Skip to main content
Erschienen in: EURASIP Journal on Wireless Communications and Networking 1/2010

Open Access 01.12.2010 | Research Article

Partial Interference and Its Performance Impact on Wireless Multiple Access Networks

verfasst von: Ka-Hung Hui, Wing Cheong Lau, Onching Yue

Erschienen in: EURASIP Journal on Wireless Communications and Networking | Ausgabe 1/2010

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstracts

To determine the capacity of wireless multiple access networks, the interference among the wireless links must be accurately modeled. In this paper, we formalize the notion of the partial interference phenomenon observed in many recent wireless measurement studies and establish analytical models with tractable solutions for various types of wireless multiple access networks. In particular, we characterize the stability region of IEEE 802.11 networks under partial interference with two potentially unsaturated links numerically. We also provide a closed-form solution for the stability region of slotted ALOHA networks under partial interference with two potentially unsaturated links and obtain a partial characterization of the boundary of the stability region for the general M-link case. Finally, we derive a closed-form approximated solution for the stability region for general M-link slotted ALOHA system under partial interference effects. Based on our results, we demonstrate that it is important to model the partial interference effects while analyzing wireless multiple access networks. This is because such considerations can result in not only significant quantitative differences in the predicted system capacity but also fundamental qualitative changes in the shape of the stability region of the systems.

1. Introduction

In a wireless network, all stations communicate with each other through wireless links. A fundamental difference between a wireless network and its wired counterpart is that wireless links may interfere with each other, resulting in performance degradation. Therefore in the study of wireless networks, one important performance measure is the capacity of the network when the effects of interlink interference are considered.
In establishing the capacity of a wireless network, we have to predict whether the wireless links interfere with each other. Two most common interference models in the wireless networking literature, namely, for example, protocol model and physical model [1], were proposed to predict whether transmissions in a wireless network are successful. In these interference models, one key assumption is that interference is a binary phenomenon, that is, either the links mutually interfere with each other to result in total loss of throughput of a target link, or there is no link throughput degradation at all. In other words, these models exclude the possibility that interfering links can be active simultaneously and still realize their capacity partially. However, recent empirical studies [26] have shown that these binary interference models are not valid in practice. Instead, measurement results have confirmed that there is a nonbinary transitional region [2, 4] (also known as the gray zone in some literature [3]) for the successful packet reception rate (PRR) of a wireless link which changes from zero, that is, 100% lossy, to almost 100%, that is, perfectly reliable, as its signal-to-interference-plus-noise ratio (SINR) increases. These studies have indicated that the range of the transitional regional (in SINR) can exceed 10dB for various types of practical networks including IEEE 802.11a wireless mesh [3, 7] and other low-power multihop sensor networks [2, 4]. More importantly, measurement studies on large-scale wireless mesh testbeds [8, 9] found that a significant number of links in those testbeds were indeed operating at the SINR transitional region, that is, with intermediate level of PRR between zero and 100%. In this paper, we call this phenomenon partial interference. From the physical layer implementation perspective, the partial interference phenomenon can be viewed as a consequence/manifestation of the probabilistic nature of signal decoding in the receiver, its interaction with the well-known capture effect [10, 11], and the specific implementation of the frame reception and capture algorithms in individual chipsets [12].
While the phenomenon of partial interference in wireless networks has been widely observed as mentioned above, its incorporation in the performance modeling of such networks is still in its infancy. Most of the efforts in this direction so far ([2, 7, 12, 13]) have been limited to the characterization of the nonbinary transitional region in the PRR-versus-SINR curve based on measurement data [7, 12, 13] or some analytical means [2, 14]. However, once the PRR-versus-SINR curve is obtained, they only resort to simulations to evaluate the effects of partial interference on the system performance.
While the phenomenon of partial interference in wireless networks has been widely observed as mentioned above, its incorporation in the performance modeling of such networks is still in its infancy. Most of the efforts in this direction so far ([2, 7, 12, 13]) have been limited to the characterization of the nonbinary transitional region in the PRR-versus-SINR curve based on measurement data [7, 12, 13] or some analytical means [2, 14]. However, once the PRR-versus-SINR curve is obtained, they only resort to simulations to evaluate the effects of partial interference on the system performance.
In this paper, our focus is to develop analytical models with tractable solutions for various types of wireless multiple access networks which can accurately capture the performance impact of partial interference. Via analytical and numerical results throughout this paper, we demonstrate that it is important to model the partial interference effects while analyzing wireless multiple access networks. This is because such considerations can result in not only significant quantitative differences in the predicted system capacity but also fundamental qualitative changes in the shape of the stability region of the systems (e.g., from a concave to a convex region).
To quantify the impact of interference on multiple access networks, we propose an analytical framework to characterize partial interference for two representative types of multiple access wireless networks, namely, the IEEE 802.11 Wireless LANs and the classical slotted ALOHA networks. For IEEE 802.11 Wireless LANs, we extend the single-channel Markov model in [15] to take into account the unsaturated traffic conditions, the SINR attained at the receivers, and the modulation scheme employed. These modifications result in a partial interference region, which cannot be captured by the binary interference models used in previous works. We also find out the stability (admissible) region of IEEE 802.11 networks with two interfering, potentially unsaturated links numerically. For slotted ALOHA networks, we extend the model in [16] to derive the exact stability region of slotted ALOHA with two links while considering partial interference. We show that as the link separation increases, the stability region obtained expands gradually under partial interference, as in the case of 802.11.
Despite the simplicity of slotted ALOHA, characterizing its exact stability region with unsaturated links is extremely difficult and has remained to be a key open problem for decades when there are more than two, potentially unsaturated links in the system [1623]. However, by extending the FRASA (Feedback Retransmission Approximation for Slotted ALOHA) approach [24] to model the partial interference effects, we obtain a closed-form approximation for the exact stability region for any number of links.
In summary, this paper has made the following contributions.
(1)
After reviewing related work in Section 2, we formalize the notion of partial interference in Section 3 and then demonstrate its significant performance impact on different types of wireless networks via various examples and their analytical/numerical results throughout the rest of the paper. As an illustration, we show in Section 4 that, by considering partial interference effects while scheduling traffic in a wireless network of regular topology, the gain in network capacity across unit cut can be as high as 67%.
 
(2)
In Section 5, we establish a model to analyze the effects of partial interference on the throughput of IEEE 802.11 networks with unsaturated links. Our approach enables one to compute numerically the stability region of any 2-link 802.11 system under unsaturated traffic conditions.
 
(3)
In Section 6, we investigate the effects of partial interference on the capacity of a slotted ALOHA system with unsaturated links by (i) establishing the exact stability region in closed-form for the 2-link case and (ii) providing a closed-form, partial characterization of the stability region of the general M-link case.
 
(4)
In Section 7, we extend the FRASA approach in [24] to yield a closed-form approximation for the stability region of the general M-link slotted ALOHA system while considering partial interference effects. The capacity region derived by our approximation and the corresponding simulation results are provided for some sample cases. Again, this is to demonstrate the potential qualitative and quantitative differences in the system capacity region when the effect of partial interference is taken into account. We then conclude the paper in Section 8.
 
In [1], two interference models, called the protocol model and the physical model, were introduced. The protocol model states that a transmission is successful if the corresponding receiver is located inside the transmission range of the transmitter, and all other active transmitters are located outside the interference range of the receiver. In the physical model, the transmissions from other transmitters are considered as noise, and a transmission is successful if the SINR attained at the receiver exceeds a certain threshold. Based on these models, the capacities of a multihop wireless network under random and optimal node placement were derived.
In [5], the authors measured the interference among links in a single-channel, static 802.11 multihop wireless network. They measured the interference between pairs of links by the link interference ratio and observed that this ratio exhibited a continuum between 0 and 1. In [6], two interfering links were set up in a wireless network with multiple partially overlapped channels to measure TCP and UDP throughputs of an individual link. It was found that the throughputs increased smoothly when the separation between the links increased. The throughputs increased more rapidly as the channel separation between the links increased. Such nonbinary transitional region in the link throughput (or PRR equivalently) as the receiver SINR varies has also been observed by numerous measurement studies including [24]. These experimental results all confirmed that the binary assumption in the protocol or physical interference models are not valid in practice.
There has been some analytical work on finding the relationship between the SINR attained at a receiver and the throughput (or PRR equivalently) achieved by the corresponding wireless link. In [14], a methodology for estimating the packet error rate in the affected wireless network due to the interference from the interfering wireless network was presented. The throughput of the affected wireless network was found to increase continuously with the SINR attained at the corresponding receiver, which increased with the separation between the networks. Similarly, [2] derived expressions for the PRR as a function of distance, radio channel parameters, and the modulation/encoding scheme used by the radio. However, they did not provide analytical model on how the PRR function would impact the performance of the corresponding networks.
In [25], the throughput achieved by an M-link IEEE 802.11 network under physical layer capture was derived. While their analysis can be viewed as another case study of the effects of the partial interference over 802.11 networks, their approach only works for the case where all of the links are always saturated, that is, with infinite backlog at the transmitter side. In contrast, the approach proposed in Section 5 of this paper can handle unsaturated links and has provided explicit numerical solutions for the stability region of the 2-link case.
The study of the stability region of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq1_HTML.gif -user infinite-buffer slotted ALOHA was initiated by the study in [17] decades before and is still an ongoing research. The authors in [17] obtained the exact stability region when https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq2_HTML.gif under the collision channel (i.e., binary interference) model. References [18, 19] used stochastic dominance and derived the same result as in [17] for the case of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq3_HTML.gif .
For general https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq4_HTML.gif , there were attempts to find the exact stability region, but there was only limited success. Reference [21] established the boundary of the stability region, but it involves stationary joint queue statistics, which still do not have closed form to date. Instead, many researchers focused on finding bounds on the stability region for general https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq5_HTML.gif . Reference [17] obtained separate sufficient and necessary conditions for stability. References [18, 19] derived tighter bounds on the stability region by using stochastic dominance in different ways. Reference [22] introduced instability rank and used it to improve the bounds on the stability region. However, the bounds in [18, 22] are not always applicable. Also, the bounds obtained may not be piecewise linear.
With the advances in multiuser detection, researchers also studied this problem with the multipacket reception (MPR) model. Reference [23] studied this problem in the infinite-user, single-buffer, and symmetric MPR case. Reference [16] considered the problem with finite users and infinite buffer. They obtained the boundary for the asymmetric MPR case with two users, and also the inner bound on the stability region for general https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq6_HTML.gif .

3. Partial Interference—Basic Idea

As an illustration to the methodology in [14], assume the underlying modulation scheme used is binary phase shift keying (BPSK). The distance between the transmitter and the receiver and that between the interferer and the receiver are https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq7_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq8_HTML.gif meters, respectively. The transmission power of the transmitter and the interferer are https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq9_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq10_HTML.gif watts, respectively.
Assuming that the interfering signal can be modeled as additive white Gaussian noise (AWGN) and the background noise can be ignored, we use the two-ray ground reflection model
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_Equ1_HTML.gif
(1)
to represent the path loss, where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq11_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq12_HTML.gif are the gain of transmitter and receiver antenna, respectively, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq13_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq14_HTML.gif are the height of transmitter and receiver antenna, respectively, and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq15_HTML.gif . The path loss exponent is 4 in this model. We let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq16_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq17_HTML.gif . Then, according to [26], the bit error rate (BER) is given by
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_Equ2_HTML.gif
(2)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq18_HTML.gif is the SINR attained at the receiver and is given by
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_Equ3_HTML.gif
(3)
Define the packet-level normalized throughput https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq19_HTML.gif to be the ratio of the successful packet reception rate at the receiver when https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq20_HTML.gif to the maximum packet reception rate of the link when https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq21_HTML.gif . As such, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq22_HTML.gif is actually the probability of a packet to be received without error when the SINR is https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq23_HTML.gif . Suppose that all packets consist of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq24_HTML.gif bits and bit errors are identically, independently distributed within each packet. We have
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_Equ4_HTML.gif
(4)
In general, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq25_HTML.gif depends on the BER, which, in turn, is a function of the SINR at the receiver as well as the specific modulation scheme being used. While we use BPSK as an example here, the actual expression for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq26_HTML.gif under other modulation schemes can be readily derived as shown in [2, Table https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq27_HTML.gif ].
Figure 1 shows a plot of such packet-level normalized throughput https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq28_HTML.gif against distance between the interferer and the receiver for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq29_HTML.gif dBm, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq30_HTML.gif meters, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq31_HTML.gif ranging from 400 to 700 meters, and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq32_HTML.gif  bits (= 1500 bytes). Observe from the figure the nonbinary transitional region of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq33_HTML.gif as the separation between the interferer and the receiver increases. Such "partial interference" region is also consistent with the findings of many empirical studies discussed in Section 1.
In Figure 1, we also plot the variation of throughput against distance between the interferer and the receiver if the physical model is used. The SINR threshold https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq34_HTML.gif for the binary-interference model is set by assuming that when https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq35_HTML.gif , the packet error rate is https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq36_HTML.gif , that is,
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_Equ5_HTML.gif
(5)
We observe that if the value we assign to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq37_HTML.gif is too large (or the threshold distance is too large), we underestimate the throughput that the links can achieve. On the other hand, if https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq38_HTML.gif is too small (or the threshold distance is too small), we introduce excessive interference into the network. In other words, it is difficult to use a single threshold to describe accurately the relationship between interference and throughput of each link in a network.

4. Capacity Gain When Partial Interference Is Considered

In this section, we demonstrate that there is a gain in system capacity when the effect of partial interference is considered. We consider one variation of the Manhattan network [27], that is, a network consisting of a rectangular grid extending to infinity in both dimensions. The horizontal and vertical separations between neighboring stations are denoted by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq39_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq40_HTML.gif , respectively.
Under infinite transmitter backlog, the packet-level capacity of each link, that is, the maximum packet reception rate without interference, is denoted by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq41_HTML.gif . We assume that differential binary phase shift keying (DBPSK) is employed and a packet consists of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq42_HTML.gif bits. We use the two-ray ground reflection model (1) as in previous section to model the path loss. To apply the physical model, we let the SINR threshold https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq43_HTML.gif be the case that the packet error rate is https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq44_HTML.gif , that is, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq45_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq46_HTML.gif is the bit error rate of DBPSK [26]. We let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq47_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq48_HTML.gif , therefore the SINR requirement is https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq49_HTML.gif . Assuming that there is no interferer, this SINR requirement is met when the length of a link is smaller than 493 meters.
We use a Cartesian coordinate plane to represent the modified Manhattan network. One station is placed at every point with integral coordinates in the network. Suppose that we schedule flows in the modified Manhattan network from the South to the North using the pattern shown in Figure 2 and its shifted versions. In Figure 2, an arrow is used to represent an active link, where the tail and the head of an arrow denote the transmitter and the receiver of the link, respectively.
We use the capacity across unit cut https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq50_HTML.gif as the performance metric, where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq51_HTML.gif is the ratio of the horizontal separation to the vertical separation. It is a measure on how much traffic we can send through a cut in a network on average while physically packing the links towards each other. Consider the SINR attained at the receiver marked with the blue circle, which has the position assigned as the origin in the Cartesian coordinate plane. We assume that all stations transmit with power https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq52_HTML.gif , and each station has a background noise power of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq53_HTML.gif . The SINR is defined by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq54_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq55_HTML.gif is the received power from the intended transmitter and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq56_HTML.gif is the power received from all interferers. The packet-level capacity achieved by each link, that is, the successful packet reception rate at the receiver, is https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq57_HTML.gif under our partial interference model. On the other hand, under the physical interference model, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq58_HTML.gif if https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq59_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq60_HTML.gif otherwise. A cut https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq61_HTML.gif in the network is an infinitely long horizontal line. Let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq62_HTML.gif be the set of all active transmitters such that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq63_HTML.gif intersects the link used by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq64_HTML.gif . We divide https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq65_HTML.gif into segments https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq66_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq67_HTML.gif , where
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_Equ6_HTML.gif
(6)
and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq68_HTML.gif is the Euclidean norm. Then the length https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq69_HTML.gif of the cut occupied by an active transmitter is the length of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq70_HTML.gif , and the capacity across unit cut is therefore https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq71_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq72_HTML.gif is the fraction of time that a link is active.
In the following we assume that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq73_HTML.gif meters, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq74_HTML.gif  dBm, and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq75_HTML.gif  dBm. For the schedule in Figure 2, the signal power is https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq76_HTML.gif . All transmitters in Figure 2 are located at positions https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq77_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq78_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq79_HTML.gif are integers. The interference power is
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_Equ7_HTML.gif
(7)
Considering the physical model, if the schedule is allowed to be active, we need https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq80_HTML.gif , as listed in Table 1 and depicted in Figure 3 by the blue dashed line. The value of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq81_HTML.gif is obtained from https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq82_HTML.gif . Each active transmitter occupies a cut of length https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq83_HTML.gif , and each link is active for one quarter of a cycle. Therefore, for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq84_HTML.gif , the maximum capacity across unit cut under the physical model is https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq85_HTML.gif bits per second per kilometer.
Table 1
Capacity gain in the modified Manhattan network with different lengths of links.
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq86_HTML.gif
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq87_HTML.gif
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq88_HTML.gif
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq89_HTML.gif
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq90_HTML.gif
% increase
350
3.02
0.2365 https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq91_HTML.gif
2.55
0.2671 https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq92_HTML.gif
12.93%
400
3.48
0.1796 https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq93_HTML.gif
2.73
0.2163 https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq94_HTML.gif
20.45%
450
5.58
0.0996 https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq95_HTML.gif
3.06
0.1661 https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq96_HTML.gif
66.82%
If we allow partial interference, the active transmitters can be packed more closely. When https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq97_HTML.gif decreases, more spatial reuse is allowed. The increase in the density of active transmitters outweighs the degradation in capacity, so there is an increase in the capacity across unit cut. However, if https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq98_HTML.gif decreases further, interference will be the dominant factor in determining the capacity across unit cut. Therefore, the capacity across unit cut drops, and there exists https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq99_HTML.gif for the optimal performance under partial interference. This behavior is depicted by the blue solid line in Figure 3. The optimal value of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq100_HTML.gif under partial interference is https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq101_HTML.gif , and the capacity across unit cut is https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq102_HTML.gif bits per second per kilometer. There is a percentage increase of 66.82% in the capacity across unit cut when the effect of partial interference is considered. Similar results are shown in Table 1 and Figure 3 for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq103_HTML.gif meters. The percentage increase is larger when the links are longer, but the capacity achieved by each link reduces. We can view https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq104_HTML.gif as the carrier sensing range in the modified Manhattan network with the scheduling pattern in Figure 2, as it is the smallest horizontal separation allowed by the physical model. We observe that if the length of the links increases, the carrier sensing range needs to be increased in a larger proportion. Also, this carrier sensing range is much larger than double of the length of the links, which is the usual convention used in defining the relationship between carrier sensing range and transmission range.

5. Partial Interference in 802.11

In this section, we study partial interference in 802.11 networks, the prevalent wireless random access networks. We present an analytical framework to characterize partial interference in a single-channel wireless network under unsaturated traffic conditions, which uses 802.11b with basic access scheme and DBPSK. We show that there is a partial interference region, in which the throughput of each link increases continuously with the separation between the links in the network. As a first attempt to relate the capacity-finding problem in wireless random access networks to the stability region of such networks, we derive the admissible (stability) region of an 802.11 network with two potentially unsaturated links numerically.

5.1. The 802.11 Model

We present our framework to characterize partial interference in a wireless network with random access protocols. In this framework, we derive the transmission probabilities https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq105_HTML.gif and the packet corruption probabilities https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq106_HTML.gif of the links in the network. https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq107_HTML.gif is the probability that a station transmits in a randomly chosen slot, while https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq108_HTML.gif is the probability that a packet is received with error.
For illustration, we choose the MAC and PHY protocols to be 802.11b with basic access scheme and 1Mbps DBPSK. Our model can be readily extended to consider other modulation schemes. In addition, we make the following assumptions.
(i)
The network consists of two links https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq109_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq110_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq111_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq112_HTML.gif denote the transmitter and the receiver of the links, respectively, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq113_HTML.gif .
 
(ii)
There are a constant buffer nonempty probability https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq114_HTML.gif that the transmission buffer of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq115_HTML.gif is nonempty and a constant channel idle probability https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq116_HTML.gif that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq117_HTML.gif senses the channel to be idle, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq118_HTML.gif .
 
(iii)
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq119_HTML.gif transmits with power https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq120_HTML.gif , and the background noise power at https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq121_HTML.gif is https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq122_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq123_HTML.gif .
 
(iv)
Channel defects like shadowing and fading are neglected, and a generic path loss model https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq124_HTML.gif is used to model the wireless channel, where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq125_HTML.gif is the propagation distance, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq126_HTML.gif is the path loss exponent, and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq127_HTML.gif is a constant.
 
(v)
The interference from other transmitters plus the receiver background noise is assumed to be Gaussian distributed.
 
(vi)
All bits in a packet must be received correctly for correct reception of the packet.
 
(vii)
The size of an acknowledgement is much smaller than that of the payload, so the bit errors on acknowledgement are negligible.
 
We follow the approach as in [15], using a discrete-time Markov chain to model the 802.11 Distributed Coordination Function (DCF) and obtain the transmission probability of a station. An ordered pair https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq128_HTML.gif is used to denote the state of the Markov chain, where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq129_HTML.gif represents the backoff stage and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq130_HTML.gif is the current backoff counter value. In stage https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq131_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq132_HTML.gif is in the range https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq133_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq134_HTML.gif is the contention window size in stage https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq135_HTML.gif . https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq136_HTML.gif is the maximum number of backoff stages. However, there are some discrepancies between the model in [15] and the actual behavior of 802.11 DCF. First, the model assumes that a station retransmits indefinitely until the packet is successfully transmitted. This assumption is inconsistent with 802.11 basic access scheme. Also, the model does not account for the unsaturated traffic conditions, which is the scenario appeared in practical situations.
To overcome these limitations, we adopt and modify the Markov chain proposed by [15] to obtain an enhanced model. First, we take into account the limited number of retransmissions in 802.11 as in [28], by restricting the Markov chain to leave the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq137_HTML.gif th backoff stage once the station transmits a packet in that backoff stage. Second, we follow [28] to modify the values of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq138_HTML.gif in accordance with the 802.11 MAC and PHY specifications [29], with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq139_HTML.gif corresponding to the first backoff stage using the maximum contention window size
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_Equ8_HTML.gif
(8)
In addition, to handle the unsaturated traffic conditions, we follow [30] to augment the Markov chain by introducing new states https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq140_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq141_HTML.gif . These new states represent the states of being in the post-backoff stage. The post-backoff stage is entered whenever the station has no packets queued in its transmission buffer after a successful transmission. The corresponding Markov chain is depicted in Figure 4.
Let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq142_HTML.gif denote the stationary probability of the state https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq143_HTML.gif in the Markov chain. The transmission probability of a station is given by
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_Equ9_HTML.gif
(9)
The details of the Markov chain and the derivation of this equation can be found in [31].
The packet corruption probability is calculated according to the modulation scheme used in the PHY layer, the distance between the transmitter and the receiver, and the existence of nearby interferer(s). For a fixed carrier sensing threshold https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq144_HTML.gif , we differentiate into two cases, whether both transmitters can sense the transmission of each other or not.
If https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq145_HTML.gif can sense the transmission of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq146_HTML.gif , that is, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq147_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq148_HTML.gif is the distance between https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq149_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq150_HTML.gif , then the SINR at https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq151_HTML.gif is
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_Equ10_HTML.gif
(10)
The bit error rate attained by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq152_HTML.gif is https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq153_HTML.gif , and the packet corruption probability for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq154_HTML.gif is
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_Equ11_HTML.gif
(11)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq155_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq156_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq157_HTML.gif represent the number of bits in the PHY header, the MAC header, and the payload, respectively.
On the other hand, if https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq158_HTML.gif cannot sense the transmission of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq159_HTML.gif , that is, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq160_HTML.gif , then the SINR at https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq161_HTML.gif depends on whether https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq162_HTML.gif is active in transmission or not, that is,
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_Equ12_HTML.gif
(12)
The packet corruption probability is calculated by the average bit error rate https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq163_HTML.gif
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_Equ13_HTML.gif
(13)
The channel idle probability is defined as follows. If https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq164_HTML.gif can sense the transmission of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq165_HTML.gif , then https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq166_HTML.gif will consider the channel to be idle whenever https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq167_HTML.gif is inactive, that is, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq168_HTML.gif ; otherwise https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq169_HTML.gif always senses the channel to be idle and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq170_HTML.gif .
Suppose that we want to schedule a flow of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq171_HTML.gif bits per second on https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq172_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq173_HTML.gif bits per second is achieved by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq174_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq175_HTML.gif . We refer https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq176_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq177_HTML.gif to the offered load and the carried load, respectively. We calculate https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq178_HTML.gif by
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_Equ14_HTML.gif
(14)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq179_HTML.gif is the expected length of a slot as seen by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq180_HTML.gif . Let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq181_HTML.gif be the probability that at least one station is transmitting, and let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq182_HTML.gif be the probability that there is at least one successful transmission given that at least one station is transmitting. Then https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq183_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq184_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq185_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq186_HTML.gif are the time spent in an idle slot, a successful transmission, and an unsuccessful transmission, respectively. When https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq187_HTML.gif can sense the transmission of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq188_HTML.gif , we consider both links to be one system:
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_Equ15_HTML.gif
(15)
Otherwise, we treat both links to be separate systems:
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_Equ16_HTML.gif
(16)
We approximate the packet arrival of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq189_HTML.gif to be a Poisson process with rate https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq190_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq191_HTML.gif , and estimate the buffer nonempty probability by
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_Equ17_HTML.gif
(17)
In summary, if https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq192_HTML.gif can sense the transmission of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq193_HTML.gif , then we obtain the following set of equations for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq194_HTML.gif :
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_Equ18_HTML.gif
(18)
Otherwise, we obtain another set of equations for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq195_HTML.gif
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_Equ19_HTML.gif
(19)
Similarly, we can obtain three equations for link https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq196_HTML.gif . With these six equations we can solve for the variables https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq197_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq198_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq199_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq200_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq201_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq202_HTML.gif by Newton's method [32] and obtain the loadings of these two links by (14).

5.2. Some Analytical Results

We use the two-ray ground reflection model
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_Equ20_HTML.gif
(20)
to represent the path loss and the values in Table 2 to obtain numerical results from our model. These values are defined in or derived from the values in the 802.11 MAC and PHY specifications [29] or NS-2 [33].
Table 2
Parameters used for the analytical results.
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq203_HTML.gif
192 bits
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq204_HTML.gif
272 bits
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq205_HTML.gif
7
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq206_HTML.gif
5
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq207_HTML.gif
9020  https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq208_HTML.gif s
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq209_HTML.gif
9020  https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq210_HTML.gif s
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq211_HTML.gif
20  https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq212_HTML.gif s
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq213_HTML.gif
32
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq214_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq215_HTML.gif
24.5 dBm
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq216_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq217_HTML.gif
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq218_HTML.gif 88 dBm
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq219_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq220_HTML.gif
1
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq221_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq222_HTML.gif
1.5 m
In the following we attempt to find the maximum carried loads of each link in various scenarios. One observation from solving the system of equations in Section 5.1 is that the carried load will be smaller than the offered load when the offered load is too large. This corresponds to the instability of 802.11 observed in previous works (e.g., [15]). Therefore, we use binary search to find the maximum carried load under stable conditions. Initially, the search range for the offered load is between 0 and 1 Mbps. We choose the midpoint of the search range to be the offered load and solve the system of equations. If the resultant carried load is the same as the offered load, the offered load can be increased, and the next search range will be the upper half of the original one. Otherwise, the offered load results in instability, and the next search range will be the lower half of the original one. This procedure is repeated until the search range is sufficiently small.
We consider a network of two parallel links as shown in Figure 5, with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq223_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq224_HTML.gif representing the length of the links and the link separation, respectively. The link separation is defined as the perpendicular distance between the links. We let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq225_HTML.gif  bits, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq226_HTML.gif meters, and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq227_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq228_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq229_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq230_HTML.gif  dBm to solve for the maximum carried loads and obtain the curves as shown in Figures 6(a)6(d).
Consider the curve corresponding to the carrier sensing threshold of −78 dBm in Figure 6(c), which is a common value used in NS-2 simulation and the practical value used in Orinoco wireless LAN card. The corresponding carrier sensing range is 550 meters, which is in line with the carrier sensing range used in practice. In our model, we assume that carrier sensing works when the separation is within the carrier sensing range and fails otherwise and use two different sets of equations to model the system in these situations. Therefore there is an abrupt change in the aggregate throughput when the separation equals the carrier sensing range. If there is no carrier sensing in the system, the aggregate throughput will reduce to zero smoothly when the link separation reduces.
The curve in Figure 6(c) can be divided into three parts according to the link separation https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq233_HTML.gif . When https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq234_HTML.gif meters, both transmitters are in the carrier sensing range of each other. As a result, at most only one transmitter is active at a time. If https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq235_HTML.gif meters, the transmitters are unaware of the existence of each other, and they contend for the wireless channel as if there were no interferers nearby. When https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq236_HTML.gif meters, the separation is so large that there will not be any interference between the links. When https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq237_HTML.gif lies between 550 and 800 meters, the aggregate throughput of the links increases smoothly as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq238_HTML.gif increases. We label this range of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq239_HTML.gif as the partial interference region. The existence of this partial interference region suggests that the interference models proposed by [1] that a single threshold can represent the interference relationship in wireless networks may be overly simplified.
The width of this partial interference region depends on the carrier sensing threshold https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq240_HTML.gif used. Smaller https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq241_HTML.gif , for example, −80 dBm, results in a narrower partial interference region as in Figure 6(d). Simultaneous transmissions are allowed only for the links separated far enough, and the throughput is suppressed significantly. For larger https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq242_HTML.gif , for example, −75 and −70 dBm, more spatial reuse is allowed, and the width of the partial interference region is larger, as shown in Figures 6(a)-6(b). However, excessive interference is introduced for larger https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq243_HTML.gif , so there is a reduction in the aggregate throughput.
Besides carrier sensing threshold, the length of the links https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq244_HTML.gif also affects the partial interference region. We reduce https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq245_HTML.gif to be 400 meters and obtain the results in Figures 7(a)7(d). As shown in Figures 7(a)7(d), the partial interference region becomes narrower for all values of carrier sensing threshold. Also, the aggregate throughput achieved by the links is larger for the same link separation when the links are shortened.

5.3. Admissible (Stability) Region

As an attempt to obtain the capacity of 802.11 networks under partial interference, we compute the admissible (stability) region predicted from our model. The admissible region includes all flow vectors https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq250_HTML.gif such that if https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq251_HTML.gif is located inside the admissible region, then a flow of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq252_HTML.gif can be allocated on and achieved by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq253_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq254_HTML.gif . We use the same settings as above and choose the carrier sensing threshold to be −78 dBm. The link separations are chosen to be 500, 600, and 900 meters for illustrative purposes, because they correspond to different shapes of the admissible region. Figure 8 shows the admissible region for these three link separations. The link separation of 500 meters represents that the links are in mutual interference and the admissible region has a triangular shape. When the links are separated by 900 meters, the links do not interfere with each other, and the admissible region is rectangular. For the link separation of 600 meters, partial interference exists and the admissible region becomes convex.
Although we are able to compute the admissible region for a two-link 802.11 network numerically, the closed-form expression for the admissible region is unknown. Also, for an 802.11 network with two links, we have to solve a system of six nonlinear equations to compute the admissible region. When the number of links in the network grows, the number of equations involved will increase, and the system of equations will be more difficult to solve. Therefore the computation of the admissible region of general 802.11 networks seems to be forbiddingly intractable.

6. Partial Interference in Slotted ALOHA

In order to obtain insights in the stability region of general 802.11 networks, in this section, we study the stability of slotted ALOHA, which is a simpler random access protocol, under the assumptions of finite links and infinite buffer.
Let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq255_HTML.gif be the set of links in the slotted ALOHA system. Time is slotted. The following assumptions apply to all links https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq256_HTML.gif . Let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq257_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq258_HTML.gif be the transmitter and the receiver of link https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq259_HTML.gif , respectively. https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq260_HTML.gif has an infinite buffer. The packet arrival process at https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq261_HTML.gif is Bernoulli with mean https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq262_HTML.gif and is independent of the arrivals at other transmitters. https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq263_HTML.gif attempts a virtual transmission with probability https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq264_HTML.gif , that is, if its buffer is nonempty, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq265_HTML.gif attempts an actual transmission with probability https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq266_HTML.gif ; otherwise, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq267_HTML.gif always remains silent. Also define https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq268_HTML.gif .
In the system, each time slot is just enough for transmission of one packet. Packets are assumed to have equal lengths. We assume that transmission results are independent in each slot. For https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq269_HTML.gif , let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq270_HTML.gif be the probability that the transmission on link https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq271_HTML.gif is successful when https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq272_HTML.gif is the set of active transmitters. https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq273_HTML.gif depends on the SINR at the receiver and the modulation scheme used. We also assume that the transmitters know immediately the transmission results, so that the transmitters remove successfully transmitted packets and retain only those unsuccessful ones.
We let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq274_HTML.gif be the queue length in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq275_HTML.gif at the beginning of slot https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq276_HTML.gif and use an https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq277_HTML.gif -dimensional Markov chain https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq278_HTML.gif to represent the queue lengths in all transmitters. We denote by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq279_HTML.gif the number of packets arrived at https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq280_HTML.gif in slot https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq281_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq282_HTML.gif the number of packets successfully transmitted in slot https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq283_HTML.gif by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq284_HTML.gif when https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq285_HTML.gif . Then https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq286_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq287_HTML.gif is used to account for the case that there is no packet transmitted when https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq288_HTML.gif . We use the definition of stability in [16, 21, 22].
Definition 1.
An https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq289_HTML.gif - dimensional stochastic process https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq290_HTML.gif is stable if for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq291_HTML.gif the following holds:
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_Equ21_HTML.gif
(21)
If the following weaker condition holds instead,
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_Equ22_HTML.gif
(22)
then the process is substable. The process is unstable if it is neither stable nor substable.
The stability problem of slotted ALOHA we consider here is to determine whether the slotted ALOHA system with the set of links https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq292_HTML.gif is stable given the parameters https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq293_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq294_HTML.gif . We use the result from [34]. On the assumption that the arrival and the service processes of a queue are stationary, the queue is stable if the average arrival rate is less than the average service rate, and the queue is unstable if the average arrival rate is larger than the average service rate. We also define the slotted ALOHA system to be stable when all queues in the system are stable.

6.2. Stability Region of 2-Link Slotted ALOHA under Partial Interference

We extend the model in [16] to capture the impact of partial interference on the capacity of a 2-link slotted ALOHA system with potentially unsaturated offered load. For https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq295_HTML.gif , let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq296_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq297_HTML.gif be the transmission power used by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq298_HTML.gif and the background noise power at https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq299_HTML.gif , respectively. Assume that the signal propagation follows the path loss model https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq300_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq301_HTML.gif is the propagation distance, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq302_HTML.gif is the path loss exponent, and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq303_HTML.gif is a constant. We let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq304_HTML.gif be the SINR attained at https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq305_HTML.gif when https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq306_HTML.gif is the set of active transmitters. Assume that a packet consists of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq307_HTML.gif bits. Let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq308_HTML.gif be the bit error rate when the SINR is https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq309_HTML.gif . In particular, if DBPSK is used in the physical layer, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq310_HTML.gif . Under binary interference, we let the SINR threshold https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq311_HTML.gif be the case that the packet error rate is https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq312_HTML.gif , that is, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq313_HTML.gif . Consider https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq314_HTML.gif . When only https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq315_HTML.gif is active, the SINR attained at https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq316_HTML.gif is https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq317_HTML.gif , and
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_Equ23_HTML.gif
(23)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq318_HTML.gif is the distance between https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq319_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq320_HTML.gif . When both https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq321_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq322_HTML.gif are active, then https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq323_HTML.gif is the SINR attained at https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq324_HTML.gif , and
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_Equ24_HTML.gif
(24)
If we consider partial interference instead, we can calculate https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq325_HTML.gif as follows. When only https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq326_HTML.gif is active,
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_Equ25_HTML.gif
(25)
When both https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq327_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq328_HTML.gif are active,
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_Equ26_HTML.gif
(26)
Similarly, we can derive expressions for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq329_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq330_HTML.gif under binary and partial interference.
To evaluate the boundary of the stability region for the 2-link slotted ALOHA system, we use stochastic dominance as introduced in [18]. We use https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq331_HTML.gif to represent a dominant system of the original system https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq332_HTML.gif , with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq333_HTML.gif being the persistent set. The transmitters of the links in this set transmit dummy packets when they decide to transmit but do not have packets queued in their buffer. The remaining transmitters behave identically as those in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq334_HTML.gif . We first consider the dominant system https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq335_HTML.gif . In this dominant system, the successful transmission probability of link 2 is https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq336_HTML.gif . For link 1, the queue in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq337_HTML.gif is empty with probability https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq338_HTML.gif ; in this case the successful transmission probability is https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq339_HTML.gif ; otherwise, the successful transmission probability is https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq340_HTML.gif . Hence, the average successful transmission probability of link 1 is
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_Equ27_HTML.gif
(27)
With the following notations,
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_Equ28_HTML.gif
(28)
the stability region of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq341_HTML.gif is
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_Equ29_HTML.gif
(29)
and by symmetry, the stability region of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq342_HTML.gif is
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_Equ30_HTML.gif
(30)
The union of these two regions constitutes the inner bound on the stability region of the original system https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq343_HTML.gif .
The reason for the union of these two regions to be the outer bound on the stability region follows from the indistinguishability argument [16, 18]. Consider the dominant system https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq344_HTML.gif . With a particular initial condition on the length of the queues, if the queue in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq345_HTML.gif is unstable, it is equivalent to the case that the queue in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq346_HTML.gif never empties with nonzero probability. Then https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq347_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq348_HTML.gif will be indistinguishable, in the sense that the packets transmitted from https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq349_HTML.gif in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq350_HTML.gif are always real packets and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq351_HTML.gif is also unstable. Therefore, the union of the regions defined by (29) and (30) is the exact stability region for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq352_HTML.gif .

6.3. Some Illustrations

In this section, we depict the stability region derived in previous section by considering the parallel-link topology in Figure 5. We use the two-ray ground reflection model
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_Equ31_HTML.gif
(31)
to represent the path loss. The values of various parameters are shown in Table 3.
Table 3
Parameters used for the analytical results.
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq353_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq354_HTML.gif
24.5 dBm
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq355_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq356_HTML.gif
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq357_HTML.gif 88 dBm
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq358_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq359_HTML.gif
1
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq360_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq361_HTML.gif
1.5 m
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq362_HTML.gif
0.001
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq363_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq364_HTML.gif
450 m
We first assume that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq365_HTML.gif  bits, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq366_HTML.gif and vary the link separation, that is, the perpendicular distance between the links, to obtain the results under binary interference in Figure 9(a). The stability region has only two possible shapes. For the separations of 600, 800, and 1000 meters, the SINR attained at either receiver when both transmitters are active is smaller than the threshold. Therefore the underlying channel follows the collision channel model, and the stability region is nonconvex. When the separation is 1200 meters, the links are separated far enough so that transmissions on both links are independent. The channel can be regarded as the orthogonal channel, and the stability region is convex. Therefore, the threshold in binary interference determines when to switch between the collision channel and the orthogonal channel.
Figure 9(b) shows the corresponding results under partial interference. When the link separation is small, the amount of interference is so large that partial interference degenerates to the collision channel. As the link separation increases, the stability region expands gradually and changes from nonconvex to convex. At another extreme, when the links are sufficiently far apart, partial interference is identical to the orthogonal channel. Therefore, partial interference can be viewed as a generalization of binary interference that it interpolates the transition from the collision channel to the orthogonal channel. Notice that the results here are similar to the case in 802.11, therefore our results should be applicable to networks with practical random access protocols like 802.11.
Next, we assume that the links are separated by 800 meters. We let both links transmit with probability https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq368_HTML.gif and illustrate the effect of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq369_HTML.gif on the convexity of the stability region under binary interference in Figure 10(a). When https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq370_HTML.gif is small, that is, 0.2 and 0.4, the links are too conservative in attempting transmissions. It leads to better channel utilization by adding one more link to the system, and the stability region is convex. On the other hand, when https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq371_HTML.gif is large, that is, 0.6 and 0.8, the links are too aggressive. When one more link is added to the system, it increases contention and hence reduces the loading supported by each link drastically. As a result, the stability region is nonconvex. The convexity of the stability region can therefore be regarded as a measure of the contention level in a network.
Figure 10(b) illustrates the stability region when partial interference is considered instead, under the same settings. Although the SINR attained at a receiver when both transmitters are active is smaller than the threshold, the SINR is large enough to support a sustainable throughput probabilistically. Therefore, it is possible to receive more packets opportunistically under partial interference, thereby increasing the loading supported by each link and allowing the stability region to be convex. If we compare the stability region under binary and partial interference in identical settings, as shown in Figures 11(a)11(d), the stability region under partial interference is always larger than that under binary interference. This implies that by considering partial interference, more combinations of flows on the links can be admitted, and the capacity of a wireless network can be potentially increased.

6.4. Partial Characterization of the Stability Region for the M-Link Case

In this section, we give in closed form a partial characterization on the boundary of the stability region of M-link slotted ALOHA under partial interference. First, for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq378_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq379_HTML.gif . Therefore, under binary interference,
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_Equ32_HTML.gif
(32)
while under partial interference,
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_Equ33_HTML.gif
(33)
For each https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq380_HTML.gif , let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq381_HTML.gif be an https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq382_HTML.gif -dimensional 0-1 vector such that
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_Equ34_HTML.gif
(34)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq383_HTML.gif is a set of persistent links and all other links are empty. Define https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq384_HTML.gif , where
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_Equ35_HTML.gif
(35)
to be a corner point corresponding to the case that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq385_HTML.gif is the set of persistent links. Notice that RHS of (35) is zero when https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq386_HTML.gif . Then we obtain the following theorem.
Theorem 2.
All corner points lie on the boundary of the stability region.
Proof.
Refer to Appendix A.
By using stochastic dominance and the indistinguishability argument, we obtain the following theorem.
Theorem 3.
Let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq387_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq388_HTML.gif be two corner points such that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq389_HTML.gif . Then the line segment joining these two points lies on the boundary of the stability region. This line segment represents the case that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq390_HTML.gif is the set of persistent links while https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq391_HTML.gif is the only nonempty nonpersistent link in the system.
Proof.
Refer to Appendix B.
We illustrate the results of these theorems by considering https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq392_HTML.gif with the ring topology in Figure 12(a). The distance between a receiver and the nearest interfering transmitter is 900 meters. Each link transmits with probability 0.6. Other parameters are the same as in Table 3. From Theorem 2, each of the eight 3-dimensional 0-1 vectors corresponds to a corner point shown in Figure 12(b), and their coordinates can be obtained from (35). By Theorem 3, the solid lines in Figure 12(b) are part of the boundary of the stability region. As another example, for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq393_HTML.gif , notice that (29) and (30) are special cases of (B.1). As a direct consequence of our Theorems 2 and 3, the stability region of slotted ALOHA with two links under partial interference is piecewise linear.

7. Stability Region of the General M-Link Slotted ALOHA System under Partial Interference

Theorems 2 and 3 cover all cases with zero or one nonempty nonpersistent link in an M-link system, respectively. However, if there are at least two nonempty unsaturated links, the stationary joint queue statistics must be involved in calculating the boundary. Unless we are able to compute the stationary joint queue statistics in closed-form, we are unable to solve the capacity-finding problem, even assuming one of the simplest random access protocol, that is, slotted ALOHA. In fact, the characterization of the exact stability region of a general M-link slotted ALOHA system with nonpersistent links has remained to be a key open problem for decades when https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq395_HTML.gif [1623] even under the simplified binary interference model.
To overcome the problem caused by the stationary joint queue statistics, we have introduced the FRASA (Feedback Retransmission Approximation for Slotted Aloha) model in [24] to obtain a closed-form approximation for the stability region of a general M-link slotted ALOHA system under binary interference (i.e., simple collision channel) assumptions. We refer the readers to [24, 31] for a detailed description of the FRASA approach. In the following subsection, we extend the model and analysis in [24] to cover the partial interference case. We remark that our results here automatically apply to the binary interference case if we allow https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq396_HTML.gif to be either zero or one only by comparing the corresponding SINR, that is, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq397_HTML.gif , against a predefined threshold https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq398_HTML.gif , as illustrated in (32) and (33).

7.1. FRASA under Partial Interference

Assume identical settings as in [24]. There are https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq399_HTML.gif links in the network, and the set of links is denoted by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq400_HTML.gif . Denote this FRASA system by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq401_HTML.gif . Let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq402_HTML.gif be the transmission probability vector. Define https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq403_HTML.gif for all https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq404_HTML.gif . We first consider a reduced FRASA system, in which we let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq405_HTML.gif of the links have fixed aggregate arrival rates and the remaining link is assumed with infinite backlog. Take https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq406_HTML.gif to be the link with infinite backlog and denote this reduced FRASA system by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq407_HTML.gif . Let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq408_HTML.gif be the aggregate arrival rate of link https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq409_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq410_HTML.gif is between zero and one. Hence, link https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq411_HTML.gif is active with probability https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq412_HTML.gif , while for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq413_HTML.gif , link https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq414_HTML.gif is active with probability https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq415_HTML.gif . Let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq416_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq417_HTML.gif . Introduce the following notations:
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_Equ36_HTML.gif
(36)
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_Equ37_HTML.gif
(37)
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_Equ38_HTML.gif
(38)
Equation (36) is the probability of successful transmission of link https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq418_HTML.gif given that link https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq419_HTML.gif is active but link https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq420_HTML.gif is not. Equation (37) is the probability of successful transmission of link https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq421_HTML.gif given that both links https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq422_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq423_HTML.gif are active. Equation (38) is the probability of successful transmission of link https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq424_HTML.gif given that link https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq425_HTML.gif is active. Then the parametric form of the stability region of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq426_HTML.gif will be https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq427_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq428_HTML.gif , where
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_Equ39_HTML.gif
(39)
with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq429_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq430_HTML.gif is between zero and one for all https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq431_HTML.gif . https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq432_HTML.gif is the successful transmission probability vector under partial interference.
With this parametric form, we obtain the stability region of FRASA under partial interference as in the following theorem.
Theorem 4.
For each https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq433_HTML.gif , one constructs a hypersurface https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq434_HTML.gif , which is represented by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq435_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq436_HTML.gif , where
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_Equ40_HTML.gif
(40)
with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq437_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq438_HTML.gif is between zero and one for all https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq439_HTML.gif . Then https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq440_HTML.gif , the stability region of FRASA under partial interference, is enclosed by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq441_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq442_HTML.gif in the positive orthant.
Proof.
Refer to Appendix C.
An illustration of the results of Theorem 4 with the topology in Figure 12(a) is given in Figure 13. Figures 13(a), 13(b), and 13(c) depict https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq443_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq444_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq445_HTML.gif , respectively. The union of these hypersurfaces, which is the boundary of the stability region of FRASA under partial interference, is shown in Figure 13(d).

7.2. Simulation Results

In this subsection, we demonstrate the effects of partial interference on the stability region of the general M-link slotted ALOHA systems by presenting results based on both simulation as well as the FRASA closed-form approximation approach. In particular, we perform simulations as in [24] to obtain the stability region of slotted ALOHA by considering the ring topology in Figure 12(a). We assume that all links transmit with probability 0.6. For illustrative purpose, we only show the cross-sections of the stability regions. In Figure 14(a), we depict the cross-sections of the stability region by fixing https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq451_HTML.gif , while in Figure 14(b) the cross-sections of the stability region are obtained by fixing https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq452_HTML.gif . The solid lines represent the simulation results while the dash-dot lines are obtained from the FRASA closed-form approximation. Observe from the figures that, for the given set of system parameters, the curves derived from the FRASA approximation closely follow the simulation results. As a comparison against binary interference, we use the same set of input traffic parameters to obtain the stability region of slotted ALOHA under collision channel (i.e., binary interference model) via simulations. The corresponding cross-sections of the stability region are shown in Figures 14(c) and 14(d), respectively. These results also show a substantial expansion of the stability region by considering partial interference instead of binary ones as in Section 6. More importantly, one should note the qualitative changes in the shapes of the cross-sections of the stability region from concave to convex when the more realistic partial interference phenomenon is considered. This reinforces our argument that it is important to model the partial interference effects while analyzing the performance of wireless multiple access protocols.

8. Conclusion

In this paper, we have introduced the notion of partial interference in wireless multiple access systems and illustrated the potential gain in system capacity when the effect of partial interference is taken into account. In particular, we characterize the stability region of IEEE 802.11 networks under partial interference with two potentially unsaturated links numerically. We also derive the stability region of slotted ALOHA networks under partial interference with two links analytically and obtain a partial characterization of the boundary of the stability region for the case of more than two, potentially unsaturated links in a slotted ALOHA system. By extending the FRASA model, we provide a closed-form approximation for the stability region for general M-link slotted ALOHA system under partial interference effects. Our analyses demonstrate that partial interference considerations can result in not only significant quantitative differences in the predicted system capacity but also fundamental qualitative changes in the shape of the stability region of the systems. This highlights the need of capturing the partial interference effects instead of adopting the conventional, overly simplified binary interference models while analyzing wireless MAC protocols.

Appendices

A. Proof of Theorem 2

When https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq458_HTML.gif , (35) becomes https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq459_HTML.gif , which is obviously on the boundary. If https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq460_HTML.gif , each link https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq461_HTML.gif operates as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq462_HTML.gif . If at a certain instant, only the links in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq463_HTML.gif are active, which occurs with probability https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq464_HTML.gif , the probability of successful transmission of link https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq465_HTML.gif is https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq466_HTML.gif . Therefore, by unconditioning on https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq467_HTML.gif while noticing https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq468_HTML.gif if https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq469_HTML.gif , the successful transmission probability of link https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq470_HTML.gif is
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_Equ41_HTML.gif
(A1)
Therefore https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq471_HTML.gif lies on the boundary.

B. Proof of Theorem 3

When https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq472_HTML.gif , it is trivial that the line segment between https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq473_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq474_HTML.gif lies on the boundary because it is part of the positive https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq475_HTML.gif -axis. Assume that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq476_HTML.gif . We prove that
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_Equ42_HTML.gif
(B1)
with
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_Equ43_HTML.gif
(B2)
lies on the boundary of the stability region. For any https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq477_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq478_HTML.gif has no packet, hence https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq479_HTML.gif . Therefore we consider the dominant system https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq480_HTML.gif , assuming that the system contains only the links in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq481_HTML.gif . For the sufficiency part, the queue in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq482_HTML.gif in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq483_HTML.gif is stable if
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_Equ44_HTML.gif
(B3)
For any https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq484_HTML.gif , the queue in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq485_HTML.gif in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq486_HTML.gif is stable if
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_Equ45_HTML.gif
(B4)
The necessity follows directly from the indistinguishability argument. We observe that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq487_HTML.gif varies linearly with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq488_HTML.gif on the boundary, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq489_HTML.gif . It is trivial that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq490_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq491_HTML.gif correspond to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq492_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq493_HTML.gif , respectively.

C. Proof of Theorem 4

Every point https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq494_HTML.gif with
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_Equ46_HTML.gif
(C1)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq495_HTML.gif is between zero and one for all https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq496_HTML.gif lies in the stability region of FRASA under partial interference. Observe that when https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq497_HTML.gif , the corresponding https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq498_HTML.gif lies in the interior of the stability region. Therefore we only need to consider those https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq499_HTML.gif with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq500_HTML.gif for some https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq501_HTML.gif . When https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq502_HTML.gif , it means that link https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq503_HTML.gif has infinite backlog or operate in persistent conditions, while in nonpersistent conditions, we allow https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq504_HTML.gif to vary arbitrarily between zero and one. Notice that we can never reduce the successful transmission probabilities of all links by changing the links from operating in persistent conditions to nonpersistent conditions, because this reduces the amount of interference experienced by all links. Mathematically, we partition https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq505_HTML.gif into three disjoint sets https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq506_HTML.gif . We first let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq507_HTML.gif be the set of persistent links. Then the successful transmission probability of link https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq508_HTML.gif is
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_Equ47_HTML.gif
(C2)
If we let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq509_HTML.gif be the set of persistent links, the successful transmission probability of link https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq510_HTML.gif is
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_Equ48_HTML.gif
(C3)
It is easy to see that the successful transmission probability in (C.3) is larger than that in (C.2), because
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_Equ49_HTML.gif
(C4)
where we assume that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq511_HTML.gif , which is in general true because the probability of successful transmission is larger when there are less interferers. This implies that the stability region of FRASA obtained by assuming all links in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq512_HTML.gif in persistent conditions is contained inside the stability region of FRASA obtained by assuming all links in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq513_HTML.gif in persistent conditions. Hence, to obtain the boundary of stability region of FRASA under partial interference, we only have to consider the case that only one link is persistent. Then we can use the parametric form (40) to obtain the boundary when https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq514_HTML.gif . By repeating over all possible values of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F735083/MediaObjects/13638_2010_Article_2008_IEq515_HTML.gif , we get the desired result.

Acknowledgments

The material in this paper was presented in part at the IEEE International Conference on Communications 2007, Glasgow, Scotland, June, 2007 and the 18th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, Athens, Greece, September, 2007.
Open Access This article is distributed under the terms of the Creative Commons Attribution 2.0 International License ( https://​creativecommons.​org/​licenses/​by/​2.​0 ), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Literatur
1.
Zurück zum Zitat Gupta P, Kumar PR: The capacity of wireless networks. IEEE Transactions on Information Theory 2000, 46(2):388-404. 10.1109/18.825799MathSciNetCrossRefMATH Gupta P, Kumar PR: The capacity of wireless networks. IEEE Transactions on Information Theory 2000, 46(2):388-404. 10.1109/18.825799MathSciNetCrossRefMATH
2.
Zurück zum Zitat Zuniga M, Krishnamachari B: Analyzing the transitional region in low power wireless links. Proceedings of the 1st Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks (SECON '04), June 2004, Santa Clara, Calif, USA 517-526. Zuniga M, Krishnamachari B: Analyzing the transitional region in low power wireless links. Proceedings of the 1st Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks (SECON '04), June 2004, Santa Clara, Calif, USA 517-526.
3.
Zurück zum Zitat Kim W, Lee J, Kwon T, Lee S-J, Choi Y: Quantifying the interference gray zone in wireless networks: A Measurement Study. Proceedings of the IEEE International Conference on Communications (ICC '07), June 2007, Glasgow, UK 3758-3763. Kim W, Lee J, Kwon T, Lee S-J, Choi Y: Quantifying the interference gray zone in wireless networks: A Measurement Study. Proceedings of the IEEE International Conference on Communications (ICC '07), June 2007, Glasgow, UK 3758-3763.
4.
Zurück zum Zitat Maheshwari R, Jain S, Das SR: A measurement study of interference modeling and scheduling in low-power wireless networks. Proceedings of the 6th ACM Conference on Embedded Networked Sensor Systems (SenSys '08), November 2008, Raleigh, NC, USA Maheshwari R, Jain S, Das SR: A measurement study of interference modeling and scheduling in low-power wireless networks. Proceedings of the 6th ACM Conference on Embedded Networked Sensor Systems (SenSys '08), November 2008, Raleigh, NC, USA
5.
Zurück zum Zitat Padhye J, Agarwal S, Padmanabhan VN, Qiu L, Rao A, Zill B: Estimation of link interference in static multi-hop wireless networks. Proceedings of the Internet Measurement Conference, October 2005, Berkeley, Calif, USA Padhye J, Agarwal S, Padmanabhan VN, Qiu L, Rao A, Zill B: Estimation of link interference in static multi-hop wireless networks. Proceedings of the Internet Measurement Conference, October 2005, Berkeley, Calif, USA
6.
Zurück zum Zitat Mishra A, Rozner E, Banerjee S, Arbaugh W: Exploiting partially overlapping channels in wireless networks: turning a peril into an advantage. Proceedings of the Internet Measurement Conference, October 2005, Berkeley, Calif, USA Mishra A, Rozner E, Banerjee S, Arbaugh W: Exploiting partially overlapping channels in wireless networks: turning a peril into an advantage. Proceedings of the Internet Measurement Conference, October 2005, Berkeley, Calif, USA
7.
Zurück zum Zitat Maheshwari R, Cao J, Das SR: Physical interference modeling for transmission scheduling on commodity WiFi hardware. Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '09), April 2009, Rio de Janeiro, Brazil 2661-2665. Maheshwari R, Cao J, Das SR: Physical interference modeling for transmission scheduling on commodity WiFi hardware. Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '09), April 2009, Rio de Janeiro, Brazil 2661-2665.
8.
Zurück zum Zitat Aguayo D, Bicket J, Biswas S, Judd G, Morris R: Link-level measurements from an 802.11b mesh network. Proceedings of the Conference on Computer Communications (SIGCOMM '04), September 2004, Portland, Ore, USA 121-131. Aguayo D, Bicket J, Biswas S, Judd G, Morris R: Link-level measurements from an 802.11b mesh network. Proceedings of the Conference on Computer Communications (SIGCOMM '04), September 2004, Portland, Ore, USA 121-131.
9.
Zurück zum Zitat Camp J, Robinson J, Steger C, Knightly E: Measurement driven deployment of a two-tier urban mesh access network. Proceedings of the 4th International Conference on Mobile Systems, Applications and Services (MobiSys '06), June 2006, Uppsala, Sweden 96-109. Camp J, Robinson J, Steger C, Knightly E: Measurement driven deployment of a two-tier urban mesh access network. Proceedings of the 4th International Conference on Mobile Systems, Applications and Services (MobiSys '06), June 2006, Uppsala, Sweden 96-109.
10.
Zurück zum Zitat Lee J, Kim W, Lee S-J, Jo D, Ryu J, Kwon T, Choi Y: An experimental study on the capture effect in 802.11a networks. Proceedings of the 2nd ACM International Workshop on Wireless Network Testbeds, Experimental Evaluation and Characterization (WiNTECH '07), July 2007, Montreal, Canada 19-26.CrossRef Lee J, Kim W, Lee S-J, Jo D, Ryu J, Kwon T, Choi Y: An experimental study on the capture effect in 802.11a networks. Proceedings of the 2nd ACM International Workshop on Wireless Network Testbeds, Experimental Evaluation and Characterization (WiNTECH '07), July 2007, Montreal, Canada 19-26.CrossRef
11.
Zurück zum Zitat Kochut A, Vasan A, Shankar AU, Agrawala A: Sniffing out the correct physical layer capture model in 802.11b. Proceedings of the 12th IEEE International Conference on Network Protocols (ICNP '04), October 2004, Berlin, Germany 252-261. Kochut A, Vasan A, Shankar AU, Agrawala A: Sniffing out the correct physical layer capture model in 802.11b. Proceedings of the 12th IEEE International Conference on Network Protocols (ICNP '04), October 2004, Berlin, Germany 252-261.
12.
Zurück zum Zitat Lee J, Ryu J, Lee S-J, Kwon T: Improved modeling of IEEE 802.11a PHY through fine-grained measurements. Computer Networks 2010, 54(4):641-657. 10.1016/j.comnet.2009.08.003CrossRefMATH Lee J, Ryu J, Lee S-J, Kwon T: Improved modeling of IEEE 802.11a PHY through fine-grained measurements. Computer Networks 2010, 54(4):641-657. 10.1016/j.comnet.2009.08.003CrossRefMATH
13.
Zurück zum Zitat Santi P, Maheshwari R, Resta G, Das S, Blough DM: Wireless link scheduling under a graded SINR interference model. Proceedings of the 2nd ACM international Workshop on Foundations of Wireless Ad hoc and Sensor Networking and Computing (FOWANC '09), 2009, New Orleans, La, USA 3-12.CrossRef Santi P, Maheshwari R, Resta G, Das S, Blough DM: Wireless link scheduling under a graded SINR interference model. Proceedings of the 2nd ACM international Workshop on Foundations of Wireless Ad hoc and Sensor Networking and Computing (FOWANC '09), 2009, New Orleans, La, USA 3-12.CrossRef
14.
Zurück zum Zitat Shellhammer SJ: Estimation of packet error rate caused by interference using analytic techniques—a coexistence assurance methodology. In IEEE 802.19 Technical Advisory Group Document Archive. Qualcomm, San Diego, Calif, USA; 2005. Shellhammer SJ: Estimation of packet error rate caused by interference using analytic techniques—a coexistence assurance methodology. In IEEE 802.19 Technical Advisory Group Document Archive. Qualcomm, San Diego, Calif, USA; 2005.
15.
Zurück zum Zitat Bianchi G: Performance analysis of the IEEE 802.11 distributed coordination function. IEEE Journal on Selected Areas in Communications 2000, 18(3):535-547. 10.1109/49.840210CrossRef Bianchi G: Performance analysis of the IEEE 802.11 distributed coordination function. IEEE Journal on Selected Areas in Communications 2000, 18(3):535-547. 10.1109/49.840210CrossRef
16.
Zurück zum Zitat Naware V, Mergen G, Tong L: Stability and delay of finite-user slotted ALOHA with multipacket reception. IEEE Transactions on Information Theory 2005, 51(7):2636-2656. 10.1109/TIT.2005.850060MathSciNetCrossRefMATH Naware V, Mergen G, Tong L: Stability and delay of finite-user slotted ALOHA with multipacket reception. IEEE Transactions on Information Theory 2005, 51(7):2636-2656. 10.1109/TIT.2005.850060MathSciNetCrossRefMATH
17.
Zurück zum Zitat Tsybakov BS, Mikhailov VA: Ergodicity of a slotted ALOHA system. Problems of Information Transmission 1979, 15(4):73-87.MathSciNet Tsybakov BS, Mikhailov VA: Ergodicity of a slotted ALOHA system. Problems of Information Transmission 1979, 15(4):73-87.MathSciNet
18.
Zurück zum Zitat Rao RR, Ephremides A: On the stability of interacting queues in a multiple-access system. IEEE Transactions on Information Theory 1988, 34(5):918-930. 10.1109/18.21216MathSciNetCrossRefMATH Rao RR, Ephremides A: On the stability of interacting queues in a multiple-access system. IEEE Transactions on Information Theory 1988, 34(5):918-930. 10.1109/18.21216MathSciNetCrossRefMATH
19.
Zurück zum Zitat Szpankowski W: Stability conditions for multidimensional queueing systems with computer applications. Operations Research 1988, 36(6):944-957. 10.1287/opre.36.6.944MathSciNetCrossRefMATH Szpankowski W: Stability conditions for multidimensional queueing systems with computer applications. Operations Research 1988, 36(6):944-957. 10.1287/opre.36.6.944MathSciNetCrossRefMATH
20.
Zurück zum Zitat Anantharam V: The stability region of the finite-user slotted ALOHA protocol. IEEE Transactions on Information Theory 1991, 37(3):535-540.CrossRef Anantharam V: The stability region of the finite-user slotted ALOHA protocol. IEEE Transactions on Information Theory 1991, 37(3):535-540.CrossRef
21.
Zurück zum Zitat Szpankowski W: Stability conditions for some multiqueue distributed systems: buffered random access systems. Advances in Applied Probability 1994, 26: 498-515. 10.2307/1427448MathSciNetCrossRefMATH Szpankowski W: Stability conditions for some multiqueue distributed systems: buffered random access systems. Advances in Applied Probability 1994, 26: 498-515. 10.2307/1427448MathSciNetCrossRefMATH
22.
Zurück zum Zitat Luo W, Ephremides A: Stability of N interacting queues in random-access systems. IEEE Transactions on Information Theory 1999, 45(5):1579-1587. 10.1109/18.771161MathSciNetCrossRefMATH Luo W, Ephremides A: Stability of N interacting queues in random-access systems. IEEE Transactions on Information Theory 1999, 45(5):1579-1587. 10.1109/18.771161MathSciNetCrossRefMATH
23.
Zurück zum Zitat Ghez S, Verdú S, Schwartz SC: Stability properties of slotted aloha with multipacket reception capability. IEEE Transactions on Automatic Control 1988, 33(7):640-649. 10.1109/9.1272CrossRefMathSciNetMATH Ghez S, Verdú S, Schwartz SC: Stability properties of slotted aloha with multipacket reception capability. IEEE Transactions on Automatic Control 1988, 33(7):640-649. 10.1109/9.1272CrossRefMathSciNetMATH
24.
Zurück zum Zitat Hui K-H, Yue O-C, Lau W-C: FRASA: feedback retransmission approximation for the stability region of finite-user slotted ALOHA. Proceedings of the International Conference on Network Protocols (ICNP '07), October 2007 330-331. Hui K-H, Yue O-C, Lau W-C: FRASA: feedback retransmission approximation for the stability region of finite-user slotted ALOHA. Proceedings of the International Conference on Network Protocols (ICNP '07), October 2007 330-331.
25.
Zurück zum Zitat Chang H, Misra V, Rubenstein D: A general model and analysis of physical layer capture in 802.11 networks. Proceedings of the 25th IEEE International Conference on Computer Communications (INFOCOM '06), April 2006, Barcelona, Brazil Chang H, Misra V, Rubenstein D: A general model and analysis of physical layer capture in 802.11 networks. Proceedings of the 25th IEEE International Conference on Computer Communications (INFOCOM '06), April 2006, Barcelona, Brazil
26.
Zurück zum Zitat Rappaport TS: Wireless Communications: Principles and Practice. 2nd edition. Prentice Hall, Upper Saddle River, NJ, USA; 2002.MATH Rappaport TS: Wireless Communications: Principles and Practice. 2nd edition. Prentice Hall, Upper Saddle River, NJ, USA; 2002.MATH
27.
Zurück zum Zitat Mergen G, Tong L: Stability and capacity of regular wireless networks. IEEE Transactions on Information Theory 2005, 51(6):1938-1953. 10.1109/TIT.2005.847728MathSciNetCrossRefMATH Mergen G, Tong L: Stability and capacity of regular wireless networks. IEEE Transactions on Information Theory 2005, 51(6):1938-1953. 10.1109/TIT.2005.847728MathSciNetCrossRefMATH
28.
Zurück zum Zitat Wu H, Peng Y, Long K, Cheng S, Ma J: Performance of reliable transport protocol over IEEE 802.11 wireless LAN: analysis and enhancement. Proceedings of the 21st Annual Joint Conference of the IEEE Computer and Communications (INFOCOM '02), June 2002 599-607. Wu H, Peng Y, Long K, Cheng S, Ma J: Performance of reliable transport protocol over IEEE 802.11 wireless LAN: analysis and enhancement. Proceedings of the 21st Annual Joint Conference of the IEEE Computer and Communications (INFOCOM '02), June 2002 599-607.
29.
Zurück zum Zitat Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications IEEE Std. 802.11, 1999 Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications IEEE Std. 802.11, 1999
30.
Zurück zum Zitat Malone D, Duffy K, Leith D: Modeling the 802.11 distributed coordination function in nonsaturated heterogeneous conditions. IEEE/ACM Transactions on Networking 2007, 15(1):159-172.CrossRef Malone D, Duffy K, Leith D: Modeling the 802.11 distributed coordination function in nonsaturated heterogeneous conditions. IEEE/ACM Transactions on Networking 2007, 15(1):159-172.CrossRef
31.
Zurück zum Zitat Hui K-H: Characterizing Interference in Wireless Mesh Networks, M.S. thesis. The Chinese University of Hong Kong, Shatin, Hong Kong; 2007. Hui K-H: Characterizing Interference in Wireless Mesh Networks, M.S. thesis. The Chinese University of Hong Kong, Shatin, Hong Kong; 2007.
32.
Zurück zum Zitat Kincaid D, Cheney W: Numerical Analysis: Mathematics of Scientific Computing. 3rd edition. Brooks/Cole, Pacific Grove, Calif, USA; 2002.MATH Kincaid D, Cheney W: Numerical Analysis: Mathematics of Scientific Computing. 3rd edition. Brooks/Cole, Pacific Grove, Calif, USA; 2002.MATH
34.
Zurück zum Zitat Loynes RM: The stability of a queue with non-independent interarrival and service times. Proceedings of the Cambridge Philosophical Society 1962, 58: 494-520.MathSciNetCrossRef Loynes RM: The stability of a queue with non-independent interarrival and service times. Proceedings of the Cambridge Philosophical Society 1962, 58: 494-520.MathSciNetCrossRef
Metadaten
Titel
Partial Interference and Its Performance Impact on Wireless Multiple Access Networks
verfasst von
Ka-Hung Hui
Wing Cheong Lau
Onching Yue
Publikationsdatum
01.12.2010
Verlag
Springer International Publishing
DOI
https://doi.org/10.1155/2010/735083

Weitere Artikel der Ausgabe 1/2010

EURASIP Journal on Wireless Communications and Networking 1/2010 Zur Ausgabe

Premium Partner