Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function

Similar documents
Mohammad Hossein Manshaei 1393

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF

P B 1-P B ARRIVE ATTEMPT RETRY 2 1-(1-P RF ) 2 1-(1-P RF ) 3 1-(1-P RF ) 4. Figure 1: The state transition diagram for FBR.

Performance Analysis of WLANs Under Sporadic Traffic

An Efficient Scheduling Scheme for High Speed IEEE WLANs

Research Article Performance Analysis of IEEE DCF under Nonsaturation Condition

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm

Performance Comparison of IEEE e EDCA and b DCF Under Non- Saturation Condition using Network Simulator

Title. Author(s)Nguyen, Thi Xuan My; Saivichit, Chaiyachet; Miyanaga. Issue Date Doc URL. Type. Note. File Information

Enhancing the DCF mechanism in noisy environment

Evaluation of the backoff procedure of Homeplug MAC vs. DCF

B. Bellalta Mobile Communication Networks

Characterising the Behaviour of IEEE Broadcast Transmissions in Ad Hoc Wireless LANs

WIRELESS local area networks (WLANs) have been

An Improved IEEE CSMA/CA Medium Access Mechanism Through the Introduction of Random Short Delays

Department of Electrical and Computer Systems Engineering

A Comparative Analysis on Backoff Algorithms to Optimize Mobile Network

Investigating MAC-layer Schemes to Promote Doze Mode in based WLANs

An Analytical Model for IEEE with Sleep Mode Based on Time-varying Queue

Throughput Analysis of CSMA Wireless Networks with Finite Offered-load

A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS

Characterising the interactions between unicast and broadcast in IEEE ad hoc networks

Massive Random Access: Fundamental Limits, Optimal Design, and Applications to M2M Communications

Collision Probability in Saturated IEEE Networks

Numerical Analysis of IEEE Broadcast Scheme in Multihop Wireless Ad Hoc Networks

THE wireless LAN standard has been widely deployed

Can Multiple Subchannels Improve the Delay Performance of RTS/CTS-based MAC Schemes?

Performance Analysis of IEEE DCF in Imperfect Channels

878 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 16, NO. 4, AUGUST 2008

WLAN Performance Aspects

Prioritization scheme for QoS in IEEE e WLAN

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

ACK-based QoS Support and Throughput Improvement over WLANs

Cross-Layer Performance Analysis of CSMA/iCA Based Wireless Local Area Network

Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks

SRN Model for IEEE DCF MAC Protocol in Multi-hop Ad Hoc Networks with Hidden Nodes

A Frame Aggregation Scheduler for IEEE n

Enhancements and Performance Evaluation of Wireless Local Area Networks

AGOOD medium access control (MAC) protocol for wireless

Exploiting Multi-User Diversity in Wireless LANs with Channel-Aware CSMA/CA

E-BEB Algorithm to Improve Quality of Service on Wireless Ad-Hoc Networks

WIRELESS Wireless local area networks (WLANs)

IEEE Throughput and Delay Analysis for mixed real time and normal data traffic

Fu-Yi Hung ALL RIGHTS RESERVED

Performance analysis of Internet applications over an adaptive IEEE MAC architecture

ACENTRAL question in the study of multihop networks

Setting the Parameters Right for Two-hop IEEE e Ad Hoc Networks

Providing Throughput Guarantees in IEEE e Wireless LANs

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

Packet multiple access and the Aloha protocol

COLLISION-AWARE ADAPTION OF CONTENTION WINDOW IN E WIRELESS LAN

Adaptive Fair Channel Allocation for QoS Enhancement in IEEE Wireless LANs

MAC. Fall Data Communications II 1

Two-Tier WBAN/WLAN Healthcare Networks; Priority Considerations

Analysis of Broadcast Non-Saturation Throughput as a Performance Measure in VANETs

Analytical Model for an IEEE WLAN using DCF with Two Types of VoIP Calls

B. Bellalta Mobile Communication Networks

An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol

CHAPTER 5 PROPAGATION DELAY

Reliable Multicast Scheme Based on Busy Signal in Wireless LANs

CSE 461: Wireless Networks

Performance Analysis of Grouping Strategy for Dense IEEE Networks

A Survey on Congestion Control and Maximization of Throughput in Wireless Networks

THE Internet has evolved dramatically in the past several

ETSN01 Exam Solutions

Adaptive Packetization for Error-Prone Transmission over WLANs with Hidden Terminals

MAC in /20/06

Distributed Call Admission Control for Ad Hoc Networks

The IEEE Distributed Coordination Function in Small-Scale Ad-Hoc Wireless LANs

High Performance Distributed Coordination Function for Wireless LANs

Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica

Throughput prediction in wireless networks using statistical learning

Wireless Networking & Mobile Computing

Performance Analysis of the Intertwined Effects between Network Layers for g Transmissions

Analysis of the IEEE e EDCA Under Statistical Traffic

Fairness Enhancement Scheme for Multimedia Applications in IEEE e Wireless LANs

Project Report: QoS Enhancement for Real-Time Traffic in IEEE WLAN

An Accurate Model for Energy Efficiency in IEEE WLANs

ICE 1332/0715 Mobile Computing (Summer, 2008)

The MAC layer in wireless networks

Solutions to Performance Problems in VoIP Over a Wireless LAN

Multiple Access Links and Protocols

Md. Imrul Hassan, Hai L. Vu, and Taka Sakurai Centre for Advanced Internet Architectures, Faculty of ICT Swinburne University, Australia

EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE WIRELESS NETWORKS

ENHANCING THE PERFORMANCE OF MANET THROUGH MAC LAYER DESIGN

Analysis of CSMA/CA Systems under Carrier Sensing Error: Throughput, Delay and Sensitivity

Mohamed Khedr.

Performance of A Burst-Frame-Based. CSMA/CA Protocol for High Data Rate Ad. Hoc Networks: Unsaturated Throughput. Analysis

Supporting VBR VoIP Traffic in IEEE WLAN in PCF Mode

Wireless Networks (MAC)

Design and Analysis of an Adaptive Backoff Algorithm for IEEE DCF mechanism

Ad Hoc b Cooperative Protocols: Performance in a Slow Fading Channel

A Medium Access Control Protocol with Retransmission using NACK and Directional Antennas for Broadcasting in Wireless Ad-Hoc Networks

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks

Lecture 16: QoS and "

Adaptive Mechanism for Aggregation with fragments retransmission in high-speed wireless networks

International Journal of Emerging Technology and Advanced Engineering Website: (ISSN , Volume 2, Issue 1, January 2012)

A Finite State Model for IEEE Wireless LAN MAC DCF

June 20th, École Polytechnique, Paris, France. A mean-field model for WLANs. Florent Cadoux. IEEE single-cell WLANs

Transcription:

Comparison of pre-backoff and post-backoff procedures for IEEE 802.11 distributed coordination function Ping Zhong, Xuemin Hong, Xiaofang Wu, Jianghong Shi a), and Huihuang Chen School of Information Science and Technology, Xiamen University Xiamen 361005, China a) shijh@xmu.edu.cn Abstract: Accurate analytical modeling of IEEE 802.11 distributed coordination function (DCF) is very important to characterize IEEE 802.11 medium access control (MAC) layer performance. The two backoff procedures used in the IEEE 802.11 DCF, namely pre-backoff and post-backoff procedures, are commonly treated as the same in existing analytical DCF models for simplicity. This paper makes the first effort to point out the difference between these two backoff procedures. Through intuitive reasoning and simulation results, we show that the two backoff procedures yield un-negligible differences in the performance of average access delay, but give the same performance of throughput. Keywords: IEEE 802.11, medium access control, distributed coordination function (DCF), network simulator NS-3 Classification: Wireless circuits and devices References [1] IEEE, Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specification, IEEE Std. 802.11-2007 edition, 2007. [2] G. Bianchi, Performance analysis of the IEEE 802.11 distributed coordination function, IEEE J. Sel. Areas Commun., vol. 18, pp. 535 547, March 2000. [3] H. Wu, Y. Peng, K. Long, S. Cheng, and J. Ma, Performance of reliable transport protocol over IEEE 802.11 wireless LAN: analysis and enhancement, Proc. IEEE InfoCom 02, New York, pp. 599 607, June 2002. [4] L. Y. Shyang, A. Dadej, and A. Jayasuriya, Performance analysis of IEEE 802.11 DCF under limited load, Proc. Asia-Pacific Conf. Communications, vol. 1, pp. 759 763, Oct. 2005. [5] F. Daneshgaran, M. Laddomada, F. Mesiti, and M. Mondin, Unsaturated throughput analysis of IEEE 802.11 in presence of non ideal transmission channel and capture effects, IEEE Trans. Wireless Commun., vol. 7, no. 4, pp. 1276 1286, April 2008. [6] G. R. Cantieni, C. B. Q. Ni, and T. Turletti, Performance analysis under finite load and improvements for multirate 802.11, Computer Commun, vol. 28, no. 10, pp. 1095 1109, June 2005. 2035

[7] N. T. Dao and R. A. Malaney, A new markov model for non-saturated 802.11 networks, Proc. 5th IEEE Consumer Communications and Networking Conf., Las Vegas, pp. 420 424, Jan. 2008. [8] K. Ghaboosi, M. Latva-aho, Y. Xiao, and B. H. Khalahj, Modeling IEEE 802.11 DCF using parallel space-time markov chain: multi-hop Ad hoc networks, Proc. GLOBECOM 2009, Honolulu, pp. 1 7, 2009. [9] The network simulator ns-3 [Online] http://www.nsnam.org/index.html 1 Introduction The IEEE 802.11 Medium Access Control (MAC) uses the distributed coordination function (DCF) as a common mechanism to access the medium. This has triggered researches on the performance analysis and enhancement of DCF [2, 3, 4, 5, 6, 7, 8]. Most analytical models for IEEE 802.11 DCF are based on Markov chain model. A famous one proposed by G. Bianchi [2] used a two dimensional discrete Markov chain network to model the behavior of binary exponential backoff mechanism used in DCF under saturated conditions. Some studies [3] enhanced Binachi s model by considering imperfect channels, finite buffer, and limited retry. In addition, many latter studies [4, 5, 6, 7, 8] extended the Bianchi s model to operate in non-saturated conditions, so that the extended model become more realistic. In practical network operations, the incoming traffic load is unsaturated in general. Therefore, in this paper we focus on unsaturated models. Existing unsaturated models [4, 5, 6, 7, 8] are different in mathematical descriptions and complexities. L.Y. Shyang et al. [4] introduced a new idle state accounting for the case of the station with empty queue. For simplicity, F. Daneshgaran et al. [5] also considered the unsaturated conditions by adding a new state in Rayleigh fading channel. However, as defined in the standard [1], a random backoff is performed immediately after the end of each transmission even if no additional transmissions are currently queued. This post-backoff procedure was neglected in [4, 5]. In addition, we call the backoff procedure without the separate backoff states as pre-backoff. G.R. Cantieni et al. [6] modeled the additional post-backoff states to study the non-saturated regime. N.T. Dao et al. [7] provided an improved treatment of the post-backoff. K. Ghaboosi et al. [8] took into account the backoff and post-backoff processes with the MAC sub-layer transmission queue status. However, none of the studies above considered the differences between pre-backoff and post-backoff processes. In this paper, we explore the inherent discrepancy between pre-backoff and post-backoff procedures. We aim to shed light on the following two questions: Is the simplified pre-backoff suitable for analytical model? Does the neglected part of post-backoff affect the characteristic of DCF? The difference between the two backoff procedures is first explained by intuition and further quantified and validated by simulations. 2036

2 Backoff procedure in 802.11 DCF analytical models Most analytical frameworks for 802.11 DCF are based on Markov chain models to describe the behavior of binary exponential backoff scheme. The backoff procedure is the same in both saturated and unsaturated cases. The only difference in the analytical models between the unsaturated case and the saturated case is the time when the backoff counter is idle due to the absence of a packet. As defined in standard [1], after a successful transmission, a station must wait a distributed interframe space (DIFS) and perform backoff even if it has no queued data frame in its local buffer. This process is often known as postbackoff, as this backoff is done after a transmission as described in Fig. 1 (a). This post-backoff ensures that two consecutive transmissions are separated by at least one backoff interval. Hence, the idle state representing the empty buffer is also slotted after a successful transmission in the analytical model [6, 7, 8]. Fig. 1. Backoff procedure However, for simplicity, the 802.11 post-backoff feature was not fully taken into account in some analytical models [2, 3, 4, 5] under the assumption that post-backoff has a negligible effect on the performance. After a successful transmission, the station enters an idle state with an empty buffer until a new packet arrives for transmission to invoke the backoff counter, as described in Fig. 1 (b). The traffic interval is relatively long under the unsaturated condition. Correspondingly, the time to next transmission is long. Due to the relatively long interval of packet arrival, there is enough time for retry when collisions occur. Hence, successfully transmitted packets should be the same for both backoff procedures. However, if a new packet is generated after the postbackoff procedure, the packet may be transmitted immediately, but it is easy to collide with other nodes at the packet first time transmission as a result of longer delay. Therefore, the throughputs are the same but the access delays may be different under the unsaturated condition. Let s make an example to illustrate the detailed difference between two backoff. There are two scenarios of homogeneous network, one using postbackoff procedure as described in Fig. 1 (a), and the other one using the 2037

pre-backoff as described in Fig. 1 (b). For simplicity, there are two nodes in each network and the packet arrival rate is 1 packet per second. The queue is empty after the packet successful transmission during the unit time. If two nodes generate the packet at the same time during a unit time, the collision will be happened at the first scenario but the collision probability at the ( / ) second scenario is 1 2. W W0 0 is the contention window size. Notice that the collision in second scenario is much lower than in first scenario. Collision causes packet retransmission and results in the longer access delay. Hence, the pre-backoff has the better performance of access delay than post-backoff. Since the request to transmit (RTS) and (clear to transmit) CTS mechanisms cannot effectively alleviate the collision, the performance by using pre-backoff and post-backoff of RTS/CTS mechanism should be the same with basic mechanism under the same situation. The analysis will be exemplified by simulation results presented subsequently. 3 Performance evaluation To validate the discrepancy between pre-backoff and post-backoff, we conduct various simulations using the NS-3 simulator [9] for different network size and load. Let us focus on the functionalities of the backoff procedure. There are only three fundamental working levels: application, MAC and PHY layers. Traffic is generated following a Poisson distribution for the packet inter-arrival times and arrival rates of all stations are the same. MAC and PHY employ the IEEE 802.11b infrastructure mode network. Table I gives the default parameters are given in as most analytical model using [2, 3, 4, 5, 6, 7, 8]. Table I. Parameter values for simulation Consider a network of all stations randomly deployed in a rectangular area and communicate with each other. The simulation time is set to be 10 seconds. All simulation results are obtained by averaging over 100 sample scenarios. By adjusting the network size and traffic load, we compare the throughout and access delay results of pre-backoff and post-backoff under 2038

Fig. 2. The comparison of two backoff procedures 2039

basic access mechanism and RTS/CTS access mechanisms. The packet size in the RTS/CTS mechanism is the same as the basic access mechanism. We change the RTS/CTS threshold when evaluating its performance. Fig. 2 (a) illustrates the throughput as a function of the packet rate λ, corresponding to basic access mechanism and RTS/CTS access mechanism. The scenario with 10 stations (n = 10) is considered. For this scenario, there is no obvious difference between pre-backoff and post-backoff, no matter which access mechanism is used and what the traffic load is. Fig. 2 (b) shows the performance of average access delay as a function of the packet arrival rate λ, for 10 stations. Different access mechanism with pre-backoff and post-backoff are considered. We observe that pre-backoff and post-backoff give different performances when λ is relatively small, i.e., the situation of unsaturated condition. The access delay of pre-backoff increases with increasing packet arrival rate until it reaches the saturation zone. In contrast, the access delay of post-backoff is relatively smooth. The difference is larger at smaller λ with fixed number of stations under unsaturated condition. Meanwhile, in the unsaturation zone, the access delay of pre-backoff is less than the access delay of post-backoff under the same condition. Fig. 2 (c) presents the average access delay as a function of the station number for λ = 5. The access delay of pre-backoff has a better performance than post-backoff when the stations number is less than 20. Beyond 20 stations, the performance of pre-backoff and post backoff begins to converge. The amount of difference among two procedures is approximately 9 ms which is close to the packet collision transmission time. As we can see from Fig. 2, two backoff procedures give the same performance in the throughput and average access delay under saturated conditions. However, under unsaturated conditions, the difference of performances in average access delay by using two backoff procedures are obvious. The pre-backoff has lower access delay than the post-backoff under unsaturated condition. Meanwhile, the performance of backoff procedure is independent from access mechanisms. 4 Conclusion In this paper, we have compared two different backoff procedures used in theoretical modeling of IEEE 802.11: post-backoff and pre-backoff mechanisms. Our analysis and simulation results have shown that the two backoff procedures give no difference in throughput and average access delay under saturated conditions. However, the difference in average access delay between the two procedures is obvious under unsaturated conditions. The differences of average access delay decrease with the increased of packet arrival rate. The post-backoff is the original backoff procedure described in IEEE 802.11. The pre-backoff procedure can be considered as a modified version of IEEE 802.11 DCF. 2040