Multi-Channel MAC For Ad Hoc Networks: Handling Multi .

Transcription

Multi-Channel MAC for Ad Hoc Networks:Handling Multi-Channel Hidden Terminals Using A Single TransceiverJungmin SoNitin VaidyaDept. of Computer Science, andCoordinated Science LaboratoryUniversity of Illinois at Urbana-ChampaignDept. of Electrical and Computer Eng., andCoordinated Science LaboratoryUniversity of Illinois at eywordsThis paper proposes a medium access control (MAC) protocol for ad hoc wireless networks that utilizes multiple channels dynamically to improve performance. The IEEE 802.11standard allows for the use of multiple channels available atthe physical layer, but its MAC protocol is designed onlyfor a single channel. A single-channel MAC protocol doesnot work well in a multi-channel environment, because ofthe multi-channel hidden terminal problem. Our proposedprotocol enables hosts to utilize multiple channels by switching channels dynamically, thus increasing network throughput. The protocol requires only one transceiver per host,but solves the multi-channel hidden terminal problem using temporal synchronization. Our scheme improves network throughput significantly, especially when the networkis highly congested. The simulation results show that ourprotocol successfully exploits multiple channels to achievehigher throughput than IEEE 802.11. Also, the performanceof our protocol is comparable to another multi-channel MACprotocol that requires multiple transceivers per host. Sinceour protocol requires only one transceiver per host, it canbe implemented with a hardware complexity comparable toIEEE 802.11.Ad hoc network, medium access control, multi-channel1. INTRODUCTIONIEEE 802.11 standard for wireless LAN [1] provides multiple channels available for use. The IEEE 802.11b physical layer (PHY) has 14 channels, 5MHz apart in frequency[1]. However, to be totally non-overlapping, the frequencyspacing must be at least 30MHz. So channels 1, 6 and 11are typically used for communication in current implementations, and thus we have 3 channels for use. IEEE 802.11aprovides 12 channels, 8 in the lower part of the band forindoor use and 4 in the upper part for outdoor use [2].By exploiting multiple channels, we can achieve a highernetwork throughput than using one channel, because multiple transmissions can take place without interfering. However, the MAC protocol of IEEE 802.11 Distributed Coordinate Function (DCF) is designed for sharing a single channel between hosts. Designing a MAC protocol that exploitsmultiple channels is not an easy problem, due to the factthat each of current IEEE 802.11 device is equipped withone half-duplex transceiver. The transceiver is capable ofswitching channels dynamically, but it can only transmit orlisten on one channel at a time. Thus, when a host is listening on a particular channel, it cannot hear communicationtaking place on a different channel. Due to this, a new typeof hidden terminal problem occurs in this multi-channel environment, which we refer to as multi-channel hidden terminal problem (we identify this problem in more detail in Section IV). So a single-channel MAC protocol (such as IEEE802.11 DCF) does not work well in a multi-channel environment where nodes may dynamically switch channels.Categories and Subject DescriptorsC.2.2 [Computer-Communication Networks]: NetworkProtocolsGeneral TermsAlgorithms This research is supported in part by National ScienceFoundation and Motorola.In this paper, we propose a MAC protocol which enableshosts to dynamically negotiate channels such that multiplecommunication can take place in the same region simultanesouly, each in different channel. The network we consider isan ad hoc network that does not rely on infrastructure, sothere is no central authority to perform channel management. The main idea is to divide time in to fixed-time intervals using beacons, and have a small window at the startof each interval to indicate traffic and negotiate channels foruse during the interval. A similar approach is used in IEEEPermission to make digital or hard copies of all or part of this work forpersonal or classroom use is granted without fee provided that copies arenot made or distributed for profit or commercial advantage and that copiesbear this notice and the full citation on the first page. To copy otherwise, torepublish, to post on servers or to redistribute to lists, requires prior specificpermission and/or a fee.MobiHoc’04, May 24–26, 2004, Roppongi, Japan.Copyright 2004 ACM 1-58113-849-0/04/0005 . 5.00.222

