Elimination of exposed terminal problem using signature detection

This paper represents the design of Interference Resistant Multiple Access (IRMA), a novel cross layer protocol that can combat exposed terminals and exploit the concurrent transmissions in wireless networks, both helping in achieving higher throughput compared to the 802.11 standard and other recent protocols. By observing that nodes in current protocols waste transmission opportunities in two different scenarios, IRMA exploits the concurrency in two aspects. IRMA proposes a signature detection method in the physical layer to combat control frames' collisions, thus exploits the concurrency at the transmitter side. IRMA also designs a new NAV update scheme in the MAC layer to differentiate the interference ranges of different transmission links, thus exploits the concurrency of all non-interfering links. In addition, IRMA is based on the 802.11 standard so that it can be implemented into current devices. Experimental results based on USRP2 demonstrate the feasibility of the signature detection method, and simulations based on NS2 show that IRMA outperforms other protocols significantly.

[1]  E.M. Belding,et al.  RTSS/CTSS: mitigation of exposed terminals in static 802.11-based mesh networks , 2006, 2006 2nd IEEE Workshop on Wireless Mesh Networks.

[2]  Muriel Médard,et al.  XORs in the Air: Practical Wireless Network Coding , 2006, IEEE/ACM Transactions on Networking.

[3]  Mario Gerla,et al.  Interference aware (IA) MAC: an enhancement to IEEE802.11b DCF , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).

[4]  Soung Chang Liew,et al.  Improving Throughput and Fairness by Reducing Exposed and Hidden Nodes in 802.11 Networks , 2008, IEEE Transactions on Mobile Computing.

[5]  David Wetherall,et al.  Taking the sting out of carrier sense: interference cancellation for wireless LANs , 2008, MobiCom '08.

[6]  Nj Piscataway,et al.  Wireless LAN medium access control (MAC) and physical layer (PHY) specifications , 1996 .

[7]  Andrew T. Campbell,et al.  E-CSMA: Supporting Enhanced CSMA Performance in Experimental Sensor Networks Using Per-Neighbor Transmission Probability Thresholds , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[8]  P. Karn,et al.  MACA-a New Channel Access Method for Packet Radio , 1990 .

[9]  Dina Katabi,et al.  Zigzag decoding: combating hidden terminals in wireless networks , 2008, SIGCOMM '08.

[10]  Hari Balakrishnan,et al.  Harnessing Exposed Terminals in Wireless Networks , 2008, NSDI.

[11]  Srihari Nelakuditi,et al.  CSMA/CN: Carrier Sense Multiple Access With Collision Notification , 2012, IEEE/ACM Transactions on Networking.

[12]  Voon Chin Phua,et al.  Wireless lan medium access control (mac) and physical layer (phy) specifications , 1999 .

[13]  Mario Gerla,et al.  Effectiveness of RTS/CTS handshake in IEEE 802.11 based ad hoc networks , 2003, Ad Hoc Networks.

[14]  Archan Misra,et al.  Design and analysis of a cooperative medium access scheme for wireless mesh networks , 2004, First International Conference on Broadband Networks.

[15]  David Tse,et al.  Fundamentals of Wireless Communication , 2005 .

[16]  Dong Chao,et al.  Universal Software Radio Peripheral , 2010 .

[17]  Hari Balakrishnan,et al.  PPR: partial packet recovery for wireless networks , 2007, SIGCOMM '07.

[18]  Vaduvur Bharghavan,et al.  MACAW: a media access protocol for wireless LAN's , 1994, SIGCOMM 1994.

[19]  Muriel Médard,et al.  Symbol-level network coding for wireless mesh networks , 2008, SIGCOMM '08.