Balancing the Hidden and Exposed Node Problems With Power Control In CSMA/CA-Based Wireless Networks Yihong Zhou and Scott M. Nettles Department of Electrical and Computer Engineering The University of Texas at Austin WCNC 2005
outline Introduction Related work CSMA/CA-based physical model Power control schemes Simulation result Conclusion
Introduction Problems in MACs : The hidden node problem The exposed node problem Three Ranges Transmit range Carrier sense range Interference Range
Introduction Enhancing collisions is worse than limiting spatial reuse Main goal balance hidden nodes and exposed nodes
Related work Typical scheme Although the reduced transmit power reduces the exposed nodes, it greatly increases the hidden nodes.
CSMA/CA-based physical model
CSMA/CA-based physical model -- Physical Model When X transmits to Y TRx: Pr > thrd rx CSRx: Pr > thrd cs, defines the potential set of exposed nodes IRy:SIR < SIR cap, defines the potential set of hidden nodes
CSMA/CA-based physical model -- Physical Model Use free space propagation model and two-way ground model Transmit range Carrier sense range
CSMA/CA-based physical model -- Physical Model Interference Range d ir is determined by both d and Pt
CSMA/CA-based physical model -- The Relationship Between the Three Ranges
Power control schemes Strong Transmit Power:
Power control schemes Weak Transmit Power:
Power control schemes The Optimal Transmit Power MAC:
Power control schemes The Optimal Transmit Power MAC:
Power control schemes The Optimal Transmit Power MAC: Sending a RTS using P max Sending a CTS using P max The sender calculates the distance d by using Pr and P max The sender then calculates the P otp Sending the data packet using P otp An ACK using P otp
Simulation result Two Traffic Flows:
Simulation result Two Traffic Flows:
Simulation result Chain Topologies:
Simulation result Chain Topologies:
Simulation result Random Topologies:
conclusion This paper has better spatial reuse than and avoid problems with collisions that occur in other power control-based MACs.