Академический Документы
Профессиональный Документы
Культура Документы
Abstract— Recent studies have shown that the performance of mesh structure. In this paper, we refer to all these networks
wireless multihop ad hoc networks is very poor. In this paper, that support multihop wireless communications as wireless
we first demonstrate that one important reason of the poor multihop ad hoc networks and study how to improve their
performance is the close coupling between medium contention
and network congestion. Therefore, we present a framework of performance.
distributed flow control and medium access control to address In wireless multihop ad hoc networks, nodes have to co-
both medium contention and network congestion. The proposed operate to forward each other’s packets through the networks.
scheme utilizes the MAC layer control frames to efficiently Due to the contention for the shared channel, the throughput
conduct the network layer’s flow control function and only allows of each single node is limited not only by the channel capacity,
the upstream nodes to forward enough packets to make it possible
for the downstream nodes to fully utilize the shared channel but but also by the transmissions in its neighborhood. Thus, each
never introduce severe MAC collisions and network congestion. multi-hop flow encounters contentions not only from other
Extensive simulations illustrate that the proposed scheme well flows which pass by the neighborhood, i.e., the inter-flow
controls congestion and greatly alleviates medium collisions. It contention, but also from the transmissions of the flow itself
achieves up to 12 times of the end-to-end throughput of 802.11, because the transmission at each hop has to contend for the
maintains a short delay and a low control overhead, and improves
the fairness regardless of the hop count and the traffic load. channel with the upstream and downstream nodes, i.e., the
intra-flow contention.
Index Terms— Wireless ad hoc networks, medium access con- These two kinds of flow contentions could result in severe
trol, flow control, intra-flow contention, inter-flow contention.
collisions and congestion, and significantly limit the perfor-
mance of ad hoc networks. It has been shown in many papers
I. I NTRODUCTION that wireless multihop ad hoc networks perform poorly with
With the advancement of wireless technology, recent years TCP traffic as well as heavy UDP traffic ( [4], [11], [20], [25],
have witnessed an ever-increasing popularity of wireless net- [32], [36], [41]–[43]). When traffic load is heavy or there are
works, including wireless local area networks, mobile ad a large number of greedy users, severe MAC contention and
hoc networks, wireless sensor networks, and wireless mesh network congestion will be observed and they will lead to
networks. Wireless local area networks, or Wi-Fi hot spots, dramatically decreased end-to-end throughput and increased
have been widely deployed in cities, college campus, air- end-to-end delay. The MAC protocol itself could not solve
ports, coffee bars, conference halls, hotels, and many other congestion problem and often aggravates congestion due to
public places. However, communication in wireless local area contention in the shared channel. Fang and McDonald [9]
networks is still limited to one-hop wireless communication studied how the throughput and delay can be affected by
between clients and access points, which restricts wireless the path coupling, i.e., the MAC layer contention between
access to a small range around access points. If mobile devices nodes distributed along node disjoint paths, say, inter-flow
are allowed to forward packets for others, a mobile ad hoc contention. The results demonstrated the need for the control
network can be formed, and the range of wireless access to of cross-layer interactions and methodologies for cross-layer
Wi-Fi hot spots can be significantly extended. This kind of optimization.
wireless multihop communication is also common in wireless To the best of our knowledge, there are no comprehensive
sensor networks that are often used in many applications study on and good solutions to the congestion control consid-
such as environmental monitoring and health care. Recently, ering the MAC layer contentions and the packet scheduling
metropolitan Wi-Fi wireless mesh networks have become hot of multihop traffic flows along their selected paths in the
research topics because they can provide affordable outdoor shared channel environment (more details are given in Section
wireless broadband Internet access to residents, businesses and V). In this paper, we present a framework of network layer
visitors in a large area through a wireless multihop backhaul flow control and MAC layer medium access to address the
collisions and congestion problem due to the intra-flow con-
This work was supported in part by the U.S. Office of Naval Research tention and inter-flow contention. Based on the framework,
under Young Investigator Award N000140210464 and by the National Science
Foundation under Faculty Early Career Development Award ANI-0093241 and a multihop packet scheduling algorithm is incorporated into
under grant DBI-0529012. the IEEE 802.11 Distributed Coordination Function (DCF)
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2006 (TO APPEAR) 2
protocol [17].
