Abstract
Throughput improvement of the wireless LANs has been a constant area of research. Most of the work in this area focuses on designing throughput optimal schemes for fully connected networks (no hidden nodes). The schemes are optimal in a sense that they maximize the sum throughput subject to giving equal channel access opportunity to each user. But, we demonstrate that the optimal schemes proposed in the literature, though perform optimally in fully connected network, achieve significantly lesser throughput even than that of standard IEEE 802.11 in a network with hidden nodes. This motivates designing schemes that provide near optimal performance even when hidden nodes are present. This problem is particularly challenging as mathematical models for networks with hidden nodes do not exist. Here, we consider the weighted fair throughput allocation policy that maximizes system throughput while guaranteeing that every user achieves a throughput that is proportional to their weights. We prove the optimality of the proposed scheme in a fully connected network. However, the specialty of the algorithm, as observed in the simulation study, is that it can provide the optimal throughput even in networks with hidden terminals. Unlike existing techniques, which use the mathematical model to derive invariant features, we attempt to maximize the throughput directly using stochastic approximation techniques, and hence does not require the estimation of any system parameters which can result in inaccurate predictions. Simulations show that our proposed policies perform better than the standard IEEE 802.11 protocol without or with hidden nodes present. Moreover, our proposed schemes outperform existing schemes when the network is not fully connected.
Introduction
IEEE 802.11 has emerged as one of the most popular access mechanisms for wireless local area networks (WLANs). Since its inception, significant effort has been made for improving the throughput of IEEE 802.11 [5,7,8,14,15]. Improving the throughput in WLANs is paramount in order to satisfy the ever increasing demand.
In this paper, we demonstrate that most of the proposed protocols though perform optimally for connected network (no hidden terminals), their throughput is lesser even than that of standard IEEE 802.11 in presence of hidden terminals. The protocols are optimal in the sense that they maximize sum throughput subject to giving fair channel access to each user. This motivates a need of designing schemes that not only perform well in connected networks, but also achieve near optimal throughput when hidden terminals are present. Our aim is to develop schemes to this end.
At the heart of the IEEE 802.11 lies the Distributed Co-ordination Function (DCF) based on CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance). DCF mechanism defines the channel contention mechanism and collision resolution scheme. Currently, DCF employs exponential backoff in which users cooperatively reduce their access probability upon collision. In [4], mathematical modeling of the CSMA/CA protocol is carried out to quantify the throughput performance of the protocol. In [4], the author has shown that the throughput offered by the IEEE 802.11 protocol with standard parameter values is much less than the best possible and degrades significantly with increasing number of users. Another key finding of [4] is: To design an optimal scheme that maximizes the system throughput while providing equal transmission opportunities to each station, it is sufficient to choose a single backoff window appropriately for each terminal, and one need not consider the exponential backoff. This implies that it suffices to consider p-persistent CSMA rather than the classical exponential backoff. Most of the proposals aimed at maximizing the throughput of IEEE 802.11 DCF propose algorithms to tune the access probability of p-persistent CSMA adaptively by statistical estimations of the parameters. For example, [5,9] estimate the number of users based on the number of busy slots observed in the system, and then choose appropriate access probability based on the obtained estimate. Key observation used in computing the optimal access probability based on the estimated number of users is that the product of the number of users and the optimal access probability is approximately constant. In the recently proposed IdleSense algorithm [14], the authors show that the number of idle slots remain constant when the access probability is optimally chosen. Thus, here the optimal access probability is obtained based on the estimated number of idle slots by each user.

Comparison of throughput of standard 802.11 protocol and IdleSense protocol without and with hidden nodes. The simulation was performed in ns-3 with nodes placed randomly and the results averaged over 20 iterations. The simulation parameters are given in Table 1. Hidden nodes are created by appropriately choosing the radius over which the nodes are distributed.
The work described above uses analysis similar to that in [4], which holds only under fully connected network in which every node can perform carrier sensing on the transmissions of every other node. This model fails in the presence of hidden nodes. Node i is hidden from node j if i is outside the sensing range of j, and as a result i cannot perform carrier sensing on j’s transmissions. Hence, it is not clear how the proposed schemes that are optimal in fully connected network would perform in presence of hidden nodes. To better understand the performance of the existing schemes in the presence of hidden nodes, we perform the following simulation in ns-3. We set parameters so that the transmission and sensing ranges are 16 and 24 units, respectively. Hence, a node can potentially decode (sense, resp.) transmissions from the nodes at distance less than or equal to 16 (24, resp.) units from it. We consider two types of network configurations, first without hidden nodes and second with hidden nodes. In the first case, nodes are placed uniformly on the edge of the disc with radius 8 units centered at the access point. In the second case, we place nodes uniformly at random in a disc of radius 16 units centered at the access point. Note that the maximum distance between the nodes is 32 units while the sensing radius is only 24 units, and hence there is a non-zero probability of having hidden node pairs. In Fig. 1, we compare the throughput of IdleSense protocol with that of standard IEEE 802.11 DCF with and without hidden nodes. These results are obtained after averaging over the 100 random topologies in each case. Specifically, after placing the nodes randomly, we verify whether hidden node pair exists, and average over such topologies. We choose IdleSense for comparison because it is the most recent protocol and has been shown to outperform the other existing schemes. From Fig. 1, it can be seen that while IdleSense performs significantly better than the standard IEEE 802.11 DCF in the fully connected network, but the protocol performs much worse when the hidden nodes exist. The reason for the failure of the IdleSense like algorithms in the presence of hidden nodes can be understood as follows. These algorithms are based on the mathematical model in [4] that govern the system. However when hidden nodes exist, the mathematical model does not hold. For example the target number of idle slots, while known for a fully connected network, may be different for networks with different hidden nodes configurations. Hence it is not possible to design the system with any particular value of the target idle slots in presence of hidden nodes. These observations motivate the need for schemes that not only perform optimally in fully connected network but also provide near optimal throughput in networks with hidden nodes.
Parameters used in the simulation (based on OFDM PHY with 20 MHz channel spacing [16])
Before proceeding further, the most important question that needs answering is the following: Do we really need to consider WLANs with hidden nodes? The question is important because mechanisms do exist to potentially eliminate hidden nodes. For example, use of RTS/CTS exchange in IEEE 802.11 based MAC eliminates hidden nodes. But this approach has its own limitations mainly because RTS and CTS messages are transmitted at the lowest rate while data can be transmitted at a much higher rate. For example, in IEEE 802.11a/g the maximum date rate is 56 Mbps while the RTS and CTS messages are typically transmitted at 6 Mbps [16]. Thus, overhead due to RTS/CTS exchange is significant even though these control messages have much smaller length than that of data packets. This affects throughput performance of WLAN adversely (see e.g. [18,30]). Hence, IEEE 802.11 standards recommend use of RTS/CTS exchange only for large data packets. This is accomplished by choosing system parameter called RTS threshold. If the length of data packet is above RTS threshold, only then RTS/CTS exchange is used. By default, RTS threshold is set to the largest possible value, which is 2347 octets [16]. Thus, the default setting ensures that the RTS/CTS exchange is not used. Since, default settings are rarely changed during the installation in practice, it is reasonable to consider WLAN operation in basic access mode, i.e., without RTS/CTS exchange.
Another approach to mitigate the hidden nodes is by choosing the sensing radius to be two times the transmission radius. Intuitively, since all the nodes have to be in the transmission range of access point, with this setting, they have to be in the sensing range of each other. Though this intuition may hold in open spaces, it may fail in spaces with obstacles, e.g. offices, universities. This is because obstacles may cause strong shadowing between nodes. Note that if the path between node i and node j is shadowed due to obstruction, then even though the receiver would be capable of decoding the data from both the nodes, the nodes will not be able to sense each other’s transmissions. Thus, this approach does not guarantee elimination of hidden nodes. This shows that hidden nodes cannot be fully eliminated with current approaches. Hence, it is not sufficient to only consider fully connected WLANs, rather we must consider WLANs with hidden nodes.
Now, lets understand challenges in designing throughput optimal schemes for WLANs with hidden nodes. First note that quantifying the throughput performance of IEEE 802.11 DCF in presence of hidden nodes has remained an open problem for over a decade [31]. To best of our knowledge, mathematical models for such networks are not available except for very restrictive special cases. In absence of general mathematical models, obtaining provably throughput optimal schemes remained illusive. It is worth remembering that the existing model for the fully connected network fails to provide any meaningful insight for the networks with hidden terminals. In view of these difficulties, it is not clear how one should design schemes that provide near optimal performance even in presence of hidden nodes. In our approach, we do not base the design of optimal scheme on any underlying model, rather we base it on the following simple observation: If the channel access probability is “small”, then the medium is underutilized resulting in low system throughput; on the other hand, if the channel access probability is “large”, then the system throughput is again low on account of excessive collisions. This intuitively implies that the system throughput as a function of the access probability is bell-shaped (technically quasi-concave). Thus, we can employ standard gradient ascent techniques to obtain the optimal access probability. Now, we just need to verify that the system throughput is indeed a quasi-concave function of the access probability. We prove the required for the fully connected networks, which proves the optimality of our approach in this case. However, in absence of a mathematical model for networks with hidden terminals, we verify the quasi-concavity using extensive simulations in ns-3. Of course, validation through simulations does not prove that our proposed scheme is optimal when hidden terminals are present, but it at least states that in the numerous random topologies that we investigated, our scheme is throughput optimal.
