The Journal of Engineering Research (TJER), Vol. 15, No. 1 (2018) 73-87 DOI: 10.24200/tjer.vol15iss1pp73-87 Capture Aware Channel Access Protocol in Wireless Network S. Mustafa* College of Engineering, Salahaddin University, Iraq 21 January 2015; Accepted 1 May 2017 Abstract: Spatial reuse in wireless networks is limited by the SINR threshold and it might be feasible to capture a packet in the presence of ongoing foreign transmission. This work considers a new capture aware channel access protocol by incorporating global channel state information in the decision making process for the channel access jointly with adaptive power framework. The protocol employs power heterogeneous ad-hoc networks; it assigns different transmission power level to individual nodes based on dynamic observation of the network traffic. It exploits spatial heterogeneity of flows at a given channel allocation and sets up either symmetric or asymmetric carrier sensing which in turn schedules the data packets transmission to maintain adequate service quality and fairness enjoyed by a user. It stands atop capture capable PHY to leverage the channel reuse which is of paramount importance in the design of high capacity ad-hoc networks. Through extensive simulations, the paper demonstrates the efficacy of the new protocol. It delivers high network utilization and also provides fair access to the media. Keywords: DCF; Carrier sensing; MAC mechanism; Power control; Capture effect; Wireless network. بروتوكول الدخول اىل القنوات و الدراية حبدوث التقاط االرسال يف الشبكة الالسلكية *مساح مصطفى )سينر(. إشارة نسبة التدخل: ان إعادة االستخدام املكاني يف الشبكات الالسلكية يكون حمدودا بسبب حاجز امللخص وقد يكون من املمكن التقاط حزمة ما يف وجود ارسال أجنيب مستمر. ويأخذ هذا العمل يف االعتبار بروتوكوال جديدا للوصول إىل القنوات من خالل حالة دمج املعلومات بالقناة العامة يف عملية صنع القرار من أجل الوصول إىل القناة وباالستفادة ويستخدم الربوتوكول قدرة غري متجانسة لشبكات خمصصة , حيث أنه حيدد مستوى قدرة .فمن إطار القدرة على التكي اإلرسال املختلفة بالنسبة إىل الُعقد الفردية على أساس مراقبة ديناميكية حلركة مرور الشبكة. فهو يستغل عدم التجانس ماثل أو غري متماثل للموجة احلاملة وحيدد املكاني للتدفقات عند ختصيص قناة معينة ، وحيدد سواء كان االستشعار مت بدوره إرسال رزم البيانات للحفاظ على وجود جودة خدمة كافية وعادلة يتمتع بها املستعمل. وهو يقف فوق عملية االلتقاط . من القادرة على االستفادة من إعادة استخدام القناة اليت تعترب ذات أهمية قصوى يف تصميم شبكات خمصصة عالية السعة خالل احملاكاة واسعة النطاق. تربهن هذه الورقة على فاعلية الربوتوكول اجلديد. وهي توفر استخدام عال للشبكة وتوفر أيضا إمكانية الوصول العادل إىل وسائط اإلعالم. وسائط اإلعالمالتحكم بالوصول إىل آلية ،االستشعار الناقل،) دي سي اف( وظيفة التنسيق املوزع :ة كلمات املفتاحيال تأثري االلتقاط. شبكة السلكية.،التحكم يف الطاقة ،) ماك( * Corresponding author’s e-mail: samah.eecs@gmail.com mailto:samah.eecs@gmail.com S. Mustafa 74 1. Introduction A key problem in ad-hoc wireless networking is the design of distributed media access control (MAC) mechanism to discover and negotiate the access to the reusable physical channels such that the transmission can occur without collision. A representative mechanism of MAC is the Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) algorithm that forms the basis of the dominant wireless multiple access protocol Distributed Coordination Function (DCF) in 802.11 (Kurth and Redlich 2009). Physically a channel is sensed busy either when the detected energy level is above a certain threshold ζED, when a signal with the same PHY characteristics is detected, or a combination of both (Larroca and Rodríguez 2014). Carrier sensing is the main interference mitigation mechanisms used in the PHY/MAC layers of 802.11 WLANs, and its efficacy becomes a key factor in determining network capacity. A station defers its transmission for a random period upon detecting a carrier on the channel. However, the absence of a carrier does not mean a transmission will succeed, nor does the presence of a carrier mean that a transmission will interfere. Hereby carrier sense approach can unnecessarily reduce network throughput and strongly affect the delay characteristics at a station (Jamieson et al. 2005; Zhu et al. 2004; Ma et al. 2009). Many studies have been done to illustrate that physical carrier sense adversely limits the effective bandwidth utilization in the network because of fixed carrier sense threshold and inadequately chosen carrier sense range. Extensive research efforts advocate the tuning of carrier sense threshold for utilization improvement (Ma et al. 2009; Zhu et al. 2004; Zhu e et al. 2006; Haghani et al. 2010); however, many of today’s 802.11 MAC implementations do not allow the threshold to be independently tunable or even accessible (Zhu et al. 2004). Moreover, (Pelechrinis 2009) claims that tuning carrier sense threshold opens the door for selfish users with lower back-off times to ignore other transmission and therefore obtain a higher unfair share of the spectrum. There is a clear trade-off between the probability of interference and the utilization in setting carrier sense range. Larger sense range decreases both the probability of interference and the bandwidth utilization, whereas small carrier sense range will be more subject to interference. Exposed node prevents a successful transmission while hidden node wastes a transmission opportunity due to a collision. As has been pointed out in (Ma et al. 2009), the optimum value of carrier sense threshold is that at which the carrier sense range of the transmitter just covers the interference range of the receiver. The setting of interference range is rather heuristic and remains an open problem. Many studies on wireless networks have largely considered an interference range as twice the transmission range, and others rely on equal interference and transmission ranges. Physically the interference range is defined to denote the range within which an interfering node will lower Signal-to-Interference ratio (SIR) below the threshold for successful decoding of a transmission (Maheshwari et al. 2008). It has been depicted in (Chen et al. 2007 and Lee et al. 2010), an interferer’s impact becomes serious when its preamble is detectable such that the intended end-user device could engage with, even if it is not able to decode the frame correctly. Hereby the author recommends characterizing the interference range within which the preamble of a frame is detectable and the carrier sense range should be equal to this range. Recall that spatial channel reuse relies on the carrier sense threshold and the transmit power each station uses. MAC like 802.11 DCF uses the same transmission power at all nodes regardless the link distance between transmitter-receiver pair as well as interference level at the receiver (Li et al. 2009). Moreover, it always transmits at full power which in turn potentially maximize the link utility from the medium. However, this selfish behavior leads to excessive mutual interference and degrades the network performance. In contrast, some proposed MAC mechanisms (Gomez et al. 2001; Lim and Yoshida 2005) transmit at minimum possible power to leverage the spatial reuse hence maximizing the interference probability. The SINR threshold for successful reception depends on the timing and the relative order of signal and the interference at the receiver (Chen et al. 2007; Lee et al. 2010; and Mustafa 2015). The radio captures a new stronger frame above a predefined preamble capture threshold γP, if it arrives during the first frame’s preamble reception. 802.11's PHY layer continuously monitors the received signal strength even the layer in data reception state. It enables a radio to correctly receive a second frame, even after it Capture Aware Channel Access Protocol in Wireless Network 79 has already synchronized with the first one, if the ratio of powers is sufficiently high. This is called Message in Message MIM mode which is not exploited before in capture aware mechanisms. A typical ratio of powers required for body capture is γD=10dB (Chen et al. 2007 and Lee et al. 2010). Thus, the SINR at the intended receiver and transmission order are crucial factors for successful delivery. This work presents an approach to leverage ad-hoc network's capacity relying on a distributed capture aware framework to coordinate the transmit power and time schedule the traffics to exploit the PHY capture effect with ultimate goals of improving utility and spectrum fairness. Time schedule the traffic is done by assigning transmit power level to set up either symmetric or asymmetric carrier sense scenario that can potentially schedule the data packets transmission. Asymmetric carrier sense situation is neither actually introduced nor applied in previous works. It is known that a hidden link would starve in presence of sensed link with high load traffic. The simulation study offers a new prospective regarding the asymmetric carrier sense scenario and demonstrates its benefit to time schedule the hidden traffic without an extra timing signal. In this work, Capture Aware Multiple Access Protocol (CAMA) is proposed. It requires disseminating the locally measured link gain at individual stations throughout the network neighborhood for identifying links that can be concurrent and allowing them to coexist, thereby enhanceing the effectiveness of channel reservation. It doesn’t modify the carrier sense threshold. CAMA exploits spatial heterogeneity of flows at a given channel allocation by means of dynamic power control to manage the co- channel interference and allow for higher and fair utilization of resources. The rest of the paper is organized as follows: section 2 goes through works related to this paper. Section 3 describes CAMA mechanism that adjusts the transmission power of the nodes to maximize the benefits of the capture effect. Section 4 presents the simulation results that describe the behavior of the default and CAMA mechanisms, and demonstrate the benefits of the proposed protocol. Finally, Section 5 concludes the paper with general observations and suggestions for future research. 2. Related Work Extensive works have subjected different aspects of 802.11MAC protocol to enhance per- flow and aggregate throughput. This section presents an overview of some existing work that aims to improve network capacity by spatial diversity through tuning transmit power. Ding et al. 2005 proposes transmit power control protocol to adjust the transmit power for each frame under the same decision rule as IEEE 802.11 which in turn achieves limited improvement. Mhatre et al. 2007 claim that different power levels at transmitters use the same carrier sense threshold in 802.11 networks introduces asymmetric links which in turn lead to throughput starvation. They demonstrate that cross layer approach by joint tuning of the clear channel assessment CCA threshold and transmit power ensures starvation free control system. Furthermore, the clients use the same transmit power and CCA threshold as their associated access point regardless of different channel state each sees. The current work demonstrates that asymmetric link do not necessarily introduce starving nodes. The traditional access control cannot handle multiple packets without declaring a collision. A capture aware MAC mechanism was proposed in (Santhapuri et al. 2007), where primary node transmits Request-To-Send (RTS)/Clear-To-Send (CTS) and waits for one preamble time interval before transmitting data while secondary node(s) that overhears RTS will initiate its own transmission either during wait time for the primary user or during primary's DATA transmission depending on the estimated SINR at its receiver and at the primary user. However, this scheme doesn't address the synchronization issue due to the existence of propagation delay, and it incorporates that receiving the preamble of the interference frame helps to detect the frame of interest that arrives later while in contrast has been proved in (Lee et al. 2010). In (Li et al. 2009), nodes transmit RTS/CTS at the same maximum power, and transmit DATA/ACK at the power based on the link distance, as well as the interference level at the receiver. Based on the overhead RTS or CTS, the protocol enables a concurrent transmission at a possible highest power level as long as it does not interfere with the ongoing ones. Although, 75 S. Mustafa 78 the protocol considers the aggregate interference level, but it assumes equal contribution from the neighboring nodes, no matter how close they are as well as the transmit power they use. There are some limitations on these mechanisms: hidden terminal problem still exists with RTS/CTS, and possible loss in ACK packets is ignored to benefit from fewer collisions and build inaccurate results. Various PHY layer capture aware MAC mechanism are proposed for wireless area local area networks WLANs. To meet fair access and high overall throughputs, (Jeong et al. 2013) changes either the contention window or arbitration inter-frame space or transmission opportunity. The technique in (Patras et al. 2014) uses different power levels to result in packet capture in WLANs and improve the performance. However, an ideal channel condition is assumed where losses are only caused by collisions. The work in (Takahashi et al. 2015) configures the minimum contention window of the stations to reduce the collision in each network. These studies considered infrastructure mode where nodes are within carrier sense range of one another. Further, these mechanisms don’t exploit MIM mode and the assignment of concurrent links set satisfies a single SINR constraint. The study in (Mustafa 2015) demonstrates the inaccuracy of the well-known interference physical model. 3. Capture Aware Multiple Access CAMA Framework The 802.11 DCF (Li et al. 2009) is strong transmit power MAC design wherein all nodes transmit with the same power no matter how close the sender and receiver are. The current work here claims that by moving beyond the maximum fixed transmit power, the fairness and channel utilization can be improved. Further, successful unicast transmission depends on channel condition at both the receiver and sender due to downstream data traffic and upstream MAC layer acknowledgment ACK traffic. However, suggestion of simply extending the carrier sensing mechanism to the receiver does not address the MAC limitations of inefficient and unfair spectrum utilization. A capture aware multiple access mechanism is proposed based on broad channel observation to tune power level of each node to successfully retrieve the transmitted signal and make a decision to access the channel, while carrier sense range is fixed and set equal to interference range. In environment with users of homogenous technology competing for resources, the interference range in this work is characterized within which the preamble of a frame is detectable. 3.1 Two Sender-receiver Pairs Consider two sender-receiver pairs: (S1;R1) and (S2;R2) transmitting over communication links L1 and L2 respectively, and sharing a single wireless channel as shown in Fig. 1. 𝑆𝐼𝑁𝑅|𝐷−𝐷 𝑅𝑖 experienced by Ri due to concurrent data DATA-DATA transmissions from Si and Sj is given by 𝑆𝐼𝑁𝑅|𝐷−𝐷 𝑅𝑖 = 𝐺𝑖,𝑖 𝑆𝑅 𝑃𝑆𝑖 𝐺𝑗,𝑖 𝑆𝑅 𝑃𝑆𝑗 + 𝜂 (1) Figure 1. Two flows sharing a wireless channel. Depending on propagation paths between the four stations, link(s) may or may not be established between the nodes. Psi denotes transmit power level at Si and η is the noise floor. 𝐺𝑖,𝑗 𝑆𝑅 denotes Si-Rj link gain where a propagation model suited for the surrounding environment is used to describe the fluctuation in the received signal strength such that the mean received power falls off as (1/d)α. α is a path loss exponent. A receiver can engage with a delivered packet if the received signal power is greater than the receiver sensitivity threshold ζS, i.e. 𝐺𝑖,𝑖 𝑆𝑅 𝑃𝑆𝑖 ≥ ζ𝑆 (2) Whether parallel data transmissions of data packets are successful or failure depends on the S1 R1 S2 R2 𝐺1,1 𝑆𝑅 𝐺2,2 𝑆𝑅 𝐺1,2 𝑅𝑅 𝐺2,1 𝑆𝑅 𝐺1,2 𝑆𝑅 𝐺1,2 𝑆𝑆 76 Capture Aware Channel Access Protocol in Wireless Network 79 observed SINR basically at receivers that should be higher or equal to γD. It enables the radio to correctly receive an intended frame irrespective of the timing relation between overlapped transmissions. γD is usually set to 10 that map to ten times the signal power over interference power, as stated earlier in first section. This condition holds if Ri is closer to Si than to both Sj and Rj by a sufficient factor, and vice versa. It may happen that this condition holds even though CSMA/CA would prevent the second pair from transmitting. To illustrate this possibility, consider the following example. The four nodes are on a line in the order, from left-to-right R1; S1; S2; R2. Their locations on the x-axis are 0; 1; d+1; d+2, respectively. Assume all the nodes transmit with a unit power and (𝐺𝑖,𝑖 𝑆𝑅 /𝐺𝑗,𝑖 𝑆𝑅 ) ≥ 10dB. A capture-aware protocol that would let the sender transmit even if it sense the other transmission could potentially have a throughput almost twice as large as the standard DCF protocol. CAMA looks for a minimum possible power level that guarantees correct packet delivery and hide the sender from other. Further, it is able to throwing out carrier sense line by disabling randomized backoff and allows two senders to transmit packets continuously and simultaneously. Now, consider the four nodes on the x-axis in the order from left to right S1; R1; R2; S2, at locations 0; 1; d+1; d+2, respectively. Depending on the channel state the nodes see, DATA-ACK and DATA-DATA packets collision are possible. For example, 𝑆𝐼𝑁𝑅|𝐷−𝐴 𝑅𝑖 due to simultaneous transmission of data and ACK packets from Si and Rj, respectively is given by 𝑆𝐼𝑁𝑅|𝐷−𝐴 𝑅𝑖 = 𝐺𝑖,𝑖 𝑆𝑅 𝑃𝑆𝑖 𝐺𝑗,𝑖 𝑅𝑅 𝑃𝑅𝑗 + 𝜂 (3) PRi denotes the transmit power of Ri. Assume the nodes transmit with a unit power over a single channel of state such that 𝐺𝑖,𝑖 𝑆𝑅 /𝐺𝑗,𝑖 𝑅𝑅 is less than a sufficient factor ζD. ζD=5dB is the SINR threshold to guarantee a successful packet delivery if the receiver is not engaged with another packet (IEEE Std. 2007, Chen et al. 2007, Lee et al. 2010). It may happen that the senders are hidden and don't preclude data transmission if any. Failed transmission not only wastes energy but also has the potential to corrupt other transmissions. The proposed approach evaluates the state and makes an efficient decision to access the channel. It assigns a transmit power to set up mutual carrier sensing and dependently schedule the transmission opportunity. Homogenous links in terms of channel gain are assumed in previous examples, nevertheless they are not usually. CAMA exploits spatial heterogeneity of flows and assigns different power level at each station. Recall that link S2- R2 has higher quality than link S1-R1. While the default solution for sender(s) out of the capture range of the intended receipt is to preclude the concurrent transmissions, a more efficient solution is addressed by achieving asymmetric carrier sensing through heterogeneous power to schedule the transmission time. High power node S2 does not sense the transmissions of low power node S1. CAMA looks for possible minimum and different power levels at each sender to set [𝐏𝐒𝟐𝐆𝟐,𝟐 𝐒𝐑 /(𝐏𝐒𝟏 𝐆𝟏,𝟐 𝐒𝐑 + 𝜼)] ≥ 𝟏𝟎𝐝𝐁 and [𝐏𝐒𝟏𝐆𝟏,𝟏 𝐒𝐑 /(𝐏𝐒𝟐𝐆𝟐,𝟏 𝐒𝐑 + 𝜼)] ≥ 𝟓𝐝𝐁, and lets the senders achieve high throughput. Transmit power plays a vital role in our mechanism to enable either the MIM or capture effect at the nodes and set possible concurrent transmissions on a single wireless channel. S1 (being hidden from S2) transmits only if the channel is idle and commences a data transmission prior to S2 which doesn’t block any transmission request from an upper layer on sensing a clear channel. It can potentially initiate transmission that overlap with lower power transmission. Thereby, R1 captures the first coming packet if there is an overlapping transmission on the channel and R2 will begin receiving S1’s packets first, and later re-lock onto S2’s new packet which is much stronger than S1’s. The senders can successfully and fairly utilize the channel if the following conditions hold: 𝑆𝐼𝑁𝑅|𝐷−𝐷 𝑅1 and 𝑆𝐼𝑁𝑅|𝐷−𝐴 𝑅1 exceed a threshold guarantees a successful packet detection threshold ζD. 𝑆𝐼𝑁𝑅|𝐷−𝐷 𝑅2 and 𝑆𝐼𝑁𝑅|𝐷−𝐴 𝑅2 exceed γD and ζD, respectively. Further constraint should be followed since it is also possible that a data packet is received correctly, but the ACK packet is lost 𝑆𝐼𝑁𝑅|𝐴−𝐷 𝑆𝑖 = 𝐺𝑖,𝑖 𝑆𝑅 𝑃𝑅𝑖 𝐺𝑗,𝑖 𝑆𝑆 𝑃𝑆𝑗 + 𝜂 ≥ ζ𝐷 (4) Briefly, the channel is utilized efficiently only if S1 commence transmission before S2. 77 S. Mustafa 78 Flow of higher transmit power can afford to start later. It is important to highlight that we are not using a special timing signal to schedule the data transmission; we only depend on carrier sense scenario to time order the traffic. It is well understood that asymmetric links in power heterogeneous network unfairly degrades the utility experienced by low power links (Mhatre et al. 2007, Shah et al. 2007). However, our simulation study confirms that diversity in transmit power does not necessarily starve low power users if some constraints are followed. 3.2 N Sender-receiver Pairs The intended stations are responsible for estimating and disseminating the channel quality around to make a joint prediction about whether more than a flow can transmit simultaneously through minimum possible transmit power at each station to mitigate the interference and optimize the per-flow and overall network throughput on a collision free channel. If the prediction result is positive, the stations should not block their own transmissions, if any. Otherwise, an approach that considers tuning of transmit power as a PHY parameter, should be applied to set a suitable sense interaction and subsequently schedule the access to a shared medium. Simulation results in section 4 illustrate that such an access scheme performs better than the CSMA/CA even at high traffic loads, and applying it has the benefit of improving per- flow and aggregate utility in wireless networks. To estimate the complexity of such a protocol, assume there are N sender/receiver pairs willing to access the media. The nodes in pair i should estimate the channel gain over link(s) that may establish; 𝐺𝑖,𝑗 𝑆𝑅 , 𝐺𝑖,𝑗 𝑆𝑆 and 𝐺𝑖,𝑗 𝑅𝑅 ∀ neighbor pair j, either periodically or whenever it has data to transmit and/or node(s) observes degradation in the performance. They then post these values to a distributed control system to coordinate the channel access and transmit power of the nodes according to the specified policy. The stations may exchange simple control signaling to initiate the process and run the optimization algorithm. Despite that the optimal algorithm provides optimal utility of the channel, it is rather computationally expensive for a large network. To guarantee successful concurrent transmissions that would not change the result of the capture effect, SINR constraints should consider joint and maximum interference strength at a station. 𝑆𝐼𝑁𝑅1|𝐷−𝐷 𝑅𝑖 = 𝐺𝑖,𝑖 𝑆𝑅 𝑃𝑆𝑖 ∑ 𝐺𝑗,𝑖 𝑆𝑅 𝑃𝑆𝑗 𝑁 𝑗=1,𝑗≠𝑖 + 𝜂 ≥ ζD (5) 𝑆𝐼𝑁𝑅2|𝐷−𝐷 𝑅𝑖 = 𝐺𝑖,𝑖 𝑆𝑅 𝑃𝑆𝑖 𝑚𝑎𝑥𝑗≠𝑖 (𝐺𝑗,𝑖 𝑆𝑅 𝑃𝑆𝑗) + 𝜂 ≥ γD (6) If the simultaneous transmissions could ban the capture on a subset of M links, higher transmit power should be assigned at the senders of these links that being oblivious of lower power flows within their sensing range. SINR constraints should satisfy the earlier inequalities at the receivers of the M links. SINR experienced at the receivers of the remaining N- M links should exceed ζD as given by 𝑆𝐼𝑁𝑅|𝐷−𝐴 𝑅𝑖 = 𝐺𝑖,𝑖 𝑆𝑅 𝑃𝑆𝑖 ∑ 𝐺𝑗,𝑖 𝑅𝑅 𝑃𝑅𝑗 𝑁 𝑗=1,𝑗≠𝑖 + 𝜂 ≥ ζD (7) Further, SINR experienced at the senders should exceed ζD for successful delivery of ACK packets, as given by 𝑆𝐼𝑁𝑅|𝐴−𝐷 𝑆𝑖 = 𝐺𝑖,𝑖 𝑆𝑅 𝑃𝑅𝑖 ∑ 𝐺𝑗,𝑖 𝑆𝑆 𝑃𝑆𝑗 𝑁 𝑗=1,𝑗≠𝑖 + 𝜂 ≥ ζ𝐷 (8) CAMA determines the appropriate minimum transmit power that ensures that the sender can sustain a data rate to reach the intended receipt and the interference level perceived at other nodes can be mitigated thereby higher number of concurrent transmissions can be achieved. 4. Simulation Results In this section, we present simulation-based studies using NS-2.34 which incorporates the modeling details of the IEEE 802.11 MAC and PHY modules (Chen et al. 2007). The PHY module includes cumulative SINR computation, preamble and PLCP header processing and capture, and frame body capture. The MAC accurately models transmission and reception coordination, back off management and channel state monitoring in a structured and modular manner to presents the CSMA/CA mechanism. All nodes implement the 802.11g technology. The senders and receivers are placed in an indoor environment, and the radio propagation reflects shadowing model with path loss exponent of 4 over the distance (Srinivasan and Capture Aware Channel Access Protocol in Wireless Network 79 (a) S2 S1 R2 R1 S2 S1 R2 R1 (b) (c) S2 S1 R2 R1 Haenggi 2009). Parameters as antenna gain and system loss are assumed to be fixed. The default values of configuration parameters are used. Compared to preamble detection threshold ζP where preamble detection starts to work, energy detection threshold ζED in terms of SNR is higher (Lee et al. 2010). Table I lists the main parameters in our simulation study. The minimum PHY bit rate δ=6Mbps is considered in the simulation. Hence the minimum SINR which guarantees a reliable packet communication ζD=ζP=5dB, as a hardware defined threshold (IEEE Std. 2007; Chen et al. 2007; and Lee et al. 2010). The simulation is restricted to one-hop unicast UDP traffic. Each link carries constant bit rate (CBR) traffic. Each simulation runs for 60 seconds with disabled RTS/CTS virtual carrier sensing. The nodes are configured to be always backlogged with packets to send and each MAC data frame to be 1028 bytes long. During the simulation we consider utility in terms of MAC layer goodput at the receiver and Channel Usage Efficiency CUE in terms of the ratio of MAC layer goodput at the receiver to PHY layer throughput at the transmitter over a given channel as two distinct metrics. We first have activated one link to find the maximum achievable throughput, goodput and CUE of unicast traffic that are approximately 5.19 Mbps, 5.05 Mbps and 0.973 respectively due to MAC/PHY layers overhead. Low CUE indicates that a node has gained access with failed transmission which consumes energy and may cause interference to neighbors over the same channel. Fairly Shared Spectrum Efficiency (FSSE) index is considered to measure the portion of System Spectral Efficiency SSE that is shared equally among all active users. In case of scheduling starvation, FSSE would be zero during certain time intervals. In case of equally shared resources, FS SE would be equal to SSE. If FSSE is maximized, the max-min fairness can be achieved (Eriksson 2001). 4.1 Performance Evaluation of Default DCF Determining how well carrier sense works in wireless networks is the focus of the simulation studies in this section. We show few examples where the default bandwidth utilization by the 802.11MAC is far from optimal setting. Carrier sense may sometimes make incorrect access decisions thereby leading to inefficient channel usage, as explained before when exposed and/or hidden terminals are present. Utility in terms of goodput and CUE are our basic metrics for comparison of link performance across various carrier sensing settings and for measuring the efficiency of default channel access scheme. Consider a scenario of a simple four nodes topology in a 100x100m2 indoor environment to compose two wireless links, with symmetric incomplete view of channel state in Fig. 2a. The senders are within sense range of each other and within the capture range of their intended receiver. Hence, if S1 commences a data transmission, S2 should not block its own transmissions, if any, and vice-versa despite the presence of the ongoing data delivery. They could simultaneously transmit without causing excessive interference at the receivers to disrupt Table 1. Configuration parameters in the simulation study. parameters Configuration value γP 4dB γD 10dB ζED 10dB ζP= ζD 5dB δ 6Mbps η -96dBm Figure 2. Three scenarios of two flows sharing a wireless channel. In scenario (a) the intended links could always present, given that senders are in capture range of their respective receiver. Scenario (b) portrays hidden terminal case where the intended links could not present simultaneously. Scenario (c) shows a topology of two heterogeneous wireless links in terms of channel gain, given that the senders are hidden terminals and S1-R1 link only is always present. http://en.wikipedia.org/wiki/Scheduling_starvation S. Mustafa 80 successful communication. However, the default MAC mechanism based on local channel assessment may mispredict the channel state and consequently waste the transmission opportunity. Figure 3 illustrates the normalized utility on two communication links L1 and L2 when the senders depend on local channel observation only or extend the observation to the intended receiver. Having a single exposed node potentially drops the overall throughput to 50% of the optimal setting. Further complications arise in cases where hidden nodes are likely, scenario (b). Suppose S1 is oblivious of ongoing flow from S2 and vice- versa. The receivers are in close proximity such that S1 (S2) data transmission and/or R1 (R2) ACK transmission could corrupt R2 (R1) reception. The incomplete view of channel state possessed by the sender causes hidden terminal where the absence of a carrier at the sender does not mean a transmission will not collide. Both links experience packet loss due to the concurrent transmissions from the hidden terminals. The senders double their contention window size for each failure of data transmission; hereby an obvious drop in the channel utilization is illustrated in Fig. 3. Misprediction of channel state can drop the utility significantly than if an access decision is extended to the intended receiver. It is obvious that exposed and hidden terminals in the previous scenarios affect the two flows equally. The third scenario in Fig. 2 considers a topology of hidden terminals with heterogeneous link quality. S1 and S2 are out of each other’s sensing range, and S2 cannot corrupt R1 reception. However, S1 may initiate a transmission while S2 is transmitting, and disrupt the reception at R2. If S1 occupies the channel for a long time, S2 will starve. The simulation in Fig. 3 shows extreme unfairness due to asymmetric interference and diverse transmission opportunity the senders have, which cannot be addressed in this scenario with extending the channel observation to the intended receiver. The unfairness in access opportunity which is undesirable as it can adversely affect delay sensitive applications cannot be addressed without coordination with the surrounding nodes. Next, we have evaluated the performance of hidden terminals in the topology of Fig. 2c with different traffic load on the wireless links and default MAC mechanism. S1 is located within the capture range of its intended receiver while S2 is not always depending on the traffic rate on the interfering link L1. Regarding the simulation results in Fig. 4 in terms of normalized utility on L2, R2's default MAC layer has recorded nothing at traffic load of 3Mbps. It could work better at low traffic load wherein the target utility of 1Mbps is attained. However, CUE metric considered here is not satisfying even with low traffic load. Failed transmissions not only alleviate CUE and waste energy but also have the potential to corrupt other transmissions. Generally, the overall performance claim that the default mechanism doesn't work efficiently even with low traffic load, and simply extending the observation to the intended receiver don't address the limitation. An intuition to maximize the utility and channel usage efficiency is to set up capture aware MAC scheme jointly with adaptive transmit power as has been described in section 3. Figure 3. Normalized utility for the scenarios in Fig. 2, in terms of MAC's layer good put with default channel assessment at the senders and extended assessment to the intended receiver. 0 0.2 0.4 0.6 0.8 1 1.2 L1 L2 L1 L2 L1 L2 N o rm a liz e d U ti lit y Default local observation Extended observation Capture Aware Channel Access Protocol in Wireless Network 81 4.2 Performance Evaluation of CAMA In this section we assess the performance of our proposed framework to mitigate the interference and leverage the spatial reuse via a broad picture of the channel state. In this paper, we assume that information exchange works perfectly as well as the coordination. We conducted three different sets of simulations using different number of sender-receiver pairs use CBR applications on the same channel. 4.3.1 First Scenario First, we have conducted a number of simulations using two links for illustrative purpose. The position of nodes is sampled from a two-dimensional distribution in 100x100 m2 indoor environment, as shown in Fig. 5. The receivers are deployed in overlapping area of the senders and each tolerates a certain level of interference depending on channel gain and the transmit power. The unicast traffic considered is generated and flowed at a rate sufficient to saturate the medium. The link gain is assumed as being fixed for the duration at which power updates are performed in CAMA framework. Fig. 6a shows the normalized utility experienced by users to illustrate the performance improvement compared to the default DCF at different power levels. The default MAC mechanism depends on local channel assessment to decide whether to commence a transmission or to defer it. With default DCF and transmit power level of 19dBm (Case1), the senders are hidden and transmit independently. L2 hits the maximum utility with sender in capture range of the intended receiver, whereas L1 is seriously affected by co-channel interference. Fig. 6b shows inefficient channel usage by S1, in contrast to S2 that being oblivious of the collisions experienced by R1. Figure 4. Performance evaluation in terms of normalized utility and channel usage efficiency on L2 for the scenario (c) in Fig. 2 at different traffic loads. In case1, traffic loads Ʈ1= Ʈ2 = 3Mbps. Case2 considers Ʈ1=2Mbps and Ʈ2=1Mbps, while in case3, Ʈ1 = Ʈ2 = 1Mbps. Figure 5. Network model and topology as used in the simulation. The nodes disseminate the estimated link gain to get broader view and perform joint optimization. 0 0.2 0.4 0.6 0.8 1 1.2 Case1 Case2 Case3 Normalized Utility S. Mustafa 82 Higher transmit power can be used to set symmetric carrier sensing between the senders, for example 27dBm (Case2). The goal is to silence a sender when the other initiates a transmission. Slight different performance: 0.48 and 0.59 of the maximum utility is hit, respectively over the transmission links. Collisions occur at R1 when two senders choose the same slot in the contention window to transmit their frames since L1 observes less degree of channel quality; however, this case doesn’t happen as often compared to the case when the senders are hidden from each other. While the default solution for sender out of the capture range of the intended receiver, is to preclude the concurrent transmissions, CAMA framework shows the existence of optimal transmit power for each node in this scenario to set up asymmetric carrier sense and satisfy SINR constraints, where an obvious improvement in per-flow and aggregate utility is resulted (Case 3). By switching for example to transmit power 27dBm at S1 and 19dBm at S2, R1 and R2; S2 is able to carrier sense data transmissions from S1 but not vice-versa. The sender S2 can access the channel during time interval between successive transmitted frames of high power sender within its sensing range. S1 doesn’t block any transmission request from an upper layer that could overlap with existing flow. Moreover, if S1’s frame arrives when S2 is in transmission state, S2 will not be able to hear this frame even if its transmission would end very soon after, since the received energy from S1 is below energy detection threshold and S2 would have missed the preamble and PLCP header. We confirmed the above argument by tracing the transmission order and inter-transmission time NS-2.34 trace file. Albeit the transmission time of the terminals could overlap and eventually the frames based on the traffic size, the concurrent transmissions with the new setting of transmit power don't introduce enough interference to deprive the reception. Low power data flow survives the collision with the early interference frame from S2 with 𝑆𝐼𝑁𝑅|𝐷−𝐷 𝑅1 ≥10dB and hits the maximum utility. Higher power flow attains that utility with 𝑆𝐼𝑁𝑅|𝐷−𝐷 𝑅2 ≥5dB that guarantees data packet delivery: the first captured frame from S2 tends to survive the collision with a later interference packet from S1. Other SINR constraints: 𝑆𝐼𝑁𝑅|𝐷−𝐴 𝑅𝑖 ≥5dB and 𝑆𝐼𝑁𝑅|𝐴−𝐷 𝑆𝑖 ≥5dB are also met to preclude data and ACK packets collision. The senders successfully and fairly utilize the channel wherein normalized utility and CUE results in Fig. 6 are almost one. The results demonstrate no starving with asymmetric links in power heterogeneous network, and confirm the efficacy of CAMA framework to provide collision free channel. Our simulation results with unicast traffic in contrast to the results have been observed in (Rao and Stoica 2005) with broadcast traffic over asymmetric sensing links. Extended Inter Frame Space (EIFS) is supposed to be the main reason for the unfairness in the transmission opportunity. Figure 7 shows FSSE and SSE results wherein CAMA mechanism obviously has much better spectral efficiency and fairness since it gets off hidden and exposed node scenarios, which are the well known sources for the limitation of the default mechanism. The results shows that coordinated and collaborative framework enables efficient use of the wireless resource and achieves potential improvement over DCF. Figure 6. Performance evaluation in terms of a) Normalized utility, and b) CUE of possible scenarios with default DCF and CAMA. 0 0.2 0.4 0.6 0.8 1 1.2 Case1 Case2 Case3 N o rm a liz e d U ti lit y L1 L2 0 0.2 0.4 0.6 0.8 1 1.2 Case1 Case2 Case3 C h a n n e l U sa g e E ff ic ie n cy C U E L1 L2 (a) (b) S. Mustafa 83 4.3.2 Second Scenario We substantiated the proposed CAMA mechanism on larger networks of sender- receiver pairs distributed in three-dimensional distribution in 100x100x100m3 indoor environment with disparity in link quality. The probability with which a given frame could be captured by intended receipt is a function of the number of ongoing transmission. The energy received from the intended packet should be higher than total accumulated energy received from the remainder parallel transmission over the capture interval, as defined in the equations (5)-(8). The optimal solution consists of defining a set of willing end-users to transmit, and apply CAMA mechanism to enable possible concurrent transmissions over the channel. To portray the impact of the aggregate interference, consider a set of four sender- receiver pairs (Fig. 8). The distance between the senders S1, S2, S3 and S4 is roughly 40m except the distance between S3 and S4 is 70m. The position of the receivers is sampled such that R3 is within the interference range of S1 and S2, i.e. either R3 is able to decode the foreign frame correctly or not, it could engage with overheard S1 or S2's preamble. R4 is also within the interference range of S1. Each flow is sending separate CBR flows to the corresponding receiver on the same channel. In a scenario where the nodes have no knowledge of ongoing hidden transmission (Case1), S1 and S2 monopolize the channel and achieve the maximum utility at the expense of the starving nodes S3 and S4, as simulation results in terms of utility and FSSE demonstrate in Figs. 9 and 10, respectively. Average CUE in terms of the ratio of the aggregate MAC layer good put at the receivers to the aggregate PHY layer throughput at the corresponding transmitters, is also presented in Fig. 10. We have recorded 10.4Mbps an aggregate utility. In the next case (Case2), mutual sensing leverages FSSE and drops SSE with an aggregate utility reaches roughly 7.2Mbps. Figure 7. Performance evaluation in terms of fairness and overall spectral efficiency of the scenarios in Fig. 6. Figure 8. Four sender-receiver pairs distributed in three-dimensional distribution in 100x100x100m3 indoor environments with disparity in link quality. 0 0.1 0.2 0.3 0.4 0.5 Case1 Case2 Case3 FSSE (bps/Hz) SSE (bps/Hz) Capture Aware Channel Access Protocol in Wireless Network S. Mustafa 84 Later, we have applied CAMA mechanism in Case 3 to find the appropriate transmit power for each node depending on the interfering environment it sees, such that parallel uplink and downlink transmissions cannot introduce enough interference to corrupt the reception at neighbor send-receive pairs. Higher transmit power of 23dBm and 21dBm are set at S3 and S4, respectively due to the link quality each sees. Lower power level 13dBm is set at the remaining nodes such that: S1 and S2 are sensing S3 and S4's traffic but not vice versa. S1 and S2 transmit independently as well as S3 and S4 since they don't experience peer interference. Power heterogeneous network is required here to schedule the possible largest number of successful concurrent transmissions in a single time slot on a single wireless channel. Various power levels are set at the nodes to drive a sender in or out of sensing range of others herby schedule the time to transmit, and to satisfy the SINR constraints in equation (5-8). An obvious improvement is portrayed in the simulation based results. Energy detection threshold here is set at the default value. Individual transmission of S3 and S4 results in SNR higher than ζED and ζP, respectively at S1 and S2 that enables either S3's preamble or energy detection, and S4's energy detection if S1 or S2 are listening. It is obvious that their concurrent transmission is also detectable. As for individual links, we observe that power adaptation according to CAMA maximizes S3 and S4’s utility only, and their saturated traffic especially of S3 reduces obviously other's opportunity to access the channel. Nevertheless, obvious improvement in FSSE and SSE is attained. Later in Case4, higher ζED is configured such that S1 and S2 do not sense a delivered energy of ongoing transmission when the corresponding preamble is missed. Preamble detection only is required to schedule the instantaneous transmissions of senders with homogenous technology. S1 and S2 knock the channel frequently to achieve the maximum utility and subsequently lead to the maximum fairness, though the power levels are not changed. Fairly and efficiently channel utilization demonstrates the efficacy of CAMA framework. Figure 9. Performance evaluation of different scenarios of four heterogeneous wireless links in terms of channel gain, and distributed in 3D indoor environment. Figure 10. Performance evaluation in terms of fairness, overall spectral efficiency and average channel usage efficiency. 0 0.2 0.4 0.6 0.8 1 1.2 Case1 Case2 Case3 Case4 N o rm a liz e d U ti lit y L1 L2 L3 L4 0 0.2 0.4 0.6 0.8 1 1.2 FSSE (bps/Hz) SSE (bps/Hz) Capture Aware Channel Access Protocol in Wireless Network 85 4.3.3 Third Scenario We next randomly distribute 20 and 50 nodes in a 100x100 m2 indoor environment, respectively. Each sender has its own receiver chosen randomly from the set of immediate neighbors. A random traffic model at each sender is used with a sufficiently high load such that a sender to be always backlogged with packets to send. A high ζED is configured at each node such that they do not sense a delivered energy of ongoing transmission when the corresponding preamble is missed. In this case study, CAMA uses a genetic algorithm GA approach for optimal power distribution in a network. The GA is applied to find the optimal power level for each user under different operating conditions based on the constraints defined earlier. The problem is formulated as a multi-objective optimization problem which aims at maximizing the utilization and fairness. GA can work even when the objective function is not exactly known since it relies only on an objective function’s evaluation. It is well-known for their remarkable generality and versatility, and has been applied in a wide variety of settings in wireless networks. The author skipped the details of GA since it is not in the scope of the work rather than for applying an optimization algorithm in CAMA framework. For details on GA, the author recommends (Sivanandam and Deepa 2007). Figure 11 illustrates the aggregate one-hope utility achieved using 20 and 50 nodes in a random topology using the default DCF and CAMA as a channel access mechanism. The aggregate utility is found as the aggregate throughput of concurrent one hop communication in the network. The results are averaged over three independent simulation runs. Our approach offers clear improvement against DCF. Figure 12 illustrates the average value of the FSSE and CUE using the default DCF and CAMA in random topology of 50 nodes. Performance evaluation in terms of fairness and the channel usage demonstrates the significant improvement using CAMA based on a broad observation of the channel state. Figure 11. The average of the aggregate one-hope utility in random topology of 20 and 50 nodes. The results are achieved using default DCF and CAMA mechanism. Figure 12. Performance evaluation of 50 nodes in a random topology in terms of fairness FSSE and average channel usage efficiency CUE, using the default DCF and CAMA mechanism. 10 40 70 100 130 160 20 nodes 50 nodes A g g rg a te o n e -h o p e U tl it y M b p s Default DCF 0 0.2 0.4 0.6 0.8 1 Default DCF CAMA FSSE Avg. CUE S. Mustafa 86 Through the investigated use cases, asymmetric carrier sense is introduced and applied in CAMA. The simulation results portray the benefit of asymmetric sense scenario to time schedule the overlapped traffic without an extra timing signal. CAMA employs power heterogeneous ad- hoc network to optimize criteria involving throughput and fairness. This requires obtaining effective spatial reuse while satisfying the interference constraints. 5. Conclusion and Future Work Based on local channel assessment, the default DCF mispredicts transmission failures and wastes potential transmission opportunities when they exist. It ignores the possibility of parallel transmissions that make use of the capture effect. It can be ineffective even at low traffic load. This paper proposes a new capture- aware mechanism for ad-hoc networks while their benefit is amplified by properly adjusting the transmission power of the nodes based on broad observation of the channel. Through simulations, such a mechanism is shown to deliver high network utilization and provide fair access to the media than the standard DCF that these networks use. Using the simulator trace files, we have found that tuning transmit power is helpful in setting specific sense scenario and subsequently schedule the access to a shared medium without modifying carrier sense threshold, as has been exploited in CAMA framework in an interference-free fashion. The nodes cooperate in power updating process via exchanging simple control signaling in power heterogeneous network. Further, based on the simulation results, we have found that throwing energy detection carrier sense line offers higher network utility. In environment with heterogeneous technologies, foreign preambles are undetectable and energy detection may results in lower per-flow utility. However, the target SINR by CAMA at the corresponding heterogeneous nodes is expected to be lower since a receiver would not engage to a first coming foreign preamble, which in turn enables more concurrent transmissions and records higher aggregate utility and overall spectral efficiency. Our future work will demonstrate it. We also propose to explore how a similar mechanism can be used to adjust more PHY parameters like the PHY rate or/and contention window size as MAC parameter. Conflict of Interest The author declares no conflicts of interest. Funding No funding was received for this research. References Chen Q, Eisenlohr FS, Jiang D, Moreno MT, Delgrossi L, Hartenstein H (2007), Overhaul of ieee 802.11 modeling and simulation in ns-2. Proc. ACM MSWiM'07: 159-168. Ding P, Holliday J, Celik A (2005), Demac: an adaptive power control MAC protocol for ad-hoc networks. Proceeding of IEEE 16th International Symposium on Personal, Indoor and Mobile Radio Communications PIMRC 2: 1389-1395. Eriksson M (2001), Dynamic single frequency networks. IEEE Journal on Selected Areas in Communications 19(10): 1905-1914. Gomez J, Campbell AT, Naghshineh M, Bisdikian C (2001), Conserving transmission power in wireless ad hoc networks. Proceeding of the Ninth International Conference on Network Protocols ICNP: 11-14. Haghani E, Krishnan MN, Zakhor A (2010), Adaptive carrier-sensing for throughput improvement in IEEE 802.11 networks. Proceeding of IEEE Global Telecommunications Conference GLOBECOM: 1-6. IEEE Std. 802.11 (2007), Part 11: wireless LAN medium access control (MAC) and physical layer (PHY) specifications, IEEE Std. 802.11. Jamieson K, Hull B, Miu A, Balakrishnan H (2005), Understanding the real-world http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=10989 http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=10989 http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=10989 http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=10989 http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5682081 http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5682081 http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5682081 Capture Aware Channel Access Protocol in Wireless Network 87 performance of carrier sense. Proceedings of 2005 ACM SIGCOMM Workshop on Experimental Approaches to Wireless Network Design and Analysis, E-WIND’05: 52–57. Jeong J, Choi S, Yoo J, Lee S, Kim CK (2013), Physical layer capture aware MAC for WLANs. Wireless Networks 19(4): 533- 546. Kurth M, Redlich JP (2009), Carrier sensing and receiver performance in indoor IEEE 802.11b mesh networks. Proceeding of International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly IWCMC’09: 726-732. Larroca F, Rodríguez F (2014), An overview of WLAN performance, some important case-scenarios and their associated models. Wireless Personal Communications 79(1): 131-184. Lee J, Ryu J, Lee SJ, Kwon TT (2010), Improved modeling of IEEE 802.11a PHY through fine-grained measurements. Computer Networks 54(4): 641-657. Li P, Geng X, Fang Y (2009), An adaptive power controlled MAC protocol for wireless ad hoc networks. IEEE Transaction on Wireless Communications 8(1): 226-233. Lim A, Yoshida S (2005), A power adapted MAC (PMAC) scheme for energy saving in wireless ad hoc networks. IEICE Transaction on Fundamentals of Electronics, Communication and Computer Sciences, E88-A (7):1836– 1844. Ma H, Vijayakumar R, Roy S, Zhu J (2009), Optimizing 802.11 wireless mesh networks based on physical carrier sensing. IEEE/ACM Transactions on Networking 17(5): 1550-1563. Maheshwari R, Jain S, Das SR (2008), A measurement study of interference modeling and scheduling in low-power wireless networks. Proceedings of the 6th ACM Conference on Embedded Network Sensor Systems SenSys’08: 141-154. Mhatre VP, Papagiannaki K, Baccelli F (2007), Interference mitigation through power control in high density 802.11 WLANs. Proceeding of IEEE INFOCOM: 535-543. Mustafa S (2015), Interference estimation and mitigation in wireless networks. International Journal on Computing and Digital System 4(4): 233-243. Pelechrinis K, Guanhua Y, Eidenbenz S, Krishnamurthy SV (2009), Detecting selfish exploitation of carrier sensing in 802.11 networks. Proc. IEEE INFOCOM: 657-665. Patras P, Qi H, Malone D (2014), Mitigating collisions through power-hopping to improve 802.11 performance. Pervasive and Mobile Computing 11: 41-55. Rao A, Stoica I (2005), An overlay MAC layer for 802.11 networks. Proceedings of the 3rd International Conference on Mobile Systems, Applications, and Services ACM MobiSys: 135-148. Santhapuri N, Nelakuditi S, Choudhury RR (2007), Capture-aware staggering for concurrent transmissions. Proceedings of the 2007 ACM CoNEXT conference. Shah V, Gelal E, Krishnamurthy SV (2007), Handling asymmetry in power heterogeneous ad hoc networks. Computer Networks 51: 2594-2615. Sivanandam SN, Deepa SN (2007), Introduction to Genetic Algorithms. Springer. Srinivasan S, Haenggi M (2009), Path loss exponent estimation in large wireless networks. Information Theory and Applications Workshop: 124-129. Takahashi K, Obata H, Murase T, Ishida K (2015), Throughput improvement method exploiting capture effect in densely placed WLANs. Proceeding of the 9th international Management and Communication IMCOM'15. http://link.springer.com/journal/11276 http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5061887 http://www.sciencedirect.com/science/journal/15741192 http://www.sciencedirect.com/science/journal/15741192 http://www.sciencedirect.com/science/journal/15741192/11/supp/C http://ita.ucsd.edu/workshop/09/files/paper/paper_628.pdf http://ita.ucsd.edu/workshop/09/files/paper/paper_628.pdf http://ita.ucsd.edu/workshop/09/files/paper/paper_628.pdf http://ita.ucsd.edu/workshop/09/files/paper/paper_628.pdf