Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn

Similar documents
Fine-grained Channel Access in Wireless LAN. Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012

% 4 (1 $ $ ! " ( # $ 5 # $ % - % +' ( % +' (( % -.

Wireless Communication

CS434/534: Topics in Networked (Networking) Systems

Wireless LAN Applications LAN Extension Cross building interconnection Nomadic access Ad hoc networks Single Cell Wireless LAN

Safety Message Power Transmission Control for Vehicular Ad hoc Networks

Reliable Safety Broadcasting in Vehicular Ad hoc Networks using Network Coding. Behnam Hassanabadi

Wireless Networked Systems

Communication Networks. Braunschweiger Verkehrskolloquium

Politecnico di Milano Advanced Network Technologies Laboratory. Beyond Standard MAC Sublayer

For Review Only. Wireless Access Technologies for Vehicular Network Safety Applications

Local Density Estimation for Contention Window Adaptation in Vehicular Networks

Reliable Broadcast of Safety Messages in Vehicular Ad hoc Networks. Farzad Hassanzadeh

Ilenia Tinnirello. Giuseppe Bianchi, Ilenia Tinnirello

INTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster

Physical Carrier Sense in Vehicular Ad-hoc Networks

Achieving Network Consistency. Octav Chipara

UTILIZATION OF AN IEEE 1588 TIMING REFERENCE SOURCE IN THE inet RF TRANSCEIVER

University of Bristol - Explore Bristol Research. Peer reviewed version. Link to publication record in Explore Bristol Research PDF-document

Effect of Antenna Placement and Diversity on Vehicular Network Communications

for Vehicular Ad Hoc Networks

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols

Mobile Communications

MESSAGE BROADCASTING IN WIRELESS VEHICULAR AD HOC NETWORKS

Dynamic Zonal Broadcasting for Effective Data Dissemination in VANET

Design and evaluation of multi-channel operation implementation of ETSI GeoNetworking Protocol for ITS-G5

Enhancement of Wide Bandwidth Operation in IEEE ac Networks

Safety Communication for Vehicular Networks: Context-Aware Congestion Control and Cooperative Multi-Hop Forwarding. Le Zhang

Wi-Fi. Wireless Fidelity. Spread Spectrum CSMA. Ad-hoc Networks. Engr. Mian Shahzad Iqbal Lecturer Department of Telecommunication Engineering

Performance Analysis of Transmissions Opportunity Limit in e WLANs

VEHICULAR ad hoc networks (VANETs) are becoming

Cognitive Wireless Network : Computer Networking. Overview. Cognitive Wireless Networks

Generating Function Analysis of Wireless Networks and ARQ Systems

Keysight p WAVE (wireless access in vehicular environments)

IEEE 802 Layers. The IEEE 802 family and its relation to the OSI model

SAFETY-MESSAGE ROUTING IN VEHICULAR AD HOC NETWORKS

Research Article A Joint Vehicle-Vehicle/Vehicle-Roadside Communication Protocol for Highway Traffic Safety

Design of 5.9GHz DSRC-based Vehicular Safety Communication

Power-Controlled Medium Access Control. Protocol for Full-Duplex WiFi Networks

PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS FOR P INCLUDING PROPAGATION MODELS

OPTIMAL ACCESS POINT SELECTION AND CHANNEL ASSIGNMENT IN IEEE NETWORKS. Sangtae Park, B.S. Thesis Prepared for the Degree of MASTER OF SCIENCE

Synchronization and Beaconing in IEEE s Mesh Networks

IEEE ax / OFDMA

Next Generation Wireless LANs

Performance Evaluation of a Mixed Vehicular Network with CAM-DCC and LIMERIC Vehicles

Chapter 4: Directional and Smart Antennas. Prof. Yuh-Shyan Chen Department of CSIE National Taipei University

A Wireless Communication System using Multicasting with an Acknowledgement Mark

APS Implementation over Vehicular Ad Hoc Networks

Block diagram of a radio-over-fiber network. Central Unit RAU. Server. Downlink. Uplink E/O O/E E/O O/E

PULSE: A MAC Protocol for RFID Networks

Using Vision-Based Driver Assistance to Augment Vehicular Ad-Hoc Network Communication

[Raghuwanshi*, 4.(8): August, 2015] ISSN: (I2OR), Publication Impact Factor: 3.785

