cs0504002/main.tex
1: \documentclass[10pt,a4,twocolumn]{IEEEtran}
2: \usepackage{epsfig,fullpage,times,url,graphicx}
3: 
4: \DeclareGraphicsRule{.JPG}{eps}{*}{`jpeg2ps #1} 
5: 
6: \author{SeonYeong Han and Nael B. Abu-Ghazaleh\\
7: Computer Science Dept.\\
8: State University of New York at Binghamton\\
9: \url{{shan6@,nael@cs.}binghamton.edu}}
10: 
11: \title{On the Effect of Fading on Ad-hoc Networks}
12: %
13: \begin{document}
14: \pagestyle{empty}
15: 				  
16: \maketitle
17: 
18: \begin{abstract}~\label{abstract}
19: 
20: 
21: Most MANET (Mobile Ad hoc NETwork) research assumes idealized
22: propagation models.  Experimental results have shown significant
23: divergence from simulation results due to the effect of signal fading
24: in realistic wireless communication channels.  In this paper, we
25: characterize the impact of fading on protocol performance. We first
26: study the effect of fading on MAC performance and show that its effect
27: can be dominating.  One of our important conclusions is that
28: eliminating RTS/CTS packets results in more effective operation under
29: fading.  We also identify an unfairness problem that arises due to
30: backoffs in the presence of fading.  Moreover, fading results in
31: several subtle interactions between the MAC and routing layers.  We
32: identify several of these problems and make observations about
33: effective approaches for addressing them.  For example, the criteria
34: for determining the best path should not only consider the link status
35: but also the link order. In addition, because routing protocols rely
36: on MAC level transmission failure (when the retry limit is exceeded),
37: route failure errors are often generated unnecessarily. Finally,
38: because MAC level broadcasts are unreliable, they are especially
39: vulnerable to fading. We analyze these effects and outline preliminary
40: solutions to them.
41: \end{abstract}
42: 
43: \section{Introduction}
44: 
45: %
46: %
47: %
48: %
49: %
50: Mobile Ad hoc NETworks (MANETs) are networks made of mobile nodes
51: that self-configure and collaborate to forward packets among each other
52: without the benefit of an access point.  These networks are especially
53: important when infrastructure is unavailable (e.g., unplanned
54: networks, in remote areas, or after a disaster), or expensive.  In
55: such networks, each node must play the role of a router as well as a
56: station.
57: 
58: %
59: %
60: %
61: %
62: %
63: %
64: %
65: 
66:  Most existing MANET research assumes idealized wireless propagation:
67: nodes have a fixed transmission range and all receivers within this
68: range receive a transmission correctly (assuming no collision occurs).
69: However, due to fading and multipath effects this assumption
70: deviates significantly from reality: wireless transmission can suffer
71: deep fading (drop in power level) with very small changes in location,
72: or in time.  Fades of 20dB (the signal dropping to 1\% of its ideal
73: value) are not rare~\cite{Rappaport}.  These properties have profound
74: implications on protocol performance and designs that make many of the
75: decisions taken under idealized assumptions invalid.  Wireless
76: transmission success ratio drops with the distance between sender and
77: receiver.  This behavior leads to several interactions within the MAC
78: layer and across layers, some of which are subtle.
79: 
80: The effect of fading on MANET behavior has been observed and
81: studied empirically;  Decouto et al show that,
82: contrary to idealized models, fading has considerable effect on
83: link state -- using shortest path as a measure of
84: path quality can therefore be misleading~\cite{decouto-03a}.  Moreover, the packet loss
85: rate varies from link to link (as a function of the distance and the
86: surrounding environment); the quality of a hop must be made visible to
87: the routing protocol to enable effective route selection.  To capture
88: this effect, they propose ETX: a link cost metric that is a function
89: of the forward and backward delivery ratio on a
90: link~\cite{decouto-03}.  Other link cost metrics have also been
91: proposed to allow fading sensitive route selection~\cite{adya-04}.
92: Draves et al conducted an experimental analysis of these metrics and
93: found that ETX performs best~\cite{draves-04}.  Integrating these
94: effects into a routing architecture has been studied as well.  Woo et
95: al explored a routing architecture for managing wireless propagation
96: vagaries in a sensor network environment~\cite{woo-03}.  One of their
97: main conclusions is that using ETX as a route metric provides stable
98: routing performance.  However, the static sensor network environment
99: allows specialized routing and link estimation solutions that are
100: difficult to generalize to a MANET environment.  Draves et al propose
101: Link Quality Source Routing (LQSR), an extension of the Dynamic Source
102: Routing Protocol to address the problems that arise due to
103: fading~\cite{draves-04}.  In addition to allowing path selection
104: based on link quality, LQSR has several additional interesting
105: features such as continuous monitoring of path quality and higher
106: route stability.
107: 
108: 
109: %
110: %
111: %
112: %
113: %
114: %
115: %
116: %
117: %
118: %
119: %
120: %
121: %
122: %
123: %
124: %
125: %
126: %
127: %
128: %
129: 
130: %
131: %
132: %
133: %
134: 
135: Other effects of fading have also been observed and are reviewed
136: throughout this paper.  The majority of the work is experimental.
137: More specifically, problems are observed in real testbeds and
138: solutions are proposed to address them.  As a result most of the work
139: is focused on routing implications.  In this paper, we take a
140: complementary bottom up approach to this problem.  We start with an
141: analysis of the problem at the MAC layer.  As a result, we capture
142: some problems that occur in the MAC layer itself as well as problems
143: that affect the upper layers.  The bottom up approach provides a more
144: systemic and comprehensive evaluation of the effect of
145: fading on protocol performance than experimental testbed analysis.
146: The contributions of the paper also include the identification of
147: new problems that arise due to fading and the development
148: of initial solutions for them.
149: 
150: We first characterize the effect of fading on the performance MANET
151: protocols analytically and using simulation using a slow fading
152: propagation model.  One of our contributions is to show that Collision Avoidance (Request to Send (RTS)/ and Clear to Send (CTS) packets of IEEE 802.11)
153: is harmful to performance under fading and not that beneficial for
154: collision avoidance.  Moreover, we identify an unfairness problem that
155: occurs due to unbalanced backoffs that occur due to fading losses.
156: In addition, we outline the implications of this behavior on the
157: routing layer and propose preliminary solutions to the problems. 
158: 
159: %
160: %
161: %
162: %
163: %
164: %
165: %
166: %
167: %
168: %
169: %
170: 
171: %
172: %
173: %
174: %
175: %
176: %
177: %
178: %
179: %
180: %
181: %
182: %
183: %
184: %
185: %
186: %
187: %
188: %
189: 
190: The remainder of this paper is organized as follows.
191: Section~\ref{background} explains some background
192: information. Section~\ref{sec:mac} analyzes the basic effect of
193: fading on MAC layer performance. Section~\ref{sec:noRTS} makes the case for
194: eliminating Collision Avoidance from MAC protocols.  Section~\ref{sec:backoff}
195: outlines the unfairness and inefficiency problems occurring due to backoff under fading.  In Section~\ref{sec:routing} we present high level descriptions of additional problems that occur
196: at upper layers.  Finally Section~\ref{sec:conclude} presents some concluding
197: remarks.
