Next Article in Journal
Class-GE2E: Speaker Verification Using Self-Attention and Transfer Learning with Loss Combination
Next Article in Special Issue
ASMAC: An Adaptive Slot Access MAC Protocol in Distributed VANET
Previous Article in Journal
An Analysis of Hardware Design of MLWE-Based Public-Key Encryption and Key-Establishment Algorithms
Previous Article in Special Issue
Routing Protocols for Mobile Internet of Things (IoT): A Survey on Challenges and Solutions
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Throughput Analysis for Wireless Full-Duplex Multi-Hop Networks with RTS/CTS-Based MAC

Department of Electrical and Electronics Engineering, Mie University, 1577 Kurimamachiya-cho, Tsu-shi 514-8507, Japan
*
Author to whom correspondence should be addressed.
Electronics 2022, 11(6), 892; https://doi.org/10.3390/electronics11060892
Submission received: 3 January 2022 / Revised: 7 March 2022 / Accepted: 10 March 2022 / Published: 12 March 2022
(This article belongs to the Special Issue Network Protocols for Wireless Sensor Networks)

Abstract

:
Medium access control (MAC) protocol operations for in-band full duplex multi-hop networks play an important role in efficient data relaying and throughput enhancement. Knowledge of the relationship between essential operations in MAC protocol for full duplex MAC (FD MAC) networks and network performance is important and useful in terms of the protocol and network design. FD MAC protocols often require exchanging control frames, e.g., request to send/clear to send (RTS/CTS). However, the conventional model cannot analyze the performance of wireless multi-hop networks with RTS/CTS-based FD MAC. Thus, this paper proposes a throughput analysis model for wireless multi-hop networks with RTS/CTS-based FD MAC. The proposed model includes novel “airtime expressions”, which allows us to handle RTS/CTS operations under FD MAC. The proposed model provides the end-to-end throughput of multi-hop networks with RTS/CTS-based FD MAC for any number of hops and any payload size. The validity of the analytical expressions is confirmed through comparisons with simulation results.

1. Introduction

Recently, the wireless full-duplex (FD) communication technique has attracted research attention. In wireless multi-hop networks, wireless FD communication allows relay nodes to transmit and receive data signals simultaneously in the same frequency band. This technique provides efficient data relaying and mitigation of data-transmission collisions induced by hidden nodes [1,2,3,4]. Because FD communication may become a powerful solution in terms of improving multi-hop network performance; thus, many studies into wireless FD multi-hop networks have been conducted, particularly in the last decade [1,2,3].
The operation of medium access control (MAC) protocols for full duplex MAC (FD MAC) networks play an important role in efficient data relay and improving throughput. MAC protocols for distributed networks, e.g., multi-hop networks and wireless local area network (WLAN), have been designed based on carrier-sense multiple access with collision avoidance (CSMA/CA). Two main types of CSMA-based FD MAC have been proposed; header snooping-based FD MAC [4,5,6,7,8] and request to send/clear to send (RTS/CTS)-based FD MAC [9,10,11,12,13,14,15,16]. The difference between the two schemes is whether or not network nodes exchange control frames prior to a DATA-frame transmission with FD communication. From a MAC protocol design perspective, knowledge of the relationship between essential operations in each FD MAC and network performance is important and useful.
In terms of the above motivation, some studies have focused on theoretical analysis of wireless FD multi-hop networks. Throughput analysis for CSMA/CA-based FD multi-hop networks has been proposed previously [17]; however, the model [17] cannot analyze the performance of wireless FD multi-hop networks with RTS/CTS-based FD MAC. In a simple multi-hop network, e.g., a string-topology, the header snooping-based FD MAC may provide higher throughput than RTS/CTS-based FD MAC due to its overheads for FD data transmissions. However, in real-world ad hoc network systems, the network topology or wireless link quality frequently varies due to node mobility, channel fading, and interference. To adapt to such situations, some control frames must be exchanged among network nodes [18,19]. From the viewpoint of MAC-layer operations, it is helpful for clarifying the relationship between network performance and an essential operation in RTS-based FD MAC. Throughput analysis for IEEE 802.11 multi-hop networks with RTS/CTS has been proposed in [20]. However, the application range in this model is so limited that it is difficult to extend to the theoretical analysis model for the multi-hop network with FD MAC. Ref. [14] takes into account multi-hop networks with RTS/CTS-based FD MAC, and provides the performance analysis based on an analytical model. However, the essential behaviors in multi-hop networks, such as collisions induced by hidden nodes and NAV operation, have been not considered in the analytical model of [14]. Clarifying the relationship between the network performance and essential behavior of multi-hop networks under the use of RTS/CTS-based FD MAC theoretically is useful for the protocol design and the optimization. Therefore, the performance analysis and future protocol design for FD multi-hop networks require the establishment of an analytical model for multi-hop networks with RTS/CTS-based FD MAC.
This paper proposes a throughput analysis model for wireless multi-hop networks with RTS/CTS-based FD MAC. The purpose of this paper is to clarify the relationship between network performance and an essential operation in RTS-based FD MAC. To develop the model, we also propose novel “airtime expressions”, which allows us to handle RTS/CTS operations under FD MAC. The proposed airtime expressions are effective for theoretical analysis of multi-hop networks [20,21,22,23,24], and the proposed model provides the end-to-end throughput of multi-hop networks with RTS/CTS-based FD MAC for any number of hops and any payload size. The validity of the analytical expressions is demonstrated through comparisons with simulation results. The proposed analytical model can be easily applied to performance analysis for half-duplex (HD) multi-hop networks with RTS/CTS. Therefore, the proposed model enables us to mathematically evaluate the performance of RTS/CTS multi-hop networks for FD and HD.
The rest of this paper is organized as follows. Section 2 provides an overview of related work, specifically wireless FD communication and CSMA-based FD MAC protocols, RTS/CTS-based FD MAC in multi-hop networks, and theoretical analysis of wireless multi-hop networks. Section 3 proposes throughput analysis for multi-hop networks with RTS/CTS-based FD MAC. In Section 4, we evaluate the verification of the proposed analytical model. Finally, Section 5 concludes the paper.

