Download as pdf or txt
Download as pdf or txt
You are on page 1of 13

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 14, NO.

7, JULY 2015 3601

Power-Controlled Medium Access Control


Protocol for Full-Duplex WiFi Networks
Wooyeol Choi, Hyuk Lim, Member, IEEE, and Ashutosh Sabharwal, Fellow, IEEE

Abstract—Recent advances in signal processing have demon-


strated in-band full-duplex capability at WiFi ranges. In addition
to simultaneous two-way exchange between two nodes, full-duplex
access points can potentially support simultaneous uplink and
downlink flows. However, the atomic three-node topology, which
allows simultaneous uplink and downlink, leads to inter-client
interference. In this paper, we propose a random-access medium
access control protocol using distributed power control to manage
inter-client interference in wireless networks with full-duplex-
capable access points that serve half-duplex clients. Our key con-
tributions are two-fold. First, we identify the regimes in which
power control provides sum throughput gains for the three-node
atomic topology, with one uplink flow and one downlink flow.
Second, we develop and benchmark PoCMAC, a full 802.11-based
protocol that allows distributed selection of a three-node topology.
The proposed MAC protocol is shown to achieve higher capacity
as compared to an equivalent half-duplex counterpart, while main-
taining similar fairness characteristics in single contention domain Fig. 1. Uplink (C1 → AP) and downlink (AP → C4) network with full-duplex
networks. We carried out extensive simulations and software- AP and half-duplex clients.
defined radio-based experiments to evaluate the performance of
the proposed MAC protocol, which is shown to achieve a signif- The key challenge for the full-duplex MAC is to coordinate
icant improvement over its half-duplex counterpart in terms of
throughput performance. multiple simultaneous transmissions, which are made possible
by the new in-band full-duplex capability. Fig. 1 shows the
Index Terms—Full-duplex, power control, MAC protocol, wire- key challenge of inter-client interference with simultaneous
less network.
up/downlink in a network environment, when the uplink and
downlink flows involve different clients. The gray circle in
I. I NTRODUCTION
Fig. 1 denotes the transmission range of the full-duplex access

R ECENT work [1]–[6] has demonstrated in-band full-


duplex capability, i.e., the ability to transmit and receive
simultaneously in the same band through self-interference can-
point (AP). Assume that Client 1 (C1) wants to transmit a
packet to the full-duplex AP, and that the full-duplex AP wants
to transmit a packet to Client 4 (C4), as shown by the black
cellation using multiple antennas. In fact, the ability to suppress line in the figure. In this case, the signal transmitted from C1
self-interference below the noise floor has been demonstrated, can interfere with other clients, particularly C4, which intends
thereby enabling near-ideal full-duplex capability [7]. To take to receive the signal from the AP. If C1 is located close to C4,
advantage of full-duplex capability in a multi-node network, it and the signal transmitted from C1 is very strong, C4 cannot
is essential to have new medium access control (MAC) pro- receive the signal transmitted from the AP owing to the inter-
tocols, because full-duplex leads to new interference patterns client interference caused by the signal of C1.
compared to current half-duplex communication networks. In this paper, we consider wireless networks in which an AP
is capable of full-duplex communication and clients only use
Manuscript received August 19, 2014; revised December 23, 2014 and half-duplex transmissions. To overcome the challenge of inter-
February 16, 2015; accepted February 17, 2015. Date of publication client interference shown in Fig. 1, we propose two concepts:
March 3, 2015; date of current version July 8, 2015. The work of
W. Choi and H. Lim was supported in part by the National Research
distributed interference measurement to modulate access proba-
Foundation of Korea (NRF) grant funded by the Korea government (MSIP) bilities, and distributed power control to maximize the resulting
(2014R1A2A2A01006002). The work of A. Sabharwal was supported in part throughput. First, we propose the use of a signal-strength-based
by NSF grants CNS-1161596 and CNS-1314822. The associate editor coordi-
nating the review of this paper and approving it for publication was A. Banchs.
back-off mechanism to provide a higher reception opportunity
(Corresponding author: Hyuk Lim.) to the client with a low inter-client interference. Using this
W. Choi and H. Lim are with the School of Information and Communica- mechanism, the client with the lowest inter-client interference
tions, Gwangju Institute of Science and Technology (GIST), Gwangju 500-712,
Korea (e-mail: wychoi@gist.ac.kr; hlim@gist.ac.kr). has the smallest contention window size and is eventually
A. Sabharwal is with the Department of Electrical and Computer Engineer- selected to receive a downlink transmission from the AP.
ing, Rice University, Houston, TX 77005 USA (e-mail: ashu@rice.edu). Second, to maximize the network throughput performance,
Color versions of one or more of the figures in this paper are available online
at http://ieeexplore.ieee.org. we formulate an optimization problem for calculating the op-
Digital Object Identifier 10.1109/TWC.2015.2408338 timal transmit powers of the AP and client. The optimization
1536-1276 © 2015 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution
requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
3602 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 14, NO. 7, JULY 2015

problem is then solved as part of the proposed MAC protocol, two-node bidirectional full-duplex transmissions and three-
namely, power-controlled MAC (PoCMAC), to coordinate the node full-duplex transmissions where all the clients have full-
uplink and downlink transmissions. By adjusting the transmit duplex capability. Ramirez et al. proposed a joint algorithm
powers of the AP and transmitter, the inter-client interference is to realize power allocation and routing in full-duplex wireless
minimized, and higher sum throughput of uplink and downlink relay networks [13]. They presented a power allocation scheme
transmissions can be achieved. PoCMAC uses additional short considering both self-interference and interference among
control frames for selecting a receiver and an acknowledgement neighboring nodes. Singh et al. proposed a distributed MAC
frame for completing full-duplex transmissions. In spite of the protocol with a selection scheme for a secondary receiver [14].
increased overhead due to the control frames, the proposed The selection scheme assigns weight values to candidates for
MAC protocol can achieve a high performance gain because the secondary receiver. If a candidate node experiences more
the AP can additionally transmit a long data frame while it is successful transmissions, it has a higher weight value and
receiving an uplink transmission. thus a greater chance to be selected as the secondary receiver.
To verify the performance of the proposed MAC protocol, Using this scheme, potential collisions at the secondary receiver
we analyze the signal-to-interference-plus-noise ratio (SINR) owing to the primary transmission could be mitigated.
of uplink and downlink transmissions with respect to the inter- One of the key shortcomings of the aforementioned studies is
client interference. Further, we compare the throughput and that the leveraging of full-duplex AP capability is not supported
fairness performance of the proposed MAC protocol with other when all flows are half-duplex, which is possible in practical
schemes through extensive simulations. In the simulations, the wireless network environments supporting devices that do not
proposed MAC protocol enhances the throughput performance have full-duplex ability. In other words, the MAC protocols
by around 180% as compared to an IEEE 802.11-based half- proposed in previous studies can be applied only to a wireless
duplex system, and by around 145% as compared to a full- network where all the clients in the network have full-duplex
duplex system without any schemes such as power control and capability. However, in this paper, we consider a new MAC
receiver selection. In addition, we conduct software-defined protocol design to achieve the maximum performance gain in
radio-based experiments to confirm the power control effect of practical wireless networks when only the AP has full-duplex
the proposed MAC protocol. The simulations and experiments capability.
show that the proposed MAC protocol achieves better perfor- Bai et al. presented the achievable rate of a three-node wire-
mance than other schemes in terms of both throughput and less network with a full-duplex base station and two half-duplex
fairness by effectively managing the inter-client interference. clients [15]. Although theirs was the first study to investigate
the mitigation of inter-client interference among half-duplex
clients, the authors leveraged an additional out-of-band side-
A. Related Work
channel to manage inter-client interference; moreover, they did
Several MAC protocols for full-duplex wireless communica- not propose a MAC protocol for wireless networks where a
tion have been studied. Sen et al. proposed carrier sense multiple large number of clients are randomly distributed. In the present
access with collision notification (CSMA/CN) to immediately study, we consider more practical scenarios of full-duplex wire-
notify a transmitter about a collision and stop the ongoing less networks that consist of a full-duplex AP and half-duplex
transmission [8]. Jain et al. presented a simple MAC protocol to clients without an additional channel, and we propose a new
mitigate hidden terminals using a busy tone [2]. Sahai et al. pro- MAC protocol that can be easily applied to practical wireless
posed a full-duplex MAC (FD-MAC) protocol to evenly pro- networks.
vide transmission opportunities and reduce collision probability The remainder of this paper is organized as follows.
[3]. Duarte et al. proposed a MAC protocol based on the IEEE Section II presents the system model for an in-band full-duplex
802.11 distributed coordinated function (DCF) with request to wireless network. Section III describes a new MAC protocol
send (RTS) and clear to send (CTS) [5]. Tamaki et al. proposed that identifies the receiver with low inter-client interference
a relay full-duplex MAC (RFD-MAC) protocol to select the and controls the transmit powers of the AP and transmitter. To
next forwarding node using the 1-bit information slot in each obtain the optimal transmit powers, we formulate an optimiza-
frame [9]. Zhou et al. proposed a rapid concurrent transmission tion problem to maximize the uplink and downlink capacity
coordination (RCTC) protocol that enables exposed terminals based on the channel gain information of the AP and clients.
to realize concurrent transmission [10]. Most of these studies Then, we design the MAC protocol to coordinate the uplink and
considered a homogeneous scenario where all the clients have downlink transmissions to fully exploit full-duplex capability.
full-duplex capability, which makes the transmission coordina- Section IV presents the performance evaluation of the proposed
tion problem much simpler because the clients easily share the MAC protocol. Finally, Section V summarizes our findings and
channel and transmission information with one another. concludes the paper.
Inter-client interference among clients may significantly de-
teriorate the throughput performance of full-duplex wireless
II. S YSTEM M ODEL
networks because two clients are allowed to transmit simul-
taneously. Several studies have investigated the mitigation of We consider an in-band full-duplex wireless network that
the inter-client interference problem. Goyal et al. proposed consists of an AP with full-duplex capability and multiple
a distributed MAC protocol that considers the traffic condi- clients without full-duplex capability. Note that the AP is
tion and inter-client interference [12]; this protocol supports easily equipped with elaborate antenna techniques and signal
CHOI et al.: POWER-CONTROLLED MEDIUM ACCESS CONTROL PROTOCOL FOR FULL-DUPLEX WiFi NETWORKS 3603

can be a non-zero value. However, if the self-interference is


very small compared to the received signal of the AP, we
will consider it negligible and ignore it. We define α as the
suppression level of self-interference cancellation, and it can
|GAP,AP |2
be expressed as α = .
AP,AP |2
|GAP,AP −τ ·G
For the successful reception of uplink and downlink trans-
missions, the minimum SINR of YRX and YAP should be
higher than the SINR threshold γ. Although this model in-
herently guarantees only the minimum rate, it is possible that
higher SINR will be achievable in some cases, and hence,
Fig. 2. Wireless network model with a single full-duplex AP (separate trans- higher rates can be utilized. Let Pr,i→j denote the received
mitting and receiving components), one transmitter, and one receiver.
power at Client j due to the signal transmitted by Client i, and
processing modules for self-interference cancellation while let Pr,SI denote the self-interference power for the AP. Pr,i→j
mobile clients with full-duplex capability are being incremen- and Pr,SI are given by
tally deployed. Therefore, we consider a full-duplex wireless  
Pr,i→j = |Gi,j |2 · E |Xi |2 = |Gi,j |2 · Pt,i , (3)
network where the AP can simultaneously transmit and receive  
Pr,SI = |Gi,j | · E |XAP | = |GAP,AP | · Pt,AP , (4)
2 2 2
signals and the clients can either transmit or receive at a given
instant in time. In this paper, a transmitter (TX) refers to the where Pt,i is the transmit power of Client i. Thus, the SINRs of
client transmitting signals to the AP, and a receiver (RX) refers YRX and YAP can be expressed as
to the client receiving signals from the AP. Fig. 2 shows the
system model for a wireless network with a single full-duplex Pr,AP →RX
SINRRX = , (5)
AP, one TX, and one RX. Note that the single AP is depicted as Pr,T X→RX + NRX
two separate components for transmitting and receiving signals. Pr,T X→AP
SINRAP = Pr,SI . (6)
The full-duplex AP and TX transmit the signals XAP and XT X ,
α + NAP
and the RX and full-duplex AP receive the signals YRX and
YAP , respectively. Gi,j is the channel gain from Client i to Then, the conditions for successful transmission from the AP to
Client j. Because a full-duplex AP transmits and receives a sig- the RX and from the TX to the AP are respectively given by
nal simultaneously, the transmitted signal of the AP is fed back
to the receiving RF chain of the AP, and it interferes with the SINRRX ≥ γ, (7)
signal reception at the AP. Thus, there exists a channel from the SINRAP ≥ γ. (8)
transmitting RF chain to the receiving RF chain of the AP, and
In addition, from (5) and (6), we define the sum rate Rsum as
this channel is modeled as the self-interference channel gain
the achievable sum rate of the uplink and downlink transmis-
GAP,AP . The channel gains are modeled as complex Gaussian
sions at the AP as follows.
random variables with zero mean, and they are assumed to be
constant over the duration of each transmission. As shown in Rsum = log2 (1+SINRUplink )+log2 (1+SINRDownlink ), (9)
Fig. 2, the canceling signal for self-interference cancellation
in the full-duplex AP is modeled as τ · G  AP,AP · XAP , where where SINRUplink and SINRDownlink are the SINRs of the up-
G AP,AP is the channel estimate of GAP,AP , and τ is a can- link and downlink transmissions, which correspond to SINRAP
cellation coefficient. Here, τ is determined by the degree of in (5) and SINRRX in (6), respectively.
self-interference cancellation, which depends on the analog and
digital cancellation techniques for full-duplex communication.
III. P O CMAC: F ULL -D UPLEX MAC P ROTOCOL
Note that the self-interference signal could be canceled by
subtracting the canceling signal from the received signal [7]. In this section, we describe our power-controlled MAC pro-
Then, the received signals YRX and YAP can be written as tocol (PoCMAC) for in-band full-duplex wireless networks.
Before providing a detailed description of PoCMAC, we con-
YRX = GAP,RX · XAP + GT X,RX · XT X + NRX , (1) sider how to increase the sum rate of the uplink and downlink
YAP = GT X,AP · XT X + GAP,AP · XAP transmissions at the AP in a full-duplex wireless environment.
−τ ·G AP,AP · XAP + NAP , (2)
A. A Motivating Numerical Example
where NRX and NAP are the white Gaussian noises at the RX
and AP, respectively, i.e., NRX ∼ CN (0, σRX 2
) and NAP ∼ Fig. 3 shows the sum rate of the wireless network, where AP
CN (0, σAP ). For perfect self-interference cancellation, the
2
and TX are located at (0, 0) and (−50, 0), respectively. The sum
canceling signal should be equal to GAP,AP · XAP , i.e., the rate Rsum is computed with respect to the position of the RX,
AP already knows XAP , and what remains for perfect self- which changes within a 200 × 200 m region. Fig. 3(a) shows
interference cancellation is the accurate estimation of GAP,AP that Rsum is maximized when the RX is far from the TX and
and its compensation with gain control. If the self-interference close to the AP. When the inter-client interference signal from
cancellation is imperfect, GAP,AP · XAP − τ · G  AP,AP · XAP the TX is weak and the signal from the AP is strong, the RX
3604 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 14, NO. 7, JULY 2015

Fig. 3. Sum rate Rsum with respect to (a) the position of the RX and (b) RSS values at the RX for the signals from the AP and TX, when the AP and TX are
located at (0, 0) and (−50, 0), respectively. (a) Position of RX. (b) RSS at RX for the signals from AP and TX.

can have high SINRDownlink , and thus, Rsum becomes high. and therefore, the AP can fully exploit full-duplex capability
On the other hand, if the signal from the TX is strong, the for higher throughput performance. PoCMAC performs the
RX cannot receive the signal transmitted by the AP because following key functions: 1) collecting information on the inter-
the signal from the TX is an inter-client interference signal client interference between the TX and the RX, 2) determining
at the RX. In this case, Rsum decreases. In Fig. 3(b), Rsum the RX from among the clients, and 3) calculating and notifying
is redrawn with respect to the received signal strength (RSS) the optimal transmit powers for the AP and TX.
values at the RX. Depending on the position of the RX, the RSS
values at the RX for signals from the AP and TX lie in the range
B. Received-Signal-Strength-Based (RSSB) Contention for
of [−26, −15] dBm. Fig. 3(b) shows that Rsum is maximized
Receiver Selection
when the RSS values from the AP and TX are the highest and
lowest, respectively. Clients that want to transmit DATA frames to the AP should
The above numerical example is indicative of the following first transmit an RTS frame to the AP. To transmit the RTS
general result: when two transmitters, i.e., the AP and TX, are frame, all the clients have to perform a back-off mechanism
fixed, then the RX should be carefully selected from among to avoid collisions before transmitting the RTS frame. Each
multiple candidate clients because the sum rate of a full-duplex client chooses a random back-off number within the range of
wireless network changes according to the position of the 0 to (CWmin ), where CWmin is an initial contention window
RX. Therefore, we propose a signal-strength-based back-off size, and then attempts to transmit the RTS frame after waiting
mechanism for selecting the RX to achieve a low inter-client for a random time period. If more than two clients choose
interference. In addition, if the AP transmits signals using the the same back-off number, RTS frame collisions will occur. In
maximum transmit power, the strength of self-interference at this case, the clients perform the back-off mechanism again,
the AP increases owing to the strong signal transmitted from and the contention window size is doubled. This is called a
the AP itself. As a result, the self-interference signal is not binary exponential back-off mechanism, and it is used in carrier
sufficiently suppressed, and the AP cannot decode signals from sensing multiple access with collision avoidance (CSMA/CA)
the TX. If the TX transmits signals using the maximum transmit for IEEE 802.11.
power, the RX undergoes strong inter-client interference from In full-duplex communication, we need to select a receiver
the TX and cannot receive signals from the AP. The above for the downlink transmission and a transmitter for the uplink
conclusion is our motivation for adapting the transmit powers transmission. As described above, the performance of uplink
of the AP and TX to maximize the sum capacity. and downlink transmissions during full-duplex communication
In summary, PoCMAC includes (i) a contention-based re- is highly dependent on the RSS between the AP and the RX and
ceiver selection scheme to provide a higher reception oppor- that between the TX and the RX. We propose a received-signal-
tunity to clients with low interference and (ii) a transmit power strength-based (RSSB) contention mechanism for selecting the
adjustment scheme for computing the optimal transmit powers receiver for the downlink transmission. Note that the contention
of the AP and TX. PoCMAC needs to collect the channel mechanism for uplink transmissions is nearly the same as
gains, such as GT X,AP , GAP,RX , and GT X,RX , and these IEEE 802.11 DCF with RTS/CTS handshake, and an advanced
channel gains can be obtained when control frames are ex- mechanism that adaptively adjusts the contention window size
changed between the AP and clients. For example, the channel can be applied for further performance enhancement.
gain from the TX to the AP (GT X,AP ) is obtained when the From Section II, the received power from Client i at Client
TX transmits a control frame to the AP for a transmission j is given by Pr,i→j = |Gi,j |2 · Pt,i . Client i, which is one of
request. New control frames designed for PoCMAC will be the candidates for the RX, can measure the received power
explained in detail in Section III-D. Thus, the AP and RX can Pr,T X→i and the received power Pr,AP →i when control frames
successfully decode signals without significant interference, are exchanged between the AP and clients. For example, the TX
CHOI et al.: POWER-CONTROLLED MEDIUM ACCESS CONTROL PROTOCOL FOR FULL-DUPLEX WiFi NETWORKS 3605

transmits an RTS frame to the AP for a transmission request.


When the AP and the RX candidates receive or overhear
the RTS frame, they can measure the received power for the
RTS frame from the TX. Using Pr,T X→i and Pr,AP →i , an
RSSB contention window is derived for receiver selection. This
contention window should enable the candidate client with
low inter-client interference from the TX (Pr,T X→i ) and high
received power from the AP (Pr,AP →i ) to have a high channel
access probability for receiving the downlink transmission.
Therefore, we define the contention window CWRSSB,i of
Client i for the RSSB contention mechanism as follows
  
Pr,AP →i
CWRSSB,i = ωα − ωβ · log2 1 + , (10)
Pr,T X→i

ωα and ωβ are
where
the constants for a linear mapping from
Pr,AP →i
log2 1 + Pr,T X→i to an integer value for the contention
window in the range
of [0, CWmin ]. Note that the value of Fig. 4. Feasible region and optimal point to satisfy conditions (11) and (12)
Pr,AP →i with respect to the transmit powers of the AP and TX.
log2 1 + Pr,T X→i may change owing to various factors in a
wireless network environment. The transmit power control that determines the transmit
Pr,AP →i
A high Pr,T X→i
implies that Client i has a high RSS from the powers of the AP and TX should 1) facilitate successful simul-
AP and low inter-client interference by the TX; therefore, we taneous uplink and downlink transmissions, and 2) enable each
use the CWRSSB,i of Client i for providing a higher reception transmission to achieve the maximum SINR value. Fig. 4 shows
probability to the client with a high RSS from the AP and low the feasible region and optimal point of transmit powers with
Pr,AP →i
inter-client interference. Thus, CWRSSB,i decreases as Pr,T X→i
respect to the transmit power of the AP and TX. The blue line
increases, and as a result, the probability that the client with a is the upper bound that satisfies (11), and the green line is the
small contention window size can access the wireless channel lower bound that satisfies (12). The gray-shaded area is the fea-
first, increases. Using the RSSB contention mechanism to de- sible region that simultaneously satisfies both (11) and (12), i.e.,
termine the receiver, PoCMAC enables the candidate client that the transmit powers of the AP and TX in the region ensure the
can maximize full-duplex capability to have a higher probabil- feasibility of simultaneous uplink and downlink transmissions.
ity of receiving the downlink transmission from the AP. During Within the feasible region, we need to find the optimal transmit
this contention, collisions among candidate clients may occur powers of the AP and TX to maximize the SINR values of the
if more than two clients choose the same back-off number. uplink and downlink transmissions. Therefore, we formulate an
In this case, PoCMAC fails to select the RX for downlink optimization problem for the transmit powers of the AP and TX
transmission, and the TX that successfully transmitted RTS to as follows
and received CTS from the AP performs the half-duplex uplink

transmission. Pt,i = arg max (min (SINRUplink , SINRDownlink ))
Pt,i

SINRUplink ≥ γ
C. Transmit Power Adjustment subject to SINRDownlink ≥ γ , for i ∈ {AP, T X}. (13)
After the RX is determined by the RSSB contention mech- 0 ≤ Pt,i ≤ Pmax
anism, the AP calculates the optimal transmit powers for itself
The optimization problem attempts to maximize the minimum
and the TX using the information about the received powers
SINR of the uplink and downlink transmissions while satisfying
from the TX and RX, the inter-client interference from the TX
the SINR constraints. To effectively solve this max-min opti-
to the RX, and the self-interference in the AP. This transmit
mization problem, (13) is rewritten as a linear programming
power adjustment scheme can reduce the inter-client interfer-
problem by introducing a new variable K. Then, the linear
ence and prevent collisions at the RX. In Section II, we stated
programming problem for (13) can be expressed as follows.
the conditions required for successful uplink and downlink
transmissions in (7) and (8), i.e., for successful transmissions, ∗
Pt,i = arg max K
the SINR of the uplink and downlink transmissions should Pt,i
be higher than the SINR threshold γ. From Section II, the
SINRU plink ≥ K
conditions can be rewritten as
SINRDownlink ≥ K
subject to , for i ∈ {AP, T X}. (14)
|GT X,AP |2 · Pt,T X K≥γ
SINRUplink = |GAP,AP |2
≥ γ, (11) 0 ≤ Pt,i ≤ Pmax
α · Pt,AP + NAP
|GAP,RX |2 · Pt,AP To maximize K, which is a quantity dependent on
SINRDownlink = ≥ γ. (12)
|GT X,RX |2 · Pt,T X + NRX SINRUplink and SINRDownlink , the optimal solution should
3606 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 14, NO. 7, JULY 2015

Fig. 6. Header of DATA frame for AP and client. (a) Header of AP (HA).
(b) Header of client (HC).

D. Description of PoCMAC
We have proposed the RSSB contention scheme for receiver
selection and the transmit power adjustment scheme to compute
the optimal transmit powers of the AP and TX. In this section,
we describe newly designed frame structures and detailed pro-
cedures of the TX, RX, and AP for performing both schemes in
PoCMAC.
1) Frame Structures: PoCMAC uses five types of control
Fig. 5. Control frame structures. (a) RTS. (b) CTS-Uplink (CTS-U). (c) CTS- frames and two types of DATA frame headers, as shown in
Downlink (CTS-D). (d) ACK-Uplink (ACK-U). (e) ACK-Downlink (ACK-D).
Figs. 5 and 6. The five control frames are RTS, CTS-Uplink
(CTS-U), CTS-Downlink (CTS-D), ACK-Downlink (ACK-D),
make SINRUplink and SINRDownlink equal to each other. Then, and ACK-Uplink (ACK-U), and the two types of DATA frame
the inequality SINR constraints can be expressed as a function headers are the header of the AP (HA) and the header of the
of K as follows: client (HC). Among these control frames and DATA frame
|GT X,AP |2 · Pt,T X headers, RTS, ACK-D, and HC have the same structures as
SINRUplink = |GAP,AP |2
=K (15) RTS, ACK, and the DATA frame headers of the IEEE 802.11
α · Pt,AP + NAP standard, respectively. The frame structures of CTS-U, CTS-D,
|GAP,RX |2 · Pt,AP ACK-U, and HA are newly designed in this study.
SINRDownlink = =K (16) • The CTS-U frame is transmitted by the AP after it receives
|GT X,RX |2 · Pt,T X + NRX
an RTS frame from a client. This frame gives permission
From (15) and (16), the transmit powers Pt,AP and Pt,T X are to perform the uplink DATA transmission to the client.
given by In addition, using the CTS-U frame, the AP informs the
  candidate clients that it wants to transmit the DATA frame.
KNRX |GT X,AP |2 + K|GT X,RX |2 The number of RX candidates that can be listed in the
Pt,AP = ,
|GT X,AP |2 |GAP,RX |2 − Kα |GT X,RX |2 |GAP,AP |2
2
CTS-U frame is set to M . The AP can simply choose
M clients to which the first M frames in its transmission
(17) queue belong.1 The AP designates multiple candidates for
 
KNAP |GAP,RX | + K α |GAP,AP |
2 2 the RX to exploit the diversity of receivers. If only a single
Pt,T X = . client were allowed to be listed as an RX candidate and it
|GT X,AP |2 |GAP,RX |2 − Kα |GT X,RX |2 |GAP,AP |2
2

happened to be close to the TX, it would not be possible to


(18) successfully receive the DATA frame from the AP owing
to strong interference from the TX.
In (17) and (18), Pt,AP and Pt,T X are increasing functions • The CTS-D frame is transmitted by the candidate client
of K. By gradually increasing K, we can find the optimal that wins the RSSB contention after the AP broadcasts
∗ ∗
transmit powers Pt,AP and Pt,T X that satisfy the constraints a CTS-U frame. The CTS-D frame sent by a candidate
in (14). As shown in Fig. 4, the red line is a set of points client informs the AP and the other RX candidates that
(Pt,T X , Pt,AP ) that satisfy both (17) and (18). The optimal it has been selected as the RX that is to receive a DATA
∗ ∗
point (Pt,T X , Pt,AP ) is obtained by increasing K. The optimal frame from the AP. Note that if a client overhears the
transmit powers solve the linear programming problem to max- CTS-U frame, it knows which client has been nominated
imize the SINRs of the uplink and downlink transmissions. as the RX. This frame includes the address of the winning
In the optimization, the transmit powers are assumed to be candidate and the inter-client interference information,
continuous values. However, in most communication systems, which is the received power of the RTS frame transmitted
they are incrementally increased/decreased by a fixed integer
value. For example, in the communication devices used for our
1 M is set to two in our implementation. If more than two candidates are
experiments, the transmit powers are discrete integers in the
allowed to be listed in the frame, it increases the opportunity to select the better
range of [−12, 19] dBm. In practice, the optimization can be RX with a lower inter-client interference, but the overhead for CTS-U frame
reformulated as an integer programming problem. increases. The size of CTS-U frame increases by six bytes for each candidate.
CHOI et al.: POWER-CONTROLLED MEDIUM ACCESS CONTROL PROTOCOL FOR FULL-DUPLEX WiFi NETWORKS 3607

Fig. 7. Operation example of the full-duplex AP and clients. (1st transmission period: C1-TX, C4-RX/2nd transmission period: C5-TX, C2-RX).

from the TX. If the RX cannot overhear the RTS frame tention for the receiver selection, which has been described in
from the TX and cannot measure the signal strength from Section III-B, C4 is determined as the RX, and it then transmits
the TX, the interference field is filled with zeroes. a CTS-D frame with the inter-client interference information to
• The ACK-U frame is transmitted by the AP after complet- the AP. Using the estimated and collected information, the AP
ing the uplink DATA reception from the TX. If the AP calculates the optimal transmit powers for the TX and itself,
successfully receives the uplink DATA frame, it transmits and then, it starts a downlink DATA transmission that is used
the ACK-U frame with the ACK field set to “1”; otherwise, to inform the TX of its transmit power. Then, C1 can start an
it transmits the ACK-U frame with the ACK field set to uplink DATA transmission with the instructed transmit power.
“0.” The AP always transmits the ACK-U frame regardless Finally, C4 transmits an ACK-D frame to the AP, and the AP
of the success status of the uplink DATA frame. This is also transmits an ACK-U frame to C1. The next transmission
done to inform all the clients that the transmission period period will start after a distributed inter-frame space (DIFS).
has ended. The TX can confirm the success of its own The detailed procedures of the TX, RX, and AP under the
uplink DATA transmission via the ACK field in the ACK- proposed PoCMAC protocol are described as follows.
U frame transmitted from the AP, and the other clients can
detect the completion of the transmission period via the • TX side
ACK-U frame transmitted from the AP. (1) All clients that want to transmit a DATA frame
• The HA frame is the header of the DATA frame transmit- perform a back-off mechanism.
ted by the AP. Unlike the HC frame of the DATA frame (2) The client that wins the contention transmits an RTS
transmitted by the clients, the HA frame has a field that frame with an initial transmit power to the AP and
stores information on the transmit power to be used when waits for a CTS-U frame from the AP.
the TX transmits the DATA frame. When the AP transmits (3-1) If the client that transmitted the RTS frame receives
the DATA frame to the RX, the TX can overhear the HA the CTS-U frame, it is confirmed as the TX and
frame of this DATA frame and identify the transmit power waits for the HA of the DATA frame.
calculated by the AP. Then, the TX starts its own uplink (3-2) The other clients set a network allocation vector
DATA transmission to the AP with the instructed transmit (NAV) until the end of this transmission period, and
power. defer their transmission.
(4) As soon as the TX receives the HA of the DATA
2) Proposed PoCMAC: Using the control frames and head- frame from the AP, it starts an uplink DATA trans-
ers, the AP collects the inter-client interference information mission with the transmit power specified in the
from the RX, calculates the transmit powers for itself and the received HA frame.
TX based on the collected information, and then informs the (5) After completing the uplink DATA transmission, the
TX of the transmit power for the uplink DATA transmission. TX waits for an ACK-U frame from the AP.
Fig. 7 shows an example of the operation of the TX, RX, and (6-1) After receiving the ACK-U frame, if the acknowl-
AP. During the first transmission period, C1 wins the contention edgement bit of the ACK-U frame is “1”, the TX
against C3 and C5, and C1 is the TX that transmits to the can verify that the uplink DATA transmission was
AP. The AP broadcasts a CTS-U control frame, which is an successful, and then return to the initial state.
acknowledgement to C1, and includes the information that it (6-2) Otherwise, the TX returns to the initial state for
wants to transmit a DATA frame to C2 or C4. From the con- retransmission.
3608 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 14, NO. 7, JULY 2015

• RX side (7-2) Otherwise, the AP determines that the downlink


(1) All clients that do not want to transmit a DATA DATA transmission has failed, and then, it transmits
frame to the AP, or that lose the contention, continue the ACK-U frame with ‘0’ acknowledgement bit.
to overhear the RTS frame transmitted from other (8) After transmitting the ACK-U frame, the AP returns
clients or wait for a CTS-U frame from the AP. to the initial state.
(2) After the clients overhear the CTS-U frame from the Note that the AP starts the downlink DATA transmission to
AP, they can identify the clients that are nominated the RX earlier than the uplink DATA transmission from the TX.
as the RX candidates. There are two reasons for this. First, the AP has to notify the
(3-1) If the client is one of the candidates for the RX, it TX of the optimal transmit power using an HA frame of the
performs the RSSB contention mechanism. downlink DATA frame before the TX starts the uplink DATA
(3-2) Otherwise, it sets an NAV until the end of this trans- transmission to the AP. Second, for effective self-interference
mission period, and waits until all the transmissions cancellation, the AP needs to nullify the self-interference
are completed. caused by the signal that the AP is transmitting. When the
(4) The client that wins the contention among the can- AP starts the downlink DATA transmission, it can accurately
didates transmits a CTS-D frame, including the in- estimate the gain of its own self-interference if there are no
formation on the inter-client interference from the other signals. With this estimate, it begins the self-interference
TX, and waits for the HA of the DATA frame. cancellation, and the self-interference is then canceled out and
(5-1) If the client that transmitted the CTS-D frame re- stabilized at the noise level. This approach, which makes the AP
ceives the HA frame of the DATA frame, the client transmit before receiving, can cancel the self-interference more
is considered to be the RX and starts the downlink effectively than in the opposite case [16]. When the length of
DATA reception. DATA frames for the uplink and downlink transmissions is the
(5-2) The other clients set an NAV until the end of this same, two transmissions cannot be simultaneously terminated
transmission period, and wait until all the transmis- owing to the delayed uplink transmission. Even though the
sions are completed. uplink transmission is delayed for the transmission time of the
(6-1) If the downlink DATA reception is successful, the HC frame, the delay is around 2 μs when the data transmission
RX transmits an ACK-D frame to the AP. rate is 54 Mbps; because it is shorter than a short inter-frame
(6-2) Otherwise, the RX does not transmit the ACK-D space (SIFS) time, collisions due to the transmission of the AD
frame to the AP. frame do not occur.
(7) After overhearing an ACK-U frame from the AP, the
RX returns to the initial state.
• AP side IV. P ERFORMANCE E VALUATION
(1) The AP waits for an RTS frame from clients that
want to transmit a DATA frame. We performed an SINR analysis of the uplink and downlink
(2) After receiving the RTS frame, the AP selects a transmissions and extensive simulations for the performance
client as the TX, transmits a CTS-U frame including evaluation of the network throughput and fairness among
the address of the TX and the addresses of the RX clients. Further, we compared the performance of PoCMAC
candidates to which the AP wants to transmit the with that of the CSMA/CA-based half-duplex scheme and the
DATA frame, and waits for a CTS-D frame. full-duplex scheme without power control. In addition, we
(3) After receiving the CTS-D frame, the AP can cal- conducted software defined radio (SDR)-based experiments
culate the optimal transmit powers for the AP and to evaluate the performance of the proposed transmit power
TX; then, it starts the transmission of HA, which adjustment scheme described in Section III-C in an office
includes the transmit power obtained for the TX, environment.
with the transmit power obtained for itself.
(4) During the transmission of the HA, the AP starts
A. SINR of Uplink and Downlink Transmissions
self-interference cancellation to receive the DATA
frame from the TX and stabilizes interference To analyze the effect of inter-client interference between the
nulling for the receiving signal. TX and the RX, we perform a simulation for the SINR of the
(5) After transmitting the HA and stabilizing the inter- uplink and downlink transmissions in the AP with respect to
ference nulling, the AP continues the downlink the distance between the TX and the RX. As shown in Fig. 8,
DATA transmission to the RX and starts the uplink we configure the scenario for this simulation as follows. The
DATA reception from the TX. positions of the AP and TX are fixed, and the TX and RX
(6) After transmitting and receiving the DATA frames are located at a distance of 100 m from the AP. Only the
simultaneously, the AP aits for an ACK-D frame RX moves to the opposite side of the TX along a semicircle-
from the RX. shaped trajectory. Thus, the TX and RX are at the same distance
(7-1) If the ACK-D frame is received, the AP can de- from the AP, and only the angle between the TX and the RX
termine that the downlink DATA transmission was changes. With this topology, it is not necessary to select the RX
successful, and then, it transmits an ACK-U frame because there are only one TX and one RX, and thus, the RSSB
with ‘1’ acknowledgement bit. contention mechanism is disabled.
CHOI et al.: POWER-CONTROLLED MEDIUM ACCESS CONTROL PROTOCOL FOR FULL-DUPLEX WiFi NETWORKS 3609

Fig. 8. Network scenario for varying distances between the TX and the RX.

Fig. 10. SINRUplink and SINRDownlink with respect to the suppression level
of self-interference cancellation when the angle between the TX and the RX
is 90◦ .

communication after receiving the CTS-D frame. Then, the


SINRUplink obtained is equal to that of full-duplex without
power control during the period.
We also perform another set of simulations to evaluate the
SINRs of the uplink and downlink transmissions in the AP with
respect to the suppression level α used for self-interference
cancellation in the AP. To analyze the SINRs caused by the
change in α, we use the same topology as that shown in Fig. 8
Fig. 9. SINRUplink and SINRDownlink with respect to the distance between and set the angle between the TX and the RX to 90◦ . Fig. 10
the TX and the RX when the suppression level of self-interference cancellation shows SINRUplink and SINRDownlink with respect to α in the
is 70 dB. AP. The SINRUplink and SINRDownlink of PoCMAC increase
linearly as α increases. Because the SINR threshold is 6 dB,
Fig. 9 shows SINRUplink and SINRDownlink with respect to simultaneous uplink and downlink transmissions are possible
the distance between the TX and the RX when the suppression when α exceeds around 60 dB. However, when α is lower than
level of self-interference cancellation is 70 dB. In the case 60 dB, the AP under PoCMAC cannot sufficiently suppress the
of full-duplex without power control, SINRUplink does not self-interference caused by the signal that it is transmitting to
change as the distance between the TX and the RX increases, the RX, and the SINR performance is then degraded.
because it is not affected by the position of the RX. In contrast, On the other hand, in the case of full-duplex without power
SINRDownlink increases as the distance between the TX and the control, SINRDownlink does not change, while SINRUplink
RX increases. However, when an SINR threshold is required gradually increases as α increases. Thus, because the high
to successfully receive the DATA transmission (e.g., we use α enables the AP to suppress the self-interference caused by
an SINR threshold of around 6 dB in the simulations for the the signal that it is transmitting to the RX, SINRUplink can
throughput performance), the RX cannot receive the downlink be increased. However, even if the self-interference is almost
transmission owing to the low SINRDownlink in almost all po- completely suppressed by the high α, it cannot increase the
sitions. Thus, full-duplex without power control cannot utilize SINRDownlink without power control. Because the SINR thresh-
full-duplex capability in this case. old is 6 dB, the AP cannot perform full-duplex communication
However, PoCMAC can overcome this problem in the same for all values of α with this topology.
situation. As shown in Fig. 9, the SINRUplink and SINRDownlink
of PoCMAC increase and then converge as the distance be-
B. Simulation for Average Throughput
tween the TX and the RX increases. Except when the distance
between the TX and the RX is very small, both the SINRs We carry out extensive simulations to evaluate the throughput
of PoCMAC are higher than the SINR threshold. When the performance of PoCMAC using MATLAB. For our simula-
distance between the TX and the RX is small, the inter-client tions, we consider a single-cell system with an AP having full-
interference caused by the TX significantly reduces the SINR duplex capability and its associated clients with backlogged
at the RX, and the SINRUplink and SINRDownlink of PoCMAC user datagram protocol (UDP) packets. We use a disk region
then have low values. However, if the SINRDownlink at the RX with a radius of 100 m, where the AP is located at the center of
is lower than the SINR threshold, the RX cannot receive the the region, and all clients are randomly distributed within the
DATA transmission from the AP owing to inter-client inter- region. The transmission rates are set to 6 Mbps for the control
ference. In this case, PoCMAC operates through half-duplex frames and 54 Mbps for the DATA frames, and the overhead
3610 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 14, NO. 7, JULY 2015

TABLE I
PARAMETERS U SED FOR P ERFORMANCE E VALUATION

for each control frame is less than the DIFS duration. Each
TX attempts to transmit as many UDP packets as possible. The Fig. 11. Average throughput with respect to the suppression level of self-
interference cancellation when the number of clients is 10.
reported values for the simulation results represent the average
of 1,000 transmission sessions. We compare the throughput
performance of PoCMAC with that of full-duplex without a
power control scheme and that of the CSMA/CA-based half-
duplex scheme, which allows only a single transmission at
a time. In contrast to Section IV-A, because a number of
clients that can be considered as the RX are distributed in
the region, we can confirm the effect of receiver selection by
the RSSB contention mechanism on throughput performance
improvement. The parameter values used in the simulations are
listed in Table I.
Fig. 11 shows the average throughput with respect to α in the
AP. In the half-duplex case with CSMA/CA, there is no change
in the throughput performance because it is not affected by the
suppression level of self-interference cancellation. On the other
hand, PoCMAC achieves a higher throughput performance than
the other schemes over the entire range of α, and the throughput
is saturated after α is greater than 65 dB. When α is greater
Fig. 12. Average throughput with respect to the number of clients when the
than 65 dB, the throughput performance levels off because the suppression level of self-interference cancellation is 60 dB.
AP already uses its maximum transmit power and the self-
interference is sufficiently suppressed with the high value of
α. The transmit power is already saturated with its maximum Fig. 12 shows the average throughput with respect to the
value, and the throughput performance cannot be further im- number of clients when α is fixed at 60 dB. It can be seen that
proved. PoCMAC without the RSSB contention mechanism the average throughput of all the schemes increases until the
shows a lower throughput performance than that with the RSSB number of clients becomes 15. When the number of clients is
contention mechanism. This implies that the RSSB contention greater than 15, the throughput performance of all the schemes
mechanism contributes to the improvement in the throughput is degraded because the frequency of collisions involving RTS
performance. frames increases as the number of clients increases. Even
However, full-duplex without power control does not lead to though the average throughput performance is degraded owing
a significant performance improvement as compared to the per- to the number of clients, PoCMAC exhibits the best perfor-
formance of the CSMA/CA-based half-duplex scheme. In this mance over the entire range.
case, even if α increases, the SINR of the downlink transmis-
sion at the RX does not change, as explained in Section IV-A,
C. Simulation for Fairness
while the SINR of the uplink transmission from the TX in-
creases. Note that without proper power control, the SINR at We carry out simulations to verify the fairness performance
the RX cannot be adjusted to be higher for successful packet of PoCMAC. In the simulations, we use the same simulation
transmissions in these simulations. The simulation results indi- setup and parameters as described in Section IV-B and Table I,
cate that PoCMAC can improve the throughput performance respectively, and we use Jain’s fairness index [17] to evaluate
by around 180% as compared to the CSMA/CA-based half- the fairness in throughput among clients. Fig. 13 shows the
duplex scheme, and by around 145% as compared to full- throughput fairness with respect to α when the number of
duplex without power control. clients is 30. It is observed that PoCMAC achieves the highest
CHOI et al.: POWER-CONTROLLED MEDIUM ACCESS CONTROL PROTOCOL FOR FULL-DUPLEX WiFi NETWORKS 3611

Fig. 13. Fairness index with respect to the suppression level of self-
Fig. 15. Placement map of the AP, TX, and RX (A, B, C, and D) for
interference cancellation when the number of clients is 30.
experiment setup.

D. Experimental Evaluation of Power Control


To experimentally evaluate the impact of power control
by PoCMAC, we implemented a power control scheme for
PoCMAC on the Wireless Open Access Research Platform
(WARP) [18]. We conducted experiments on a WARPnet exper-
iment framework using WARP v3 hardware. The WARPnet
experiment framework supports real-time experiments and
allows the physical layer processing and hardware control to
be executed by the WARP hardware. All the WARP hardware
devices are connected to a host PC via Ethernet, and the host
PC can control the operation of the WARP hardware. We use
a carrier frequency of 2.4 GHz and an OFDM physical layer
with QPSK modulation. The initial transmit power and the
maximum transmit power are set to 0 dBm and 5 dBm, re-
spectively. Based on the specifications of the WARP hardware,
the minimum transmit power is limited to −12 dBm and the
Fig. 14. Fairness index with respect to the number of clients when the
suppression level of self-interference cancellation is 60 dB.
transmit power is adjustable in increments of 1 dBm. The main
objective of the experiment is to verify the SINR performance
of the uplink and downlink transmissions by the transmit power
fairness index among all the schemes in our tests. With adjustment scheme, as described in Section IV-A.
PoCMAC, the fairness index is higher than 0.97, which implies To measure the channel information and SINR of the uplink
that the clients have almost the same transmission opportunity and downlink transmissions, we set up the WARP hardware as
on a long-term basis. It is also observed that the value of α shown in Fig. 15. As described in Section IV-A, the positions
does not affect the fairness performance. It is worth noting that of the AP and TX are fixed, and only the RX moves from A
PoCMAC does not provide only clients near the AP with more to D. The TX and RX are located on the floor, and the AP is
opportunities, because the RX will be determined by the signal located at a height of 4.1 m from the floor. While the TX sends a
strengths from the TX as well as that from the AP. As a result, signal for uplink transmission to the AP, the AP simultaneously
the clients can get almost the same opportunity to transmit, thus sends a signal for downlink transmission to the RX. At each RX
enhancing the fairness performance, as shown in Fig. 13. position, the AP measures the SINR of the uplink transmission
In addition, Fig. 14 shows the throughput fairness with sent by the TX, and the RX measures the SINR of the downlink
respect to the number of clients when α is 60 dB. As the transmission sent by the AP.
number of clients increases, the average inter-client interference Table II lists the experiment results obtained with and
between clients increases because the distance between clients without the power control scheme of PoCMAC. For full-
becomes shorter. Hence, the fairness index for all the schemes duplex without power control, there is no significant change in
is degraded as the number of clients increases. However, SINRUplink for the different RX positions because the positions
PoCMAC achieves a better fairness performance in through- of the AP and TX are fixed. However, SINRDownlink decreases
put among clients than the other schemes, because the RSSB significantly as the RX approaches the TX, because the signal
contention mechanism can select the RX with low inter-client sent by the TX increasingly interferes with the reception of the
interference even in high inter-client interference situations. downlink transmission in the RX. Therefore, because the SINR
3612 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 14, NO. 7, JULY 2015

TABLE II
E XPERIMENT R ESULTS

threshold for successful reception is 6 dB, full-duplex commu-


nication is not possible at any of the RX positions. The power
control scheme of PoCMAC, as described in Section III-C,
can overcome this problem. When the RX is located at B, C,
and D, the inter-client interference caused by the TX is reduced
by adjusting the transmit powers, and as a result, SINRDownlink
increases significantly. In addition, full-duplex communication
is possible when the position of the RX is B, C, and D because
the SINR threshold is 6 dB. When the RX is located at A, even
if the AP uses the maximum transmit power of 5 dBm and the
TX uses the minimum power of −12 dBm, it cannot overcome
the high inter-client interference caused by the TX owing to the
short distance between the TX and the RX.
We conducted another set of experiments with a random
topology in which the TX and RX are located in 30 random
positions. For each pair of TX and RX positions, we measured
the SINR and evaluated whether full-duplex communication
is possible using PoCMAC. Fig. 16(a) shows the changes in
the received powers for the uplink and downlink transmis-
sions when the power control scheme of PoCMAC is applied.
Under the power control scheme of PoCMAC, full-duplex
communication is possible at 20 positions (depicted as red
circles) out of the 30 positions, while it is possible only at
8 positions (blue squares) without power control. This is be-
cause the power control scheme of PoCMAC reduces the inter-
client interference caused by the TX, as shown in Fig. 16(a).
Note that the gray level of arrows indicates the amount of
change in inter-client interference due to the power control
scheme of PoCMAC. As shown in Fig. 16(b), the power control
scheme of PoCMAC can reduce the inter-client interference by
around 10 dB, on average. The experimental results indicate
that the power control scheme expands the geographical region
where full-duplex communication can be achieved. Fig. 16. Experiment results for evaluating full-duplex capability with PoC-
MAC when the RX is located in 30 random positions. (a) Changes of received
powers for uplink and downlink transmissions by PoCMAC. (b) CDF of inter-
V. C ONCLUSION client interference.

We proposed a full-duplex MAC protocol to provide greater the optimal solution of which determines the transmit power
reception opportunities to clients with low interference and to of the AP and the uplink client. We defined control frames
reduce the interference between uplink and downlink transmis- and header structures to implement our protocol, PoCMAC.
sions at the AP. For a given uplink transmission from a client The performance of PoCMAC was evaluated under various
to the AP, a client that can achieve high SINR in spite of the simulation configurations with regard to the SINR, throughput,
simultaneous uplink transmission may have a greater chance and fairness. In addition, SDR-based experiments with WARP
of being selected as the downlink client under the proposed were performed in a real wireless communication environment.
RSSB contention mechanism. To maximize the uplink and The simulation and experiment results confirmed the excellent
downlink SINRs, an optimization problem was formulated, performance of PoCMAC.
CHOI et al.: POWER-CONTROLLED MEDIUM ACCESS CONTROL PROTOCOL FOR FULL-DUPLEX WiFi NETWORKS 3613

R EFERENCES Wooyeol Choi received the B.S. degree from


the School of Computer Science and Engineering,
[1] J. Choi, M. Jain, K. Srinivasan, P. Levis, and S. Katti, “Achieving single
Pusan National University, Busan, Korea, in 2008,
channel, full duplex wireless communication,” in Proc. ACM Int. Conf.
and the M.S. degree from the School of Infor-
MobiCom Netw., 2010, pp. 1–12.
mation and Communications, Gwangju Institute of
[2] M. Jain et al., “Practical, real-time, full duplex wireless,” in Proc. ACM
Science and Technology (GIST), Gwangju, Korea, in
Int. Conf. MobiCom Netw., 2011, pp. 301–312.
2010. He is currently pursuing the Ph.D. degree at the
[3] A. Sahai, G. Patel, and A. Sabharwal, “Pushing the limits of full-duplex: School of Information and Communications, GIST.
Design and real-time implementation,” Rice Univ., Houston, TX, USA,
His research interests include design, optimization
Rice Univ. Tech. Rep. TREE1104, 2011.
and analysis for wireless networks.
[4] M. Duarte, C. Dick, and A. Sabharwal, “Experiment-driven characteri-
zation of full-duplex wireless systems,” IEEE Trans. Wireless Commun.,
vol. 11, no. 12, pp. 4296–4307, Dec. 2012.
[5] M. Duarte et al., “Design and characterization of a full-duplex multi-
antenna system for WiFi networks,” IEEE Trans. Veh. Technol., vol. 63,
no. 3, pp. 1160–1177, Mar. 2014.
[6] E. Everett, A. Sahai, and A. Sabharwal, “Passive self-interference sup-
pression for full-duplex infrastructure nodes,” IEEE Trans. Wireless
Commun., vol. 13, no. 2, pp. 680–694, Feb. 2014.
[7] D. Bharadia, E. McMilin, and S. Katti, “Full duplex radios,” in Proc. ACM Hyuk Lim (M’03) received the B.S., M.S., and
SIGCOMM, 2013, pp. 375–386. Ph.D. degrees from the School of Electrical En-
[8] S. Sen, R. Roy Choudhury, and S. Nelakuditi, “CSMA/CN: Carrier sense gineering and Computer Science, Seoul National
multiple access with collision notification,” in Proc. ACM Int. Conf. University (SNU), Seoul, Korea in 1996, 1998, and
MobiCom Netw., 2010, pp. 25–36. 2003, respectively. He is currently an Associate Pro-
[9] K. Tamaki et al., “Full duplex media access control for wireless multi-hop fessor in the School of Information and Communica-
networks,” in Proc. IEEE VTC—Spring, 2013, pp. 1–5. tions, Gwangju Institute of Science and Technology
[10] W. Zhou, K. Srinivasan, and P. Sinha, “RCTC: Rapid concurrent transmis- (GIST), Gwangju, Korea. He was a Postdoctoral
sion coordination in full duplex wireless networks,” in Proc. IEEE ICNP, Research Associate in the Department of Computer
2013, pp. 1–10. Science, University of Illinois at Urbana Champaign
[11] W. Cheng, X. Zhang, and H. Zhang, “Optimal dynamic power control for in 2003–2006. His research interests include the net-
full-duplex bidirectional-channel based wireless networks,” in Proc. IEEE work protocol design, analysis, and empirical evaluation of wireless networks.
INFOCOM, 2013, pp. 3120–3128.
[12] S. Goyal, P. Liu, O. Gurbuz, E. Erkip, and S. Panwar, “A distributed MAC
protocol for full duplex radio,” in Proc. Asilomar Conf. Signals, Syst.
Comput., 2013, pp. 788–792.
[13] D. Ramirez and B. Aazhang, “Optimal routing and power allocation for
wireless networks with imperfect full-duplex nodes,” IEEE Trans. Wire-
less Commun., vol. 12, no. 9, pp. 4692–4704, Sep. 2013.
[14] N. Singh et al., “Efficient and fair MAC for wireless networks with self-
interference cancellation,” in Proc. IEEE Int. Symp. Modeling WiOpt Ashutosh Sabharwal (S’91–M’99–SM’04–F’14)
Mobile, Ad Hoc Netw., 2011, pp. 94–101. received the B.Tech. degree from the Indian Institute
[15] J. Bai and A. Sabharwal, “Distributed full-duplex via wireless side- of Technology Delhi, New Delhi, India, in 1993
channels: Bounds and protocols,” IEEE Trans. Wireless Commun., vol. 12, and the M.S. and Ph.D. degrees from The Ohio
no. 8, pp. 4162–4173, Aug. 2013. State University, Columbus, OH, USA, in 1995 and
[16] A. Sahai, G. Patel, and A. Sabharwal, “Asynchronous full-duplex wire- 1999, respectively. He is currently a Professor with
less,” in Proc. Int. Conf. COMSNETS, 2012, pp. 1–9. the Department of Electrical and Computer Engi-
[17] R. Jain, D. Chiu, and W. Hawe, “A quantitative measure of fairness and neering, Rice University, Houston, TX, USA. He
discrimination for resource allocation in shared computer system,” Digital is the Founder of the WARP Project. His research
Equip. Corp., Hudson, MA, USA, DEC Tech. Rep. 301, 1984. interests include information theory, communication
[18] Wireless Open Access Research Platform (WARP) Project, Rice Univer- algorithms, and experiment-driven design of wireless
sity, Houston, TX, USA. [Online]. Available: http://warpproject.org/ networks. He received the 1998 Presidential Dissertation Fellowship Award.

You might also like