1 CDMA-Based MAC Protocol for Wireless Ad Hoc Networks Alaa Muqattash and Marwan Krunz Department of Electrical and Computer Engineering The Unniversity.

Slides:



Advertisements
Similar presentations
Problems in Ad Hoc Channel Access
Advertisements

Vivek Jain, Anurag Gupta Dharma P. Agrawal
Mobility Increase the Capacity of Ad-hoc Wireless Network Matthias Gossglauser / David Tse Infocom 2001.
Hidden Terminal Problem and Exposed Terminal Problem in Wireless MAC Protocols.
VSMC MIMO: A Spectral Efficient Scheme for Cooperative Relay in Cognitive Radio Networks 1.
A 2 -MAC: An Adaptive, Anycast MAC Protocol for Wireless Sensor Networks Hwee-Xian TAN and Mun Choon CHAN Department of Computer Science, School of Computing.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Queuing Network Models for Delay Analysis of Multihop Wireless Ad Hoc Networks Nabhendra Bisnik and Alhussein Abouzeid Rensselaer Polytechnic Institute.
David Ripplinger, Aradhana Narula-Tam, Katherine Szeto AIAA 2013 August 21, 2013 Scheduling vs Random Access in Frequency Hopped Airborne.
Delay and Throughput in Random Access Wireless Mesh Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE Department Rensselaer Polytechnic Institute (RPI)
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
1 DOA-ALOHA: Slotted ALOHA for Ad Hoc Networking Using Smart Antennas Harkirat Singh & Suresh Singh Portland State University, OR, USA.
NCKU CSIE CIAL1 Principles and Protocols for Power Control in Wireless Ad Hoc Networks Authors: Vikas Kawadia and P. R. Kumar Publisher: IEEE JOURNAL ON.
Mobility Increases Capacity In Ad-Hoc Wireless Networks Lecture 17 October 28, 2004 EENG 460a / CPSC 436 / ENAS 960 Networked Embedded Systems & Sensor.
6/28/2015CSC82601 Radio-resource sharing for adhoc Networking with UWB. by Francesca Cuomo, Cristina Martello, Andrea Baiocchi, and Fabrizio Capriotti.
Distance ADaptive (DAD) Broadcasting for Ad Hoc Networks.
A Cross Layer Approach for Power Heterogeneous Ad hoc Networks Vasudev Shah and Srikanth Krishnamurthy ICDCS 2005.
Yanyan Yang, Yunhuai Liu, and Lionel M. Ni Department of Computer Science and Engineering, Hong Kong University of Science and Technology IEEE MASS 2009.
Capacity of Ad Hoc Networks Quality of Wireless links Physical Layer Issues The Channel Capacity Path Loss Model and Signal Degradation MAC for.
Medium Access Control Protocols Using Directional Antennas in Ad Hoc Networks CIS 888 Prof. Anish Arora The Ohio State University.
Lecture 11: Cellular Networks
COGNITIVE RADIO FOR NEXT-GENERATION WIRELESS NETWORKS: AN APPROACH TO OPPORTUNISTIC CHANNEL SELECTION IN IEEE BASED WIRELESS MESH Dusit Niyato,
International Technology Alliance In Network & Information Sciences International Technology Alliance In Network & Information Sciences 1 Cooperative Wireless.
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray, Jeffrey B. Carruthers, and David Starobinski Department of Electrical and Computer Engineering.
CDMA-Based MAC Protocol for Wireless Ad Hoc Networks Alaa Muqattash and Marwan Krunz Presented by: Habibullah Pagarkar for Advanced Topics in Wireless.
MAC Protocols and Security in Ad hoc and Sensor Networks
1 Power Control for Distributed MAC Protocols in Wireless Ad Hoc Networks Wei Wang, Vikram Srinivasan, and Kee-Chaing Chua National University of Singapore.
A Simple and Effective Cross Layer Networking System for Mobile Ad Hoc Networks Wing Ho Yuen, Heung-no Lee and Timothy Andersen.
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So and Nitin Vaidya University of Illinois.
1 11 Subcarrier Allocation and Bit Loading Algorithms for OFDMA-Based Wireless Networks Gautam Kulkarni, Sachin Adlakha, Mani Srivastava UCLA IEEE Transactions.
1 Core-PC: A Class of Correlative Power Control Algorithms for Single Channel Mobile Ad Hoc Networks Jun Zhang and Brahim Bensaou The Hong Kong University.
Improving Capacity and Flexibility of Wireless Mesh Networks by Interface Switching Yunxia Feng, Minglu Li and Min-You Wu Presented by: Yunxia Feng Dept.
MARCH : A Medium Access Control Protocol For Multihop Wireless Ad Hoc Networks 성 백 동
