[ieee 2010 the 9th ifip annual mediterranean ad hoc networking workshop (med-hoc-net 2010) - juan...

8
Modeling and Improving CSMA Unfairness in Mobile Ad Hoc Networks Skander Banaouas Paul M¨ uhlethaler INRIA Rocquencourt INRIA Rocquencourt Le Chesnay FRANCE Le Chesnay FRANCE [email protected] [email protected] Abstract—In this paper we study and model the unfairness in Carrier Sense Multiple Access (CSMA) Mobile Ad hoc Networks. We use a Markov model to represent the functioning of our network. The Markov states correspond to the set of nodes which transmit simultaneously. This model allows the steady state to be simply computed when the network is overloaded. When the CSMA back-off is small compared with the duration of a packet, we show that the most probable states are those containing the maximum number of stations, which corresponds to a maximum number of simultaneously transmitting nodes. In other words, the nodes in the maximum sets of the graph inferred by the CSMA rule are favored. We study this model with several examples of ad hoc networks. We compare the predictions of this model with simulation results and observe that the matching is good. We show how this model can be extended to situations where there are hidden nodes. We also show that our model can be used to adjust the back-off windows of the network nodes in order to enhance fairness. I. I NTRODUCTION The area of Mobile Ad hoc NETworks (MANETs) is a very challenging research field. The need for connectivity in these networks has given rise to a large number of studies, particu- larly regarding routing. Many proposals have been made, e.g. [1], [2], [3], [4] and a few of them are now standards [5], [6]. The problem of the access schemes in these networks is also extremely challenging. Many protocols have been proposed for TDMA-based (Time Division Multiple Access-based) access schemes in ad hoc networks e.g. NAMA [7], USAP [8], [9] and ASAP [10]. These protocols share the idea of reserving time-slots in the 2-hop neighborhood. This reservation rule is used to avoid collision with neighbor nodes or with hidden nodes. Despite these studies for TDMA-based access which usually target military applications, main-stream access schemes really implemented or experimented for MANETs are CSMA-based (Carrier Sense Multiple Access-based) protocols. The reason for this probably lies in the dominant position of the IEEE 802.11 standard whose first version was published in 1997 and thus has existed for more than 13 years. The existence of af- fordable IEEE 802.11 products sometimes controlled by open source drivers has motivated the development of numerous products and academic studies based on IEEE 802.11 chipsets. This work was supported by the RAF (R´ eseau Ad hoc haute eFficacit´ e) project funded by the DGE (D´ el´ egation G´ en´ erale des Entreprises) However, these techniques are known to suffer from seri- ous drawbacks such as: unpredictability, unfairness, hidden- collisions, exposed nodes, etc. But it has also been shown in [11] that Quality-of-Service (QoS) constraints can be suc- cessfully handled with CSMA-based approaches if additional mechanisms such as admission control, reservation and prior- itization schemes are added to the network. In this paper we propose an analytical model to predict the unfairness of CSMA-based protocols used in MANETs. We show how the model can be extended to the case of MANETs where there are hidden collisions. We also prove that the unfairness of CSMA-based protocols can be mitigated using different values for the back-off windows. This paper is organized as follows. Section II presents related works. Section III describes the physical and the network model used in this paper. Section IV describes the analytical model which allows the throughput of the network nodes to be computed. In section V we propose a simple example of the analytical model for a given ad hoc network. We compare the network nodes’ throughput computed by the analytical model with that obtained by simulations. We also analyze the network nodes’ throughput when there are hidden collisions. In section VI we study how changing the sizes of the collision windows can help to improve the fairness of CSMA-based protocols. II. RELATED WORKS Many studies such as [12], [13], [14], [15] deal with the unfairness of CSMA-based access protocols in ad hoc net- works. Most of them use either simulations or real experiments to quantify the unfairness of CSMA-based access protocols. [14] especially studies the unfairness of CSMA-based access protocols when TCP is used to maintain connections. [15] distinguishes between short and long term unfairness. In contrast to these studies, [16] proposes an analytical model to capture the performance of the IEEE 802.11 access protocol when the network is in overload. However this analysis does not take into account the network topology; there is no spatial reuse in this model. Simultaneous and successful transmission can not occur, it is as if the model were for a wired network. Nevertheless simulations show the accuracy of the model to capture the effect of the binary exponential back-off. 978-1-4244-8435-5/10/$26.00 ©2010 IEEE

Upload: paul

Post on 28-Feb-2017

214 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: [IEEE 2010 The 9th IFIP Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net 2010) - Juan Les Pins, France (2010.06.23-2010.06.25)] 2010 The 9th IFIP Annual Mediterranean Ad

Modeling and Improving CSMA Unfairness inMobile Ad Hoc Networks

Skander Banaouas Paul Muhlethaler

INRIA Rocquencourt INRIA Rocquencourt

Le Chesnay FRANCE Le Chesnay FRANCE

[email protected] [email protected]

Abstract—In this paper we study and model the unfairness inCarrier Sense Multiple Access (CSMA) Mobile Ad hoc Networks.We use a Markov model to represent the functioning of ournetwork. The Markov states correspond to the set of nodes whichtransmit simultaneously. This model allows the steady state tobe simply computed when the network is overloaded. When theCSMA back-off is small compared with the duration of a packet,we show that the most probable states are those containing themaximum number of stations, which corresponds to a maximumnumber of simultaneously transmitting nodes. In other words,the nodes in the maximum sets of the graph inferred by theCSMA rule are favored.

