Turning Hidden Nodes Into Helper Nodes in IEEE 802.11 Wireless LAN Networks
Turning Hidden Nodes Into Helper Nodes in IEEE 802.11 Wireless LAN Networks
Introduction
The IEEE 802.11 [1,2,3] wireless networks are widely deployed. Therefore, many challenges of the wireless medium are addressed by research especially to improve the performance of the 802.11 DCF (Distributed Coordination Function), which is the basic operation of the medium access control (MAC) dened in 802.11. One major challenge is the hidden terminal problem which signicantly degrades the performance of DCF because it results in high collision rates. When a collision occurs, some stations other than the destination may be able to successfully receive one of the collided packets. Reasons include the capture eect and hidden terminal problem because of dierent locations of stations, existing obstacles like walls and doors, and interferences. Accordingly, and dierent than other proposals, we would like to investigate if non-hidden stations could help each other retransmit faster whenever possible to enhance the performance of 802.11 wireless local area networks (WLANs). In this paper, we propose a new simple protocol that modies 802.11 DCF, is backward compatible, and works over the 802.11 PHY to achieve such goal. We also evaluate the new scheme using Opnet with and without capture eect for dierent topologies. Results show gains of retransmissions, throughput, fairness, delay, and packet drops with a small trade-o regarding fairness in some scenarios. The rest of the paper is organized as following. In section 2 we provide background information about 802.11 DCF and hidden terminal problem, and then related works are discussed in section 3. In section 4, we provide details of the proposed protocol. Simulation results are given in section 5. Finally, conclusions are in section 6.
A. Das et al. (Eds.): NETWORKING 2008, LNCS 4982, pp. 824835, 2008. IFIP International Federation for Information Processing 2008
825
2
2.1
Background
IEEE 802.11 DCF
The IEEE 802.11 standard denes two mechanisms for DCF which are based on Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA). In basic operation, a station that has a packet to transmit will do so if the medium is sensed idle for a period of distributed interframe space (DIFS). Otherwise, the station will go into backo where the Binary-Exponential-Backo (BEB) procedure is used. The station chooses a number of time slots to wait before trying to transmit again. The number, or the backo counter, is selected from the range [0, CW ], where CW is called the contention window and is initially set to CWmin . The station decrements its backo counter by one for every slot time the medium is sensed idle. When the backo counter reaches zero, the station transmits its packet. Upon receiving a data frame, the destination responds by sending back an acknowledgment (ACK) frame after a short interframe space (SIFS) time. The ACK frame has a higher priority because SIFS is the shortest interframe space (IFS) used in DCF. The packets transmitted carry the time needed to complete the transmission of a packet and its acknowledgement. This time is used by all other stations to defer their access to the medium and is called NAV, Network Allocation Vector. Collisions occur when two or more stations are transmitting at the same time, or when the ACK frame is not received after a timeout period. With every collision, the transmitting station will double its CW unless it reaches a maximum limit CWmax , and selects a new backo counter from the new range. The process is repeated until the packet is successfully transmitted or is dropped because a retry limit is reached. In RTS/CTS operation, a station uses control frames to contend for the channel before transmitting data frames, i.e. data frames are free of collision. When the backo counter reaches zero, the transmitter starts by sending RTS frame to the receiver who then replies with CTS if RTS frame is received successfully. The durations of RTS and CTS frames are used to reserve the channel long enough to exchange the following data frame and its acknowledgement. Fig. 1 illustrates the RTS/CTS operation in a fully connected (no hidden nodes) network WLAN.
S1 AP Others DIFS Backoff Slots DIFS SIFS Backoff Slots RTS CTS Defer Access SIFS Data SIFS ACK
2.2
Using the wireless medium, a statio n is not able to hear frames transmitted by another station when they are out of range. Such phenomenon is referred to as the hidden terminal problem, and signicantly degrades the performance of
826
802.11 DCF because it results in high collision rates. An example is shown in Fig. 2 where S1 and S2 are within range, and are hidden from S3. Just like when all stations are within range, collisions occur because of equal backo values used by dierent nodes. However, the hidden terminal problem adds another type of collisions as shown in Fig. 3. Here, S1 and S3 are contending for the channel with S1 backo value is smaller than that of S3. Accordingly, S1 starts to transmit its RTS frame to the AP (access point). Unfortunately, S3 is unaware of S1s transmission and thus does not freeze its backo counter. S1s RTS frame would not experience a collision only if S3s backo counter reaches zero after the start of the response frame, i.e. a CTS frame from the AP. However, here S3 baco counter reaches zero sometime before the end of S1s transmission, and thus S3 starts transmitting its RTS frame. As a result, a collision occurs at the AP and both station S1 and S3 would timeout and then double their contention windows.
S2 S1
AP S3
S1 AP
DIFS
Backoff Slots
RTS
S3
DIFS
Backoff Slots
RTS
A special situation occurs when S3 starts transmitting RTS frame at the same time the AP may start transmitting CTS frame. Accordingly, S1 would start transmitting a data frame. However, S3 would time out and begin backo procedure. As a result, S3 may attempt to retransmit while S1 is transmitting the data frame resulting in a collision of the data frame. Consequently, data frames are not collision-free with RTS/CTS operation when hidden terminal problem exists.
Related Work
There are few analytical models for wireless networks with hidden terminals like [4, 5, 6]. In [7], the authors analyze the eect of hidden terminal on the throughput of a WLAN AP. They nd that hidden terminal problem reduces the network throughput by 50%, and the capture eect (receiving one of the collided frames correctly under some conditions [8,9,10,11,12]) can enhance the performance by (10 15)%. Capture eect adds to the complexity and cost of wireless devices, and thus is mostly not implemented. In [13], a study of the eect of hidden terminal problem in a multi-rate 802.11b network for both basic and RTS/CTS methods is provided. The study shows that although RTS/CTS method does not help against hidden nodes for rates higher than 1M bps and 2M bps, it is recommended for all rates since it alleviates the packet collisions. Dierent approaches are proposed to reduce the eect or/and the number of hidden nodes. First, in many protocols like 802.11 DCF [1], the RTS/CTS
827
exchange is used to mitigate the hidden terminal problem. Second, the use of centralized scheduling like 802.11 PCF [1] would help. However, scheduling is not attractive because of its higher complexity, centralized control, and overhead of control packets which increase latency and reduce throughput. Third, increasing the transmission power or the carrier-sensing range may reduce the number of hidden nodes. In [12], the authors dene a set of conditions for removing the hidden terminal problem for 802.11 ad-hoc and infrastructure networks: 1) the use of a suciently large carrier-sensing range, and 2) the use of capture eect which is referred to as the Restart Mode of the receiver. The authors show that one of these conditions alone is not sucient; both conditions are required. Moreover, the work assumes that there are no signicant obstructions in the network. In general, such approaches could be not desirable for energy-eciency reasons, and would increase the exposed nodes problem in overlapping WLANs and ad-hoc networks. In addition, it may not be feasible due to dierent limits like available power levels, obstacles, and regulations. On the contrary, power control schemes [14, 15] could result in increasing the number of hidden nodes. Fourth, multi-channel approaches [16] mitigate the eect of hidden stations. These approaches require more transceivers and channels, and more complex MAC protocols. Fifth, busy tone protocols [17, 18] require a central node or a separate channel to transmit a special signal to inform other nodes that there is an ongoing data transmission. Finally, using new MACs and backo algorithms, adapting the contention parameters, and broadcasting helpful information are used (many of which do not consider hidden-terminal problem). In [19], each station broadcasts its backo time in data frames to achieve fairness with its neighbors, and a multiplicative increase/linear decrease backo algorithm is used. In [20], an impatient backo algorithm is proposed to enhance the fairness level toward the nodes in the middle of an ad-hoc network. In contrast to all existing approaches, impatient nodes decrease their backo upon a collision or losing contention, and increase it upon a successful transmission using an exponential instead of a uniform random backo. The authors assume slotted system where synchronization is achieved, and propose to use reset messages to address the issues of small backo values when there are many collisions and high backo values when there are no collisions.
4
4.1
With the IEEE 802.11s distributed operation of DCF, stations compete for the channel using a random access scheme. Hence, there are always collisions whose level increases with the number of contending stations, and the existence of hidden terminal problem. Dierent approaches were proposed to enhance DCF by adjusting contention parameters and the backo procedure. However as discussed in related work (Section 3), they do not eliminate the hidden terminal problem, or even do not consider it.
828
When a collision occurs because of hidden terminal problem, some stations other than the destination may be able to successfully receive one of the collided packets. The same scenario may occur if the there is a bad channel between the transmitter and the destination, like existing noise at destination, while there is a good channel between the transmitter and some stations other than the destination. In the presence of hidden nodes, we would like to investigate if non-hidden stations could help each other for retransmitting collided frames to enhance the performance of infrastructure WLANs. Such cooperative retransmission is expected to be faster since with DCF a non-collided station mostly transmits earlier than collided stations that double their CW. First, we propose a new simple protocol that modies 802.11 DCF, is backward compatible, and works over the 802.11 PHY to achieve such goal. Then, we evaluate the proposed protocol via simulation. 4.2 Description of the New Scheme
We distinguish between two types of transmission opportunities (TXOPs) as shown in Fig. 4. First, a normal TXOP (NTXOP) occurs when a stations starts to transmit a data frame after the required DIFS, or EIFS, and backo periods. Second, a compensating TXOP (CTXOP) occurs when a station starts to transmit after the current NTXOP by SIFS period. Also, each station maintains locally a table, called CTABLE, of other stations that may need to be assigned CTXOPs. When a station (say S2) overhears an RTS frame or a data from another station (say S1) sent to the AP, it adds an entry (the MAC address) of the frame transmitter (S1) to its CTABLE if no such entry exists. A station (S2) drops an existing entry from local CTABLE when overhearing an ACK frame sent to another station (S1) whose MAC address is equal to that entry. Note that a station is not required to wait for ACK frames after RTS or data frame to add/remove an entry to/from its CTABLE. Fig. 4 illustrates the new scheme. Here, only S3 is hidden from both S1 and S2. After DIFS and backo periods following DCF operation, both S1 and S3 transmissions overlap resulting in a collision. Since S2 overheard S1s data frame, it adds S1s MAC address to its CTABLE. After backo, S2 transmits without interference, and at the same time informs the AP that S1 has a collided packet to transmit by including S1s MAC address in the transmitted data frame. The AP responds by sending back an ACK to S2 while piggybacking the AID of S1 in this ACK frame (CACK frame in Fig. 4). Upon receiving the ACK frame, S2 remove the entry of S1 from its CTABLE, S1 removes the entry of S2 from its CTABLE if exists, and S1 recognize that it is assigned a CTXOP. Thereafter, S1 sends a data frame after a period of SIFS to the AP who then replies with an ACK (last frame in Fig. 4). When overhearing the ACK, S2 removes S1s MAC address from its CTABLE, and all stations continue their contention for the channel. For reasons like power saving (energy will be consumed for every bit transmitted or received), an 802.11 station rst receives the MAC header of a frame and then receive the payload only if the frame is destined to that station. This be-
829
S1
RTS
Data SIFS
SIFS
AP
CTS
CACK
ACK, CF-END
S3
DIFS+ Backoff
RTS
DIFS+ Backoff
havior is not changed by the new scheme as only headers information is needed. Also, the helping station does not reserve the channel for a CTXOP, but the AP does so using the duration value of the CACK frame. Since duration is not known in advance, it is set to the time required to transmit a frame with maximum possible length and lowest rate. If needed (duration reserved is longer than CTXOP), the AP sends an ACK+CF-END frame instead of ACK frame in the CTXOP so that all stations reset their NAV values to start contention. On the other hand, the AP sends a CF-END if the helped station did not start transmitting after PIFS. Finally, when a station gets a CTXOP, it does not reset its CW value and it uses its current backo counter for the next frame in order to maintain adapting to congestion levels. 4.3 Capture Eect
Capture eect [8, 9, 10, 11, 12] allows receiving one of the collided frames correctly under some conditions, and thus would enhance the throughout of the network while decreasing the fairness level. Our scheme is expected to improve the performance of WLANs with or without the hidden terminal problem when capture eect is enabled since more than one station is included in a collision; those transmissions not captured still can be helped using the proposed scheme as dierent stations would capture dierent frames depending on the distance and environment between each receiver and dierent transmitters. 4.4 Implementation Issues
CACK frame is a new ACK type with a format shown in Fig. 6, and adds only one eld, named CAID, to that standard ACK frame shown in Fig. 5. CAID represents the AID of the station that is assigned a CTXOP following the current NTXOP. The 16-bit AID is used because of its smaller size compared to that of the 48-bit MAC address, and thus reducing the extra time required. To distinguish between ACK and CACK frames, we used the fact that all bits B8 to B15 except for B12 in the Frame Control eld of IEEE 802.11 control frames are always set to 0 . In our implementation, we selected B10 to be set
830
to 1 for CACK. Note that a CTS frame also can be used with the same modications to implement a CACK. The new scheme is fully backward compatible since CACK is of known type and subtype, and will not be used to acknowledge data frames from stations that do not implement the new scheme. Data frames are not changed. AIDs cannot be used here becuase a non-AP station maintains only its own AID. Hence, the 48-bit Address4 of the IEEE 802.11 data frames header can be used by a station to inform the AP about a collided station.
Performance Evaluation
This section presents the simulation we used to evaluate the performance of the proposed scheme and compare it to that of 802.11 DCF. We implemented the new scheme with the commercial Opnet Modeler 11.5.A [21] by modifying the Opnet 802.11 models. We consider an infrastructure network which consists of one AP and a number of stations that share a single wireless channel. Moreover, there are no channel errors; collisions are the only source of errors. For each scenario, the results are the average of 100 dierent runs with a dierent seed, which is used for the random generator, for each run. Finally, 802.11b and RTS/CTS operation are used with the parameters shown in Table 1.
Table 1. Network Parameters Parameter Value Parameter M AC ACK Size M AC CT S Size M AC RT S Size P LCP Overhead DCF M AC Overhead Short Retry Limit Long Retry Limit Value 14 Bytes 14 Bytes 20 Bytes 192s 28 Bytes 4 7
Slot T ime 20s SIF S 10s DIF S 50s 32 CWmin 1023 CWmax Control Rate 1M bps Data Rate 11M bps
5.1
Performance Metrics
For performance analysis, we use the following metrics: 1. Throughput (S): the total data bits transmitted successfully per the simulation time.
831
S )2
i 2. Fairness Index (F I): we used Jain Index [22] dened by (F I = n i=1 S 2 ), n i=1 i where n is number of stations and Si is the throughput of station i. The closer the value of F I to 1, the better the fairness provided. We use F I to nd how fair a scheme is to dierent DCF users. 3. Average Delay: the delay of a data packet is measured from the moment it was generated until it is successfully received. Only successfully transmitted packets are considered for nding the average delay. 4. Packet drop: number of data packets dropped due to buers overow, and due to reaching a retry limit. 5. Retransmissions: the number of retransmission attempts of each packet before it is successfully transmitted or dropped.
5.2
Here, each scenario is an infrastructure network with one AP and a number of stations that are positioned to be in two groups. Stations of dierent groups are hidden from each other, and stations of the same group are non-hidden. Each scenario is referred to as n-m, with n stations in the rst group and m stations in the second group, and n is xed while m is variable. Then we test with scenarios referred to as n-m-c, where a third group (group c) of 5 stations, which are not hidden from each other, is added to each of the previous n-m networks. However, stations are arranged as following: 1) c1 and c2 are nonhidden from all stations in network. 2) c3 {n2 }. 3) c4 {n1 , m1 , m5 , m9 , m10 }. 4) c5 {m1 , m5 , m6 , m7 , m9 , m10 }. Here, xi is station i in group x, and xi {xj } means that xi and xj are hidden from each other. Also, |x| is number of stations in group x. These scenarios include a general topology of a wireless network. Results are provided in Fig. 7 to Fig. 14. In all gures, the letter d (e) is used if the new scheme is disabled (enabled). For the n-m scenarios, dierent measures follow the same trend for DCF with the new scheme enabled or disabled; we show this for fairness and throughput in Fig.7 to Fig.9. This can be explained by the fact that CW resetting and backo counters are unchanged after a CTXOP. Fig. 7 to Fig. 9 also show a trade-o
S 1-m d
3.7 FI 3.65 3.6 S Mbps 3.55 3.5 3.45 3.4 3.35 0 2 4 m 6 8 10 12
S 1-m e
FI 1-m d
FI 1-m e
1 0.9 0.8
S 5-m d 3.9 3.7 3.5 S Mbps 3.3 3.1 2.9 2.7 2.5 0
S 5-m e
FI 5-m d
10
Fig. 7. 1-m
Fig. 8. 5-m
832
between throughput and fairness for the n-m scenarios. The fairness gets smaller for some cases when the new scheme is enabled. This is because collided stations may retransmit before being helped due to random backo values. However, the dierence is small and FI of the new scheme is always above 0.7, and almost is the same as that of DCF for the 1-m, and 10-m scenarios. On the other hand, fairness is always enhanced for the n-m-c scenarios, Fig. 10 and Fig. 11, where there is a higher probability of being helped before retransmitting using contention due to more general relations (not just two groups). Fig. 7 to Fig. 11 illustrate that
S 10-m e
FI 10-m d
S 1-m-c d FI 1-m-c d 3.68 3.63 3.58 3.53 3.48 3.43 3.38 3.33 3.28 0 5 m
S 1-m-c e FI 1-m-c e FI 10 0.85 0.8 0.75 0.7 0.65 0.6 0.55 0.5
S Mbps
Fig. 9. 10-m
S Mbps
S 2-m-c d FI 2-m-c d 3.68 3.63 3.58 3.53 3.48 3.43 3.38 3.33 3.28 0 5 m
20 18 16 14 Gain (%) 12 10 8 6 4 2 0 0
1-m 10-m
2-m 2-m-c
3-m 1-m-c
5-m
S Mbps
10
throughput is always enhanced. The minimum (maximum) gains (%) are about 3.2 (4.3), 4.1 (27.8), 4.3 (52.7), 1.8 (6.4), 3.3 (9.9) for the 1-m, 5-m, 10-m, 1-m-c, and 2-m-c scenarios respectively. Also, the throughput is always above 3.4M bps when the new scheme is enabled, and may reach 2.2M bps otherwise for the n-m networks. In addition, throughput of n-m-c networks is always above 3.6M bps with the new scheme but keeps decreasing otherwise. Delay, retransmissions, and drops are also enhanced in all scenarios, Fig. 12 to Fig. 14. Gains come from the fast retransmissions as shown in Fig. 13. The performance of the new scheme is aected by number of stations in each group. For the n-m networks, the gain (all measures except FI) increases until a maximum value, and then decreases until
833
40 35 30 Gain (%) 25 20 15 10 5 0 0
1-m 10-m
2-m 2-m-c
3-m 1-m-c
5-m
90 80 70 Gain (%) 60 50 40 30 20 10 0
1-m 10-m
2-m 2-m-c
3-m 1-m-c
5-m
m 6
10
10
it reaches a saturated value. This is explained by the fact that the probability of collisions due to hidden nodes decreases when |n| is small compared to |m| (or |m| is small compared to |n|). 5.3 Random Scenario with Capture Eect
When considering capture eect for scenarios in previous section, collected results showed similar gains but higher values of dierent measures in both schemes. Therefore, we do not show those results. We also randomly generated a network of 30 stations positioned around the AP which is in center of an area of 420m420m. In addition, a signal can be captured if received power is at least 10 times greater than the received power of any other one, and SNR requirement is met according to the model used in Opnet. Also, each station follows an ON/OFF model: each period is Exponential(0.375 seconds), trac is generated during the ON period with Exponential(r seconds), and a packet is 1024 bytes. Changing r allows for testing the network with dierent loads. Results are given in Fig. 15. For very small loads, there are almost zero collisions and the number of transmitters, and so helpers, is smaller. Thus no
FI 120 100 80 60 40 20 0 0 20
Delay
Retransmissions
Packet Drop
Gain (%)
40
60 Load (%)
80
100
120
Fig. 15. Performance gain for random scenario with capture eect
834
improvement is seen for such loads. However, improvements start at about loads of 14% for throughput and fairness, and at about 5.3% for all other measures. The gains (except FI which continues to increase) increase with load until a maximum value, and then start to decrease. The decrease is because when loads are higher, collisions due to hidden and non-hidden nodes also gets higher (our proposed algorithm does not change collisions), and also more packets are buered at dierent stations (more delays and drops due to long waiting).
Conclusions
We proposed a new protocol for 802.11 WLANs to take advantage of the hidden terminal problem by allowing non-hidden stations to assist each other retransmit faster whenever possible. The new scheme is a modication to DCF, is backward compatible, and works over the 802.11 PHY. We evaluated the proposed scheme via simulation which was conducted using Opnet Modeler for dierent scenarios. Results showed that the new scheme improves the throughput, delay, packet drop, fairness, and retransmissions. The performance gain comes from cooperative retransmissions that are faster than that used in DCF where a collided station doubles its CW. In addition, results showed a trade-o between throughput and fairness only in some scenarios. Further work includes investigating performance enhancements using dierent design issues like having the AP decide when not to allow stations to assist each other, and using help information to update backo counters and CW.
References
1. IEEE Std 802.11b-1999, Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specications: Higher-Speed Physical Layer Extension in the 2.4 GHz Band (1999) 2. IEEE Std 802.11g-2003, Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specications Amendment 4: Further Higher Data Rate Extension in the 2.4 GHz Band (2003) 3. IEEE Std 802.11e-2005, Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specications. Amendment 8: Medium Access Control (MAC) Quality of Service Enhancements (2005) 4. Tsertou, A., Laurenson, D.: Revisiting the hidden terminal problem in a csma/ca wireless network. In: IEEE Transactions on Mobile Computing (Accepted 2007) 5. Wu, H., Zhu, F., Zhang, Q., Niu, Z.: Analysis of ieee 802.11 dcf with hidden terminals. In: GLOBECOM, IEEE, Los Alamitos (2006) 6. Ray, S., Starobinski, D., Carruthers, J.B.: Performance of wireless networks with hidden nodes: a queuing-theoretic analysis. Computer Communications 28(10), 11791192 (2005) 7. Zahedi, A., Pahlavan, K.: Natural hidden terminal and the performance of the wireless lans. In: Proc. IEEE 6th Int. Conf. on Univ. Pers. Comm, pp. 929933 (1997) 8. Nadeem, T., Ji, L., Agrawala, A.K., Agre, J.R.: Location enhancement to ieee 802.11 dcf. In: INFOCOM, pp. 651663. IEEE, Los Alamitos (2005)
835
9. Durvy, M., Dousse, O., Thiran, P.: Modeling the 802.11 protocol under dierent capture and sensing capabilities. In: INFOCOM, pp. 23562360. IEEE, Los Alamitos (2007) 10. Klienrock, L., Tobagi, F.: Packet switching in radio channels: Part i-carrier sense multiple access modes and their throughput delay characteristics. IEEE Transaction on Communication COM-23(12), 14161430 (1975) 11. Lee, J., Kim, W., Lee, S.-J., Jo, D., Ryu, J., Kwon, T., Choi, Y.: An experimental study on the capture eect in 802.11a networks. In: WiNTECH 2007, Montral, e Qubec, Canada (September 10, 2007) e 12. Jiang, L.B., Liew, S.C.: Hidden-node removal and its application in cellular wi networks. IEEE Transactions on Vehicular Technology 56(5), Part 1, 26412654 (2007) 13. Borgo, M., Zanella, A., Bisaglia, P., Merlin, S.: Analysis of the hidden terminal eect in multi-rate ieee 802.11b networks (September 2004) 14. Ho, I.W.-H., Liew, S.C.: Impact of power control on performance of ieee 802.11 wireless networks. IEEE Transactions on Mobile Computing 6(11), 12451258 (2007) 15. Qiao, D., Choi, S., Jain, A., Shin, K.: Adaptive transmit power control in ieee 802.11a wireless lans. Proc. of the IEEE Semiannual Vehicular Technology Conference 2003 (VTC 2003-Spring) 1, 433437 (2003) 16. So, J., Vaidya, N.H.: Multi-channel mac for ad hoc networks: handling multichannel hidden terminals using a single transceiver. In: Murai, J., Perkins, C.E., Tassiulas, L. (eds.) MobiHoc, pp. 222233. ACM Press, New York (2004) 17. Klienrock, L., Tobagi, F.: Packet switching in radio channels: Part 11-the hidden terminal problem in carrier sense multiple access and the busy tone solution. IEEE Transactions on Communications COM-23(12), 14171433 (1975) 18. Haas, Z., Deng, J.: Dual busy tone multiple access (DBTMA)-a multiple access control scheme for ad hoc networks. IEEE Transactions on Communications 50(6), 975985 (2002) 19. Bharghavan, V., Demers, A., Shenker, S., Zhang, L.: Macaw: A media access protocol for wireless lans. In: Proc. ACM SIGCOMM, London, UK (October 1994) 20. Gupta, R., Walrand, J.: Impatient backo algorithm: Fairness in a distributed ad-hoc mac. In: ICC (2007) 21. Opnet, Opnet Modeler, http://www.opnet.org 22. Jain, D.R.: Chiu, and W. Hawe, A Quantitative Measure of Fairness and Discrimination for Resource Allocation in Shared Computer Systems, DEC Research Report TR-301 (September 1984)