Exercise Data Networks

A Channel Allocation Algorithm for Reducing the Channel Sensing/Reserving Asymmetry in ac Networks

Outline. EEC-484/584 Computer Networks. Homework #1. Homework #1. Lecture 8. Wenbing Zhao Homework #1 Review

Raising Awareness of Emergency Vehicles in Traffic Using Connected Vehicle Technologies

Enhancing Wireless Networks with Directional Antenna and Multiple Receivers

Jinbao Li, Desheng Zhang, Longjiang Guo, Shouling Ji, Yingshu Li. Heilongjiang University Georgia State University

A MAC protocol for full exploitation of Directional Antennas in Ad-hoc Wireless Networks

THE past decade has seen the rise of a wireless communication

A survey on broadcast protocols in multihop cognitive radio ad hoc network

Efficient Alarm Messaging by Multi-Channel Cut-Through Rebroadcasting based on Inter-Vehicle Communication

Energy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks

GeoMAC: Geo-backoff based Co-operative MAC for V2V networks.

Car-to-Car Communication by Martin Wunderlich Meysam Haddadi

A Cross-Layer Cooperative Schema for Collision Resolution in Data Networks

Data Aggregation and Dissemination in Vehicular Ad-Hoc Networks

Performance Evaluation of a Mixed Vehicular Network with CAM-DCC and LIMERIC Vehicles

Non-saturated and Saturated Throughput Analysis for IEEE e EDCA Multi-hop Networks

Contextual Pedestrian-to-Vehicle DSRC Communication

Radio interface standards of vehicle-tovehicle and vehicle-to-infrastructure communications for Intelligent Transport System applications

Ultra-Low Duty Cycle MAC with Scheduled Channel Polling

Wireless Intro : Computer Networking. Wireless Challenges. Overview

Fiber Distributed Data Interface

On the Coexistence of Overlapping BSSs in WLANs

Starvation Mitigation Through Multi-Channel Coordination in CSMA Multi-hop Wireless Networks

Outline / Wireless Networks and Applications Lecture 14: Wireless LANs * IEEE Family. Some IEEE Standards.

Energy-Efficient MANET Routing: Ideal vs. Realistic Performance

Analytical Model for an IEEE WLAN using DCF with Two Types of VoIP Calls

AEROHIVE NETWORKS ax DAVID SIMON, SENIOR SYSTEMS ENGINEER Aerohive Networks. All Rights Reserved.

Comparison of Collision Avoidance Systems and Applicability to Rail Transport

Wireless technologies Test systems

Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks

Vehicle-to-Vehicle Safety Messaging in DSRC

A Cluster-based TDMA System for Inter-Vehicle. Communications

Adaptive Transmission Scheme for Vehicle Communication System

A Vehicle-to-Vehicle Communication Protocol for Cooperative Collision Warning

Adapting to the Wireless Channel: SampleRate

The influence of the Capture Effect on the collision probability in wireless home networks

Analysis of CSAT performance in Wi-Fi and LTE-U Coexistence

Rate Adaptation for Multiuser MIMO Networks

Cross-layer Approach to Low Energy Wireless Ad Hoc Networks

GPS-Based Navigation & Positioning Challenges in Communications- Enabled Driver Assistance Systems

COMPILED BY : - GAUTAM SINGH STUDY MATERIAL TELCOM What is Wi-Fi?

Performance Evaluation for Next Generation Differentiated Services in Wireless Local Area Networks

Location Enhancement to IEEE DCF

Partial overlapping channels are not damaging

Lattice Throughput Optimal Scheduling: Learning Contention Patterns and Adapting to Load/Topology

IN4181 Lecture 2. Ad-hoc and Sensor Networks. Koen Langendoen Muneeb Ali, Aline Baggio Gertjan Halkes

MIMO Ad Hoc Networks: Medium Access Control, Saturation Throughput and Optimal Hop Distance

Transcription:

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks Nathan Balon and Jinhua Guo University of Michigan - Dearborn

I n t r o d u c t i o n General Information on VANETs Background on 802.11 Background on 802.11e for QoS The issues involved with broadcasting in a VANET A modified CW algorithm to increase the reception rate of broadcast packets Conclusion

V e h i c u l a r A d H o c N e t w o r k s The goal of a VANET is to increase the overall safety of the transportation infrastructure. Automobile accidents are one of the leading causes of death in the US. To illustrate the severity of the problem of automobile accidents, there were 6,279,000 traffic accidents that accounted for 41,611 deaths in the United States in 1999. In 1999, the FCC allocated 75 MHz of bandwidth in the 5.9 GHz band to create a nationwide VANET.