Wu et al. [8] propose a protocol that assigns channels dynamically, in an on-demand style. In this protocol, calledDynamic Channel Assignment (DCA), they maintain onededicated channel for control messages and other channelsfor data. Each host has two transceivers, so that it canlisten on the control channel and the data channel simultaneously. RTS/CTS packets are exchanged on the controlchannel, and data packets are transmitted on the data channel. In RTS packet, the sender includes a list of preferredchannels. On receiving the RTS, the receiver decides on achannel and includes the channel information in the CTSpacket. Then, DATA and ACK packets are exchanged onthe agreed data channel. Since one of the two transceivers isalways listening on the control channel, multi-channel hidden terminal problem does not occur. This protocol doesnot need synchronization and can utilize multiple channelswith little control message overhead. But it does not perform well in an environment where all channels have thesame bandwidth. When the number of channels is small,one channel dedicated for control messages can be costly.In case of IEEE 802.11b, only 3 channels are available, sohaving one control channel results in 33% of the total bandwidth as the control overhead. On the other hand, if thenumber of channels is large, the control channel can becomea bottleneck and prevent data channels from being fully utilized.802.11’s power saving mechanism (PSM) [1], as explained inSection III.As reviewed in Section II, several MAC protocols are proposed that use multiple channels to improve throughput.But all of them either require multiple transceivers per hostor do not solve the multi-channel hidden terminal problem, resulting in degraded performance. To the best ofour knowledge, this is the first protocol that requires onlyone transceiver per host, but still solves the hidden terminalproblem in a multi-channel environment. Since the protocolrequires one transceiver per host, it can be implemented witha hardware complexity comparable to IEEE 802.11, unlikeother multi-channel MAC protocols that require multipletransceivers.The rest of the paper is organized as follows. Section IIreviews the related work. Section III provides some background information. Section IV identifies the multi-channelhidden terminal problem, and explains the problem of usinga single-channel MAC protocol in a multi-channel environment. Section V presents our proposed protocol in detail.Section VI describes the simulation model we use, and alsodiscusses the results of our simulations. Section VII discusses some issues in our protocol and possible improvements. Finally, Section VIII concludes the paper.2.Jain et al. [9] propose a protocol that uses a scheme similar to [8] that has one control channel and N data channels,but selects the best channel according to the channel condition at the receiver side. The protocol achieves throughput improvements by intelligently selecting the data channel, but still has the same disadvantages as DCA.RELATED WORKThere are many related papers that study the benefit ofusing multiple channels. Dual Busy Tone Multiple Access [3]divides a common channel into two sub-channels, one datachannel and one control channel. Busy tones are transmitted on a separate control channel to avoid hidden terminals,while data is transmitted on the data channel. This schemeuses only one data channel and is not intended for increasingthroughput using multiple channels.Compared to the above works, our protocol operates withone transceiver per host. Also, it does not require a dedicated control channel. Instead, our scheme requires clocksynchronization among all the hosts. At the start of eachinterval, we require all hosts to listen to a common channelin order to exchange traffic indication messages. During thisinterval hosts do not exchange data packets. So this duration of time is an overhead in our scheme. However, as wewill see in later sections, it achieves better throughput thanmaintaining a separate control channel.Hop Reservation Multiple Access [4] is a multi-channelprotocol for networks using slow frequency hopping spreadspectrum (FHSS). The hosts hop from one channel to another according to a predefined hopping pattern. When twohosts agree to exchange data by an RTS/CTS handshake,they stay in a frequency hop for communication. Otherhosts continue hopping, and more than one communicationcan take place on different frequency hops. Receiver Initiated Channel-Hopping with Dual Polling [5] takes a similarapproach, but the receiver initiates the collision avoidancehandshake instead of the sender. These schemes can be implemented using only one transceiver for each host, but theyonly apply to frequency hopping networks, and cannot beused in systems using other mechanisms such as direct sequence spread spectrum (DSSS).3. PRELIMINARIESIn this section, we present some background informationon IEEE 802.11’s DCF and power saving mechanism.3.1 IEEE 802.11 Distributed CoordinationFunction (DCF)In IEEE 802.11 DCF, a node reserves the channel for datatransmission by exchanging RTS/CTS messages with thetarget node. When a node wants to send packets to anothernode, it first sends an RTS (Ready to Send) packet to thedestination. The receiver, on processing the RTS, replies bysending a CTS (Clear to Send) packet to the sender. RTSand CTS packets include the expected duration of time forwhich the channel will be in use. Other hosts that overhearthese packets must defer their transmission for the durationspecified in the packets. For this reason, each host maintains a variable called the Network Allocation Vector (NAV)Nasipuri et al. [6] propose a multi-channel CSMA protocol with “soft” channel reservation. If there are N channels, the protocol assumes that each host can listen to all Nchannels concurrently. A host wanting to transmit a packetsearches for an idle channel and transmits on that idle channel. Among the idle channels, the one that was used for thelast successful transmission is preferred. In [7] the protocol is extended to select the best channel based on signalpower observed at the sender. These protocols require Ntransceivers for each host, which is very expensive.223