Another interesting question that we address is: How crucial exponential backoff is in presence of hidden terminals? Note that in a fully connected network, the exponential backoff has shown to be unnecessary, and optimizing attempt probability of a p-persistent scheme suffices in order to maximize the system throughput [4,5]. In this paper, we demonstrate that the exponential backoff based schemes can provide a higher throughput than that under any p-persistent scheme. Thus, p-persistent schemes may not be throughput optimal, rather exponential backoff based schemes must be considered when hidden nodes exist.
Our key contributions in detail are as follows:
First, we consider a weighted fair throughput allocation while maximizing the system throughput. A weighted fair throughput allocation implies that the throughput allocated to a node is proportional to the weight assigned to the node. Note that this is a generalized version of the system throughput maximization. When all weights are equal, weighted throughput maximization reduces to the system throughput maximization. We propose Weighted Fair Throughput Optimal p-Persistent CSMA (wTOP-CSMA) that is an on-line mechanism for tuning access probability of p-persistent CSMA. The tuning mechanism uses techniques from stochastic approximation theory [20] that provides a weighted fair distribution of throughput in a connected network. In this algorithm every user achieves a throughput that is proportional to its weight. This algorithm does not require the users to know the weights used by the other users. Thus, every user could dynamically change their weights and the system would still adapt.
We also propose Throughput Optimal RandomReset-CSMA (TORA-CSMA) that uses standard exponential backoff on transmission failure, but after successful transmission goes to zeroth backoff stage with probability (w.p.)
We show that both wTOP-CSMA and TORA-CSMA maximize system throughput while providing fairness, i.e. equal throughput to all users, in the connected network.
We also show that if the throughput is a quasi-concave function of the access probability in network with hidden nodes, then wTOP-CSMA maximizes the system throughput among all p-persistent CSMA schemes even when hidden nodes are present.
More interestingly, we show that TORA-CSMA provides better throughput than that of wTOP-CSMA in presence of hidden terminals. This demonstrates the merit of exponential backoff when network is not fully connected. Thus, p-persistent CSMA may not be a good choice for networks with hidden terminals.
The rest of the paper is organized as follows. Section 2 explains the system model that is considered in this paper. Section 3 provides the wTOP-CSMA policy and a proof of its optimality in the absence of hidden nodes. Section 4 describes an exponential backoff based policy that guarantees optimal throughput allocation in a fully connected network when all nodes have equal weights. Section 6 discusses about the performance of the proposed policies in the presence of hidden nodes and conditions under which the policies are optimal. Section 5 presents a discussion on the algorithms. Section 7 presents the simulations results from ns-3 simulations. Section 8 lists the existing literature on the performance improvement of the 802.11 protocol and compares the results with our work. Section 9 provides conclusion.
We consider a system with N nodes, and denote
For the channel access mechanism, we assume the following. Any node
A transmission by t to AP is successful if for the entire duration of transmission there is no other transmission by a node in
Though, we have not considered packet loss due to channel errors, such can be incorporated in our framework in a straightforward fashion provided that the channel errors are independent and identically distributed over all transmissions.
Standard exponential backoff mechanism refers to that used in IEEE 802.11. Here, after i successive transmission failures,
In p-persistent schemes,
In this paper, we propose RandomReset scheme. Broadly this scheme performs exponential backoff on transmission failures, but unlike standard exponential backoff scheme, on successful transmission, it does not return to backoff stage 0 with probability (w.p.) 1. Instead it probabilistically chooses a backoff stage.
In this paper, we consider both p-persistent and RandomReset mechanisms and show that their parameters p and
A channel access scheme is said to be throughput optimal if it maximizes the system throughput while ensuring that each node has the same attempt probability.
In this paper we also consider weighted fair throughput optimal schemes in which each node is pre-assigned with a weight indicating the priority of the user. A weighted fair throughput optimal scheme is defined as follows.
A channel access scheme is said to be weighted fair throughput optimal if it maximizes the system throughput while ensuring that the throughput obtained by each node is proportional to its weight.
In the following sections, we describe the proposed wTOP-CSMA and TORA-CSMA, and prove their throughput optimality in a fully connected network.
Here, we describe the Weighted Fair Throughput Optimal p-persistent CSMA algorithm (wTOP-CSMA). We show that a weighted fair throughput allocation can be achieved by tuning a single variable. We then present an on-line algorithm to tune the variable to obtain optimal performance.
Problem formulation
Let each user
This problem is a constrained optimization problem over an N-dimensional space. In an adaptive setting this would require tuning of N variables. We show in the subsequent theorem that this problem can be reduced to a one-dimensional problem with a single control variable.
The idea of a weighted fair throughput allocation has been discussed in [28] and [21]. These works, while providing a weighted throughput allocation fail to provide an optimal throughput. In our work we consider a system throughput maximization problem under the constraint of a weighted throughput allocation.
From the system definition it is possible to see that the throughput obtained by station t is given by
Here
In a fully connected network using the p-persistent channel access scheme
Note that the relation between the throughput of i and j is independent of the attempt probability of the other stations in the system.
In the throughput equation for station t given by (2) it can be seen that the values of
If every station uses
In the next theorem we show that the optimization problem in (1) can be reduced to
The optimization problem in
From Lemma 1 it is seen that, for some arbitrary p, if the attempt probability of station t is
From the above theorem it is seen that to obtain the weighted fair throughput optimal policy it is sufficient to tune a single variable. We shall use an adaptive algorithm to tune the variable. Before presenting the algorithm, we explain the intuition that led to the design of the algorithm. Consider a fully connected network with N nodes. For this discussion we will assume that ever user is assigned a weight of 1. Bianchi has shown that the there exists a unique access probability (say
In [17], Kiefer and Wolfowitz have given an algorithm to obtain the maximum of a regression function using its stochastic estimates. Consider a function
There exists β and B such that
There exists ρ and R such that
For every
The working of the algorithm can be understood by comparing it with the gradient ascent algorithm given as follows

wTOP-CSMA algorithm to track the optimal value of the control variable p
To obtain a weighted fair optimal p-persistent scheme, we need to tune the control variable p. Each node can then use this control variable and the node’s weight to arrive at the attempt probability that the node should use. Tuning p can be done using the pseudo code presented in Algorithm 1. We term this algorithm wTOP-CSMA since this algorithm achieves a weighted fair throughput optimal system using the p-persistent scheme. Next, we explain Algorithm 1 in detail.
The first part of the algorithm is implemented at AP. The working of the algorithm can be understood as follows. From (5) it can be seen that for adaptively varying p we need
The algorithm has one parameter:
Performance guarantees of wTOP-CSMA
It can be seen that the wTOP-CSMA converges to the optimal transmission probability provided that the throughput function satisfies the regularity conditions. In the following theorem, we show that the throughput function indeed satisfies the regularity conditions. First, let us define
In a fully connected network
To show that
By differentiating (6) with respect to p, we obtain
It is clear that
Furthermore, since
Figure 3 shows the bell shaped nature of the curve as proved in the above theorem. Note that
In a fully connected network, it has been shown that the exponential backoff based scheme can be replaced with a p-persistent CSMA scheme without affecting the performance; this is, however, not obvious in a network with hidden nodes. As seen from the simulations later, in a network with hidden nodes, it is possible that the optimal p-persistent scheme can perform worse even than the standard 802.11 protocol. This shows that an exponential backoff based scheme may have an advantage when hidden nodes exist. Hence, in this section we design an exponential backoff based scheme that can be tuned to achieve optimal performance in a fully connected network. We use this scheme instead of standard IEEE 802.11 DCF to better understand the merit of the exponential backoff based schemes in presence of hidden terminals. Since, our main motivation is only to assess the need of exponential backoff based schemes in networks with hidden terminals, for simplicity, we only consider throughput optimal schemes, i.e. we assume that all nodes have the same weight.
First, let us formalize our notion of the exponential backoff based schemes:
An access mechanism is said to be exponential backoff based if (1) the contention window size lies in
Note that the exponential backoff based schemes are defined in terms of their actions on transmission failures only, and their actions on transmission successes are not specified. Thus, designing an optimal backoff based scheme amounts to optimally choosing a backoff stage for a terminal when its transmission is successful. We consider the following generic class of the exponential back-off based schemes in which each node uses a reset distribution denoted by
Observe that the class we consider is not the class of all exponential back-off based schemes. One example of the exponential back-off based scheme that lies outside the class that we consider is the following: Each node maintains reset distribution
Now, to obtain optimal exponential back-off scheme, we need to obtain appropriate reset distribution
A
We term
In a fully connected network
Though we claim the optimality of TORA-CSMA only in the class of exponential back-off schemes, a more general result is true. Specifically, it can be shown that there exist
Two key steps in the proof of Theorem 3 are: (1) We prove that the throughput function of the

TORA-CSMA algorithm to track the optimal value of j and
In this section, we discuss advantages and limitations of the proposed algorithms. The wTOP-CSMA and TORA-CSMA algorithms are optimal in a fully connected network. The key feature of these algorithms that separates them from the existing proposals is that these do not depend upon any underlying model, rather they act directly on the gradient of the throughput function. This feature makes them more robust towards scenarios in which proposed mathematical models do not hold.