The framework includes multiple mechanisms: fast re-
lay, backward-pressure congestion control, receiver-initiated
transmission scheduling, queue space limitation, and Round
Robin scheduling. The fast relay assigns high priority of 0 1 2 3 4 5 6
inter-flow contention problem. more packets to their next hops. This efficiently reduces the
These two problems are very common and have unique MAC layer contentions due to the intra-flow contention and
features in multihop ad hoc networks. First, packet forwarding inter-flow contention on those congested nodes by keeping
at each hop has to contend for channel resource with other other nodes silent. The third one is not to allow the source node
traffic in the neighborhood. Second, inter-flow contention to occupy the whole outgoing queue, which could efficiently
not only appears when several flows pass through the same prevent the irresponsible applications from injecting more
forwarding node, but also exists when the flows’ paths are packets than the network could handle, and leave more queue
close to each other such that the MAC layer only allows one space for other flows passing through this node. The last one is
transmission at a time to avoid collisions. Third, once the the Round Robin scheduling for the queue management, which
congestion occurs, MAC layer contentions become severe so further alleviates the unfairness problem between traversing
that the MAC layer throughput decreases due to the increasing flows and greedy source flows.
collision probability ( [2], [35], [37], [38], [40]). This does
not help to solve the congestion and instead results in more
B. Address the intra-flow contention problem
packets accumulating in the queue. These are the reasons
why traditional congestion control schemes, such as TCP, and In each multi-hop flow, the intermediate node on a path
heavy UDP traffic have poor performance in ad hoc networks. needs to contend for the shared channel with the previous
The dropped packets due to both medium collisions and nodes when forwarding the received packet to the next hop.
queue overflow waste a lot of scarce bandwidth and degrade One way to avoid the first few nodes on the path to inject
end-to-end performance greatly. For TCP, it can not respond more packets than what the succeeding nodes can forward is
congestion in time and often decreases the sending window to assign high channel access priority to each node when it
a long time after the congestion occurs since it depends on just receives a packet. That is to say, the source node tries
the end-to-end feedback in acknowledgments and timeouts to to hold the succeeding packets until the preceding packet is
conduct congestion control. And TCP acknowledgments are transmitted out of its interference range. This can achieve
delayed and even dropped not only due to the increased MAC optimum scheduling for one way traffic in the regular chain
layer collision probability but also for the increased queue topology.
