1 Introduction

The IEEE 802.11 standard is currently one of the most popular wireless access technologies. It allows quick and simple configuration of local broadband networks and greatly facilitates Internet access. With the growth of the popularity of IEEE 802.11, the number of available services also increased and the need for Quality of Service (QoS) provisioning became apparent. As a remedy to this problem, the Enhanced Distributed Channel Access (EDCA) function of the IEEE 802.11 standard was proposed [8].

The IEEE 802.11 standard has a serious disadvantage resulting from the half-duplex nature of wireless devices. In each network with hidden nodes not only the overall throughput value may greatly decrease as shown in [34] but also EDCA service differentiation and throughput fairness among nodes may be strongly deteriorated [13].

A number of Medium Access Control (MAC) protocols attempting to address the problem of hidden nodes have been proposed in the literature. A detailed overview of such protocols is presented in Table 1. As can be noticed, the majority of protocols rely only on RTS/CTS or similar frame exchanges during the channel reservation process. All presented solutions can be divided into five major protocol types: contention-based, multi-channel, busy tone-based, energy-efficient and directional antenna-based. The most important advantages and disadvantages of each protocol type are presented in Table 2.

Table 1 Comparison of different MAC protocols for ad-hoc networks with hidden nodes
Table 2 Advantages and disadvantages of different MAC protocol types for ad-hoc networks with hidden nodes

Among the available solutions, only the legacy four-way handshake mechanism has become broadly used and implemented in wireless devices. Currently it is the only mechanism recommended by the IEEE 802.11 standard to minimize the negative effects caused by hidden nodes. However, as it was shown in [13], the effectiveness of the four-way handshake is insufficient to provide appropriate service differentiation in EDCA-based ad-hoc networks.

In this article we describe three versions of Busy Signal-based Mechanism turned On (BusySiMOn), which combine a preliminary reservation of the wireless channel with the advantages of EDCA service differentiation. The first, most basic version of BusySiMOn, was introduced in [15], where all nodes in the network used the preliminary channel reservation. In the second version of BusySiMOn, only nodes which transmit high priority traffic employ the preliminary reservation of the channel. Finally, the third version of BusySiMOn, utilizes network topology information: only nodes which are aware of being hidden use preliminary reservation to increase the probability of successful channel reservation. In this paper we show that all proposed versions of BusySiMOn remarkably improve QoS provisioning in IEEE 802.11a/b/g ad-hoc networks with hidden nodes in terms of throughput, average frame delay and throughput fairness among nodes. Additionally, they remain compatible with the IEEE 802.11 standard.

The outline of this article is the following. Firstly, we describe EDCA (Sect. 2) and the proposed three versions of BusySiMOn (Sect. 3) Then, we compare the effectiveness of channel reservation for BusySiMOn and the four-way handshake mechanism (Sect. 4). In Sect. 5 we describe compatibility issues and in Sect. 6 we show how to estimate throughput of BusySiMOn. Simulation results, which evaluate the performance of the proposed protocol and show its advantages over the four-way handshake mechanism, are presented in Sect. 7. In Sect. 8 we calculate the required energy consumption for EDCA with the four-way handshake mechanism turned on and compare it with energy consumption required for BusySiMOn. Section 9 includes comparison of BusySiMOn with other busy tone-based MAC protocols. It also includes discussion on other MAC protocols supporting QoS. Section 10 is devoted to conclusions. Finally, "Appendix" explains how to calculate the probability of successful channel reservation by hidden nodes.

2 IEEE 802.11 EDCA

In networks with heterogeneous traffic, the QoS requirements of each service should be carefully taken into account. In particular, in the case of simultaneous transmissions of multimedia and data traffic the delay constraints of the multimedia service should be primarily met. To achieve this goal multimedia traffic should have priority over data traffic. Within wireless ad-hoc networks it is the EDCA function of the IEEE 802.11 standard which was designed to satisfy this requirement.

The EDCA function defines several QoS enhancements to the legacy IEEE 802.11 Distributed Coordination Function (DCF) which are based on the idea of Access Categories (ACs). Four ACs (priorities) are defined: Voice (VO), Video (VI), Best Effort (BE), and Background (BK). To provide traffic differentiation each AC has different values of the following medium access parameters: the contention window minimum (CWmin) and maximum (CWmax) size, the arbitration inter-frame space number (AIFSN), and the transmission opportunity limit (TXOPLimit).

The functions of the EDCA access parameters are as follows: CWmin i and CWmax i determine the number of Backoff i slots for the i-th AC:

$$ \begin{aligned} &Backoff_i = \\ &=\hbox{random}\left[0, \min\left(2^k (CW\hbox{min}_i+1)-1, CW\hbox{max}_i\right)\right], \end{aligned} $$

where k is the number of collisions occurred to the currently transmitted frame. AIFSN i determines the minimum time interval before a frame transmission may begin (AIFS i ):

$$ AIFS_i = AIFSN_i \times T_e + SIFS, $$

where T e is the duration of a single slot time and SIFS is the Short Inter-Frame Space. TXOPLimit allows for the consecutive transmission of several frames after gaining channel access, known as contention free bursting. This parameter is optional.

In the literature there are a number of articles which describe the advantages of EDCA traffic differentiation. Most of the studies, however, consider systems without hidden nodes. In [12] it has been proved that EDCA tends to cease to function in environments with hidden nodes. In particular, it has been shown that:

  • unhidden nodes are generally favored over hidden nodes in the channel access, regardless of their access category,

  • the four-way handshake mechanism does not completely eliminate unfairness in granting channel access,

  • the higher the priority of traffic transmitted by hidden nodes the more collisions occur, even if the four-way handshake is used.

These observations were also confirmed in [13]. Therefore, it became obvious that a new MAC protocol is required to meet the strict demands of high priority traffic (VO and VI) and to improve fairness among nodes. It was also clear that the ideal solution should be compatible with both currently used mechanisms: EDCA and the four-way handshake. The proposed protocol, which satisfies all these requirements, is described in the next section.

3 BusySiMOn

The key idea of BusySiMOn is to minimize the probability of collisions of the signaling data within wireless networks with hidden nodes in comparison to the currently used four-way handshake mechanism. Additionally, it was assumed that only slight modifications of the IEEE 802.11 standard are allowed in order to assure backward compatibility. To achieve these goals we propose a new channel reservation procedure consisting of the following two steps (cf., Fig. 1):

  1. 1.

    Preliminary reservation of the wireless channel using two busy tone signals (Busy 1 and Busy 2), i.e., pulses of energy of a predefined duration. Busy 1 is used to request channel reservation by a source node and Busy 2 is used to confirm this reservation by its neighboring nodes. Both signals are very short—Busy 1 has a length of one Slot Time Period (STP) and Busy 2 has a length of three STPs. Therefore, the preliminary channel reservation can be performed very quickly and the probability of collisions of signaling data can be meaningfully reduced in comparison to the four-way handshake mechanism.

  2. 2.

    Distributing information about the transmission duration as well as the source and destination node addresses with the use of the legacy RTS and CTS frames.

Fig. 1
figure 1

Operation of BusySiMOn

As illustrated in Fig. 1, the problem of traffic prioritization is resolved in BusySiMOn by the combination of the proposed reservation mechanism with the standard EDCA access parameters: AIFSN,  CW, and TXOPLimit.

In this paper we propose the following three versions of BusySiMOn:

  • BusySiMOn v1: all nodes within the network use Busy 1 and Busy 2 signals to preliminarily reserve the wireless channel [15].

  • BusySiMOn v2: only nodes with high priority data (i.e., VO or VI) use the Busy 1/Busy 2 exchange to preliminarily reserve the wireless channel. Other nodes use the basic channel access (without RTS/CTS).

  • BusySiMOn v3: only hidden nodes use the Busy 1/Busy 2 exchange to preliminarily reserve the wireless channel. Other nodes use the basic channel access. This version of BusySiMOn needs an additional hidden node detection scheme which is out of the scope of this work Footnote 1. Therefore, in this paper ideal conditions are assumed, i.e., each hidden node is aware of being hidden.

4 Effectiveness of channel reservation

In the case of the legacy RTS/CTS-based channel reservation three types of collisions may happen—collisions of RTS with either another RTS, CTS or DATA. They are common even for the simplest line topology depicted in Fig. 2. In the first scenario two RTS frames sent by the hidden nodes collide with each other. After the collision is detected they have to be retransmitted after a random Backoff time. The number of possible retransmissions is limited to the Short Retry Limit defined by the IEEE 802.11 standard. It is worth noting that, due to the low sending rate of RTS frames Footnote 2, hidden nodes do not have to simultaneously start their RTS transmissions to cause a collision. In the second scenario, node N1 succeeds in reserving the wireless channel with the use of the RTS/CTS exchange. At the same time, however, the RTS frame sent by N3 collides with the CTS frame sent by N2. Obviously, after a random Backoff time, N3 will attempt to resend its RTS frame. If the Backoff value will be small enough, the resent RTS frame will collide with the DATA frame currently being transmitted by N1. As a result, N1 will have to resend its DATA frame.

Fig. 2
figure 2

Types of signaling collisions for the four-way handshake

For a given Backoff stage, with the use of simple probability analysis (which is explained in "Appendix"), we can compute the lower bound of the probability of a successful channel reservation by either of the two hidden nodes (p H s ) in the first scenario:

$$ p_s^{H, RTS} = \left\{\begin{array}{ll} 0,&\hbox{if } \alpha < 0,\\ \frac{(\alpha+1)(\alpha+2)}{(CW+1)^2}, &\hbox{if } \alpha \geq 0, \\ \end{array}\right. $$

where α = CW − T RTS ,  CW is the current contention window size (in STPs), and T RTS is the number of STPs required to transmit the RTS frame (together with its PLCP header and preamble) (T RTS) and wait a SIFS period Footnote 3.

If Busy 1 was used to reserve the wireless channel the probability p H s would be the following:

$$ p_s^{H, Busy 1} = \left\{\begin{array}{ll} 0,&\hbox{ if } \beta < 0\\ \frac{(\beta+1)(\beta+2)}{(CW+1)^2},&\hbox{ if } \beta \geq 0\\ \end{array}\right. $$

where β = CW − T Busy 1 and T Busy 1 is the number of STPs required to transmit the Busy 1 signal (T Busy1) and wait a SIFS periodFootnote 4.

The comparison of p H, RTS s with p H, Busy 1 s for different PHYs and different CW values is given in Table 3. The probability p H, Busy 1 s is always greater than p H, RTS s because the proposed solution maximizes the probability of successful reservations of the wireless channel for hidden nodes by minimizing the probability of collisions of signaling data.

Table 3 Lower bound of the probability of successful transmission by either of the hidden nodes in the first scenario in Fig. 2 for different PHYs

To assess the effectiveness of the four-way handshake we compare different CW values (Table 3) with the standard values of CWmin and CWmax of different ACs [8]. By analyzing p H, RTS s it can be deduced that especially for hidden nodes with VO priority flows the probability of successful channel reservation is very low for each PHY when the four-way handshake is used. For BusySiMOn the probability p H, Busy1 s for VO priority flows is much higher.

5 Compatibility with EDCA

The BusySiMOn protocols are compatible with EDCA because they do not change the values of the channel access parameters defined by the IEEE 802.11 standard. Furthermore, because the RTS/CTS/DATA/ACK exchange is part of the proposed solutions, each node implementing the preliminary BusySiMOn channel reservation is able to respond to legacy IEEE 802.11 nodes. Additionally, if a node using Busy 1/Busy 2 exchange wants to communicate with a legacy node it must have at least one other BusySiMOn neighbor. For example, assume that in Fig. 3, nodes A and B implement BusySiMOn while node C is a legacy node. After node B broadcasts Busy 1 to all nodes within its range, node A sends Busy 2 in response. This allows node B to communicate with node C with the use of the traditional RTS/CTS/ DATA/ACK exchange.

Fig. 3
figure 3

Compatibility with legacy nodes

A problem occurs if a BusySiMOn node does not have any BusySiMOn neighbors. To overcome this obstacle and assure full compatibility with the IEEE 802.11 standard, the BusySiMOn protocol is extended in the following way. If a node implementing BusySiMOn does not receive a reply to m Busy 1 tones it assumes that all other nodes use the legacy IEEE 802.11. It then reverts to the traditional four-way handshake exchange. Additionally, a node implementing BusySiMOn can overhear Busy 1 signals from its neighboring nodes. Therefore, it becomes aware if a BusySiMOn-capable node appears within its range. After such a node is detected, it automatically falls back to normal operation. Furthermore, each node implementing BusySiMOn periodically transmits the Busy 1 signal with a probability proportional to the time it did not hear any BusySiMOn-like transmission. The probability of transmitting the Busy 1 signal is a protocol parameter that can be adjusted, e.g., depending on the network topology.

6 Throughput estimation

In this section we briefly present saturation throughput models of EDCA, the four-way handshake, and BusySiMOn. This allows to estimate the signaling overhead and compare it with simulation results in Sect. 7.1.2. Good agreement of theoretical and simulation results validates the correct implementation of BusySiMOn in the ns-2 simulator

The analysis presented in this section is based on the EDCA throughput model that we proposed in [14]. For EDCA, the throughput of the i-th AC (S i ) is equal to the average duration of a successful transmission of a frame in this particular AC divided by the average duration of a contention slot (T CS), in which the frame competes for medium access with all other frames:

$$ S_i = \frac{p^S_i T^{DATA}}{T^{CS}}, $$

where p S i is the probability of a successful transmission for a given AC and T DATA is the average time spent on transmitting a frame.

A single transmission is successful if only one node transmits its data in a given slot time. Therefore, if τ i is the probability of a transmission attempt in a generic slot time for the i-th AC, then

$$ p_{i}^{S}=n_i \tau_i {( 1 - {\tau_i} ) }^{n_i-1}{\mathop{\mathop{\prod}\limits_{j=0}^{N_c-1}}\limits_{j\neq i}}{(1 - \tau_j)^{n_j},} $$

where n i is the number of nodes in the i-th AC and N c is the number of ACs.

If T e is the slot time, T S the duration of a successful transmission, T C the duration of a collision, p B the probability of a busy medium, and (1 − p B) the probability of a free channel, we can rewrite T CS as \((1 - p^B)T_e + \sum_{i=0}^{N_c-1}{p^{S}_iT^{S}} + (p^{B} - \sum_{i=0}^{N_c-1}{p^{S}_i})T^{C}\). Therefore, we get:

$$ S_i = \frac{p^{S}_i T^{DATA}}{(1 - p^B)T_e + \sum_{i=0}^{N_c-1}{p^{S}_iT^{S}} + (p^{B} - \sum_ {i=0}^{N_c-1}{p^{S}_i) T^{C}}}, $$

where \(p^B = 1- \prod_{j=0}^{N_c-1}{( 1 - \tau_j )^{n_j}}\).

Time intervals T S and T C depend on the access method used. In the case of the basic access method they are as follows:

$$ \begin{aligned} T^S &= AIFS_i + T^{DATA} + SIFS + T^{ACK} + 2\delta,\\ T^{C} &= T^{DATA} + \delta + ACK^{Timeout}+ AIFS_i, \end{aligned} $$

where δ denotes the propagation delay and ACK Timeout equals EIFS − DIFS.

In the case of the four-way handshake mechanism T S and T C are represented by the following equations:

$$ \begin{aligned} T^S &= T^{RTS} + T^{CTS} + AIFS_i + T^{DATA} + 3 \times SIFS + \\ &+ T^{ACK} + 4 \delta,\\ T^C &= T^{RTS} + CTS^{Timeout} + AIFS_i, \end{aligned} $$

where CTS Timeout = EIFS − DIFS. T RTS and T CTS is the time required to send the RTS and CTS frames, respectively.

In the case of BusySiMOn v1 (which exhibits the largest overhead) T S and T C are represented by the following equations:

$$ \begin{aligned} T^S &= T^{Busy 1} + T^{Busy 2} + T^{RTS} + T^{CTS} + AIFS_i + \\ &+ T^{DATA} + 5 \times SIFS + T^{ACK} + 4 \delta,\\ T^C &= T^{Busy 1} + T^{Busy 2} + 2 \times SIFS + T^{RTS} + \\ &+ CTS^{Timeout} + AIFS_i, \end{aligned} $$

where T Busy 1 and T Busy 2 is the time required to send the Busy 1 and Busy 2 signals, respectively. The remaining unknown variables (τ i p S i p B i ) can be calculated using the model presented in [14].

7 Simulation study

The BusySiMOn protocols were implemented in the ns-2.28 simulator, which was modified to allow the coexistence of three types of nodes: those which implement the Busy 1/Busy 2 exchange, those which use basic channel access method, and those which employ the four-way handshake mechanism.

In the simulations we assumed that the wireless channel introduced no errors, i.e., frame losses occurred only because of collisions. IEEE 802.11b was chosen as the PHY layer, although the BusySiMOn protocols can be applied to any other 802.11 PHY. The general conclusions presented in this section remain the same regardless of the chosen PHY. The EDCA parameters were set as defined by the IEEE 802.11 standard [8]. TXOPLimit was set to zero to avoid contention free bursting. Finally, in order to simulate the topologies with hidden nodes the Carrier Sensing Range (CSR) was decreased (from 550 to 263 m) so that every hidden node was out of the range of other hidden nodes. There were no exposed nodes. Networks meeting these requirements are presented in Fig. 4. They were used during simulations. Each simulation was repeated until for 95 % confidence intervals the error was smaller than 2 %.

Fig. 4
figure 4

Four different simulation scenarios are described in this section:

  • Scenario 1: One AC per node, no hidden nodes, simple network topology. \(\underline{\hbox{Goal}}\): overhead study under saturation.

  • Scenario 2: One AC per node, multiple hidden nodes, four network topologies. \(\underline{\hbox{Goal}} \) :performance study under saturation.

  • Scenario 3: One AC per node, multiple hidden nodes, complex network topology. \(\underline{\hbox{Goal}}\): performance study under non-saturation.

  • Scenario 4: Four ACs per node, multiple hidden nodes, complex network topology, saturation. \(\underline{\hbox{Goal}}\): study of the impact of virtual collisions.

These scenarios allowed to answer the following questions regarding BusySiMOn: how large is the signaling overhead, what is the performance under saturation and non-saturation, and what is the impact of virtual collisions on the protocol performance?

7.1 One AC per node

7.1.1 Evaluation criteria

The evaluation was done in terms of throughput and fairness obtained for different values of per-flow offered load. The per-flow offered load is the total number of bits generated by a single node for a single flow per time unit (second). Throughput is defined as the ratio of the number of correctly received bits per time unit. In the results presented in this section only the overall network throughput is considered. Fairness is measured with Jain’s fairness index [9]:

$$ Fairness=\frac{(\sum{x_i})^2}{n\sum{x_i^2}}, $$

where x i is the average throughput of the i-th node for a particular AC and n is the number of nodes transmitting data with this AC.

If not defined differently the following four configurations were considered for networks presented in this section:

  • Configuration 1: all nodes transmit VO traffic. In this case the competition among all nodes is the most severe due to low values of the EDCA medium access parameters.

  • Configuration 2: all nodes transmit BK traffic. In this case the competition among nodes is the weakest due to high values of the EDCA medium access parameters.

  • Configuration 3: node N0 transmits BK traffic, all other nodes transmit VO traffic. In this case the competition among hidden nodes is very severe due to low values of the EDCA medium access parameters.

  • Configuration 4: node N0 transmits VO traffic, all other nodes transmit BK traffic. In this case the competition among hidden nodes is weak due to high values of the EDCA medium access parameters.

Additionally, the most complex network (Fig. 4d) was evaluated in terms of the maximum frame delay defined as the maximum time difference between frame generation at the source node and its successful reception at the destination node. This was computed separately for each simulated AC.

From the list of available MAC protocols for networks with hidden nodes (Table 1) the four-way handshake was chosen for the presented comparison. This is because, as it was previously mentioned, the four-way handshake mechanism is the only solution recommended by the IEEE 802.11 standard to be used in environments with hidden nodes and it is the only solution implemented in current wireless drivers. Additional discussion on the differences between BusySiMOn and other QoS-aware MAC protocols is provided in Sect. 9.

7.1.2 Scenario 1: overhead study

In order to compare the impact of the overhead introduced by BusySiMOn v1 (i.e., the additional Busy 1 and Busy 2 signals) and the four-way handshake mechanism, a two-node network was investigated. Both simulation results (obtained from the ns-2 simulator) and mathematical results (calculated with the use of the model described in Sect. 6) are gathered in Table 4. Good agreement of simulation and theoretical results validates the correct implementation of BusySiMOn in ns-2.

Table 4 Overhead study for two-node network under saturation

The impact of the overhead (OH) on the network performance was calculated using the following equations:

$$ OH_{4WH}=\frac{|ONT_{EDCA}-ONT_{4WH}|}{ONT_{EDCA}}\times 100\,\% $$

and

$$ OH_{BS}=\frac{|ONT_{EDCA}-ONT_{BS}|}{ONT_{EDCA}}\times 100\,\%, $$

where ONT EDCA ONT 4WH , and ONT BS stand for the overall network throughput for EDCA, the four-way handshake, and BusySiMOn v1, respectively.

In general the overhead introduced by the BusySiMOn signaling impacts the analyzed network performance more than the overhead introduced by the four-way handshake mechanism. Obviously, such performance was expected because BusySiMOn introduces additional Busy 1 and Busy 2 signals to the traditional four-way handshake exchange. However, the overhead is only slightly larger than for the four-way handshake and is offset by the improved performance of BusySiMOn, as described in the following subsections.

7.1.3 Scenario 2: performance study under saturation

When analyzing the performance of the BusySiMOn protocols under saturation the following set of outcomes was expected:

  1. 1.

    the individual throughput values of the nodes should be the highest,

  2. 2.

    the overall network throughput should be similar to that of EDCA without hidden nodes and without RTS/CTS,

  3. 3.

    the protocol should perform the best when VO is the dominant traffic in the network (Configurations 1 and 3), slightly worse performance for BK traffic can be accepted (Configurations 2 and 4),

  4. 4.

    the Jain’s fairness index should be near to one,

  5. 5.

    the above outcomes should be valid regardless of the configuration.

7.1.3.1 Results

The performance of the new protocols was evaluated in four exemplary wireless ad-hoc networks with hidden nodes (Fig. 4). In each network node N0 was the only unhidden node. Other nodes, which belong to different collision domains (defined in this article as carrier sensing ranges), were hidden from each other. In our simulations we do not consider networks with exposed nodes because BusySiMOn was designed to minimize only the impact of hidden nodes.

The simulation results, gathered for the four configurations defined in Sect. 7.1.1, are presented in Table 5. These are the results from simulating five different MAC protocols (i.e., EDCA, EDCA with RTS/CTS, BusySiMOn v1, BusySiMOn v2, and BusySiMOn v3) in four different networks (Fig. 4). Furthermore, the tables contain results obtained for networks without hidden nodes.Footnote 5

Table 5 Simulation results

Based on the gathered results a comparison of the protocol efficiency was performed (Table 6). The comparison was done using the following metrics: overall network throughput (computed as the sum of all per-flow throughput values), fairness (measured with Jains fairness index), and similarity to a network without hidden nodes for the basic channel access, which was calculated using the following equation:

$$ \begin{aligned} & Similarity = \\ & = \frac{ONT_{\hbox{BusySiMOn,\,network\,w/ hidden\,nodes}}}{ONT_{\hbox{EDCA,\,network\, w/o \, hidden\,nodes}}} \times 100\,\%. \end{aligned} $$
Table 6 Comparison of protocol efficiency

The general conclusions regarding all of the tested networks are the following:

  • BusySiMOn v3 performs the best in terms of the overall network throughput and fairness.

  • The similarity of BusySiMOn v3 to EDCA without hidden nodes is within the range 65–100 %, which is very good because for other protocols the similarity factor is lower.

  • If VO traffic is dominant (Configurations 1 and 3) BusySiMOn v1 and v2 are better than EDCA with and without RTS/CTS. This is because of the increased probability of successful wireless channel reservation during the preliminary reservation phase.

  • In Configuration 3 for EDCA, nodes can hardly send any data. Such performance is unacceptable.

Additional detailed conclusions are presented next. For the three-node network (Fig. 4a):

  • In Configuration 2 the fairness of BusySiMOn v2 is lower than for RTS/CTS. However, this is not very meaningful because for BusySiMOn v2 each node obtains higher throughput than for RTS/CTS.

For the four-node network (Fig. 4b):

  • In Configuration 2 EDCA performs slightly better than BusySiMOn v1 in terms of the overall network throughput. However, BusySiMOn v1 assures much better fairness.

For the five-node network (Fig. 4c):

  • BusySiMOn v1 is always better than EDCA and EDCA with RTS/CTS in terms of both the overall network throughput and fairness.

  • In the first configuration RTS/CTS lowers the throughput of nodes in comparison to EDCA. On the other hand, it considerably improves fairness.

For the complex star topology network (Fig. 4d):

  • In Configuration 2 EDCA performs better than BusySiMOn v1 in terms of the overall network throughput. However, BusySiMOn v1 assures much better fairness.

  • In Configuration 4 EDCA performs better than BusySiMOn v1 because BK traffic has large CW values and N0 (transmitting VO traffic) is the only unhidden node. Therefore, in this configuration it is better if N0 does not make any channel reservations and avoids unnecessary decrease of throughput.

To summarize the performance of the studied MAC protocols, it can be concluded that EDCA does not work properly in Configurations 1 and 3. This situation is slightly improved by the four-way handshake mechanism and even more improved by the BusySiMOn protocols. Additionally, even though the BusySiMOn protocols do not always improve the performance of EDCA in Configurations 2 and 4, they perform satisfactorily in these configurations and, therefore, their overall performance is very adequate. This is in contrary to EDCA which has extremely low overall throughput in Configurations 1 and 3. Among the three BusySiMOn protocols BusySiMOn v3 performs most convincingly. Therefore, it is the best candidate for implementation in a real driver.

7.1.4 Scenario 3: performance study under non-saturation

When analyzing the performance of BusySiMOn under non-saturation the following set of outcomes is expected:

  1. 1.

    the throughput should be the highest,

  2. 2.

    the maximum frame delay of VO traffic should be less than 150 ms,

  3. 3.

    the performance of the protocol should be the best when VO is the dominant traffic in the network (Configurations 1 and 3), slightly worse performance for BK traffic can be accepted (Configurations 2 and 4).

7.1.4.1 Results

So far, it has been shown that the overall performance of BusySiMOn (especially BusySiMOn v3) is better than the performance of EDCA and the four-way handshake mechanism in terms of the overall network throughput and fairness when VO is the dominant traffic in the network. However, for delay-sensitive traffic it is the maximum frame delay which is the most important constraint. We assume that a VO service can tolerate a maximum frame delay of 150 ms. Frames with greater delay are dropped. Therefore, the maximum values of the per-flow offered load were found under which the wireless network was not yet saturated. This was done separately for BusySiMOn v3 and the four-way handshake for Configuration 1 (45 KB/s and 53.75 KB/s, respectively) and Configuration 3 (56.88 KB/s and 63.75 KB/s, respectively). Then, the two protocols were compared together and, additionally, with BusySiMOn v1 and v2. The comparison was done with regard to the overall throughput and the maximum frame delay obtained for the acquired values of the network load. This scenario was executed for the most complex network illustrated in Fig. 4d. Table 7 Footnote 6 contains the obtained results.

Table 7 Results for complex star topology (Fig. 4d) for non-saturation

The general conclusions are the following:

  • Only BusySiMOn v3 assures fulfillment of delay constraints for VO traffic.

  • The maximum throughput of the four-way handshake under the delay constraint is worse than the throughput of each BusySiMOn protocol.

  • The maximum delay of BK traffic is always lower for the BusySiMOn protocols than for the four-way handshake mechanism.

  • The fairness of the BusySiMOn protocols is always higher than the fairness of the four-way handshake mechanism.

To summarize, in each analyzed configuration the new mechanisms perform better than EDCA with RTS/ CTS not only in terms of the maximum frame delay but also in terms of fairness and overall network throughput. This means that with the use of the BusySiMOn protocols delay-sensitive traffic is provided with a better level of QoS than with the use of the four-way handshake mechanism.

7.2 Scenario 4: Four ACs per node—performance study under saturation

In this section the impact of virtual collisions on the performance of BusySiMOn v1Footnote 7 and the four-way handshake mechanism is investigated. The two protocols were evaluated in the network illustrated in Fig. 5, which consists of two collision domains. N0 is the only unhidden node. The number of nodes hidden from each other was increased from 10 to 40 (i.e., there were from 5 to 20 nodes in each domain). Hidden nodes were simultaneously transmitting data belonging to all four ACs to N0. Node N0 did not transmit any data.

Fig. 5
figure 5

Simulated network with four ACs per node

The results are presented in Fig. 6. For clarity of presentation the figure illustrates throughput only for two ACs (solid lines). The VO and BK ACs were chosen as the most opposite. Additionally, the figure illustrates the overall throughput per collision domain (dashed lines), which is the sum of throughput of all ACs.

Fig. 6
figure 6

Results for the network with four ACs per node

The conclusions are the following:

  • Both the four-way handshake mechanism and BusySiMOn provide proper traffic prioritization.

  • BusySiMOn assures over 3.5 times higher network utilization than the four-way handshake mechanism.

  • The increase of the number of nodes in each domain does not meaningfully impact the per-AC throughput.

For EDCA without RTS/CTS the hidden nodes could not successfully transmit any data due to a large number of collisions. Therefore, these unsatisfying results are not presented here.

8 Estimation of energy consumption

In BusySiMOn the transmission of additional busy tone signals (Busy 1 and Busy 2) consumes additional energy to complete the reservation procedure, compared to the four-way handshake mechanism. In this section the power consumption overhead is analyzed.

8.1 Total energy consumption

The total energy consumed by a WLAN (Wireless Local Area Network) card includes (i) energy consumed when transmitting frames (e.g. DATA, RTS, CTS) or busy tones, (ii) energy consumed in the process of receiving frames, and (iii) energy consumed when the device is idle. It is obvious that more power is consumed when performing a data transfer than when receiving frames, however, power consumption of an idle device is also not negligible. In an idle state the WLAN device senses the wireless channel to detect its state and to detect the start of a new frame transmission. This consumes significant amount of energy.

Table 8 shows power consumed by several popular WLAN chipsets in each of the three states: transmission, reception, and idle [33]. As anticipated, the older cards (e.g., WaveLAN, Intersil PRISM I) manufactured with older technology consume more energy than modern IEEE 802.11 combo cards.

Table 8 Power consumption rates of different vendor 802.11 WLAN cards for transmission (Tx), reception (Rx), and idle states

8.2 Energy consumption overhead

We have compared power consumption of BusySiMOn v1 (which is always using the additional Busy 1 and Busy 2 signals) and EDCA with the four-way handshake mechanism enabled in a network without hidden nodes. In the comparison we assumed IEEE 802.11b as the default PHY layer. The wireless channel introduced no errors. The DATA rate was set to 11 Mb/s, and the basic rate was set to 1 Mb/s. The size of DATA frames was set to 1000 B. The network consisted of two nodes: one was receiving and the second was transmitting. Two different configurations were considered:

  • Configuration 1: transmission of Vo traffic, saturation conditions.

  • Configuration 2: transmission of BK traffic, saturation conditions.

Let the time period for which the WLAN card is in transition, reception, and idle mode be T t ,  T r , and T i , respectively. Additionally, let the power consumed in these states be P t ,  P r , and P i , respectively. Then, the energy consumption can be defined as P cons  = P t T t  + P r T r  + P i T i . Now we can derive the equations for a single transmission period of BusySiMOn and EDCA with the four way-handshake mechanism enabled. The transmitting and receiving nodes are marked with subscripts Tx and Rx, respectively.

$$ \begin{aligned} P_{cons} & [BusySiMOn_{Tx}] = \\ & = P_t \times (T^{Busy1}+T^{RTS}+T^{DATA}) + \\ & + P_r \times (T^{Busy2}+T^{CTS}+T^{ACK}) + \\ & + P_i \times (AIFS+Backoff+5\times SIFS) \\ P_{cons} & [BusySiMOn_{Rx}] = \\ & = P_t \times (T^{Busy2}+T^{CTS}+T^{ACK})+ \\ & + P_r \times (T^{Busy1}+T^{RTS}+T^{DATA}) + \\ & + P_i \times (AIFS+Backoff+5\times SIFS) \\ P_{cons} & [EDCA_{Tx}] = \\ & = P_t \times (T^{RTS}+T^{DATA})+ \\ & + P_r \times (T^{CTS}+T^{ACK}) + \\ & + P_i \times (AIFS+Backoff+3\times SIFS) \\ P_{cons} & [EDCA_{Rx}] = \\ & = P_t \times (T^{CTS}+T^{ACK})+ \\ & + P_r \times (T^{RTS}+T^{DATA})+ \\ & + P_i \times (AIFS+Backoff+3\times SIFS) \end{aligned} $$

Based on the presented equations it is possible to calculate the amount of energy required for a single DATA transmission by different WLAN cards using either BusySiMOn or EDCA with the four-way handshake mechanism enabled. Figures 7 and 8 present the consumed power defined in watts required for a single DATA transmission for Configurations 1 and 2, respectively.

Fig. 7
figure 7

Power consumption of 802.11 WLAN cards required for a single DATA frame transmission using BusySiMOn and EDCA with the four-way handshake mechanism enabled in Configuration 1

Fig. 8
figure 8

Power consumption of 802.11 WLAN cards required for a single DATA frame transmission using BusySiMOn and EDCA with the four-way handshake mechanism enabled in Configuration 2

The obtained results show that the difference in energy consumption during a single DATA frame transmission between BusySiMOn and EDCA can reach up to 6 %. This is caused by the additional signaling overhead introduced by the BusySiMOn protocol. The difference is smaller for a transmission state than for a reception state. Moreover, it is almost independent from the type of the IEEE 802.11 WLAN card. Finally, all WLAN cards consume more energy in Configuration 2 (transmitting BK traffic) than in Configuration 1 (transmitting Vo traffic). This is because of the lager Backoff periods of the node transmitting BK traffic compared to the Backoff periods of the node transmitting Vo traffic.

9 Comparison with other protocols

In this section we explain the differences in operation of BusySiMOn and other busy tone-based protocols (PUMA and Black Burst). Additionally, we clarify why we compared BusySiMOn only with the four-way handshake mechanism (operating together with EDCA) and not with other QoS-aware MAC protocols (cf. Table 1).

9.1 Busy tone-based protocols

PUMA and Black Burst both operate similarly. In Black Burst, nodes sending real-time traffic use pulses of energy, which are called Black Bursts (BB), to contend for medium access. The length of these pulses is proportional to the time the nodes had to wait for the channel to become idle. This delay is measured from the first attempt to access the channel by a node until its transmission starts. After transmitting its BB, the node waits for a specified time interval to see if any other node is transmitting a longer BB. If the channel is perceived idle after this interval, then the node can immediately transmit its real-time frame. Otherwise, it waits for the next channel access cycle and repeats the algorithm. In PUMA, all nodes sending real-time frames start its transmission simultaneously (after PIFS) and send a JAM signal. The JAM signal consists of pulses of energy and has the length of one slot. This signal informs all other nodes (especially nodes sending non real-time frames) that in their neighborhood a real-time transmission will begin.

In BusySiMOn the situation is slightly different because not only the sender but also the destination node transmits the jamming signals (Busy 1 and Busy 2, respectively). Additionally, BusySiMOn uses these signals to, most of all, alleviate the hidden node problem and not for traffic prioritization (cf. BusySiMOn v3). Traffic prioritization in BusySiMOn is realized through EDCA compatibility (in particular, the support of AC-dependent AIFSNCW and TXOPLimit values).

9.2 QoS-aware MAC protocols

The state of the art (Table 1) there are three types of protocols which support QoS:

  • Busy tone-based (Black Burst, PUMA): these protocols do not support the EDCA traffic categories defined by the IEEE 802.11 standard. Therefore, a comparison of BusySiMOn with this group of protocols would not be complete.

  • RTS/CTS-based (AA, M-VRMA, DRCE, EDCA/RR): not all of these protocols are backward compatible with EDCA. But most of all, their operation is based on the RTS/CTS frames (sometimes modified) and, therefore, they perform similarly to the four-way handshake mechanism in medium access. The Busy 1 and Busy 2 signals proposed by BusySiMOn are shorter than the signaling frames introduced by this group of protocols and, therefore, the probability of successful reservation of the wireless channel is higher for BusySiMOn. This was shown for the four-way handshake mechanism in our paper.

  • Binary countdown-based (RICK): the medium access method used by this group of protocols is not backward compatible with the IEEE 802.11 standard. Additionally, they do not support the access categories defined by EDCA.

Based on the above explanation, it appears reasonable that the performed comparison of BusySiMOn with the four-way handshake protocol (operating together with EDCA) is the most accurate and adequate.

10 Conclusions

This article has presented a new method of preliminary reservation of the wireless channel for IEEE 802.11 ad-hoc networks with hidden nodes. The simulation results have demonstrated that the currently used four-way handshake mechanism is inefficient, especially for high priority flows transmitted by hidden nodes. It has been shown that all three versions of the BusySiMOn protocol can improve network performance. The new solutions have been shown to outperform the four-way handshake mechanism not only in the case of physical collisions but also in the case of virtual ones. Furthermore, since the operation of BusySiMOn v3 is the most promising it is the best candidate for implementation in a real driver.

The key advantage of all three versions of BusySiMOn is the minimized risk of collisions of signaling data during the preliminary wireless channel reservation. This is of great importance especially for high priority traffic because it results in increased channel efficiency, reduced maximum frame delay and improved fairness among the nodes. Additionally, the combination of the preliminary reservation procedure with the RTS/CTS exchange and the unchanged values of the EDCA access parameters assures compatibility with mechanisms implemented in current wireless devices and makes it an ideal candidate for future, enhanced implementation.