2. Related Work

2.1. Wireless FD Communication and CSMA-Based FD MAC Protocols

FD communication is a revolutionary communication technique that enables nodes to perform frame transmission and reception simultaneously on the same frequency channel. In HD communication, a primary transmission node initiates frame transmission, and the receiver decodes the signals from the primary transmitter. In contrast, with the FD communication, the primary receiver can initiate frame transmission while the primary transmitter transmits signals. In other words, the primary receiver functions as the secondary transmitter in FD communication [1,2,3].
FD communication is categorized into two modes, i.e., bidirectional FD (BFD) and unidirectional FD (UFD) [1,2,3]. In the BFD mode, the two nodes involved in FD communication perform DATA-frame transmission and reception simultaneously. In the UFD mode, a single node performs DATA-frame transmission and reception. Figure 1 shows an example of UFD mode among three nodes, where, Nodes 0 and 1 are the primary transmitter and secondary transmitter (i.e., the primary receiver), respectively. In this example, Nodes 0 and 2 are in a hidden node relationship; therefore, frame transmissions from Node 2 may interfere with frame transmissions from Node 0 if Node 2 initiates the transmission of signals. This interference is referred to as “hidden node collision”. The secondary transmission in FD communication between Nodes 0 and 1 informs the hidden nodes about frame transmissions at Node 0. The secondary transmission prevents its neighboring nodes from initiation of transmission of any frame; thus, the primary transmission is protected in FD communication, which is one of the benefits of FD communication in networks.
Considering the uniqueness of FD communication, various MAC protocols for wireless FD networks have been proposed. Such protocols are classified into two main types, i.e., header snooping-based FD MAC [4,5,6,7,8] and RTS/CTS-based FD MAC [9,10,11,12,13,14,15,16]. The difference between the two schemes is whether or not the network nodes exchange control frames for DATA-frame transmission with FD. RTS/CTS handshaking also reduces hidden node collisions, however, its overheads for FD data transmissions may degrade throughput. In a simple multi-hop network, e.g., a string-topology, the header snooping-based FD MAC may provide higher throughput than RTS/CTS-based FD MAC because the header snooping-based FD MAC has lower overheads for FD transmissions. However, in real-world ad hoc network systems, it is assumed that the network topology or wireless link quality varies frequently due to node mobility, channel fading, and interference. Therefore, in order to adapt to such situations, it is essential to exchange some control frames among network nodes [18,19]. In this sense, RTS/CTS-based FD MAC design is an important task, especially for ad hoc networks. In addition, it is necessary to clarify the relationship between the essential operations of RTS/CTS-based FD MAC and network performance. The performance analysis and future protocol design for FD multi-hop networks require an analytical model for multi-hop networks with RTS/CTS-based FD MAC.

2.2. RTS/CTS-Based FD MAC in Multi-Hop Netw

Several RTS/CTS-based FD MAC protocols have been proposed in the last decade. To the best of our knowledge, ref. [9] was the first paper which proposes a fundamental RTS/CTS-based FD MAC. The fundamental operation in RTS/CTS-based FD MAC is three-way handshaking with control frames. The main purpose of such handshaking is to specify the secondary transmitter for FD communication. Several protocols [14,15,16] apply the three-way handshaking for the same purpose. Therefore, we introduce the fundamental operations of three-way handshaking of RTC/Full duplex CTS(FCTS) [9] in multi-hop networks.
Figure 2 and Figure 3 show a three-hop network and a channel access example of the RTS/CTS-based FD MAC in the three-hop network, respectively. In Figure 2, Nodes 0(1) and 2(3) are in a hidden node relationship. Here, channel access is based on distributed coordination function (DCF) in IEEE 802.11. In the RTS/CTS-based FD MAC, each node exchanges some control frames, which are RTS and FD CTS (FCTS), before a DATA-frame transmission. Node 0 transmits an RTS frame to Node 1 when its backoff timer is zero (Figure 3a), and then Node 1 begins to transmit an FCTS frame to Node 2 after successfully receiving the RTS frame (Figure 3b). The purpose of the FCTS transmission is to inform Node 1’s neighboring nodes that Node 1 is going to initiate transmission of a DATA-frame. The FCTS transmission also functions to prevent the hidden nodes of Node 0 from transmitting frames. By receiving the FCTS frame from Node 1, Node 2 also sends an FCTS frame to Node 1 to inform its neighboring nodes that Node 2 will receive the DATA-frame as a secondary receiver (Figure 3c). Node 3 receives the FCTS frame from Node 2; thus, Node 3 sets the Network Allocation Vector (NAV), which forbids the nodes with it from transmitting frames (Figure 3d). After exchanging these control frames, Nodes 0 and 1 begin to transmit their DATA-frames through FD transmission (Figure 3e).
If Node 2 fails to receive the FCTS frame at (b) in Figure 3, Node 2 does not return an FCTS frame, and only Node 0 transmits its DATA frame. If Node 1 has no DATA-frame when receiving the RTS frame from Node 0, Node 1 returns an FCTS frame to Node 0. Here, Node 2 sets NAV, and only the DATA from Node 0 is transmitted with HD communication, and this is a unique operation of FD multi-hop networks.
Figure 4 shows an example of channel access failure for the RTS/CTS-based FD MAC. In Figure 4a, the RTS frame transmission from Node 2 collides with that from Node 0 due to hidden node collisions. Therefore, Node 1 does not return an FCTS frame to Node 0. Then, Node 0 fails in its RTS transmission (Figure 4b).
However, in the multi-hop networks with control frame exchanges, another transmission failure appears due to NAV operation, as shown in Figure 5. Here, Node 1 sets NAV after receiving the RTS frame from Node 2 (Figure 5a). Thus, Node 1 is permitted to transmit frames. However, Node 0 does not notice that Node 1 is under this constraint, i.e., the NAV setting. As a result, Node 0 attempts to transmit RTS frames repeatedly; however, Node 1 cannot reply to the RTSs (Figure 5b,c), which means that Node 0 cannot perform in RTS transmission successfully until the NAV duration expires at Node 1. Generally, RTS frames the mitigation of hidden node collisions; however, it may cause frame transmission failures with RTS frame reception under the NAV operation in multi-hop networks.

2.3. Theoretical Analysis of Wireless Multi-Hop Networks Based on the Airtime-Expressions Approaches

The string topology network is one of the simple and fundamental multi-hop network topologies. The string topology multi-hop networks are considered in various applications, such as sensor networks [25], mesh networks [26,27], vehicular ad hoc networks [28], unmanned aerial vehicle networks [29], etc. It is not easy to comprehend the network dynamics of string-topology multi-hop networks. This is because network nodes interact with one another in spite of their individual operations. It can be stated that analytical expressions of string-topology multi-hop network performance are helpful and valuable. From these reasons, a string topology multi-hop network is often considered as the analysis subject in the researches for multi-hop networks [30].
A promising approach for developing an analytical model for multi-hop networks is airtime expressions [20,21,22,23,24]. In airtime expressions analysis, the airtime spent for Node i transmitting frames in a long time interval [0, T i m e ] is referred as transmission airtime, which is defined as follows:
X i = lim T i m e d i T i m e ,
where d i is the durations that are used by Node—i frame transmission. Here, X i has the same mean as the probability that Node i transmits frames within a long time interval [0, T i m e ] [21,22]. Generally, a multi-hop network covers a wide area where the source nodes cannot send packets directly to destination nodes. Therefore, each node is affected differently in the local environment, which means that each node has a different collision probability and carrier-sensing probability in multi-hop networks. With the airtime expressions for each node in the network, the theoretical throughput can be derived in consideration of the different characteristics of each node in multi-hop networks, and this is why the airtime expressions approach is effective for multi-hop network analysis.
In [21], the maximum throughput for a long hop network is derived based on the original airtime expressions. With the transmission airtime, the expression of the carrier-sensing probability for each node in the multi-hop network is proposed in [22]. By considering both the collision and carrier-sensing probabilities for each node, ref. [22] derived the maximum throughput for the networks with any hops. Ref. [23] extended the theoretical analysis under non-saturation condition by proposing the frame-existence probability. Ref. [24] integrated the airtime expressions analysis and Bianchi’s Markov-chain model [31] to express the relationship between the durations of backoff-timer decrements and those of frame transmissions. This model allows us to handle more detailed operations regarding the backoff operation in the DCF for each node in multi-hop networks.
In addition, an analytical model that employs airtime expressions analysis for FD multi-hop networks has been proposed in [17]. As mentioned previously, each node in an FD multi-hop network often performs HD transmissions; thus, the analytical model for FD multi-hop networks must consider the FD and HD operations for each node. In this model, the airtime expressions and Markov-chain model for the backoff operation in the FD MAC [4] are integrated. This integration allows us to divide transmission airtime into three parts, i.e., the primary (PR), secondary (SC) transmissions, and the HD transmissions. However, the exiting model [17] assumes multi-hop networks with the header snooping-based FD MAC; therefore, this model cannot analyze the performance of multi-hop networks with the RTS/CTS-based FD MAC.
Based on the airtime expression approach, throughput analysis for IEEE 802.11 multi-hop networks with RTS/CTS has been proposed previously [20], and this model was established by extending the concepts presented in [21]. Note that this model assumes a string topology long multi-hop network under the saturated condition. Therefore, the application range of the [20] is limited. Ref. [14] takes into account multi-hop networks with RTS/CTS-based FD MAC, and provides the performance analysis based on an analytical model. Because the model is specified for the evaluations of the performance proposed in [14], extending the model to a general analytical model, which takes into account the essential behaviors in multi-hop networks, such as collisions induced by hidden nodes and NAV operation, under the use of RTS/CTS-based FD MAC. Establishing an analytical model for RTS/CTS-based multi-hop networks with an unlimited application range has been challenging due to the complex behaviors of RTS/CTS operations in multi-hop networks. Therefore, to the best of our knowledge, the extended analytical model for multi-hop networks with RTS/CTS has not been proposed to date.

3. Proposed Throughput Analysis for Multi-Hop Networks with RTS/CTS-Based FD MAC

This section proposes a throughput analysis method for multi-hop networks with RTS/CTS-based FD MAC. Here, we assume a string-topology H-hop network (Figure 6) as the network model [17,20,21,22,23,24]. From the viewpoint of MAC layer operations, the analysis focuses on clarifying the relationship between network performance and an essential operation in RTS-based FD MAC; therefore, the analysis is based on the following assumptions.
  • Only Node 0 generates fixed-sized user datagram protocol (UDP) DATA-frames, whose payload size is P [bytes]. The DATA-frame generation follows Poisson arrival process. The destination of all DATA-frames is Node H.
  • Node i, for i = 1, 2, ⋯, H 1, only relays the DATA-frames received from Node i 1. Relay nodes never generate DATA-frames by themselves.
  • The channel conditions are ideal without errors in the PHY layer; therefore, transmission failures occur due to frame transmission collisions in the MAC layer.
  • The transmission from each node reaches its neighboring nodes in a single hop. In other words, Nodes i 1 and i + 1 are within the transmission range of Node i (Figure 6) [32,33].
  • The carrier-sensing range for each node is the same as its transmission range; therefore, Nodes i and i + 2 form a hidden node relationship [17,20].

3.1. Airtime Expressions

In this analysis, we first derive the expressions of transmission airtime consideration of the RTS/CTS operations. In Figure 3 and Figure 4, the successful and failed durations for frame transmissions are shown as “Successful duration” and “Failed duration”, respectively. In the RTS/CTS-based FD MAC, the successful duration differs from the failed duration due to the exchange of control frames. Note that this difference is not considered in the conventional definition of transmission airtime (Equation (1)); thus, developing an analytical model for RTS/CTS-based FD MACs requires airtime expressions that consider the difference between successful and failed durations.
First, the successful and failed durations of Node i are defined as d i s u c and d i f a i l , respectively. Using transmission failure probability γ i for Node i, the average number of transmission attempts R i for Node i is expressed as follows:
R i = 1 + γ i + γ i 2 + + γ i m ,
where m is the retransmission limit. In other words, R i 1 is the average number of retransmissions for Node i. Therefore, the average transmission duration for a DATA frame is expressed as d i s u c + ( R i 1 ) d i f a i l . Here, the transmission airtime X i for Node i is the probability that Node i is in the transmission state. X i is obtained as the product of frame arrival rate λ i for Node i and the average transmission duration for a DATA–frame as follows:
X i = λ i d i s u c + ( R i 1 ) d i f a i l .
To express the FD MAC operation in multi-hop networks, we obtain the expressions of transmission airtimes for HD, PR, and SC cases. Here, the ratio of the number of HD transmissions to the total number of transmissions with respect to Node i is defined as Φ H D i . Similarly, the ratio of the number of PR (SC) transmissions to the total number of transmissions with respect to Node i is defined as Φ P R i ( Φ S C i ), and these satisfy Φ H D i + Φ P R i + Φ S C i = 1 . Note that the successful (failed) duration for each transmission is different (Table 1). In Table 1, T H D s u c ( T H D f a i l ) express the successful (failed) duration for HD transmissions, and these durations for PR and SC transmissions are expressed as similar to T H D s u c and T H D f a i l , respectively. In Table 1, D I F S and S I F S represent the duration for distributed interframe space and short interframe space, respectively. In addition, R T S , C T S , F C T S , D A T A , and A C K in Table 1 represent the duration for the header part of the DATA–, RTS–, FCTS–, DATA–, and ACK–frame transmissions, respectively.
Following Equation (3), the transmission airtimes for the HD, PR, and SC transmissions for Node i are expressed as
X H D i = Φ H D i λ i T H D s u c + ( R i 1 ) T H D f a i l , X P R i = Φ P R i λ i T P R s u c + ( R i 1 ) T P R f a i l , X S C i = Φ S C i λ i T S C s u c + ( R i 1 ) T S C f a i l ,
respectively. Note that HD, PR, and SC transmissions are disjoint; thus the transmission airtime for Node i is expressed as the sum of the transmission airtime for each case:
X i = X H D i + X P R i + X S C i .
By substituting Equations (3) and (4) into Equation (5), we obtain the relationships as follows:
d i s u c = Φ H D i T H D s u c + Φ P R i T P R s u c + Φ S C i T S C s u c , d i f a i l = Φ H D i T H D f a i l + Φ P R i T P R f a i l + Φ S C i T S C f a i l .
As shown in Equation (6), d i s u c is the mean value of T H D s u c , T P R s u c , and T S C s u c , which is similar to d i f a i l .
By changing the parameter setting as d i f a i l = d i s u c , the proposed analysis can be easily applied to analysis for FD multi-hop networks without RTS/CTS-based FD MAC [17]. This means the proposed model includes all the results of [17].

3.2. Derivations of Φ H D i , Φ P R i , and  Φ S C i

Here, we derive Φ H D i , Φ P R i , and Φ S C i . In the FD multi-hop network, SC transmissions are triggered by PR transmissions; thus, the node begins SC transmissions even if their backoff timer is not zero. In contrast, nodes start PR transmissions when their backoff timer reaches zero. If the receiver of the PR transmission has no DATA-frame, the PR transmitter transmits its frame with HD communication. Here, the ratio of the number of HD and PR transmissions to the number of total number of transmissions for Node i is defined as Δ i . Then, Φ H D i , Φ P R i , and Φ S C i satisfy as follows:
Δ i = Φ H D i + Φ P R i , 1 Δ i = Φ S C i .
From the definition, Δ i can be expressed as the ratio of the number of transmissions with the backoff timer of zero to the total number of transmissions for Node i. Therefore, we derive the ratio from the Markov-chain model consideration of the FD MAC operations, as shown in Figure 7. In the Markov-chain model, state ( s , k ) i shows that Node i stays at the sth backoff stage with its backoff timer of k. The state ( s , k ) i for s [ 0 , m ] , k [ 0 , W s 1 ] belongs to “backoff timer decrement states” and the state ( s , 1 ) i for s [ 0 , m ] belongs to “transmission states”. Note that the transmission states shown in Figure 7 include HD, PR and SC cases. The value of the contention window of s–th backoff stage is W s = 2 s C W m i n , where C W m i n is the value of CWmin. Nodes begin to perform the SC transmission even if their backoff timer is not zero. Using the SC transmission probability β i for Node i, in Figure 7, the transition probability regarding the SC transmissions is expressed as follows:
P { s , 1 | s , k } = β i , k { 1 , W s 1 } .
In addition, the transition probabilities regarding backoff timer decrement and binary exponential backoff in DCF, are expressed as follows:
P { s , k 1 | s , k } = 1 β i , s { 0 , m } , k { 1 , W s 1 } , P { s , 1 | s , 0 } = , s { 0 , m } , P { 0 , k | s , 1 } = 1 γ i W 0 , s { 0 , m } , k { 0 , W 0 1 } , P { s , k | s 1 , 1 } = γ i W s , s { 1 , m } , k { 0 , W s 1 } , P { 0 , k | m , 1 } = 1 γ i W 0 , k { 0 , W 0 1 } .
Here, we define the stationary distribution for each state in the Markov-chain model as π ( s , k ) i . From Equations (8) and (9), we obtain the following relation regarding π ( s , k ) i as follows:
π ( s , k ) i = w ( s , k ) i γ i π ( s 1 , 1 ) i ,
where
w ( s , k ) i = 1 ( 1 β i ) W s k W s β i .
In the Markov-chain model, all arrows with the probability of γ i from the state ( s 1, 1 ) flow into the state ( s , 1) through the backoff timer decrement states. Thus, we obtain the relationships between π ( s 1 , 1 ) i and π ( s , 1 ) i as follows:
π ( s , 1 ) i = γ i π ( s 1 , 1 ) i , for s { 1 , m 1 } , π ( m , 1 ) i = γ i 1 γ i π ( m 1 , 1 ) i .
The sum of the stationary distributions π ( s , k ) i is one. From Equations (10) and (12), we thus obtain the following:
s = 0 m k = 1 W s 1 π ( s , k ) i = π ( 0 , 1 ) i 1 γ i + s = 0 m k = 0 W s 1 w ( s , k ) i γ i s π ( 0 , 1 ) i = 1 .
From Equation (13), we obtain
π ( 0 , 1 ) i = 1 1 1 γ i + s = 0 m k = 0 W s 1 w ( s , k ) i γ i s .
By substituting Equations (11) and (14) into Equations (10) and (12), the stationary distribution of the state ( s , k ) i for s [ 0 , m ] , k [ 1 , W s 1 ] is expressed as a function of the transmission failure probability and the SC transmission probability.
In this model, the state ( s , 0 ) i for s [ 0 , m ] means that backoff timer of Node i is zero at each backoff stage. Therefore, the ratio of the number of transmissions with the backoff timer of zero to the total number of transmissions Δ i can be obtained as the ratio of the sum of the stationary distributions of the states with the backoff timer of zero ( s , 0 ) i for s [ 0 , m ] to the sum of the stationary distributions of the transmission state ( s , 1 ) i for s [ 0 , m ] , which is expressed as:
Δ i = s = 0 m π ( s , 0 ) i s = 0 m π ( s , 1 ) i = s = 0 m w ( s , 0 ) i γ i s ( 1 γ i ) .
From Equations (7) and (15), the ratio of the number of SC transmissions to the total number of transmissions Φ S C i for Node i is obtained as a function of the transmission failure probability γ i and SC transmission probability β i as follows:
Φ S C i = 1 s = 0 m w ( s , 0 ) i γ i s ( 1 γ i )
Here, we define the ratio of the number of the HD transmissions to the sum of the numbers of HD and PR transmissions for Node i as Ω i . From the definition, Φ H D i , Φ P R i , and Ω i satisfy the following:
Ω i = Φ H D i Φ H D i + Φ P R i = Φ H D i Δ i , 1 Ω i = Φ P R i Φ H D i + Φ P R i = Φ P R i Δ i .
From the characteristics of FD multi-hop networks as shown in Figure 3, the number of the successful PR transmissions for Node i equals that of the SC transmission attempts for Node i + 1 [17]. Therefore, using Ω i , we obtain the following relationship:
Δ i ( 1 Ω i ) λ i = ( 1 Δ i + 1 ) λ i + 1 R i + 1 .
From Equation (18), we obtain the expression of Ω i as follows;
Ω i = 1 ( 1 Δ i + 1 ) λ i + 1 R i + 1 Δ i λ i .
By substituting Equation (19) into Equation (17), Φ H D i and Φ P R i can be obtained as
Φ H D i = Δ i ( 1 Δ i + 1 ) λ i + 1 R i + 1 λ i
and
Φ P R i = ( 1 Δ i + 1 ) λ i + 1 R i + 1 λ i ,
respectively. As shown in Equations (20) and (21), Φ H D i and Φ P R i are expressed as a function of the transmission failure probability and the SC transmission probability as similar to Φ S C i .

