Logo PTI
Polish Information Processing Society
Logo FedCSIS

Annals of Computer Science and Information Systems, Volume 11

Proceedings of the 2017 Federated Conference on Computer Science and Information Systems

Optimizing RTS/CTS to Improve Throughput in Ad Hoc WLANs

, ,

DOI: http://dx.doi.org/10.15439/2017F193

Citation: Proceedings of the 2017 Federated Conference on Computer Science and Information Systems, M. Ganzha, L. Maciaszek, M. Paprzycki (eds). ACSIS, Vol. 11, pages 885889 ()

Full text

Abstract. IEEE 802.11 WLANs use carrier sense multiple access with collision avoidance (CSMA/CA) to initiate the Request to Send / Clear to Send (RTS/CTS) handshaking mechanism that solves the hidden node problem. However RTS/CTS also causes the exposed node problem where a node is unnecessarily prevented from accessing the wireless channel even when such access will not disrupt another nodes ongoing transmission. In this paper, we present continuing evaluation of a method for reducing exposed nodes in 802.11 ad hoc WLANs using asymmetric transmission ranges for RTS and CTS frames. NS-2 simulations show that the proposed method improves overall network throughput in a topology scenario of a 3-D network faced with ceiling/floor obstructions.

References

  1. iPass Inc. press, “iPass WiFi growth map shows 1 public hotspot for every 20 people on earth by 2018,” http://www.ipass.com/pressreleases/ipass-wi-fi-growth-map-shows-one-public-hotspot-for-every-20-people-on-earth-by-2018/
  2. Cisco, “Visual Networking Index: Global Mobile Data Traffic Forecast Update, 20162021 White Paper,” http://www.cisco.com/c/en/us/solutions/collateral/service-provider/visual-networking-index-vni/mobile-white-paper-c11-520862.html
  3. F. Gebali Analysis of Computer Networks, Springer International Publishers, 2015.
  4. J. F. Kurose and K. W. Ross, Computer networking: a top-down approach, Boston: Pearson, 2013.
  5. K. Xu, M. Gerla and S. Bae, “Effectiveness of RTS/CTS handshake in IEEE 802.11 based ad hoc networks,” Ad Hoc Networks, vol. 1(1), pp. 107-123, 2003.
  6. A. Matoba, M. Hanada, H. Kanemitsu, and M. W. Kim, “Asymmetric RTS/CTS for Exposed Node Reduction in IEEE 802.11 Ad Hoc Networks,” JCSE, vol. 8, No. 2, pp. 107-118, 2013
  7. H. A. Omar, K. Abboud, N. Cheng, K. R. Malekshan, A. T. Gamage and W. Zhuang, “A Survey on High Efficiency Wireless Local Area Networks: Next Generation WiFi,” IEEE Communications Surveys & Tutorials, vol. 18(4), pp. 2315-2344, 2016.
  8. E. Weyulu, T. Iwabuchi, M. Takeshi, M. Hanada and M. W. Kim, “Ad hoc WLAN throughput improvement by reduction of RTS range,” 2017 19th International Conference on Advanced Communication Technology (ICACT), Pyeongchang, Kwangwoon Do, South Korea, pp. 247-251, 2017.
  9. Z. J. Haas and J. Deng, “Dual busy tone multiple access (DBTMA)-a multiple access control scheme for ad hoc networks,” Communications, IEEE Transactions on, vol. 50, pp. 975-985, 2002
  10. J. So and N. H. Vaidya, “Multi-channel mac for ad hoc networks,” Proceedings of the 5th ACM international symposium on Mobile ad hoc networking and computing - MobiHoc ’04, 2004.
  11. L. Jiang and S. C. Liew, “Improving Throughput and Fairness by Reducing Exposed and Hidden Nodes in 802.11 Networks,” IEEE Transactions on Mobile Computing, vol. 7, No. 1, pp. 34-49, 2008
  12. P. Karn, “MACA A new channel access method for packet radio,” in ARRL/CRRL Amateur Radio 9th Computer Networking Conference, pp. 134-140, 1990
  13. C. E. Perkins and E. M. Royer, “Ad-hoc On-Demand Distance Vector Routing,” Proc. 2nd IEEE Wksp. Mobile Comp. Sys. and Apps., pp. 90-100, 1999
  14. CISCO, “Multi-Floor Deployments,” http://www.cisco.com, 2014
  15. A. S. Kim, J. Hwang and J. Park, “Enhanced Indoor Positioning Algorithm Using WLAN RSSI Measurements Considering the Relative Position Information of AP Configuration,” Journal of Institute of Control, Robotics and Systems, vol. 19, 146-151, 2013.
  16. T. Issariyakul and E. Hossain, Introduction to Network Simulator NS2, Boston, MA: Springer US, 2012