We study this model with several examples of ad hoc networks.We compare the predictions of this model with simulation resultsand observe that the matching is good. We show how this modelcan be extended to situations where there are hidden nodes. Wealso show that our model can be used to adjust the back-offwindows of the network nodes in order to enhance fairness.

I. INTRODUCTION

The area of Mobile Ad hoc NETworks (MANETs) is a very

challenging research field. The need for connectivity in these

networks has given rise to a large number of studies, particu-

larly regarding routing. Many proposals have been made, e.g.

[1], [2], [3], [4] and a few of them are now standards [5], [6].

The problem of the access schemes in these networks is also

extremely challenging. Many protocols have been proposed for

TDMA-based (Time Division Multiple Access-based) access

schemes in ad hoc networks e.g. NAMA [7], USAP [8], [9]

and ASAP [10]. These protocols share the idea of reserving

time-slots in the 2-hop neighborhood. This reservation rule is

used to avoid collision with neighbor nodes or with hidden

nodes.

Despite these studies for TDMA-based access which usually

target military applications, main-stream access schemes really

implemented or experimented for MANETs are CSMA-based

(Carrier Sense Multiple Access-based) protocols. The reason

for this probably lies in the dominant position of the IEEE

802.11 standard whose first version was published in 1997 and

thus has existed for more than 13 years. The existence of af-

fordable IEEE 802.11 products sometimes controlled by open

source drivers has motivated the development of numerous

products and academic studies based on IEEE 802.11 chipsets.

This work was supported by the RAF (Reseau Ad hoc haute eFficacite)project funded by the DGE (Delegation Generale des Entreprises)

However, these techniques are known to suffer from seri-

ous drawbacks such as: unpredictability, unfairness, hidden-

collisions, exposed nodes, etc. But it has also been shown

in [11] that Quality-of-Service (QoS) constraints can be suc-

cessfully handled with CSMA-based approaches if additional

mechanisms such as admission control, reservation and prior-

itization schemes are added to the network.

In this paper we propose an analytical model to predict the

unfairness of CSMA-based protocols used in MANETs. We

show how the model can be extended to the case of MANETs

where there are hidden collisions. We also prove that the

unfairness of CSMA-based protocols can be mitigated using

different values for the back-off windows.

This paper is organized as follows. Section II presents

related works. Section III describes the physical and the

network model used in this paper. Section IV describes the

analytical model which allows the throughput of the network

nodes to be computed. In section V we propose a simple

example of the analytical model for a given ad hoc network.

We compare the network nodes’ throughput computed by the

analytical model with that obtained by simulations. We also

analyze the network nodes’ throughput when there are hidden

collisions. In section VI we study how changing the sizes

of the collision windows can help to improve the fairness of

CSMA-based protocols.

II. RELATED WORKS

Many studies such as [12], [13], [14], [15] deal with the

unfairness of CSMA-based access protocols in ad hoc net-

works. Most of them use either simulations or real experiments

to quantify the unfairness of CSMA-based access protocols.

[14] especially studies the unfairness of CSMA-based access

protocols when TCP is used to maintain connections. [15]

distinguishes between short and long term unfairness.

In contrast to these studies, [16] proposes an analytical

model to capture the performance of the IEEE 802.11 access

protocol when the network is in overload. However this

analysis does not take into account the network topology; there

is no spatial reuse in this model. Simultaneous and successful

transmission can not occur, it is as if the model were for a

wired network. Nevertheless simulations show the accuracy

of the model to capture the effect of the binary exponential

back-off.

978-1-4244-8435-5/10/$26.00 ©2010 IEEE

Page 2: [IEEE 2010 The 9th IFIP Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net 2010) - Juan Les Pins, France (2010.06.23-2010.06.25)] 2010 The 9th IFIP Annual Mediterranean Ad

Other papers try to investigate the throughput of CSMA

protocols. In [17] the authors study how the network through-

put can be optimized by a proper tuning of the carrier sense

threshold. The network is supposed to be in overload thus all

nodes have pending packets. The interference is assumed to

result only from the nearest neighboor. The intensity of the

point process built with the simultaneous transmissions in the

network is assumed to be a Matern point process. The model

presented in [17] show that a suitable tuning of the carrier

sense threshold allows the network throughput to be very

significantly improved. This result is confirmed by simulation.

In [18] a stochastic geometry model for the performance

analysis and the planning of dense IEEE 802.11 networks is

presented. This model, also based on Matern point processes,

takes the effect of interferences and that of CSMA into account

within this dense network context. The long term throughput

obtained by end-users when the access point density increases

is studied. The model derived in [18] can be used for the

planning of managed networks and for the economic modeling

of unplanned networks.

A previous study [19] proposed a Markov analysis of

CSMA networks in the same spirit as the model presented

in this paper. However our model is simpler and gives closed

formulas for the nodes’ throughput at highload. Our model is

also extended for hidden nodes.

