Hidden-Node Problem in Full-Duplex Enabled CSMA Networks

The in-band full-duplexing is a promising technique to boost wireless network throughput by allowing a node to transmit and receive simultaneously. This paper provides a comprehensive investigation on the hidden-node problem that arises in the full-duplex (FD) enabled carrier-sensing multiple-access (CSMA) networks. In particular, we first provide the fundamental conditions that guarantee successful receptions for all the FD transmission cases, and propose an ellipse interference model and an ellipse carrier-sensing model to capture the interference relations and the carrier-sensing mechanism in FD CSMA networks, respectively. We further establish the hidden-node-free design in FD CSMA networks. Specifically, we show the sufficient conditions on the carrier-sensing power threshold that can eliminate hidden-node collisions. We show that compared with half-duplex CSMA networks, the FD CSMA network needs a much smaller carrier-sensing power threshold to prevent hidden-node collisions, which leads to poor network spatial reuse. This motivates us to further propose a new medium access control (MAC) protocol with Full-duplex Enhanced Carrier-Sensing (FECS) mechanism. The FECS-MAC enables the secondary carrier-sensing before starting the secondary transmission. We show that with the secondary carrier-sensing design, the required carrier-sensing power threshold can be increased while keeping the network hidden-node free. Therefore, the network spatial reuse and throughput can be significantly improved. Simulation results demonstrate that the FECS-MAC can improve the throughput of dense three-node FD networks by more than 30 percent, compared with relay full-duplex (RFD) MAC protocol proposed in [1] .

[1]  Philip Levis,et al.  Practical, real-time, full duplex wireless , 2011, MobiCom.

[2]  Philip Levis,et al.  Achieving single channel, full duplex wireless communication , 2010, MobiCom.

[3]  Pei Liu,et al.  A distributed MAC protocol for full duplex radio , 2013, 2013 Asilomar Conference on Signals, Systems and Computers.

[4]  Xi Zhang,et al.  RTS/FCTS mechanism based full-duplex MAC protocol for wireless networks , 2013, 2013 IEEE Globecom Workshops (GC Wkshps).

[5]  Takashi Watanabe,et al.  Full Duplex Media Access Control for Wireless Multi-Hop Networks , 2013, 2013 IEEE 77th Vehicular Technology Conference (VTC Spring).

[6]  Risto Wichman,et al.  In-Band Full-Duplex Wireless: Challenges and Opportunities , 2013, IEEE Journal on Selected Areas in Communications.

[7]  Yupeng Li,et al.  Cross-Layer Protocol Design for Wireless Communication in Hybrid Data Center Networks , 2016, 2016 12th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN).

[8]  Kai Chen,et al.  FD-MMAC: Combating multi-channel hidden and exposed terminals using a single transceiver , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[9]  Bo Chen,et al.  Characterizing the achievable throughput in wireless networks with two active RF chains , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[10]  Jing Deng,et al.  Dual busy tone multiple access (DBTMA)-a multiple access control scheme for ad hoc networks , 2002, IEEE Trans. Commun..

[11]  Soung Chang Liew,et al.  Improving Throughput and Fairness by Reducing Exposed and Hidden Nodes in 802.11 Networks , 2008, IEEE Transactions on Mobile Computing.

[12]  Mario Gerla,et al.  How effective is the IEEE 802.11 RTS/CTS handshake in ad hoc networks , 2002, Global Telecommunications Conference, 2002. GLOBECOM '02. IEEE.

[13]  Soung Chang Liew,et al.  Removing hidden nodes in IEEE 802.11 wireless networks , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..

[14]  Soung Chang Liew,et al.  Hidden-Node Removal and Its Application in Cellular WiFi Networks , 2007, IEEE Transactions on Vehicular Technology.

[15]  Dinan Gunawardena,et al.  Efficient and fair MAC for wireless networks with self-interference cancellation , 2011, 2011 International Symposium of Modeling and Optimization of Mobile, Ad Hoc, and Wireless Networks.

[16]  Ashok K. Agrawala,et al.  Sniffing out the correct physical layer capture model in 802.11b , 2004, Proceedings of the 12th IEEE International Conference on Network Protocols, 2004. ICNP 2004..

[17]  Liqun Fu,et al.  Effective Carrier Sensing in CSMA Networks under Cumulative Interference , 2010, 2010 Proceedings IEEE INFOCOM.

[18]  M. Yousof Naderi,et al.  Performance Analysis of CSMA/CA based Medium Access in Full Duplex Wireless Communications , 2015, IEEE Transactions on Mobile Computing.

[19]  Xinyu Zhang,et al.  Does full-duplex double the capacity of wireless networks? , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[20]  Cheeha Kim,et al.  Hidden chain: a full-duplex MAC protocol using hidden terminal relationships in wlans , 2016, 2016 12th Annual Conference on Wireless On-demand Network Systems and Services (WONS).

[21]  Kaigui Bian,et al.  Hybrid MAC Protocol for Full Duplex Wi-Fi Networks , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[22]  Ness B. Shroff,et al.  Scheduling in wireless networks with full-duplex cut-through transmission , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).

[23]  Shih-Ying Chen,et al.  Probabilistic Medium Access Control for Full-Duplex Networks With Half-Duplex Clients , 2016, IEEE Transactions on Wireless Communications.

[24]  Sachin Katti,et al.  Full duplex radios , 2013, SIGCOMM.

[25]  Dong In Kim,et al.  Medium access control design for full duplex wireless systems: challenges and approaches , 2015, IEEE Communications Magazine.