198: 
199: 
200: 
201: %
202: %
203: %
204: %
205: 
206: %
207: %
208: %
209: %
210: %
211: %
212: %
213: %
214: %
215: %
216: %
217: 
218: %
219: %
220: %
221: %
222: %
223: %
224: %
225: %
226: %
227: %
228: %
229: 
230: %
231: %
232: %
233: %
234: %
235: %
236: %
237:  
238: %
239: %
240: %
241: %
242: %
243: %
244: 
245: %
246: %
247: %
248: %
249: %
250: %
251: 
252: 
253: %
254: %
255: %
256: %
257: %
258: %
259: %
260: %
261: %
262: %
263: %
264:  
265: 
266: \section{Background}~\label{background}
267: 
268: 
269: %
270: %
271: %
272: %
273: %
274: 
275: %
276: %
277: %
278: %
279: %
280: %
281: %
282: %
283: %
284: %
285: %
286: %
287: %
288: %
289: 
290: %
291: %
292: %
293: %
294: %
295: %
296: 
297: \subsection{Wireless Propagation} 
298: 
299: %
300: %
301: %
302: %
303: %
304: 
305: %
306: %
307: %
308: %
309: %
310: %
311: %
312: %
313: %
314: 
315: In a typical terrestrial environment, the transmitted signal reflects
316: off of surrounding objects, refracts when travelling through obstacles
317: and suffers diffraction due to sharp edges.  Moreover, doppler shifts
318: occur due to moving objects.  As a result, many echos of the
319: transmitted signal are received with different delays and power-levels
320: depending on the path they took.  Together, these result in large
321: transient flucuations in the power level: this is known as
322: fading~\cite{Rappaport}.  
323: 
324: 
325: The details of wireless propagation are beyond the scope of this
326: paper.  Briefly, fading of a wave can be explained by slow fading
327: (e.g., due to dominant shadowing objects) and fast fading (due
328: to numerous smaller objects)~\cite{Sklar-97}.  Slow fading occurs over
329: time periods generally longer than a packet length; thus, we may
330: consider a single transmission power value per packet.  Alternatively,
331: small scale fading, or fast fading, occurs within the packet.  Fast
332: fading model considers the effect of scattered wave (also called by
333: multi-path reception model).  The Rayleigh or Ricean statistical
334: distributions have been shown to capture this effect well.  Ricean is
335: used when there is a line of sight path between sender and receiver
336: and Rayleigh is used when there is none.
337: 
338: With advanced modulation technologies (specifically, spread
339: spectrum/CDMA) and specialized antennas (such as the RAKE receiver),
340: the effect of small scale fading can be almost eliminated in the RF
341: frequency bands used for wireless communication.  Thus, we focus only
342: on slow fading.
343: 
344: 
345: %
346: %
347: %
348: %
349: %
350:  
351: %
352: %
353: %
354: %
355: 
356: %
357: %
358: %
359: %
360: %
361: %
362: 
363: 
364: \subsection{Propagation Models}
365: 
366: There are three kinds of propagation models typically used in MANET
367: protocol simulation and analysis.  The simplest model is Free Space
368: model.  The energy is in inverse proportion of square of distance.
369: This model is too simple to apply to realistic terrestrial setting.
370: Therefore, a more realistic model (called Two Ray Ground), which
371: considers the reflection of signal against the ground as well as
372: directly propagated signal, is used.  At short distance, only the
373: directly propagated signal matters.  Thus, the path loss exponent
374: ($\beta$), which determines the (exponentiated) rate of attenuation of
375: the signal with distance, is 2; i.e., the power drops with the square
376: of distance.  However, after a cross-over distance which depends on
377: the height of the antennas, both the direct component and the ground
378: reflected component combine to create a higher path loss factor
379: (typically assumed to be between 3 and 4).  The Two-Ray Ground Model
380: is also idealized; it does not consider the fading effects
381: described above.
382: 
383: 
384: %
385: %
386: %
387: %
388: %
389: %
390: %
391: %
392: %
393: %
394: %
395: %
396: 
397: %
398: %
399: %
400: %
401: %
402: %
403: %
404: %
405: %
406: %
407: %
408: %
409: %
410: 
411: %
412: %
413: %
414: %
415: %
416: %
417: %
418: %
419: %
420: %
421: %
422: 
423: We use a fading propagation model in this paper that statistically
424: models slow fading.  Although this model is known (e.g., it is
425: available in the NS-2~\cite{ns-2} and Qualnet
426: simulators~\cite{qualnet}), it is not typically used.  In this model,
427: the path loss is a random variable that has a log-normal distribution,
428: with a mean equal to the expected two-ray ground path loss.  More
429: specifically, the signal power consists of two parts: the mean power
430: and the fading effect. The mean received power at a communication
431: distance is the idealized power as a function of that distance is
432: calculated as follows,
433: 
434: 
435: \begin{equation}
436: [\frac{\overline{P_r(d)}}{P_r(d_0)}]_{dB} =  -10\beta log(\frac{d}{d_0})          
437: \label{eq4}
438: \end{equation}
439: where $d0$ is a reference distance that is a function of the antenna
440: height.  The path loss equation in formula dB is eq~\ref{eq4}.
441: $\beta$ is the ideal path loss exponent (i.e., without considering
442: fading).
443: 
444: 
445: The second component models the transient fading effect.  Received
446: power is adjusted by a log-normal random variable $X_{dB}=
447: (N(0,\sigma^2))$.  The fading is modeled as a gaussian distribution
448: with average 0, and standard deviation $sigma$.  The overall received
449: power ius expressed as,
450: \begin{equation}
451: [\frac{\overline{P_r(d)}}{P_r(d_0)}]_{dB} =  -10\beta log(\frac{d}{d_0})  + X_{dB}.
452: \label{eq5}
453: \end{equation}
454: Because random variable $X_{dB}$, the range no longer represents a
455: discrete threshold with ``in-range'' or ``out-of-range'' nodes.
456: Rather, it is now continuous: packets in the ideal range may be lost
457: and packets outside the ideal range may be received.  The probability
458: of correct reception decreases with distance accoding to
459: Eq.~\ref{eq5}.  While this model is available in simulators such as
460: NS-2 and QualNet, it is almost never used
461: in MANET network level research.  We use it as the basis for our
462: analysis.
463: 
464: 
465: Rather than focusing on the impact of $\sigma$ and $\beta$ on protocol
466: behavior, we pick representative values and use them to evaluate the
467: impact of fading on MANET protocols.  Clearly, the impact can be
468: amplified or lessened with different $\sigma$ and $\beta$ values.
469: 
470: \subsection{Fading Model Limitations}
471: 
472: The model we use is statistical and has several limitations.  Recent
473: observations have shown that transmission losses at the link layer are
474: not generally independent~\cite{aguayo-04}.  Moreover, a limitation of
475: the model we consider is that the PDF of the received power is
476: strictly a function of distance, making links symmetric.  However,
477: fading is known to cause asymmetric link qualities.  Since IEEE
478: 802.11 requires symmetric communication, it is likely to suffer as a
479: result of asymetric link qualities.  The effect of Asymmetry on
480: routing behavior has been considered but we do not know of any
481: analysis of the microeffects that arise due to
482: asymmetry~\cite{marina-02}; this is a topic of future work.  There is
483: a need for developing more accurate propagation models that capture
484: these effects.  However, we believe the simple fading models we use
485: are sufficient to identify the effects and problems we discuss in this
486: paper: more refined models will certainly enable more accurate
487: characterization of their effect.
488: 
489: Another limitation of the model is that we do not consider the effect
490: of multi-rate MAC protocols.  Recent versions of IEEE 802.11 recognize
491: the effect of fading on link quality~\cite{ieee-802.11std}.  To combat
492: this effect, the use multi-rate transmission where the modulation
493: scheme used is adapted dynamically and at the packet level to match
494: the link quality (high rate when link quality is high and lower rate
495: when it is low)~\cite{sadeghi-02}.  While this mitigates the effect of
496: fading, it comes at a high cost because the interframe spacing,
497: backoff periods and the rate negotiation headers have to be
498: transmitted at the lowest rate~\cite{pagtzis-01}.  We focus on single
499: transmission rate MAC protocols. While multi-rate MACs help to
500: mitigate the effect of fading, low-cost, low-power radios continue
501: to be single rate~\cite{bluetooth,ieee802.15std,woo-01}.  These radios are
502: the most likely candidate for use in embedded and low power devices.
503: 
504: 
505: 
506: %
507: 
508: %
509: %
510: %
511: %
512: %
513: 
514: 
515: %
516: %
517: %
518: %
519: %
520: %
521: %
522: %
523: %
524: %
525: %
526: %
527: %
528: %
529: %
530: %
531: %
532: %
533: %
534: %
535: %
536: %
537: %
538: %
539: 
540: 
541: %
542: %
543: %
544: %
545: %
546: %
547: %
548: %
549: %
550: %
551: %
552: %
553:  
554: 
555: %
556: %
557: %
558: %
559: %
560: %
561: %
562: %
563: %
564: %
565: %
566: %
567: %
568: %
569: %
570: 
571: %
572: %
573: %
574: %
575: %
576: 
577: 
578: %
579: %
580: %
581: %
582: %
583: %
584: %
585: %
586: %
587: %
588: %
589: %
590: %
591: %
592: %
593: %
594: %
595: %
596: %
597: %
598: %
599: %
600: 
601: %
602: %
603: %
604: %
605: %
606: %
607: 
608: %
609: %
610: %
611: %
612: %
613: %
614: %
615: %
616: 
617: %
618: %
619: %
620: %
621: %
622: %
623: %
624: %
625: %
626: %
627: %
628: %
629: %
630: %
631: 
632: %
633: %
634: %
635: 
636: %
637: %
638: %
639: %
640: %
641: %
642: %
643: %
644: %
645: 
646: %
647: %
648: %
649: %
650: %
651: %
652: %
653: %
654: %
655: %
656: %
657: %
658: %
659: %
660: %
661: 
662: %
663: %
664: %
665: %
666: %
667: %
668: %
669: %
670: %
671: %
672: %
673: %
674: %
675: %
676: %
677: %
678: %
679: %
680: %
681: %
682: %
683: %
684: %
685: 
686: %
687: %
688: %
689: %
690: %
691: %
692: %
693: %
694: 
695: %
696: 
697: %
698: %
699: %
700: %
701: %
702: %
703: %
704: %
705: %
706: %
707: %
708: %
709: %
710: %
711: 
712: \section{Basic Effect of Fading on the MAC Protocol}~\label{sec:mac}
713: 
714: In this section, we analyze the effect of fading on the MAC layer.
715: The effects identified in this section are not intended to be
716: comprehensive.  The fading model used is idealized and the
717: scenarios are simple.  Other intricate interactions may arise in more
718: realistic environments.  Our aim is to emphasize that fading must
719: be treated as a first class problem in MANET MAC protocol design.
720: Furthermore, in the next Section, we argue that it must also be
721: carefully designed for in higher level protocols.
722: 
723: The NS-2 network simulator is used for all simulation experiments in
724: this paper~\cite{ns-2}.  We use a path loss component of 3 (typical
725: range is 2--6 in real environments).  For the log-normal fading
726: model we set $\sigma=4dB$ (recall that 20dB fades are not uncommon; a
727: standard deviation of 4dB is rather conservative).  The transmission
728: power is set such that the ideal range is 250 meters.
729: 
730: 
731: \begin{figure}
732: \centerline{\includegraphics[width=0.85\linewidth]{power.eps}}
733: \caption{Unstable receiving power} 
734: \label{fig-recvpower220}
735: \end{figure}
736: 
737:  Figure~\ref{fig-recvpower220} shows a simulation trace of the
738: received power at distance 220 meters.  Note that when the receiving
739: power drops below the receiver sensitivity threshold, the transmission
740: is lost. Because we use a slow fading model, the same receive power is
741: assumed per packet.  
742: 
743: \subsection{Preliminaries}
744: 
745: In fading model, the received power depends on path loss $\beta$
746: and the log-normal component $X_{dB}$.  Eq (~\ref{eq5}) can be
747: simplified as the following: $\psi (p) = \tau(d) + X_{dB}$, where
748: $\psi(p)=[\frac{\overline{P_r(d)}}{P_r(d_0)}]_{dB} $ and
749: $\tau(d)=-10\beta log(\frac{d}{d_0}) $. Recall that $\psi(p)$ has
750: normal distribution $N( \tau(d) ,\sigma^2 )$.  Ignoring interference,
751: the probability of correct transmission is the probability of the
752: received power being higher than the receiver sensitivity threshold
753: ($P_{th}$, which is a radio constant).  This can be directly computed
754: as P($\psi(p) \ge P_{th}$).  
755: 
756: \begin{figure}
757: \centerline{\includegraphics[width=0.85\linewidth]{delivery-ratio.eps}}
758: \caption{Delivery Ratio With Distance} 
759: \label{fig-deliveryratio}
760: \end{figure}
761: 
762: Figure ~\ref{fig-deliveryratio} shows the computed delivery ratio
763: vs. that of the idealized two ray ground model.  Clearly fading has
764: a large effect on the packet delivery ratio as the distance between
765: the sender and the receiver increases.  Although we show our results
766: as function of distance, they should be considered of in terms of
767: delivery ratio (which in our model has a one to one mapping per
768: Figure~\ref{fig-deliveryratio}).  In real testbeds, the packet
769: reception probability is influenced by the surrounding environment and
770: its PDF is not only a function of distance.
771: 
772: This observation confirms the need for routing protocols to be aware
773: of the link quality. The figure also shows the delivery ratio obtained
774: from simulation which not surprisingly, is very close to the
775: calculated ones.  Since the link level transmission ratio in the
776: simulation is being generated with the same distribution used in the
777: analysis, the simulation represents a Monte Carlo solution with
778: packets dropped according to the propagation model equation.
779: 
780: \subsection{Effect of Packet Retransmission}
781: 
782: Packet retransmission is used to increase reliability and to recover
783: both from transmission errors and collisions.  In this section we
784: analyze the effect of retransmission on packet delivery ratio and show
785: that under low delivery retransmission is in fact counterproductive.
786: Moreover, we analyze the effect of retransmission on packet delay.  We
787: do this using the retransmission algorithm of IEEE 802.11.
788: 
789: In IEEE 802.11, there is a Short Retry Limit (SRL) and Long Retry
790: Limit (LRL).  A transmission is classified as long or short based on
791: its length relative to a fixed threshold.  A transmission below the
792: threshold is counted against the SRL, while a transmission above it is
793: counted against both SRL and LRL.  SRL and LRL are 7 and 4
794: respectively.  
795: 
796: \subsubsection{Effect on Packet Delivery Ratio}
797: 
798: Successful delivery of a data packet requires successful delivery of
799: sequence of RTS, CTS, DATA and ACK packets.  If the data packet is
800: shorter than the threshold, 7 retransmissions are tried regardless of
801: where the failure is.  If it is longer than the threshold, failures
802: that occur in the DATA or ACK are counted against both limits (since a
803: long transmission of the data has occurred), but failures in RTS or
804: CTS count against SRL only.
805: 
806: The effect of retransmission on overall packet delivery in the
807: presence of fading (but ignoring collisions) can be derived as
808: follows.  In order for a transmission to succeed, RTS, CTS, DATA and
809: ACK should not fail.  Thus packet success ($p_s$)and failure ($p_f$)
810: probabilities on a given try are given by $p_s=p^4$ and $p_f=(1-p^4)$,
811: where p is the link level delivery ratio (Eq~\ref{eq5}).  If there is
812: a failure in the first try at either of these four transmissions, a
813: second retry occurs, and so on.  The success in the first four tries
814: can be computed (binomial experiment) as:
815: \begin{eqnarray}
816: P_{1to4}= p_s+p_f*p_s+p_f^2*p_s+p_f^3*p_s \nonumber \\ 
817: p_s(1+p_f+p_f^2+p_f^3)
818: \end{eqnarray}
819: A fifth transmission will only occur if at least one of the failures
820: did not count against LRL.  The probability of a short failure
821: (failure in RTS or CTS) can be computed as
822: \begin{equation}
823: p_{sf} = 1-p^2
824: \end{equation}
825: Similarly, the probability of a long retry failure is
826: \begin{equation}
827: p_{lf} = p^2(1-p^2)
828: \end{equation}
829: The probability of a success in the fifth transmission can be computed
830: as the probability of failure in all 4 first transmissions, with one
831: or more of the failures being short, and a success in the fifth try.
832: Specifically, 
833: \begin{equation}
834: P_5=(p_f^4-p_{lf}^4)*p_s
835: \end{equation}
836: Similar reasoning can be applied to compute $P_6$ and $P_7$ to give a
837: total packet delivery probability as follows.
838: \begin{eqnarray}
839: P_{packet}=p_s(1+p_f+p_f^2+p_f^3+ p_f^4-p_{lf}^4 \nonumber \\
840: +((4*p_{sf}^2*p_{lf}^3) + (p_f^4-p_{lf}^4  \nonumber\\
841: -4 p_{sf}*p_{lf}^3)*p_f)) + (16*(p_{sf}^3*p_{lf}^3))\nonumber \\
842: +(4*p_{sf}^3*p_{lf}+p_{sf}^4)*p_f^2))~\label{eqcbrpckcase}
843: \end{eqnarray}
844: \noindent
845:  For short length data packet, the packet delivery ratio can be
846: derived as the probability of success in the first 7 trials of a
847: binomial experiment with $p_s$ outcome probability.
848: 
849: 
850: \begin{figure}
851: \centerline{\includegraphics[width=0.85\linewidth]{packet-delivery-ratio.eps}}
852: \caption{Packet Delivery Ratio} 
853: \label{fig-cbrdeliveryratiobycalc}
854: \end{figure}
855: Figure ~\ref{fig-cbrdeliveryratiobycalc} shows the probability of data
856: packet delivery.  Perhaps surprisingly, the long length data delivery
857: ratio is almost identical to the short length one; this indicates that
858: the high number of transmissions may not be needed (we note that this
859: conclusion may change when collisions are considered).  When the
860: delivery ratio is above 0.6, CBR packet delivery ratio is better than
861: link level delivery ratio.  However, {\bf below 0.6, the packet delivery
862: ratio is worse than the link delivery ratio despite retransmission.}
863: This effect occurs because correct retransmission requires correct
864: reception of 4 packets (RTS/CTS/DATA/ACK), while link level success
865: requires correct reception of only 1.  The retransmissions are not
866: sufficient to overcome this disadvantage at low link level delivery
867: ratios.
868: 
869: 
870: 
871: \subsection{Effect on Delay}
872: 
873: %
874: %
875: %
876: %
877: %
878: 
879: Fading also affects the delay of packet delivery; multiple retries
880: are needed, with an exponentially increasing backoff between them.  We
881: now develop a simple analytical model for the delay.  Developing a
882: closed form solution for packet delay in the presence of the long and
883: short retry limits requires enumerating possible sequences of failures
884: (a few hundred cases).  Instead, we develop a solution for the
885: expected value of a backoff period as a function of the link level
886: delivery ratio. 
887: 
888: 
889: We note that the backoff is reset to the minimum value (31 slots)
890: whenever a CTS or ACK packet is received, and doubled whenever they
891: fail to be received (with a cap of 1023 slots).  The backoff period is
892: selected randomly between 0 and the current window size.  A CTS (ACK)
893: is received only if the RTS (Data) packet is received.  The
894: probability of two consecutive correct transmissions (ignoring
895: interference) is $p^2$.  The expected value of a backoff period can be
896: computed as follows
897: \begin{eqnarray}
898: E(Backoff) = \frac{p^2}{2} \cdot ( 31 + 63 *(1-p^2)  \nonumber  \\
899: + 127*(1-p^2)^2 + 255 \cdot (1-p^2)^3  \nonumber  \\
900: + 511 \cdot (1-p^2)^4) + \frac{1023}{2} \cdot (1-p^2(1  \nonumber  \\
901: + (1-p^2) + (1-p^2)^2 +(1-p^2)^3 +(1-p^2)^4))
902: \end{eqnarray}
903: \noindent
904: 
905: 
906: \begin{figure}
907: \centerline{\includegraphics[width=0.85\linewidth]{expected-backoff.eps}}
908: \caption{Expected Value of the Backoff} 
909: \label{Ebackoff}
910: \end{figure}
911: 
912: 
913: %
914: %
915: %
916: %
917: %
918: 
919: \begin{figure}[ht]
920: \centerline{\includegraphics[width=0.85\linewidth]{delay1hop.eps}}
921: \caption{One-hop Packet Delay}
922: \label{delay1hop}
923: \end{figure}
924: 
925: This expected value is shown in Figure~\ref{Ebackoff}.  The average
926: backoff period is significantly higher than minimum even at reasonably
927: stable links.  The backoff period increases exponentially but is
928: capped at the maximum period resulting in the behavior shown.  Note
929: that the average packet delay will increase faster than this ratio
930: since the number of required retransmissions will increase as the
931: delivery ratio drops (incurring multiple backoff periods in addition
932: to the retransmissions).  The one-hop packet delay obtained by
933: simulation is shown in Figure~\ref{delay1hop}.  The delay increases
934: quickly with the as the quality of the link drops.  