Note that both the algorithms are centralized. While most of the existing algorithms are distributed algorithms, in our opinion, for infrastructure based WLANs implementation of the centralized algorithms would not pose many problems. Furthermore, having the intelligence in a centralized controller would facilitate easy modifications for performance improvements. Indeed, with the advent of IEEE 802.11e standard [16], the process of shifting responsibility of smart, socially optimal decision making to the centralized controller has already begun. Moreover, in a dynamic scenario in which users arrive and depart, the distributed algorithm may not converge to the socially optimal point as the users already in the system will have to compete with the new arrivals that tend to have very different initial values of control parameters.
Now, our algorithms require that the parameters be passed in ACK packets. Though under TORA-CSMA it is sufficient for a node to process its own ACK, under wTOP-CSMA a node has to process all the ACK packets which is not desirable. However, wTOP-CSMA can be modified to use beacon frames to send the parameters.
Comparing the two algorithms, it can be seen that using a p-persistent CSMA provides the benefit of being able to achieve weighted fairness in a straightforward fashion. This is not easy in TORA-CSMA, since the throughput relation to the reset parameter
Note that we have not considered channel errors in our model. Here, we describe how these can be incorporated in our analysis. We consider connected network and p-persistent CSMA. Let us first consider the impact of channel errors. We assume that the channel errors are i.i.d. across the transmissions from a user and independent across the transmissions of differ users. Let
Now, let us consider the issue of designing weighted fair throughput optimal schemes (see Definition 2) in presence of channel errors. Note that we need, for every i, j,
Generalizing our analysis for exponential backoff based scheme in presence of channel errors in not straightforward unless the channel errors can be detected. This is because for the given value of
Performance of the policies in the presence of hidden nodes
In a fully connected network a number of different algorithms have been proposed for throughput improvement. All these suggestions arrive at the required transmission probability that provides optimal throughput. If the number of stations in the system is known, then this transmission probability can be directly computed. However, this reasoning cannot be extended to the case of hidden nodes. This is because even if the number of stations are known beforehand, the number of possible configurations in which these stations could exist is large (exponential in N). Here, configurations refer to various possibilities for
Analysis of hidden nodes has been an open problem for over a decade. There has been different attempts at providing a mathematical model to analyze hidden nodes [31]. However such attempts perform a simplification or consider restricted conditions. Obtaining an analytical model for hidden nodes is a complicated task owing to various reasons. One main hurdle is that in the presence of hidden nodes the system can no longer be modelled using an embedded Markov Chain. The renewal equation used by Bianchi is no longer applicable. Hence in [31] a fixed width slot model is studied for a system with two nodes hidden from each other. In this work this model is shown for a system with two nodes. However, this model becomes intractable even for small number of nodes (greater than 2).
The lack of a mathematical model acts as an obstruction in the design of adaptive algorithms. Algorithms that perform optimally in a fully connected network cannot be shown to perform optimally (or even better than standard 802.11) when hidden nodes are introduced. In our work, while we do not eliminate this problem due to hidden nodes we show through extensive simulation that our algorithm can perform better than standard 802.11 even when hidden nodes exist. The reason for this can be explained intuitively as follows. The two optimal policies defined in Sections 3 and 4, namely, wTOP-CSMA and TORA-CSMA, are defined to track the actual throughput. Specifically, these algorithms attempt to maximize the throughput directly using a stochastic approximation technique by taking a short term measurement of the actual throughput obtained from the system, and then dynamically tune the system parameters to increase the throughput. The major advantage of these algorithms are that they have no binding on the mathematical model, but depend only on how the throughput varies as a function of the control variable. As long as the throughput is a differentiable quasi-concave function of the control variable, the Kiefer–Wolfowitz algorithm can obtain its optimal value. Unfortunately, it is not possible to prove analytically (even with a reasonable degree of approximation) that the function is differentiable and quasi-concave in presence of hidden terminals. Though a mathematical model does not exist when hidden nodes exist, it can be expected that the throughput is still a quasi-concave function of the attempt probability. This is because for a small access probability, the throughput is small as the medium is under-utilized while for a large access probability, again the throughput is small because of excessive collisions. Thus, the throughput should increase until certain value of the access probability and decrease for the higher values, thereby yielding quasi-concavity. Further in extreme situations where the throughput is not quasi-concave, the system would still tune the probability to one of the local maxima. Hence it can be expected that the wTOP-CSMA and the TORA-CSMA algorithm perform better than standard 802.11. We show this through simulations in ns3. Also through simulation we obtain the plot of the throughput as a function of the attempt probability. For the numerous random topologies that we simulated it was observed that the throughput is a quasi-concave function of the control variable. Thus except for extreme cases, the proposed algorithms would perform reasonably well even when hidden nodes exists.
Simulation results
The IdleSense, wTOP-CSMA and TORA-CSMA algorithms are implemented in Network Simulator 3 (ns3) and their performance was compared without and with hidden nodes. The parameters used in the simulations are given in Table 1. The last two parameters, namely ns3::YansWifiPhy::EnergyDetectionThreshold and ns3::YansWifiPhy::CcaMode1Threshold ensure that nodes placed at a distance greater than 24 m do not sense the transmissions of each other. Such nodes behave as hidden nodes.
In the simulation of wTOP-CSMA and TORA-CSMA, the
Performance of wTOP-CSMA in a fully connected network
The simulation of wTOP-CSMA was carried out in a fully connected network by assigning weight to each node. The results of the simulation are shown for 10 nodes in Table 2. As can be seen the normalized throughput obtained by every node is the same. Also a total throughput of 22 Mbps is obtained.
Simulation results of wTOP-CSMA algorithm
Simulation results of wTOP-CSMA algorithm
In the subsequent part, for comparison it is assumed that all users have equal weights.

Comparison of throughput of standard 802.11 protocol, IdleSense and TOP-CSMA and TORA-CSMA policies in fully connected network.

Throughput of the p-persistent CSMA versus the attempt probability.

Throughput of the RandomReset-CSMA policy versus
In Fig. 2 the throughput plots of the IEEE 802.11, IdleSense, TOP-CSMA and TORA-CSMA as a function of the number of stations are shown. It is observed that TOP-CSMA and TORA-CSMA perform much better than the Standard 802.11 protocol. Also the throughputs obtained are as good as that obtained using IdleSense. However one advantage of the TORA-CSMA over the TOP-CSMA can be seen by comparing Figs 3 and 4. The RandomReset-CSMA exhibits a more flat characteristics about the maxima while the p-persistent CSMA has a sharper fall from the maxima. This indicates that if the control variable oscillates around the optimal the throughput variations would be lesser for TORA-CSMA than that for TOP-CSMA.
Performance in the presence of hidden nodes
We generate the networks with hidden nodes as follows: The nodes are created by randomly placing them in a disc of suitable radius with the Access Point at the center. The radius of the disc determines whether hidden nodes exist. Also, larger the radius more is the probability of hidden nodes. For the parameters that we configured in NS3 hidden nodes occur when the distance between the nodes is more than 24 m. Hence we consider the radius to be 16 m or 20 m for creating situations with hidden nodes scenarios. Scenario with radius 16 m (20 m, resp.) is referred to as case 1 (case 2, resp.) in the following discussion.
Quasi-concavity of throughput
For using the Kiefer–Wolfowitz algorithm it was required that the throughput is a quasi-concave function of the control variable. For a network with hidden nodes, since this cannot be shown analytically, we present evidence of it through simulations. We verify the required by placing nodes randomly in a radius of 16 m or 20 m which creates a hidden node scenario. Subsequently, we compute the throughput for various values of the control variables in the generated network. In Fig. 5, the variation of the throughput of a p-persistent CSMA as a function of p is shown, and in Fig. 6, the throughput of the RandomReset CSMA as a function of

Throughput of the p-persistent CSMA versus the attempt probability in the presence of hidden nodes.

Throughput of the RandomReset-CSMA policy versus
The comparison of the performance of IEEE 802.11, TOP-CSMA and TORA-CSMA, averaged over 100 random topologies, is shown in Fig. 7 and in Fig. 8 for the two scenarios. One key observation is that, unlike in the fully connected network, TORA-CSMA performs better than the wTOP-CSMA in the network with hidden nodes. However as discussed in Section 4, the TORA-CSMA algorithm may not be the optimal exponential backoff algorithm. The results show evidence that exponential backoff algorithm perform better than an optimal p-persistent channel access scheme when hidden nodes exist.

Comparison of throughput of standard 802.11 protocol, TOP-CSMA and TORA-CSMA policies with nodes distributed in a disc of radius 16 m.

Comparison of throughput of standard 802.11 protocol, TOP-CSMA and TORA-CSMA with nodes distributed in a disc of radius 20 m.
Comparison of average idle slots and throughput obtained for 40 users with and without hidden nodes by different schemes (hidden nodes case 1 and case 2 refers to two runs of the simulation in ns3)
From the simulation another inference that can be made is the reason for the failure of algorithms like IdleSense. In Table 3 the idle slots obtained by the IdleSense algorithm and the wTOP-CSMA algorithm is shown for a typical network topology. The first row shows the results when no hidden nodes are present while the second and third row show the results when hidden nodes are introduced. In each case IdleSense algorithm achieves a target average Idle slots per transmission value close to 3.1 as desired. However, from the results of wTOP-CSMA it can be seen that the target idle slots achieved is different for different scenarios. While it is close to 3 (4.8) when no hidden nodes exist, in the presence of hidden nodes it varies as 9 and 25. This shows that based on the configuration of the hidden nodes, the optimal idle slot per transmission value would vary. Hence it is not possible to choose a particular value when using the IdleSense algorithm. However, since our algorithm does not depend on system parameters, it still manages to track the optimal and achieve a relatively higher throughput.
Another factor to be considered in the implementation of an adaptive protocol is the speed of convergence of the protocol, and the effectiveness of the protocol in changing conditions. In this case, the changes refer to the change in the number of active nodes N. We study the performance of wTOP-CSMA algorithm when N changes at predefined time instants. In Fig. 9, the variations in throughput as a function of time is shown (the number of users is indicated along the right y-axis). Note that the throughput does not change very much even as N changes when no hidden nodes exists. From Fig. 10, it can also be seen that the system quickly adapts to changes and converges to the optimal probability value. Thus, the algorithm suggested can handle dynamic conditions by modifying the control variable on-line as the number of users vary.

Variation of throughput as the number of stations vary.

Variation of p as the number of stations vary.
There has been a number of attempts at designing algorithms that improve the throughput of IEEE 802.11. The key issue is the degradation of the throughput with increasing number of nodes. In this section we review the existing work on throughput improvement of IEEE 802.11.
One of the first studies of the standard 802.11 was done in [4] where the author provides a mathematical model to analyze the throughput of 802.11. The same author in [5] also suggests an adaptive algorithm to improve the throughput of the protocol. The improvement is based on the idea that the optimal attempt probability is a function of number of users and hence by estimating the number of users the attempt probability can be chosen appropriately. However, the estimate of the number of users require the current value of the attempt probability and there is no way to ensure that every station uses the same attempt probability. For newly arriving stations the attempt probability being used is not known and hence it may cause unfairness to new users. Further, the optimal access probability depends on
In [8,9] the authors again reduce the standard 802.11 to a p-persistent CSMA, and attempt to dynamically vary the attempt probability. The idea in this work is to keep the expected collision duration and the expected idle duration equal by tuning the attempt probability. To achieve this it is required to estimate the number of active stations which is done by measuring the average number of idle slots in a transmission time. However, this method does not work when hidden nodes are present as a proper estimate of the collision probability and average idle slots is no longer possible. The Asymptotic Optimal Backoff Mechanism defined in [7] is an extension of the work in [8,9] where the optimal transmission probability is found by attempting to keep the slot utilization level at an optimum value called the Asymptotic Contention limit. This slot utilization level is achieved only asymptotically. Further this measure of the slot utilization cannot be done in the presence of hidden nodes.
In [27], the authors suggest a slow Contention Window decrease rather than an immediate reset. This improves the throughput since the stations are less aggressive on success. However there is no guarantee of optimality of this protocol and as seen from the results presented in their work though there is an improvement over the standard 802.11 the throughput still degrades as a function of number of users.
In [15], a dynamic optimization is provided which estimates the approximate number of users and sets a contention window based on the range in which the number lies. This also uses a centralized AP based approach for optimization but requires an estimate of the number of users. The optimal contention window is transmitted in the beacon frame with which every station updates the
Another improvement is the Idle Sense protocol given in [14]. IdleSense tunes the attempt probability so that the expected number of idle slots between transmissions remains a constant. Apart from throughput improvement the authors discuss about other factors like short term fairness and time fairness of the protocol. The short term fairness in the protocol is obtained as a result of reducing the binary backoff to a single p-persistent model. Further time fairness is an extension of the p-persistent CSMA model to provide a transmission probability that depends on the rate of transmission. Both these techniques can be extended to any p-persistent CSMA system including our system. However, as shown in our work the simple p-persistent CSMA cannot perform optimally in the presence of hidden nodes and hence a binary backoff is preferred. Furthermore in the Idle Sense protocol the optimal number of idle slots depends again on
In a recent work in [26] the authors suggest an improved backoff algorithm that looks at the history of channel utilization and uses a backoff that is non-binary. That is the algorithm attempts to increase the backoff window by α rather than a fixed value of 2. Like [27], though the protocol does perform better than IEEE 802.11, it does not perform optimally.
The idea of a weighted fair throughput allocation, discussed in our work, has also been dealt with in other works. In [28] the authors arrive at the condition required for achieving weighted fair throughput allocation. Also the contention window to be used by each user for obtaining an optimum throughput is found. However the value of the optimal contention window depends on the number of users in each class. Thus every user in the network must be aware of the number of priority classes and number of users in each class. In [12] the authors consider only two classes of users. The contention window is arrived at numerically and hence requires an offline calculation based on the number of users in each class. In [21], the authors suggest a modification to the algorithm to support weighted fairness. In this work while the throughput allocation is proportional to the weight of the user, it is not optimal. While it is shown that different attempt probabilities provide different throughput, no algorithm to achieve the optimal throughput is suggested. Unlike these works, our algorithm requires no knowledge of the number of users in different classes. The user is free to choose a weight independent of the other users and still obtain the optimal weighted fair allocation of the bandwidth.
Recently in [23,29] the authors propose an algorithm to achieve α-fairness for a general value of α. Here, every user chooses an attempt probability that maximizes a certain utility function given the attempt probabilities of others. This process is done iteratively until the attempt probabilities converge. While the proposed algorithm provides good results, it also has some limitations. The algorithm requires that every user knows the attempt probability of every other user. This information can be obtained by message passing or through estimation. In a message passing technique, the number of messages passed for every iteration of the algorithm is of the order of the number of users in the system. Estimation, on the other hand, requires every user to process all packets in the network which is not desirable from a power consumption viewpoint. Also, the algorithm assumes that packet transmissions complete within a single slot. This assumption models a slotted Aloha kind of systems, and is far from an IEEE 802.11 based system in which packet transmission spans over multiple slots and CSMA is used. Other notions of fairness are also considered, e.g. [2] considers time fairness, [3,13] considers proportional fairness and [19] explores equivalence between these two fairness notions.
Game theoretic approach for rate adaptation and/or channel selection with utility being users’ throughput is consider in [11,24]. However, the price of anarchy is shown to significant [11]. Thus approach to find an efficient Nash equilibrium is required.
In [1,22], authors consider not saturated case and obtain throughput expression under some assumptions on the arrival process. The authors here do not propose the optimal scheme.
Another area of related study is the modeling of hidden nodes and the performance measurements in the presence of hidden nodes. Very few work exists that attempt to model the hidden nodes scenario and predict the system performance. One of the recent works in [24,25,31] show that existing modeling techniques would not work in the presence of hidden nodes and new approaches are required. In [31], the authors suggest a fixed slot technique and are able to model the system only when there are two nodes present. For a more general setup the system becomes too complicated to analyze mathematically. In [25], authors model the system as a continuous time Markov chain and using certain approximation obtain throughput expression for a given topology. Here, authors’ experiment demonstrate that the throughput is an quasi-concave function of the attempt probability. In [24], the game theoretic approach is proposed. The schemes proposed here may not be optimal.
Conclusion
In this work, we have a suggested a simple modification to the CSMA/CA protocol of the 802.11 standard. Unlike previous work, here the throughput is directly maximized by tuning a single control variable using stochastic maximization technique, specifically using the Kiefer–Wolfowitz algorithm. Two policies are suggested – one in which the control variable is the attempt probability of the p-Persistent CSMA and another in which the control variable is the probability of returning to the lowest backoff stage on success. The modified algorithms wTOP-CSMA and TORA-CSMA are shown to perform significantly better even in the presence of the hidden nodes. It is seen that a binary backoff method works much better in the presence of hidden nodes as compared to the optimal p-Persistent CSMA. Further the wTOP-CSMA can also guarantee weighted fairness in a fully connected network.
Footnotes
Proof of Theorem 3
First, we define some terms that are used in the proof. Let
Following lemma, proves the uniform continuity of
The monotonicity property can be understood from Fig. 11. From the plot it can be seen that since
In the following lemma, we first establish some structural properties of the term in
Now, we establish monotonicity of the attempt probability under RandomReset policy.
Next, we show that the
Now we prove that the throughput obtained by a
The quasi-concavity can also be seen in Fig. 4.
Thus the TORA-CSMA algorithm which uses the Kiefer–Wolfowitz stochastic maximization technique converges to the optimal value of
