1. Introduction
Mobile ad hoc networks, which do not rely on central control devices or infrastructure for establishment, empower devices to connect directly through communication. This facilitates the sharing of resources and information without the need for preplanned or fixed infrastructure configuration. Especially valuable in dynamic or temporary settings, these networks have practical applications in scenarios like military operations, disaster recovery, or mobile device communication [
1]. These networks are mobile devices with wireless communication capabilities collaborating interactively, offering benefits like distributed control, dynamic topology, and flexible networking [
2,
3]. However, they face challenges, including limited transmission bandwidth, scalability issues, and constrained node energy [
4].
Smart antenna technology, operating as a physical layer technology within ad hoc networks, employs sophisticated signal processing and control techniques [
5]. The primary objective is to dynamically modify antennas’ radiation pattern and orientation, adapting them to network conditions’ fluctuations. This capability allows smart antennas to optimize signal transmission, improve directionality, and respond effectively to the evolving communication environment within ad hoc networks [
6]. Smart antennas in wireless ad hoc networks allow for a significantly extended single-hop communication range and enhanced spatial reuse compared to traditional omnidirectional antennas under equivalent power conditions [
7].
In the ad hoc network, the wireless medium remains open and is utilized by multiple nodes. Without proper control over resource acquisition, several nodes might attempt simultaneous access. The Medium Access Control (MAC) protocol aims to establish rules that facilitate efficient and equitable sharing of the shared wireless channel [
8,
9]. Integrating MAC protocols with smart antenna technology can enhance the system’s overall performance, encompassing communication speed, coverage range, and reliability [
10]. Consequently, extensive research has been conducted to explore the synergies and advancements offered by this combination [
11]. These protocols can be broadly categorized into three types based on different channel access methods [
9]. The first is contention-based access MAC layer protocols [
6,
12,
13]. In this approach, wireless nodes compete for channel resources in a contention manner to establish communication. This method eliminates the need for complex time synchronization and spatial scheduling. However, as network load increases, data conflicts and retransmissions significantly increase, leading to a noticeable degradation in system performance. Secondly, there are reservation-based MAC layer protocols, where wireless channel resources are preallocated according to standards such as time, frequency, etc. Typical representatives include Time Division Multiple Access (TDMA), Frequency Division Multiple Access (FDMA), and Code Division Multiple Access (CDMA) [
14]. Among these, TDMA-based reservation MAC layer protocols commonly employ dynamic slot allocation methods [
15,
16,
17]. Compared to other protocols, it significantly improves network resource utilization. However, it also introduces issues such as slow network convergence. Thirdly, hybrid access MAC layer protocols integrate contention characteristics and reservation-based protocols [
18,
19,
20]. An example is the Zebra MAC (Z-MAC) protocol [
18], which utilizes the contention-based mechanism for basic channel access and employs the TDMA mechanism to address the performance degradation of contention under heavy network loads. Boarder Node MAC (BN-MAC) in [
19] applied several promising models to realize a better performance of the network, which can support the multiple application domains in the realistic world. Energy Efficient MAC (EE-MAC) protocol in [
20] introduced an improved MAC protocol that enhances throughput and decreases energy consumption by minimizing idle listening, overhearing, and shortening the preamble size.
TDMA schemes are extensively employed in directional communication because they can establish a transmission schedule devoid of conflicts, thus mitigating issues related to deafness and capture effects [
15,
16,
17]. However, there are some inherent drawbacks when applying the TDMA protocols with smart antennas for long-distance transmissions in ad hoc networks. These include significant propagation delays, which result in many channel access conflicts. The delay reduces channel utilization and transmission efficiency. To account for the considerable delay during transmission, TDMA mechanisms require nodes in the network to send data in advance. However, this can cause conflicts with adjacent time slots and issues with spatial reuse within a single hop. Additionally, there are limitations in conflict resolution, high control overhead for channel resource reservation, and insensitivity to network scale changes inherent in TDMA-based MAC layer protocols.
To overcome the abovementioned problems, we propose a distributed dynamic TDMA-based MAC layer protocol called State Interaction-based Slot Allocation Protocol (SISAP). This protocol is specifically designed for long-distance wireless ad hoc networks, such as the one illustrated in
Figure 1. In this scenario, the nodes in the network are widely spaced apart, and there is a significant wireless transmission delay between them. When combined with smart antennas, the MAC layer in the network is primarily responsible for slot resource allocation, where nodes in the network complete data transmission and reception tasks in corresponding slots according to the latest slot allocation results. At the physical layer, smart antenna technology facilitates wireless signal transmission and reception through beamforming techniques, enabling dispersed nodes in the network to achieve data transmission independently of infrastructure support.
The network nodes in this system adopt a receive-align mechanism to address the challenges of significant delays in ultra-long-distance transmissions. Nodes in the network send data in advance. Time slots are allocated based on node state information, which enhances spatial reuse and prevents conflicts of advancement between adjacent time slots. This approach effectively mitigates interference between links. The time slot allocation method uses a “request-response” approach coupled with a distributed dynamic time slot allocation algorithm that can adapt to changes in the network environment. Hence, the major contributions are as follows:
Proposing a dynamic MAC layer protocol with a flexible frame structure that can adapt to changes in network size.
Addressing the issue of excessive delays over long distances by requiring nodes to align the reception of data packets with the beginning of time slots. Additionally, resolving conflicts arising from advance transmission in adjacent time slots based on node state information.
Introducing an interference avoidance strategy to mitigate interference between wireless links effectively.
Employing a distributed dynamic time slot allocation based on the “allocate blocks first, then allocate fragment slots” strategy. This approach ensures fairness while maintaining the aggregation of allocated transmission slots for specific requesting nodes. This strategy reduces the frequency of beam direction switching, lowering node power consumption and theoretically minimizing end-to-end latency in the system.
The paper is structured as follows:
Section 2 summarizes the related works.
Section 3 includes the detailed design of the MAC protocols, which covers the network requirements and the MAC layer protocol. We evaluate the performance of the MAC protocol with simulation in
Section 4. Finally,
Section 5 concludes the paper.
2. Related Works
In this section, we will include the related works and the problem formulation.
A reservation-based access MAC layer protocol based on TDMA usually uses dynamic slot allocation methods. One such protocol is the [
21]. This study proposes a Unifying Slot Allocation Protocol (USAP), which assigns or releases time slots when nodes join or leave the network. However, USAP needs to provide enough slots to allocate for all nodes in the network, which leads to low channel utilization as the number of unassigned slots increases with an increase in the number of nodes in the network. In [
22], the authors introduce an Adaptive Slot Allocation Protocol (ASAP) to improve channel utilization by considering the autonomous behavior of nodes. It proposes an adaptive TDMA protocol that increases the frame length as the number of nodes increases, but this can lead to underutilization of channel bandwidth. In [
23], the authors present an Extended ASAP (E-ASAP) that allows each node to minimize the frame length by providing more detailed information in the ASAP control packet. This drastically improves channel utilization. However, when the frame length halves, some nodes may need to reselect the slots, and some idle slots may exist during topology changes, which negatively affects the throughput performance. According to a research study by Zhu, C. et al. [
24], another protocol for TDMA slot allocation is presented. This protocol involves a five-phase reservation process that uses a contention-based random selection among nodes within a two-hop neighborhood. This method has been proven to significantly reduce dynamic TDMA slot conflicts, which makes it an ideal choice for large and mobile networks. However, it has some drawbacks, such as increased complexity, overhead, and delay with each running cycle, which harms throughput. Additionally, this protocol only supports omnidirectional antennas and does not facilitate point-to-point data transmission within the network.
