Optimal physical carrier sense in wireless networks

  • Authors:
  • Kyung-Joon Park;Jihyuk Choi;Jennifer C. Hou;Yih-Chun Hu;Hyuk Lim

  • Affiliations:
  • Department of Computer Science, University of Illinois, 201 N. Goodwin Avenue, Urbana, IL 61801, USA;Department of Electrical and Computer Engineering, University of Illinois, 1406 W. Green Street, Urbana, IL 61801, USA;Department of Computer Science, University of Illinois, 201 N. Goodwin Avenue, Urbana, IL 61801, USA;Department of Electrical and Computer Engineering, University of Illinois, 1406 W. Green Street, Urbana, IL 61801, USA;Department of Information and Communications, GIST, Republic of Korea and Department of Nanobio Materials and Electronics, GIST, Republic of Korea

  • Venue:
  • Ad Hoc Networks
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

We investigate the problem of maximizing Medium Access Control (MAC) throughput in Carrier Sense Multiple Access (CSMA) wireless networks. By explicitly incorporating the carrier sense threshold and the transmit power into our analysis, we derive an analytical relation between MAC throughput and system parameters. In homogeneous networks, we derive the optimal carrier sense range at a given node density as a function of the ratio between the transmit power and the carrier sense threshold. The obtained optimal carrier sense range is smaller than that for covering the entire interference range, which is in sharp contrast to what has been considered to be optimal in previous studies. Only when the node density goes to infinity, the optimal carrier sense range converges to that for exactly covering the interference range, thereby eliminating all the hidden nodes. For nonhomogeneous networks, any distributed algorithm for tuning the carrier sense threshold, in which each node tries to maximize its own throughput without coordination, may significantly degrade MAC throughput. In order to properly design a distributed algorithm, each node not only considers its own throughput, but also needs to take account of its adverse impact on others. Our analysis is verified by simulation studies under various network scenarios.