1. Introduction
IEEE 802.11 standard has become one of the most popular network transmission standards to support infrastructure Wireless Local Networks (WLANs) with Access Point (AP) and wireless ad hoc networks without AP for its cheap, convenience and flexibility. The Medium Access Control (MAC) layer in the Open System Interconnection (OSI) model is very importint because it determines the time when a wireless user accesses the channel, i.e., the prominent element for the success of IEEE 802.11 is its MAC protocol that provides robust and adaptive schemes, which can be tailored to varing conditons[1]. MAC protocols can be classified as polling-based and contention-based methods according to the different access modes, i.e., Point Coordination Function (PCF) and Distributed Coordination Function (DCF). However, PCF is not widely deployed because of its complexity and inefficiency, In contrast, DCF using CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) has become the most widely studied and used basic access mode both in infrastructure wireless networks and ad hoc wireless networks. More detailed description of IEEE 802.11 can be found in [2].
With the increasing demand of wireless users for emerging multimedia services and related Quality of Service (QoS), the wireless communication environment is becoming more and more diversified and complicated. The innate drawbacks of the wireless channel, such as the signal fading or path loss caused by the buildings or distance between any source and its destination, can considerably degrade the performance of a wireless network. How to overcome the poor channel conditions to meet the needs of wireless users for QoS has become one of the most urgent problems to be solved. As an effective and popular anti-fading technology, the Cooperative Communication (CC) [3], which exploits the broadcast nature of the radio channel, mainly introduces a relay (R) to assist a source (S) in communicatng with its destination (D) by asking R to forward D an amplified, compressed or recoded copy of the original data received correctly from S, a virtual Multiple Input Multiple Output (MIMO) system which can provide cooperative diversity is formed without actually requiring the deployment of physical antenna arrays and enables D to reconstruct a weak signal by properly combining multiple copies obtained from various independent transmission paths. So CC can not only improve the performance of communication networks but also enhance the reliability of communication link, playing a vital role in future standardization bodies.
However, since the introduction of relays in CC breaks the traditional point-to-point communication mode of non-cooperative wireless networks, the IEEE 802.11 MAC protocol shows obvious deficiencies in CC mode. In order to maximize the gain brought by CC, a large number of improved cooperative MAC protocols based on IEEE 802.11 have been proposed in recent years. Some representative state-of-the-art protocols and their basic ideas are summarized in Fig. 1 and classified in Fig. 2 according to [1].
From Fig. 2, because the idle time slots brought by backoff mechanism at every contention period is one of the major factors that cause the performance degradation of 802.11 wireless networks, in the BTC category which aims at optimizing the backoff window, both C-MAC[4] and CR-TDMA[12] protocol reduce the number of idle slots and improve the system performance and fairness by modifying the backoff window. For instance, the backoff counters in C-MAC[4] protocol are divided into two types: the one for collided nodes and the one for non-collided nodes based on the principle that the collided nodes have a higher priority than the other nodes in the light of transmitting packets. Although it shows that C-MAC outperforms the IEEE 802.11 DCF in the aspect of short-term fairness and throughput, a detailed backoff mechanism algorithm needs to be designed in BTC category, increasing the complexity of network software programs.
Fig. 1. Timeline of cooperative MAC protocols in IEEE 802.11
On the other hand, since the most significant advantage of CC is that two-hop transmissions at a faster data rate (by using relays) can be used to replace the slower single-hop (direct transmission from S to D), most existing works belong to the Min-TX category which is devoted to minimize packet transmission delay by selecting the optimal relays, such as CoopMAC[7], D2RAC-MAC[14] and EECO-MAC[15] protocol and so on. The cooperative MAC protocols in this category usually require the support of other technologies such as power control [15], concurrent cooperative transmission [10] and the introduction of CoopTable [7]. For example, CoopMAC protocol enables nodes to measure their Signal-to-Noise Ratio (SNR), estimate relative distances and select the modulation scheme by creating a CoopTable, which stores information such as the transmission rates from S to R (and R to D), the MAC addresses of potential relay node and the update time of CoopTable, for each node in the network. When S has packets to send, it can search the CoopTable to select the bset candidate. Although CoopMAC gives beter results in terms of throughput and access delay, it comes at the cost of extra system overhead caused by the generation and maintenance of CoopTable. It is obvious that cooperative MAC protocols in this category not only require the receiver to obtain a better network information, such as the Channel State Information (CSI) and Received Signal Strength Indicator (RSSI), but also have higher requirements on hardware devices of the communication network, which cannot be met sometimes in practical applications.
Fig. 2. Classification of cooperative MAC protocols in IEEE 802.11
The above protocols are aimed at solving some interesting cooperative issues, while none of them have been designed to implement the distributed cooperative ARQ schemes in wireless networks, protocols designed for this purpose mainly includes CMAC (FCMAC)[5], NCSW [6] and PRCSMA[8] protocol in CWF category (COARQ protocol is designed for infrastructure WLANs). The main operation of CWF is to exploit the nature that neighbor nodes sense the transmission from S to D, if D broadcasts a Negative ACKnowledgment (NACK), the cooperation is triggered and neighbor nodes execute retransmission to improve system performance. CMAC (FCMAC) [5] uses Forward Error Correction (FEC) and retransmission combining techniques to enhance robustness and ensure a certain QoS in cooperation, NCSW[6] proves a cooperation among a small number of nodes can signficantly improve the throughput, average delay and delay jitter by establishing a two-state Markovian process, but both of them do not consider the contention process caused by multiple relays contend for the access to channel, which is important in distributed cooperative scheme. To the best of our knowledge, PRCSMA[8] is the first cooperative MAC protocol designed for this purpose. The seminal idea of PRCSMA originates from the Multiple Relay Access Control (MRAC) protocol[16] proposed by Alonso-Zárate J et al. in 2006 and the further analysis is shown in [9]. However, there are some obvious defects existing in PRCSMA. Fistly, in the aspect of the details of the protocol, [8] just assumes that the relays use the last value of the backoff counter for a new cooperation phase, which is not reasonable because the IEEE 802.11 backoff mechanism stipulates that the relay should reset its backoff counter right after a successful transmission. Secondly, in terms of system modeling, [8] just uses the existing embedded two-dimensional Markov chain model, which does not consider the state that the backoff is frozen, of Wu et al.[17], obviously lacking the accuracy for modeling the PRCSMA protocol. Although a dedicated model was established for PRCSMA protocol in [9], it just is a simple one-dimensional embedded Markov chain by defining the size of the contention window as constant W and ignoring the analysis of the backoff stage. Finally, in the light of performance evaluation, both [8] and [9] only take the average packet transmission delay as the single performance index to be calculated and simulated, but other indicators are not involved in disscusion.
