Analytical modelling of false blocking problem in wireless ad hoc networks

The false blocking problem is induced by the traditional IEEE 802.11 Request-To-Send/Clear-To-Send (RTS/CTS) handshaking in wireless ad hoc networks such as the emerging Device-to-Device (D2D) ad hoc network. An RTS overhearing node is falsely deferred (blocked) when the RTS/CTS handshaking is unsuccessful. The deferred node does not reply to any other incoming packets during its deferral, resulting in the propagation of false blocking. To mitigate the false blocking problem, various false blocking mitigation schemes were proposed. In this paper, an analytical model based on the Markov chain is developed to mathematically analyse and assess the effectiveness of the false blocking mitigation schemes. The analytical model can be applied to the various medium access control (MAC) protocols in the wireless ad hoc networks. Three mitigation schemes i.e. Ready-to-Send Blocking Notification (RSBN), Request-to-Send Validation (RTS-V), and traditional 802.11 schemes are studied. The results from both the analytical evaluation and simulation evaluation are closely matched. This shows the analytical model is able to accurately represent the behaviour and also provide the performance of various schemes in mitigating the false blocking problem. The analytical model is general and flexible enough that it can be adapted to model any existing and future false blocking mitigation schemes.

[1]  Gunasekaran Raja,et al.  FINDER: A D2D based critical communications framework for disaster management in 5G , 2018, Peer-to-Peer Netw. Appl..

[2]  Micheal Drieberg,et al.  Mitigating false blocking problem in wireless ad hoc networks , 2012, Telecommun. Syst..

[3]  Xiaoheng Deng,et al.  Performance Analysis for IEEE 802.11s Wireless Mesh Network in Smart Grid , 2017, Wirel. Pers. Commun..

[4]  Chao Yang,et al.  Efficient Interference-Aware Power Control for Wireless Networks , 2018, Comput. Networks.

[5]  Djamil Aïssani,et al.  Modeling and enhancement of the IEEE 802.11 RTS/CTS scheme in an error-prone channel , 2014, Formal Aspects of Computing.

[6]  Md. Iftekhar Hussain,et al.  A comparison of 802.11ah and 802.15.4 for IoT , 2016, ICT Express.

[7]  Sushil Kumar,et al.  Performance Analysis of IEEE 802.11p in the Presence of Hidden Terminals , 2016, Wirel. Pers. Commun..

[8]  Fatemeh Ghassemi,et al.  Modeling and efficient verification of wireless ad hoc networks , 2016, Formal Aspects of Computing.

[9]  Sandip Chakraborty,et al.  Alleviating Hidden and Exposed Nodes in High-Throughput Wireless Mesh Networks , 2016, IEEE Transactions on Wireless Communications.

[10]  Ignas Niemegeers,et al.  Performance Analysis of IEEE 802.11ad MAC Protocol , 2017, IEEE Communications Letters.

[11]  David Starobinski,et al.  On False Blocking in RTS/CTS-Based Multihop Wireless Networks , 2007, IEEE Transactions on Vehicular Technology.

[12]  Jin Kwak,et al.  Internet of things system technologies based on quality of experience , 2019, Peer-to-Peer Netw. Appl..

[13]  S. U.,et al.  Performance analysis of IEEE 802.11ah wireless local area network under the restricted access window‐based mechanism , 2018, International Journal of Communication Systems.

[14]  Xenofon Fafoutis,et al.  Receiver-initiated medium access control protocols for wireless sensor networks , 2015, Comput. Networks.

[15]  Omar Hayat,et al.  In-Band Device to Device (D2D) Communication and Device Discovery: A Survey , 2019, Wireless Personal Communications.

[16]  Choong Seon Hong,et al.  An efficient multi-channel MAC protocol for wireless ad hoc networks , 2016, Ad Hoc Networks.

[17]  Maher Ben Jemaa,et al.  An accurate two dimensional Markov chain model for IEEE 802.11n DCF , 2018, Wirel. Networks.

[18]  Anurag Kumar,et al.  Analytical Modeling of IEEE 802.11-Type CSMA/CA Networks With Short Term Unfairness , 2016, IEEE/ACM Transactions on Networking.

[19]  Daniel Gutiérrez-Reina,et al.  A survey on probabilistic broadcast schemes for wireless ad hoc networks , 2015, Ad Hoc Networks.

[20]  Xiaojun Hei,et al.  A Systematic Study of IEEE 802.11 DCF Network Optimization From Theory to Testbed , 2020, IEEE Access.

[21]  M. Yousof Naderi,et al.  Performance Analysis of CSMA/CA based Medium Access in Full Duplex Wireless Communications , 2015, IEEE Transactions on Mobile Computing.

[22]  Yuefeng Ji,et al.  Collision analysis of CSMA/CA based MAC protocol for duty cycled WBANs , 2017, Wirel. Networks.

[23]  Mohammad Mahdi Jaghoori,et al.  Modere: the model-checking engine of Rebeca , 2006, SAC.

[24]  Daniel E. Lucani,et al.  A Markov Chain Model for the Decoding Probability of Sparse Network Coding , 2016, ArXiv.

[25]  David Starobinski,et al.  RTS/CTS-induced congestion in ad hoc wireless LANs , 2003, 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003..

[26]  Rishi Pal Singh,et al.  Modelling of IEEE 802.11 DCF in the presence of hidden nodes , 2015, Int. J. Wirel. Mob. Comput..

[27]  Shancang Li,et al.  5G Internet of Things: A survey , 2018, J. Ind. Inf. Integr..

[28]  Chien-Erh Weng,et al.  The performance evaluation of IEEE 802.11 DCF using Markov chain model for wireless LANs , 2016, Comput. Stand. Interfaces.

[29]  Nurul I. Sarkar,et al.  Performance study of block ACK and reverse direction in IEEE 802.11n using a Markov chain model , 2017, J. Netw. Comput. Appl..