() converge faster
to 2.