The next section provides the general assumptions that are

used in this article, especially for the simulation part of this

paper.

III. PHYSICAL MODEL AND TRAFFIC MODEL

A. Physical model

We use the simple power law decay to evaluate the trans-

mission power received at distance d from the transmitter. The

power at 1 meter is denoted by P0, the decay rate of the

transmission power is β. Thus the received power at distance

d is P :

P =P0

dβ. (1)

We denote by Ccs the carrier sense threshold, which governs

the carrier sensing. If the power received on the channel by

a given node is greater than this threshold, the channel is

assumed be busy and this node refrains from transmitting. If

the power received on the channel by a given node is smaller

than this threshold, the node is allowed to transmit.

Moreover a packet is assumed to be correctly received if

the corresponding value of the SINR (Signal over Interference

plus Noise Ratio) is greater than the capture threshold that we

denote by T .

B. Traffic model and fairness

We suppose an exponentially distributed traffic at each node

i of rate λi. We also assume that the duration of a transmission

is exponentially distributed of rate μi. The access scheme is

of the IEEE 802.11 type.

It is difficult to define a fairness objective in multiple ad

hoc networks. Let us assume that we have a set of connexions

between pairs of nodes in the network; these pairs of nodes

may be more that one hop away. A fairness objective should

that the throughput is equally shared between the defined set

of connexions. The study of this fairness goal is complex

because of the relayed traffic, the precise topology and the

routes to convey the connexions must be taken into account.

In this paper we use a simpler fairness objective which is that

the throughput of each node should be equally shared. We

assume that each node transmits packets evenly to each of its

neighbors.

IV. MARKOV MODEL AND EVALUATION OF THE

UNFAIRNESS

A. Markov model and computation of the nodes’ throughput

To simplify the model we assume that when a node itransmits to a node j, there is no other possible transmission

within a given radius of node i. We consider the set of nodes

N = {1, 2, 3, .., n− 1, n} and the graph of links {i, j} when

node i and j can not transmit simultaneously. We consider the

set of nodes that are transmitting at the same time t. These

sets are the Markov states s of our model. For a given state

s, we note T (s) the set of nodes that can transmit (according

to the CSMA rule) while all the nodes in s are transmitting.

Thus for any node l in T (s), we note by s ∪ {l} the Markov

state where all the nodes in s plus l are transmitting. For any

node m in s, we denote by s \ {m} the Markov state where

node m is removed from s. In a given state s a node i in T (s)may be added with probability αi and a node may be removed

with probability μi.

For αi we will use an approximation. For small values of

λi we have αi � λi, the access rate is governed by the arrival

process of packets in the node. Then when the sum of the loads

within carrier range of node i (including node i itself) exceeds

the wireless channel capacity there is a queue of packets in

node i. The transition rate for admitting a new node in state

s is then governed by the IEEE 802.11 back-off strategy. We

approximate the transmission rate by αi � δi with 1δi

being

equal to CW2 where CW is the size of the collision window

of the IEEE 802.11 access protocol1.

When the network is stable, the steady state probability

satisfies the following equation :

P (s)(∑

i∈s

μi +∑

i∈T (s)

αi

)=

∑i∈T (s)

μiP (s ∪ {i}) +∑i∈s

αiP (s \ {i}). (2)

This equation of a Markov reversible chain has the following

solution:

μiP (s \ {i}) = αiP (s). (3)

1This approximation is obtained by assuming that in IEEE 802.11 the actualtransmission occurs in the first collision window and by writting that the twomeans are equal

Page 3: [IEEE 2010 The 9th IFIP Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net 2010) - Juan Les Pins, France (2010.06.23-2010.06.25)] 2010 The 9th IFIP Annual Mediterranean Ad

Thus we obtain :

P (s) =(∏

i∈s

ui

)P (φ). (4)

where ui = αi/μi and φ denotes the state where no node is

transmitting. Let us denote by S the set of all the possible

states where at least one node is transmitting. For normalisa-

tion reason we obtain:

P (φ) =(1 +

∑s∈S

∏i∈s

ui

)−1(5)

Let us denote by R(l) the set of states where node lis transmitting. In a first step we assume that there are no

hidden collisions. Thus when a transmission is permitted by

the CSMA protocol, the transmission is a success unless

transmissions begin at the same time. We do not consider here

the effect of such an event. The throughput thl of node l is

thus:

thl =(1 +

∑s∈S

∏i∈s

ui

)−1.

∑s∈R(l)

(∏i∈s

ui

). (6)

This formula allows the links throughput to be computed and

thus the unfairness of the network to be measured.

B. Throughput at low load

We have seen in the previous subsection that at low load

we have αi � λi. Thus the formula above for thl gives

thl = αl.

Between the low load conditions and the overload condition

it is difficult to quantify the transition rate when a state gains

a new transmitting node. We have tried a few approximations

to quantify this transmission rate when the load is between

low load and overload and then to solve the equations of the

steady state. But the results were not good, mainly because

the approximations were too imprecise. For a given ad hoc

network, it is possible to evaluate the input load from which

the total load of nodes within carrier sense reach exceeds

the channel throughput. We know that when this occurs the

queues start to increase in the network nodes. Thus this load

is the starting load where a few nodes see their throughput

continuing to increase and other nodes see their throughput

decreasing. The characterisation of the throughput of the

network in overload is given below.

C. Asymptotic values of the throughput in overload

We assume that the network is in overload. All the nodes

have pending packets in their queues. The transition to a state

with a transmitting node is governed by the backoff strategy of

the CSMA protocol. We also assume that the backoff strategy

is the same for all the network nodes and that the mean back

off is small with respect to the mean packet length. We also

assume that the packet length is Poisson and has the same

mean length for all the nodes. Although the model is rigorous

only if the packet and the back-off length are exponentially

distributed, we also use the same model with a packet length

of constant size and with a back off time randomly chosen in a

collision window. In these conditions and considering that the

backoff time is small compared with the transmission time,

we have:

∀i ui ≡ C � 1 (7)

and the dominant factor in the formula giving the throughput

of a node is given by the states with the maximum number

of transmitting nodes. Let us call MS the set of states with

the maximum number of transmitting nodes, Card(MS) the

number of states in MS. For a given node l we also denote

Cardl(MS) the number of states in MS where node l is

transmitting. With these notations we obtain :

thl � Cardl(MS)Card(MS)

. (8)

This formula allows the throughput of a node to be com-

puted simply. We notice that only nodes which are transmitting

in the state with the maximum number of transmitting nodes

have a non zero throughput. When one node appears more

often than another in the state with the maximum number of

transmitting nodes, this node has a larger throughput.

Contrary to what we might think, the throughput of a node

does not depend on the number of its neighbors. However

another intuitive ideas is that the throughput of a node depends

on its location and that nodes on the border of the network

exhibit higher throughput. Although we will not explicitly

prove (or disprove) this latter idea here, we will see in the

examples given below that nodes on the border of the network

do indeed reach a higher throughput than the nodes more in

the center of the nework.

D. Extensions of the model

D.1 Throughput with hidden nodes

In the above model, we have assumed that when the carrier

sense allows a transmission this transmission is bound to be

successful. This is not always the case. For instance, with

hidden collisions, a transmission may be possible with respect

to the carrier sense rule while in fact provoking a collision.

Thus equation 6 which gives the throughput may be corrected

by adding a probability of success which corresponds to the

probability of capture. Thus we have

thl =(1 +

∑s∈S

∏i∈s

ui

)−1 ∑s∈R(l)

Psucc(l, s)(∏

i∈s

ui

). (9)

where Psucc(l, s) is the probability that the transmission of

node l is captured by its destination node say node j.

If the hidden collisions for node l may only occur due to

the transmission of nodes in s, a simple analysis determines

Psucc(l, s). Depending on the destination node j, the trans-

mission may or may not be captured and thus Psucc(l, s) can

be easily computed.

In contrast, if for some node l a hidden collision may result

from other transmissions than those in s then the computation

Page 4: [IEEE 2010 The 9th IFIP Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net 2010) - Juan Les Pins, France (2010.06.23-2010.06.25)] 2010 The 9th IFIP Annual Mediterranean Ad

of the throughput is more complex and we have to assume

that the network is in the states s ∈ MS 2. For a given node

l we must consider all the simultaneous transmissions at the

beginning of node l’s transmission and the possible changes in

transmitting nodes when a transmission in s\{l} stops. Taking

into account all the possible cases and determining if node l’stranmission is still captured allows Psucc(l, s) to be computed.

An example of such a computation is given in section V-C.

D.2 Link throughputs

In some networks, it may be useful to consider transmission

between two given nodes rather than only considering the

transmission of a given source node without specifying the

destination. To model the effect of the CSMA, this leads to

considering a graph which has links as vertices. In this graph

two vertices (thus links of the ad hoc network) are linked by

an edge when the two links of the ad hoc network can not

transmit simultaneously because of the carrier sense effect.

Using this graph, we can use the same methodology as that

used in the previous sub-section. We have to find independent

sets of links, i.e. pairs of source-destination nodes which can

transmit simultaneously according to the CSMA rule. The

equations remain the same with the same product form. Instead

of computing the throughput of nodes, the model naturally

involves computing the throughput of a link.

V. USING THIS MODEL WITH GIVEN AD HOC NETWORKS

A. Presentation of the model in a simple example

Below we give an example of the utilization of this model

on the topology presented in Figure 1.

1 2 3 4

5

6(0,0) (200,0) (400,0) (600,0)

(773,100)

(773,-100)

Fig. 1. Network topology 1

The graph of the nodes within carrier sense range is given

in Figure 3. The values of the physical parameters are given

in Figure 2. These values are used in the analytical model and

in the simulations for the network topology 1.

P0 β Ccs T1.0 4.0 7.7× 10−12 2.0

Fig. 2. Physical parameters used for the network topology 1

In this network and with the physical parameters used, the

carrier sense only allows node 1 and node 5 or node 1 and

node 6 to transmit simultaneously. Any possible simultaneous

transmissions are forbidden according to the CSMA rule.

Moreover with the capture threshold T set to 2 there are no

hidden collisions.