3.3. Carrier-Sensing Airtime: Y i

Carrier-sensing airtime means the probability that the node detects channel busy. The carrier-sensing airtime for a given node in the FD MAC can be expressed as the sum of the transmission airtimes for its neighboring nodes [17,20,21,22,23,24]. Therefore, in the string-topology multi-hop network considered in this paper, the fundamental expression of carrier-sensing airtime for Node i can be obtained as the sum of the transmission airtimes for Nodes i + 1 and i 1. However, we must consider the duplicated transmission duration between Nodes i 1 and i + 1 . In addition, we must consider the holding duration due to the NAV setting for the transmissions from Nodes i 2 and i + 1 . Thus, the proposed analysis includes the NAV duration in a carrier-sensing airtime.
To express the carrier-sensing airtime for Node i, it is divided into two parts. The first part, which is defined as Ψ i ( 1 ) , is the carrier-sensing airtime caused by transmissions from Nodes i 1 and i + 1. The second party, which is defined as Ψ i ( 2 ) , is the carrier-sensing airtime from the NAV setting to protect the DATA-frame transmissions from Node i 2. We derive Ψ i ( 1 ) and Ψ i ( 2 ) for each FD MAC.
In the FD MAC, we must consider the transmission duration from Nodes i 1 and i + 1 , as well as the NAV duration set by the transmissions from Node i + 1 . As explained in Section 2.2, when Node i receives the RTS frame from Node i + 1 , Node i is prohibited transmitting its frame due to the NAV setting until Node i + 1 successfully completes the DATA-frame transmission. Note that the holding duration at Node i due to the NAV setting is updated when Node i + 1 retransmits the RTS frame. In this sense, the holding duration due to the NAV setting is the sum of the duration of transmissions from Node i + 1 and the holding duration due to the updating of the NAV setting. The holding duration at Node i due to the updating the NAV setting has the same length as the duration from the failed RTS transmission to RTS retransmission from Node i + 1 ; thus, its duration is approximately the same length as that of the sum of the durations for the backoff timer decrements for the retransmissions from Node i + 1 . Here, we define the average number of backoff timer decrements for a single successful DATA-frame transmission from Node i as U i . U i can be obtained as the expected recurrence time to the state ( 0 , 1 ) i in the Markov-chain model, which is the inverse number of π ( 0 , 1 ) i , the following equation as follows:
U i = 1 π ( 0 , 1 ) i = 1 1 γ i + s = 0 m k = 0 W s w ( s , k ) i γ i s .
Using U i , Ψ i ( 1 ) (in consideration of the updated NAV duration) is obtained as follows:
Ψ i ( 1 ) = X i 1 X S C i + X i + 1 X S C i + 1 + λ i + 1 U i + 1 C W m i n 2 σ ,
where σ is system slot time.
In RTS/CTS-based FD MAC, Node i sets NAV when it receives FCTS from Node i 1 operating as an HD or SC receiver. This means that Node i sets NAV when Node i − 2 successfully perform HD or SC transmission. This NAV duration has the same length as the DATA transmission duration; thus, Ψ i ( 2 ) is expressed as
Ψ i ( 2 ) = λ i 2 ( Φ H D i 2 + Φ S C i 2 ) D A T A .
Therefore, the carrier–sensing airtime for Node i is expressed as the sum of Ψ i ( 1 ) and Ψ i ( 2 ) ;
Y i = Ψ i ( 1 ) + Ψ i ( 2 ) .

3.4. Frame–Existence Probability: q i

From the Assumption 2 in Section 2.2, the DATA–frame arrival rates λ i for relay nodes are the same as that for Node 0. Therefore, λ i satisfies
O P = λ 0 = λ 1 = = λ H 1 ,
where O is offered load of the network. The frame existence probability for Node i is defined as the probability that Node i has at least one frame in the idle state [23]. This is expressed as the rate of the total time for backoff timer decrements to that under the idle state. From the airtime expressions analysis, the idle airtime Z i is obtained as follows:
Z i = 1 X i Y i .
Therefore, the frame existence probability q i for Node i can be expressed as
q i = min λ i U i σ Z i , 1 = min λ i U i σ 1 X i Y i , 1 .
When q i reaches one, Node i always has at least one frame in its buffer. This situation means that the node is a bottleneck node in the network. In other words, the maximum throughput for the network can be obtained when the frame existence probability at the bottleneck node reaches one [23,24].

3.5. Transmission Failure Probability: γ i

In string-topology multi-hop networks, hidden node collisions between Nodes i and i + 2 occur. Following the airtime expressions analysis, the hidden node collisions are categorized as (1) protocol hidden node collisions, and (2) physical hidden node collisions [22,24].
A protocol hidden node collision occurs at Node i + 1 when Node i begins to transmit a frame while Node i + 2 transmits a frame or Node i + 1 sets NAV. Because Node i senses the PR transmission from Node i + 1 , the transmission from Node i collides with HD or PR transmission from Node i + 2 . Note that Nodes i and i + 2 cannot transmit any frame while Node i + 1 transmits its frame. In addition, transmission failure caused by the frame transmissions from Node i while Node i + 1 is under the NAV operation must be considered. As explained in Section 3.3, the holding duration due to NAV setting at Node i + 1 is expressed as the sum of the duration of frame transmissions from Node i + 2 and the expected duration of backoff timer decrements for retransmissions from Node i + 2 . Because RTS transmissions from Node i fail when Node i starts to transmit a RTS during the NAV of Node i + 1 , the protocol hidden node collision probability γ i ( 1 ) is expressed as
γ i ( 1 ) = X H D i + 2 + X P R i + 2 + λ i + 2 U i + 2 C W m i n 2 σ 1 X i + 1 .
The physical hidden node collision occurs at Node i + 1 when Node i + 2 starts to transmit a frame during the transmissions from Node i. This collision occurs when the value of backoff timer at Node i + 2 is smaller than the duration of a frame transmission from Node i when Node i starts to transmit its frame [24]. Similar to the protocol hidden node collision, Nodes i and i + 2 cannot transmit frames while Node i + 1 transmits a frame. In addition, this collision does not occur when Node i + 2 has been in the transmission state. Therefore, because Node i + 2 performs SC transmission while Node i + 1 performs PR transmissions, the physical hidden node collision probability can be expressed as follows:
γ i ( 2 ) = q i + 2 Z i + 2 s = 0 m k = 0 min ( f , W s ) π ( s , k ) i + 2 1 X i + 1 X H D i + 2 X P R i + 2 ,
where f = [ R T S / σ ] .
Because these transmission failures are disjoint events, the transmission failure probability for Node i can be expressed as
γ i = γ i ( 1 ) + γ i ( 2 ) .

3.6. SC Transmission Probability: β i

The SC transmission at Node i occurs when Node i succeeds in receiving the header part in the DATA-frame or the RTS frame from Node i 1 while Node i is in the backoff timer decrement state. When Node i 1 has no DATA frame to be transmitted, Node i does not perform an SC transmission even if Node i decreases its backoff timer. Therefore, the probability of Node i not performing an SC transmission due to the above case is expressed as ( 1 q i 1 ) q i Z i . In addition, Node i does not perform an SC transmission when Node i 1 senses transmissions from Node i 2 . Note that Node i senses the SC transmission from Node i 1 when Node i 2 is a PR transmitter. Therefore, the probability of Node i not performing the SC transmission due to this case is expressed as ( X H D i 2 + X S C i 2 ) q i Z i . Here, the probability of Node i attempting to transmit a frame with zero backoff timer is defined as τ i , and SC transmission probability for Node i is expressed as
β i = 1 ( 1 q i 1 ) Z i 1 X H D i 2 X S C i 2 τ i 1 ,
where
τ i 1 = s = 0 m π ( s , 0 ) i 1 .

3.7. Derivation of Throughput

From Equations (5), (15), (19), (28), (31) and (32), 6H-algebraic equations are obtained. These equations contain 6H unknown parameters, X i , Δ i , Ω i , q i , γ i , and β i , for i = 0 , 1 , 2 , , H 1 . It is possible to solve the 6 H unknown parameters for the given offered loads O. In this paper, Newton’s method is applied to obtain the 6 H unknown parameters. The maximum network throughput is obtained as the minimum value of O satisfying q i = 1 . If q i < 1 for all nodes, we obtain the network throughput equal to O.

4. Verification of the Proposed Model

In this section, we compare the analytical results with the simulation results to evaluate the validity of the proposed analytical expressions. An H-hop string-topology network is used for the simulation is the string-topology, as shown in Figure 6. System parameters based on the IEEE 802.11 standard are listed in Table 2. Because the FD MAC operation has not been implemented in ns-3 [34], we developed an original network simulator with RTS/CTS-based FD MAC operations (Section 2.2). In the developed simulator, it is assumed that the channel condition is ideal without errors in the PHY layer. Therefore, transmission failures occur due to frame transmission collisions in the MAC layer. Our simulator also provides HD multi-hop network throughput with RTS/CTS, and we confirmed that the throughput completely agreed with that from ns-3.
To confirm the maximum network throughputs, we first examine the frame existence probability q i . Figure 8 shows the frame existence probability q i as a function of offered load O in a five-hop network. As shown in Figure 8, frame existence probability value for each node differs because the impact from collisions, carrier-sensing, and secondary transmissions differs for each node. As shown in Figure 8, the frame existence probability for Node 0 reaches one at the network offered load of 3.59 Mbps while the frame existence probabilities for all other nodes are less than one. This means that Node 0 is the bottleneck node in the network. From Equation (28), the expression of frame-existence probability includes packet arrival rate λ , which depends on networks offered load O. This means the maximum value of frame-existence probability is 1 even in the network with the higher value of O. Because a node whose frame-existence probability is one has at least one data frame in its buffer, the node becomes a bottleneck in a multi-hop network [23]. As a result, end-to-end throughput in the multi-hop network is limited as the constant value of network offered load, which satisfies the frame-existence probability of the bottleneck node is 1. Therefore, the end-to-end throughput is limited as the constant value of the network offered load, which satisfies the frame-existence probability of the bottleneck node in the multi-hop network is 1. As the result the maximum throughput of the five-hop network is considered to be 3.59 Mbps.
Figure 9 shows the end-to-end throughput in the network as a function of the offered load. As shown in Figure 9, the maximum end-to-end throughput is obtained as 3.59 Mbps. Thus, it is confirmed that the maximum throughput from the proposed model agrees with that of the simulation results. The analytical and simulation results of the maximum end-to-end throughputs for HD multi-hop networks are also shown in Figure 9. The analytical results of HD multi-hop networks can be calculated by assuming β i 0 and Φ i = 0 , for i = 0 , 1 , 2 , , H 1 . The results shown in Figure 8 and Figure 9 confirm the validity of the proposed analytical model.
In addition, because RTS/CTS-based FD MAC provides higher maximum throughput, the enhancement of FD communication is confirmed. Because the maximum throughput of a HD multi-hop network with RTS/CTS is 2.77 Mbps, the gain of FD communication in the five hop network is derived as 3.59 / 2.77 = 1.3 . This indicates that the FD communication does not achieve twice the network throughput in the string-topology multi-hop networks. From assumption 1, there is one network flow where only the source node (Node 0) generates the UDP data packet, and the relay nodes relay the data to the next node. The relay nodes generate no data packet by themselves. Therefore, when the secondary transmitter has no frame to relay, nodes in multi-hop networks often transmit DATA-frame in non-FD mode, i.e., HD transmission, even though they are capable of FD communication. This is why communication is not twice that of HD communication in string-topology multi-hop networks. The proposed model considers such unique operations in FD multi-hop networks in Equations (4) and (32).
Figure 10 shows the maximum end-to-end throughput as a function of the number of hops H. It is seen from Figure 10 that the analytical results agree with simulation ones regardless of the number of hops. The maximum end-to-end throughputs for both FD and HD cases decrease as the number of hops increases.
Figure 11 shows the maximum end-to-end throughput of the five-hop network as a function of payload size. It is evident from Figure 11 that the analytical results agree with the simulation results regardless of payload size. However, the analytical results differ for large P values because we assume the transmission failure probability γ is constant for any backoff stage. In Figure 5, Node 0 transmits RTS frames even if the receiver sets a NAV. The NAV duration depends on the payload size P. Therefore, Node 0 fails in the RTS frame transmissions repeatedly during longer NAV durations for larger P. Consequently, the transmission failure probability for each backoff stage is different for larger P. Thus, the maximum throughput for the RTS/CTS-based FD MAC in the analytical result is higher than that in the simulation result for large P values. Because this mechanism is common to HD multi-hop networks with RTS/CTS, the analytical results of HD multi-hop networks with RTS/CTS for large P values differs from the simulation results.
In the case of shorter payload size, on the other hand, it is seen from Figure 9, Figure 10 and Figure 11 that the simulation results beyond the analytical ones slightly. This is also because of the assumption. A node in the network does not fail the RTS frame transmissions repeatedly during shorter NAV durations for smaller P. Therefore, it is stated that the transmission failure probability in the higher backoff stage tends to be an extremely small value. Therefore, it is stated that the gap between the assumption and the behavior of multi-hop networks causes such quantitative errors. Even the proposed analytical expression includes some quantitative errors, which come from the assumption, and the qualitative verification of the proposed model is confirmed from all of the results presented in this paper. Additionally, qualitative verification is also important and useful from the viewpoint of clarifying complex behavior in networks.

5. Conclusions

This paper proposes a throughput analysis model for wireless multi-hop networks with RTS/CTS-based FD MAC. We derived an innovative expression of transmission airtime using successful and failed durations for frame transmissions in RTS/CTS-based FD MAC. The proposed model provides end-to-end throughput of multi-hop networks with RTS/CTS-based FD MAC for any number of hops and any payload size. Comparisons with simulation results confirmed the validity of the proposed model. The proposed analytical model can be easily applied to performance analysis for HD multi-hop networks with RTS/CTS. Therefore, the proposed model can be used to evaluate the performance of RTS/CTS multi-hop networks for FD and HD mathematically.

Author Contributions

Writing—original draft Y.Y.; writing—review and editing, S.S., K.S., H.H. and K.M. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded bythe Scholarship Foundation and Grant-in-Aid for scientific research (No. 17K14681) of JSPS.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Thilina, K.M.; Tabassum, H.; Hossain, E.; Kim, D.I. Medium access control design for full-duplex wireless systems: Challenges and approaches. IEEE Commun. Mag. 2015, 53, 112–120. [Google Scholar] [CrossRef]
  2. Dibaei, M.; Ghaffari, A. Full-duplex medium access control protocols in wireless networks: A survey, Wireless Networks. Wirel. Netw. 2020, 26, 2825–2843. [Google Scholar] [CrossRef]
  3. Kim, D.; Lee, H.; Hong, D. A survey of in-band full-duplex transmission: From the perspective of PHY and MAC layers. IEEE Commun. Surv. Tutor. 2015, 17, 2017–2046. [Google Scholar] [CrossRef]
  4. Mohammady, R.D.; Naderi, M.Y.; Chowdhury, K.R. Performance analysis of CSMA/CA based medium access in full duplex wireless communications. IEEE Trans. Mob. Comput. 2016, 15, 1457–1470. [Google Scholar] [CrossRef] [Green Version]
  5. Sanada, K.; Mori, K. Performance analysis of full duplex MAC protocols for wireless local area networks with hidden node collisions. IEICE Trans. Commun. 2020, E103–B, 804–814. [Google Scholar] [CrossRef]
  6. Song, Y.; Qi, W.; Zhao, W.; Cheng, W. Full-Duplex MAC Protocol for CSMA/CA-Based Single-Hop Wireless Networks. Sensors 2019, 19, 2413. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  7. Jain, M.; Choi, J.; Kim, T.; Bharadia, D.; Seth, S.; Srinivasan, K.; Levis, P.; Katti, S.; Sinha, P. Practical, real-time, full duplex wireless. In Proceedings of the 17th Annual International Conference on Mobile Computing and Networking (MobiCom), NewYork, NY, USA, 19–23 September 2011; pp. 301–312. [Google Scholar]
  8. Marlali, D.; Gurbuz, O. Design and performance analysis of a full-duplex MAC protocol for wireless local area networks. Ad Hoc Netw. 2017, 67, 53–67. [Google Scholar] [CrossRef]
  9. Cheng, W.; Zhang, X.; Zhang, H. RTS/FCTS mechanism based full-duplex MAC protocol for wireless networks. In Proceedings of the 2013 IEEE Global Communications Conference (GLOBECOM), Atlanta, GA, USA, 9–13 December 2013. [Google Scholar]
  10. Guimarães, L.M.; Bordim, J.L. An efficient MAC scheme for full-duplex communications on wireless networks. In Proceedings of the 2018 IEEE Wireless Communications and Networking Conference (WCNC), Barcelona, Spain, 15–18 April 2018. [Google Scholar]
  11. Alim, A.; Saruwatari, S.; Watanabe, T. Asym-FDMAC In-band full-duplex medium access control protocol for asymmetric traffic in wireless LAN. Wirel. Netw. 2020, 26, 807–822. [Google Scholar] [CrossRef]
  12. Tamaki, K.; Raptino, H.A.; Sugiyama, Y.; Bandai, M. Full duplex media access control for wireless multi-hop networks. In Proceedings of the 2013 IEEE 77th Vehicular Technology Conference (VTC Spring), Dresden, Germany, 2–5 June 2013. [Google Scholar]
  13. Sugiyama, Y.; Tamaki, K.; Saruwatari, S.; Watanabe, T. A wireless full-duplex and multi-hop network with collision avoidance using directional antennas. In Proceedings of the 2014 Seventh International Conference on Mobile Computing and Ubiquitous Networking (ICMU), Singapole, 6–8 January 2014; pp. 38–43. [Google Scholar]
  14. A-Kadri, M.O.; Aijaz, A.; Nallanathan, A. An energy-efficient full-duplex MAC protocol for distributed wireless networks. IEEE Wirel. Commun. Lett. 2016, 5, 44–47. [Google Scholar] [CrossRef] [Green Version]
  15. Chen, Y.D.; Chen, I.J.; Shih, K.P. An in-band full duplex MAC protocol with interference free for next generation WLANs. In Proceedings of the 2018 International Conference on Electronics Technology (ICET), Chengdu, China, 23–27 May 2018; pp. 407–410. [Google Scholar]
  16. Alim, M.A.; Kobayashi, M.; Saruwatari, S. Watanabe. In-band full-duplex medium access control design for heterogeneous wireless LAN. EURASIP J. Wirel. Commun. Netw. 2017, 2017, 83. [Google Scholar] [CrossRef]
  17. Fujimura, C.; Sanada, K.; Mori, K. Analytical expressions for end-to-End throughput of string-topology wireless full-duplex multi-hop networks. IEICE Trans. Commun. 2019, E102-B, 1160–1169. [Google Scholar] [CrossRef]
  18. Yin, W.; Hu, P.; Indulska, J.; Portmann, M.; Mao, Y. MAC-layer rate control for 802.11 networks: A survey. Wirel. Netw. 2020, 26, 3793–3830. [Google Scholar] [CrossRef]
  19. Holland, P.; Bahl, P. A rate-adaptive MAC protocol for multi-hop wireless networks. In Proceedings of the 7th Annual International on Mobile Computing and Networking (MOBICOM), Roma, Italy, 16–21 July 2001; Association for Computing Machinery: New York, NY, USA, 2001; pp. 236–251. [Google Scholar]
  20. Sugimoto, T.; Komuro, N.; Sekiya, H.; Sakata, S.; Yagyu, K. Maximum throughput analysis for RTS/CTS-used IEEE 802.11 DCF in wireless multi-hop networks. In Proceedings of the International Conference on Computer and Communication Engineering (ICCCE’10), Kuala Lumpur, Malaysia, 11–12 May 2010; pp. 1–6. [Google Scholar]
  21. Ng, P.C.; Liew, S.C.C. Throughput analysis of IEEE 802.11 multi-hop ad hoc networks. IEEE/ACM Trans. Netw. 2007, 15, 309–322. [Google Scholar] [CrossRef]
  22. Gao, Y.; Chiu, D.; Lui, J. Determining the end-to-end throughput capacity in multi-hop networks: Methodology and applications. In Proceedings of the 2006 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, Saint Malo, France, 9–14 June 2006; Association for Computing Machinery: New York, NY, USA, 2006; pp. 39–50. [Google Scholar]
  23. Sanada, K.; Shi, J.; Komuro, N.; Sekiya, H. End-to-end delay analysis for IEEE 802.11 string-topology multi-hop networks. IEICE Trans. Commun. 2015, E98-B, 1284–1293. [Google Scholar] [CrossRef] [Green Version]
  24. Sanada, K.; Kumuro, N.; Li, Z.; Pei, Y.J.; Choi, H.; Sekiya, H. Generalized analytical expressions for end-to-end throughput of IEEE 802.11 string-topology multi-hop networks. Ad Hoc Netw. 2018, 70, 135–148. [Google Scholar] [CrossRef]
  25. Jawhara, I.; Moham, N.; Agrawalb, D.P. Linear wireless sensor networks: Classification and applications. J. Netw. Comput. Appl. 2011, 34, 1671–1682. [Google Scholar] [CrossRef]
  26. Kim, S.; Lee, S.; Choi, S. The impact of IEEE 802.11 MAC strategies on multi-hop wireless mesh networks. In Proceedings of the 2006 2nd IEEE Workshop on Wireless Mesh Networks, Reston, VA, USA, 25–28 September 2006; pp. 38–47. [Google Scholar]
  27. Leu, F.Y.; Huang, Y.T. Maximum capacity in chain-topology wireless mesh networks. In Proceedings of the 2008 Wireless Telecommunications Symposium, Pomona, CA, USA, 24–26 April 2008; pp. 250–259. [Google Scholar]
  28. Lai, W.; Ni, W.; Wang, H.; Liu, R.P. Analysis of average packet loss rate in multi-hop broadcast for VANETs. IEEE Commun. Lett. 2017, 22, 157–160. [Google Scholar] [CrossRef]
  29. Pinto, L.R.; Almeida, L.; Alzadeh, H. Aerial video stream over multi-hop using adaptive TDMA slots. In Proceedings of the 2017 IEEE Real-Time Systems Symposium (RTSS), Paris, France, 5–8 December 2017. [Google Scholar]
  30. Zhao, C.; Sun, W.; Fang, Z.; Wang, J.; Li, Q.; Zhang, H. End-to-end delay optimisation for IEEE 802.11 string topology multi-hop wireless networks in overhead transmission line system. IET Commun. 2021, 15, 487–495. [Google Scholar] [CrossRef]
  31. Bianchi, G. Performance analysis of the IEEE 802.11 distributed coordination function. IEEE J. Sel. Areas Commun. 2000, 18, 535–547. [Google Scholar] [CrossRef]
  32. Xu, K.; Gerla, M.; Bae, S. Effectiveness of RTS/CTS handshake in IEEE 802.11 abased ad hoc networks. Ad Hoc Netw. 2003, 1, 107–123. [Google Scholar] [CrossRef]
  33. Xu, K.; Gerla, M.; Bae, S. How effective is the IEEE 802.11 RTS/CTS handshake in ad hoc networks. In Proceedings of the Global Telecommunications Conference, GLOBECOM ’02, Taipei, Taiwan, 17–21 November 2002; pp. 72–76. [Google Scholar]
  34. Network Simulator 3. Available online: https://www.nsnam.org (accessed on 24 December 2021).
Figure 1. Unidirectional FD communication.
Figure 1. Unidirectional FD communication.
Electronics 11 00892 g001
Figure 2. A three-hop network.
Figure 2. A three-hop network.
Electronics 11 00892 g002
Figure 3. Channel-access example. of the RTS/CTS-based FD MAC in the three-hop network (Figure 2): (a) Node 0’s RTS transmssion, (b) Node 1’s FCTS transmission, (c) Node 2’s FCTS transmission, (d) Node 3 setting NAV, and (e) Nodes 0 and 1 begin to transmit their DATA-frames through FD transmission.
Figure 3. Channel-access example. of the RTS/CTS-based FD MAC in the three-hop network (Figure 2): (a) Node 0’s RTS transmssion, (b) Node 1’s FCTS transmission, (c) Node 2’s FCTS transmission, (d) Node 3 setting NAV, and (e) Nodes 0 and 1 begin to transmit their DATA-frames through FD transmission.
Electronics 11 00892 g003
Figure 4. Channel-access failure example of the RTS/CTS-based FD MAC in the three-hop network (Figure 2): (a) a collisison bertween Node 0’s RTS transmiission and Node 1’s RTS one, and (b) Node 0 fails in its RTS transmission, then attmepts to retransmit the RTS.
Figure 4. Channel-access failure example of the RTS/CTS-based FD MAC in the three-hop network (Figure 2): (a) a collisison bertween Node 0’s RTS transmiission and Node 1’s RTS one, and (b) Node 0 fails in its RTS transmission, then attmepts to retransmit the RTS.
Electronics 11 00892 g004
Figure 5. Transmission failure caused by NAV operation in the three-hop networks (Figure 2): (a) Node 1 setting NAV, (b) Node 0’s RTS transmission failure, and (c) Node 0 attempts to transmit RTS frames repeatedly; however, Node 1 cannot reply to the RTSs due to the NAV.
Figure 5. Transmission failure caused by NAV operation in the three-hop networks (Figure 2): (a) Node 1 setting NAV, (b) Node 0’s RTS transmission failure, and (c) Node 0 attempts to transmit RTS frames repeatedly; however, Node 1 cannot reply to the RTSs due to the NAV.
Electronics 11 00892 g005
Figure 6. H-hop string-topology network.
Figure 6. H-hop string-topology network.
Electronics 11 00892 g006
Figure 7. Markov–chain model for FD MAC with respect to Node i.
Figure 7. Markov–chain model for FD MAC with respect to Node i.
Electronics 11 00892 g007
Figure 8. Frame existence of each node in the five-hop network as a function of offered load.
Figure 8. Frame existence of each node in the five-hop network as a function of offered load.
Electronics 11 00892 g008
Figure 9. End-to-end throughput of the five-hop network as a function of offered load.
Figure 9. End-to-end throughput of the five-hop network as a function of offered load.
Electronics 11 00892 g009
Figure 10. Maximum end-to-end throughput and gain of FD communication as a function of number of hops H.
Figure 10. Maximum end-to-end throughput and gain of FD communication as a function of number of hops H.
Electronics 11 00892 g010
Figure 11. Maximum end-to-end throughput of five–hop network as a function of payload size.
Figure 11. Maximum end-to-end throughput of five–hop network as a function of payload size.
Electronics 11 00892 g011
Table 1. Successful and failed durations for HD–, PR–, and SC–transmission cases.
Table 1. Successful and failed durations for HD–, PR–, and SC–transmission cases.
NotationExpression
T H D s u c D I F S + R T S + 3 · S I F S + C T S + D A T A + A C K
T H D f a i l D I F S + R T S + S I F S + C T S
T P R s u c D I F S + R T S + 4 · S I F S + 2 · F C T S + D A T A + A C K
T P R f a i l D I F S + R T S + S I F S + F C T S
T S C s u c D I F S + 4 · S I F S + 2 · F C T S + D A T A + A C K
T S C f a i l D I F S + 2 · S I F S + 2 · F C T S
Table 2. Simulation parameters.
Table 2. Simulation parameters.
ParameterValue
Payload size (P)500 bytes
Data rate54 Mbps
ACK, RTS, CTS, FCTS bit rate12 Mbps
ACK32 μs (14 bytes)
RTS36 μs (20 bytes)
FCTS36 μs (20 bytes)
CTS32 μs (14 bytes)
SIFS16 μs
DIFS34 μs
CWmin ( C W m i n )16
CWmax1024
Retry limit7
slot time ( σ )9 μ
Distance of each node45 m
Transmission range60 m
Carrier-sensing range60 m
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Yumen, Y.; Sakakura, S.; Sanada, K.; Hatano, H.; Mori, K. Throughput Analysis for Wireless Full-Duplex Multi-Hop Networks with RTS/CTS-Based MAC. Electronics 2022, 11, 892. https://doi.org/10.3390/electronics11060892

AMA Style

Yumen Y, Sakakura S, Sanada K, Hatano H, Mori K. Throughput Analysis for Wireless Full-Duplex Multi-Hop Networks with RTS/CTS-Based MAC. Electronics. 2022; 11(6):892. https://doi.org/10.3390/electronics11060892

Chicago/Turabian Style

Yumen, Yosuke, Shota Sakakura, Kosuke Sanada, Hiroyuki Hatano, and Kazuo Mori. 2022. "Throughput Analysis for Wireless Full-Duplex Multi-Hop Networks with RTS/CTS-Based MAC" Electronics 11, no. 6: 892. https://doi.org/10.3390/electronics11060892

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop