Professional Documents
Culture Documents
Power-Controlled Medium Access Control Protocol For Full-Duplex Wifi Networks
Power-Controlled Medium Access Control Protocol For Full-Duplex Wifi Networks
problem is then solved as part of the proposed MAC protocol, two-node bidirectional full-duplex transmissions and three-
namely, power-controlled MAC (PoCMAC), to coordinate the node full-duplex transmissions where all the clients have full-
uplink and downlink transmissions. By adjusting the transmit duplex capability. Ramirez et al. proposed a joint algorithm
powers of the AP and transmitter, the inter-client interference is to realize power allocation and routing in full-duplex wireless
minimized, and higher sum throughput of uplink and downlink relay networks [13]. They presented a power allocation scheme
transmissions can be achieved. PoCMAC uses additional short considering both self-interference and interference among
control frames for selecting a receiver and an acknowledgement neighboring nodes. Singh et al. proposed a distributed MAC
frame for completing full-duplex transmissions. In spite of the protocol with a selection scheme for a secondary receiver [14].
increased overhead due to the control frames, the proposed The selection scheme assigns weight values to candidates for
MAC protocol can achieve a high performance gain because the secondary receiver. If a candidate node experiences more
the AP can additionally transmit a long data frame while it is successful transmissions, it has a higher weight value and
receiving an uplink transmission. thus a greater chance to be selected as the secondary receiver.
To verify the performance of the proposed MAC protocol, Using this scheme, potential collisions at the secondary receiver
we analyze the signal-to-interference-plus-noise ratio (SINR) owing to the primary transmission could be mitigated.
of uplink and downlink transmissions with respect to the inter- One of the key shortcomings of the aforementioned studies is
client interference. Further, we compare the throughput and that the leveraging of full-duplex AP capability is not supported
fairness performance of the proposed MAC protocol with other when all flows are half-duplex, which is possible in practical
schemes through extensive simulations. In the simulations, the wireless network environments supporting devices that do not
proposed MAC protocol enhances the throughput performance have full-duplex ability. In other words, the MAC protocols
by around 180% as compared to an IEEE 802.11-based half- proposed in previous studies can be applied only to a wireless
duplex system, and by around 145% as compared to a full- network where all the clients in the network have full-duplex
duplex system without any schemes such as power control and capability. However, in this paper, we consider a new MAC
receiver selection. In addition, we conduct software-defined protocol design to achieve the maximum performance gain in
radio-based experiments to confirm the power control effect of practical wireless networks when only the AP has full-duplex
the proposed MAC protocol. The simulations and experiments capability.
show that the proposed MAC protocol achieves better perfor- Bai et al. presented the achievable rate of a three-node wire-
mance than other schemes in terms of both throughput and less network with a full-duplex base station and two half-duplex
fairness by effectively managing the inter-client interference. clients [15]. Although theirs was the first study to investigate
the mitigation of inter-client interference among half-duplex
clients, the authors leveraged an additional out-of-band side-
A. Related Work
channel to manage inter-client interference; moreover, they did
Several MAC protocols for full-duplex wireless communica- not propose a MAC protocol for wireless networks where a
tion have been studied. Sen et al. proposed carrier sense multiple large number of clients are randomly distributed. In the present
access with collision notification (CSMA/CN) to immediately study, we consider more practical scenarios of full-duplex wire-
notify a transmitter about a collision and stop the ongoing less networks that consist of a full-duplex AP and half-duplex
transmission [8]. Jain et al. presented a simple MAC protocol to clients without an additional channel, and we propose a new
mitigate hidden terminals using a busy tone [2]. Sahai et al. pro- MAC protocol that can be easily applied to practical wireless
posed a full-duplex MAC (FD-MAC) protocol to evenly pro- networks.
vide transmission opportunities and reduce collision probability The remainder of this paper is organized as follows.
[3]. Duarte et al. proposed a MAC protocol based on the IEEE Section II presents the system model for an in-band full-duplex
802.11 distributed coordinated function (DCF) with request to wireless network. Section III describes a new MAC protocol
send (RTS) and clear to send (CTS) [5]. Tamaki et al. proposed that identifies the receiver with low inter-client interference
a relay full-duplex MAC (RFD-MAC) protocol to select the and controls the transmit powers of the AP and transmitter. To
next forwarding node using the 1-bit information slot in each obtain the optimal transmit powers, we formulate an optimiza-
frame [9]. Zhou et al. proposed a rapid concurrent transmission tion problem to maximize the uplink and downlink capacity
coordination (RCTC) protocol that enables exposed terminals based on the channel gain information of the AP and clients.
to realize concurrent transmission [10]. Most of these studies Then, we design the MAC protocol to coordinate the uplink and
considered a homogeneous scenario where all the clients have downlink transmissions to fully exploit full-duplex capability.
full-duplex capability, which makes the transmission coordina- Section IV presents the performance evaluation of the proposed
tion problem much simpler because the clients easily share the MAC protocol. Finally, Section V summarizes our findings and
channel and transmission information with one another. concludes the paper.
Inter-client interference among clients may significantly de-
teriorate the throughput performance of full-duplex wireless
II. S YSTEM M ODEL
networks because two clients are allowed to transmit simul-
taneously. Several studies have investigated the mitigation of We consider an in-band full-duplex wireless network that
the inter-client interference problem. Goyal et al. proposed consists of an AP with full-duplex capability and multiple
a distributed MAC protocol that considers the traffic condi- clients without full-duplex capability. Note that the AP is
tion and inter-client interference [12]; this protocol supports easily equipped with elaborate antenna techniques and signal
CHOI et al.: POWER-CONTROLLED MEDIUM ACCESS CONTROL PROTOCOL FOR FULL-DUPLEX WiFi NETWORKS 3603
Fig. 3. Sum rate Rsum with respect to (a) the position of the RX and (b) RSS values at the RX for the signals from the AP and TX, when the AP and TX are
located at (0, 0) and (−50, 0), respectively. (a) Position of RX. (b) RSS at RX for the signals from AP and TX.
can have high SINRDownlink , and thus, Rsum becomes high. and therefore, the AP can fully exploit full-duplex capability
On the other hand, if the signal from the TX is strong, the for higher throughput performance. PoCMAC performs the
RX cannot receive the signal transmitted by the AP because following key functions: 1) collecting information on the inter-
the signal from the TX is an inter-client interference signal client interference between the TX and the RX, 2) determining
at the RX. In this case, Rsum decreases. In Fig. 3(b), Rsum the RX from among the clients, and 3) calculating and notifying
is redrawn with respect to the received signal strength (RSS) the optimal transmit powers for the AP and TX.
values at the RX. Depending on the position of the RX, the RSS
values at the RX for signals from the AP and TX lie in the range
B. Received-Signal-Strength-Based (RSSB) Contention for
of [−26, −15] dBm. Fig. 3(b) shows that Rsum is maximized
Receiver Selection
when the RSS values from the AP and TX are the highest and
lowest, respectively. Clients that want to transmit DATA frames to the AP should
The above numerical example is indicative of the following first transmit an RTS frame to the AP. To transmit the RTS
general result: when two transmitters, i.e., the AP and TX, are frame, all the clients have to perform a back-off mechanism
fixed, then the RX should be carefully selected from among to avoid collisions before transmitting the RTS frame. Each
multiple candidate clients because the sum rate of a full-duplex client chooses a random back-off number within the range of
wireless network changes according to the position of the 0 to (CWmin ), where CWmin is an initial contention window
RX. Therefore, we propose a signal-strength-based back-off size, and then attempts to transmit the RTS frame after waiting
mechanism for selecting the RX to achieve a low inter-client for a random time period. If more than two clients choose
interference. In addition, if the AP transmits signals using the the same back-off number, RTS frame collisions will occur. In
maximum transmit power, the strength of self-interference at this case, the clients perform the back-off mechanism again,
the AP increases owing to the strong signal transmitted from and the contention window size is doubled. This is called a
the AP itself. As a result, the self-interference signal is not binary exponential back-off mechanism, and it is used in carrier
sufficiently suppressed, and the AP cannot decode signals from sensing multiple access with collision avoidance (CSMA/CA)
the TX. If the TX transmits signals using the maximum transmit for IEEE 802.11.
power, the RX undergoes strong inter-client interference from In full-duplex communication, we need to select a receiver
the TX and cannot receive signals from the AP. The above for the downlink transmission and a transmitter for the uplink
conclusion is our motivation for adapting the transmit powers transmission. As described above, the performance of uplink
of the AP and TX to maximize the sum capacity. and downlink transmissions during full-duplex communication
In summary, PoCMAC includes (i) a contention-based re- is highly dependent on the RSS between the AP and the RX and
ceiver selection scheme to provide a higher reception oppor- that between the TX and the RX. We propose a received-signal-
tunity to clients with low interference and (ii) a transmit power strength-based (RSSB) contention mechanism for selecting the
adjustment scheme for computing the optimal transmit powers receiver for the downlink transmission. Note that the contention
of the AP and TX. PoCMAC needs to collect the channel mechanism for uplink transmissions is nearly the same as
gains, such as GT X,AP , GAP,RX , and GT X,RX , and these IEEE 802.11 DCF with RTS/CTS handshake, and an advanced
channel gains can be obtained when control frames are ex- mechanism that adaptively adjusts the contention window size
changed between the AP and clients. For example, the channel can be applied for further performance enhancement.
gain from the TX to the AP (GT X,AP ) is obtained when the From Section II, the received power from Client i at Client
TX transmits a control frame to the AP for a transmission j is given by Pr,i→j = |Gi,j |2 · Pt,i . Client i, which is one of
request. New control frames designed for PoCMAC will be the candidates for the RX, can measure the received power
explained in detail in Section III-D. Thus, the AP and RX can Pr,T X→i and the received power Pr,AP →i when control frames
successfully decode signals without significant interference, are exchanged between the AP and clients. For example, the TX
CHOI et al.: POWER-CONTROLLED MEDIUM ACCESS CONTROL PROTOCOL FOR FULL-DUPLEX WiFi NETWORKS 3605
ωα and ωβ are
where
the constants for a linear mapping from
Pr,AP →i
log2 1 + Pr,T X→i to an integer value for the contention
window in the range
of [0, CWmin ]. Note that the value of Fig. 4. Feasible region and optimal point to satisfy conditions (11) and (12)
Pr,AP →i with respect to the transmit powers of the AP and TX.
log2 1 + Pr,T X→i may change owing to various factors in a
wireless network environment. The transmit power control that determines the transmit
Pr,AP →i
A high Pr,T X→i
implies that Client i has a high RSS from the powers of the AP and TX should 1) facilitate successful simul-
AP and low inter-client interference by the TX; therefore, we taneous uplink and downlink transmissions, and 2) enable each
use the CWRSSB,i of Client i for providing a higher reception transmission to achieve the maximum SINR value. Fig. 4 shows
probability to the client with a high RSS from the AP and low the feasible region and optimal point of transmit powers with
Pr,AP →i
inter-client interference. Thus, CWRSSB,i decreases as Pr,T X→i
respect to the transmit power of the AP and TX. The blue line
increases, and as a result, the probability that the client with a is the upper bound that satisfies (11), and the green line is the
small contention window size can access the wireless channel lower bound that satisfies (12). The gray-shaded area is the fea-
first, increases. Using the RSSB contention mechanism to de- sible region that simultaneously satisfies both (11) and (12), i.e.,
termine the receiver, PoCMAC enables the candidate client that the transmit powers of the AP and TX in the region ensure the
can maximize full-duplex capability to have a higher probabil- feasibility of simultaneous uplink and downlink transmissions.
ity of receiving the downlink transmission from the AP. During Within the feasible region, we need to find the optimal transmit
this contention, collisions among candidate clients may occur powers of the AP and TX to maximize the SINR values of the
if more than two clients choose the same back-off number. uplink and downlink transmissions. Therefore, we formulate an
In this case, PoCMAC fails to select the RX for downlink optimization problem for the transmit powers of the AP and TX
transmission, and the TX that successfully transmitted RTS to as follows
and received CTS from the AP performs the half-duplex uplink
∗
transmission. Pt,i = arg max (min (SINRUplink , SINRDownlink ))
Pt,i
SINRUplink ≥ γ
C. Transmit Power Adjustment subject to SINRDownlink ≥ γ , for i ∈ {AP, T X}. (13)
After the RX is determined by the RSSB contention mech- 0 ≤ Pt,i ≤ Pmax
anism, the AP calculates the optimal transmit powers for itself
The optimization problem attempts to maximize the minimum
and the TX using the information about the received powers
SINR of the uplink and downlink transmissions while satisfying
from the TX and RX, the inter-client interference from the TX
the SINR constraints. To effectively solve this max-min opti-
to the RX, and the self-interference in the AP. This transmit
mization problem, (13) is rewritten as a linear programming
power adjustment scheme can reduce the inter-client interfer-
problem by introducing a new variable K. Then, the linear
ence and prevent collisions at the RX. In Section II, we stated
programming problem for (13) can be expressed as follows.
the conditions required for successful uplink and downlink
transmissions in (7) and (8), i.e., for successful transmissions, ∗
Pt,i = arg max K
the SINR of the uplink and downlink transmissions should Pt,i
be higher than the SINR threshold γ. From Section II, the
SINRU plink ≥ K
conditions can be rewritten as
SINRDownlink ≥ K
subject to , for i ∈ {AP, T X}. (14)
|GT X,AP |2 · Pt,T X K≥γ
SINRUplink = |GAP,AP |2
≥ γ, (11) 0 ≤ Pt,i ≤ Pmax
α · Pt,AP + NAP
|GAP,RX |2 · Pt,AP To maximize K, which is a quantity dependent on
SINRDownlink = ≥ γ. (12)
|GT X,RX |2 · Pt,T X + NRX SINRUplink and SINRDownlink , the optimal solution should
3606 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 14, NO. 7, JULY 2015
Fig. 6. Header of DATA frame for AP and client. (a) Header of AP (HA).
(b) Header of client (HC).
D. Description of PoCMAC
We have proposed the RSSB contention scheme for receiver
selection and the transmit power adjustment scheme to compute
the optimal transmit powers of the AP and TX. In this section,
we describe newly designed frame structures and detailed pro-
cedures of the TX, RX, and AP for performing both schemes in
PoCMAC.
1) Frame Structures: PoCMAC uses five types of control
Fig. 5. Control frame structures. (a) RTS. (b) CTS-Uplink (CTS-U). (c) CTS- frames and two types of DATA frame headers, as shown in
Downlink (CTS-D). (d) ACK-Uplink (ACK-U). (e) ACK-Downlink (ACK-D).
Figs. 5 and 6. The five control frames are RTS, CTS-Uplink
(CTS-U), CTS-Downlink (CTS-D), ACK-Downlink (ACK-D),
make SINRUplink and SINRDownlink equal to each other. Then, and ACK-Uplink (ACK-U), and the two types of DATA frame
the inequality SINR constraints can be expressed as a function headers are the header of the AP (HA) and the header of the
of K as follows: client (HC). Among these control frames and DATA frame
|GT X,AP |2 · Pt,T X headers, RTS, ACK-D, and HC have the same structures as
SINRUplink = |GAP,AP |2
=K (15) RTS, ACK, and the DATA frame headers of the IEEE 802.11
α · Pt,AP + NAP standard, respectively. The frame structures of CTS-U, CTS-D,
|GAP,RX |2 · Pt,AP ACK-U, and HA are newly designed in this study.
SINRDownlink = =K (16) • The CTS-U frame is transmitted by the AP after it receives
|GT X,RX |2 · Pt,T X + NRX
an RTS frame from a client. This frame gives permission
From (15) and (16), the transmit powers Pt,AP and Pt,T X are to perform the uplink DATA transmission to the client.
given by In addition, using the CTS-U frame, the AP informs the
candidate clients that it wants to transmit the DATA frame.
KNRX |GT X,AP |2 + K|GT X,RX |2 The number of RX candidates that can be listed in the
Pt,AP = ,
|GT X,AP |2 |GAP,RX |2 − Kα |GT X,RX |2 |GAP,AP |2
2
CTS-U frame is set to M . The AP can simply choose
M clients to which the first M frames in its transmission
(17) queue belong.1 The AP designates multiple candidates for
KNAP |GAP,RX | + K α |GAP,AP |
2 2 the RX to exploit the diversity of receivers. If only a single
Pt,T X = . client were allowed to be listed as an RX candidate and it
|GT X,AP |2 |GAP,RX |2 − Kα |GT X,RX |2 |GAP,AP |2
2
Fig. 7. Operation example of the full-duplex AP and clients. (1st transmission period: C1-TX, C4-RX/2nd transmission period: C5-TX, C2-RX).
from the TX. If the RX cannot overhear the RTS frame tention for the receiver selection, which has been described in
from the TX and cannot measure the signal strength from Section III-B, C4 is determined as the RX, and it then transmits
the TX, the interference field is filled with zeroes. a CTS-D frame with the inter-client interference information to
• The ACK-U frame is transmitted by the AP after complet- the AP. Using the estimated and collected information, the AP
ing the uplink DATA reception from the TX. If the AP calculates the optimal transmit powers for the TX and itself,
successfully receives the uplink DATA frame, it transmits and then, it starts a downlink DATA transmission that is used
the ACK-U frame with the ACK field set to “1”; otherwise, to inform the TX of its transmit power. Then, C1 can start an
it transmits the ACK-U frame with the ACK field set to uplink DATA transmission with the instructed transmit power.
“0.” The AP always transmits the ACK-U frame regardless Finally, C4 transmits an ACK-D frame to the AP, and the AP
of the success status of the uplink DATA frame. This is also transmits an ACK-U frame to C1. The next transmission
done to inform all the clients that the transmission period period will start after a distributed inter-frame space (DIFS).
has ended. The TX can confirm the success of its own The detailed procedures of the TX, RX, and AP under the
uplink DATA transmission via the ACK field in the ACK- proposed PoCMAC protocol are described as follows.
U frame transmitted from the AP, and the other clients can
detect the completion of the transmission period via the • TX side
ACK-U frame transmitted from the AP. (1) All clients that want to transmit a DATA frame
• The HA frame is the header of the DATA frame transmit- perform a back-off mechanism.
ted by the AP. Unlike the HC frame of the DATA frame (2) The client that wins the contention transmits an RTS
transmitted by the clients, the HA frame has a field that frame with an initial transmit power to the AP and
stores information on the transmit power to be used when waits for a CTS-U frame from the AP.
the TX transmits the DATA frame. When the AP transmits (3-1) If the client that transmitted the RTS frame receives
the DATA frame to the RX, the TX can overhear the HA the CTS-U frame, it is confirmed as the TX and
frame of this DATA frame and identify the transmit power waits for the HA of the DATA frame.
calculated by the AP. Then, the TX starts its own uplink (3-2) The other clients set a network allocation vector
DATA transmission to the AP with the instructed transmit (NAV) until the end of this transmission period, and
power. defer their transmission.
(4) As soon as the TX receives the HA of the DATA
2) Proposed PoCMAC: Using the control frames and head- frame from the AP, it starts an uplink DATA trans-
ers, the AP collects the inter-client interference information mission with the transmit power specified in the
from the RX, calculates the transmit powers for itself and the received HA frame.
TX based on the collected information, and then informs the (5) After completing the uplink DATA transmission, the
TX of the transmit power for the uplink DATA transmission. TX waits for an ACK-U frame from the AP.
Fig. 7 shows an example of the operation of the TX, RX, and (6-1) After receiving the ACK-U frame, if the acknowl-
AP. During the first transmission period, C1 wins the contention edgement bit of the ACK-U frame is “1”, the TX
against C3 and C5, and C1 is the TX that transmits to the can verify that the uplink DATA transmission was
AP. The AP broadcasts a CTS-U control frame, which is an successful, and then return to the initial state.
acknowledgement to C1, and includes the information that it (6-2) Otherwise, the TX returns to the initial state for
wants to transmit a DATA frame to C2 or C4. From the con- retransmission.
3608 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 14, NO. 7, JULY 2015
Fig. 8. Network scenario for varying distances between the TX and the RX.
Fig. 10. SINRUplink and SINRDownlink with respect to the suppression level
of self-interference cancellation when the angle between the TX and the RX
is 90◦ .
TABLE I
PARAMETERS U SED FOR P ERFORMANCE E VALUATION
for each control frame is less than the DIFS duration. Each
TX attempts to transmit as many UDP packets as possible. The Fig. 11. Average throughput with respect to the suppression level of self-
interference cancellation when the number of clients is 10.
reported values for the simulation results represent the average
of 1,000 transmission sessions. We compare the throughput
performance of PoCMAC with that of full-duplex without a
power control scheme and that of the CSMA/CA-based half-
duplex scheme, which allows only a single transmission at
a time. In contrast to Section IV-A, because a number of
clients that can be considered as the RX are distributed in
the region, we can confirm the effect of receiver selection by
the RSSB contention mechanism on throughput performance
improvement. The parameter values used in the simulations are
listed in Table I.
Fig. 11 shows the average throughput with respect to α in the
AP. In the half-duplex case with CSMA/CA, there is no change
in the throughput performance because it is not affected by the
suppression level of self-interference cancellation. On the other
hand, PoCMAC achieves a higher throughput performance than
the other schemes over the entire range of α, and the throughput
is saturated after α is greater than 65 dB. When α is greater
Fig. 12. Average throughput with respect to the number of clients when the
than 65 dB, the throughput performance levels off because the suppression level of self-interference cancellation is 60 dB.
AP already uses its maximum transmit power and the self-
interference is sufficiently suppressed with the high value of
α. The transmit power is already saturated with its maximum Fig. 12 shows the average throughput with respect to the
value, and the throughput performance cannot be further im- number of clients when α is fixed at 60 dB. It can be seen that
proved. PoCMAC without the RSSB contention mechanism the average throughput of all the schemes increases until the
shows a lower throughput performance than that with the RSSB number of clients becomes 15. When the number of clients is
contention mechanism. This implies that the RSSB contention greater than 15, the throughput performance of all the schemes
mechanism contributes to the improvement in the throughput is degraded because the frequency of collisions involving RTS
performance. frames increases as the number of clients increases. Even
However, full-duplex without power control does not lead to though the average throughput performance is degraded owing
a significant performance improvement as compared to the per- to the number of clients, PoCMAC exhibits the best perfor-
formance of the CSMA/CA-based half-duplex scheme. In this mance over the entire range.
case, even if α increases, the SINR of the downlink transmis-
sion at the RX does not change, as explained in Section IV-A,
C. Simulation for Fairness
while the SINR of the uplink transmission from the TX in-
creases. Note that without proper power control, the SINR at We carry out simulations to verify the fairness performance
the RX cannot be adjusted to be higher for successful packet of PoCMAC. In the simulations, we use the same simulation
transmissions in these simulations. The simulation results indi- setup and parameters as described in Section IV-B and Table I,
cate that PoCMAC can improve the throughput performance respectively, and we use Jain’s fairness index [17] to evaluate
by around 180% as compared to the CSMA/CA-based half- the fairness in throughput among clients. Fig. 13 shows the
duplex scheme, and by around 145% as compared to full- throughput fairness with respect to α when the number of
duplex without power control. clients is 30. It is observed that PoCMAC achieves the highest
CHOI et al.: POWER-CONTROLLED MEDIUM ACCESS CONTROL PROTOCOL FOR FULL-DUPLEX WiFi NETWORKS 3611
Fig. 13. Fairness index with respect to the suppression level of self-
Fig. 15. Placement map of the AP, TX, and RX (A, B, C, and D) for
interference cancellation when the number of clients is 30.
experiment setup.
TABLE II
E XPERIMENT R ESULTS
We proposed a full-duplex MAC protocol to provide greater the optimal solution of which determines the transmit power
reception opportunities to clients with low interference and to of the AP and the uplink client. We defined control frames
reduce the interference between uplink and downlink transmis- and header structures to implement our protocol, PoCMAC.
sions at the AP. For a given uplink transmission from a client The performance of PoCMAC was evaluated under various
to the AP, a client that can achieve high SINR in spite of the simulation configurations with regard to the SINR, throughput,
simultaneous uplink transmission may have a greater chance and fairness. In addition, SDR-based experiments with WARP
of being selected as the downlink client under the proposed were performed in a real wireless communication environment.
RSSB contention mechanism. To maximize the uplink and The simulation and experiment results confirmed the excellent
downlink SINRs, an optimization problem was formulated, performance of PoCMAC.
CHOI et al.: POWER-CONTROLLED MEDIUM ACCESS CONTROL PROTOCOL FOR FULL-DUPLEX WiFi NETWORKS 3613