Copyright: S.Krishnamurthy, UCR Power Controlled Medium Access Control in Wireless Networks – The story continues.
TRANSMISSION POWER CONTROL FOR AD HOC WIRELESS NETWORKS: THROUGHPUT, ENERGY AND FAIRNESS Lujun Jia; Xin Liu; Noubir, G.; Rajaraman, R.; Wireless Communications.
MAC Protocols In Sensor Networks.  MAC allows multiple users to share a common channel.  Conflict-free protocols ensure successful transmission. Channel.
Dynamic Source Routing in ad hoc wireless networks Alexander Stojanovic IST Lisabon 1.
November 4, 2003APOC 2003 Wuhan, China 1/14 Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs Presented by Ruibiao Qiu Department of Computer.
Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel.
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
Collision-free Time Slot Reuse in Multi-hop Wireless Sensor Networks
A High-Throughput MAC Protocol for Wireless Ad Hoc Networks Wanrong Yu, Jiannong Cao, Xingming Zhou, Xiaodong Wang, Keith C. C. Chan, Alvin T. S. Chan,
TCP-Cognizant Adaptive Forward Error Correction in Wireless Networks
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
Tackling Exposed Node Problem in IEEE Mac Deepanshu Shukla ( ) Guide: Dr. Sridhar Iyer.
1 POWMAC: A Single-Channel Power-Control Protocol for Throughput Enhancement in Wireless Ad Hoc Network Alaa Muqattash and Marwan Krunz The University.
An Energy Efficient MAC Protocol for Wireless LANs, E.-S. Jung and N.H. Vaidya, INFOCOM 2002, June 2002 吳豐州.
A new Cooperative Strategy for Deafness Prevention in Directional Ad Hoc Networks Andrea Munari, Francesco Rossetto, and Michele Zorzi University of Padova,
A Multi-Channel CSMA MAC Protocol with Receiver Based Channel Selection for Multihop Wireless Networks Nitin Jain, Samir R. Das Department of Electrical.
A+MAC: A Streamlined Variable Duty-Cycle MAC Protocol for Wireless Sensor Networks 1 Sang Hoon Lee, 2 Byung Joon Park and 1 Lynn Choi 1 School of Electrical.
A Multi-Channel Cooperative MIMO MAC Protocol for Wireless Sensor Networks(MCCMIMO) MASS 2010.
An Energy-Efficient MAC Protocol for Wireless Sensor Networks Speaker: hsiwei Wei Ye, John Heidemann and Deborah Estrin. IEEE INFOCOM 2002 Page
Khaled Hatem Almotairi and Xuemin (Sherman) Shen IEEE Globecom 2010 Speak: Huei-Rung, Tsai Symmetrical Power Control for Multi- channel Multi-hop Wireless.
Throughput-Oriented MAC for Mobile Ad Hoc Networks with Variable Packet Sizes Fan Wang, Ossama Younis, and Marwan Krunz Department of Electrical & Computer.
Mitigating starvation in Wireless Ad hoc Networks: Multi-channel MAC and Power Control Adviser : Frank, Yeong-Sung Lin Presented by Shin-Yao Chen.
Medium Access Control in Wireless networks
A Cooperative Multi-Channel MAC Protocol for Wireless Networks IEEE Globecom 2010 Devu Manikantan Shila, Tricha Anjali and Yu Cheng Dept. of Electrical.
A Bandwidth Scheduling Algorithm Based on Minimum Interference Traffic in Mesh Mode Xu-Yajing, Li-ZhiTao, Zhong-XiuFang and Xu-HuiMin International Conference.
CDMA Based MAC Protocol for Wireless Ad Hoc Networks Alaa Mouquatash & Marwan Krunz Presentation by: Moheeb Abu-Rajab.
Toward Reliable and Efficient Reporting in Wireless Sensor Networks Authors: Fatma Bouabdallah Nizar Bouabdallah Raouf Boutaba.
1 Spectrum Co-existence of IEEE b and a Networks using the CSCC Etiquette Protocol Xiangpeng Jing and Dipankar Raychaudhuri, WINLAB Rutgers.
LA-MAC: A Load Adaptive MAC Protocol for MANETs IEEE Global Telecommunications Conference(GLOBECOM )2009. Presented by Qiang YE Smart Grid Subgroup Meeting.
Discovering Sensor Networks: Applications in Structural Health Monitoring Summary Lecture Wireless Communications.
Power Controlled Dual Channel (PCDC) Medium Access Protocol for Wireless Ad Hoc Networks Alaa Muqattash and Marwan Krunz IEEE INFOCOM 2003 Speaker: Chien-Wen.
-1/16- Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks C.-K. Toh, Georgia Institute of Technology IEEE.
MAC Protocols for Sensor Networks
MAC Protocols for Sensor Networks
Advanced Wireless Networks
On the Physical Carrier Sense in Wireless Ad-hoc Networks
Capacity of Ad Hoc Networks
Presentation transcript:

1 CDMA-Based MAC Protocol for Wireless Ad Hoc Networks Alaa Muqattash and Marwan Krunz Department of Electrical and Computer Engineering The Unniversity of Arizona Tucson, Arizona

2 Goal Propose a CDMA-based power controlled MAC protocol for mobile ad hoc networks Improving the network throughput of a MANET Maintaining low energy consumption

3 Outline Introduction Near-far Problem In RA-CDMA The Proposed CA-CDMA Protocol Simulation Conclusions

4 Introduction Challenges in current MANETs What is CDMA? Why apply CDMA technology to MANET? Preparation for using CDMA-based solutions

5 Challenges in Current MANETs Increase the overall network throughput Maintaining low energy consumption for packet processing and communications

6 What is CDMA? A spread spectrum technology Each user occupies the entire available bandwidth The transmitter’s signal is multiplied by a Pseudo-Random noise(PN) code. The receiver despreads the received signal using a locally generated PN code The PN code is distinct for each signal

7 Why CDMA? Advantages of CDMA – Achieve much higher channel bandwidth efficiency for a given wireless spectrum allocation – Overcome strong intentional interference – Has been widely adopted in popular cellular systems(for example, 3G systems)

8 Concurrent transmission Problem in IEEE IEEE uses SS technology at physical level Since all signals are spread using a common PN code, concurrent transmissions are rejected in the a vicinity of a receiver

9 Concurrent transmission Problem in IEEE Example — Figure 1 A → B and C → D cannot take place at the same time Figure 1

10 Introduce CDMA to MAC Protocol To increase network throughput, we try to apply CDMA technology to MAC protocol

11 Preparation Designing a code assignment protocol Assign distinct codes to different terminals Meet the requirement that all neighbor nodes of a node have different PN codes Deciding a spreading-code protocol Decide codes used for transmission and for monitoring the channel in packet reception Can be receiver based, transmitter-based, or a hybrid

12 Near-far Problem In RA- CDMA (random access CDMA) Limitation of previously proposed CDMA- based MAC protocols Imperfect Orthogonality of CDMA Codes Impact of the MAI Problem on network throughput

13 Previously Proposed CDMA- based MAC Protocols Based on random channel access – A terminal can transmit a packet immediately disregarding the state of the channel – Called Random access CDMA (RA-CDMA) Limitation: Near-far problem – Although RA-CDMA are free of primary collisions, multi-access interference (MAI) can lead to secondary collisions at a receiver

14 Near-far problem When all transmission powers are equal, if the receiver is much closer in distance to transmitter STA1 than STA2, the signal of STA1 will arrive at the receiver with a sufficiently larger power than that of the STA2, causing incorrect decoding of the transmission STA2(i.e., a secondary collision).

15 Near-far problem(A Example) Figure 2

16 Imperfect Orthogonality of CDMA Codes Reasons for near-far problem – Cross correlations between CDMA codes are nonzero, which can induce multi-access interference MANETs are time-asynchronous – Signals originate from multiple transmitters – It is generally not feasible to have a common time reference for all the transmissions that arrive at a receiver

17 Imperfect Orthogonality of CDMA Codes MANETs are time-asynchronous – Transmissions propagate through different paths, so they have different time delays In an asynchronous system, it is not possible to design spreading codes that are completely orthogonal for all time offsets

18 Impact of the MAI Problem The near-far problem can severely affect packet reception, and consequently, network throughput. A measure of network throughput – EFP : the expected forward progress per transmission, defined as the product of the local throughput of a terminal and the distance between the transmitter and the receiver

19 Impact of the MAI Problem – P: the probability that a terminal is transmitting a packet in a given time slot – L : the number of nodes that are within a circle centered at the transmitter and of radius that equals the transmitter-receiver separation distance. Example: Figure 3: Throughput performance versus load in RA-CDMA networks

20 Impact of the MAI Problem

21 Impact of the MAI Problem EFP starts to decrease rapidly when the load exceed P* Our objective – Designing a CDMA-based MAC protocol that prevents this rapid degradation in network throughput

22 The Proposed CA-CDMA Protocol Designing Principles Architecture Channel Model Controlled Access CDMA Protocol Interference Margin Channel Access Mechanism Protocol Recovery

23 Designing Principles In CDMA Cellular Systems – Open- loop and closed-loop power control are employed to have the signals of all STAs arrive at the base stations with the same power The same solution cannot be used in MANETs. – In some cases multiple transmissions cannot take place simultaneously – Example: Figure 4

24 Designing Principles Figure 4 If A increases its power to combat the MAI at B, then this increased power will destroy the reception at D Power control alone is not enough to combat the near-far problem in MANETs.

25 Solve Two Problems Medium access problem – It may not be possible for two transmissions that use two different spreading codes to occur simultaneously Power control problem – Solution: The two transmission can occur simultaneously if the terminals adjust their signal powers so that the interference caused by one transmission is not large enough to destroy packet reception at other terminals

26 Architecture Two frequency channels – One control channel – One data channel Spreading code – A common spreading code is used by all nodes over the control channel – Several terminal-specific codes can be used over the data channel Signal over the control channel is completely orthogonal to any signal over the data channel

27 Architecture Figure 5: Data and control codes in the proposed protocol

28 Protocol Assumptions The channel gain is stationary for the duration of the control and the ensuing data packet transmission periods The gain between two terminals is the same in both directions Data and control packets between a pair of terminals observe similar channel gains. Each terminal is equipped with two transceivers and a carrier-sense hardware that senses the control channel for any carrier signal

29 Protocol Description RTS and CTS packets are transmitted over the control channel (on the common code) at a fixed (maximum) power Pmax Interfering nodes may be allowed to transmit concurrently The receiver and the transmitter must agree on two parameters: the spreading code and the transmission power Interference margin allows terminals at some interfering distance from the intended receiver to start new transmissions in the future

30 Protocol Description The power level is critical and represents a tradeoff between link quality and MAI Apply a distributed admission control strategy that decides when terminals at some distance can transmit concurrently

31 Compute the Interference Margin Minimum required received power (P 0 (i) ) min – To achieve the target error rate, we have P 0 (i) /(P thermal + P MAI (i) ) ≥ μ *, (1) μ * —effective bit energy-to-noise spectral density ratio E b /N 0eff,that is needed to achieve the target error rate P 0 (i) — the average received power of the desired signal at the ith terminal; P thermal — the thermal noise power P MAI (i) — the total MAI at receiver i (P 0 (i) ) min = μ * (P thermal + P MAI (i) ) (2)

32 Noise Rise The interference margin depends on the network load, which itself can be conveyed in terms of the noise rise (ξ (i) ) ξ (i) = ( E b /N 0 ) unloaded / ( E b /N 0 ) loaded ) (3) = (P thermal + P MAI (i) )/ P thermal Thus (P 0 (i) ) min = ξ (i) μ * P thermal (4) The maximum planned noise rise is set as ξ (max),

33 Interference Margin Assume that the transmission power attenuates with the distance d as k/d n (k is a constant and n ≥ 2 is the loss factor). The minimum required transmit power in CA- CDMA P CA-CDMA = ξ (max) μ * P thermal d n /k (5) Assuming that d is uniformly distributed from 0 to d max,we have the expectation of PCA-CDMA E[P CA-CDMA ] = ξ (max) μ * P thermal d n max /k(n+1) (6)

34 Interference Margin As for the protocol, its corresponding transmission P = μ * P thermal d n max /k(7) Therefore, to achieve equal average energy per bit consumption,we must have: E[P CA-CDMA ] / R CA-CDMA = P /R ,(8) R CA-CDMA and R are the bit rates for the transmitted data packets in the CA-CDMA and protocols, respectively.

35 Interference Margin From (6)(7)(8), we have the interference margin ξ (max) =(n+1)R CA-CDMA /R ,(9)

36 Channel Access Mechanism The admission scheme allows only transmissions that will not cause either primary or secondary collisions to proceed concurrently. – RTS/CTS packets allow nodes to estimate the channel gains between transmitter-receiver pairs. – A receiver i uses the CTS packet to notify its neighbors of the additional noise power(denoted by P (i) noise ) that each of the neighbors can add to terminal i without impacting i’s current reception – Each terminal keeps listening to the control channel regardless of the signal destination in order to keep track of the average number of active users in their neighborhoods.

37 Channel Access Mechanism Step 1 If terminal j has a packet to transmit, it sends a RTS packet over the control channel at P max, and includes in this packet the maximum allowable power level (P (j) map ) that terminal j can use that will not disturb any on going reception in j’s neighborhood. The format of the RTS packet is similar to that of the IEEE , except for an additional two-byte field that contains the P (j) map value.

38 Channel Access Mechanism Step 2 -The intended receiver i receives the RTS packet, and uses the predetermined P max,value and the power of the received signal P (ji) received to estimate the channel gain G ji = P (ji) received / P max between terminals i and j at that time. -Terminal i will be able to correctly decode the data packet if transmitted at a power P (ji) min : P (ji) min = μ * (P thermal + P MAI -current (i) )/ G ji, (10) P MAI -current (i) -- the effective current MAI from all already ongoing (interfering) transmissions.

39 Step 2 All neighbors of terminal i will have to defer their transmissions during terminal i’s ongoing reception According to link budget calculations(4)(5), the power that terminal j is allowed to use to send to i is P (ji) allowed = ξ max μ * P thermal / G ji, (11)

40 Step 2 If P (ji) allowed < P (ji) min --MAI in the vicinity of terminal i is greater than the one allowed – i responds with a negative CTS to inform j that i cannot proceed with j’s transmission If P (ji) allowed > P (ji) min and P (ji) allowed < P (j) map n – i calculates the interference power tolerance P MAI -future (i) that it can endure from future unintended transmitters P MAI -future (i) =3W G ji (P (ji) allowed - P (ji) min )/2 μ *, (12) W---Processing gain

41 Step 3  i equitably distributes this power tolerance among future potentially interfering users in the vicinity of i(to prevent one neighbor from consuming the entire P MAI -future (i) ) – Calculate the number of terminals in the vicinity of i that are to share P MAI -future (i) : K (i), K (i) = β ( K avg (i) - K inst (i) ), (if K avg (i) > K inst (i) ) K (i) = β, otherwise(13) K inst (i) - the number of simultaneous transmissions in i ’ s neighborhood K avg (i) - average of K inst (i), β> 1 is a safety margin

42 Step 3 The MAI at terminal i can be split into two components: – terminals that are within the range of i ( P (i) MAI -within ), – terminals outside the range of i (P (i) MAI -other )) i cannot influence P (i) MAI -other Let P (i) noise = P (i) MAI -other, Assume that P (i) MAI -other = α ( P (i) MAI -within ), The interference tolerance P (i) noise that each future neighbor can add to terminal i is P (i) noise = P (i) MAI –future /(1+ α ) K (i), (14)

43 Step 3 When responding to j’s RTS, – terminal i indicates in its CTS the power level P (ji) allowed that j must use. – i inserts P (i) noise in the CTS packet and sends this packet back to terminal j at P max over the control channel using the common code.

44 Step 4 Compute P (s) map (Used in RTS) Potentially interfering terminal s hears the CTS message from i, then – compute the channel gain G si between s and i – compute the maximum power P (s) map that s can use in its future transmissions P (s) map =min( P (i) noise /G sk ) for all neighbors k of s

45 Step 5,6 Step 5 – j send data to i Step 6 – If transmission is successful, receiver i responds j with an ACK packet over the data channel using the same power level that would have been used if i were to send a data packet to j.

46 Protocol Recovery while receiving a data packet, terminal i hears a RTS message (destined to any terminal) that contains an allowable power P (.) map value that if used could cause an unacceptable interference with i’s ongoing reception. Then terminal i shall respond immediately with a special CTS packet over the control channel, preventing the RTS sender from commencing its transmission.

47 Protocol Evaluation Evaluate both the network throughput and the energy consumption of the CA-CDMA protocol and contrast it with the IEEE scheme Results are based on simulation experiments conducted using CSIM programs Each node generates packets accordingto a Poisson process with rate λ The routing overhead is ignored the maximum transmission range under the CA- CDMA and protocols is the same

48 Protocol Evaluation

49 Simulation Results Consider two types of topologies: random grid and clustered In the random grid topology, M mobile hosts are placed across a square area of length 3000 meters. The square is split into M smaller squares. Part (a) of the figure 6 depicts the network throughput. CA-CDMA achieves up to 280% increase over the throughput of the IEEE scheme.

50 Simulation Results- random grid Part (b) of Figure 6 depicts the energy consumption versusλ. CA-CDMA requires less than 50% of the energy required under the scheme. Part (c) of Figure 6 investigate the effect of varying the number of nodes. The throughput enhancement due to CA-CDMA increases with node density

51 Simulation Results- random grid Figure 6: Performance of the CA-CDMA and the protocols (random grid topologies)

52 Simulation Results - random grid Figure 6: Performance of the CA-CDMA and the protocols (random grid topologies)

53 Simulation Results- random grid Figure 6: Performance of the CA-CDMA and the protocols (random grid topologies)

54 Simulation Results - clustered topology To generate a clustered topology, consider an area of dimensions 1000 × 1000 (in meters). Let M = 24 nodes, which are split into 4 equal groups, each occupying a 100 × 100 square in one of the corners of the complete area. For a given source node, the destination is selected from the same cluster with probability 1 − p or from a different cluster with probability p

55 Simulation Results - clustered topology Part(a) of Figure 9 depicts the network throughput versusλ for p = CA-CDMA makes three to four transmissions proceed simultaneously, results in a significant improvement in network throughput. Part (b) of the figure investigate the locality of the traffic by fixing λ and varying p. As the traffic locality p increases the enhancement of CA-CDMA increases.

56 Simulation Results - Clustered Topology Figure 7: Performance of the CA-CDMA and the protocols as a function of λ (clustered topologies)

57 Figure 7: Performance of the CA-CDMA and the protocols as a function of λ (clustered topologies) Simulation Results - clustered topology

58 Conclusions CA-CDMA accounts for the multiple access interference, thereby solving the near-far problem that undermines the throughput performance in MANETs. CA-CDMA uses channel-gain information obtained from overheard RTS and CTS packets over an out-of-band control channel to dynamically bound the transmission power of mobile terminals in the vicinity of a receiver.

59 Conclusions Adjusts the required transmission power for data packets to allow for interference-limited simultaneous transmissions to take place in the neighborhood of a receiving terminal Simulation results showed that CA-CDMA can improve the network throughput by up to 280% and, achieve 50% reduction in the energy consumed

60 Future Work Focus on other capacity optimizations such as the use of directional antennas in CDMA-based protocols