Next Article in Journal
Improvement of Performance Degradation in Synthetic Aperture Extension of Enhanced Axial Resolution Ultrasound Imaging Based on Frequency Sweep
Previous Article in Journal
Periodic Nonlinear Error Analysis and Compensation of a Single-Excited Petal-Shaped Capacitive Encoder to Achieve High-Accuracy Measurement
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Full-Duplex MAC Protocol for CSMA/CA-Based Single-Hop Wireless Networks

1
Information and Communications College, National University of Defense Technology (NUDT), Xi’an 710106, China
2
National Mobile Communications Research Laboratory, Southeast University, Nanjing 210007, China
3
State key Laboratory Services Networks, Xidian University, Xi’an 710071, China
*
Author to whom correspondence should be addressed.
Submission received: 21 March 2019 / Revised: 16 May 2019 / Accepted: 22 May 2019 / Published: 27 May 2019
(This article belongs to the Section Sensor Networks)

Abstract

:
Full-duplex (FD) communication provides new opportunities for improving the throughputs of networks. However, this condition means that the number of senders increases from one to two within a certain range. We have to arrange the two nodes to send frames simultaneously in the media access control (MAC) layer. For the single-hop network model, using the FD features of the nodes and the cut-through mechanism, we propose an FD MAC protocol. The protocol improves the throughput of the network from the following two aspects. On the one hand, during the transmission of each node, based on the information of the received frame’s header, the protocol can detect collisions in the network, preventing the channel from being ineffectively occupied for a long time. On the other hand, the protocol can provide the FD with as many opportunities as possible for the nodes. According to the working process of the protocol, we modeled the states (“active” and “passive” transmission, back-off) of each node and their transitions to a Markov chain. We solved the “active” transmission probability of the node and further modeled the analytical performance of the protocol. The simulation results showed that the system throughput produced by our protocol was at least twice that of the conventional CSMA/CA protocol used in the half-duplex networks.

1. Introduction

Recently, with the progress in self-interference (SI) cancellation techniques, the desired reception signals of wireless nodes are no longer overwhelmed by the interference signals produced by the nodes themselves [1]. They can simultaneously transmit and receive using the same frequency band. In the physical layer, the throughput of a node working in the full-duplex (FD) mode is twice that in the half-duplex (HD) mode. It is clear that the FD mode provides new opportunities for improving the throughputs.
It has been noted that the nodes generally share the communication medium and work in a distributed manner. The traditional carrier sensing multiple access/collision avoidance (CSMA/CA) protocol has proven to be an effective media access control (MAC) protocol for the nodes to contend for the channel. Intuitively, for backward compatibility, we should apply it to the FD networks. However, FD communication means that the number of senders increases from one to two within a certain range. Originally, we only need to determine the transmission timing of one node, but now, we have to arrange two nodes to send frames simultaneously. Before sending a frame, the protocol requires that each node should sense the channel first. If it is busy, then the node cannot send the frame. In other words, when a node transmits the signal, it does not allow its neighbors to access the channel (one of them may be its FD peer). Thus, the protocol cannot adapt to the FD communication directly.
Based on the CSMA/CA protocol [2], for the single-hop network model, the following studies have proposed some effective FD MAC protocols. The protocols proposed in [3,4] used the FD feature to increase their system throughputs. They extended the analytical model proposed in [2], and analyzed the collision probability of the FD node. Moreover, they fully considered the detection errors caused by the SI signal. In the HD networks, if more than one node sends frames, then the collision must occur. However, in the FD networks, when two nodes send frames simultaneously, the collision may not occur. For example, if they send the frames for each other, then both frames can be received correctly. Unfortunately, the collision probabilities solved in these protocols do not consider the actual communication mode. More importantly, they did not provide any mechanisms to coordinate the nodes to work in the FD modes. The authors in [5] extended the structures and semantics of the control frames Request-to-Send/Clear-to-Send (RTS/CTS). In addition to avoiding the transmission interferences, they can also initiate the FD communication between the nodes. However, at an idle time slot, the authors specified the transmission probability of each node and ignored that the new state transition caused by the FD communication may change its value. The protocol proposed in [6] has a similar problem.
In this paper, for this network model, we proposed an FD MAC protocol for the network layer to fully benefit from the FD mode. By using the FD features of the nodes and the cut-through mechanism, we reduced the channel access time wasted by the collisions and increased the FD opportunities in the network. The main contributions of the protocol are as follows:
First, we summarized the three scenarios where the frames are sent by the nodes in the network. We further discussed the protocol design requirements for each scenario.
Second, we provided the specific working process description of the protocol. After reading the information of the received frame’s header, the node can determine whether collisions exist and whether it can communicate with other nodes in the FD mode.
Third, we formulated the analytical model of the protocol. With reference to [2,7], we modeled the states (“active” and “passive” transmission, back-off) of each node and their transitions to a Markov chain. We solved the “active” transmission probability of the node and further solved the normalized throughput of the network.
Finally, we analyzed the throughput produced by our protocol in the numerical simulation. We also compared it with those of the CSMA/CA protocol used in the HD networks and an existing typical FD MAC protocol.
The rest of this paper is organized as follows. Section 2 builds up the system model. Section 3 describes the specific working process of the proposed FD MAC protocol and gives its analytical performance. Section 4 simulates and evaluates our protocol. Section 5 concludes the paper.