On the other hand, it is known that both FEC and ARQ are two commonly used error control technologies for Data Link Layer (DLL) in wireless networks, and their combination, i.e., Hybrid ARQ (HARQ) protocol[18], is put forward to combat the higher Packet Error Rate (PER) caused by poor channel conditions. Moreover, unlike ARQ which directly discards the error packets and requests a retransmission of correct one, HARQ with soft combining[19,20] can make full use of the effective information in each error packet received by D to achieve a more reliable diversity combining gain than ARQ by asking D to store the error packet into buffer and jointly decode it with packets obtained subsequently. It is obvious that HARQ can achieve a higher performance, but up to the knowledge of us, no cooperative MAC protocol with HARQ has been proposed in existing works yet.
Consequently, this paper, inspired by these ideas, proposes an enhanced distributed C-ARQ scheme—SPRCSMA (Super PRCSMA) as the IEEE 802.11 standard cooperative MAC protocol by utilizing the HARQ technology with soft combining and modifying the deficiencies of PRCSMA. Then the closed expressions of network performance including the throughput and the average packet transmission delay are derived by the theoretical analysis. Finally, the performance evaluation and superiority of SPRCSMA protocol are validated and compared with other schemes in some evaluation cases through MATLAB, providing strong theoretical support and basis for the design of the new network system.
The main contributions of this paper are the following:
1) A novel distributed C-ARQ scheme called SPRCSMA protocol is proposed from the perspective of optimizing the contention problem caused by multi-relay, which makes the transmission of network more efficient and flexible.
2) A dedicated two-dimensional Discrete Time Markov Chain (DTMC) model is presented for the SPRCSMA protocol, and two stochastic processes, the backoff stage and backoff counter, are examined simultaneously to describe the improved protocol more accurately.
3) The closed expressions of system throughput and average packet transmission delay are obtained by solving the steady-state distribution of the system.
4) The advantages of SPRCSMA over other protocols are verified and the effects of different initialized network parameters on system performance are investigated by different study cases, providing some theoretical references for future network designing.
The rest of this paper is organized as follows. Section 2 is fully devoted to the description and operational example of SPRCSMA. Section 3 presents the corresponding Markov chain and its related theoretical analysis. Throughput and average packet transmission delay are analyzed in Section 4. The numerical simulation results are presented in Section 5 to evaluate the performance of SPRCSMA protocol under different configurations and to compare with other schemes. Finally, we conclude the paper and give a few remarks in Section 6.
2. SPRCSMA Protocol
2.1 Protocol Description
This paper considers a saturated wireless network composed by a source (S), a destination (D) and any number of neighbor nodes (stations), where every terminal is equipped with one antenna and a half-duplex radio frequency transceiver. All neighbor nodes listen to each ongoing transmission to help failed transmission between S and D. We assume that the feedback channel is ideal and the PER is pe, i.e., D receives an error packet with probability pe. In the SPRCSMA protocol, those neighbor nodes which can overhear the original data packet from S correctly become active relays (R), try to get access to the channel by implementing the DCF and forward their cooperative packets in a persistent manner. Specifically, whenever D receives an error data packet from S, it stores the packet and broadcasts an AFC (Ask For Cooperation) message to initiate a cooperation phase in which active relays receiving AFC packet from D successfully form the so-called relay set and get ready to retransmit the packet copies in a time orthogonally way to assist the failed transmission. Retransmission is performed only by relays and they execute either the basic access mode or the collision avoidance (COLAV) mode during a cooperation phase. It is worth noting that the detailed relay selection strategy is beyond the scope of this paper and if there has no relay participates in the retransmission after the cooperation phase is initiated, i.e., there is no neighbor node can decode the data frame successfully in the previous time slots when D broadcasts AFC message, the retransmission is executed by S in the subsequent time slots until the emergence of active relays, but in order to study the contention process among multi-relay, this paper assumes that there always exist active relays after AFC broadcasting, that is, the cooperation phase must be initiated. Obviously, the contention among active relays will inevitably be incurred because they use the MAC rules based on the DCF, namely a station that has packets to transmit needs to listen to the channel for a Distributed Inter-Frame Space (DIFS) before trying to transmit. If the channel is sensed free, it transmits packets; otherwise the Binary Exponential Backoff (BEB) algorithm is executed. That is, the relay sets a randomized backoff counter within the interval [0, Wi] where Wi represents the size of the backoff window at the ith backoff stage (\(i \in[0, m]\), m is the maximum backoff stage) and the value is initially set to a predefined value W0. The counter is decreased by one unit after each slot as long as the channel is idle. Whenever the timer expires, i.e., reaches zero, the station attempts a transmission. If the transmission successes, Wi will reset to the minimum size W0 and a positive ACKnowledgment (ACK) will be sent back to S. However, once the transmission fails or encounters a collision, D will feed back a NACK and Wi will double up to reduce the probability of collision in subsequent transmission attempts, i.e., \(W_{i}=2^{i} W_{0}, W_{\max }=2^{m} W_{0}\). R keeps retransmitting the packet copies to D until its retransmission number reaches the predefined maximum number Nmax (we will discuss the impact of the different values of m and Nmax on the system performance in section 3.1). Both R and D will discard the packet if D still fails to decode the original data packet after the Nmax th retransmission and D will report to the upper layer.
According to the above operation of SPRCSMA protocol, some modifications based on the basic rules of the IEEE 802.11 DCF are proposed as follows:
1) The AFC packet can be obtained by marking the empty field for address 4 of CTS packet to differentiate the normal CTS.
2) Because of using HARQ technology with soft combining, R does not need feedback message (i.e., ACK/NACK) from D for each retransmission in the cooperation phase.
3) R will reset the value of their backoff counter when a new cooperation phase is initiated.
2.2 Operational Example
Compared to the operational process of IEEE 802.11 DCF shown in Fig. 3, an operational example of SPRCSMA is presented in Fig. 4 to elaborate this improved protocol more directly. In Fig. 3 and Fig. 4, we assume that D can decode the original packet after active relays successfully retransmit copies twice, i.e., K = 2. .
Fig. 3. An operational example of original DCF scheme in IEEE 802.11 MAC protocol
In Fig. 4, there are 5 stations in a network: a pair of communication nodes S and D is assisted by three active relays (R1, R2 and R3) and all of them are in the transmission range of each other. We assume that the direct transmission from S to D is bound to unsuccessful, i.e., the cooperation phase must be initiated. Initially, S transmits a data packet to D. After a Short Inter-Frame Space (SIFS), an AFC packet is broadcasted by D to initiate a cooperation phase. Three active relays select a random value within the range of \(\left(0, W_{0}-1\right)\) for their respective backoff counters. In this example, R1, R2 and R3 select the value 4, 4 and 6, respectively. Therefore, after 4 time slots, R1, R2 attempt to retransmit simultaneously and a collision occurs, and R3 freezes the value of the remaining counter (2), which proves to be a failed retransmission ( K = 0 ). After a DIFS, R1, R2 reselect at random the value of their backoff counters from \(\left(0, W_{0}-1\right)\) to attempt a new transmission (3,5 respectively) and R3 resumes its backoff counter to continue the retransmission. Obviously, after 2 slots, the backoff counter of R3 expires firstly and it retransmits a packet, although it is an error packet copy, unlike 802.11 DCF and PRCSMA protocols where D discards this copy directly and requests a completely correct packet, D in SPRCSMA stores the error one into buffer to utilize the useful information in the error copy and jointly decode the original packet with copies received subsequently, i.e., the error copy also represents a partially successful retransmission in SPRCSMA. As for R1 and R2, they freeze their countdown because the channel is occupied by R3 . Similarly, after a DIFS which is used to ensure that no ACK has been sent by D, R3 reselects its backoff counters (4) and R1 , R2 resume their remaining value (1 and 3 respectively). This time, R3 is the fastest one who hits zero and thus completes the second transmission ( K = 2 ). Finally, D broadcasts an ACK packet to acknowledge the reception of the original packet and inform the end of the cooperation phase because it can decode the original packet by properly combining the information of the original transmission from S plus the two retransmissions from R1 and R3 . This indicates that S has transmitted a packet to D, and then it will send the next packet to D in the subsequent slots.
Fig. 4. An operational example of SPRCSMA
Unlike the IEEE 802.11 DCF, however, there appears a special event in SPRCSMA. As described in Fig. 4, when R1 retransmits the second packet successfully, which meets the requirement for completing the cooperation phase (i.e., K = 2), R2 and R3 no longer need to count down the remaining window values (2 and 3, respectively), but they reset directly by reselecting a new value from \(\left(0, W_{0}-1\right)\) to prepare for the next cooperation phase. In other words, there exists an event that the cooperation phase is completed in advance before the backoff counter counts down to zero. According, we name this event as “advance” event and represent it with probability pec.
Obviously, pec=0when the active relay number n=1. This is because that when there is only one relay in the network help to retransmit copies, all transmission tasks can only be fulfilled by it, the cooperation phase will not be completed until the only relay retransmits successfully K times, i.e., there will not appear the so-called “advance” event when n=1. On the contrary, in the case of multiple relays (n>1), each of them will be scrambling to try to retransmit copies, making some “slower” relays encounter a special situation that cooperation phase has been completed before they transmit even one packet. As shown in Fig. 4, two successful retransmissions are done by R3 and R1 respectively, while R2 receives an ACK at the end of the cooperation phase without transmitting even one packet.
3. System Model and Analysis
3.1 Markov model and state transfer probability
The main design goal of SPRCSMA is to enable the stations operating in IEEE 802.11 DCF to ask their neighbor nodes to retransmit copies persistently. In order to study the contention process caused by multiple relays, the cooperation backoff counter of a single SPRCSMA relay can be modeled with a two-dimensional \(\mathrm{DTMC}\left\{(i, j), i \in(0, m), j \in\left(0, W_{i}-1\right)\right\}\) illustrated in Fig. 5, and in which any (i,j) pair represents the current value of the backoff counter j at the backoff stage i . We denote p1, p2 and pec as the probability of a channel idle, busy and “advance” event happening, respectively. m is the maximum backoff stage, W0 represents the size of the initial backoff window, and \(W_{i}=2^{i} W_{0}\) is the size of the backoff window at the ith stage. The one-step transition probabilities are:
1) \((i, k+1) \rightarrow(i, k)\) represents the situation that the channel is sensed idle by the relay and the value of the backoff counter reduces one:
\(P\{i, k \mid i, k+1\}=p_{1} \quad 0 \leq i \leq m, 0 \leq k \leq W_{i}-2\) (1)
2) \((i, k) \rightarrow(i, k)\) represents the situation that the channel is sensed busy by the relay and the value of the backoff counter is frozen:
\(P\{i, k \mid i, k\}=p_{2} \quad 0 \leq i \leq m, 0 \leq k \leq W_{i}-1\) (2)