D e d i c a t e d S h o r t - R a n g e C o m m u n i c a t i o n Dedicated Short-Range Communication (DSRC) refers to the spectrum allocated by the FCC for vehicular networks. DSRC aims to bring vehicular networks to North America. The program's goal is to create an interoperable standard for use in the US, Mexico, and Canada. DSRC will allow drivers to receive up-to-date information regrading their environment and as a result reduce accidents.

R e q u i r e m e n t s f o r a V A N E T A VANET must support high data rates. The latency must be low, 100 ms or less. The communication range of VANET is relatively small ranging from 100 m to 1,000 m. DSRC is intended to support both public safety and licensed private operations. No fee should be required to access the the VANET.

I E E E 8 0 2. 1 1 p IEEE 802.11p is the standard for the PHY and MAC layer of DSRC. The MAC layer of 802.11p is based on 802.11a. Similar to 802.11a, the modulation scheme used for the PHY of DSRC is Orthogonal Frequency Division Multiplexing (OFDM).

D S R C C h a n n e l s

C o n t r o l C h a n n e l Channel 178 of DSRC is reserved for the control channel. The control channel is the most important channel of DSRC and efficient use of the channel is critical. The control channel is used to exchange service announcements, safety messages, and a vehicle's state. Communication on the control channel must last less than 200 us. Every 100 ms, each vehicle broadcasts its state on the control channel (e.g., direction, speed, location, etc.)

D S R C D a t a R a t e s The data rates possible for a 10 Mhz channels are: 6, 9, 12, 18, 24, and 27 Mbps It is also possible to combine two 10 MHz channels to achieve a data rates up to 54 Mbps.

C o m m u n i c a t i o n D e v i c e s Each vehicle has an On Board Unit (OBU). The OBU consists of: Transceiver Omni-directional antenna Processor GPS unit Digital Maps Sensors

C o m m u n i c a t i o n D e v i c e s Road-Side Units (RSU) also exist within a VANET. The RSU are strategically placed along the side of the road to provide services to vehicles. The RSU's components are similar to those contained in an OBU. A RSU may use either a directional or omnidirectional antenna. Also, a RSU can communicate with another RSU through a wired infrastructure. In turn, the communication between RSUs is more reliable. Each RSU will require a license to operate that unit at a specific location and a specific frequency.

V A N E T A p p l i c a t i o n s Traffic Signal Violation Warning Curve Speed Warning Emergency Electronic Brake Lights Cooperative Collision Warning Left Turn Assistance Precrash Warning Stop Sign Movement Assistance

8 0 2. 1 1 The MAC layer for DSRC is based on 802.11. The 802.11 standard defines two MAC protocols. Distributed Coordination Function (DCF) Point Coordination Function (PCF) The DCF is an asynchronous contention based access protocol that is used with DSRC. In a contention based protocol, all nodes that have data to send contend for access to the channel. The PCF has contention free period during which the AP coordinates the transmission of the stations.

8 0 2. 1 1 802.11 family of protocols uses Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA). The DCF achieves collision avoidance with a random back-off procedure. The IEEE 802.11 standard uses the concept of slot time. When a node begins a transmission, it randomly selects the number of time slots it must wait before transmitting, which is known as the backoff window. Since there is no collision detection, the wireless transmission is made reliable with the introduction of an explicit acknowledgement.

8 0 2. 1 1 : I n t e r - f r a m e S p a c i n g 802.11 uses a number of different inter-frame spaces. The Distributed Inter-Frame Spacing (DIFS) is used before the transmission of both broadcast and unicast frames. When a node wishes to transmit a frame, it must wait for the timer of the DIFS to expire before attempting to access the channel. During this time, the wireless medium must remain free of transmissions. If a transmission is overhead while a node is waiting for the DIFS expire, the node defers its attempted access to the medium until the medium becomes free. The node must then restart its DIFS timer when the channel becomes free again.

I n t e r - F r a m e S p a c i n g

B a c k - o f f P r o c e s s After the completion of the DIFS a node begins a backoff process. When a packet is passed down to the MAC, it randomly selects the number of time slots it must wait before transmitting, which is known as the contention window. One clock tick of the back-off timer expires, when the medium remains free from transmission for one timeslot. The back-off timer is paused if the medium becomes busy. A node transmits when its back-off timer reaches zero.

B a c k - o f f P r o c e s s The initial value of the CW is chosen randomly from the interval [0, CW min ). If the transmission fails the CW is exponentially increased until CW max is reached. CW Sizes (15, 31, 63, 127, 255, 511, 1023) If the transmission of a frame does not succeed after a predefined numbers of attempts the frame is discarded.

8 0 2. 1 1 B a c k o f f

H i d d e n T e r m i n a l P r o b l e m One of the main problems affecting the reliability of the DCF is the hidden terminal problem. The hidden terminal problem occurs when there are two nodes that are outside the transmission range of each other, but each node wishes to transmit to a node that is shared between them. The problem is these nodes can not detect each others transmissions, so the medium appears free to both nodes. If Both nodes transmit at the same time the frame will fail to be delivered, and a collision will occur at the receiver.

H i d d e n T e r m i n a l P r o b l e m

R T S / C T S To overcome the hidden terminal problem an optional Request to Send/Clear to Send (RTS/CTS) exchange was introduced into 802.11. When a node has data to send, once it is able to gain access to the medium, the node will first transmit a RTS to the intended receiver. When the node intended target receives the RTS, after a SIFS has expired, the node will respond with a CTS. The nodes that overhear these control messages set their network allocation vector (NAV) for the amount of time it takes to complete the communication. All other nodes will then defer from accessing the wireless medium until their NAV expire, and the transmission between sender and receiver is complete.

R T S / C T S

8 0 2. 1 1 e Q o S A requirement of DSRC is that safety messages must have priority access over non-safety messages. In order to timely deliver high priority messages, such as those used by collision warning applications, DSRC adopts the Enhanced Distributed Channel Access of 802.11e. EDCA provides differential access to the wireless channel by using eight priority classes, which are referred to as Access Categories (AC). EDCA uses a different set of access parameters for each AC.

A c c e s s C a t e g o r i e s CW min CW max AC AIFS 0 2 7 15 1 2 15 31 2 3 31 511 3 7 31 1023

8 0 2. 1 1 e Q u e u e s

8 0 2. 1 1 e B a c k o f f

B r o a d c a s t M e s s a g e s Broadcast messages will play a larger role than unicast messages in a vehicular environment. Some uses of broadcasting are as explained earlier to send emergency warning messages and to periodically broadcast a vehicle's state. When a frame is broadcast no ACK or RTS control frames are used.

P r o b l e m s w i t h B r o a d c a s t s No retransmission is possible for failed broadcast transmissions because of the lack of explicit acknowledgement for broadcast frames. A failed unicast transmission detected by the lack of an acknowledgment (ACK) from the receiver. If acknowledgments were used for broadcasts a problem known as the ACK explosion problem would exist, where each receiving node would at almost the same instance send an ACK back to the transmitter The ACK explosion problem results in a large number of collisions.

P r o b l e m s w i t h B r o a d c a s t s The hidden terminal problem exists because the RTS/CTS exchange is not used. The IEEE 802.11 protocols use an optional RTS/CTS handshake followed by an acknowledgment to guarantee the delivery of a unicast packet. Broadcast messages, on the other hand, cannot use the RTS/CTS exchange because it would flood the network with traffic. All nodes that received the RTS would at almost the same instant respond causing a storm around the node that transmitted the RTS. Because the RTS/CTS is not used channel reservation is not possible.

P r o b l e m s w i t h B r o a d c a s t s The contention window size fails to change because there is no MAC-level recovery on broadcast frames. In order to control congestion, the contention window size (CW) is exponentially increased each time a failed unicast transmission is detected. Because there is no detection of failed broadcast transmissions, the size of the CW fails to change for broadcast traffic as it does for unicast traffic. Nodes will always transmit with CW min for the backoff window. This may result in excessive collisions, if a large number of nodes are contending for access.

M o d i f i e d B r o a d c a s t P r o t o c o l We rely on the observation that a node in a VANET is able to detect collisions and congestion by simply analyzing the sequence numbers of packets it has recently received. In a VANET, each node will broadcast its status to its neighbors approximately 10 times every second. While a node does not know if the packets it sent are correctly delivered, it knows the exact percentage of packets sent to it from its neighbors that are successfully received. Based on this feedback, a node is able to dynamically adjust the parameters it uses, such as contention window size, transmission rate, and transmission power, to improve the delivery rate of broadcast messages.

M o d i f i e d B r o a d c a s t P r o t o c o l On a crowded highway the number of vehicles contending to access the wireless medium can be high. For instance, on a gridlocked 8 lane highway with vehicles placed 15m apart, approximately 300 or more cars could be attempting to transmit (e.g., 600 m diameter / (15 m between vehicles * 4 lanes * 2 directions) 320 vehicles). Because a large number of nodes on the highway are contending for access to the medium, it is also necessary to vary the size of the contention window to reduce the likelihood of a collision. Vehicles can also benefit from the opposing situation where the contention window is decreased to account for light traffic.

M o d i f i e d B r o a d c a s t P r o t o c o l The probability of collisions can be reduced and probability of reception can be improved if the size of the CW used to send broadcast messages is able to adapt based on the network conditions. If a node is able to observe its local conditions of the network, it will be able to modify the MAC level parameters to improve the probability that a frame is successfully received. While it is not possible to detect the collisions of frames, it is possible to record the successful delivery of frames.

8 0 2. 1 1 M A C H e a d e r The sequence control field is 2 Bytes. A 12-bit sequence number is contained within the sequence control field. It result in modulo-4096 counter that is incremented by 1 for each packet passed to the MAC.

F r a m e s R e c e i v e d Node A records that it has overheard the frames coming from node B with the sequence numbers 32, 34, 35, 36, 37, 38, 40, 41. Based on the observed sequence numbers, node A could conclude that frame 33 and frame 39 were corrupted or lost.

D a t a M a i n t a i n e d b y E a c h N o d e Each node then records the overheard sequence numbers coming from specific nodes. A dynamic hash table is used so that an entry is updated in near constant time. The MAC address is used as the key to the hash function. Each table entry has a timestamp associated with it. In order to prevent old data from affecting the calculation of the local network conditions. Old entries are removed from the table when the local reception rate is calculated. MAC Address Sequence Number Average Reception Rate Timestamp

W e i g h t e d M o v i n g A v e r a g e The weighted reception rate is used to determine the percentage of packets that are successfully received from a specific node. A weighted reception rate is used to put more emphasis on recent events. Each time a frame is successfully received, the weighted reception rate is recalculated. The variable α is used to put more or less weight on the current network condition. EstRecpRate = α * EstRecpRate + (1 α) * SampRecpRate

L o c a l R e c e p t i o n R a t e The nodes also maintain a timer. When the timer expires, the local reception rate is determined and the CW is adjusted. The local reception rate is the average of the estimated reception rates. LocalReceptionRate = EstRecptionRate / Nodes

C o n t e n t i o n W i n d o w A d j u s t m e n t After the local reception rate is calculated, it is compared against the previously stored local reception. The node also maintains a threshold value that it uses to determine whether to increase or decrease the CW. If the new local reception rate decreases by a value greater than the threshold, the CW is increased. On the other hand, if new local reception rate increases by a value greater than the threshold, the CW is decreased. As a result, the CW adapts to the condition of the network. The node then uses the new CW for all broadcast transmissions until the next time the local reception rate is calculated.

C W A d j u s t m e n t IF (average previous average >= sliding threshold) Increase the window ELSE IF (-(average previous average) >= sliding threshold) Decrease the window ELSE Maintain the current window

N e t w o r k S i m u l a t i o n s The NS-2 network simulator was used to simulate the modified version of the 802.11 protocol. NS-2 is a discrete event simulator that is used for network research. The simulator was developed at University of California Berkeley and it is written in both C++ and TCL.

M o b i l i t y M o d e l The mobility model used in the simulations is Freeway Mobility Model, and the USC Mobility Generator was used to create the mobility in the simulations. Each node in the simulation is restricted to only travel within its lane. The velocity of each node is temporally restricted based on the nodes previous velocity. A safety distance is maintained so that a node cannot exceed the velocity of the node in front of it if they are within the safety distance. Each vehicle s velocity ranges from 17m/s to 25m/s. The acceleration of the vehicles is set to 10% the maximum velocity.

O r i g i n a l S i m u l a t i o n s The first set of simulations that were evaluated varied the number of nodes in the simulation and used three traffic classes. The default NS-2 physical layer parameters were used, resulting in 2 Mbps of bandwidth. AC[0] = 2 slot CW min = 31, AC[1] = 2 slots CW min = 63, and AC[2] = 3 slot CW min = 1032 The overall reception rate for the whole simulation, was used to evaluate the performance of the protocol. A 1000 m stretch of freeway was used to model the simulation. AC[0] and AC[1] accounted each for 5% of the traffic and AC[2] accounted for 90% of the traffic. Messages were transmitted at the rate of 100 ms.

O r i g i n a l S i m u l a t i o n R e s u l t s

N e t w o r k T r a f f i c AC[0] is used to transmit emergency warnings. Nodes are randomly selected to transmit an emergency warning and they are transmitted once every 100 ms for 1.5 s with 10% jitter. AC[1] is used to transmit a vehicle's state every 0.1 seconds with 10% jitter with. Approximately 20% of the traffic is AC[0] and 80% of the traffic is AC[1].

M e t r i c s U s e d t o E v a l u a t e P r o t o c o l s Channel access time: the elapsed from when a packets is passed to the MAC layer until it is put on the channel. Reception rate: the percentage of packets successfully received at a distance d± 5m from the sender.

S i m u l a t i o n T o p o l o g y

R e c e p t i o n R a t e a s D i s t a n c e f r o m S e n d e r I n c r e a s e s The second simulation used a fixed CW. The simulation determined how the distance from the sender affects the reception rate and also how the number of nodes in the network affects the reception rate. AC[0] CW min = 7 and AIFS[0] = 2 AC[1] CW min = 15 and AIFS[1] = 3 The simulations shows that the reception rate decreases rapidly as the distance from the sender increases.

F i x e d C o n t e n t i o n W i n d o w : R e c e p t i o n R a t e

A c c e s s D e l a y

T h e E f f e c t D i f f e r e n t C W S i z e s H a v e o n R e c e p t i o n A third set of simulations was used to determine the effect that different values of CW min have on the reception rate. The results show that it is unlikely to be able to increase the reception rate by more than about 5%. One interesting finding was the a larger CW results in a lower probability of reception at large distance, while the reception is improved at short distances. For light network traffic the reception rate does not improved much as a result of varying the CW. For heavy traffic the rate improves but the queues can also fill up causing packets to be dropped and causing excessive delays.

F i x e d C o n t e n t i o n W i n d o w s

A c c e s s D e l a y 1 Access Delay Access Delay in Seconds 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 Access Delay 0 7 15 31 63 127 255 511 1023 Contention Window Size

D y n a m i c C o n t e n t i o n W i n d o w A d j u s t m e n t I was preparing a final set of simulation that compared the a fixed CW against the dynamic CW, but the simulations did not finish in time to show the results. It is highly likely that dynamically adjusting the CW will have a limited impact on the reception rate. The previous results showed that a 5% to 6% increase can be expected by increasing the CW from CW min = 7 to CW min = 511 at certain distances. The dynamic CW would likely result in even a lower this improvement in the reception rate.

C o n c l u s i o n Dynamically adjusting the contention window will improve the rate of reception under certain conditions. If the amount of network traffic is close to the theoretical limit, it would be beneficial instead to drop some packets or adjust the rate that packets are transmitted at. In this case increasing the CW has a limited impact.

F u t u r e W o r k Adaptive Transmission Rate Dynamic Power Transmission Control

A d a p t i v e T r a n s m i s s i o n R a t e Due to the hidden terminal problem it is unrealistic to expect to achieve anywhere near 100% delivery of broadcast frames. In the case of a highly load network increasing the CW to 1023 slots will result in unacceptable access delay. In the case of a highly load network nodes will have to decrease their transmission rate. The feedback from the network can be used to reduce the transmission rate of low priority traffic.

D y n a m i c P o w e r T r a n s m i s s i o n C o n t r o l Controlling the communication range by adjusting the transmission power can be used to mitigate the adverse effects of highly dense nodes. The choice of the communication range has a direct impact on network connectivity. Most approaches use the node's density to estimate the transmission range. The transmission range can also be adjusted to keep the network load on the channel below a certain threshold.