2. System Model

We assumed that there are n nodes in the network that all have FD capability and adopt the CSMA/CA mechanism to contend for the channel. Each node maintains n−1 frame sending queues for the other nodes and these queues are always non-empty. Each node can successfully receive signals from any of the other n−1 nodes, but it cannot simultaneously receive two or more signals from the others. This model is the single-hop network model, where no hidden terminal problems exist. For simplicity, we did not require the contention windows of the nodes to increase as the numbers of their transmission collisions increased. The contention windows of the nodes were all set to a constant value (denoted by W). If the node obtained a channel access opportunity, then it randomly selected one of the n−1 other nodes to send a frame. Here, the scheduling fairness [8] and routing protocol [9] were not considered. We assumed that no errors occurred in the frame transmission and each node could reduce the SI strength below the background noise. We did not discuss the interference cancellation in the physical layer [10]. The SI did not affect its own receiving or sensing. The frames sent by the nodes had the same size and were all composed of a header (abbreviated as “Hdr”) and a payload (abbreviated as “Pyl”). Their sizes and transmission times were denoted by LHdr (LPyl) and THdr (TPyl), respectively. The semantic and size of each field of the frames were consistent with those used in the HD networks. When the node received a frame, we assumed that it could decode the frame’s header independently. This mechanism is called the cut-through [11], which is commonly used to fast-forward the frame (link layer) or packet (network layer).

3. Proposed FD MAC Protocol

According to the model above, in the HD networks, if more than one node sends signals, then collisions will occur. However, in the FD networks, two nodes are allowed to transmit signals simultaneously. Moreover, if two nodes in the network send the frames for each other, then the system throughput is twice that of the two nodes working in the HD mode. Hence, the proposed FD MAC protocol needs to increase this opportunity.

3.1. Three Scenarios for the Protocol

The three scenarios where the frames are sent by the n nodes and their corresponding protocol design requirements are discussed as follows:
First, when only one sender sends the frame, the receiver can receive the frame in the HD mode correctly. No collisions will occur. However, to increase channel utilization, we should require the receiver to send a “reverse” frame to the sender at an appropriate time. Second, when three or more senders send their frames simultaneously, any node in the network will receive the transmitted signals from at least two other nodes. Regardless of how the protocol is designed, the collisions must occur. What is needed is to minimize the channel access time wasted by the collisions. Finally, when exactly two senders (A and B) send the frames simultaneously, they have the following four communication modes (Figure 1):
In Figure 1, the dashed line represents the interference signal, and the solid line represents the desired signal. As shown in Figure 1a, when the two nodes (A and B) send the frames for each other, the two frames can be received correctly. When only one of the two nodes sends the frame to the other side, as shown in Figure 1b, only one node (B) can receive the frame correctly. When the two nodes send the frames for the same node or for the other two nodes, as shown in Figure 1c,d, respectively, the two transmissions will interfere with each other and no receiver can receive the frame correctly. To this end, the protocol design can be divided into two cases. First, for the communication mode as shown in Figure 1a, we do not need to adjust the FD communication currently in progress. Second, note that the other communication modes either fail to exert the FD capabilities of the nodes (Figure 1b) or fail to produce effective throughput in the network (Figure 1c,d). Therefore, at an appropriate time, we should adjust them to the mode in which the two nodes send the frames for each other. For this problem, the MAC protocol proposed in [5] adds an “octal” field to the original RTS frame structure. The content of this field is a random number, which is used to compute a priority with the MAC address of the current node. When two nodes send the request frames simultaneously, the protocol can specify the FD communication according to this priority.

3.2. Protocol Description

In order to meet the protocol design requirements above, we describe the specific working process of the proposed FD MAC protocol in this section. We assumed that A obtains a channel access opportunity and selects B as the destination node to send a frame. During the transmission of the frame’s header, A always senses the channel to observe whether other transmitted signals exist. We discuss three possible conditions as follows:
First, A does not sense any signals. This condition means that no other nodes simultaneously send the frame’s header with A. For A, it only needs to continue sending the frame’s payload. For B, the protocol requires it to read the address of A in the received frame’s header and send a “reverse” frame to it. The transmission of the frame is “passive”. Many studies such as in [6,12] refer to it as the second transmission (ST). In contrast, when the back-off count of the node is reduced to zero, the “active” transmission of the frame is called the first transmission (FT). This communication mode (denoted by FD_1) is shown in Figure 2:
After B sends it over, it should move to the back-off states. Note that it can return to the original back-off count or reselect a back-off count. Currently, the MAC protocol standard for the FD communication does not clarify this problem. The FD MAC protocols proposed in recent years (e.g., [13,14]) basically consider the latter more reasonable. Thus, our protocol follows this mechanism.
Second, A senses the signals sent by the other nodes, but it cannot decode it. This condition means that at least two other nodes simultaneously send the frames’ headers with A. Note that these nodes also cannot decode any signals. The protocol requires all of them to terminate the transmissions of their frames’ payloads and move to the back-off states directly. In this case, no effective throughput exists in the network.
Third, A senses the signals sent by other nodes, and it can decode it. This condition means that only one node sends the frame’s header with A simultaneously. If the frame exactly comes from B and its destination is A (the information obtained by B is consistent with this), then A and B only need to continue the transmissions of their frames’ payloads. This communication mode (denoted by FD_2) is shown in Figure 3:
Otherwise, A and this node (assuming it to be C) must communicate in one of the three modes as shown in Figure 1b–d. Here, the protocol can operate in two different methods. One method is that the protocol may require A and C to terminate the transmissions of the current frames and then send the new frames for each other [5]. That is, they re-conduct an FD transmission. This communication mode is shown in Figure 4:
The other method is that the protocol may require A and C to perform priority operations based on their addresses (or other metrics) (assuming the results of the two operations are consistent), to determine the node that can access the channel. If A has a higher access priority than C, then C moves to the back-off states directly and A sends the frame to B again. Subsequently, similar to the first case, B reads the MAC address from the frame’s header and then initiates the “passive” transmission. This communication mode is shown in Figure 5:
Clearly, this protocol operating method ensures that one of the two originally initiated transmissions can be implemented during the current contention period. Thus, we adopted this method. The communication mode is denoted by FD_3.

3.3. Modeling and Analyzing the Performance of the Proposed Protocol

According to the above protocol description, each node actually has a finite number of states. Moreover, each state is only related to the previous one. Hence, referring to the method in [2], we used a discrete Markov chain to model the states of each node and their transitions. After solving the steady states of the Markov chain, we further modeled the analytical performance of the protocol.
As a comparison, we first provide the state transition diagram of the HD node in the network [7], as follows:
In Figure 6, S1SW−1 denote the back-off states, and T (also can be regarded as S0) denotes the transmission state. According to the CSMA mechanism, if the node senses that the channel is idle at the t−1 time slot, then it will reduce the back-off count at the t time slot. Otherwise, the back-off count remains unchanged. The actual time interval between the two consecutive back-off counts may be the length of a slot time (denoted by σ) or the length of the time required for a frame transmission. Let t→∞, [7] solves the steady probability of the node in the T state (we used πT to denote its probability, similarly hereinafter). That is, at any time slot, the transmission probability of the node is as follows:
π T = 2 W + 1 .
In the HD networks, when two or more nodes in the T state are present at a time slot, the collisions will occur. Pcol(HD) denotes the collision probability. We also denote this using Tcol(HD), the length of the time wasted by the collision. According to the value of πT, without using or using the control frames, [2] solves the system normalized throughputs in both cases, denoted by ThHD(basic) and ThHD(RTS), respectively. In the physical sense, the throughput can be obtained from dividing the total number of the transmitted bits in a time interval (denoted by Ltol; here “tol” is short for “total”) by the average length of the time interval (denoted by Lave; here “ave” is short for “average”).
Then, we give the state transition diagram of the FD node in the network, as shown in Figure 7:
Note that each node has two transmission states (“active” and “passive”), which are denoted by T1 and T2, respectively. Here, the node can jump directly from the back-off states to the transmission state with probability β. Let t→∞, because α + β = 1, the steady probability of each state of the Markov chain in Figure 7 satisfies Equations (2) and (3).
π S i = α π S i + 1 + 1 W ( π T 1 + π T 2 ) , i = 0 , , W 2 ,
where πS0 = πT1. For the last back-off state, we have:
π S i = 1 W ( π T 1 + π T 2 ) , i = W 1 .
For πT2, we have:
π T 2 = β i = 1 W 1 π S i .
By Equations (2) and (3), the iterative expressions among each πSi(i = 1, …, W − 1) can be obtained as follows:
π S i = 1 1 + α π S i 1 , i = W 1 ,
π S i = ( 1 α W i k = 0 W i α k ) π S i 1 , i = 1 , , W 2 .
According to the protocol description in Section 3.2, if only two nodes communicate in the FD_1 or FD_3 mode, then one of them can jump from the back-off states to the T2 state. In the FD_1 mode, the probability (denoted by β1) can be obtained as follows:
β 1 = ( n 1 1 ) π T 1 ( 1 π T 1 ) n 2 1 n 1 ,
where the ( n 1 1 ) π T 1 ( 1 π T 1 ) n 2 term represents the probability that only one other node (excluding the current node) in the network “actively” sends a frame, and the 1 n 1 term represents the probability that the destination address of the frame is the current node. In the FD_3 mode, the solution of this probability (denoted by β2) needs to be discussed according to the communication mode of the two nodes. Basically, we can obtain the probability that they simultaneously send the frames, as follows:
β 2 ( b a s i c ) = ( n 1 2 ) π T 1 2 ( 1 π T 1 ) n 3 .
First, in the mode as shown in Figure 1a, the two nodes initiate the transmission actively. We have β2(1) = 0. Second, in the mode as shown in Figure 1b, we can obtain β2(2) as follows:
β 2 ( 2 ) = β 2 ( b a s i c ) 2 ( n 2 n 1 1 n 1 ) 1 2 ( 1 n 2 ) ,
where the 2 ( n 2 n 1 1 n 1 ) term represents the probability that the two nodes communicate in this mode, and the 1 2 ( 1 n 2 ) term represents the probability that one of the two nodes obtains the transmission opportunity and selects the current node as the destination. Third, in the mode as shown in Figure 1c, we can obtain β2(3) as follows:
β 2 ( 3 ) = β 2 ( b a s i c ) ( n 2 n 1 1 n 1 ) ( 1 n 2 ) ,
where the ( n 2 n 1 1 n 1 ) term represents the probability that the two nodes communicate in this mode, and the ( 1 n 2 ) term represents the probability that the current node is selected as the destination by the two nodes. Four, in the mode as shown in Figure 1d, we can obtain β2(4) as follows:
β 2 ( 4 ) = β 2 ( b a s i c ) ( n 2 n 1 n 3 n 1 ) 1 2 ( 1 n 2 ) ,
where the ( n 2 n 1 n 3 n 1 ) term represents the probability that the two nodes communicate in this mode, and the meaning of the 1 2 ( 1 n 2 ) term is consistent with the corresponding term in β2(2). Furthermore, we can obtain β2 as follows:
β 2 = i = 1 4 β 2 ( i ) .
Given that the node executes the “passive” transmission in the T2 state, according to the network model, it will not collide with others. When solving the collision probability of the network, we did not consider the probability that the node was in this state. Finally, we have the normalized condition for the probabilities of these states, as follows:
π T 1 + i = 1 W 1 π S i + π T 2 = 1 .
According to Equations (5) and (6), the probability of each state can be converted to the expression of πT1. When the values of n and W are given, the value of πT1 can be solved by Algorithm 1. Here, we used τ to denote πT1.
 Algorithm 1. Solving the πT1 of each node
 Require:
  The values of n and W;
 Initialize i = 0.0001;
 while τ ≤ 1 do
  β = τ(1 − τ)n−2; // here we use the expression of β1,
        also we can use that of β2
  α = 1 − β;
  g(1) = 1 + α, f(1) = 1/g(1);
  for i = 2; I ≤ W − 1; i++ do
    g(i) = g(i − 1) + αi;
    f(i) = αi/g(i);
  end for
  πS1 = (1 − f(W − 1))τ;
  for i = 2; IW − 1; i++ do
    πSi = (1 − f(Wi))πSi−1;
  end for
  X = (1 + β)sum{πSi}|iϵ(1,W−1),iϵZ + τ;
  if X − 1 < δ then
    break;
  end if
  τ = τ + 0.0001;
 end while
Then, based on the value of πT1, we can solve the system normalized throughput (denoted by ThFD). At a time slot, 0, 1, 2, or more nodes may send frames. For different cases, the behaviors of the nodes and channel access times they occupy are different. To solve the average length of the time interval between the two consecutive back-off counts of the node, we need to analyze these cases respectively.
First, the probability that no node “actively” sends the frame (denoted by Pidle) is as follows:
P i d l e = ( 1 π T 1 ) n .
The channel access time occupied by this case is exactly the length of a time slot (σ). Second, the probability that only one node “actively” sends the frame (denoted by Psgl; here “sgl” is short for “single”) is as follows:
P s g l = ( n 1 ) π T 1 ( 1 π T 1 ) n 1 .
In this case, the destination node will send a “reverse” frame after receiving the frame’s header. As shown in Figure 2, the corresponding channel access time is as follows (we ignored the propagation time of the signal, similarly hereinafter):
Tsgl = DIFS + THdr + THdr + TPyl + SIFS + TAck.
Third, the probability that two nodes “actively” send the frames simultaneously (denoted by Pdbl; here “dbl” is short for “double”) is as follows:
P d b l = ( n 2 ) π T 1 2 ( 1 π T 1 ) n 2 ,
where the probability that the two are mutual destinations (denoted by Pbi, here “bi” is short for “bidirectional”) is as follows:
P b i = P d b l ( 1 n 1 ) 2 .
As shown in Figure 3, the channel access time occupied by this case (denoted by Tbi) is as follows:
Tbi = DIFS + THdr + TPyl + SIFS + TAck.
Moreover, the probability that the nodes communicate in the FD_3 mode is as follows:
Pnon-bi = PdblPbi.
The channel access time occupied by this case (denoted by Tnon-bi) is as follows:
Tnon-bi = Tsgl + SIFS + THdr.
When more than two nodes “actively” send the frames simultaneously, the collisions will occur. The probability (denoted by Pcol(FD)) is as follows:
Pcol(FD) = 1 − PidlePsglPdbl.
Given that the collisions only waste the transmission time of a frame’s header, the channel access time occupied by this case (denoted by Tcol(FD)) is as follows:
Tcol(FD) = DIFS + THdr.
Furthermore, the average length of the time interval can be obtained as follows:
T a v e = P i d l e σ + P c o l ( F D ) T c o l ( F D ) + P s g l T s g l + P b i T b i + P n o n b i T n o n b i .
Moreover, the total number of the transmitted bits in a time interval can be obtained as follows:
L t o l = 2 × ( P s g l + P d b l ) ( L H d r + L P y l ) .
Note that the length of the whole frame is considered in the solution of Ltol. The subsequent numerical simulations for ThHD(Basic) and ThHD(RTS) are also based on this criterion.
Finally, the system normalized throughput can be obtained as follows:
T h F D = L t o l T a v e .
Note that we focused on the system throughput that could be achieved under the saturated flow. This performance metric can be directly converted to the transmission delay.

4. Numerical Simulation and Analysis

According to the discussion in Section 3.1, when each node in the network works in the FD and HD modes (the former adopts the proposed FD MAC protocol, and the latter adopts the traditional CSMA/CA protocol), we use different values of n and W.
The values of πT1 and πT are shown in Figure 8.
As shown in Figure 8, in general, the largest difference between the values of πT and πT1 (in n = 5 and W = 64 case) was about 20%. As the size of W increased, both the values of πT1 and πT decreased because after a node sends the frame over, regardless of whether the transmission is successful, it will randomly select a back-off count in the contention window and enter the corresponding back-off state. According to the state transition diagrams as shown in Figure 6 and Figure 7, if the size of W increases, then the optional number of the back-off counts will increase and the node may select a larger back-off count. At this time, the “way” from the back-off states to the transmission state becomes longer. In other words, the probability that originally belongs to the transmission state is allocated to the back-off states. For the HD node, according to Equation (1), the value of πT is independent of n. However, for the FD node, when the size of W remains unchanged, the value of πT1 will increase as n increases. We used the W = 8 case for example. When n = 5, we have πT1 = 0.1768, but when n = 10, we have πT1 = 0.2005. This condition occurs because, according to the system model, the node which “actively” sends the frame randomly selects its destination among all the other nodes. Then, the two nodes communicate in FD_1 or FD_3 mode. At this time, a node will be present in the T2 state. According to Equations (7)–(11), if the value of n increases, then the probability (β1 and β2) that the node is selected as the destination will decrease. Furthermore, the node will be less likely in the T2 state (in the simulation, when n = 5, we have πT2 = 0.089, but when n = 10, we have πT2 = 0.0409) and more likely in the T1 state. Note that when n increases to a large value, the probability that the node is in the T2 state is very small. The value of πT1 approaches πT. In the simulation, when n = 30, the value of β (β1 + β2) equaled 6.17 × 10−4. Accordingly, the value of πT2 was only 4.8 × 10−4. When the size of W is large, although the value of β will decrease as n increases, given the probability that the node is in the back-off states increases and πT2 can be solved by β multiplying the sum of πSi(i = 1, …, W − 1), both the values of πT2 and the difference between πT1 and πT will increase.
When the communication modes as shown in Figure 1b–d appear in the network, if the protocol operates as shown in Figure 4, then neither of the two nodes initiates “passive” transmission, β2 does not exist, and β = β1. In fact, we lose the probability that the node jumps from the back-off states to the T2 state. The value of πT2 will decrease. Hence, the values of πT1 in such cases are slightly larger than those shown in Figure 8. In the simulation, when n = 5 and W = 8, here πT1 = 0.1841, but in the above case, πT1 = 0.1768. When we keep the value of W unchanged and only increase the value of n, the value of πT1 in such cases will be closer to πT. For simplicity, we did not provide a comparison of the values of πT1 in the two cases in detail.
The values of the parameters used in the simulation are shown in Table 1, which are consistent with those used in [2]. LRTS, LCTS, and LAck denote the size of the RTS, CTS, and Ack frames, respectively. The first two are used in the traditional CSMA/CA protocol.
Subsequently, in Figure 9, we provided the numerical simulations for the performance of our proposed FD MAC protocol and compared it with that of the CSMA/CA protocol traditionally applied to the HD networks.
In general, regardless of the values of n and W, compared with the traditional CSMA/CA protocol, our protocol can significantly (at least twice) increase the system throughput. Basically, at a time slot, the “active” transmission probabilities of the nodes for the two protocols are similar. When only one node “actively” sends the frame, the latter produces twice as much throughput as the former. Furthermore, when two nodes “actively” send the frames, according to the traditional CSMA/CA protocol, a collision will occur. However, our protocol can coordinate the FD communication. For the proposed FD MAC protocol, we further discuss two details. First, as shown by the ThFD curve in Figure 9, when n = 5 and W > 40, the value of ThFD will decrease as W increases because when the size of W is large, the probability that each node is in the T1 state is low. If we have only a small value of n, then the network is more likely in the idle state. For example, when n = 5 and W = 64, the sum of Psgl and Pdbl is only 0.1156, while Pidle = 0.8843. Although the value of Tidle is much smaller than the transmission time of the frames, according to Equation (26), the larger Pidle and smaller Psgl and Pdbl will also reduce the system throughput. Second, when the value of n is large and the size of W is small, the value of ThFD is low. This is because in these cases, contrary to the above, the network is more likely to be in the collision state. For example, when n = 30 and W = 8, we have Pcol(FD) = 0.9759, and the transmission collisions in the network waste considerable channel access time. Given that Pcol(FD) < Pcol(HD), this problem is more prominent in the traditional CSMA/CA protocol. In this case, the value of ThHD(basic) is close to 0. Note that when the protocol uses the RTS/CTS mechanism, the system throughput will be significantly increased because although this mechanism cannot change the value of Pcol(HD), it can reduce the channel access time wasted by the collisions from THdr + TPyl to TRTS.
Furthermore, in Figure 10, we kept the contention window of the nodes unchanged and compared the throughput produced through our protocol and that in [5] (denoted by ThFD(basic)) versus the different value of n. Here we assumed that W = 32. When W takes on other values, we have similar conclusions.
In [5], the contention mechanism of the nodes is p-persistent CSMA, where p is considered to be the “active” transmission probability at each time slot. Briefly speaking, when a node senses that the channel is idle, at the first time slot, it sends the frame with probability p. Even if it does not send the frame at this slot (with probability 1–p), the probability that it sends at the second time slot is still p, and so on. The nodes have no contention windows. Note that the value of p needs to be given in advance and it is difficult for each node to adjust this value adaptively. If the value of p is too small, then the channel cannot be fully utilized. If it is set at a too large value, then the number of collisions among the nodes will increase, resulting in reduced system throughput. As shown in Figure 10, when we set the value of p to 0.1, 0.2, and 0.3, respectively, ([5] sets this value to 0.2), ThFD(basic) is reduced when compared with that of our protocol. Moreover, as n increased, the decrease of ThFD(basic) will accelerate with the increase of the p value. When p is set to 0.2 or 0.3, as n increases to a certain extent (35 or 20 in Figure 10), ThFD(basic) is even lower than ThHD(RTS). We believe that the question of how to set an appropriate value of p is a key issue for this kind of work.

5. Conclusions

In single-hop wireless networks, using the FD features of the nodes can detect collisions while they are transmitting signals. The FD communication mode can improve the system throughput. In addition, the cut-through mechanism enables the nodes to decode the received frame’s header independently. Based on these three aspects, a MAC protocol was designed to reduce the collision occupancy time and increase the FD opportunities in the network. To ensure backward compatibility, the protocol requires the nodes to contend for the channel using the traditional CSMA/CA mechanisms. According to the working process, we modeled the states of each node and their transitions to a Markov chain. By solving the “active” transmission probability of the node, we obtained the analytical performance of the protocol. Simulation results showed that the system throughput produced by our protocol was at least twice that of the traditional CSMA/CA protocol used in the HD networks.

Author Contributions

Conceptualization, Y.S.; Data curation, Y.S.; Formal analysis, Y.S. and W.C.; Resources, W.Z.; Supervision, W.Q.; Validation, Y.S.

Funding

This research was funded in part by the National Natural Science Foundation of China (Nos. 61771368, 61871387).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Sabharwal, A.; Schniter, P.; Guo, D.; Bliss, D.W.; Rangarajan, S.; Wichman, R. In-band full-duplex wireless: Challenges and opportunities. IEEE J. Sel. Areas Commun. 2014, 32, 1637–1652. [Google Scholar] [CrossRef]
  2. Bianchi, G. Performance analysis of the IEEE 802.11 distributed coordination function. IEEE J. Sel. Areas Commun. 2000, 18, 535–547. [Google Scholar] [CrossRef]
  3. Liao, Y.; Bian, K.; Song, L. Full-Duplex MAC Protocol Design and Analysis. IEEE Commun. Lett. 2015, 19, 1185–1188. [Google Scholar] [CrossRef]
  4. Song, L.; Liao, Y.; Bian, K.; Song, L.; Han, Z. Cross-layer protocol design for CSMA/CD in full-duplex WIFI networks. IEEE Commun. Lett. 2016, 20, 792–795. [Google Scholar] [CrossRef]
  5. Liao, R.; Bellalta, B.; Oliver, M. Modelling and enhancing full-duplex MAC for single-hop 802.11 wireless networks. IEEE Wirel. Commun. Lett. 2015, 4, 349–352. [Google Scholar] [CrossRef]
  6. Cheng, W.; Zhang, X.; Zhang, H. RTS/FCTS mechanism based full-duplex mac protocol for wireless networks. In Proceedings of the IEEE Global Communications Conference (GLOBECOM), Atlanta, GA, USA, 9–13 December 2013; pp. 5017–5022. [Google Scholar]
  7. Bianchi, G.; Fratta, L.; Oliveri, M. Performance evaluation and enhancement of the CSMA/CA mac protocol for 802.11 wireless LANs. In Proceedings of the IEEE International Symposium on Personal, Indoor, and Mobile Communications (PIMRC), Taipei, Taiwan, 18–18 October 1996; pp. 392–396. [Google Scholar]
  8. Murad, M.; Eltawil, A.M. A Simple Full-Duplex MAC Protocol Exploiting Asymmetric Traffic Loads in WiFi Systems. In Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), San Francisco, CA, USA, 19–22 March 2017; pp. 1–6. [Google Scholar]
  9. Huang, P.; Chen, H.; Xing, G.; Tan, Y. SGF: A state-free gradient-based forwarding protocol for wireless sensor networks. ACM Trans. Sens. Netw. 2009, 5, 14. [Google Scholar] [CrossRef]
  10. Chen, H.; Wu, J. A novel interference suppression method in wireless relay networks. In Proceedings of the IEEE 10th Sensor Array and Multichannel Signal Processing Workshop (SAM), South Yorkshire Sheffield, UK, 8–11 July 2018; pp. 60–64. [Google Scholar]
  11. Koulamas, C.; Koubias, S.; Papadopoulos, G. Using cut-through forwarding to retain the real-time properties of profibus over hybrid wired/wireless architectures. IEEE Trans. Ind. Electron. 2004, 51, 1208–1217. [Google Scholar] [CrossRef]
  12. Goyal, S.; Liu, P.; Gurbuz, O.; Erkip, E.; Panwar, S. A distributed MAC protocol for full duplex radio. In Proceedings of the 2013 Asilomar Conference on Signals, Systems and Computers, Pacific Grove, CA, USA, 3–6 November 2013; pp. 788–792. [Google Scholar]
  13. Doost-Mohammady, R.; Naderi, M.Y.; Chowdhury, K.R. Performance analysis of CSMA/CA based medium access in full duplex wireless communications. IEEE Trans. Mob. Comput. 2016, 15, 1457–1470. [Google Scholar] [CrossRef]
  14. Lee, K.; Yoo, J. Performance of the full-duplex MAC protocol in non-saturated conditions. IEEE Commun. Lett. 2017, 21, 1827–1830. [Google Scholar] [CrossRef]
Figure 1. Four communication modes corresponding to the two nodes sending signals simultaneously.
Figure 1. Four communication modes corresponding to the two nodes sending signals simultaneously.
Sensors 19 02413 g001
Figure 2. B obtains the MAC address of A from the received frame’s header and sends a frame to A (FD_1 mode).
Figure 2. B obtains the MAC address of A from the received frame’s header and sends a frame to A (FD_1 mode).
Sensors 19 02413 g002
Figure 3. A and B send frames for each other simultaneously (FD_2 mode).
Figure 3. A and B send frames for each other simultaneously (FD_2 mode).
Sensors 19 02413 g003
Figure 4. A and C re-conduct an FD communication.
Figure 4. A and C re-conduct an FD communication.
Sensors 19 02413 g004
Figure 5. A sends the frame to B again and then B initiates the “passive” transmission (FD_3 mode).
Figure 5. A sends the frame to B again and then B initiates the “passive” transmission (FD_3 mode).
Sensors 19 02413 g005
Figure 6. State transition diagram of the HD node in the network.
Figure 6. State transition diagram of the HD node in the network.
Sensors 19 02413 g006
Figure 7. State transition diagram of the FD node in the network.
Figure 7. State transition diagram of the FD node in the network.
Sensors 19 02413 g007
Figure 8. “Active” transmission probabilities for the proposed FD MAC protocol and the traditional CSMA/CA protocol versus the different values of n and W.
Figure 8. “Active” transmission probabilities for the proposed FD MAC protocol and the traditional CSMA/CA protocol versus the different values of n and W.
Sensors 19 02413 g008
Figure 9. System throughputs for the proposed FD MAC protocol and the traditional CSMA/CA protocol versus the different values of n and W.
Figure 9. System throughputs for the proposed FD MAC protocol and the traditional CSMA/CA protocol versus the different values of n and W.
Sensors 19 02413 g009
Figure 10. System throughputs for the proposed FD MAC protocol and the MAC protocol in [5] with fixed transmission probability versus the different value of n (W = 32).
Figure 10. System throughputs for the proposed FD MAC protocol and the MAC protocol in [5] with fixed transmission probability versus the different value of n (W = 32).
Sensors 19 02413 g010
Table 1. Value of each simulation parameter.
Table 1. Value of each simulation parameter.
ParameterValue
Frame payload8184 bits
Frame header272 bits
Channel rate1 Mbps
ACK frame112 bits
Slot time50 us
RTS frame160 bits
CTS frame112 bits
SIFS28 us
DIFS128 us

Share and Cite

MDPI and ACS Style

Song, Y.; Qi, W.; Zhao, W.; Cheng, W. Full-Duplex MAC Protocol for CSMA/CA-Based Single-Hop Wireless Networks. Sensors 2019, 19, 2413. https://0-doi-org.brum.beds.ac.uk/10.3390/s19102413

AMA Style

Song Y, Qi W, Zhao W, Cheng W. Full-Duplex MAC Protocol for CSMA/CA-Based Single-Hop Wireless Networks. Sensors. 2019; 19(10):2413. https://0-doi-org.brum.beds.ac.uk/10.3390/s19102413

Chicago/Turabian Style

Song, Yu, Wangdong Qi, Weiwei Zhao, and Wenchi Cheng. 2019. "Full-Duplex MAC Protocol for CSMA/CA-Based Single-Hop Wireless Networks" Sensors 19, no. 10: 2413. https://0-doi-org.brum.beds.ac.uk/10.3390/s19102413

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop