Research Letter | Open Access
Raungrong Suleesathira, Jansilp Aksiripipatkul, Wudhichai Assawinchaichote, "Selective Decoding Scheme-MAC Protocol in Ad Hoc Networks with MIMO Links", Journal of Electrical and Computer Engineering, vol. 2009, Article ID 829585, 5 pages, 2009. https://doi.org/10.1155/2009/829585
Selective Decoding Scheme-MAC Protocol in Ad Hoc Networks with MIMO Links
A problem encountered in the IEEE 802.11 MAC is the collision of simultaneous transmissions from either neighboring nodes or hidden nodes within the same contention floor. This paper presents the selective decoding schemes in MAC (SDS-MAC) protocol for MIMO ad hoc networks. It is able to mitigate interferences by means of a minimum mean-squared error (MMSE) technique. As a result, it allows a pair of simultaneous transmissions to the same or different nodes to yield the network utilization increase. The decoding schemes and time line operations are properly selected corresponding to the transmission demand of neighboring nodes to avoid collision. Transmission demand can be determined by the number of RTS packets and type of CTS packets. Simulation results are given to illustrate the SDS-MAC performance.
With the lack of any infrastructure support in ad-hoc networks, the nodes must use medium access control (MAC) protocols to reserve local access medium. In IEEE 802.11 standard , the distributed coordination function uses carrier sense multiple access with collision avoidance (CSMA/CA) as the access method. The handshake frames RTS/CTS (request to send/clear to send) in the CSMA/CA can prevent the collision from the hidden station being outside transmission range that occupying the channel. However, the use of handshaking cannot perfectly solve the exposed node problem. Collision problem still remains . Moreover, spectrum allocation in the IEEE 802.11 MAC is inefficiency since it does not allow a pair of simultaneous transmissions.
Recently, researches exploit the advantages of multiple-input multiple-output (MIMO) technique to improve the performance of the IEEE 802.11 MAC [2–5]. Space-time codes by multiple transmit antennas can be combined with multiple receive antennas to minimize the effects of multipath fading and to achieve the channel capacity . A MAC protocol termed NULLHOC  designed for multipath MIMO communication channels cancels interferences by direct nulls toward other users involving in existing communication sessions. The accuracy depends on the appropriate transmit and receive weights selection in order to ensure that the signal is received with a certain gain or is perfectly null. The attractive one is Mitigation Interference using Multiple Antennas MAC (MIMA-MAC)  which allows two or more simultaneous data streams to communicate at the same time. It can mitigate interferences from neighboring nodes by employing the spatial multiplexing capability of MIMO. However, in order to successfully separate all the data streams at receivers, MIMA-MAC uses only half of the transmit antennas for data transmission. As a result, the channel resources are not always fully utilized. Parallel RTS Processing (PRP-MAC)  has developed an algorithm to maximize the number of transmitted data streams, and the number of transmitted antennas is determined by the number of transmission demands. Although, the number of transmit antennas is maximized in single stream situation, it still uses a half of the transmit antennas for two transmission demands. Thus, the problem of the number of transmit antennas is still remain, and the channel capacity of the system is limited. Further, these methods do not incorporate diversity gains from the capability of MIMO channels.
The paper is organized as follows. In Section 2, we describe the MMSE interference cancellation. Its application to the SDS-MAC protocol is presented in Section 3. In Section 4, the SDS-MAC performance is shown and compared to the MIMA-MAC. The conclusion is given in Section 5.
2. MMSE Interference Cancellation
Recently, attempts to mitigate interferences induced in MIMO links have been actively made. Consider two synchronous cochannel terminals having a transmitter as seen in Figure 1 (upper). They are communicating with the same node using two antennas for reception. For the first terminal, let be the channel coefficient between the th transmit and the th receive antennas, . Similarly, is the coefficient between the th transmit and the th receive antennas for the second terminal. There are , that represent the two symbol vectors encoded and transmitted from the first and the second terminals, respectively. In the Alamouti space-time coding , a block of two symbols is taken in each encoding operation. At the first transmission period, and are transmitted simultaneously from antenna one and antenna two, respectively. In the second transmission period, and are transmitted instead. The superscript denotes complex conjugate. Space-time coded OFDM which is known as an effective technique for high data rate applications is used. The OFDM concept can be found in . Briefly, it is taking the IFFT of symbols into difference orthogonal subcarriers.
In the receiver shown in Figure 1 (lower), the OFDM demodulation is the FFT. The received signals over two consecutive transmission periods at the first receive antenna and the second receive antenna are given as (, ) and (, ), respectively. Denote , , and, and are uncorrelated complex Gaussian random vectors with zero mean. By letting , the matrix representation of the overall received signal vectors becomes
Assuming that we are interested in decoding the symbols and . The cost function is defined as 
where and are chosen such that is minimized. When , we have and when , , we have where is the th column of and , is the signal-to-noise ratio (SNR). Consequently, the MMSEs are and A general scheme for rejecting interferences can be found in .
It is important to mention while decoding a symbol that it cancels interferences regardless of another symbol. To decode a pair of symbols , compute the Maximum Likelihood (ML) over a set of all possible symbols as
3. Selective Decoding Scheme-MAC (SDS-MAC)
3.1. SDS-MAC Decoding
Let us consider the topology shown in Figure 2. There are three cases: DATA A to B only happens; DATA A to B and DATA C to D concurrently happen. The shaded arrow in Figure 2 indicates an interferer to node B while DATA C to D is connecting and DATA A to B and DATA C to B are concurrently connecting to node B. Channel state information (CSI) is assumed available. Three decoders are presented.
Decoding Scheme 1 is used when the transmission of DATA A to B happens. The ML decoding rule is
Decoding Scheme 2 is used when two data streams are simultaneously transmitted and aimed to different destinations. The MMSE interference canceller premultiplies by and . Then, compute the ML decoding rule in (4).
Decoding Scheme 3 is presented in order to decode two data streams simultaneously transmitted. After calculating (4), it decodes the symbols transmitted from the second terminal by computing , , as follows:
3.2. SDS-MAC Time Line Operation
Figure 3 shows the time structure of the SDS-MAC protocol. It is assumed that all nodes are perfectly synchronized. It consists of five types of slots. Each slot has two time segments except the data transfering slot. The tasks of each slot are briefly explained as follows.
As shown in Figure 4, slot timing and decoding vary in the transmission demands. The SDS-MAC protocol selects the proper decoding scheme corresponding to the number of RTS packets and the type of CTS packets as follows.
CTS-I. The CTS-I packet is used when only one RTS packet is transmitted in the contention slot. It means only one data stream is transmitted (DATA A to B). The destined node sends back a CTS-I to the transmitter for connection permission. This control packet stores the transmitter ID and reduced number of slots. The frame structure is reduced to a single stream transmission as shown in Figure 4(a). Accordingly, the decoding scheme 1 is chosen since it does not need to suppress interferences.
CTS-II. The CTS-II packet is used when two RTS packets are transmitted in the contention slot. Two terminals send their own data streams to different nodes at the same time (DATA A to B and DATA C to D). The CTS packets in the responding slot and the time line are shown in Figure 4(b). The decoding scheme 2 is designed for this situation.
CTS-III. In the case of DATA A to B and DATA C to B, the node B responses both terminals by the CTS-III packet. Transmitter IDs of both RTS packets are stored in the CTS-III packet. The frame structure is shown in Figure 4(c). The node B has to use the decoding scheme 3 for data separation.
4. Simulation Results
To evaluate the SDS-MAC performance, the MIMA-MAC is used for comparison. The differences of both protocols can be concluded as follows. The SDS-MAC protocol allows the total transmit antennas () to be active whereas the MIMA-MAC protocol uses only half of its transmit antennas (). In the SDS-MAC protocol, we can have at most two simultaneous links in the network either to the same or to the different receivers. This gains transmit diversity using the Alamouti code. The MIMA-MAC system, however, is designed for at most two simultaneous transmissions only for different receivers. This is to develop the mechanism of the 802.11 style MAC which there can be only one active transmitter at a time using all of transmit antennas. Moreover, the MMSE interference canceller mentioned in Section 2 is employed with the ML decoders in the SDS-MAC protocol. Zero-forcing (ZF) receiver  is employed as a spatial multiplexing and interference cancellation in the MIMA-MAC protocol.