3.2 IEEE 802.11 Power Saving Mechanismthat records the duration of time it must defer its transmission. This whole process is called Virtual Carrier Sensing,which allows the area around the sender and receiver to bereserved for communication, thus avoiding the hidden terminal problem [10].In this section, we describe IEEE 802.11 PSM to explainhow ATIM windows are used. A node can save energy bygoing into doze mode. In doze mode, a node consumes muchless energy compared to normal mode, but cannot send orreceive packets. It is desirable for a node to enter the dozemode only when there is no need for exchanging data. InIEEE 802.11 PSM, this power management is done basedon Ad hoc Traffic Indication Messages (ATIM). Time is divided into beacon intervals, and every node in the networkis synchronized by periodic beacon transmissions. So everynode will start and finish each beacon interval at about thesame time.Figure 1 illustrates the operation of IEEE 802.11 DCF.When node B is transmitting a packet to node C, node Aoverhears the RTS packet and sets its NAV until the endof ACK, and node D overhears the CTS packet and setsits NAV until the end of ACK. After the transmission iscompleted, the stations wait for DIFS and then contend forthe channel. In this figure, node B is a hidden terminal tonode D. Without virtual carrier sensing, D would not knowof B’s transmission. So D may start transmitting a packetto C while B is transmitting, which results in a collision atC.ABCDDNAVABCFigure 2 illustrates the process of IEEE 802.11 PSM. Atthe start of each beacon interval, there exists an intervalcalled the ATIM window, where every node should be in theawake state. If node A has buffered packets for B, it sendsan ATIM packet to B during this interval. If B receives thismessage, it replies back by sending an ATIM-ACK to A.Both A and B will then stay awake for that entire beaconinterval. If a node has not sent or received any ATIM packets during the ATIM window (e.g., node C in Figure 2), itenters doze mode until the next beacon time.TimeDIFSRTSSIFSSIFSDATACTSSIFSACKContention WindowNAVDIFSAATIMDATABeaconFigure 1: Operation of IEEE 802.11 DCF.BIf a node has a packet to send but observes the channel tobe busy, it performs a random backoff by choosing a backoff counter no greater than an interval called the contentionwindow. Each host maintains a variable cw, the contentionwindow size, which is reset to a value CWmin when the nodeis initiated. Also, after each successful transmission, cw isreset to CWmin . After choosing a counter value, the nodewill wait until the channel becomes idle, and start decrementing the counter. The counter is decremented by oneafter each “time slot”, as long as the channel is idle. If thechannel becomes busy, the node will freeze the counter untilthe channel is free again. When the backoff counter reacheszero, the node will try to reserve the channel by sendingan RTS to the target node. Since two nodes can pick thesame backoff counter, the RTS packet may be lost becauseof collision. Since the probability of collision gets higher asthe number of nodes increases, a sender will interpret theabsence of a CTS as a sign of congestion. In this case, thenode will double its contention window to lower the probability of another collision.ATIM-ACKACKDoze modeCATIM WindowATIM WindowTimeBeacon IntervalFigure 2: Operation of IEEE 802.11 PSM.4. ISSUES IN MULTI-CHANNELENVIRONMENTIn this section, we describe a new type of hidden terminal problem [10] pertaining to multi-channel environment,which we call the multi-channel hidden terminal problem.For the sake of illustration, we start with a simple multichannel MAC protocol that does not address this problem.The protocol is similar to [8], except it assumes each nodehas one transceiver. Suppose there are N channels available. One channel is dedicated for exchanging control messages (control channel), and all the other channels are fordata. When a node is neither transmitting or receiving, itlistens to the control channel. When node A wants to transmit a packet to node B, A and B exchange RTS and CTSmessages to reserve the channel as in IEEE 802.11 DCF.RTS and CTS messages are sent on the control channel.When sending an RTS, node A includes a list of channelsit is willing to use. Upon receiving the RTS, B selects achannel and includes the selected channel in the CTS. Afterthat, node A and B switch their channels to the agreed datachannel and exchange the DATA and ACK packets. WhenBefore transmitting a packet, a node has to wait for asmall duration of time even if the channel is idle. This iscalled interframe spacing. Four different intervals enableeach packet to have different priority when contending forthe channel. SIFS, PIFS, DIFS, and EIFS are the four interframe spacings, in order of increasing length. A nodewaits for a DIFS before transmitting an RTS, but waits fora SIFS before sending a CTS or an ACK. Thus, an ACKpacket will win the channel when contending with RTS orDATA packets because the SIFS duration is smaller than aDIFS.224

the packets transmitted on different channels do notinterfere with each other. Hosts have prior knowledgeof how many channels are available.this handshake is done, node A and B immediately switchto the control channel.Now consider the scenario in Figure 3. Node A has apacket for B, so A sends an RTS on Channel 1 which is thecontrol channel. B selects Channel 2 for data communication and sends a CTS back to A. The RTS and CTS messages should reserve Channel 2 in the transmission rangesof A and B, no collision occurs. However, when node Bsent the CTS to A, node C was busy receiving on anotherchannel, so it did not hear the CTS. Not knowing that B isreceiving on Channel 2, C might initiate a communicationwith D, and end up selecting Channel 2 for communication.This will result in collision at node B.ABC Each host is equipped with a single half-duplextransceiver. So a host can either transmit or listen,but cannot do both simultaneously. Also, a host canlisten or transmit on only one channel at a time. Sowhen listening to one channel, it cannot carrier senseon other channels. Unlike our scheme, many othermulti-channel MAC protocols require each host to havemultiple transceivers [11, 9, 8]. The transceiver is capable of switching its channel dynamically. The time elapsed for switching the channelis 224µs [1]. Nodes are synchronized, so that all nodes begin theirbeacon interval at the same time. Clock synchronization can be achieved using either out-of-band solutionssuch as GPS, [12], or in-band solutions. If an out-ofband solution can be used, no additional overhead isimposed on the channels used by our protocol. However, if an in-band solution is used, we need to considerthe overhead of synchronization. To model this overhead, we implement beaconing mechanism similar toIEEE 802.11 timing synchronization function (TSF)[1] in our simulations (all beacons are sent on a common default channel explained later). The issue ofclock synchronization is discussed further in Section7.DChannel 3TimeRTSCTS (2)Channel 2RTSDATACTS (2)Channel 2CollisionNow we describe our proposed scheme in detail. Fromnow on, our protocol will be referred as Multi-channel MAC(MMAC).Channel 1DATAChannel 2ACKChannel 35.1 Preferable Channel List (PCL)Each node maintains a data structure called the Preferable Channel List (PCL), that indicates which channel ispreferable to use for the node. PCL records the usage ofchannels inside the transmission range of the node. Basedon this information, the channels are categorized into threestates.Figure 3: A scenario showing the hidden terminalproblem in multi-channel environment. Channel 1is the control channel. Since C was listening on oneof the data channels when B sent a CTS, C does notknow about communication between A and B.The above problem occurs due to the fact that nodes maylisten to different channels, which makes it difficult to usevirtual carrier sensing to avoid the hidden terminal problem. If there was only one channel that every node listensto, C would have heard the CTS and thus deferred its transmission. Thus, we call the above problem the multi-channelhidden terminal problem. As presented in the next section,we solve this problem using synchronization, similar to IEEE802.11 PSM. High preference (HIGH): This channel has already beenselected by the node for use in the current beacon interval. If a channel is in this state, this channel mustbe selected. For each beacon interval, at most onechannel can be in this state at each node.5. Low Preference (LOW): This channel is already takenby at least one the node’s immediate neighbors. Tobalance the channel load as much as possible, there isa counter for each channel in the PCL to record howmany source-destination pairs plan to use the channelfor the current interval. If all channels are in LOWstate, a node selects the channel with the smallestcount. Medium preference (MID): This channel has not yetbeen taken for use in the transmission range of thehost. If there is no HIGH state channels, a channel inthis state will be preferred.PROPOSED MULTI-CHANNEL MAC(MMAC) PROTOCOLIn this section, we present our proposed scheme. Beforedes

The RTS and CTS mes-sages should reserve Channel 2 in the transmission ranges of A and B, no collision occurs. However, when node B . virtual carrier sensing to avoid the hidden terminal p