length (notice that each node only has one shared outgoing For example, in Fig. 1, node 1 has the highest priority when
link and a corresponding queue for all outgoing packets). it receives one packet from node 0 and then forwards the
Therefore we argue that a good solution to the flow and packet to node 2. Node 2 immediately forwards the received
congestion control problem in ad hoc networks must consider packet from node 1 and forwards it to node 3. It is the same
the MAC layer characteristics and respond quickly to the for node 3, which immediately forwards the received packet to
congestion. An intuitive solution to the above problems is node 4. Because node 0 can sense the transmissions of node
to allow the downstream nodes and the congested ones to 1 and 2, it will not interfere with these two nodes. Node 0
obtain the channel access to transmit packets while keeping could not send packets to node 1 either when node 3 forwards
others silent, and hence smoothly forward each packet to the packet to 4 because node 1 is in the interference range of
destination without encountering severe collisions or excessive node 3. When node 4 forwards packet to 5, node 0 could
delay at the forwarding nodes. This motivates us to develop have chance to send packet to node 1. The similar procedures
our scheme presented in the next section. are adopted by the succeeding nodes along the path. Node 0
and 4 could simultaneously send packets to their next hops,
III. OPET: O PTIMUM PACKET S CHEDULING FOR E ACH and similar case happens to nodes which are 4 hops away
T RAFFIC F LOW from each other along the path. Thus, the procedure could
utilize 1/4 of the channel bandwidth, the maximum throughput
A. Overview which can be achieved by the chain topology [20]. For a
The objective of our scheme is to approximate Optimum more random path, it is possible for more than 4 hops to
Packet scheduling for Each Traffic flow (OPET). Optimum interfere with the first hop transmission, so the maximum
here means that our scheme can achieve optimum packet throughput is less than 1/4 of the channel bandwidth. OPET,
scheduling for each single traffic flow, which is obtained from however, allows the downstream nodes to access the channel
the optimal scheduling for chain topology. By solving the with a higher priority. Succeeding packets are allowed to be
intra-flow contention and inter-flow contention problems, our forwarded when previous packets are forwarded out of the
scheme OPET can significantly reduce the resource wasted interference range of the current hop. Therefore, collisions
by those dropped packets at forwarding nodes and thus could between upstream nodes and downstream nodes are greatly
significantly improve the end-to-end performance. reduced. In this way, maximum throughput can be approached
OPET includes four major mechanisms. The first one is by scheduling a transmission in each interference range. A
to assign a high priority of channel access to the current more comprehensive study on the maximum throughput of a
receiver. This could achieve optimum packet scheduling for chain topology has been provided in [39].
chain topology and avoid severe intra-flow contentions in each To incorporate this procedure into the IEEE 802.11 DCF
flow. The second one is the hop-by-hop backward-pressure protocol, one solution is to assign higher channel access
scheduling. The forwarding nodes as well as the source are priorities to those packets which have traversed more hops. It
notified of the congestion and then are restrained from sending requires that the MAC layer supports many different priority
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2006 (TO APPEAR) 4
Octets: 2 2 6 6 4 4 4
t0 0 1 2 3 4 5 6 7 8
t1 0 Frame Receiver Transmitter Source Flow
t2 0 Control
Duration
Address Address Address ID
FCS
t3 0
t4 0
t5 1 0 RTSM frame
t6 1 0
t7 1 0 Octets: 2 6 4 4 4
t8 1 0 2
t 2 1
t109 2 1 Frame
Duration
Receiver Source Flow
FCS
t11 2 1 Control Address Address ID
t12 2 1
3 2 CTSR frame
t n : The transmission of the nth packet
0.35 1.5
OPET-1hops
Basic-1hops
0.3
OPET-3hops
Basic-3hops
0.25 1
0.2
Basic-cross There are total 30 flows with the same CBR/UDP traffic in the
5 OPET-cross
network. All results are averaged over 30 random simulations
4 with 300 simulated seconds each.
We observe from Fig. 10 that when the minimum number
3
of hops for each flow increases, the aggregated end-to-end
2 throughput of both protocols decreases. This is reasonable
because packets of multihop flows with longer path have to
1 pass more links and thus consume more resource for the same
0 arriving traffic.
0 0.2 0.4 0.6 0.8 1 For the random traffic without hop count limitation, our
Total offered load (Mbps)
scheme OPET could improve the end-to-end throughput by
Fig. 9. End-to-end delay in the 9-node chain topology (Fig. 3) and cross 100% under heavy traffic. This is because that OPET reduces
topology (Fig. 2) a lot of channel contentions due to the intra-flow contention
and inter-flow contention, and there are much less accumulated
packets which are eventually dropped by the forwarding nodes.
IEEE 802.11 protocol with RTS/CTS and without the packet The reason that basic scheme could maintain certain through-
scheduling algorithm will be referred to as the Basic scheme. put under heavy traffic is that IEEE 802.11 MAC protocol
gives preference to those one hop or two-hop flows which
have no or much less contentions from hidden terminals. These
flows could capture the whole bandwidth under heavy traffic
A. Simple Scenarios which contributes to the aggregated end-to-end throughput.
However, other flows with longer paths are starved with zero
We first investigate how well our scheme works in the throughputs as shown in Fig. 11, which shows one random
simple scenarios, i.e., the 9-node chain topology with one way example of throughput distribution among flows under heavy
traffic and two-way traffic shown in Fig. 3, and the cross traffic traffic and also shows the improved fairness in OPET.
scenario shown in Fig. 2. If source-destination pairs of all flows are at least 3 hops
Fig. 8 shows that our scheme improves the throughput away, OPET could still maintain high end-to-end throughput
by 55%, 120% and 33% compared to the IEEE 802.11 in at heavy traffic load while Basic scheme almost drops to
these three scenarios under heavy traffic load, respectively. We zero end-to-end throughput. In Basic scheme, the intra-flow
observe in Fig. 9 that our scheme maintains a small and stable contention could allow the sources of multihop flows to inject
end-to-end delay at all traffic status while the end-to-end delay more packets into the network than the network can forward.
increases dramatically with increasing traffic load in the IEEE The inter-flow contention makes the situation worse. It is not
802.11 protocol. The reason is straightforward because that our surprising in the Basic scheme that the longer path the flow
scheme reduces a lot of MAC layer contentions, i.e., the intra- has, the lower the end-to-end throughput it can achieve. By
flow contention and the inter-flow contention, and removes the reducing the intra-flow and inter-flow contention, our scheme
excessive queueing delay at the forwarding nodes. always maintains the high end-to-end throughput for all flows
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2006 (TO APPEAR) 8
5 1
10
OPET
End-to-end throughput (# of pkts)
4 Basic 0.8
10 OPET-1hops
# of hops
2
10 0.4
1
10 6 7 0.2
3 4
2
0 1
10 0
0 5 10 15 20 25 30 0 2 4 6 8 10
Flow ID (total 30 flow s)
Total of f ered load (Mbps)
25 70
OPET-1hops OPET-1hops
Basic-1hops Basic-1hops
OPET-3hops 60
20
Basic-3hops Basic-3hops
50
15
40
10 30
20
5
10
0 0
0 2 4 6 8 10 0 2 4 6 8 10
Total of f ered load (Mbps)
Total of f ered load (Mbps)
1 270
OPET-1hops 250
Basic-1hops 230 OPET: collided RTS/s
0.8 OPET-3hops Basic: collided RTS/s
210
Basic-3hops
190
Faireness index
0.6 170
1 2 3 4 5 6 7 8 9 10
Number of TCP flows
3
0.4
2.5
OPET: collided ACK/s
Basic: collided ACK/s
0.2 2 OPET: dropped pkts/s
Basic: dropped pkts/s
1.5
0
0 2 4 6 8 10
1
Total of f ered load (Mbps)
0.5
Fig. 15. Fairness index in the random topology
0
1 2 3 4 5 6 7 8 9 10
0.8 Number of TCP flows
0.7
End-to-end throughput (Mbps)
0.6 225
200
0.2 1 2 3 4 5 6 7 8 9 10
0 5 10 15 1
Total of f ered load (Mbps)
0.995
Fairness
OPET
Fig. 16. Simulation results for the random topology with mobility 0.99 Basic
0.985
0.98
C. Random Topology with Mobility 1 2 3 4 5 6 7 8 9 10
Number of TCP flows
In the simulations, 60 nodes are randomly placed in a
1000m × 1000m area. All nodes are randomly moving in Fig. 18. Throughput and fairness of TCP traffic in chain topology
the rectangular grid with a randomly chosen speed (uniformly
distributed between 0 − 10m/s). There are total 30 flows
with the same CBR/UDP traffic. The source of each flow into play.
randomly selects one node as the destination. The routing
scheme is AODV [25]. All results are averaged over 30 random D. Simulation results for TCP traffic
simulations with 300 seconds simulated time each. We first investigate how well our scheme performs in the
The purpose considering the mobility is only to illustrate 9-node chain topology with different number of TCP flows.
that our scheme can work well in the mobile scenarios with Fig. 17 shows that our scheme OPET can reduce the packet
on-demand routing scheme. In fact, we find in the extensive collision by about 40% for both RTS and ACK frames.
simulations that mobility does not change the results much. And the number of dropped TCP packets is also reduced
Therefore, we only show the aggregated end-to-end throughput by about 80%. This verifies that the hop-by-hop congestion
in Fig. 16, which shows OPET has about 50% higher through- control can effectively reduce a lot of medium contention
put than the Basic scheme. All other performance metrics are and collision. Fig. 18 demonstrates that OPET can improve
also similar with the scenario where the source and destination the aggregate throughput of TCP flows by about 5%. And
are randomly selected without hop count limitation in the static the fairness is even better than the Basic scheme. Fig. 19
topology. illustrates that TCP source node can detect the congestion
We also notice that mobility decreases the throughput. This status by simply observing its queue length if OPET is used
is because that the route may be unavailable during certain and may accordingly change the sending rate to obtain better
periods due to mobility although each source has a route performance.
to its destination at the start time. In addition, the extensive Now we examine the TCP performance in a larger network
simulations also indicate that mobility increases the end-to-end with grid topology, where inter-flow contention is a common
delay because the route searching and repairing time comes phenomenon. 100 nodes are arranged in a 10 × 10 grid with
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2006 (TO APPEAR) 10
25
V. R ELATED W ORKS AND D ISCUSSION
OPET: 3 TCP
20 OPET: 6 TCP
Average queue length
Basic: 3TCP Recently, many schemes are presented to alleviate the MAC
15 Basic: 6 TCP layer collisions. The authors in [12], [28] proposed receiver-
initiated transmission schemes which work well when the
10 intended receiver knows exactly the traffic load information.
Wang and Garcia-Luna-Aceves [30] proposed a hybrid chan-
5
nel access scheme which combines both sender-initiated and
0
receiver-initiated collision avoidance handshake. Their scheme
0 1 2 3 4 5 6 7 8 could alleviate the fairness problem in some cases without
Node ID
sacrificing much throughput and simplicity, but cannot trigger
Fig. 19. Queue length for TCP traffic in chain topology the desired receiver-initiated collision avoidance handshake in
some scenarios due to the lack of flow contention information.
Berger et al. [3], [33] presented two MAC layer enhance-
ments, i.e., quick-exchange and fast-forward, to address self-
nodes are separated by 200 meters. 16 TCP flows with 8 contention in ad-hoc networks. The previous one allows the
horizontal ones from the second to the ninth rows and 8 receiver to return a DATA packet to the sender and the latter
vertical ones from the second to the ninth columns run for 300 includes an implicit RTS to the next hop. They could save
seconds in the simulation. Compared with the Basic scheme, some transmission negotiation procedures, i.e., the RTS/CTS
OPET improves the end-to-end throughput from 547Kbps exchanges.
to 603Kbps by 10%, and reduces the collided RTS from
In the last few years, several papers ( [18], [22]) have been
1015pkt/s to 802pkt/s by 21%.
reported for the distributed packet scheduling which considers
These results show that OPET can also improve TCP the MAC layer collisions in the multihop ad hoc networks. The
performance, although TCP flows tend to generate burstier proposed schemes used different backoff window size to assign
traffic. This is because that OPET can reduce lots of packet different priorities for packets to access the channel. Luo et al.
droppings due to MAC collisions as well as queue overflow [22] constructed the flow contention graph to achieve better
and hence TCP source conducts much less retransmissions and fairness among one-hop flows between different node pairs.
also experiences much less oscillation in the sending window Kanodia et al. [18] applied EDF (Early Deadline First) criteria
size. The optimization of the interaction between TCP and to obtain smaller end-to-end delay than the original IEEE
OPET should provide better support for TCP traffic and will 802.11, although congestion is not fully addressed and the
be studied in future work. delay still increases dramatically with the increasing offered
load.
Traditional end-to-end congestion control, TCP, has been
E. Notes on the relative benefits of the four techniques shown to be inefficient in ad hoc networks in many recent
papers ( [6], [7], [10], [11], [13], [14], [32] and references
The first mechanism which assigns higher channel access therein). Most of the current work to improve TCP perfor-
priority to the downstream nodes when they receive packets mance, such as [5], [6], [8], [11], [16], [21], [24], [29],
works very well for chain topology with one way traffic. It [31], focus on end-to-end congestion control mechanism of
gives an efficient solution to the intra-flow contention problem. TCP with or without network layer feedback. The proposed
However, when inter-flow contention comes into play in a schemes did not fully address the impact of MAC layer
more general topology, the MAC layer contention is still severe performance and still suffered from the severe MAC layer
if only the first mechanism is used. In these scenarios, the contentions. Gupta et al. [15] used back-pressure concept to
combination with the backward-pressure scheduling greatly provide a fair channel access to TCP flows under heavy UDP
alleviates both intra-flow and inter-flow contentions and con- traffic with an implementation of a virtual, globally accessible
tributes to the performance gain in end-to-end throughput and array that dynamically records the queue lengths for each flow
delay. Despite the greatly improved aggregate performance, at each node in the network. Monks et al. [24] conducted
fairness is not improved much and starvation is still a severe simulations to illustrate the limitations of TCP-ELFN [16] and
problem for multihop flows especially when some source discussed the pros and cons of end-to-end control and hop-
nodes are also working as forwarding nodes. Therefore, we by-hop control. They argue that the advantages of hop-by-hop
introduce source self-constraint scheme and Round Robin control may outweigh its drawbacks.
scheme into the framework. The previous one allocates certain Hop-by-hop congestion control has been studied in wired
queue space for traversing packets to alleviate the possibility networks especially in ATM networks ( [19], [23]). But these
of being dropped due to queue overflow. The latter allows that schemes cannot be directly applied in ad hoc networks due
the traversing flows obtain relative fair throughputs compared to the completely different MAC and physical layers. To our
with the flows generated at this node that may often occupy best knowledge, in recent studies, only [34] comprehensively
most of the queue space and hence may have more chances to discussed hop-by-hop congestion control for ad hoc networks.
be transmitted. More extensive simulation results to illustrate The authors formulated an optimization problem and studied
these relative benefits are omitted here due to the page limit. the end-to-end throughput under both hop-by-hop congestion
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2006 (TO APPEAR) 11
control and the end-to-end congestion control. Their model [5] K. Chandran, S. Raghunathan, S. Venkatesan, and R. Prakash, “A
only considered the channel sharing for those nodes with same feedback-based scheme for improving TCP performance in ad hoc
wireless networks,” IEEE Personal communications, vol. 8, pp. 34-39,
flows passing through, and did not consider other medium Feb. 2001.
contention among nodes which are in the sensing range or [6] K. Chen, Y. Xue, and K. Nahrstedt, “On setting TCP’s congestion
interference range of each other. Compared to congestion window limit in mobile ad hoc networks,” Proc. IEEE ICC, May 2003.