2This is true in overload as seen in section IV-C

Fig. 3. Graph of the nodes within carrier sense range for network topology1

All the possible states are presented in Figure 4 with the

transitions between states. In this example we assume that

μi ≡ 1. We use equations 5 and 6.

0.0.0.0.0.0

1.0.0.0.0.0

0.1.0.0.0.0

0.0.1.0.0.0

0.0.0.1.0.0

0.0.0.0.1.0

0.0.0.0.0.1

1.0.0.0.1.0

1.0.0.0.0.1

μ1

α1

μ2

α2

μ3

α3

μ4 α

4μ5

α5

μ6

α6

μ1

μ1

α1

α1

μ1

μ1

α1

α1

α1

α1

μ1

α1

Fig. 4. The state transmission diagram of the Markov chain of thetransmissions for network topology 1

We have :

P (φ) =(1+α1 +α2 +α3 +α4 +α5 +α6 +α1α5 +α1α6

)−1.

For the throughput of the 6 nodes, we obtain:

thr1 =α1 + α1α5 + α1α6(

1 + α1 + α2 + α3 + α4 + α5 + α6 + α1α5 + α1α6

) .

thr5 =α1α5(

1 + α1 + α2 + α3 + α4 + α5 + α6 + α1α5 + α1α6

) .

thr6 =α1α6(

1 + α1 + α2 + α3 + α4 + α5 + α6 + α1α5 + α1α6

) .

We also have ∀i ∈ {2, 3, 4}

thri =αi(

1 + α1 + α2 + α3 + α4 + α5 + α6 + α1α5 + α1α6

) .

We find the following values :

thr1 = 0.96, thr5 = thr6 = 0.48

and

i = 2, 3, 4 thri = 0.008.

The asymptotic values at very high load are the following:

thrasyp1 = 1.0, thrasyp

5 = thrasyp6 = 0.5

and

i = 2, 3, 4 thrasypi = 0.

Page 5: [IEEE 2010 The 9th IFIP Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net 2010) - Juan Les Pins, France (2010.06.23-2010.06.25)] 2010 The 9th IFIP Annual Mediterranean Ad

B. Comparisons between the model and simulation results

Our aim is now to compare the results obtained using the

model with simulation results. We built our own simulator to

efficiently implement the IEEE 802.11 medium access scheme.

The inter-arrival of the traffic is exponentially distributed

and we increase the input load simultaneously in all the net-

work nodes. Each node randomly selects one of its neighbors

as the destination node for its pending packets.

The result of this simulation is shown in Figure 5. We can

observe that there is a good matching between the model at

overload and the simulation results. In the Figure we have not

presented the value of the throughput foreseen by the model

for node 2 (i.e 0.008) . Node 2, which is in the carrier sense

of all the other network nodes, should in theory start to starve

for an input load of 16%. We observe this phenomenon for a

slightly larger input load of around 23%.

0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6

Nor

mal

ized

thro

ughp

ut

λ

Normalized throughput, β=4

n1n2n5n6

n1 - modn5 n6 - mod

Fig. 5. Throughput of nodes 1, 2, 5, 6 and for ad hoc network topology 1,no hidden collisions

The results of the model may appear rather intuitive for

network topology 1. Only node 1 and node 5 or node 1 and

node 6 can transmit simultaneously. These are the only two

states with the maximum number of transmitting nodes. Thus

applying the formula given in section IV-B gives the result we

obtain.

2

3

45 6

1

7

(0,0)

(0,200)

(0,400)

(-173,-100) (173,100)(-173,-100)(-346,-200) ( 346,200)

Fig. 6. Ad hoc network topology 2

P0 β Ccs T1 4.0 3.5× 10−11 6

Fig. 7. Physical parameters used for network topology 2

2 3

4

5

6

1

7

Fig. 8. Graph of the nodes within carrier sense range for network topology2

The results are less intuitive with ad hoc network 2

whose topology is shown in Figure 6. We use the physi-

cal parameters given in Figure 7 for the analytical model

and for the simulations. With these parameters and these

figures the graph of nodes within carrier sense range is

given in Figure 8. In this network, up to three simultane-

ous transmissions can occur. There are four possible states

{1, 4, 7}, {1, 5, 7}, {1, 5, 6}, {2, 5, 7}. There are also nine

states with two simultaneous transmissions (left to the reader)

and, of course, seven states with only one transmission.

We find the following values using the value of the IEEE

802.11 collision window adopted in our simulation :

thr1 = thr5 = thr7 = 0.736

thr2 = thr4 = thr6 = 0.248, thr0 = 0

The asymptotic values are the following :

thrasyp1 = thrasyp

5 = thrasyp7 = 0.75,

thrasyp2 = thrasyp

4 = thrasyp6 = 0.25, thrasyp

0 = 0.

We note that these values are very close to the exact values.

In Figure 9 we present the nodes’ throughput for ad hoc

network 2. We use the same back-off window of 32 slots.

We observe that in overload the simulation results match the

predictions of the analytical model very well.

0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6

Nor

mal

ized

thro

ughp

ut

λ

Normalized throughput, β=4

n 1n 2n 3

n 1 - modn 2 - mod

Fig. 9. Throughput of stations 1,2,3 for ad hoc network 2 , no hiddencollisions

Page 6: [IEEE 2010 The 9th IFIP Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net 2010) - Juan Les Pins, France (2010.06.23-2010.06.25)] 2010 The 9th IFIP Annual Mediterranean Ad

C. Comparisons between the model and simulation resultswith hidden nodes

In this section we study the performance of CSMA with

hidden nodes and we compare the results of the prediction of

the model extended for hidden collisions presented in IV-D.

C.1 Study of ad hoc topology 3

1 (0 , 0 )

2 (170 , 0 )

3 (400 , 0 )

4(400 , 50 )

5(600 , 100 )

6 (600 , 0 )

7 (600 , 50 )

8 (570 , 100 )

Fig. 10. Ad hoc network topology 3.

P0 β Ccs T1.0 4.0 2.5× 10−11 15.0

Fig. 11. Physical parameters used for network topology 3

The topology of ad hoc network 3 is presented in Figure 10.

There are eight nodes in this network whose topology is close

to the topology of ad hoc network 1. The physical parameters

are given in Figure 11. With these figures node 1 and node

6 can transmit simultaneously as can node 1 and node 7 and

also node 1 and node 8. Thus {1, 6}, {1, 7}, {1, 8} are the

three maximum independent sets. In this configuration the

asymptotic value of the throughput when there are no hidden

collisions is thus 1 for node 1 and 1/3 for nodes 6, 7 and 8. We

assume that node 6, 7 and 8 transmit with an even probability

to nodes 3, 4 and 5 as node 1 only transmits to node 2. Yet

without hidden collisions but with a random back-off of 31

slots, the throughput is 0.956 for node 1 and 0.318 for nodes

6, 7 and 8.

When node 6 transmits simultaneously with node 1, there

is a hidden collision when node 6 transmits to nodes 4 and

5. When node 6 transmits to node 3 the packet is captured

even during node 1’s transmission. In the simulations we

have assumed that node 6 transmits with equal probability

to nodes 3, 4 and 5. Thus in the formula of IV-D we shall use

Psucc(6, {1, 6}) = 13 . When 7 transmits the packet is captured

by node 4 and 5 but not by node 3. Since the simulation

assumes that 7 transmits evenly to nodes 3, 4 and 5 we shall

use Psucc(7, {1, 7}) = 23 in the model. When 8 transmits the

packet is captured by nodes 3, 4 and 5. Thus we shall use

Psucc(8, {1, 8}) = 1 in the model.

The results of simulations are compared with the results of

the analytical model at overload in Figure 12. We observe that

the matching between the two approaches is rather good. In

order not to waste bandwidth with hidden collision there is a

single transmission attempt in the simulation. The maximum

throughput of node 1 is not shown in Figure 12 to improve the

readability of the Figure. The throughput of node 1 is found

to be 0.93 by simulation whereas the model predicts 0.956.

The prediction here is also good.The discrepency between the simulation and the model

probably results from the collisions of transmissions starting

nearly at the same time. These collisions are ignored in

the analytical model whereas the simualtions take them into

account. With 8 nodes and a back-off window of 32 slots the

probability of a collision due to two transmissions starting

nearly at the same time (thus not within carrier sense reach)

is not very small.

0

0.05

0.1

0.15

0.2

0.25

0.3

0.35

0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6

Nor

mal

ized

thro

ughp

ut

λ

Normalized throughput, β=4

n6n7n8

n6 modeln7 modeln8 model

Fig. 12. Ad hoc network topology 3.

C.2 Study of the ad hoc topology 2The analysis of hidden collisions is simple in ad hoc

network topology 3. The hidden collisions may only result

from node 1. In ad hoc network topology 2 if the capture

threshold is greater than 8 then node 1 is in collision when it

sends a packet to node 2 as soon as node 4 and 6 transmit.

Thus node 1 transmits successfully to node 2 only when the

network is in the state {1, 5, 7} however this condition is

not sufficient. Since the transmissions are asynchronous it is

necessary that the states after state {1, 5, 7} do not include

node 4 or 6 and the formula given in section IV-D can used

if we compute Psucc(1, {1, 5, 7}). We have to assume that

the back-off window and the packet duration are such that

ui � 1. The network is in the four more probable states

{1, 4, 7}, {1, 5, 7}, {1, 5, 6}, {2, 5, 7}. Node 1 successfully

transmits to node 2 if and only if

• the network is in state {1, 5, 7} when node 1 starts

transmitting; this occurs with probability 14

• when node 5 stops transmitting the next transmission

which can be either from node 4 or 5 should be from

node 5; this occurs with probability 12

• when node 7 stops transmitting the next transmission

which can either come from node 6 or 7 should be from

node 7; this occurs with probability 12 .

Thus

Psucc(1, {1, 5, 7}) =12

12

=14

and

thr1 =14Psucc(1, {1, 5, 7}) = 0.0625.

Page 7: [IEEE 2010 The 9th IFIP Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net 2010) - Juan Les Pins, France (2010.06.23-2010.06.25)] 2010 The 9th IFIP Annual Mediterranean Ad

For node 2 the reasoning is simpler. Node 2 successfully

transmits if and only if the network is in state {2, 5, 7} when

node 2 starts transmitting and node 2 transmits to node 1. If

node 2 transmits to node 3 the transmission always results in

a collision. Thus Psucc(2, {2, 5, 7}) = 12 and thr2 = 1

412 =

0.0125. The term 14 comes from the fact that the network must

be in state {2, 5, 7} and we have four states with the maximum

number of transmitting nodes.

In Figure 13 we present the nodes’ throughput for ad

hoc network 2. We still use the same back-off window of

32 slots but the capture threshold is now 10. With this

capture threshold, there are hidden collisions. For instance,

node 1 transmitting to node 2 enters in collision with node

4 transmitting to node 3 but in the same conditions node 4transmits successfully to node 5.

0

0.05

0.1

0.15

0.2

0.25

0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6

Nor

mal

ized

thro

ughp

ut

λ

Normalized throughput, β=4

n1n2n3

n1 modeln2 modeln3 model

Fig. 13. Throughput of nodes 1, 2, 3 for ad hoc network 2 and hiddencollisions

VI. MITIGATING THE UNFAIRNESS

In this section we study how the unfairness can be mitigated

using different values of the back-off windows for the different

nodes.

A. Example with ad hoc network 1

For ad hoc network 1, we use a back-off window of 775

slots for nodes 1, 5 and 6, a back-off window of 62 slots for

nodes 2 and 4, and a back-off window of 31 slots for node 3.

The results we obtain with such back-off windows are shown

in Figures 14 and 15. Figure 14 shows the throughput for

nodes 1, 5 and 6. These three nodes capture all the bandwidth

when the back-off windows are evenly distributed for all the

network nodes. With the new lengths of the back-off windows

we obtain a throughput of 0.08 for node 1 (predicted by the

model to be 0.1 ) and of 0.05 for nodes 5 and 6

We observe that the choice of back-off windows greatly

enhances the fairness in the network. Moreover the analytical

model offers a good estimate of the nodes’ throughput in

overload.

0.02

0.04

0.06

0.08

0.1

0.12

0.14

0.16

0.18

0.2

0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6

Nor

mal

ized

thro

ughp

ut

λ

Normalized throughput, β=4

n1n5n6

n1 modeln5 or n6 model

Fig. 14. Mitigating the unfairness in ad hoc network topology 1.

0

0.05

0.1

0.15

0.2

0.25

0.3

0.35

0.4

0.45

0.5

0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6

Nor

mal

ized

thro

ughp

ut

λ

Normalized throughput, β=4

n2n3n4

n2 or n4 modeln3 model

Fig. 15. Mitigating the unfairness in ad hoc network topology 1.

B. Example with ad hoc network 2

For ad hoc network 2, we use a back-off window of 310

slots for nodes 1, 5 and 7, a back-off window of 155 slots

for nodes 2, 4 and 6, and a back-off window of 31 slots for

node 3. The results we obtain with such back-off windows are

shown in Figure 16.

We observe that the choice of the back-off windows greatly

enhances the fairness in the network. Moreover the analytical

model offers a good estimate of the nodes’ throughput in

overload for nodes 1 and 2. For node 3 the estimation of the

model is average.

We can further improve the fairness of the network by using

a back-off window of 1550 slots for nodes 1, 5 and 7, a back-

off window of 155 slots for nodes 2, 4 and 6, and a back-off

window of 31 slots for node 3. In overload conditions and with

these figures, simulations provide the following results: node

1’s throughput is 0.115, node 2’s throughput is 0.152 and node

3’s throughput is 0.53. In these conditions the model foresees

0.26 for node 1’s throughput, 0.22 for node 2’s throughput and

0.23 for node 3’s throughput. The predictions are not accurate.

The difference between the simulations and the model can

probably be explained by the fact that the model assumes an

Page 8: [IEEE 2010 The 9th IFIP Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net 2010) - Juan Les Pins, France (2010.06.23-2010.06.25)] 2010 The 9th IFIP Annual Mediterranean Ad

0

0.1

0.2

0.3

0.4

0.5

0.6

0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6

Nor

mal

ized

thro

ughp

ut

λ

Normalized throughput, β=4

n 1n 2n 3

n 1 - modn 2 - modn 3 - mod

Fig. 16. Throughput of stations 1,2,3 for ad hoc network 2 , no hiddencollisions

exponentially distributed back-off time. This is not the case for

the IEEE 802.11 because first the initial back-off is linearly

distributed and secondly when there is a defer due to the carrier

the back-off is frozen and resumes when the channel is free

again.

Although the predictions are not always completely accu-

rate, they nonetheless provide orders of magnitude. Thus, our

analytical model can be used to foresee suitable values of the

collision windows to improve the network fairness when the

initial unfairness is overwhelming.

VII. CONCLUSION

In this paper we have presented a model to evaluate the

throughput in a CSMA ad hoc network. We have shown that

the throughput of each node can be easily evaluated at both

low load and in overload conditions. We have shown that a

few nodes capture the bandwidth while the other nodes starve.

The nodes which capture the bandwidth are actually the nodes

which in the maximum sets of the graph induced by the carrier

sense rule. We have also shown how the model can take into

account the effect of hidden collisions. We have tested this

extension of the model on two examples. The prediction of

the model in these cases is fairly good. We have studied ad

hoc networks where the sizes of the back-off windows depends

on the node. We have shown that the model can predict the

nodes’ throughput rather well. Thus it is a good tool to evaluate

the sizes of back-off windows which offer a better fairness for

nodes’ throughput.

We believe that the model presented above can be applied to

other ad hoc networks than the two simple examples given in

this paper; the key to the analysis remains the computation of

maximum sets of the graph induced by the carrier sense rule.

We think that this model can be used to foresee suitable values

of the collision windows to enhance fairness in networks where

the discrepancy between the nodes’ throughput is large.

REFERENCES

[1] V. Park and S.Corson, “Temporally-Ordered Routing Algorithm(TORA),” http://tools.ietf.org/id/draft-ietf-manet-tora-spec-04.txt, 2001.

[2] C. E. Perkins and P. Bhagwat, “Highly dynamic Destination-SequencedDistance-Vector routing (DSDV) for mobile computers,” SIGCOMMComput. Commun. Rev., vol. 24, no. 4, pp. 234–244, 1994.

[3] D. Johnson and D. Maltz, “The Dynamic Source Routing Protocol forMobile Ad Hoc Networks (DSR),” IETF Internet Draft: draft-ietf-manet-dsr-09.txt, 2003.

[4] M. Gerla, G. Pei, X. Hong, and T. Chen, “ Fisheye State RoutingProtocol (FSR) for Ad Hoc Networks,” IETF Internet Draft: draft-ietf-manet-fsr-00.txt, 2001.

[5] E. M. Royer and C. E. Perkins, “Multicast operation of the ad-hoc on-demand distance vector routing protocol,” in MobiCom ’99:Proceedings of the 5th annual ACM/IEEE international conference onMobile computing and networking. New York, NY, USA: ACM, 1999,pp. 207–218.

[6] C. Adjih, T. Clausen, P. Jacquet, A. Laouiti, P. Minet, P. Muhlethaler,A. Qayyum, and L. Viennot, “Optimized Link-State Routing Protocol,”RFC 3626, October 2003.

[7] L. Bao and J. Garcia-Luna-Aceves, “A new approach to channel accessscheduling for ad hoc networks.” MOBICOM 2001, July 2001, pp.210–220.

[8] C. Young, “USAP: a unifying dynamic distributed multichannel TDMAslot assignment protocol,” Military Communications Conference, 1996.MILCOM ’96, Conference Proceedings, IEEE, vol. 1, pp. 235–239 vol.1,Oct 1996.

[9] D. Young, “A Unifying Dynamic Distributed Multichannel Slot Assign-ment Protocol,” in IEEE MILCOM’96, vol. 1, October 1996.

[10] W. Li, J.-B. Wei, and S. Wang, “An Evolutionary-Dynamic TDMA SlotAssignment Protocol for Ad Hoc Networks,” in proceeding of IEEEWireless Communication and Networking conference. IEEE, 2007, pp.138–142.

[11] D.-Q. Nguyen and P. Minet, “QoS support and OLSR routing ina mobile ad hoc network,” in ICNICONSMCL ’06: Proceedings ofthe International Conference on Networking, International Conferenceon Systems and International Conference on Mobile Communicationsand Learning Technologies. Washington, DC, USA: IEEE ComputerSociety, 2006, p. 74.

[12] S. Xu and T. Saadawi, “Does the IEEE 802.11 MAC protocol WorkWell in Multihop Wireless Ad Hoc Networks ,” in IEEE CommunicationMagazine, 2001, pp. 130–137.

[13] ——, “Revealing the Problems with 802.11 MAC Protocol in Multi-hopWireless Networks,” in Computer Networks, 2002.

[14] K. Xu, S. Bae, S. Lee, and M. Gerla, “TCP Behavior across MultihopWireless Networks and the Wired Networks,” in Proceedings of the ACMWorkshop on Mobile Multimedia (WoWMoM 2002) , 2002, pp. 41–48.

[15] C. Chaudet, D. Douthaut, and I. G. Lassous, “Performance Issueswith IEEE 802.11 in Ad Hoc Networking ,” in IEEE CommunicationMagazine, 2005, pp. 110–116.

[16] G. Bianchi, “Modeling and Performance Analysis of the IEEE 802.11Distributed Coordination Function,” in IEEE Journal on Selected Areasin Communications, 2000, pp. 535–547.

[17] P. Muhlethaler and A. Najid, “Throughput optimization of a multihopCSMA mobile ad hoc network,” in European Wireless, 2004.

[18] H. Q. Nguyen, F. Baccelli, and D. Kofman, “A stochastic geometryanalysis of dense ieee 802.11 networks,” in INFOCOM, 2007, pp. 1199–1207.

[19] R. Boorstyn, A. Kershenbaum, B. Maglaris, and V. Sahin, “ThroughputAnalysis in Multihop CSMA Packet Radio Networks,” IEEE Transac-tions on Communications, vol. 35, no. 3, pp. 267–274, 1987.