As technology advances, the directional TDMA-based MAC protocol has significantly improved special reuse efficiency and flexibility [
7,
25,
26,
27,
28,
29,
30]. The primary process for managing channel resources consists of three parts: neighbor discovery, reservation, and data transmission. In [
25], Zhang, Z. et al. introduced the Directional Transmit and Receive Algorithm (DTRA), a classical synchronous protocol for directional ad hoc networks. This distributed protocol can dynamically assign slots to links based on traffic demand. However, the proportion of data transmission and the frequency of time-slot allocation in DTRA is relatively low. To minimize the influence of the propagation delay, in [
27], the authors introduced guard spaces in mini-slots. This method can help reduce the impact of propagation delays. However, it might lead to a waste of channel resources. In [
26], Cha. et al. proposed a protocol designed to reduce end-to-end delay in multi-hop networks. In the network, before the start of a session, all the relay nodes on the path from source to destination reserve consecutive time slots to deliver a packet within one data transmission phase. This approach can effectively reduce the latency of data transmission across multiple-hop links. Nevertheless, if a multi-hop link persistently occupies channel resources, it may cause an imbalance in the allocation of channel resources among links in the network. The slot allocation process involves combining the time slots available to both the transmitter and receiver to meet the communication needs of the nodes in the network [
28]. This determination of available time slots can increase network efficiency and reduce communication link conflicts to a certain extent. In a recent study [
30], the authors proposed a novel mechanism to reallocate the slots by categorizing them into four states to achieve fair resource allocation. However, the determination of the available time slot states does not consider the direction of link data transmission, which can negatively impact network performance.
The TDMA protocol can be divided into two groups based on how channel resources are allocated, namely, the centralized-based [
31] and the distributed-based [
32,
33,
34,
35,
36]. In the centralized scheme, a master node manages the scheduling of channel resources to maximize network efficiency. However, if the master node fails, the entire network is at risk of disruption, which could compromise network stability. On the other hand, distributed schemes are better suited for dynamic networks, but they require a significant exchange of control messages to achieve distributed slot allocation. For example, the algorithm proposed in the study [
32] demonstrates improved link delay and fairness performance by incorporating functions for requesting and releasing free time slots and load balancing. However, achieving fair distribution requires nodes to exchange two-hop neighbor information, increasing control overhead. Ultimately, the significant exchange of control messages results in elevated control overhead and reduced channel resource utilization.
Interference issues can occur in wireless communication links due to the broad main lobe of antennas. To address this problem, a complex TDMA-based protocol is employed, as outlined in [
37]. Jakllari et al. introduced the idea that nodes translate RTS and CTS signals before data transmission to prevent interference. However, this approach does not consider interference during the reservation phase. In [
17], the authors provide an interference avoidance strategy. This strategy involves communication nodes sharing a list of slots susceptible to interference. Each node updates its list based on received data about definite slot states. However, since the network environment is dynamic, a delayed update of slot lists can result in interference within the network.
Table 1 illustrated the advantages and disadvantages of related works mentioned in this section.
In ultra-long-distance ad hoc networks, meticulous consideration of the substantial transmission delay of wireless signals is imperative to ensure precise communication synchronization among nodes. We assume a scenario wherein a node within the network is situated at a distance of 10 km. Under the assumption that wireless signals propagate at the speed of light, the propagation delay of such wireless signals can be calculated by Equation (
1).
The duration of wireless data transmission is estimated to be 33 ms. However, when factoring in the processing delay of a data packet in hardware devices, which amounts to approximately 100 ms, and comparing it with the duration of a time slot set at 200 ms, it becomes evident that the significant transmission delay of wireless signals cannot be disregarded. To solve the problem, we employ a method of pre-transmitting data and synchronizing the start of time slots at the receiving end to mitigate the propagation delay of wireless signals. However, this approach can potentially introduce conflicts due to anticipation between adjacent time slots. Hence, addressing and preventing conflicts arising from the adjacent slots is imperative. Moreover, the unique characteristics of wireless links in ad hoc networks can lead to interference when attempting spatial reuse. Consequently, channel resource allocation algorithms must mitigate interference between different links.
The MAC protocol design not only tackles these challenges but also ensures dynamic and efficient utilization of channel resources. To achieve a more practical MAC protocol, we employ the TDMA scheme to combine the interaction of different node states. The problems mainly lie in the frame structure’s design, the node states definition, how to cooperate with the node states to solve the propagation delay advance compensation, and the slot allocation algorithm.
3. System Model and MAC Protocol
3.1. Assumptions
Before describing a new MAC protocol, we list the assumptions and conditions our works rely on and capitalize on as follows.
All nodes in the network have the same equipment and use smart antenna technology in their physical layer.
The nodes in the network are accurately synchronized.
All neighboring nodes within the network have symmetrical relationships.
Nodes in the system can only communicate with a single neighbor at any given time. However, multiple pairs of nodes can communicate simultaneously during the same time slot, achieving spatial reuse.
3.2. MAC Protocol Design
3.2.1. Frame Structure
The network is divided into superframes, each consisting of
N frames with a duration of 1 s. Each frame contains
M slots, and nodes use TDMA to access the channel within each frame. The initial
K frames are designated for monitoring purposes, facilitating network synchronization, access, and the discovery of various network clusters. The remaining
frames operate on a TDMA basis and are responsible for slot allocation, establishing and maintaining the network topology, transmitting upper-layer business data, and broadcasting packets. The TDMA frame includes
P time slot allocation and
data transmission frames. Each slot allocation frame is allocated to a central responding node to complete local slot allocation within its one-hop neighbor range. Thus,
P nodes can be distributed within each superframe to perform slot allocation work within their local area. During the data transmission frames, nodes transmit business data based on the slot allocation results.
Figure 2 illustrates the structure of the superframe. As a decentralized distributed self-organized network, nodes periodically employ a “request-response” approach to allocate channel resources. The receiving end determines the final slot allocation results. The allocated slots will used to send data to the slot allocation (SA) node. This process can significantly reduce the frequency of node information exchanges during the channel resource allocation process. The SA frame is divided into five parts: synchronization, time slot request, data transmission, slot allocation answer, and guard time slots. The specific function of each part within the frames is as follows.
Synchronization: This involves sending synchronization control packets in every frame to ensure that the nodes in the network are synchronized. Although it is a crucial process component, it is not the primary element of slot allocation.
Time slot request: Within each time slot allocation frame, a specific node is designed for the current time slot allocation. The neighboring node (requesting node) of the current time slot allocation node sends a slot allocation request (SAR) to it using directional transmission and reception methods.
Data transmission: During this phase, the slot allocation node (responding node) computes the time slot allocation and transfers data to other nodes concurrently. On the other hand, requesting nodes exclusively transmit data in this phase.
Slot allocation answer (SAA): The responding node provides feedback regarding the slot allocation results and related information to each requesting node. The related information includes the request order of the next time for the requesting node and angle information for neighboring nodes, which will be utilized in
Section 3.3. The angle information is formed by any two neighboring nodes with the responding node as the vertex. A responding node has U neighbors, resulting in a total of
possible combinations of angle information. Finally, the requesting nodes receive the result directionally.
Guard time slots: Two persistent guard time slots are implemented between each segment to prevent confusion caused by transmission delays that may occur at different stages.
3.2.2. The Time Slot Request
After setting up the network, each node completes synchronization, discovers neighbors, and measures information. In the next dynamic time slot allocation phase, the neighbors send a SAR to the current slot allocation node. The SAR data include the states of all the slots in the transmission section and the number of slots needed to communicate with the slot allocation node. Since SAR transmission and reception use directional antennas, both the sending and receiving nodes must know when and where to handle the SAR signal. In cases where a node, like Node A, acts as the slot allocation node for the first time, its neighbors are unaware of the timing to transmit the SAR to Node A. Under such circumstances, both the sending and receiving Node A will disregard slot allocation at that moment. Node A will finalize the next cycle’s slot request order information. Alternatively, suppose a node has previously served as the slot allocation node. In that case, both its neighbors and the node itself possess information about the sequence for transmitting the SAR derived from the content of the last slot allocation result.
3.2.3. The Dynamic Update of The Node’s States
The functionality of distributed dynamic slot allocation at the MAC layer relies on the interaction of state information between the nodes. Each node in the network has different states to their neighbors in different time slots during the data transmission section. To ensure smooth transmission, nodes need to update the slot states in the local states table (lnsTAB) before sending SAR data and after receiving SAA data. Based on the determined time sequence, the slot states of nodes can be classified into three categories: transmission/reception state, occupancy state, and blocking state.
The network node, such as Node A, updates lnsTAB slot by slot before transmitting SAR data to the slot allocation node. The following steps are taken.
Step 1: Transmission/Reception State
Transmission: In the current slot, the node sends data (without necessarily specifying transmission to Node A).
Reception: In the current slot, the node receives data (without necessarily specifying reception to Node A).
Idle: In the current slot, the node is doing nothing.
Step 2: Occupancy State
Occupancy: Following Step 1, detection and assessment are performed on the determined “transmission” state slots. If the node has already been allocated for transmission to a node other than Node A in the current slot, that slot’s “transmission” state is updated to “transmission occupied”. This ensures that slot allocation results will not interfere with the allocation results of other nodes when they act as slot allocation nodes. This guarantees that the slot allocation results are conflict-free.
Step 3: Blocking State
In the MAC protocol, nodes use a reception alignment approach to manage the significant transmit delay during long-distance communication, as illustrated in
Figure 3. In
Figure 3,
and
represent the data packet transmission lead times for slots 1 and 2, respectively. However, there are situations where the advance of adjacent time slots may lead to conflicts, as indicated by the overlapping region in
Figure 3. To cope with this problem, we adopt the blocking states.
After confirming the transmission/reception states, in order to avoid conflicts in the adjacent time slot advancement, we will determine the blocking states of the “Idle” time slots in Step 1.
For the “Idle” time slots, based on the different states of the two adjacent time slots and the neighbor topology information, the blocking states are determined one by one. Considering the impact of the actual system transmitter having to send in advance according to the signal propagation delay, the blocking states can be categorized into four different scenarios based on the states of time slots. The determination process of the states of the time slot is illustrated in
Table 2.
3.3. The Interference Self-Avoidance Strategy
The adoption of the SISAP protocol, along with the use of smart antennas, allows for special reuse in the system. However, due to the directional transmission and reception of the signals, interference may occur between different links sharing the same time slot. For instance, in
Figure 4, when Link1 and Link2 transmit data at the same time slot, it can result in an overlap between the transmission lobe of Link2 and the receive lobe of Link1. This interference from Link2 may cause the signal-to-interference-plus-noise ratio (SINR) for Node
A in the current time slot to deteriorate, leading to packet loss.
To avoid interference, we adopt the interference self-avoidance strategy (IAS). We introduce a new definition of the “transmission blocking” state, which refers to a situation in the distributed time slot allocation process where a requesting node aims to transmit on a specific time slot that is already occupied by several wireless links in the network (denoted as the set L). If the requesting node’s occupation of this time slot for transmission could potentially interfere with the reception nodes of at least one hop link in set L, the requesting node classifies the state of that time slot as “transmission blocking”.
We establish a link interference information table (liiTAB) in
Table 3 that contains sets of valid links in the network for each time slot, relative angle information, and other pertinent details. The requesting node refers to the liiTAB when determining the “transmission blocking” states. This table includes information about all neighbors within the one-hop communication range of the requesting node, which is maintained by the requesting node. The requesting node refers to the liiTAB when determining the “transmission blocking” states.
Node ID: It stands for the different nodes in the network differentiated by ID.
Latest time slot allocation results: They stand for the latest slot allocation results of the different neighboring nodes when they serve as the slot allocation nodes. It is assumed that the data transmission section compromises M slots.
Neighbor relative angle information: It represents the angle size formed with two different neighboring nodes, considering the corresponding node (in different rows) as the vertex. The angle sizes are classified as either “large” or “small” (considered “large” if greater than half of the main beam width). This characterization represents the “wide” or “narrow” angles between two neighboring nodes. When a node has U neighboring nodes, the maximum number of angle combinations for neighbor angle information is .
Finally, according to the description above, the proposed Algorithm 1 illustrates the progress in determining the presence of interference. We define the local node as
.
Algorithm 1 The algorithm for interference self-avoidance. |
- Input:
The local node’s states Table (lnsTAB), and the link interference information table (liiTAB). - Output:
The update of the local node’s states Table (lnsTAB).
- 1:
for in do - 2:
for in do - 3:
if then - 4:
for in do - 5:
if or then - 6:
continue; - 7:
else - 8:
Look up the formed by taking the receiving node at as the vertex in relation to the transmitting node of and , within the ; - 9:
if is then - 10:
Look up the formed by taking the as the vertex, in relation to the receiving node of and , within the ; - 11:
if is then - 12:
continue; - 13:
else - 14:
The state of the to within the ← ; - 15:
end if - 16:
else - 17:
The state of the to within the ← ; - 18:
end if - 19:
end if - 20:
end for - 21:
end if - 22:
end for - 23:
end for
|
3.4. The Slot Allocation Algorithm
The node determines slot states before allocating time slots for the next cycle. In this scenario, it sends it to the next distributed time slot allocation node, Node A. During the slot request section, nodes send the SAR data to Node A if they are its neighbors. After Node A receives all the SAR data from its neighbors, it combines its node status table with the SAR data to determine the final available slots. Node A then uses the slot allocation algorithm to output the final result.
Determining the available slots for both Node A and its neighbors can be divided into three steps. Firstly, Node A determines the available time slots for each requesting node based on the “slot states” field information received in the SAR. Time slots with “Idle”, “transmission”, or “reception blocking” states are considered available and can be used to send packets to Node A. Secondly, based on the node states information in the lnsTAB relative to each requesting node, Node A determines the available time slots. Time slots with “Idle”, “reception”, or “transmission blocking” statuses are available and can be used to receive data from the corresponding requesting nodes. Finally, if a particular time slot is available for both the requesting node and Node A, then the time slot is available for the “request-response communication node pair”.
The provided Algorithm 2 outlines the slot allocation process. Firstly, we initialize local variables: the set of the numbers of available time slots for communication node pairs corresponding to each requesting node as determined by response node statistics Y:{,,…,}, and the set of remaining unallocated time slots for each requesting node P:{,,…,}, and the set of ratios representing the proportion of remaining unallocated time slots to the total number of requests for each requesting node S:{,,…,}, where = , and the set of the expected number of time slots to be allocated for each requesting node A:{,,…,}, where = .
Then, for the slot allocation algorithm, the result of the slot allocation directly influences the operating mode of the physical layer. The allocation for a given requesting node is intentionally designed to be contiguous to avoid frequent switching of the underlying antennas and reduce end-to-end latency. The slot allocation node first records the time slot blocks with contiguous available time slots. To ensure fulfillment of all the requesting nodes, a percentage represents the proportion of the desired time slots to each node’s total number of requests. The slot allocation node then assigns blocks of required slot numbers in descending order. Ideally, a slot block matching the required time slots is allocated. If not, the allocation proceeds by assigning smaller slot blocks individually. When a slot is allocated to a neighboring node, it will be removed from all the available communication pairs. After allocating slot blocks, some available slots may remain. In such cases, the slot allocation node assigns the remaining slots based on specified priorities. These priorities are determined by the percentage of remaining unallocated time slots to total requested time slots, with descending priority based on requested time slots, available time slots, and node ID. The allocation is performed incrementally, prioritizing the highest priority node according to this reference criterion.
The time complexity of the algorithm for a single network channel resource allocation process depends on the maximum number of neighbors in the network nodes and the number of data transmission slots in the frame. In the worst-case scenario, when no slot block is available for allocation, the slot allocation nodes need to scan each slot individually to complete slot allocation for all neighbors. In this case, the time complexity of the algorithm is , where m is the maximum number of one-hop neighbors for each node, and n is the number of slots used for each allocation. As the network scale increases, since the channel resource allocation process is only related to the number of slots and the number of neighbors, the time complexity of the slot allocation process will not increase. The algorithm complexity will greatly increase for routing protocols used in the upper layers of the network to filter neighbors and maintain network topology.
After completing the slot allocation process, the node responsible for allocation broadcasts the results data (SAA). This information can be received by neighboring nodes directionally. Each node updates its states table for the responding nodes according to the slot allocation information parsed from the SAA data. If a particular time slot is allocated to a requesting node, the state for that time slot is modified to “transmission” to the slot allocation node. Otherwise, the states of the time slots remain unchanged. The slot allocation node determines the states of each time slot individually. If a time slot is unallocated, the node retains the previous state. Otherwise, if a slot is allocated to a requesting Node
P, the state is updated to “reception” for the Node
P. The outcome of a distributed time slot allocation takes effect one frame after the current time slot allocation frame, during which nodes must complete updating the states.
Algorithm 2 The algorithm for slot allocation. |
- Input:
The number of the slot requesting nodes M, and the set of requesting node IDs sorted in descending order of requested time slots X:{,,…,}. For requesting nodes, defining the set of available time slot numbers G:{,,…,}, and the set of time slot numbers requested Q:{,,…,}, and the proportion of the desired number of time slots to the total number . - Output:
The set of the slot allocation result for each requesting node R:{,,…,…,}. corresponds to the allocation result for .
- 1:
for to do - 2:
According to the order of X, sequentially determines the set of available time slot blocks :{,,…,…,} for the nodes. is a time slot block composed of consecutive or single time slot numbers. Let :{,,…,} denote the number of time slot numbers in each time slot block of , and be the number of time slot blocks in ; - 3:
for to do - 4:
if == then - 5:
= ; - 6:
Remove the time slot numbers in from each node’s corresponding , and update the respective , , ; - 7:
end if - 8:
end for - 9:
if No blocks’ size equals to then - 10:
for k← 0 to do - 11:
if > then - 12:
= the first time slot numbers of ; - 13:
Remove the time slot numbers in from each node’s corresponding , and update the respective , , ; - 14:
end if - 15:
end for - 16:
end if - 17:
if ! blocks’ size ≥ then - 18:
Sort the time slot blocks in in descending order based on the values of ; - 19:
for to do - 20:
+= ; - 21:
if ≤ then - 22:
Append to ; - 23:
else - 24:
break; - 25:
end if - 26:
Remove the time slot numbers in from each node’s corresponding , and update the respective , , ; - 27:
end for - 28:
end if - 29:
end for
|
5. Conclusions
This paper proposed a TDMA-based reservation MAC layer protocol (SISAP). This protocol defines a frame structure that meets the functional requirements of self-organizing networks, ensuring real-time communication among nodes in the system. It adopts a receive-align working mode to address experimental issues in ultra-long-distance transmission. The processing node states in this mode effectively avoid signal transmission advance conflicts between adjacent time slots.
Simultaneously, the protocol employs a “request-response” slot allocation scheme, intelligently handling slot requests, allocation, and responses to adapt to the upper layer’s constantly changing business needs while efficiently utilizing channel resources. The protocol enables long-distance transmission and spatial reuse at lower power consumption with support from smart antenna technology and interference self-avoidance techniques.
The results of using the NS2 network simulation platform for protocol simulation demonstrate that the protocol exhibits high slot allocation efficiency and low end-to-end latency in environments with dynamically changing business requirements. It can intelligently allocate slot resources according to node demands, maximizing spatial reuse and presenting a self-organizing network system that operates autonomously and efficiently. In the paper, for a more intuitive assessment of algorithm performance, we primarily employ a “with and without” comparative analysis for the interference self-avoidance strategy. For overall network performance, we primarily compare it with theoretical network values, lacking experimental analysis comparisons with relevant literature. In future work, we will continue to explore research in related areas. Specifically, our focus will be on developing an efficient method to ensure the continuity of available time slots. We have decided to utilize the DSDV routing protocol directly for simulation purposes, recognizing its potential impact on future network performance. To enhance network performance, our goal is to integrate the channel allocation algorithm with a high-performance routing protocol. Furthermore, we will conduct comparative analyses with existing literature to validate network performance and continually refine our research efforts.