In the case of one link (DATA A to B), Figure 5 shows the SERs for six cases which are divided into two groups of BPSK and 8PSK. In each modulation, the decoding scheme 1 has the SER results better than the decoding scheme 2 and the MIMA-MAC protocol since it is specifically designed for the scenario 1 and use the ML as a decoder which is optimal decoding, while the ZF receiver is suboptimal.
In the cases of two links either DATA A to B and DATA C to D or DATA A to B and DATA C to B, the SER results are compared as illustrated in Figure 6. By using the SDS-MAC protocol, we improve the channel utilization that allows decoding two simultaneous data streams. With the presence of interferences, the decoding scheme1 cannot decode data streams efficiently. Similarly, the ZF receiver in the MIMA-MAC system can mitigate interferences but it is unable to decode data streams for the case of scenario 3. The SER results of one link are better than that of two links since when there is only one user using the channel, the diversity is four. However, the diversity reduces to two, where interference appears because one of the receive antennas is effectively used for interference suppression.
Besides the simulation results justify the efficiency of SDS-MAC protocol, it can be justified by the link capacity . Basically, the capacity increases according to the number of transmit antennas, the number of links, and SNR. At the same SNR, the SDS-MAC protocol utilizes more the number of transmit antennas and the number of links than the MIMA-MAC protocol. Therefore, it yields that the SDS-MAC protocol has more capacity than the MIMA-MAC protocol.
A wireless MAC design with selective decoding schemes in MIMO links is presented. The MMSE interference canceller increases the channel utilization since it enables simultaneous transmissions. The decoding schemes and frame time lines are properly selected depending on transmission demands of neighboring nodes. Consequently, two data streams can be simultaneously transferred by two terminals to the same or different destined nodes. The results assure that the SDS-MAC outperforms the MIMA-MAC.
- B. A. Forouzan, Data Communications and Networking, McGraw-Hill, Berkeley, Calif, USA, 4th edition, 2007.
- J. C. Mundarath, P. Ramanathan, and B. D. Van Veen, “NULLHOC: a MAC protocol for adaptive antenna array based wireless ad hoc networks in multipath environments,” in Proceedings of the IEEE Global Telecommunications Conference, vol. 5, pp. 2765–2769, November 2004.
- K. Sundaresan, R. Sivakumar, M. A. Ingram, and T. Chang, “Medium access control in ad hoc networks with MIMO links: optimization considerations and algorithms,” IEEE Transactions on Mobile Computing, vol. 3, no. 4, pp. 350–365, 2004.
- M. Park, S.-H. Choi, and S. M. Nettles, “Cross-layer MAC design for wireless networks using MIMO,” in Proceedings of the IEEE Global Telecommunications Conference, vol. 5, pp. 2870–2874, November 2005.
- M. Shirasu and I. Sasase, “A MAC protocol for maximum stream allocation depending on the number of antennas and received RTS packets in MIMO ad hoc networks,” in Proceedings of the IEEE International Conference on Communications, pp. 3295–3300, June 2007.
- G. J. Foschini and M. J. Gans, “On Limits of wireless communications in a fading environment when using multiple antennas,” Wireless Personal Communications, vol. 6, no. 3, pp. 311–335, 1998.
- S. M. Alamouti, “A simple transmit diversity technique for wireless communications,” IEEE Journal on Selected Areas in Communications, vol. 16, no. 8, pp. 1451–1458, 1998.
- A. Goldsmith, Modern Wireless Communications, Cambridge University Press, Cambridge, UK, 2005.
- F. Naguib, N. Seshadri, and A. R. Calderbank, “Increasing data rate over wireless channels,” IEEE Signal Processing Magazine, vol. 17, no. 3, pp. 76–92, 2000.
- S. Shahbazpanahi, M. Beheshti, A. B. Gershman, M. Gharavi-Alkhansari, and K. Wong, “Minimum variance linear receivers for multiaccess MIMO wireless systems with space-time block coding,” IEEE Transactions on Signal Processing, vol. 52, no. 12, pp. 3306–3313, 2004.
- Paulraj, R. Nabar, and D. Gore, Introduction to Space-Time Wireless Communications, Cambridge University Press, Cambridge, UK, 2003.
Copyright © 2009 Raungrong Suleesathira et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.