[7] X. Chen, H. Zhai, J. Wang and Y. Fang, “TCP performance over
control schemes for wired networks, we can regard CTSR mobile ad hoc networks,” Canadian Journal of Electrical and Computer
packets in OPET as a kind of credit like those in credit-based Engineering, Vol. 29, pp. 129-134, Jan./Apr. 2004.
flow control scheme [19]. And NCTS packets can be regarded [8] T. D. Dyer and R. V. Boppana, “A comparison of TCP performance
over three routing protocols for mobile ad hoc networks,” Proc. ACM
as a kind of hop-by-hop source Quench although OPET does Mobihoc, Oct. 2001.
not require the cooperation of transport and application layers [9] Y. Fang and A.B. McDonald, “Cross-layer performance effects of path
[26]. coupling in wireless ad hoc networks: power and throughput implications
of IEEE 802.11 MAC,” Proc. IEEE IPCCC, Apr. 2002
To the best of our knowledge, there are no comprehensive [10] Z. Fu, X. Meng, and S. Lu, “How Bad TCP can Perform in Mobile Ad-
studies to effectively address the intra-flow contention and Hoc Networks,” IEEE Symposium on Computers and Communications,
inter-flow contention problems in multihop mobile ad hoc net- Jul. 2002
[11] Z. Fu, P. Zerfos, H. Luo, S. Lu, L. Zhang, M. Gerla, “The Impact of
works, which result in serious problems, such as “explosion” Multihop Wireless Channel on TCP Throughput and Loss,” Proc. IEEE
of control packets, severe collisions of data packets, poor Infocom, Mar. 2003.
throughput and fairness, excessively long end-to-end delay, [12] J.J. Garcia-Luna-Aceves and A. Tzamaloukas, “Reversing the collision-
avoidance handshake in wireless networks,” Proc. ACM/IEEE Mobicom,
congestion, and poor scalability. Thus, all the prior works Aug. 1999.
only contribute to the improvement of one or two of these [13] M. Gerla, R. Bagrodia, L. Zhang, K. Tang, and L. Wang, “TCP over
performance metrics while sacrificing other metrics more or wireless multihop protocols: simulation and experiments,” Proc. IEEE
ICC, Jun. 1999.
less. By tackling these two key problems with a novel cross [14] M. Gerla, K. Tang, and R. Bagrodia, “TCP performance in wireless
layer design, our scheme could improve all these metrics for multihop networks,” Proc. IEEE WMCSA, Feb. 1999.
both UDP and TCP traffic, which is significant departure from [15] V. Gupta, S. V. Krishnamurthy, and M. Faloutsos, “Improving the
performance of TCP in the presence of interacting UDP flows in ad
most recent works. hoc networks,” IFIP Networking, May 2004.
[16] G. Holland and N. H. Vaidya, “Analysis of TCP performance over
VI. C ONCLUSIONS mobile ad hoc networks,” Proc. ACM Mobicom, Aug. 1999.
[17] IEEE standard for Wireless LAN Medium Access Control (MAC) and
In this paper, we first discuss the causes of poor performance Physical Layer (PHY) specifications, ISO/IEC 8802-11: 1999(E), Aug.
of the IEEE 802.11, i.e., the intra-flow contention and inter- 1999
[18] V. Kanodia, C. Li, A. Sabharwal, B. Sadeghi, and E. Knightly, “Distrib-
flow contention, in multihop ad hoc networks. In order to uted multi-hop scheduling and medium access with delay and throughput
reduce these two kinds of contentions, we have proposed constraints,” Proc. ACM Mobicom, Jul. 2001.
a framework of distributed flow control and media access, [19] H. T. Kung, T. Blackwell and A. Chapman, “Credit-based flow control
for ATM networks: credit update protocol, adaptive credit allocation,
based on which one multihop packet scheduling algorithm, and statistical multiplexing,” Proc. ACM Sigcomm, Sep. 1994.
i.e., OPET, is proposed for the IEEE 802.11 multihop ad hoc [20] J. Li, C. Blake, D.Couto, H. Lee and R. Morris, “Capacity of ad hoc
networks. Extensive simulations verify that our scheme OPET wireless network,” Proc. ACM Mobicom, July 2001.
[21] J. Liu and S. Singh, “ATCP: TCP for mobile ad hoc networks,” IEEE
greatly reduces excessive collisions at the MAC layer, quickly J. Sel. Areas Commun. Vol.19, pp. 1300-1315, Jul. 2001.
eliminates the congestion, and has a much better multihop [22] H. Luo and S. Lu, “A new model for packet scheduling in multihop
packet scheduling than the IEEE 802.11 MAC protocol. Thus wireless networks,” Proc. ACM Mobicom, Aug. 2000.
[23] P. P. Mishra and H. Kanakia, “A hop by hop rate-based congestion
it could achieve stable and high throughput and shorter end- control scheme,” Proc. ACM Sigcomm, Aug. 1992.
to-end delay independent of traffic load, while IEEE 802.11 [24] J. P. Monks, P. Sinha and V. Bharghavan, “Limitations of TCP-ELFN
MAC protocol performs very poorly in terms of these two for ad hoc networks,” Proc. MOMUC, Oct. 2000.
[25] C. Perkins, E.M. Royer, S.R. Das, and M.K. Marina, “Performance
metrics for multihop flows. In addition, compared to the IEEE comparison of two on-demand routing protocols for ad hoc networks,”
802.11 MAC protocol, OPET has better fairness, much fewer IEEE Pers. Commun., vol. 8, pp. 16-28, Feb. 2001.
dropped DATA packets, and stabler control overhead. Thus, [26] J. Postel, “Internet control message protocol”, IETF RFC 792.
[27] M. Shreedhar and G. Varghese, “Efficient fair queuing using deficit
OPET provides a very stable link layer and is scalable for large round-robin,” IEEE/ACK Trans. Netw., vol. 4, pp. 375-385, Jun. 1996.
networks where there are many multihop flows with long paths [28] F. Talucci and M. Gerla, “MACA-BI (MACA by invitation): a receiver
without incurring explosion of control packets under heavy oriented access protocol for wireless multihop networks,” Proc. IEEE
PIMRC, Sep. 1997.
load. [29] F. Wang and Y. Zhang, “Improving TCP performance over mobile ad-
hoc networks with out-of-order detection and response,” Proc. ACM
R EFERENCES Mobihoc, Jun. 2002.
[30] Y. Wang and J.J.Garcia-Luna-Aceves, “A hybrid collision avoidance
[1] H. Adiseshu, G. Parulkar, and G. Varghese, “A reliable and scalable scheme for ad hoc networks,” Wireless Networks, vol. 10, pp. 439-436,
striping protocol,” Proc. ACM Sigcomm, Aug. 1996. Jul. 2004.
[2] G. Bianchi, “Performance analysis of the IEEE 802.11 distributed [31] K. Xu, M. Gerla, L. Qi, and Y. Shu, “Enhancing TCP fairness in ad hoc
coordination function,” IEEE J. Sel. Areas Commun., vol. 18, pp. 535- wireless networks using neighborhood RED,” Proc. ACM Mobicom, Sep.
537, Mar. 2000. 2003.
[3] D. Berger, Z. Ye, P. Sinha, S. V. Krishnamurthy, M. Faloutsos, S. [32] S. Xu and T. Safadawi, “Does the IEEE 802.11 MAC protocol work
K. Tripathi, “TCP friendly medium access control for ad-hoc wireless well in multihop wireless ad hoc networks?” IEEE Commun. Mag., vol.
networks: alleviating self contention,” Proc. IEEE MASS, Oct. 2004. 39, pp. 130-137, Jun. 2001.
[4] J. Broch, D.A. Maltz, D.B. Johnson, Y. Hu, and J. Jetcheva, “A [33] Z. Ye, D, Berger, P. Sinha, S. Krishnamurthy, M. Faloutsos, and S.K.
performance comparison of multihop wireless ad hoc network routing Tripathi, “Alleviating MAC layer self-contention in ad-hoc networks,”
protocols,” Proc. ACM Mobicom, Oct. 1998. Proc. ACM MobiCom Poster, Sep. 2003.
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2006 (TO APPEAR) 12