935: 
936: In the following sections, we discuss some important implications that
937: follow from this analysis.  First, we make the case that RTS/CTS is
938: harmful to performance under fading.  Second, we identify an
939: unfairness problem that arises due to fading.  Finally, we discuss
940: additional effects that arise due to fading.
941: 
942: %
943: %
944: %
945: %
946: 
947: \section{RTS/CTS Considered Harmful}~\label{sec:noRTS}
948: 
949: As was observed in Figure~\ref{fig-cbrdeliveryratiobycalc}, the packet
950: delivery ratio drops below the transmission delivery ratio when the
951: link state is poor (below 60\% transmission delivery ratio).  The
952: result is explained by the fact that 4 transmissions must succeed for
953: a packet to be delivered (RTS,CTS, Data and ACK).  At low transmission
954: success probability it becomes highly improbable for 4 consecutive
955: transmissions to succeed.
956: 
957: An alternative approach (which is supported by IEEE 802.11 for short
958: packets) is to rely on just CSMA without RTS/CTS and use
959: acknowledgments to recover from errors and collisions.  We first
960: analyze this approach assuming no collisions and then revisit to
961: discuss the effect of collisions.  In this approach, only two
962: consecutive transmissions (Data and ACK) have to be received
963: correctly; this has a much higher probability of success than 4
964: consecutive transmissions.  In this case, only two transmissions need
965: be received correctly (DATA and ACK).  In this section, we make the
966: argument that removing RTS/CTS is beneficial for performance.  We make
967: this argument in two parts: first we show that removing RTS/CTS
968: significantly improves packet delivery in the presence of losses, and
969: then show that the effect of eliminating RTS/CTS on reducing
970: collisions is not large.
971: 
972: \subsection{MAC-layer Analysis without RTS/CTS}
973: 
974:   The probability of correct reception with a retransmit limit of 4
975: when RTS/CTS is not used can be obtained as a 4 step binomial
976: experiment as follows:
977: \begin{equation}
978: P_{packet}=p^2(1+(1-p^2)+(1-p^2)^2+(1-p^2)^3)
979: \end{equation}
980: 
981: 
982: \begin{figure}
983: \centerline{\includegraphics[width=0.85\linewidth]{norts-delivery.eps}}
984: \caption{Packet Delivery with/without RTS/CTS} 
985: \label{no-rts-delivery}
986: \end{figure}
987: 
988: \begin{figure}
989: \centerline{\includegraphics[width=0.85\linewidth]{capacity.eps}}
990: \caption{Link Capacity} 
991: \label{capacity}
992: \end{figure}
993: 
994: 
995: Packet delivery ratio is significantly improved when the RTS/CTS
996: handshake is omitted.  This effect can be seen in
997: Figure~\ref{no-rts-delivery}.  The average packet delay is reduced if
998: RTS/CTS are omitted.  This can be proven using the observation that
999: the expected delay of a transmission assuming all RTS/CTS are
1000: successful and ignoring the cost of RTS/CTS is equivalent to the
1001: expected delay of the approach that does not use RTS/CTS.  Thus, using
1002: RTS/CTS, we have to add the cost of the RTS/CTS as well as failed
1003: RTS/CTS and the associated increase in backoffs.
1004: Figure~\ref{capacity} shows the obtained capacity with and without
1005: RTS/CTS for a single hop -- clearly, there is a large advantage for
1006: the case without RTS/CTS.  Similar positive results hold for the delay
1007: (not shown).
1008: 
1009: 
1010: %
1011: %
1012: %
1013: %
1014: %
1015: %
1016: %
1017: %
1018: %
1019: %
1020: 
1021: \subsection{Effect on Collisions}
1022: 
1023: A potential drawback of this approach is that the advantages of
1024: collision avoidance (RTS and CTS) in reducing collisions and collision
1025: cost are lost. We argue that RTS/CTS is only of limited success in eliminating
1026: collisions and that the complimentary Carrier Sense Multiple Access
1027: (CSMA) is more effective in reducing collisions.  Some collisions
1028: occur when two senders sense the medium to be idle and transmit
1029: concurrently; such collisions cannot be prevented by either approach.
1030: However, the vulnerability period to such collisions is low and their
1031: effect is not likely to dominate.  One advantage that RTS/CTS offer to
1032: such collisions is that contention is carried out with small control
1033: packets, whereas a full data packet is lost if only CSMA is used.
1034: 
1035: 
1036: \begin{figure}
1037: \centerline{\epsfig{file=csma.eps,width=0.7\linewidth,angle=270,silent=}}
1038: \caption{CSMA vs. Collision Avoidance} 
1039: \label{csma}
1040: \end{figure}
1041: 
1042: Collisions occur in a wireless environment if the ratio of the
1043: received packet power to the interfering power (other transmissions
1044: and noise) fall below a threshold called the {\em capture threshold}.
1045: Its well known that collision avoidance is not sufficient to prevent
1046: collisions: a node that is close enough to the receiver to interfere
1047: but not close enough to receive the CTS packet can possibly cause a
1048: collision.  In Figure~\ref{csma}, we consider a situation where
1049: a source (S) is communicating with a receiver (R) in the presence of
1050: an interfering node (I).  The x-axis shows the distance between the S
1051: and R, while the y-axis shows that between I and R.  Points on the
1052: figure above the capture lines indicate that capture does happen (the
1053: interferer is too far) while those below indicate that a collision
1054: happens.  The capture value represents the capture threshold, while
1055: $n$ represents the path loss factor (the signal decays with
1056: $\frac{1}{r}^n$ where $r$ is the distance from the transmitter).  The
1057: capture line plots the interferer distance that would
1058: cause $\frac{P_{sender}}{P_{interferer}}=Capture$.  Note
1059: that this approximate analysis assumes only a single interferer,
1060: ignores the effect of noise, and assumes ideal propagation.
1061: 
1062: Essentially to control collisions all potential interferers (below the
1063: capture line on Figure~\ref{csma}) should be blocked.  Collision
1064: Avoidance (RTS/CTS) can only block interferers in reception range of
1065: the receiver (to receive the CTS).  Thus, many potential interferers
1066: are not blocked with the RTS/CTS mechanism.  This is the area under
1067: the capture line but above the 250 meter line.
1068: 
1069: The main mechanism for avoiding collisions in commercial wireless
1070: cards is an aggressive Carrier Sense (with low sense threshold).  This
1071: aggressive threshold is used both to attempt for interferers out of
1072: receivers range and for the fact that carrier sense occurs at the
1073: sender, but collisions occur at the receiver.  For a WaveLAN
1074: card~\cite{wavelan-manual} with a nominal transmission range of 250
1075: meters, the carrier sense threshold is set such that transmitters in a
1076: circle of radius 2.2 times the transmission range around S are forced
1077: to stay idle (assuming a path loss factor of 4).  Having this
1078: aggressive threshold reduces collisions (it does not completely
1079: eliminate them), but increases the exposed terminal problem.
