Abstract
In-band simultaneous transmission between an access point (AP) and a node was enabled by recent full-duplex radio communication research. While this event was expected to increase throughput within the feasibility of full-duplex radio communication, the conventional Medium Access Control (MAC) Distributed Coordination Function (DCF) protocol in wireless local area networks (WLAN) limits this performance enhancement. Each node competes for transmission opportunities because DCF is based on half-duplex communication principles. The competition among nodes and an AP creates excessive overhead and many collisions. In this paper, we propose a new MAC protocol called Reservation-Based Medium-Access Control (RMAC) based on node reservation in WLAN with full-duplex radio. RMAC is compatible with DCF. RMAC decreases collisions by reducing the number of competing nodes and increases throughput by reducing competition overhead. Our RMAC assures nodes a transmission opportunity without collision if a node has several packets to send. We show that RMAC achieves at least 86.3% more throughput than full-duplex radio based on DCF. The RMAC protocol also maintains high throughput even in cases of dense node deployment.
Introduction
In conventional WLAN operation, nodes are equipped with half-duplex radio. Because nodes cannot send and receive simultaneously using half-duplex radio, WLAN nodes need a channel access mechanism. DCF is based on the Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) method and is a widely used MAC protocol in several wireless communication standards. In DCF, nodes choose the back-off number randomly and wait until the back-off number is zero, thus avoiding collisions in a distributed manner. Despite the randomly chosen back-off number, DCF cannot assure that nodes communicate without collisions because some nodes attempt to send simultaneously. As the number of WLAN nodes increases, the number of competing nodes increases, and the probability of simultaneous transmission among nodes also increases. This means that when nodes are densely deployed in a WLAN, the efficiency of DCF is degraded because the competition and collision probability among nodes have increased.
In general, one AP is associated with many nodes; therefore, relatively, APs compete more frequently to get more transmission opportunities. However, some applications, such as peer-to-peer services (e.g., file sharing), VoIP (e.g., skype), and cloud storage (e.g., google drive) require more uplink transmission opportunities and have more uplink traffic volume [7]. VoIP or applications requiring short-interval and continuous transmission incur continuous node competition; therefore, the weight of uplink node transmissions will increase to satisfy various application requirements. When the number of uplink transmission attempts increases, throughput seriously degrades because of the collision increment among nodes. Therefore, we need a new approach to solve these problems.
Recently, in-band full-duplex radio technology has been developed using the Self-Interference Cancellation (SIC) model [1,5]. With in-band full-duplex radio, a node’s ability to send and receive simultaneously not only improves throughput but also enables continued operation even when the nodes are densely deployed. In addition, node transmission competition is halved during competition. Since competition among nodes must be settled within a fixed time, the amount of competition becomes more important as the transmission rate increases. However, since DCF was developed only for the half-duplex radio environment, it limits the performance enhancement of full-duplex radio; thus giving rise to the need for developing a new MAC protocol for full-duplex radio. Several MAC protocols have been proposed, but prior research [4,8,15,16,18] focused on full-duplex communications, especially asymmetric transmission as shown in Fig. 1(b). We focused on full-duplex radio applications to enhance transmission performance even if the nodes were densely deployed because nodes equipped for full-duplex radio can send and receive simultaneously on the same channel.

Full-duplex communication cases (a) bi-directional transmission (b) asymmetric transmission.
In this paper, we propose a simple and efficient MAC protocol based on a reservation scheme for full-duplex WLANs. In our research, we chose an environment containing one AP and nodes equipped with either full-duplex or half-duplex radio transmission capability. Our research satisfies the three system problems of design, wasted computational time, and determinism to improve data throughput as described below.
Reduce waste time: Using full-duplex radio protocol, our RMAC reduces competition among nodes to decrease collision probability even when nodes are densely deployed. It has been proven that collision probability is affected by the number of nodes [6,17]. In our research, the number of nodes vying for the right to transmit is decreased, so the competition time is reduced.
Deterministic full-duplex transmission: For full-duplex transmission to maximize its full-duplex radio performance, an AP needs to recognize with low overhead whether a node has a packet to send. In our research, we used a single bit contained in the MAC header for full-duplex transmission. With this, we support deterministic full-duplex transmission between an AP and a node.
Compatible design: Our proposed MAC protocol operates even when nodes with full-duplex radio coexist with nodes with half-duplex radio using DCF in the same network. Nodes with half-duplex radio capability operate well without any modification.
To achieve the above goals, we had to make reasonable assumptions that can be applied in any practical environment.
Bi-directional transmission: As shown in Fig. 1, there are two types of full-duplex radio communication. Bi-directional transmission is an ideal transmission case because an AP and a node communicate without collisions during full-duplex transmission. In contrast, asymmetric transmission can be applied more frequently in practical environments. However, to support asymmetric transmission, an AP must be able to identify the location of hidden nodes. Despite this requirement, it is difficult to completely prevent collisions during full-duplex transmission. Since collisions degrade throughput, we considered bi-directional transmission only in our research.
Padding: If successive transmissions in either the downlink or uplink do not terminate simultaneously, then transmission padding is added to the shorter packet so that both packets terminate simultaneously as shown in Fig. 2.
Padding transmission example for full-duplex radio.
Hidden node problem. We assumed that the problem of hidden nodes was negligible because a full-duplex radio AP is able to detect hidden nodes without any additional method (e.g., RTS/CTS) as depicted in Fig. 3.

Principle of hidden node detection in full-duplex WLAN (a) uplink is the preceding transmission (b) downlink is the preceding transmission.
Given the above assumptions, our RMAC achieves high throughput compared with the DCF technique based on both half-duplex radio and full-duplex radio.
The remainder of the paper is organized as follows. We briefly discuss related research in Section 2, our RMAC protocol design is described in Section 3, evaluation results are presented in Section 4, and conclusions in Section 5.
Most MAC protocols for full-duplex radio support asymmetric transmission. Because of the collision probability during asymmetric transmission, nodes should be hidden during asymmetric transmission. In most schemes, to realize asymmetric transmission, information exchange between an AP and a node is required. In [8], nodes used a busy-tone signal during the time between reception of the MAC header and the data for information exchange. In [18], nodes exchanged signatures before sending a packet. In [8,18], it was important to synchronize nodes to implement both time-sensitive schemes. In [4], nodes used RTS and modified CTS (FCTS) to set link-establishments for both bi-directional and asymmetric transmission. Before sending a packet, nodes (bi-directional and asymmetric) send an RTS or an FCTS signal. RTS/FCTS signals in [4] suppressed collisions during asymmetric transmission despite the RTS and FCTS exchange overhead.
In [15,16], the authors claimed that nodes could decode by using a capture effect method. Using a capture effect method, when a node receives two colliding packets, it is able to decode the stronger packet of the colliding packets. In these schemes, nodes use a modified RTS frame to report the signal-to-interference ratio (SIR) and make an SIR map for the establishment of asymmetrical dual links. With this information, an AP can determine whether a node receives a packet from the AP or is sending a packet to the AP.
In [10,12], an orthogonal frequency division multiplexing (OFDM) subcarrier was used to solve the transmission inefficiency resulting from uneven packet sizes between the uplink and downlink. This scheme supports asymmetric transmission without information exchange for finding hidden nodes. By using an OFDM subcarrier, nodes receiving a packet from an AP can recognize collisions. Although this scheme offers additional transmission opportunities, when the nodes are densely deployed, throughput improvement is limited.
In [11], Janus, an AP-based MAC protocol with reservation like our RMAC, was employed. Janus consists of three phases. In Phase 1, the scheduling preparation period, an AP queries all nodes to determine whether they have packets to send. After gathering information from nodes, the AP schedules the transmission sequence and transmission time for nodes and then broadcasts a scheduling packet containing the schedule information. In Phase 2, the AP and nodes exchange packets by following the AP schedule. In this period, asymmetric transmission is allowed because the AP has scheduled and notified all nodes as to when they are to start sending a packet. In Phase 3, the AP and nodes transmit a Request Acknowledgement (RA) and ACK during packet-exchange period. Since the AP is centralized, the Janus protocol supports asymmetric transmission with efficient performance, however, it has limitations. First, the Janus protocol requires excessive overhead because an AP must gather information packets from all candidate nodes. In addition, the AP schedules nodes efficiently, even if the transmissions of nodes are overlapped. This requires a highly complex AP. Also, as the number of nodes increases, the information gathering and scheduling time increases. Second, since Janus is a full-duplex MAC protocol, it is not compatible with the half-duplex DCF technique. Our RMAC, however, not only minimizes the information gathering overhead but also enhances compatibility. We summarize the characteristics of the full-duplex MAC protocols surveyed in this section in Table 1.
Full-duplex MAC protocol characteristics
Full-duplex MAC protocol characteristics
Our RMAC protocol based on the node reservation approach was designed for full-duplex WLANs. Because our RMAC uses a centralized AP scheme, APs need to recognize when a node has a packet to send for deterministic full-duplex transmission. In addition, an AP negotiates the sequence of transmission to nodes and the time to transmit. In this section, we describe our experimental environment and the details of our RMAC.
Overview
In our RMAC scheme, we assume that the APs are equipped with in-band full-duplex radios and the nodes are equipped with either full-duplex radio or half-duplex radio. Our RMAC scheme has two types of periods, one being a contention period for nodes equipped with both a full-duplex and a half-duplex radio, and the other a reservation period for nodes equipped with a full-duplex radio only.
During the contention period, the AP operates in half-duplex communication mode when it communicates with a node equipped with a half-duplex radio. On the other hand, when the AP communicates with a node equipped with full-duplex radio, it performs full-duplex transmission. During communication with full-duplex nodes, the AP gathers information to determine whether a node has more than one frame in its buffer. To minimize the information gathering overhead, we used the More Data bit in the frame control field of the 802.11 MAC header (Fig. 4) [9]. In the previous 802.11 standard, the More Data bit was used to notify a node using Power Save (PS) mode that an AP had more data to send. In our RMAC protocol, we used the More Data bit to check whether a node buffer contained several frames. If the node sends a frame with its More Data bit set, then it considers itself reserved and does not compete during the contention period because our RMAC protocol promises reserved nodes a transmission opportunity without competition or collisions. As a result, the number of competing nodes is reduced.

Structure of Frame Control field in 802.11 MAC header.
During the reservation period, the AP sends a frame (data or poll) sequentially to a reserved node. When the node receives a frame from the AP, it has an immediate full-duplex transmission opportunity. If the AP sends and receives frames with all reserved nodes, the AP sets the time for the next reservation period and automatically begins the contention period. In our RMAC protocol, since all nodes do not require information for each period, the AP does not send a notification control frame for each period.
Since a reservation period is required only for full-duplex transmission, it is important to determine the duration of each period. Although nodes communicate with APs without collision in the reservation period, it is also important to reduce collisions in the contention period because half-duplex nodes, unreserved full-duplex nodes, and new incoming nodes can use a channel only during the contention period. In our RMAC protocol, we classified nodes as reserved and unreserved. Reserved nodes include nodes that succeed in sending a frame with the More Data bit set as 1.
Duration
During the reservation period, the AP sends a frame to all reserved nodes consecutively. Predicting the time of the reservation period is difficult because the AP cannot estimate the uplink duration of a reserved node. Alternatively, our RMAC protocol defines the start time of the reservation period as
We define T as the current time and
Since the reservation and contention periods are iterated, to minimize the wasting time when no nodes contend, we define
Then,
Furthermore, if all nodes associated with an AP use the full-duplex radio mode and are reserved, then the number of unreserved nodes (
The AP waits during

Example of beginning reservation period for each case: (a) If the channel is busy when the time has arrived to begin the reservation period, the AP waits until the channel is idle and then starts the reservation period after sensing the channel during PIFS; (b) If the channel is idle when the time has arrived to begin the reservation period, the AP waits during PIFS to begin the reservation period; and (c) If the channel is busy when the AP senses the channel state during PIFS, it waits until the channel is idle and operates like case (a).
The reservation period is finished when the AP sends a frame to every reserved node or when the AP fails to receive an ACK frame during the reservation period.
When the reservation period finishes, the AP begins its contention period. If a channel is idle during the DIFS, the AP and unreserved nodes begin competition automatically. Modification of half-duplex nodes is not required because the reservation period is the same as the channel-busy state.
There is no competition during the reservation period. The AP sends a data frame first. Then, the node receiving the frame starts sending a data frame with no competition. The AP continues to send one frame to all the reserved nodes. If the AP does not have a data frame for a reserved node, it sends a null data frame (MAC header plus padding bits only) to provide transmission opportunity for other reserved nodes.
If a node has more frames in its buffer, it can retain its reserved state by setting its More Data bit to ‘1’, thereby allowing it to have a transmission opportunity at the next reservation period without the threat of collision. On the other hand, if a reserved node has no frames in its buffer, it sets its More Data bit to ‘0’.
During the contention period, similar to the DCF technique, only unreserved nodes and the AP compete for the right to transmit. Since reserved nodes do not compete during the contention period, the collision probability decreases because the number of competition nodes has reduced. In this period, if a full-duplex node receives a frame, it has an opportunity to transmit. During transmission, nodes check whether or not they have more frames in their buffers. During the contention period, new reserved nodes can be added. The overall operation is described in Fig. 6.

Operation example with three full-duplex nodes (S1, S2, S3) and one half-duplex node (S4).
In this section, we compare network overhead during competition in several cases. We compared half-duplex and full-duplex based on the DCF technique and the RMAC protocol. We assumed that half-duplex nodes and full-duplex nodes followed the IEEE 802.11 DCF without the use of RTS/CTS signals. In addition, we used an expected value of contention window (CW) defined as
Denotation for analysis
Denotation for analysis
In our analysis, one round consisted of
When a node sends a frame in the half-duplex mode, the transmission time T was calculated with Eq. (4) as referred to in [2],
The number of all nodes was set as
Overhead during K rounds (
If half-duplex radio nodes successfully transmitted without collision, the overall overhead was calculated with Eq. (6). If we consider collisions during DCF, then
The overhead of full-duplex with DCF (
Therefore, the competition overhead of both cases is calculated as
To calculate the overhead of the RMAC protocol, the number of nodes was set to
In Eq. (9), in the first round, all nodes need competition overhead
As presented in Eq. (10), when a round proceeds in saturated traffic, the RMAC protocol reduces overhead more efficiently than full-duplex using DCF.
In this section, we describe the evaluation of our RMAC protocol to prove the performance improvement. To evaluate RMAC, we developed a WLAN simulator that supports full-duplex radio communication based on SIC by using
Simulation environment
When we simulated IEEE DCF with half-duplex radio and full-duplex radio and RMAC, we considered only a single AP with multiple nodes. We assumed that the size of network is

Packet size distribution.
Since we assumed that all nodes were one-hop, all nodes were able to receive or overhear and decode all frames in the network. Therefore, when we simulated IEEE 802.11 DCF with half-duplex radio, we did not employ RTS/CTS. Other simulation parameters are described in Table 3.
Parameters for simulation
For precise simulation results, we created two scenarios. First, when we simulated IEEE DCF with half-duplex radio, the AP and all nodes operated only in the half-duplex mode. On the other hand, when IEEE DCF with full-duplex radio and RMAC were simulated, the AP and all nodes had the capability of supporting full-duplex communication.
Second, we compared two MAC protocols (DCF and RMAC). The two MAC protocols operated with various numbers of full-duplex nodes and half-duplex nodes. This scenario proved the ability of full-duplex nodes to coexist with half-duplex nodes.
In this section, the normalized throughput of each MAC protocol and the average number of uplink transmissions are compared. Figure 8 shows the normalized throughput as the number of nodes was increased. As shown in Fig. 8, the normalized throughput of DCF with full-duplex nodes was 167.7% and 61.4% greater than that of DCF with half-duplex nodes when the number of nodes was 5 and 60, respectively. Since the number of downlinks of full-duplex radio was more than that of the half-duplex radio as mentioned in Section 4.1, the normalized throughput of DCF with full-duplex nodes was more than double that of the half-duplex nodes. In addition, the RMAC protocol throughput with full-duplex nodes only (presented as RMAC-P in Fig. 8) outperformed that of the DCF with full-duplex nodes by 86.3 %. Moreover, with 60 network nodes, the normalized throughput of DCF with full-duplex nodes and half-duplex nodes decreased 56.1% and 27.1%, respectively. However, the normalized throughput using the RMAC protocol increased 5.2% because the number of competing nodes had decreased and the number of transmission had increased, demonstrating that the RMAC protocol operated well even in a network with a dense node deployment.

Normalized throughput with saturated traffic for several cases; RMAC-P: full-duplex nodes only, RMAC-C: mixture of the same number of full-duplex nodes and half-duplex nodes.
In addition, Fig. 8 shows the normalized throughput of a network consisting of an AP, full-duplex nodes, and half-duplex nodes (presented as RMAC-C in Fig. 8). During these simulations, we set the number of full-duplex nodes equal to the number of half-duplex nodes to verify that RMAC operates well and maintains throughput when half-duplex nodes coexist. As the number of nodes increased, the normalized throughput using DCF decreased because the number of competing nodes increased. The greater the number of competing nodes, the greater the number of collisions that occurred. On the other hand, using the RMAC protocol shows that as the number of full-duplex nodes increased, the normalized throughput also increased as shown in Fig. 8 even with the same number of half-duplex nodes. Using the RMAC protocol, since the reserved full-duplex nodes did not compete during the contention period, the number of competing nodes is not proportional to the total number of full-duplex and half-duplex nodes, and likewise the collision probability and competition overhead decreased. With saturated traffic, all full-duplex nodes will eventually be reserved and transmit without competition during the reservation period with the RMAC protocol. Therefore, the increment of full-duplex nodes leads the increment of proportion of the reservation period in one cycle consisting of one reservation period and one contention period.
The results of the two scenarios show that the RMAC protocol achieved high throughput when nodes frequently sent many frames because the nodes remained reserved until their buffers were empty. The efficiency of the RMAC protocol was maintained even when a large number of nodes were deployed with heavy traffic.
Figure 9 shows the average number of uplink transmissions of each MAC protocol when the number of nodes is 60. In general, DCF provides long-term fairness among nodes. The number of uplink transmissions with RMAC protocol was 108.6% and 62.2% greater than that of DCF with full-duplex radio and half-duplex radio, respectively. Furthermore, RMAC protocol achieves the minimum deviation of the number of uplink transmissions because nodes already reserved had equitable transmission opportunities during reservation period. As a result, RMAC also provides fairness well among nodes.

The average number of uplink transmission for three MAC protocols (DCF w Full-duplex nodes, DCF w half duplex nodes and RMAC) when the number of nodes is 60.
The increasing number of nodes in WLANs, the overhead of collision prevention, and the competition among nodes are crucial issues to be dealt with in the development of WLAN communication equipment. Despite the advantages of full-duplex radio technology, most prior research has focused on the feasibility of symmetric and asymmetric transmission for frame exchange.
In this paper, we proposed an RMAC protocol consisting of a reservation-based MAC protocol for a full-duplex equipped WLAN. Our RMAC protocol reduced competition overhead and collision probability by providing transmission opportunities that avoided competition. We demonstrated that our RMAC protocol performed very well with a large number of nodes and heavy traffic. In addition, our RMAC protocol was designed to be compatible with IEEE 802.11 DCF with half-duplex; therefore, we believe our RMAC protocol is suitable for propagating and generalizing full-duplex WLANs.
For the future work, we will consider various aspects such as the performance enhancement, the security, and the applicability to other wireless networks. Since the proposed RMAC covers only symmetric transmissions, it is possible to modify RMAC to support asymmetric transmissions as well. Then the modified RMAC may enhance its throughput by mitigating the collision probability further. What if a node does not follow RMAC protocol? Then the reservation period is not ensured so that RMAC may function just like DCF. It is necessary to protect RMAC from any security breach. Finally, we may consider other wireless networks such as Bluetooth or Zigbee carefully to apply RMAC to if the full-duplex radio is evaluated as a good technology for them in future.
Footnotes
Acknowledgements
This study was supported by Brain Korea 21 PLUS project for POSTECH Computer Science & Engineering Institute. This research was supported by the MSIP (Ministry of Science, ICT and Future Planning), Korea, Under the “ICT Consilience Creative Program” (IITP-R0346-16-1007) supervised by the IITP (Institute for Information & Communications Technology Promotion).