3) \((i-1,0) \rightarrow(i, k)\) represents the situation that an unsuccessful transmission occurs at backoff stage 1 i− when its backoff counter expires, the backoff stage increases by one, and the new size of the backoff window k is uniformly chosen in the range of \(\left(0, W_{i}-1\right)\):
\(P\{i, k \mid i-1,0\}=\frac{p_{2}}{W_{i}} \quad 1 \leq i \leq m, 0 \leq k \leq W_{i}-1\) (3)
4) \((m, 0) \rightarrow(m, k)\) represents the situation that the backoff stage is not increased in subsequent packet transmissions once it reaches the value m :
\(P\{m, k \mid m, 0\}=\frac{p_{2}}{W_{m}} \quad 0 \leq k \leq W_{m}-1\) (4)
5) \((i, 0) \rightarrow(0, k)\) represents the situation that a new packet following a successful packet transmission starts with backoff stage 0, and thus the value of the backoff window is initially chosen in the range of \(\left(0, W_{i}-1\right)\):
\(P\{0, k \mid i, 0\}=\frac{1-p_{2}}{W_{0}} \quad 0 \leq i \leq m, 0 \leq k \leq W_{0}-1\) (5)
6) \((i, k) \rightarrow(0, j)\) represents the situation that the cooperation phase ends before the backoff counter expires, i.e., the occurrence of the “advance” event:
\(P\{0, j \mid i, k\}=\frac{p_{e c}}{W_{0}} \quad 0 \leq i \leq m, 1 \leq k \leq W_{i}-1,0 \leq j \leq W_{0}-1\) (6)
We assume that bi,k is the stationary distribution for a relay with backoff stage i and backoff timer k . According to the Markov chains regularities, we can derive the following formulas: ( )
\(\left\{\begin{array}{lc} b_{i-1,0} \cdot p_{2}=b_{i, 0} \Rightarrow b_{i, 0}=p_{2}^{i} b_{0,0} & 0<i<m \\ b_{i-1,0} \cdot p_{2}=\left(1-p_{2}\right) b_{i, 0} \Rightarrow b_{m, 0}=\frac{p_{2}^{m}}{\left(1-p_{2}\right)} b_{0,0} & i=m \end{array}\right.\) (7)
and then:
\(b_{i, 0}=\left\{\begin{array}{cc} p_{2}^{i} b_{0,0} & 0 \leq i<m \\ \frac{p_{2}^{m}}{\left(1-p_{2}\right)} b_{0,0} & i=m \end{array}\right.\) (8)
Fig. 5. Markov chain to model the backoff window of the SPRCSMA
by the same token, we have:
\(b_{i, k}=\frac{W_{i}-k}{W_{i}\left(p_{1}+p_{e c}\right)} \cdot\left\{\begin{array}{cc} {\left[\left(1-p_{2}\right) \sum_{i=0}^{m} b_{i, 0}+p_{e c} \sum_{i=0}^{m} \sum_{j=1}^{W_{i}-1} b_{i, j}\right]} & i=0 \\ p_{2} \cdot b_{i-1,0} & 0<i<m \\ p_{2}\left(b_{m-1,0}+b_{m, 0}\right) & i=m \end{array}\right.\) (9)
by (7) and Fig. 5, we can get:
\(\left(1-p_{2}\right) \sum_{i=0}^{m} b_{i, 0}+p_{e c} \sum_{i=0}^{m} \sum_{j=1}^{W_{i}-1} b_{i, j}=b_{0,0}\) (10)
\(p_{2} \cdot b_{i-1,0}=p_{2}^{i} b_{0,0}=b_{i, 0}\) (11)
\(p_{2}\left(b_{m-1,0}+b_{m, 0}\right)=p_{2} \cdot p_{2}^{m-1} b_{0,0}+p_{2} \cdot \frac{p_{2}^{m}}{\left(1-p_{2}\right)} b_{0,0}=p_{2}^{m}\left(1+\frac{p_{2}}{1-p_{2}}\right) b_{0,0}=\frac{p_{2}^{m}}{\left(1-p_{2}\right)} b_{0,0}=b_{m, 0}\) (12)
so based on the above analysis, it is easy to obtain the closed-form solution for this model:
\(b_{i, k}=\frac{W_{i}-k}{W_{i}\left(p_{1}+p_{e c}\right)} \cdot b_{i, 0} \quad i \in(0, m), k \in\left(0, W_{i}-1\right)\) (13)
Then we can make use of the fact that \(\sum_{i=0}^{m} \sum_{k=0}^{W_{i}-1} b_{i, k}=1\) to obtain b0,0. However, note that we need to discuss the expression of b0,0 according to the different values of m and Nmax.
1) \(\)\(N_{\max } \geq m\)
In this situation, the backoff window will remain at the maximum stage m for the last \(N_{\max }-m\) transmission attempts. Therefore, according to the above formulas and \(W_{i}=2^{i} W_{0}, i \in[0, m]\), we can derive that:
\(\begin{array}{l} 1=\sum_{i=0}^{N_{\max }} \sum_{k=0}^{W_{i}-1} b_{i, k} \\ 1=\frac{1}{p_{1}+p_{e c}} \sum_{i=0}^{N_{\max }} b_{i, 0} \sum_{k=0}^{W_{i}-1} \frac{W_{i}-k}{W_{i}} \\ =\frac{1}{p_{1}+p_{e c}}\left[\sum_{i=0}^{m-1} p_{2}^{i} b_{0,0}+\sum_{i=m}^{N_{\max }} \frac{p_{2}^{m}}{1-p_{2}} b_{0,0}\right] \frac{W_{i}+1}{2} \\ =\frac{b_{0,0}}{2\left(p_{1}+p_{e c}\right)}\left[W_{0} \sum_{i=0}^{m-1}\left(2 p_{2}\right)^{i}+\sum_{i=0}^{m-1} p_{2}^{i}+\sum_{i=m}^{N_{\max }} \frac{W_{0}\left(2 p_{2}\right)^{m}+p_{2}^{m}}{1-p_{2}}\right] \\ =\frac{b_{0,0}}{2\left(p_{1}+p_{e c}\right)}\left[\frac{W_{0}\left(1-\left(2 p_{2}\right)^{m}\right)}{1-2 p_{2}}+\frac{1-p_{2}^{m}}{1-p_{2}}+\frac{\left(N_{\max }-m\right)\left[W_{0}\left(2 p_{2}\right)^{m}+p_{2}^{m}\right]}{1-p_{2}}\right] \end{array}\) (14)
and then b0,0 is:
\(b_{0,0}=\frac{2\left(p_{1}+p_{e c}\right)\left(1-2 p_{2}\right)\left(1-p_{2}\right)}{W_{0}\left[\left(1-p_{2}\right)+\left[\left(1-2 p_{2}\right)\left(N_{\max }-m\right)-\left(1-p_{2}\right)\right] \cdot\left(2 p_{2}\right)^{m}\right]+\left(1-2 p_{2}\right)\left[1+\left(N_{\max }-m-1\right) p_{2}^{m}\right]}\) (15)
2) Nmax < m
In this circumstance, the maximum backoff stage m is actually unattainable because the predefined maximum retransmission number is only Nmax times. So (14) is changed as follows:
\(\begin{array}{c} 1=\sum_{i=0}^{N_{\text {ma }}} \sum_{k=0}^{W_{i}-1} b_{i, k} \\ 1=\frac{1}{p_{1}+p_{e c}} \sum_{i=0}^{N_{\text {max }}} b_{i, 0} \sum_{k=0}^{W_{i-1}} \frac{W_{i}-k}{W_{i}} \\ =\frac{b_{0,0}}{2\left(p_{1}+p_{e c}\right)}\left[\frac{W_{0}\left[1-\left(2 p_{2}\right)^{N_{\text {mat }}+1}\right]}{1-2 p_{2}}+\frac{1-p_{2}^{N_{\text {mat }}+1}}{1-p_{2}}\right] \end{array}\) (16)
then we can express b0,0 as: ( )( )( )
\(b_{0,0}=\frac{2\left(p_{1}+p_{e c}\right)\left(1-2 p_{2}\right)\left(1-p_{2}\right)}{W_{0}\left(1-p_{2}\right)\left[1-\left(2 p_{2}\right)^{N_{\max }+1}\right]+\left(1-2 p_{2}\right)\left(1-p_{2}^{N_{\max }+1}\right)}\) (17)
finally, b0,0 can be expressed as follows:
\(b_{0,0}=\left\{ \begin{array}{lc} \frac{2\left(p_{1}+p_{e c}\right)\left(1-2 p_{2}\right)\left(1-p_{2}\right)}{W_{0}\left(1-p_{2}\right)\left[1-\left(2 p_{2}\right)^{N_{\max }+1}\right]+\left(1-2 p_{2}\right)\left(1-p_{2}^{N_{\max }+1}\right)} \quad, N_{\max }<m \\ \frac{2\left(p_{1}+p_{e c}\right)\left(1-2 p_{2}\right)\left(1-p_{2}\right)}{W_{0}\left[\left(1-p_{2}\right)+\left[\left(1-2 p_{2}\right)\left(N_{\max }-m\right)-\left(1-p_{2}\right)\right] \cdot\left(2 p_{2}\right)^{m}\right]+\left(1-2 p_{2}\right)\left[1+\left(N_{\max }-m-1\right) p_{2}^{m}\right]}, N_{\max } \geq m \end{array} \right.\) (18)
From (18), we can directly observe that max max \(b_{0,0}^{N_{\max}\geq m} <b_{0,0}^{N_{\max }<m}\), which is consistent with the fact that the smaller the Nmax is predefined, the greater the probability that a relay transmits a new data packet will be. Moreover, it also provides a suggestion for predefining parameters that too big Nmax is not recommended because it will degrade the network performance.
Now, we can express the probability τ that a relay transmits packet at any time slot. We can rewrite (10) as follows by using ,\(\tau=\sum_{i=0}^{m} b_{i, 0}\) and \(\sum_{i=0}^{m} \sum_{j=1}^{W_{i}-1} b_{i, j}=1-\sum_{i=0}^{m} b_{i, 0}=1-\tau\) :
\(\left(1-p_{2}\right) \tau+p_{e c}(1-\tau)=b_{0,0}\) (19)
that is,
\(\tau=\frac{b_{0,0}-p_{e c}}{1-p_{2}-p_{e c}}\) (20)
by \(p_{1}+p_{2}+p_{e c}=1\), we have the final expression of τ as follows:
\(\tau=\frac{b_{0,0}-p_{e c}}{p_{1}}\) (21)
3.2 The Probabilities of System Performance
We can get the expressions of probability that reflect the system performance by using (21), which are important for analyzing system performance in section 4. We suppose that there are n active relays in the network. Therefore, the probability of idle in a given slot is:
\(p_{1}=(1-\tau)^{n-1}\) (22)
the probability that at least one of the relays attempts to transmit packet in a given slot, Ptr, can be expressed as:
\(P_{t r}=1-(1-\tau)^{n}\) (23)
and the probability of having a successful slot given that a station transmits, ps, is given by:
\(p_{s}=\frac{n \tau(1-\tau)^{n-1}}{P_{t r}}\)(24)
so, from the perspective of system, the probabilities of having an idle (PI), collided (PC), error (PE) or right (PR) slot can be written as:
\(P_{I}=1-P_{t r}=(1-\tau)^{n}\) (25)
\(P_{C}=P_{t r} \cdot\left(1-p_{s}\right)=1-(1-\tau)^{n}-n \tau(1-\tau)^{n-1}\) (26)
\(P_{E}=P_{t r} \cdot p_{s} \cdot p_{e}=n \tau(1-\tau)^{n-1} p_{e}\) (27)
\(P_{R}=P_{t r} \cdot p_{s} \cdot\left(1-p_{e}\right)=n \tau(1-\tau)^{n-1}\left(1-p_{e}\right)\) (28)
where pe is the PER. Because the use of HARQ with soft combining can improve the probability of D decoding the original packet correctly, so the probability of system having a successful slot, Ps, can be expressed as:
\(P_{S}=P_{R}+\alpha \cdot P_{E}=n \tau(1-\tau)^{n-1}[1+(\alpha-1)] p_{e}\) (29)
where α is a complex parameter associated with the encoding strategy, modulation scheme, etc. To simplicity, α is set as a constant in this paper. Using (29), pec can be calculated as: [ ] ( )
\(p_{e c}=(K \cdot E[X])^{-1}=\frac{P_{s}}{K}\) (30)
where K is the value representing the completion of a cooperation phase, i.e., D can decode the original packet after it receives K packet copies from R successfully, E[X] is the expectation that the relay dose not retransmit successfully until X times:
\(2E[X]=\sum_{x=1}^{\infty} x \cdot\left(1-P_{S}\right)^{x-1} \cdot P_{S}=P_{S}\left[-\frac{\partial}{\partial P_{S}} \sum_{x=1}^{\infty}\left(1-P_{S}\right)^{x}\right]=\frac{1}{P_{S}}\) (31)
and the collision probability p2 is:
\(p_{2}=1-p_{1}-p_{e c}=1-(1-\tau)^{n-1}-\frac{P_{s}}{K}\) (32)
4. Performance Analysis of The System
4.1 System Throughput
This paper denotes S as the normalized system throughput which is defined as the fraction of time that the channel is used to successfully transmit payload bits, that is:
\(S=\frac{E[\text { payload information transmitted in a slot time}]}{E[\text { length of a slot time}]}\) (33)
because the average payload information successfully transmitted in a time slot is \(P_{s} \cdot E[P]\) (E[P] is the average packet payload size). Using (25), (26) and (29), it holds that:
\(S=\frac{P_{S} \cdot E[P]}{P_{I} \cdot \sigma+P_{S} \cdot T_{S}+P_{C} \cdot T_{\text {Collision}}}\) (34)
where s is the duration of an empty time slot, TS is the average time a data packet is transmitted successfully, TCollision is the average time the channel is sensed busy by each station during a collision. It is worth noting that we ignore the decoding time of D and the values of TS and TCollision all depend on the access mechanism adopted by the relays, i.e., the basic access mechanism (BASIC) or the collision avoidance handshake RTS/CTS (COLAV), and they can be expressed as:
\(\left\{\begin{array}{l} T_{S \mid B A S I C}=T_{D I F S}+T_{D A T A} \\ T_{S \mid C O L A V}=T_{D I F S}+T_{R T S}+T_{S I F S}+T_{C T S}+T_{S I F S}+T_{D A T A} \end{array}\right.\) (35)
\(\left\{\begin{array}{l} T_{\text {Collision } \mid { BASIC }}=T_{D I F S}+T_{D A T A} \\ T_{\text {Collision }|C O L A V}=T_{D I F S}+T_{R T S}+T_{S I F S}+T_{C T S_{-} {TIMEOUT}} \end{array}\right.\) (36)
where TDIFS and TSIFS are the duration of DIFS and SIFS silence periods, respectively. TRTS and TCTS are the transmission time of RTS and CTS packets. TDATA is the duration of packet transmission. TCTS_TIMEOUT is the duration of transmission timer for CTS packet. We assume that it will be seen as a collision if the relays do not receive the corresponding CTS packet of the RTS packet within the specified time in the transmission timer.
4.2 The Average Packet Transmission Delay
In this paper, the average packet transmission delay of SPRCSMA is denoted by E[TCOOP], defined as the average duration of the first failed transmission plus the average time required to complete a successful cooperation phase given an average number of retransmission K . E[TCOOP] can be expressed as:
\(E\left[T_{\text {COOP }}\right]=E\left[T_{\text {min }}\right]+E\left[T_{\text {cont }}\right]\) (37)
where E[Tmin] is the expectation of the minimum packet transmission delay, which is unachievable because it is impossible to attain a perfect scheduling among all the active relays operating in DCF, that is, the contention among the active relays which will undoubtedly increase the average packet transmission delay, represented as E[Tcont], is unavoidable.
According to the basic rule of IEEE 802.11, the E[Tmin] can be calculated as follows:
\(E\left[T_{\min }\right]=T_{0}+T_{A F C}+K \cdot T_{D R}+T_{A C K}+4 T_{S I F S}\) (38)
where T0 is the duration of the first transmission from S to D . TAFC and TACK are the transmission time of the AFC and the ACK packet, respectively.
On the other hand, according to the contention time between packets is independent of each other, the value of E[Tcont] can be expressed as:
\(E\left[T_{c o n t}\right]=K \cdot E\left[T_{c}\right]\) (39)
where E[Tc] is the average contention time required to transmit a single packet among all relays. Based on (31), the average number of slots before having a successful transmission is E[X], from which we can derive that the average number of non-successful slots before having a successful transmission is E[X]-1. Therefore, the total contention time will be:
\(E\left[T_{c}\right]=(E[X]-1) E\left[T_{s l o t} \mid n o n-s u c c e s s f u l \ s l o t\right]\) (40)
where \(E\left[T_{\text {slot}} \mid \text {non-successful slot}\right]\) is the average duration of a slot given that the slot is not successful. As discussed in section 3.2, a given slot will be seen as failed with the probability \(P_{I} \text { (idle) },(1-\alpha) P_{E}\) (receiving an error copy) and PC (suffering a collision). Applying Bayes’ theorem, the average duration of any slot is considered as failed can be expressed as:
\(E\left[T_{s l o t} \mid \text { non }-\text { successful slot }\right]=\left(\frac{P_{I}}{1-P_{S}}\right) \sigma+\left(\frac{(1-\alpha) P_{E}}{1-P_{S}}\right) T_{S}+\left(\frac{P_{C}}{1-P_{S}}\right) T_{\text {collision}}\) (41)
Therefore, the average total contention time can be rewritten as:
\(E\left[T_{c o n t}\right]=K\left(\frac{1}{P_{s}}-1\right)\left[\left(\frac{P_{I}}{1-P_{S}}\right) \sigma+\left(\frac{(1-\alpha) P_{E}}{1-P_{S}}\right) T_{S}+\left(\frac{P_{C}}{1-P_{S}}\right) T_{\text {collision }}\right]\) (42)
finally, \(E\left[T_{C O O P}\right]\) can be obtained by substituting (42) and (38) into (37).
5. System Performance Evaluation
The configuration parameters of the stations in the network are shown in Table 1. Here, we assume that all packets have the same fixed size, i.e., E[P]=P. Moreover, to study the effect of transmission rate on network performance, packet transmissions are performed at four transmission rates, referred to as the source/relay control_rate and source/relay data_rate respectively and are specified in Table 2.
Table 1. System parameters
Table 2. Sets of transmission rates (Mbps)
5.1 Case 1: Delay Comparison under Different Transmission Rates
This case is configured with the following parameters: \(W_{0}=16, n=10, m=5, N_{\max }=3\) and the basic access method. The average packet transmission delay is illustrated in Fig. 6a and Fig. 6b as a function of K under different sets of transmission rates.
Fig. 6. Average delay vs. transmission rate
As it could be expected, the retransmission of the non-cooperation ARQ is only performed by S because the relays have not been involved in, benefitting the continuous retransmission without contention and making the ratio between the source data_rate and the relay data_rate determines how efficient the SPRCSMA protocol is in comparison to non-cooperation ARQ. For instance, in the case of using the transmission rate set 1-54 in Fig. 6a, the delay of the non-cooperation ARQ is linearly increased with the increase of K because the source data_rate is very low (only 1 Mbps), by contrast, a faster relay data_rate (54 Mbps) can greatly improve the efficiency of SPRCSMA protocol and make the corresponding average packet transmission delay increases slightly with the increase of K . However, in the case of using the transmission rate set 54-54 in Fig. 6b, the delay performance of the SPRCSMA is worse than that of the non-cooperation ARQ because the source data_rate is equal to the relay data_rate, making the SPRCSMA protocol not only lacks the advantage of high-speed retransmission rates from relays, but also needs some extra time to coordinate the contention between relays.
It could be found that the SPRCSMA protocol will be particularly suitable for some long-distance communication scenarios where the destination locates far away from the transmitting station and the sender has to transmit packets at a low speed, significantly benefitting from the retransmission performed by relays and finally achieving diversity.
5.2 Case 2: Performance Comparison under Different K and n
The parameter configuration is same with case 1 and the transmission rate set is 30-54. The average packet transmission delay and the throughput are represented in Fig. 7 and Fig. 8 as a function of the number of active relays n for different values of K , respectively.
From Fig. 7, we can clearly observe that, as we expected, the more the retransmissions are required, the longer the average delay will be. This is because that the greater the K is, the longer the contention period among the relays and the larger the MAC overhead will be, which undoubtedly lead to longer delay. As for throughput, it can be observed from Fig. 8 that the larger the K is, the greater the throughput will be, which is consistent with the truth that the more the retransmissions are required, the more payload the relays will transmit, and the greater the throughput will be. So, we can summarize that K is proportional to both the average packet transmission delay and the throughput.
Fig. 7. Average delay vs. active relays( n )
Fig. 8. Throughput vs. active relays( n )
On the other hand, the average delay increases but the throughput decreases with the increase of n . This is because that the more the number of active relays are, the more contention among relays will be, undoubtedly resulting in longer delay and lower throughput. Moreover, irrespectively of the value of K , there always exists an optimum number of active relays noptimal = 2 which can minimize the average delay and maximize the throughput, giving advice for network deployment from the perspective of theoretical analysis. Actually, the value of noptimal also depends on the size of the initial backoff window W0.
5.3 Case 3: Performance Comparison under Different Sizes of W0
This case is configured with the following parameters: \(K=3, m=5, N_{\max }=3\), the transmission rate set 30-54 and the basic access method. For a given W0, the probability of collision increases as the number of relays. Therefore, if the value of W0 is too small for the number of relays, the higher probability of collision leads to the increase of the average delay and the decrease of throughput. On the other hand, if the value of W0 is larger, it will result in an unnecessary waste of time devoted to backoff deferral periods. In order to better demonstrate this assumption, the average packet transmission delay and the throughput for different sizes of W0 are depicted in Fig. 9 and Fig. 10 respectively, which completely confirms the correctness of our assumption that a smaller value of W0 yields better performance when the number of relays are low while larger values of W0 perform better as the number of relays increases. For example, both curves of W0=16 in Fig. 9 and Fig. 10 can achieve lower average delay and higher throughput in the case of a smaller number of active relays (n≤3), but as n increases, their network performance deteriorates significantly and gradually underperforms that of the curves W0 = 64.
Therefore, the optimum design of W0 becomes one of the key factors influencing system performance and we should choose a proper value of W0 as a function of n because a higher W wastes too much time devoted to backoff periods but a lower W0 increases the probability of collision. It is worth mentioning that under the circumstance of not being able to operate at the optimum value of W0 , it would be more recommended to use a higher value of W0 because the cost of a collision is much higher than that of some extra backoff slots no matter what access method is adopted.
Fig. 9. Average delay vs. W0
Fig. 10. Throughput vs. W0
5.4 Case 4: Performance Comparison under Different Access Methods
This case is configured with the following parameters: \(W_{0}=16, m=5, N_{\max }=3\) and the transmission rate set 30-54. We assume that the relays use either the BASIC method or the COLAV method, and the average packet transmission delay and the throughput are depicted in Fig. 11a and Fig. 11b as a function of n for different values of K , respectively.
From Fig. 11a and Fig. 11b, it is clear that the BASIC method has the better performance than the COLAV method both in the case of the average delay and the throughput, which is because that there is no hidden terminal in this considered scenario, but in reality, the COLAV method not only plays a positive role in preventing the hidden terminal, but also can restrict the collision of data packets in the control plane by transmitting the RTS and CTS frame.
So, we can summarize as follows: although the COLAV method degrades the performance gain because it brings an extra control information overhead to the system, it is widely used in various communication scenarios for its unique advantages. In the selection of specific access mechanism, we should make a concrete analysis according to the actual situation.
5.5 Case 5: The Contrast Experiment
The parameter configuration is same with case 2. For completeness, we compare the SPRCSMA protocol with the NCSW and PRCSMA protocol, the results of the average packet transmission delay and the throughput are plotted in Fig. 12a and Fig. 12b, respectively. Fig. 12a shows that the average packet transmission delay of NCSW protocol is significantly higher than that of the other two protocols, which is because that relays in this protocol perform retransmission according to the IEEE 802.11DCF and do not retransmit their packet copies in a persistent manner, i.e., D in NCSW protocol needs to give feedback to each copy received from R in the cooperation phase, spending time on exchanging control information (ACK, NACK, etc.) and waiting for the corresponding interframe space (SIFS). This performance difference becomes more and more obvious with the increase of K . On the other hand, since HARQ technology with soft combining can effectively improve the probability of D successfully decoding the original data packet, R in SPRCSMA protocol can take less time than PRCSMA protocol, which uses simple ARQ, to transmit K copies in the cooperation phase, i.e., SPRCSMA protocol can complete data retransmission faster, thus effectively reducing the average delay.
Fig. 11. The influence of different access mechanisms on
Similarly, as for throughput shown in Fig. 12b, since the use of persistent retransmission which can effectively reduce the transmission times of control information enables PRCSMA and SPRCSMA protocol to transmit more payload in a time slot, making the throughput of them outperforms that of NCSW protocol when the number of active relays is small (n≤4) and achieves the maximum value when the number of optimal relays noptimal = 2 is reached
It is worth noting that although this advantage no longer exists when n>4, this is because, as mentioned in the introduction, NCSW protocol does not consider the important contention process caused by cooperation between multiple relays, so its throughput remains unchanged after reaching the maximum, it is obviously contrary to the fact that the more the number of relays participating in cooperation phase, the more the collisions of relays accessing channels will be occurred in a distributed wireless network, degrading the system performance. It also fully proved that the contention process among multiple relays is a vital problem which can not be ignored in distributed wireless networks and the number of active relays is not the more the better, an inappropriate and larger n is bad for improving system performance, so the selection of noptimal is very important. On the other hand, although throughput is declining, it in SPRCSMA protocol does not decline as fast as PRCSMA protocol at the same PER (pe=0.1), which proves that SPRCSMA protocol can combat poor channel conditions better.
Fig. 12. The influence of different methods on
6. Conclusions
We have proposed a SPRCSMA protocol for distributed wireless networks, developed a two-dimensional DTMC analytical model for the contention process among multiple relays and calculated its steady-state distribution. The closed expressions of system performance including throughput and average packet transmission delay were obtained and simulation results were shown to validate the analysis model, to evaluate the impact of network parameters on system performance and to verify the superiority over the other two protocols. It can be concluded that the contention process in distributed multi-relay cooperative wireless networks cannot be ignored and there always exists an optimal number of relays in the network which can maximize the performance gain (i.e., the minimum average packet transmission delay and the maximum system throughput). Moreover, the size of the initial backoff window should be properly tuned as a function of the number of active relays for each cooperation phase to avoid either existence of a high probability of collision or wasted time due to deferral periods. Finally, the performance comparison with other two cooperative ARQ schemes (NCSW and PRCSMA) also proves the performance improvement of SPRCSMA, especially in the long-distance communication scenarios.
Therefore, it is still a challenging hot issue for future research to design an efficient cooperative MAC protocol that can optimize the contention problem in distributed multi-relay cooperative wireless network, such as the solution of the optimal relay number and the design of an adaptive backoff window cooperative ARQ scheme, etc.
References
- Sadeghi R, J. P. Barraca and R. L. Aguiar, "A survey on cooperative MAC protocols in IEEE 802.11 wireless networks," Wireless Personal Communications, vol. 95, no. 2, pp. 1469-1493, July, 2017. https://doi.org/10.1007/s11277-016-3861-0
- Ju Peijian, W. Song and D. Zhou, "Survey on cooperative medium access control protocols," IET Communications, vol. 7, no. 9, pp. 893-902, August, 2013. https://doi.org/10.1049/iet-com.2012.0739
- A. Meier and J. S. Thompson, "Cooperative diversity in wireless networks," in Proc. of 6th IEE Conf. on 3G and Beyond, pp.35-39, November 7-9, 2005.
- Cetinkaya C and F. Orsun, "Cooperative medium access protocol for dense wireless networks," in Proc. of the third annual Mediterranean ad hoc networking workshop-Med Hoc Net, 2004.
- Sai Shankar N and C. T. Chou et al., "Cooperative communication MAC (CMAC)-a new MAC protocol for next generation wireless LANs," in Proc. of International Conference on Wireless Networks, Communication and Mobile Computing, IEEE, pp. 1-6, December, 2005.
- Dianati M, Ling X and Naik K et al., "A node-cooperative ARQ scheme for wireless ad hoc networks," IEEE Transactions on Vehicular Technology, vol. 55, no. 3, pp. 1032-1044, May, 2006. https://doi.org/10.1109/TVT.2005.863426
- Liu P and Tao Z et al., "CoopMAC: a cooperative MAC for wireless LANs," IEEE Journal on Selected Areas in Communications, vol. 25, no. 2, pp. 340-354, February, 2007. https://doi.org/10.1109/JSAC.2007.070210
- Alonso-Zarate J, Kartsakli E and Verikoukis C et al., "Persistent RCSMA: A MAC protocol for a distributed cooperative ARQ scheme in wireless networks," Eurasip Journal on Advances in Signal Processing, vol. 2008, no. 1, pp. 1-13, December, 2008.
- Alonso-Zarate J, Alonso L and Verikoukis C, "Performance analysis of a persistent relay carrier sensing multiple access protocol," IEEE Transactions on Wireless Communications, vol. 8, no. 12, pp. 5827-5831, December, 2009. https://doi.org/10.1109/TWC.2009.12.090707
- Hu Z and Tham C K, "CCMAC: Coordinated cooperative MAC for wireless LANs," Computer Networks, vol. 54, no. 4, pp. 618-630, March, 2010. https://doi.org/10.1016/j.comnet.2010.02.001
- Nischal S and V. Sharma, "A cooperative ARQ scheme for infrastructure WLANs," in Proc. of IEEE Wireless Communications & Networking Conference, pp. 428-433, April, 2013.
- Lee Jong Kwan, H. J. Noh and J. Lim, "TDMA-based cooperative MAC protocol for multi-hop relaying networks," IEEE Communications Letters, vol. 18, no. 3, pp. 435-438, April, 2014. https://doi.org/10.1109/LCOMM.2014.011314.132095
- Liu K and Chang X Y et al., "A cooperative MAC protocol with rapid relay selection for wireless ad hoc networks," Computer Networks, vol. 91, pp. 262-282, November, 2015. https://doi.org/10.1016/j.comnet.2015.08.020
- Mahmud Md. Tareq et al., "Distance-aware data rate adaptive cooperative MAC protocol for wireless networks," in Proc. of International Conference on Electronic Design, IEEE, pp. 185-190, August, 2016.
- Zhang X, Guo L and Anpalagan A et al., "Performance of energy-efficient cooperative MAC protocol with power backoff in MANETs," Wireless Personal Communications, vol. 92, no. 3, pp. 843-861, February, 2017. https://doi.org/10.1007/s11277-016-3580-6
- AlonsoZarate J, Gomez J and Verikoukis C et al., "Performance evaluation of a cooperative scheme for wireless networks," in Proc. of IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, pp. 1-5, September, 2006.
- Wu H, Peng Y and Long K et al., "Performance of reliable transport protocol over IEEE 802.11 wireless LAN: analysis and enhancement," in Proc. of Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE, vol.2, pp. 599-607, 2002.
- Wu, Peng and N. Jindal, "Performance of hybrid-ARQ in block-fading channels: A fixed outage probability analysis," IEEE Transactions on Communications, vol. 58, no. 4, pp. 1129-1141, April, 2010. https://doi.org/10.1109/TCOMM.2010.04.080622
- Chiti Francesco and R. Fantacci, "A soft combining hybrid-ARQ technique applied to throughput maximization within 3G satellite IP networks," IEEE Transactions on Vehicular Technology, vol. 56, no. 2, pp. 594-604, March, 2007. https://doi.org/10.1109/TVT.2007.891483
- Holland I. D., H. J. Zepernick and M. Caldera, "Soft combining for hybrid ARQ," Electronics Letters, vol. 41, no. 22, pp. 1230-1231, October, 2005. https://doi.org/10.1049/el:20052614