1080: 
1081: CSMA's effectiveness in blocking interferers is a superset of that of
1082: Collision Avoidance: all collisions that can be eliminated by
1083: collision avoidance can also be eliminated by CSMA.  Furthermore, CSMA
1084: is able to prevent many more collisions not preventable by RTS/CTS.
1085: Since CSMA is applied at the sender but the interference happens at
1086: the receiver, its effectiveness depends on the location of the
1087: interferer from the source.  More specifically, for carrier sense to
1088: occur successfully, the signal power of the interferer at the sender
1089: should be above the carrier sense threshold.  In the average case
1090: (when the interferer to source distance is equal to the receiver to
1091: source distance; that is, the interferer location is not biased either
1092: closer to the sender or further away from it), CSMA is able to prevent
1093: all possible collisions (the average-case line on Figure~\ref{csma}).
1094: The worst case for CSMA occurs is when the interferer is on the side
1095: of the receiver away from the sender (this is the worst-case line on
1096: Figure~\ref{csma}).  In this case, the interferer's distance to the
1097: sender is maximized for a given interferer-receiver distance.  Even in
1098: the worst case, CSMA prevents all collisions catchable by CA -- recall
1099: that all the cases under the line are prevented for each mechanism.
1100: Note that in the worst case, some collisions are not preventable.
1101: 
1102: Thus, we perceive no benefit for RTS/CTS in reducing collisions.
1103: Their only benefit is in reducing the cost of collisions for
1104: collisions that occur due to concurrent sensing of an idle channel; in
1105: this case, collisions occur on the small RTS/CTS control packets
1106: instead of full length data packets.  This only works for interferers
1107: in range to receive a CTS -- this is a relatively small area of
1108: possible interferers as seen on the Figure.  Moreover, in the case of multiple
1109: interferers, their combined interference power may cause a collision.  This
1110: helps CSMA and hurts CA: CA requires that each of the intereferers be in
1111: reception range, while CSMA naturally takes their effect in since carrier
1112: sense measures their combined effect.  Thus, given the
1113: dramatic degradation CA causes on packet delivery ratio in the presence of
1114: fading and the small benefit it provides to collisions 
1115: it is beneficial to eliminate them.  
1116: 
1117: We note that this conclusion is only dependent on the carrier
1118: sense threshold.  If the path loss component is different, or if the
1119: send power is different, this affects both the carrier sense and the
1120: collision avoidance.  Furthermore, if the capture threshold is
1121: different, this has the same effect on both CSMA and CA (the slope of
1122: the capture line changes, but not the other lines).
1123: 
1124: %
1125:   %
1126: 
1127: %
1128: %
1129: %
1130: %
1131: %
1132: 
1133: 
1134: %
1135: %
1136: %
1137: %
1138: %
1139: %
1140: %
1141: %
1142: %
1143: %
1144: %
1145: %
1146: %
1147: %
1148: %
1149: %
1150: %
1151: 
1152: %
1153: %
1154: %
1155: %
1156: %
1157: %
1158: %
1159: %
1160: %
1161: 
1162: %
1163: %
1164: %
1165: 
1166: %
1167: %
1168: %
1169: %
1170: %
1171: %
1172: %
1173: %
1174: %
1175: %
1176: %
1177: 
1178: 
1179: 
1180: 
1181: \section{Backoff Implications -- Inefficiency and Unfairness}~\label{sec:backoff}
1182: 
1183: The second major implication from the basic MAC analysis in
1184: Section~\ref{sec:mac} concerns the backoff mechanism.  The backoff
1185: mechanism in contention based MAC protocols (such as 802.11 DCF mode
1186: used for MANETs) is intended to regulate the offered load to the
1187: shared medium.  The underlying assumption is that all packet losses
1188: are due to collisions.  While this assumption is true in wired shared
1189: media where errors are exceptionally rare, it is not true in wireless
1190: environments.  As a result of losses due to fading, the backoff
1191: timer is increased.  This leads to two important side effects: (1)
1192: Inefficiency in using the medium: backoffs occur even without
1193: collisions, leading to nodes backing off excessively
1194: causing unnecessary channel idle time;
1195: and (2) unfairness: because the expected backoff period increases with
1196: the of transmission losses, links that experience losses have a larger
1197: average backoff than those that do.  IEEE 802.11 is known to be
1198: susceptible to short-term transient unfairness even under idealized
1199: propagation assumptions~\cite{vaidya-00}.  Under fading
1200: we show that steady-state unfairness can occur.
1201: 
1202: The inefficiency issue was already alluded to in the discussion of the
1203: delay and effective throughput.  Backoff increasingly contributes to
1204: the delay as the transmission delivery ratio drops: as a larger number
1205: of retries is needed, we have the multiplicative effect of a larger
1206: number of backoff periods and longer average backoffs.  The problem
1207: occurs due to the implicit assumption that losses are due to
1208: contention.  In the presence of fading, this is often not the case
1209: causing inappropriate backoff.  Finer discrimination between
1210: contention losses (collisions) and transmission losses (fading) are
1211: needed.
1212: 
1213: The unfairness problem occurs due to the imbalance in backoff
1214: durations.  On average, links with lower transmission success ratios
1215: will have a higher backoff period (Figure~\ref{Ebackoff}).  As a
1216: result, competition for the link is no longer fair -- links with
1217: higher transmission delivery ratio have a higher probability of
1218: capturing the link.  IEEE 802.11 already suffers from short term
1219: unfairness~\cite{vaidya-00}.  However, the unfairness problem
1220: identified here is sustained.  Addressing this problem also requires
1221: backoff algorithms that can discriminate between collisions and
1222: transmission losses.
1223: 
1224: %
1225: \begin{figure}
1226: \centerline{\includegraphics[width=0.85\linewidth]{throughput.eps}}
1227: \caption{Unfair Throughput} 
1228: \label{unfair3}
1229: \end{figure}
1230: 
1231: 
1232: To illustrate this problem, we simulate two single hop connections
1233: whose sources are in range with each other, but whose receivers are
1234: not (to isolate the effect of a single contention point).  The
1235: distance (and therefore the transmission delivery ratio) of one
1236: connection was fixed at 150 meters (Connection 1) and the other varied
1237: (Connection 2).  Each connection generates CBR traffic at a rate that
1238: would use all the available bandwidth if there is no contention.
1239: Figure~\ref{unfair3} shows the raw throughput obtained by the two
1240: connections with and without RTS/CTS.  The first observation is that
1241: the no RTS/CTS version is able to
1242: obtain higher throughput even in the presence of contention.  The
1243: unfairness problem can be seen on the diagram as the first connection
1244: gets an increasingly higher portion of the available bandwidth at the
1245: expense of the weaker connection.
1246: 
1247: %
1248: \begin{figure}
1249: \centerline{\includegraphics[width=0.85\linewidth]{unfairness.eps}}
1250: \caption{Unfairness with Packet size 500 bytes} 
1251: \label{unfair1}
1252: \end{figure}
1253: 
1254: \begin{figure}
1255: \centerline{\includegraphics[width=0.85\linewidth]{unfairness1500.eps}}
1256: \caption{Unfairness with Packet size 1500 bytes} 
1257: \label{unfair2}
1258: \end{figure}
1259: 
1260: 
1261: 
1262: Its difficult to assess the degree of unfairness since the expected
1263: throughput of the hop goes down with the increased hop delay as the
1264: connection becomes weaker.  To normalize this effect, we use a metric
1265: of the percentage of delivered packets as a ratio of the maximum
1266: deliverable packets on the connection if no interference was present.
1267: In a fair implementation, the two connections would be able to get an
1268: equivalent percentage of their maximum throughput.
1269: Figures~\ref{unfair1} and ~\ref{unfair2} illustrate the problem for 500
1270: byte and 1500 byte packets respectively.  Clearly, the strong
1271: connection dominates for both scenarios.  When the two distances are
1272: equal, the connections share the bandwidth almost equally since the
1273: backoffs are not biased in favor of either connection.  The unfairness
1274: problem is clear as the connection using the strong link quickly
1275: dominates the weaker one.  This is true for both packet sizes studied
1276: and with and without RTS/CTS.
1277: 
1278: \begin{figure}
1279: \centerline{\includegraphics[width=0.85\linewidth]{unfairnessCW.eps}}
1280: \caption{Backoff Disabled} 
1281: \label{fair}
1282: \end{figure}
1283: %
1284: %
1285: 
1286: To verify that the unfairness is due to backoff, we disabled backoff
1287: in the above scenario since the vast majority of losses were due to
1288: fading.  In this case, the two connections were able to get fair
1289: access to the medium across all distances (Figure~\ref{fair}).  This
1290: naive algorithm assumes that all losses are due to fading.
1291: Clearly, this is not a feasible solution, but it highlights the
1292: importance for discrimination between fading and contention losses.
1293: For example, possible discriminators such as channel utilization as a
1294: measure of contention or the use of physical level detection of
1295: collisions at the receiver with feedback to the sender are likely to
1296: provide effective discriminators for controlling the MAC backoff
1297: algorithm.  This is a topic of future work.
1298: 
1299: %
1300: %
1301: %
1302: %
1303: %
1304: %
1305: %
1306: 
1307: \section{Effects on Upper Layers}~\label{sec:routing}
1308: 
1309: A number of problems due to fading have been encountered in real
1310: testbeds and several solutions have been developed.  The most heavily
1311: studied problem is the issue of link quality and exposing that to the
1312: routing protocol to enable it to evaluate path
1313: quality~\cite{decouto-03a,aguayo-04}.  Moreover, the problem of
1314: discovering low quality hops that may become visible due to fading
1315: is well known~\cite{chin-02,maltz-00}.  The problem occurs if the protocol
1316: attempts to discover only high quality links -- lower quality ones are
1317: still occasionally visible to route discovery.  One of the proposed
1318: solutions is to use MAC filtering to assess the quality of the
1319: link before accepting it~\cite{chin-02,maltz-00,dube-97,goff-01}; this approach
1320: improves performance but does not eliminate the problem.   We were able to
1321: reproduce these problems in our simulations.   
1322: In this section, we outline additional problems and interactions that arise 
1323: at the upper protocol layers due to fading.  We are pursuing solutions to several of these problems.
1324: 
1325: 
1326: \subsection{Link and Route Qualities}
1327: Exposing link quality to the routing protocol is an important step
1328: towards effective evaluation of route qualities.  However, we believe
1329: that current link quality metrics and their combination into a route
1330: costs are not representative of actual behavior.  Packet delivery
1331: ratio based metrics such as ETX appear to perform better than delay
1332: metrics~\cite{draves-04,woo-03}.  The route quality is then obtained by
1333: adding up the costs of the individual links.  However, both link delay
1334: and throughput are not linear functions of packet delivery.  Simply
1335: adding the individual links does not provide an accurate estimate of
1336: the delay or expected throughput of the connection.
1337: 
1338: A more subtle effect occurs at the connection level as well.  Due to
1339: the unfairness problem, the problem of self-contention among hops of a
1340: single connection exhibits markedly different performance when
1341: fading is considered.  Specifically, under idealized assumptions,
1342: there is a bias towards hops closer to the source since these hops
1343: supply packets.  Thus, later hops cannot be unfair against earlier
1344: hops -- the best they can hope for is to match
1345: them~\cite{xu-02}.  When fading is considered, the
1346: effect of this problem is much more pronounced.  More specifically,
1347: because a better quality link can dominate the available bandwidth
1348: when contending with a lower quality one, the following effect is
1349: observed.  If a strong connection precedes a weaker one in a multi-hop
1350: chain, the strong connection will dominate the weaker one.  Thus,
1351: packets would be sent to the source of the weaker connection, and get
1352: dropped there because it is unable to get a share of the bandwidth to
1353: send the packets it received.
1354: 
1355: If the weaker link comes first, it has a regulating effect on the
1356: stronger one -- the stronger link is limited in terms of supply
1357: packets to what the weaker link can provide it.  Thus, the quality of
1358: the route is not simply the sum of the qualities of the links -- the
1359: order of the links has to be considered as well.  Alternative,
1360: sophisticated packet scheduling techniques can be used to bypass this
1361: problem.  We believe that addressing the root problem of MAC level
1362: unfairness will provide a better solution.  
1363: 
1364: \begin{figure}
1365: \centerline{\epsfig{file=order.eps,width=0.7\linewidth,silent=}}
1366: \caption{Effect of Hop Order}
1367: \label{order}
1368: \end{figure}
1369: 
1370: The effect of the link
1371: order on chain performance can be seen in Figure~\ref{order}.  In this experiment, the throughput of a two hop connection is tracked.  The figure shows 4 situations depending on the quality of the two links.  Most interesting is the performance of the middle scenarios.  A
1372: connection with a weak link followed by a strong one performance much
1373: better than a connection with the strong link first.  In fact, when the strong link comes first, the throughput is {\em worse} than a connection with 
1374: two weak links (the fourth scenario).  
1375: Our future research regarding this problem targets coming up with
1376: generalized route quality estimates based on link qualities and order.  
1377: 
1378: \subsection{Effect of Spurious Route Errors}
1379: 
1380: The dual of discovering unwanted low quality hops is mistakenly
1381: thinking that good quality ones are no longer there.  Some routing
1382: protocols such as DSR~\cite{johnson-01} assume that a failure to send
1383: a packet is due to mobility.  Again, this is due to idealized
1384: propagation assumptions causing packet losses to be almost always due
1385: to mobility.  However, packet failures due to repeated collisions have
1386: been shown to cause route errors under heavy loads as
1387: well~\cite{xu-02}.  Route errors can have a major effect on
1388: performance -- leading to expensive route searches and connection
1389: interruption while route discovery is accomplished.
1390: 
1391: Under fading, even in good quality links occasional packet failures
1392: do arise.  For example, even when the transmission delivery ratio is
1393: 90\%, there is approximately a 2\% chance of a packet failure with 4
1394: retries (as would happen with no RTS/CTS).  This would lead to route
1395: error getting generated every 50 packets; the effect is even worse
1396: when one considers a multi-hop connection -- each data packet has a
1397: chance of causing a route error at every hop.
1398: 
1399: The Link Quality Source Routing (LQSR) protocol provides a framework
1400: for managing this and similar problems~\cite{draves-04}.  LQSR
1401: constantly monitors path quality by providing feedback to the sender
1402: potentially with every packet delivered.  While LQSR still generates the
1403: Route Error Packet when delivery failure occurs, it does not interpret
1404: such a packet as a loss of route at the source -- simply, the source 
1405: penalizes the link (increasing its cost estimate).  
1406: 
1407: Such approaches are needed to filter out transient losses due to
1408: fading from real loss of route.  However, a large amount of
1409: overhead can be generated due to these route error packets.  We have
1410: developed an approach for locally discriminating between fading
1411: losses and loss of connection due to mobility.  Essentially, an
1412: exponential average of the delivery ratio along an active link is
1413: tracked.  When packet drops occur, they generate route errors only if
1414: the stable estimate of the link quality is low (indicating possibility
1415: of disconnection).
1416: 
1417: \subsection{Effect on MAC broadcasts and Route Discovery}
1418: 
1419: 
1420: 
1421: \begin{figure} 
1422: \centerline{\epsfig{file=macbcast.eps,width=0.7\linewidth,angle=270,silent=}}
1423: \caption{Effect on Network Wide Broadcast}
1424: \label{paul-fig}
1425: \end{figure}
1426:                                                                                 
1427: 
1428: Fading has especially high impact on broadcast operations.  Unlike
1429: unicast packets, MAC level broadcast is not acknowledged -- if a
1430: broadcast is loss, the loss is undetected and no retransmissions
1431: occur.  As a result, broadcast transmissions are only delivered at the
1432: link level transmission ratio (see Figure~\ref{fig-cbrdeliveryratiobycalc}), making
1433: them especially vulnerable to fading.  This has important
1434: implications on all protocols that use MAC broadcast such as flooding
1435: and group communication operations.  
1436: 
1437: Figure~\ref{paul-fig} shows the effect of this problem on flooding
1438: coverage as the network density increases.  In this scenario, a number of
1439: nodes are deployed randomly in a 1000x1000 meter area; the number of nodes is varied to increase the density.  We
1440: simulated the effect of fading using probabilistic packet drop to
1441: have control on the loss rate.  Clearly, the coverage of flooding
1442: suffers as the quality of the links drops.  This is especially true
1443: for sparse networks (and for sparse areas of networks).  Moreover, since many optimized Network-Wide
1444: Broadcast operations reduce the redundancy in flooding, they end up
1445: becoming more vulnerable to fading losses.  We characterize this
1446: problem and investigate solutions to it in another paper submitted to
1447: MobiHoc. 
1448: 
1449: Because of fading packets may fail multiple consecutive
1450: retransmissions and be dropped because the retransmission limit is
1451: reached.  Many routing protocols use MAC level transmission failure as
1452: an indicator that the link is no longer available (due to mobility).
1453: It is important to have more effective discrimination between packet
1454: losses due to fading and those due to mobility.  
1455: 
1456: 
1457: %
1458: %
1459: %
1460: %
1461: %
1462: 
1463: 
1464: 
1465: 
1466: 
1467: 
1468: 
1469: 
1470: 
1471: 
1472: 
1473: 
1474: %
1475: %
1476: 
1477: \section{Conclusions}~\label{sec:conclude}
1478: 
1479: In this paper, we presented the result of a bottom-up investigation of
1480: the effect of fading on MANET protocol performance.  We first did
1481: an analysis of the effect of fading on the MAC layer and showed
1482: that packet delivery ratio, packet delay and effective throughput all
1483: suffer as a result of fading.  
1484: 
1485: Based on this analysis, we made the case the Collision Avoidance (the
1486: RTS/CTS mechanism) is harmful for performance.  This case has two
1487: sides: under fading, it become significantly harder to deliver
1488: packets if 4 successive transmissions must be delivered correctly
1489: (RTS/CTS/DATA/ACK) vs. only 2 transmissions if RTS/CTS is not used.
1490: In addition, we showed that RTS/CTS has minor benefit in preventing
1491: collisions.  More specifically, with aggressive carrier sense (as is
1492: commonly used in commercial radios), CSMA can prevent all collisions
1493: that are also preventable by CA (and in fact, considerably more).  The
1494: benefit of RTS/CTS is then isolated to making the cost of contention
1495: for situations where an interferer is in range with either the sender
1496: or the receiver less (due to contention using the smaller RTS
1497: packets).  Overall, we believe that the large benefit in performance
1498: due to eliminating RTS/CTS is not recuperated by the small benefit to
1499: the cost of collisions for a subset of the collisions.
1500: 
1501: Another primary contribution of this paper is to identify an
1502: unfairness problem that arises due to fading.  More specifically,
1503: the MAC layer backoff algorithm presumes that all losses are due to
1504: contention.  Thus, losses that occur due to fading increase the
1505: backoff even when no contention exists.  Thus, weaker links are at a
1506: disadvantage to stronger links because they end up backing-off more
1507: frequently.  We showed that this problem can be severe even when the
1508: difference in the quality between the links is minor.  In the long
1509: term, we believe that the root of this problem must be attacked: the
1510: backoff algorithm should be able to discriminate between contention
1511: and transmission losses.  We are investigating techniques to estimate
1512: the contention to avoid the inefficiency and unfairness problems that
1513: arise due to it.  In addition, we outlined the effect of fading on
1514: broadcast and multicast operations.
1515: 
1516: We also presented an overview of additional problems that arise at the
1517: upper layers.  Some of these problems are known, but the solutions to
1518: them are ad hoc in nature and not systemic (for example, the problem
1519: of discovering low quality links; also the related problem of dropping
1520: good quality ones when a packet fails).  One of the problems we
1521: outlined is an artifact of the unfairness problem at the MAC layer.
1522: As a result of this problem, path quality is sensitive to the order of
1523: hops in a multi-hop connection.  More specifically, if a strong link
1524: is closer to the source than a weaker one, it ends up dominating it
1525: due to the unfairness problem: packets would constantly be delivered
1526: to the source of the weaker hop only to be dropped there.  However, if
1527: the weaker link comes first, the stronger link cannot dominate because
1528: its packet supply comes from the weaker link.  There is a need for a
1529: generalized approach for estimating link quality that takes such
1530: behavior into consideration.
1531: 
1532: The fading model we use has several limitations.  It treats links
1533: symmetrically and assumes that losses are independent; both these
1534: assumptions are not valid in real testbeds.  Nevertheless, we believe
1535: that the problems that are isolated are real but the magnitude of
1536: their effect may be different when a more accurate model is used.
1537: Moreover, we did not consider the effect of multi-rate MAC
1538: protocols~\cite{sadeghi-02,seok-multirate}.  Upgrading the propagation
1539: model to better reflect wireless propagation and generalizing our
1540: analysis is also a topic of future work.
1541: 
1542: \bibliography{local}
1543: \bibliographystyle{IEEE}
1544: \end{document}
1545: 
1546: 
1547: