07.12.2012 Views

On the Effect of Radio Channel Propagation Models - Oulu

On the Effect of Radio Channel Propagation Models - Oulu

On the Effect of Radio Channel Propagation Models - Oulu

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

ON THE EFFECT OF RADIO CHANNEL PROPAGATION MODELS<br />

TO THE AD HOC NETWORK PERFORMANCE<br />

Jarmo Prokkola<br />

VTT Technical Research Centre <strong>of</strong> Finland,<br />

<strong>Oulu</strong>, Finland<br />

ABSTRACT<br />

In this paper we study <strong>the</strong> behavior <strong>of</strong>ad hoc network performance<br />

under different propagation models. Ad hoc networks<br />

are <strong>of</strong>ten studied with unrealistic cut propagation<br />

models, where <strong>the</strong> propagating signal is completely cut to<br />

some predefined distance. The worst drawback in this kind<br />

modeling is that it fails to include <strong>the</strong> effect <strong>of</strong> multiple access<br />

interference (MAI). Since cut propagation model is<br />

taken as a point <strong>of</strong> comparison, free space propagation<br />

model will provide <strong>the</strong> simplest enhancement to enable<br />

realistic MAI calculation. In addition, we also use a forest<br />

propagation loss model, which provides a more realistic<br />

environment for military scenarios. We study <strong>the</strong> performance<br />

in two cases. nodes equipped with our BCCA (Bi-<br />

Code <strong>Channel</strong> Access) and BC-MAC (Bi-Code MAC), and<br />

nodes with IEEE 802.11.<br />

The study shows that <strong>the</strong>re are significant differences in<br />

<strong>the</strong> absolute performance between scenarios with different<br />

propagation models. This clearly shows <strong>the</strong> importance <strong>of</strong><br />

lower layer modeling, although <strong>the</strong> focus would be on <strong>the</strong><br />

upper layer performance (e.g., on <strong>the</strong> application layer<br />

Quality <strong>of</strong> Service (QoS)). The study also shows that BC-<br />

MAC outperforms IEEE 802.11 regardless <strong>of</strong> <strong>the</strong> propagation<br />

modeling. Despite <strong>the</strong> fact that <strong>the</strong> ranking <strong>of</strong> <strong>the</strong> performance<br />

between BC-MAC and 802.11 was unchanged in<br />

this study, <strong>the</strong> great differences in <strong>the</strong> absolute performance<br />

questions <strong>the</strong> generality <strong>of</strong> <strong>the</strong> results obtained with<br />

simplified lower layer models. This should be taken into<br />

consideration especially in military related studies, where<br />

<strong>the</strong> focus <strong>of</strong>ten is in <strong>the</strong> absolute performance <strong>of</strong> a certain<br />

scenario and not only in <strong>the</strong> relative difference between<br />

some methods.<br />

INTRODUCTION<br />

In this study, we focus on <strong>the</strong> effect <strong>of</strong> radio signal propagation<br />

modeling to <strong>the</strong> performance <strong>of</strong> ad hoc networks.<br />

<strong>Propagation</strong> modeling has been studied a lot, but modeling<br />

in network level simulations, and especially in <strong>the</strong> case <strong>of</strong><br />

ad hoc networks, has been imperfect. Many <strong>of</strong> <strong>the</strong> studies<br />

so far use unrealistic cut radio channel model, which fails<br />

to model multiple access interference. Yet, some studies<br />

1 <strong>of</strong> 7<br />

Timo Braysy and Teemu Vanninen<br />

Centre for Wireless Communications (CWC),<br />

University <strong>of</strong> <strong>Oulu</strong>, <strong>Oulu</strong>, Finland<br />

for considering <strong>the</strong> importance <strong>of</strong> realistic physical layer<br />

in design <strong>of</strong> ad hoc network routing protocols has been<br />

addressed (e.g., [1]). In [2], for example, a shadowing<br />

model is used in ad hoc network simulations. The fluctuations<br />

in signals strength causes route breakages,<br />

which in turn lead to decreased packet delivery ratio,<br />

increased control traffic and increased packet delay that<br />

cause user perceived QoS to be decreased.<br />

<strong>On</strong>ly few papers address <strong>the</strong> effect <strong>of</strong> physical layer parameters<br />

to <strong>the</strong> performance <strong>of</strong> routing and MAC layer<br />

functions in wireless ad hoc networks. In [3], a simulation<br />

modeling study has been performed to demonstrate<br />

<strong>the</strong> possibly significant effect <strong>of</strong> <strong>the</strong> different physical<br />

layer properties such as physical layer preamble length,<br />

interference, fading and path loss. The study also addresses<br />

<strong>the</strong> importance <strong>of</strong> MAI calculation and discusses<br />

about <strong>the</strong> ways how different simulation tools model <strong>the</strong><br />

radio channel properties. In [4] and [5] a sophisticated<br />

indoor wireless channel model based on ray-tracing and<br />

Markov chains is presented and developed for NS-2<br />

simulation tool.<br />

The novelty in our paper is <strong>the</strong> extensive simulation<br />

study <strong>of</strong> propagation modeling impacts to <strong>the</strong> higher<br />

layer performance. We have set <strong>the</strong> parameters (e.g.,<br />

transmission power) in a way that <strong>the</strong> results <strong>of</strong> different<br />

scenarios are easily comparable to each o<strong>the</strong>r. The models<br />

used here are: free space propagation loss (FSL), forest<br />

propagation loss (FPL), and two cut propagation (CP)<br />

models, CP-LP (low power) and CP-HP (high power).<br />

CP-HP is a good point <strong>of</strong> comparison, since it is quite<br />

similar to <strong>the</strong> simplified radio channel models used in<br />

several studies. We use mainly our BCCA method and<br />

BC-MAC, but also IEEE 802.11 is used as a reference,<br />

since one <strong>of</strong> <strong>the</strong> goals is to compare BC-MAC and<br />

802.1 1 under different propagation models.<br />

SYSTEM DESCRIPTION<br />

A. BCCA and BC-MAC<br />

Bi-Code <strong>Channel</strong> Access (BCCA) is a dual channel access<br />

method designed especially for <strong>the</strong> needs <strong>of</strong> ad hoc<br />

networking. The basic idea is that <strong>the</strong> ad hoc nodes are


able to track two separate channels simultaneously. In our<br />

spread spectrum approach, nodes are able to track transmissions<br />

with two different spreading codes. <strong>On</strong>e is a<br />

common code channel (C-code), which is used for route<br />

maintenance and broadcast communications. The o<strong>the</strong>r is a<br />

receiver based code channel (R-code), which is unique for<br />

each node, unlike <strong>the</strong> C-code. R-code is used for all directed<br />

transmission (e.g., data) per hop basis. [6]<br />

Since BCCA is a channel access method to enable distributed<br />

CDMA-like (Code Division Multiple Access) communications<br />

for ad hoc networks, a medium access control<br />

(MAC) method is also needed. BC-MAC is designed to be<br />

used with BCCA. It is a straightforward CSMA-based<br />

(Carrier Sense Multiple Access) MAC solution with fast<br />

ARQ (Automatic Repeat Request) implementation. BC-<br />

MAC with BCCA has been shown to have very high performance<br />

in ad hoc environment. [7]<br />

With <strong>the</strong> use <strong>of</strong> BCCA, it is required that <strong>the</strong> R-type<br />

spreading codes <strong>of</strong> <strong>the</strong> nodes are known, For <strong>the</strong> cases<br />

where <strong>the</strong> codes are unknown, an efficient network layer<br />

spreading code distribution method is being developed.<br />

However, we will use <strong>the</strong> assumption <strong>of</strong> known codes in<br />

this paper, since it is a fair assumption in military scenarios.<br />

Hereafter, when we refer to BC-MAC, it is assumed<br />

that BCCA functionality is also implemented to it.<br />

B. IEEE 802.11<br />

The basic IEEE 802.11 (later referred to as 802.11) is considered<br />

as a point <strong>of</strong> comparison. The modeling <strong>of</strong> 802.11<br />

is based on <strong>the</strong> basic OPNET model <strong>of</strong> 802.11 with some<br />

modifications to enable <strong>the</strong> functionality with <strong>the</strong> used<br />

routing protocol (as in our previous studies [6], [7]). Some<br />

modifications were also needed to enable <strong>the</strong> possibility to<br />

use different propagation models, but no functional<br />

changes to <strong>the</strong> MAC have been made.<br />

The DSSS (Direct Sequence Spread Spectrum) mode <strong>of</strong><br />

802.11 is used, since DS spreading is also used in BC-<br />

MAC. Virtual carrier sensing is not used, because it produces<br />

additional overhead [8], which is not desired (multiple<br />

handshaking transmissions, latency, capacity decrement<br />

under heavy traffic). Carrier sensing is done by<br />

power level measurement with a threshold in both 802.11<br />

and BC-MAC. This threshold is set according to <strong>the</strong> power<br />

level, where <strong>the</strong> reception is just more likely to succeed<br />

than fail in <strong>the</strong>ory.<br />

C. The Physical Layer<br />

At <strong>the</strong> physical layer, channel data rate is set to 1 Mbit/s.<br />

To allow potentiality for interference suppression and to<br />

enhance LPD (Low Probability <strong>of</strong> Detection) and LPI<br />

(Low Probability <strong>of</strong> Interception) properties, sufficient<br />

2 <strong>of</strong> 7<br />

spreading factor is needed. Spreading code length <strong>of</strong> Nc<br />

= 63 chip is used. With bit-wise spreading, processing<br />

gain is directly 63 (- 18.0 dB). To make fair comparisons<br />

between BC-MAC and 802.11, <strong>the</strong> same spreading<br />

factor is also set to 802.11 instead <strong>of</strong> <strong>the</strong> standard value<br />

<strong>of</strong> 11. The frame formats are set to be equal according to<br />

- 802.11. The systems operate on 2.4 GHz ISM (Industrial,<br />

Scientific and Medical) frequency band.<br />

B. The Network Layer<br />

The network layer functionality is kept simple enough so<br />

that it does not provide any extra effects to <strong>the</strong> results.<br />

The functionality is mainly under control <strong>of</strong> Ad hoc <strong>On</strong>demand<br />

Distance Vector (AODV) routing protocol with<br />

some basic characteristics <strong>of</strong> IP (Internet Protocol). But<br />

for example address resolution protocol (ARP) is not<br />

used, instead, it is assumed for simplicity, that <strong>the</strong> MAC<br />

and network layer share <strong>the</strong> same address base.<br />

AODV is a reactive pure on-demand type routing protocol,<br />

where routes are formed and updated only when<br />

needed [9]. The used OPNET model <strong>of</strong> AODV is <strong>the</strong><br />

same as in our previous work (e.g., [6], where it is also<br />

described how to enable BCCA functionality with<br />

AODV). AODV hello-messages and passive listening at<br />

MAC layer are not used, because in military scenario,<br />

we want to avoid extra control traffic<br />

C. Transport & Application Layer<br />

In order to keep <strong>the</strong> focus on lower layer functionalities,<br />

it is not desired that <strong>the</strong> upper layers will add complexity<br />

and more parameters to <strong>the</strong> currently already quite large<br />

set <strong>of</strong> parameters. Thus, transport layer functionalities<br />

are minimized and <strong>the</strong> layer above network layer is basically<br />

<strong>the</strong> application layer. In a sense, <strong>the</strong> transport layer<br />

can be assumed to exist as UDP-lite (Lightweight User<br />

Datagram Protocol, [10]), if one assumes that <strong>the</strong> UDP<br />

fields exist in <strong>the</strong> data packet.<br />

Application layer is modeled statistically with traffic<br />

models. VBR-M [6] model is used as a traffic model,<br />

and <strong>the</strong> data packet length has a constant value <strong>of</strong> 4096<br />

bits. Because <strong>the</strong> focus is on lower layer functionalities,<br />

heavy tailed modern data traffic models are not used,<br />

since <strong>the</strong>y also introduce <strong>the</strong>ir own effects to <strong>the</strong> network<br />

performance (e.g., [11]). As a session model, dynamic<br />

connections are used [7].<br />

E. Simulation Scenarios and performance metrics<br />

This study is based on OPNET simulations. A basic ad<br />

hoc scenario is chosen, where <strong>the</strong> operational area has a<br />

size <strong>of</strong> 1500 m x 300 m and <strong>the</strong> nodes have effective<br />

radio range <strong>of</strong> about 250 m. The area contains 50 nodes,<br />

<strong>of</strong> which 20 run applications (i.e., generate traffic), but


all <strong>the</strong> nodes can receive data and route traffic. The simulated<br />

results are each averaged over 32 iterations, which<br />

each have 93750 simulated packets in average. The results<br />

are presented as a function <strong>of</strong> <strong>of</strong>fered data traffic load,<br />

which is normalized to <strong>the</strong> channel bit rate. Offered data<br />

traffic load is controlled by modifying mean interarrival<br />

time <strong>of</strong> data packets.<br />

Unfortunately we do not have enough space in this paper<br />

to consider both mobile and static nodes. We focus only on<br />

static nodes (which could form e.g., a military sensor network).<br />

In this way we can get more information about <strong>the</strong><br />

effect <strong>of</strong> lower layer modeling, since mobility would also<br />

bring its own features to <strong>the</strong> results. Static nodes here imply<br />

that <strong>the</strong> positions <strong>of</strong> <strong>the</strong> nodes are fixed to random locations<br />

in <strong>the</strong> beginning <strong>of</strong> each simulation iteration.<br />

Hence, <strong>the</strong> effect <strong>of</strong> node locations will be averaged over<br />

<strong>the</strong> simulated iterations. Certainly, it would be also interesting<br />

to see <strong>the</strong> effect <strong>of</strong> propagation modeling in <strong>the</strong> case<br />

<strong>of</strong> mobile nodes. It is, however, presumable that relative<br />

effect <strong>of</strong> propagation modeling would be similar to <strong>the</strong><br />

case <strong>of</strong> mobile nodes as it is for static nodes. AODV active<br />

route timeout is now set to infinity, since <strong>the</strong> topology does<br />

not change.<br />

ON THE RADIO CHANNEL MODELING<br />

A. <strong>Radio</strong> <strong>Channel</strong> and <strong>Propagation</strong> Modeling<br />

In ad hoc network studies, a cut propagation model is <strong>of</strong>ten<br />

used (e.g., [12], [13]). In this, <strong>the</strong> signal propagates according<br />

to some law to a certain distance, where <strong>the</strong> signal is<br />

simply cut (also referred as unit disk graph (UDG) model<br />

[1]). This distance is, <strong>the</strong>refore, <strong>the</strong> radio range <strong>of</strong> <strong>the</strong><br />

node. In <strong>the</strong> even more simplified cut model, no actual<br />

power attenuation is calculated, but <strong>the</strong> signal just arrives<br />

to <strong>the</strong> receiver inside certain radius around <strong>the</strong> node.<br />

Free space loss can be considered as a basic type <strong>of</strong> a real<br />

attenuation. It originates from <strong>the</strong> fact that <strong>the</strong> signal energy<br />

spreads over space in three dimensions as <strong>the</strong> propagation<br />

distance increases. The forest propagation loss<br />

(FPL) model used in this study is a combination <strong>of</strong> three<br />

commonly known models: free space, plane earth and<br />

Weissberger foliage attenuation models. The method is <strong>the</strong><br />

same as used in <strong>the</strong> OPNET Path Attenuation Routine<br />

(OPAR) by Mitre Corporation [14]. This model gives attenuation<br />

in leaf-tree forest, presumably fitting well to forest-like<br />

battlefields. At first, in <strong>the</strong> FPL model, both free<br />

space and plane earth attenuations are calculated as<br />

LPE = 40 logl0(D) -20 logl0 (hJX -20 logl0(hrx), (1)<br />

Lfs = 32.45 + 201oglo (D) + 20 1log, (f), (2)<br />

3 <strong>of</strong> 7<br />

where LPE= attenuation by plane-earth model (in dB),<br />

D = total path length (in meters), h,t, hrx = transmit and<br />

receiver antenna heights (in meters), respectively, Lf, =<br />

attenuation by free space model (in dB), f = frequency<br />

(in GHz). Using Weissberger model for foliage obstruction<br />

block, <strong>the</strong> actual foliage attenuation (in dB) is<br />

1l.33f0284 xD 0588, D1 >14m<br />

weiss O.45f 0284 XDjf0, O


transmission power for desired range when <strong>the</strong> path-loss<br />

model and all <strong>the</strong> signal losses are known (in reality this<br />

would be just estimation). When <strong>the</strong> receiver bandwidth<br />

(B) is 63 MHz and <strong>the</strong> receiver effective noise temperature<br />

(T) is 290 K, <strong>the</strong> noise power can be calculated as<br />

PN = kTB 1.379 .23290K 63 106Hz<br />

2.519e-3W<br />

where k is <strong>the</strong> Boltzmann's constant. Thus, <strong>the</strong> received<br />

power requirement is<br />

PRX = YbPN 2.30 -2.519 -10 W -92 dBm (6)<br />

Taking into account <strong>the</strong> 18 dB processing gain, <strong>the</strong> PRX<br />

drops to about -110 dBm.<br />

With FPL we get path loss for 250 m to be 132.12 dB<br />

when h,t and hrx are assumed to be 2 m andfis 2.4315 GHz<br />

in <strong>the</strong> ISM band. Since antennas are omnidirectional, antenna<br />

gains are 0 dB, <strong>the</strong> transmitted power should<br />

be PTX = PX /LWfe =0. 15 W . In <strong>the</strong> case <strong>of</strong> FSL, <strong>the</strong> path loss<br />

for 250 m is 88.13 dB and <strong>the</strong> corresponding PTX should be<br />

6 [tW. As a point <strong>of</strong> comparison, we take two cut propagation<br />

models, where <strong>the</strong> signal propagates according to FSL<br />

until it is cut. In <strong>the</strong> high power CP-HP model, 100 mW<br />

transmission power is used, and in <strong>the</strong> low power CP-LP<br />

model, <strong>the</strong> same power is used as in <strong>the</strong> FSL case (6 [tW).<br />

C. Interference Modeling<br />

In <strong>the</strong> simple models, MAI is not actually calculated. The<br />

usual solution is that if two or more signals are seen at <strong>the</strong><br />

same receiver, <strong>the</strong> strongest one (possibly above some<br />

threshold) is selected to be received and <strong>the</strong> o<strong>the</strong>rs are considered<br />

lost. This kind <strong>of</strong> modeling is used at least in <strong>the</strong><br />

older versions <strong>of</strong> ns-2 [16], [3]. In <strong>the</strong> even simpler model,<br />

no power levels are calculated, but it is just decided (e.g.,<br />

based on <strong>the</strong> arrival time) which signal is received and<br />

which are lost, or in <strong>the</strong> pessimistic assumption, all signals<br />

are always considered lost in <strong>the</strong> case <strong>of</strong> a collision.<br />

OPNET has an efficient inbuilt link budget calculation system.<br />

It calculates <strong>the</strong> received signal power level according<br />

to <strong>the</strong> used propagation model (FSL as default) taking into<br />

consideration all relevant parameters (antenna gains,<br />

transmit power, processing gain, etc.). In addition to background<br />

noise, <strong>the</strong> interference caused by o<strong>the</strong>r transmissions<br />

is also added to <strong>the</strong> SINR (signal to noise and interference<br />

ratio) calculation. The calculated interference from<br />

o<strong>the</strong>r transmissions is added directly to <strong>the</strong> total noise<br />

power. In spread spectrum modeling, <strong>the</strong> signal spread<br />

with <strong>the</strong> correct code is recovered with processing gain,<br />

which is equal to <strong>the</strong> spreading factor (spreading code rate<br />

/ data rate). Hence, <strong>the</strong> calculation is done on <strong>the</strong> power<br />

level basis and no actual correlations with <strong>the</strong> interfering<br />

(5)<br />

4 <strong>of</strong> 7<br />

signals are calculated. This, <strong>of</strong> course, can bring some<br />

inaccuracy, but assuming a spreading code family with<br />

well known cross correlation properties (like gold sequences<br />

[17]), this simplification is fair enough. The accurate<br />

signal-level calculation is a heavy process and it<br />

would be (currently) almost impossible in bigger network<br />

simulations. Instead, OPNET provides a possibility<br />

to use own SNR-BER behavior curves, which can be<br />

used to model accurate physical level behavior.<br />

As a consequence, OPNET models MAI accurately<br />

enough for our purposes. It can be anticipated that cut<br />

propagation modeling will give too optimistic view <strong>of</strong><br />

<strong>the</strong> performance since it does not consider MAI outside<br />

<strong>the</strong> defined radio range. Some interesting approaches for<br />

MAI modeling in network level simulations have been<br />

also presented, where nodes have longer interference<br />

range in addition to radio range for successful data<br />

transmission [18]. Although this is a step towards more<br />

accurate modeling, it does not yet give proper idea about<br />

<strong>the</strong> effect <strong>of</strong> MAI, since in reality, <strong>the</strong> signals propagate<br />

to infinity (in <strong>the</strong> absence <strong>of</strong> physical barriers). The reason<br />

behind <strong>the</strong> wide usage <strong>of</strong> cut propagation modeling<br />

is its simplicity. Accurate MAI modeling is computationally<br />

costly, since <strong>the</strong> link budget calculations must be<br />

made to every node in a scenario per single transmission.<br />

0<br />

-20<br />

<strong>Propagation</strong> distance [m]<br />

10 20 300 40 500 600 700 800 900 1000<br />

- 40m<br />

-FPL<br />

2 60<br />

> ~~~~~~~~~~~FSL<br />

ti 80ndetection level<br />

-D _100-<br />

-.,120-<br />

140<br />

160<br />

-180<br />

-200 _LL LL<br />

Figure 1. Received power level as a function <strong>of</strong> propagation<br />

distance<br />

In FPL model <strong>the</strong> signal attenuates heavily, which sets<br />

challenges to <strong>the</strong> communications as compared to free<br />

space propagation. However, in terms <strong>of</strong> MAI, <strong>the</strong> situation<br />

is quite interesting. Because <strong>of</strong> <strong>the</strong> heavy propagation<br />

loss, <strong>the</strong> long range MAI is, in fact, clearly weaker<br />

than it is with free space loss. This can be easily seen<br />

from Figure 1, where <strong>the</strong> received power level is represented<br />

as a function <strong>of</strong> propagation distance. In <strong>the</strong> FPL<br />

model, <strong>the</strong> curve's starting point is naturally higher,<br />

since <strong>the</strong> transmission power needs to be higher than in<br />

<strong>the</strong> FSL model. Signal detection level (about -110 dBm)<br />

is also shown in <strong>the</strong> figure, which <strong>of</strong> course, intersects<br />

with <strong>the</strong> o<strong>the</strong>r curves at <strong>the</strong> effective radio range <strong>of</strong>


250 m. After this distance, <strong>the</strong> MAI under FSL model is<br />

dominating, since <strong>the</strong> attenuation under foliage obstruction<br />

is much higher. Take for example <strong>the</strong> interference level at<br />

<strong>the</strong> distance <strong>of</strong> 500 m from <strong>the</strong> transmitter. Under FPL, <strong>the</strong><br />

interference level is about -140 dBm, while under FSL it is<br />

over 20 dB higher (about -1 16 dBm).<br />

SIMULATION RESULTS<br />

First, we present <strong>the</strong> results <strong>of</strong> BC-MAC under different<br />

propagation models in detail. Then we turn our attention to<br />

802.11, where we also have some comparison with BC-<br />

MAC. Unfortunately we do not have enough space to analyze<br />

802.11 with <strong>the</strong> same accuracy as BC-MAC.<br />

A. BC-MAC<br />

Figure 2 presents average number <strong>of</strong> collisions per received<br />

packet at MAC. Calculated collisions reflect directly<br />

to MAI, because <strong>the</strong> used metric calculates also simultaneous<br />

transmissions with different spreading codes.<br />

No major differences exist between <strong>the</strong> two real propagation<br />

models (FSL & FPL) and between <strong>the</strong> two cut propagation<br />

models. However, under real propagation models,<br />

<strong>the</strong> number <strong>of</strong> collisions is constantly higher (- 8 times)<br />

than with <strong>the</strong> cut propagation models, as anticipated.<br />

Q-<br />

.:<br />

en<br />

_n<br />

a)<br />

10<br />

0,1<br />

O,C<br />

001 OC0,t<br />

0 _<br />

01 .., 0 ' 1<br />

t0W000 0_0::0 0a0000t :100<br />

..i<br />

- BC- AC (FSL)<br />

- -D- BC-MAC (CP-LP)<br />

-BC-MAC (FPL)<br />

BC-MAC (CP-HP)<br />

0,01<br />

Offered data traffic<br />

Figure 2. Average number <strong>of</strong> collisions per received packet<br />

(BC-MAC) with different propagation models.<br />

A notable discovery is that this has, unlike it is <strong>of</strong>ten assumed,<br />

a direct impact to <strong>the</strong> network layer performance.<br />

Consider e.g., Figure 3, where average number <strong>of</strong> route<br />

breakages is shown. The basic trend, with all models, is<br />

that <strong>the</strong> number <strong>of</strong> route breakages is almost constant at<br />

low and moderate traffic load, but at some point, with increasing<br />

traffic load, <strong>the</strong> number <strong>of</strong> route breakages almost<br />

explodes. At this point <strong>the</strong> network gets congested and finally<br />

collapses with fur<strong>the</strong>r increase <strong>of</strong> traffic load.<br />

However, great differences exist in <strong>the</strong> absolute performance.<br />

As seen, <strong>the</strong> number <strong>of</strong> broken routes is constantly<br />

several times higher under real propagation models. The<br />

5 <strong>of</strong> 7<br />

performance under CP-HP model is above all o<strong>the</strong>rs: no<br />

route breakages happen before network congestion (<strong>of</strong>fered<br />

load <strong>of</strong> 0.6)! The functional difference to <strong>the</strong> low<br />

power cut propagation model is in <strong>the</strong> stability <strong>of</strong> long<br />

links. In CP-LP, <strong>the</strong> signal is barely receivable near <strong>the</strong><br />

limit 250 m, and just a slight extra interference will<br />

cause a long link to fail. In CP-HP, <strong>the</strong> situation is totally<br />

different, since <strong>the</strong> signal is still very strong in edge <strong>of</strong><br />

<strong>the</strong> range. Also, <strong>the</strong> background noise has practically no<br />

effect to <strong>the</strong> performance, and <strong>the</strong>refore, processing gain<br />

will mostly be able to handle collisions. In CP-HP, <strong>the</strong><br />

retransmissions will always be successful within <strong>the</strong> retransmission<br />

limits (not shown), and hence, no route<br />

breakages occur. This interesting behavior highlights <strong>the</strong><br />

failure <strong>of</strong> CP modeling, and also, <strong>the</strong> effect <strong>of</strong> transmission<br />

power in <strong>the</strong> cut models, where it is <strong>of</strong>ten assumed<br />

meaningless.<br />

cn<br />

4000<br />

3500<br />

3000<br />

a) 2000<br />

z<br />

1500<br />

1000<br />

500 0<br />

0,0001<br />

--BC-MAC (FSL)<br />

- -X- BC-MAC (CP-LP)<br />

BC-MAC (FPL)<br />

BC-MAC (CP-HP)<br />

. - -. . - i-z - - --<br />

0,001 0,01 0,1<br />

Offered data traffic<br />

Figure 3. Number <strong>of</strong> route breakages (BC-MAC).<br />

Offered data traffic<br />

1 ,OE+00<br />

o,a<br />

1 ,OE-01<br />

0<br />

*p 1 ,OE-02<br />

Cu<br />

-~ec'<br />

1 ,0E-03<br />

1 ,OE-04<br />

1 ,OE-05<br />

l01 01 001 .0<br />

Figure 4. Average packet loss ratio (BC-MAC).<br />

BC-MAC (FSL)<br />

10<br />

1 0<br />

-*- BC-MAC (CP-LP)<br />

BC-MAC (FPL)<br />

BC-MAC (CP-HP)<br />

The great differences in route breakages will definitely<br />

have effect also to <strong>the</strong> higher layer performance. Figure<br />

4 shows this in <strong>the</strong> form <strong>of</strong> packet loss ratio (application<br />

layer). The failure <strong>of</strong> CP models is, again, seen at its<br />

worst in <strong>the</strong> CP-HP case, as <strong>the</strong>re is practically no packet<br />

loss at low traffic load. It is interesting to note <strong>the</strong> behavior<br />

<strong>of</strong> <strong>the</strong> network under FPL model. At <strong>the</strong> low traffic<br />

load, packet loss is even lower than under <strong>the</strong> CP-LP<br />

model, but it rises with increasing traffic, and finally fol-


lows or exceeds <strong>the</strong> FSL curve. This kind <strong>of</strong> behavior can<br />

be also extracted from route breakage figure (Figure 3).<br />

This phenomenon can be explained quite easily, if we recall<br />

<strong>the</strong> power attenuation behavior. The attenuation under<br />

FPL model is so strong that it effectively behaves nearly<br />

like a CP model, when <strong>the</strong> network traffic load is very low,<br />

since <strong>the</strong> interference power far away from <strong>the</strong> transmitter<br />

is almost negligible. However, as <strong>the</strong> network traffic is<br />

increased, <strong>the</strong> total interference power in <strong>the</strong> network is<br />

also increased, and as a consequence, it makes <strong>the</strong> CP approximation<br />

to fail with increasing traffic.<br />

Important metric from <strong>the</strong> application QoS perspective is<br />

<strong>the</strong> average end-to-end delay, which is presented in Figure<br />

5. Typical network behavior is seen: <strong>the</strong> delay stays constant<br />

at low traffic loads, but increases heavily when <strong>the</strong><br />

network becomes near to <strong>the</strong> limits <strong>of</strong> it's capability to<br />

handle traffic. Pushing even more traffic causes buffers to<br />

fill up, which finally leads to buffer overflows (<strong>the</strong> delay<br />

rise settles). We note that <strong>the</strong> used propagation model does<br />

not seem to have great impact to average delay, at least not<br />

at <strong>the</strong> low traffic load. At heavy traffic, <strong>the</strong>re are differences<br />

between <strong>the</strong> points, where <strong>the</strong> network starts to become<br />

unstable. CP-HP gives <strong>the</strong> lowest delay and FPL follows<br />

it at low traffic load. But, as in <strong>the</strong> case <strong>of</strong> packet loss<br />

(and route breakages), <strong>the</strong> delay <strong>of</strong> FPL starts to approach<br />

FSL as <strong>the</strong> traffic load is increased.<br />

>c O<br />

>. 0,0<br />

10 I.. ..,<br />

0,01<br />

Offered data traffic<br />

Figure 5. Average data packet delay (BC-MAC).<br />

B. IEEE 802.11 and Comparison to BC-MAC<br />

At <strong>the</strong> very high traffic loads, <strong>the</strong> performance differences<br />

between different cases can be clearly seen in throughput<br />

(Figure 6). In this figure, <strong>the</strong> FSL and CP-HP curves <strong>of</strong> <strong>the</strong><br />

802.11 and BC-MAC are shown. An interesting observation<br />

can be made when considering 802.11 curves. <strong>On</strong> <strong>the</strong><br />

contrary to BC-MAC results, 802.11 FSL gives better performance<br />

than 802.11 CP-HP! This is quite unexpected,<br />

but can be explained: The very nature <strong>of</strong> this result originates<br />

most likely form <strong>the</strong> well-known hidden-terminal<br />

problem. CSMA is based on power detection and a single<br />

transmission can be just detected at a distance <strong>of</strong> 250 m.<br />

10<br />

6 <strong>of</strong> 7<br />

However, when <strong>the</strong>re are several transmissions simultaneously<br />

at <strong>the</strong> different portions <strong>of</strong> <strong>the</strong> network, <strong>the</strong> cumulative<br />

power <strong>of</strong> <strong>the</strong>se transmissions can cause signals<br />

to be detected from far<strong>the</strong>r than 250 m. Therefore, this<br />

basically alleviates hidden-terminal problem as compared<br />

to <strong>the</strong> CP-HP case, in which <strong>the</strong> CSMA range is<br />

always 250 m, and shows a better throughput is a result.<br />

The same phenomenon also exists with BC-MAC, but<br />

<strong>the</strong> effect is only minor, since node-specific spreading<br />

codes and processing gain handle <strong>the</strong> situation.<br />

0.7<br />

0.6<br />

0.5<br />

D<br />

Ideal random channel access<br />

--802.11 (FSL)<br />

--802.11 (CP-HP)<br />

0.4 -R<br />

_sc'<br />

=3 . BC-MAC (FSL)<br />

s<br />

0.3<br />

BC-MAC (CP-HP)<br />

0.2<br />

0.1<br />

O 1-<br />

0.001 0.01 0.1 1<br />

Offered data traffic<br />

Figure 6. Average throughput (BC-MAC vs. 802.11).<br />

Offered data traffic<br />

1 .vrL nF+nn uu T<br />

0o0 )Q1<br />

,..<br />

0001 00<br />

. _..<br />

1 -1<br />

1 .OE-01 t<br />

, 1.0E-02<br />

-~eou<br />

1.0E-03<br />

1 .OE-04<br />

...- -.,.-802.11(FSL)<br />

-- - 80211(CPHP)<br />

. 1BCMAC 8021 (FSL)<br />

BC-MAC (CP-HP)<br />

1.OE-05<br />

Figure 7. Average packet loss ratio (BC-MAC vs.<br />

802.11).<br />

This interesting phenomenon affects only at <strong>the</strong> high<br />

traffic load as seen from <strong>the</strong> packet loss behavior (Figure<br />

7). 802.11 CP-HP clearly dominates <strong>the</strong> performance<br />

over <strong>the</strong> 802.11 FSL case at low traffic load. But, as <strong>the</strong><br />

traffic load is increased, <strong>the</strong>re will be more and more<br />

simultaneous transmissions at <strong>the</strong> different parts <strong>of</strong> <strong>the</strong><br />

network, and hence, <strong>the</strong> phenomenon is enhanced. From<br />

about <strong>the</strong> traffic load <strong>of</strong> 0.08 forward, <strong>the</strong> performance<br />

under FSL is better than under CP-HP. As a consequence,<br />

commonly used CP-HP model clearly fails,<br />

since it gives too optimistic results at <strong>the</strong> low traffic load<br />

and too pessimistic at <strong>the</strong> high traffic load.<br />

10


Ano<strong>the</strong>r important observation is that BC-MAC outperforms<br />

802.11 regardless <strong>of</strong> <strong>the</strong> propagation model. In <strong>the</strong><br />

maximum throughput, <strong>the</strong>re is about two to three-fold difference<br />

in favor to BC-MAC. Of course, if one makes a<br />

comparison, e.g., BC-MAC under FSL and 802.11 under<br />

CP-HP, <strong>the</strong> comparison could imply that 802.11 performs<br />

better at <strong>the</strong> low traffic load (Figure 7). As obvious, such a<br />

comparison is not valid and <strong>the</strong> comparison between methods<br />

should be always made in a way that all <strong>the</strong> o<strong>the</strong>r variables<br />

are kept unchanged (<strong>the</strong> propagation model in this<br />

case).<br />

SUMMARY & CONCLUSIONS<br />

In this paper we studied <strong>the</strong> effect <strong>of</strong> propagation modeling<br />

to <strong>the</strong> ad hoc network performance (BC-MAC and 802.11).<br />

As real propagation models, we had free space loss and<br />

forest propagation loss models, and as a point <strong>of</strong> comparison,<br />

we had high and low power cut propagation models.<br />

CP-HP is idealistic in a sense that due to high power, only<br />

a strong collision can cause a loss at <strong>the</strong> physical layer.<br />

CP-LP is much more vulnerable, since near to <strong>the</strong> radio<br />

range, <strong>the</strong> signal is barely receivable. Already a small interference<br />

power can cause a long link to fail in all but CP-<br />

HP model. However, both CP models fail to model MAI,<br />

and thus, give typically far too optimistic view <strong>of</strong> <strong>the</strong> performance.<br />

CP-HP, which is in a way very close to <strong>the</strong><br />

models that are <strong>of</strong>ten used in ad hoc network studies, gives<br />

totally incorrect results. For example, <strong>the</strong> packet loss ratio<br />

(with BC-MAC) under real propagation models is <strong>of</strong> <strong>the</strong><br />

order <strong>of</strong> 10-3, but under CP-HP it is practically zero at low<br />

traffic load. An interesting phenomenon was also discovered<br />

with 802.11: CP-HP at low traffic load gave too optimistic<br />

results, but at high load <strong>the</strong> effect was reversed.<br />

Also FSL and FPL give quite different view <strong>of</strong> <strong>the</strong> performance,<br />

moreover, <strong>the</strong>se differences are not fixed, but<br />

ra<strong>the</strong>r <strong>the</strong> behavior is heavily dependent on network conditions<br />

(e.g., network traffic load). Hence, this study clearly<br />

addresses that careful attention should be put also to lower<br />

layer and especially in radio channel modeling even if <strong>the</strong><br />

focus would be in <strong>the</strong> higher layer performance (e.g., application<br />

layer QoS). This is definitely <strong>the</strong> case with <strong>the</strong><br />

absolute performance, but still it can be asked: can <strong>the</strong><br />

relative performances between different higher layer methods<br />

be compared using simplified lower layer models? The<br />

answer is probably dependent on <strong>the</strong> method under interest.<br />

This study, never<strong>the</strong>less, confirmed that our BC-MAC<br />

outperforms 802.11 regardless <strong>of</strong> <strong>the</strong> propagation model.<br />

ACKNOWLEDGEMENTS<br />

This work was supported by ITEA Easy Wireless project<br />

(J. Prokkola) and by <strong>the</strong> Finnish Defence Forces through<br />

7 <strong>of</strong> 7<br />

<strong>the</strong> Finnish S<strong>of</strong>tware <strong>Radio</strong> Programme<br />

(T. Braysy, T. Vanninen)<br />

REFERENCES<br />

[1] I. Stojmenovic, A. Nayak, and J. Kuruvila, "Design Guidelines<br />

for Routing Protocols in Ad Hoc and Sensor Networks<br />

with a Realistic Physical Layer", IEEE Communications<br />

Magazine 2005, vol 43, No. 3, pp. 101 - 106,.<br />

[2] L. Qin and T. Kunz, "<strong>On</strong>-demand routing in MANETs: The<br />

Impact <strong>of</strong> Realistic Physical Layer Model", In Proc. <strong>of</strong> 2nd<br />

Int'l Conf. Ad Hoc Networks & Wireless, 2003, pp. 37 - 48.<br />

[3] M. Takai, J. Martin, and R. Bagrodia, "<strong>Effect</strong>s <strong>of</strong> Wireless<br />

Physical Layer Modeling in Mobile Ad Hoc Networks", Proc.<br />

<strong>of</strong>ACM MobiHOC 2001, Long Beach, USA pp. 87 - 94.<br />

[4] J.-M. Dricot and P. De Doncker, "High-accuracy physical<br />

layer model for wireless network simulations in NS-2", Proc.<br />

<strong>of</strong> Int. Workshop in Wireless Ad-Hoc Networks 2004.<br />

[5] J.-M. Dricot, P. De Doncker, E. Zimanyi, and F. Grenez, "Impact<br />

<strong>of</strong> <strong>the</strong> physical layer on <strong>the</strong> performance <strong>of</strong> indoor wireless<br />

networks", In Proc. <strong>of</strong> <strong>the</strong> Int. Conf. on S<strong>of</strong>tware, Telecommunications<br />

and Computer Networks, Split,Croatia,2003.<br />

[6] J. Prokkola, T. Braysy, "Bi-Code <strong>Channel</strong> Access Method for<br />

Ad Hoc Networks", International Symposium on Spread<br />

Spectrum Techniques and Applications (ISSSTA 2004), Aug<br />

30- Sept 2, 2004, Sydney, Australia.<br />

[7] J. Prokkola, T. Braysy, "Bi-Code <strong>Channel</strong> Access with Robust<br />

Medium Access Control for Ad Hoc Networking," Military<br />

Communication Conference (MILCOM 2004), Oct 31. -<br />

Nov 3, 2004, Monterey, USA.<br />

[8] J. Jun, et al., "Theoretical Maximum Throughput <strong>of</strong> IEEE<br />

802.11 and its Applications," Second IEEE International<br />

Symposium on Network Computing and Applications, 2003.<br />

[9] C. Perkins, E. Belding-Royer, and S. Das, "Ad Hoc <strong>On</strong>-<br />

Demand Distance Vector (AODV) Routing," RFC 3561. Url:<br />

http://www.ietf.org/rfc/rfc3561.txt.<br />

[10] L.-A. Larson et al., "The Lightweight User Datagram Protocol<br />

(UDP-Lite), IEEE RFC3828, 2004.<br />

[11] W. Leland et al, "<strong>On</strong> <strong>the</strong> Self-Similar Nature <strong>of</strong> E<strong>the</strong>rnet<br />

Traffic (Extended Version)," IEEE/ACM Transactions on<br />

Networking, 2, no. 3. Feb. 1994, vol. pp. 1 - 15.<br />

[12] Y. Sasson, D. Cavin, A. Schiper, "Probabilistic broadcast for<br />

flooding in wireless mobile ad hoc networks," Proceedings <strong>of</strong><br />

IEEE Wireless Communications and Networking, 2003<br />

(WCNC 2003), Vol 2, 16-20, March, 2003. pp. 1124 - 1130.<br />

[13] A. Boukerche, "A simulation based study <strong>of</strong> on-demand routing<br />

protocols for ad hoc wireless networks", Proceedings <strong>of</strong><br />

Simulation Symposium, 2001, 22-26 April, 2001, Seattle,<br />

USA. pp. 85 - 92.<br />

[14] Comparetto G., Schwartz J., Schult N. and Marshall J. "A<br />

Communications Analysis Tool Set That Accounts for <strong>the</strong> Attenuation<br />

due to Foliage, Buildings, and Ground <strong>Effect</strong>s"<br />

IEEE Military Communications Conference (MILCOM<br />

2003), Oct. 2003, Boston<br />

[15] J. G. Proakis, "Digital Communications," McGraw-Hill Inc.,<br />

2001.<br />

[16] Wireless and Mobility Extensions to ns-2, URL:<br />

http:/www.monarch.cs.cmu.edu/cmu-ns.html.<br />

[17] Kaplan E.D, "Understanding GPS, Principles and Applications",<br />

Arctech House 1996.<br />

[18] K Xu, M Gerla, S Bae, "How <strong>Effect</strong>ive is <strong>the</strong> IEEE 802.11<br />

RTS/CTS Handshake in Ad Hoc Networks?," IEEE Globecom,<br />

2002.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!