A Performance Investigation of the Modified PCF with Priority Scheme

Similar documents
A Modified Point Coordination Function in IEEE Wireless LAN

EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE WIRELESS NETWORKS

Department of Electrical and Computer Systems Engineering

Call Admission Control for IEEE Contention Access Mechanism

Using Dynamic PCF to Improve the Capacity for VoIP Traffic in IEEE Networks

ECE442 Communications Lecture 3. Wireless Local Area Networks

Wireless Networked Systems

Wireless LANs. ITS 413 Internet Technologies and Applications

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

Performance analysis of Internet applications over an adaptive IEEE MAC architecture

Lesson 2-3: The IEEE x MAC Layer

Analysis of IEEE e for QoS Support in Wireless LANs

Solutions to Performance Problems in VoIP Over a Wireless LAN

Notes on the Inefficiency of e HCCA

Performance evaluation of IEEE e

On the Performance Enhancement of Wireless LAN - A Multi-polling Mechanism with Hidden Terminal Solution

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS

Performance Evaluation of IEEE e

Unit 7 Media Access Control (MAC)

Certified Wireless Network Administrator (CWNA) PW Chapter Medium Access. Chapter 8 Overview

Two-Tier WBAN/WLAN Healthcare Networks; Priority Considerations

Data and Computer Communications. Chapter 13 Wireless LANs

Delivering Voice over IEEE WLAN Networks

Quality of Service (QoS) Settings on AP541N Access Point

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du

QoS issues in Wi-Fi-WMM based triple play home networks

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

Wireless Local Area Networks (WLANs) Part I

Efficient Transmission of H.264 Video over WLANs

QoS Enhancement in IEEE Wireless Local Area Networks

IEEE e QoS for Wireless LAN:

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

QoS Analysis of IEEE /802.11e MAC Protocols

IEEE MAC Sublayer (Based on IEEE )

A Novel Framework for Radio Resource Management in IEEE Wireless LANs

CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA)

IEEE C802.16h-07/017. IEEE Broadband Wireless Access Working Group <

Computer Communication III

Converging Voice, Video and Data in WLAN with QoS Support

Optimized WLAN MAC Protocol for Multimedia Applications

Analyzing the Impact of DCF and PCF on WLAN Network Standards a, b and g

A Finite State Model for IEEE Wireless LAN MAC DCF

MAC in /20/06

Comparison of the Quality of Service (QoS) on the IEEE e and the g Wireless LANs

MPEG4 VIDEO OVER PACKET SWITCHED CONNECTION OF THE WCDMA AIR INTERFACE

Prioritization scheme for QoS in IEEE e WLAN

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks

An Energy-efficient Point Coordination Function Using Bidirectional Transmissions of Fixed Duration for Infrastructure IEEE 802.

Table of Contents 1 WLAN QoS Configuration 1-1

A Scheme for Supporting Voice over IEEE Wireless Local Area Network

Advanced Computer Networks WLAN

Exam4Tests. Latest exam questions & answers help you to pass IT exam test easily

A Tool for Simulating IEEE e Contention-based Access

Multiple Access Links and Protocols

Scheduling of Real-time and Nonreal-time Traffics in IEEE Wireless LAN

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay

Performance Comparison of IEEE e EDCA and b DCF Under Non- Saturation Condition using Network Simulator

A SURVEY OF QOS TECHNIQUES IN Drabu, Yasir Department of Computer Science, Kent State University

. 14 Byte for Acks. Due to this fact, the overhead is more relevant if the data contained in packets is sent to high rates:

Improving the performance of Wireless LANs with MAC Adaptation

3.1. Introduction to WLAN IEEE

A new Traffic Separation Mechanism (TSm) in Wireless e Networks: A simulation study

EDCA LIMITATION WITH HIGH TRAFFIC REAL TIME APPLICATIONS

Adaptive EDCF: Enhanced Service Differentiation for IEEE Wireless Ad-Hoc Networks

IEEE e Enhanced QoS

Lecture 16: QoS and "

Appendix A Pseudocode of the wlan_mac Process Model in OPNET

A Study on Delay, Throughput and Traffic Measurement for Wi-Fi Connected Stations Based on MAC Sublayer

International Journal of Advanced Research in Computer Science and Software Engineering

Overview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi

An Efficient Scheduling Scheme for High Speed IEEE WLANs

Local Area Networks NETW 901

A Scheme for Enhancing TCP Fairness and Throughput in IEEE WLANs

An energy-efficient MAC protocol for infrastructure WLAN based on modified PCF/ DCF access schemes using a bidirectional data packet exchange

VoIP over wireless networks: a packet scheduling approach to provide QoS using Linux

Mohamed Khedr.

Wireless LAN -Architecture

WITH the increasing use of portable computers, handsets,

Fairness Enhancement Scheme for Multimedia Applications in IEEE e Wireless LANs

ICE 1332/0715 Mobile Computing (Summer, 2008)

Mobile & Wireless Networking. Lecture 7: Wireless LAN

Data Communications. Data Link Layer Protocols Wireless LANs

B. Bellalta Mobile Communication Networks

Dynamic Traffic Prioritization and TXOP Allocation in e Based Multihop Wireless Networks

Collision Free Hybrid Slot Protocol for Improving Performance in Wireless Networks

Impact of IEEE n Operation on IEEE Operation

An Efficient Multipolling Mechanism for IEEE Wireless LANs

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

Scheduling of real-time traffic in IEEE networks

Supporting VBR VoIP Traffic in IEEE WLAN in PCF Mode

Computer Networks. Wireless LANs

Wireless Communications

PLUS-DAC: An Admission Control Scheme for IEEE e Wireless LANs

Wireless Communication

Adaptive Fair Channel Allocation for QoS Enhancement in IEEE Wireless LANs

Chapter 6 Medium Access Control Protocols and Local Area Networks

MAC. OSI Layer 2 (Data Link) OSI Layer 1 (Physical)

IEEE Wireless LANs

CSE 461: Wireless Networks

Fairness and Transmission Opportunity Limit in IEEE802.11e Enhanced Distributed Channel Access

Transcription:

2 ECTI TRANSACTIONS ON ELECTRICAL ENG., ELECTRONICS, AND COMMUNICATIONS VOL.3, NO.1 FEBRUARY 2005 A Performance Investigation of the Modified with Priority Scheme Apichan Kanjanavapastit 1 and Bjorn Landfeldt 2, Non-members ABSTRACT A modified version of the point coordination function () in the IEEE 802.11 standard called Modified has been introduced as an approach to improve channel utilization over the standard. It has been shown in our previous work that the utilization of the wireless channel can be significantly improved. In this paper, we investigate the performance of the Modified when it is applied with a priority scheme to support prioritization for different traffic types such as interactive voice and video and realtime data. The investigation is done via simulation method. To illustrate the efficiency of the priority scheme, we compare its simulation results with some standardized protocols: the distributed coordination function (DCF), the enhanced distributed channel access (EDCA), and the standard, and our previously proposed protocol: the Modified without priority scheme. The simulation results show that Modified with priority scheme can provide better quality of service (QoS) support to different traffic types and also support a higher number of stations which carry data traffic than the previous proposals. Keywords: DCF, EDCA, IEEE 802.11, MAC, Multimedia,, QoS, Wireless LAN 1. INTRODUCTION Currently, interfaces of the IEEE 802.11 standard [1] are pre-installed in many laptops and PDAs. In addition, wireless networks are being deployed in many organizations, universities, homes, and public areas. As the increment of the widespread use of the WLANs, the demand of new applications including multimedia applications such as voice and video have been growing rapidly at the same time. One of the keys to these multimedia applications behaving well lies in the medium access control (MAC) sublayer defined in the standard. The primary access mechanism in the IEEE 802.11 MAC sublayer is the distributed coordination func- 05PSJ04: Manuscript received on January 22, 2005 ; revised on February 16, 2005. 1 The author is with the Research Center of applied Electromagnetic Waves (RCEW), Mahanakorn University of Technology, Bangkok, Thailand, E-mail: apichan@mut.ac.th. 2 The author is with the School of Information Technologies, The University of Sydney, Australia, E-mail: bjornl@it.usyd.edu.au. tion (DCF). The DCF is a contention-based protocol, which uses the carrier sense multiple access with collision avoidance (CSMA/CA). Since wireless stations compete to access the wireless medium, the medium access delay of each station cannot be bounded during high loads. This means the DCF can support only the asynchronous data transmission on a besteffort basis. In order to support real-time traffic such as voice and video, the point coordination function () has been another MAC protocol in the standard. The is based on a centralized polling protocol where a point coordinator (PC) located in an access point (AP) provides contention-free services to the wireless stations ordered in a polling list. Since bandwidth of the wireless medium is normally limited, spectrum utilization becomes of primary concern. Nevertheless, it was noted before the release of the standard that the performs badly due to polling overheads and the use of null frame. These result in a low number of voice conversations [2]. To overcome this problem, we have proposed a modification of the called Modified which has a capability to increase the channel utilization by avoiding the use of polling, null, and acknowledgement frames. We have shown that the utilization of wireless channel can be significantly improved using the Modified in case there is no so-called hidden station problem, through both simulations [3] and mathematical analysis [4]. However, in the case of the hidden stations, there might have frame collisions and then the channel utilization would decrease as shown in [3]. To deal with the hidden station problem, we then have proposed a retransmission process and a collision resolution mechanism [5]. Using the retransmission process, frames involved in collisions can be retransmitted. For the collision resolution technique, stations presumed as hidden stations are separately polled using the standard. This method can therefore avoid the collisions due to the hidden station problem. As the demand for quality of service (QoS) support in wireless networks grows, the IEEE 802.11e Task Group is defining a new MAC protocol called enhanced distributed channel access (EDCA) [6] which provides channel access differentiation to different types of traffic. From this differentiation, it is possible to give different priorities to different classes of traffic. Consequently, a good quality QoS can be given to the stations that carry high priority traffic streams. In order to differentiate between different types of

A Performance Investigation of the Modified with Priority Scheme 3 traffic and improve the support to QoS sensitive applications in the Modified, we propose a priority scheme to use together with the protocol. The proposed priority scheme can support not only the voice and video traffic streams but it can also support data applications e.g., Telnet, command/control, and interactive games which are sensitive to the delay. To investigate the performance of the Modified with priority scheme, we simulate and compare the results with those of the DCF, the EDCA, the, and the Modified without priority scheme. The results show that the Modified with/without priority scheme can support a higher number of data stations than the others. In addition, the Modified with priority scheme provides better QoS support than the Modified without priority scheme. 2. RELATED WORK Two techniques for implementing priority schemes in the were proposed in [7]. In the first scheme, wireless stations can transmit traffic in order of priority so that higher priority traffic (i.e. voice and video traffic) is transmitted before lower priority traffic (i.e. data traffic). In the second scheme, the PC divides a polling list into high priority list for QoS sensitive transmissions and low priority list for best effort data transmissions. Although simulations showed that the performance of the normal can be improved by the two priority schemes, the overhead problem of the as mentioned still exists. A modification of the called M- for implementing the support of QoS was proposed in [8]. In the M-, the PC begins by polling the first station in its polling list. Then, the second station in the list is allowed to automatically access the channel without the PC issuing another polling frame. In addition, if a wireless station receives a real-time frame from the PC, it does not have to return an acknowledgement. However, in the M-, the PC still sends a polling frame even if a station does not have any data to transmit. Moreover, the M- does not provide a collision resolution technique to resolve the collision problem, which occurs due to the hidden station problem. Therefore, the scheme still suffers from relatively low bandwidth utilization. A protocol called Superpoll [9] was proposed to improve the reliability of the to receive polling frames. The protocol includes a list of stations that will be polled during a current contention-free period (CFP). In addition, a chaining mechanism was proposed to improve the reliability of the protocol by attaching a Superpoll message containing a list of the remaining stations to be polled in every sent frame. In the Superpoll protocol, if a station has no data to send, it instead sends a null frame, which still wastes bandwidth. Moreover, the Superpoll message, which is appended to the header of every sent frame, decreases the channel utilization. Last of all, this scheme can effectively operate only with traffic where the frame size is constant (e.g. voice traffic) because each station in the list has to set a pre-calculated timeout. 3. THE MODIFIED WITH PRIORITY SCHEME 3. 1 Introduction The Modified [3] can be enhanced to support priority for different types of real-time traffic. To implement the priority scheme, we apply the priority to access category (AC) mappings as used in the IEEE 802.11e. The traffics generated by various applications can therefore be classified into one of the four ACs as shown in Table 1. In addition any data applications such as command/control and interactive games that require short one-way delay could be supported in the proposed priority scheme. Since these applications not only require short delay but also lossless transfer, special support is then required in the priority scheme. Therefore, positive acknowledgment (ACK) is used for this type of traffic even though the use of ACKs might decrease the channel utilization. However, this does not apply to the transmission of voice and video traffic. Table 1: Priority to Access Category mappings Priority Access Category (AC) Traffic Type 1 0 Best Effort 2 0 Best Effort 0 0 Best Effort 3 1 Video Probe 4 2 Video 5 2 Video 6 3 Voice 7 3 Voice 3. 2 Channel Transmission Time In the priority scheme, the transmission period in the distributed polling protocol period (DPPP) is divided into four periods corresponding to the number of ACs. The reason for dividing the transmission periods is to reduce the effect of lower priority traffic delaying higher priority traffic. The separation will also reduce the probability of collisions due to the hidden station problem if a station with traffic belonging to one AC is hidden from a station with traffic belonging to another AC. As seen in Fig. 1, AC3, which is the highest priority, is transmitted first and then AC2, AC1, and AC0 follows. To prevent the starvation of one low priority AC, the proposed priority scheme then guarantees a minimum transmission period for each AC. The value of

4 ECTI TRANSACTIONS ON ELECTRICAL ENG., ELECTRONICS, AND COMMUNICATIONS VOL.3, NO.1 FEBRUARY 2005 B P AC3 P AC2 P AC1 P AC0 E period of AC3 transmission period of AC2 transmission period of AC1 transmission B beacon packet P ACX polling packet for ACX E DPPP-end packet period of AC0 transmission Fig.1: Transmission Periods for Different ACs in the DPPP. the minimum transmission length can be set corresponding to the AC priority where higher priority translates to a longer guaranteed period. For example, the guaranteed transmission period of AC3, AC2, AC1, and AC0 can be respectively 40 percent, 30 percent, 20 percent, and 10 percent of the maximum transmission period allowed in the CFP (CF- PMaxDuration). Although one AC, e.g. AC2, gets lower minimum transmission length than one higher priority AC, e.g. AC3, the lower priority AC could still get some additional transmission length if the allocated transmission length of the higher priority AC after used is available. 3. 3 Operation in Uplink Transmission The operation of the priority scheme during the DPPP can be described as follows. Any traffic streams in each AC are transmitted in a dedicated transmission period during the DPPP. The PC will transmit a polling frame at the beginning of the transmission period of each AC to indicate the length of transmission period and transmission orders of stations. The PC still uses a beacon frame at the beginning of a CFP to indicate the transmission period of the whole CFP to all wireless stations. After receiving the polling frame issued for an AC, stations that have their traffic streams belonging to that AC transmit their traffic according to the distributed polling protocol (DPP) as usual. Traffic in an AC cannot be transmitted after the maximum transmission time indicated in the polling frame has been reached. 3. 4 Operation in Downlink Transmission In the Modified, during the real-time traffic downlink period (RTDP), frame scheduling in the downlink transmission is based on a First-Come- First-Serve (FCFS) basis. In the Modified with priority scheme, however, we use a priority queuing scheme. In this priority queuing scheme, a frame received at the PC is inserted in the downlink buffer according to its priority. Thus, higher priority frames can be inserted closer to the head of the transmission buffer than the lower priority frames resulting in lower medium access delay for the higher priority traffic. 3.5 Positive Acknowledgement for Data Transmission The priority scheme can support transmission of data, which requires both short delay and loss less transmission. To achieve this, positive ACKs are used to notify a sender, whether its recipient received a frame correctly. In this scheme, a recipient shall transmit an ACK frame whenever a frame is received correctly. However, since a wireless station can transmit a number of frames in one DPPP, the PC shall acknowledge all the frames received from a single station simultaneously to reduce the overhead. This method referred to as a group acknowledgement which will be added in the upcoming IEEE 802.11e. The idea of the group acknowledgement can be also used in our work by allowing a wireless station to acknowledge multiple frames sent by the PC during one RTDP. By using the positive ACK, if a sender cannot receive a contention-free group acknowledgement (CF-GACK) frame sent by its corresponding recipient, this implies that the transmitted data frame was corrupted or lost. Then, the sender can retransmit the lost frame in the next DPPP in case it is a wireless station or the RTDP in case it is the PC. Fig. 2 illustrates an example of the operation of the positive ACKs in the Modified without priority support. In order to simplify the example it is also assumed that the transmission order is not circularly shifted in the next DPPP. During the RTDP of polling round n, the PC sends a data frame piggybacking on a CF-GACK to station 1 since it has received two data frames sent by the station in the previous DPPP. During the DPPP of round n+1, station 1 transmits a data frame piggybacking on a CF- GACK, which indicates to the PC that the number of received frames in the previous RTDP was just one. Station 2 has to retransmit the lost data frame. Station 3, which received a data frame in round n, only transmits a CF-GACK frame since it does not have any frame to transmit. Similar to station 3, the PC only transmits a CF-GACK frame during the RTDP to acknowledge the two data frames received from station 1. B U1 U2 U1 E D1 D3 D4 D5 B U1 U2 Fig.2: retransmitted packet B Ux Dx Beacon Packet CF- GACK 3 Distributed Polling Protocol Period E Uplink Packet from x Downlink Packet for x DPPP-end packet U1 E CF-GACK x D2 D5 Real-Time Traffic Downlink Period Data + CF-GACK Packet Corrupted Packet CF-GACK Packet from x A B Acknowledgement of B by A retransmitted packet CF-GACK PC Frame n Frame n+1 Operation of the Positive Acknowledgement. 4. SIMULATION STUDY 4. 1 Simulation Scenario To investigate the performance of the Modified with priority scheme, the simulation then considered three kinds of traffic types: voice, video, and

A Performance Investigation of the Modified with Priority Scheme 5 data traffic. In the simulation scenario, a number of wireless stations were communicating via a PC with the corresponding number of stations located in a wired network. Each wireless station was assumed to run a single traffic type only. Since all traffics in this scenario were considered to be bidirectional, each station was the source of an uplink stream and the sink of a downlink stream. Since we would like to compare the performance of the proposed priority scheme with the other existing protocols (i.e. the DCF, the EDCA, the, and the Modified without support of priority), we therefore investigated the number of stations that can be supported by these protocols without violation of QoS requirements as measurement. In the simulation scenario, we initially set the number of voice stations and video stations each to 10 stations and then varied the number of data stations. By investigating the average delay in the wireless network of each traffic type, we could find the number of stations each protocol could support. To consider a suitable delay threshold for the voice traffic, in accordance with [10] we considered that any delay within the wireless part should be less than 50 ms with the residual time of around 100 ms to be used for passing the wide area network (e.g. the Internet). This means the access delay for the voice traffic should be less than 25 ms since the packetization delay of the voice traffic generated by a typical voice coder is around 25 ms. For the data traffic, since users do not require much striengent delay as in the voice traffic, we then set the delay threshold for the data traffic at 100 ms. For these reasons, to find the number of supportable stations, we therefore considered that the number of data stations was increased until either the average delay in both uplink and downlink of the data traffic was higher than 100 ms, or until the average delay of the voice or video traffic in uplink or downlink was higher than 25 ms. 4. 2 Simulation Traffic Models Voice traffic: ON-OFF model was used to generate the voice traffic. The average intervals in the ON and OFF state were 1 sec and 1.35 sec respectively according to the model of Brady [11]. A 20-byte voice frame was generated every 25 ms during ON state. In addition, the voice frame had 40 bytes of header added. Video traffic: For the video traffic, we used a trace of a real H.263 video stream from the work in [12]. The average frame size is 319.15 bytes and the average bit rate of a video source was 64 kb/s. The maximum frame size in the network was set to 1500 bytes. Therefore, in the simulation, a generated video frame had the 40-byte header added if the generated frame size was lower than 1460 bytes. In contrast, if a generated video frame size was larger than 1460 bytes, it was fragmented and each fragment had the 40 bytes header added. Data traffic: For data traffic, we used Source Type 1 as defined in an evaluation of the 802.14 performance. This model was previously used in an evaluation of the IEEE 802.11e [13]. The model consists of a Poisson distribution generating the following data frame sizes (in byte) and respective probability: (64, 0.6), (128, 0.06), (256, 0.04), (512, 0.02), (1024, 0.25), and (1518, 0.03). The average bit rate of a data source is therefore 200 kb/s. Identical to the video traffic case, fragmentation was used if a generated data size was higher than 1460 bytes and each fragment had the same header size added. 4. 3 Simulation Parameters The parameters used in the simulation are shown in Table 2. As seen in the table, we used different parameters between the PC and the normal stations in the simulation of the DCF (i.e. CWmin, CWmax, and distributed inter-frame space (DIFS)) and EDCA (i.e. transmission opportunity (TXOP) limit). This is because the PC had to support higher load than the normal stations. Thus, the higher chance to succeed the contention should be given to the PC. In the simulation of EDCA, the voice traffic was classified into AC3 and the video traffic was classified into AC2. In addition, since we would like to give some priority to the data traffic, it was categorized into AC1 instead of AC0. For the and the Modified with/without priority, we assigned 80 percent of the CFP repetition interval to the CFP and the remainder was assigned to the contention period (CP). In practice, the remainder period should be enough to transmit the interaction traffic such as association and disassociation between stations and the PC during the CP. In the simulations of the Modified with/without, the header of the forward error correction (FEC) as proposed in the previous draft of the IEEE 802.11e [14] was applied with the sending frames in both protocols. For all protocols, the buffer size in each wireless station was set to 128 kbytes. The buffer size of the PC, however, was set to 384 kbytes to support higher load than the normal stations. 5. SIMULATION RESULTS 5.1 DCF and EDCA The simulation results show in Figs. 3 and 4 that at the initial stage the average delays of all traffic types in the DCF and the EDCA are much lower than that of the other protocols. This is expected, as the wireless stations do not have to wait their rounds to transmit their frames as done in the other schemes. We also found that the DCF can support only 2 data stations because the average delays of voice and video traffic in downlink are much higher than 25 ms

6 ECTI TRANSACTIONS ON ELECTRICAL ENG., ELECTRONICS, AND COMMUNICATIONS VOL.3, NO.1 FEBRUARY 2005 Table 2: Common Parameters Data rates Simulation parameters Data rates for control packets and PHY headers MAC overheads PHY overheads Beacon body size Values 11 Mb/s 1 Mb/s 28 bytes 24 bytes 35 bytes SIFS 10 µs Slot time 20 µs Simulation duration Simulation Parameters for DCF 3 min Values DIFS for normal stations 50 µs DIFS for PC 30 µs CWmin for normal stations 31 CWmax for normal stations 1023 CWmin for PC 15 CWmax for PC 31 Simulation Parameters for EDCA Values AIFS for AC3, AC2, and AC1 50 µs CWmin for AC1 31 CWmax for AC1 1023 CWmin for AC2 15 CWmax for AC2 31 CWmin for AC3 7 CWmax for AC3 15 TXOP limit for AC1 in normal stations TXOP limit for AC2 in normal stations TXOP limit for AC3 in normal stations TXOP limit for AC1 in PC TXOP limit for AC2 in PC TXOP limit for AC3 in PC Simulation Parameters for, Modified with/without priority CFP repetition interval CFP maximum duration 3 ms 6 ms 3 ms 6 ms 10 ms 6 ms Values 42 ms 33.6 ms when the number of data stations is increased to 3 stations. However, for the uplink direction, the average delays of all traffic types are still below their acceptable values. For the EDCA, it can support 3 data stations since the average delay of the data traffic in both uplink and downlink is higher than 100 ms at 4 data stations. For the voice and video traffic in EDCA, their average delays are still below 25 ms since they have higher priority than the data traffic. 5. 2 For the, the results show that it can support 4 data stations since at 5 data stations the average delay of data traffic in both uplink and downlink increases rapidly to much over 100 ms while the delays DCF EDCA Fig.3: Comparison of the Average Uplink Delay of Voice Traffic between the DCF and the EDCA. DCF EDCA Fig.4: Comparison of the Average Uplink Delay of Video Traffic between the DCF and the EDCA. for the other traffic are still acceptable. The average delays of voice, video, and data traffic of the in the uplink are shown in Figs. 5-7 respectively. Note that the data delay of the becomes too large to be illustrated in the same graph as the previous values when the number of data stations is 5, and therefore we have not included it in the graph. The figures show that the average delay of all traffic types in the increase if the number of data stations increases. However, the average uplink delay of voice traffic is steady when the number of data stations is less than 4 stations. The reason is that the polling sequence of each voice station is constant in each CFP if the capacity in a CFP can still support the amount of data traffic. On the other hand, if the amount of data traffic cannot be supported in a CFP, the polling sequence of each voice station changes. As defined in the polling list management, the station next in turn after a CFP expires is put first in the polling list. This in turns leads to an increment of the average uplink delay of voice traffic when the number of data stations is more than 3 stations. For the video

A Performance Investigation of the Modified with Priority Scheme 7 traffic, since the frame size of video traffic is much larger than that of the voice traffic, the increment of data stations greatly affects the average delay of video traffic in the uplink direction as seen in Fig. 6. The average delay results of all traffic types in the downlink of the are shown in Figs. 8-10. As seen in Figs. 8 and 9, the average delays of voice and video traffic decreases with increasing number of data stations. As defined in the polling list management that the PC could end a CFP if there are no more buffered frames both in the PC and wireless stations. Thus, the frames that arrive after the termination of a previous CFP have to wait for the next CFP. In other words, the increment of data stations yields a longer transmission period in a CFP. Therefore, frames in the PC get a higher probability to be transmitted and the average delays decrease. However, if the number of data stations is increased too much to be supported in a CFP, the average delays of all traffics will rise since the frames buffered in the PC have to wait for the frames ahead in the buffer to be transmitted. That is why the average delays of voice and video traffic increase when the number of data stations is at 4. 5. 3 Modified without Priority Scheme The number of data stations that can be supported in the Modified without priority is 5 since the average delay of data traffic in the uplink becomes much higher than 100 ms at 6 data stations. As in the case, the average delays of all traffic types in the uplink increase with varying number of data stations. However, the average uplink delay for voice traffic is not constant when the number of data stations is less than 4. This is because the polling sequence in the Modified is always shifted in the next round. Therefore, the increment of data stations has an effect on the average uplink delay of voice traffic. For the video traffic, the average uplink delay is much lower than that of the since, unlike the standard method, video stations do not have to wait for other stations poll frames. This leads to video stations in the Modified accessing the channel faster than video stations in the. In the downlink direction, the average delays of all traffic types decrease when the number of data stations is 1-4 after which they increase. The reason is explained in Subsection 5.2 of the. 5. 4 Modified with Priority Scheme The Modified with support of priority can support the same number of data stations as the Modified without priority support. However, the average delays of the voice and video traffic in uplink of the priority scheme are quite steady with a varying number of data stations. This is because the voice and video traffic have their own transmission periods; thus, the increment of the data stations does not affect them. For the downlink, the average delays of voice and video traffic decrease when the number of data stations varies for the same reason as explained in Subsection 5.2 of the. However, the average delay of data traffic is higher than that of the Modified without priority. This is because of the priority queuing scheme applied in the downlink transmission. 6. ANALYSIS OF THE RESULTS Although the average delays of the DCF and the EDCA are much lower than that of the other protocols, they can support lower number of data stations compared to the others. This highlights that the DCF and the EDCA are not suitable for controlling the transmission of real-time traffic in an infrastructure wireless network during high loads. On the other hand, the can support higher number of data stations than the DCF and the EDCA as expected since it is designed to control the transmission in the infrastructure network. However, the still supports lower number of data stations than the Modified with/without priority. Except the DCF and EDCA, the Modified with priority provides the lowest average delays for all traffic types in the uplink since the traffic types have their own transmission periods. The average delay of voice and video traffic in the downlink of the are lower than that of the Modified with/without priority since in the, the PC can transmit whenever it has waiting frames. However, in the Modified with/without priority, the PC has to wait for the RTDP. When comparing the average delays of voice and video traffic in the downlink between the Modified with and without priority, the average delay in the Modified with priority is significantly lower since the voice and video frames can be transmitted before the data frames due to the priority queuing scheme used in the downlink transmission. Although the average delay of data traffic in the downlink of the Modified with priority is higher than that of the Modified without priority, the difference between the delays of the two protocols is not significant. 7. CONCLUSION The Modified is intended not only to improve the channel utilization over the standard but also to provide better QoS to different real-time traffic types than the standard one. In this paper, we investigated the performance of a priority scheme when applied with the Modified. The priority scheme can differentiate different types of traffic such as voice, video and real-time data traffic. By separating the transmission periods for different traffic types, priority can then be given.

8 ECTI TRANSACTIONS ON ELECTRICAL ENG., ELECTRONICS, AND COMMUNICATIONS VOL.3, NO.1 FEBRUARY 2005 Average uplink delay of voice traffic (seconds) 0.024 0.0235 0.023 0.0225 0.022 Modified without priority Modified with priority 0.0215 0 1 2 3 4 5 Fig.5: Comparison of the Average Uplink Delay of Voice Traffic among the and the Modified with/without Priority. The performance of the proposed priority scheme is investigated through simulations. By fixing the number of voice and video stations and varying the number of data stations, a judgment in the comparison between the proposed priority scheme and the previously proposed DCF, EDCA,, and the Modified without support of priority were made. The simulation results show that the Modified with priority scheme can support a higher number of data stations than the DCF, the EDCA, and the. Although the Modified with/without priority scheme can support an equal number of data stations, it is clearly seen from the results that the average delays during high loads of the voice and video traffic in both uplink and downlink transmission of the priority scheme are lower. This means that the Modified with priority scheme outperforms the Modified without priority scheme in terms of QoS. Average uplink delay of data traffic (seconds) 0.06 0.055 0.05 0.045 0.04 0.035 0.03 0.025 Modified without priority Modified with priority 0.02 1 2 3 4 5 Fig.7: Comparison of the Average Uplink Delay of Data Traffic among the and the Modified with/without Priority. Average downlink delay of voice traffic (seconds) 0.02 0.018 0.016 0.014 0.012 0.01 Modified without priority Modified with priority 0.008 0 1 2 3 4 5 Fig.8: Comparison of the Average Downlink Delay of Voice Traffic among the and the Modified with/without Priority. Average uplink delay of video traffic (seconds) 0.0255 0.025 0.0245 0.024 0.0235 0.023 Modified without priority Modified with priority 0.0225 0 1 2 3 4 5 Fig.6: Comparison of the Average Uplink Delay of Video Traffic among the and the Modified with/without Priority. Average downlink delay of video traffic (seconds) 0.022 0.02 0.018 0.016 0.014 0.012 Modified without priority Modified with priority 0.01 0 1 2 3 4 5 Fig.9: Comparison of the Average Downlink Delay of Video Traffic among the and the Modified with/without Priority.

A Performance Investigation of the Modified with Priority Scheme 9 Average downlink delay of data traffic (seconds) 0.05 0.045 0.04 0.035 0.03 0.025 0.02 0.015 Modified without priority Modified with priority 0.01 1 2 3 4 5 Fig.10: Comparison of the Average Downlink Delay of Data Traffic among the and the Modified with/without Priority. References [1] Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specification, IEEE Std. 802.11, 1999. [2] M. A. Visser and M. El Zarki, Voice and data transmission over an 802.11 wireless network, in Proc. IEEE PIMRC 95, vol. 2, Toronto, Canada, Sept. 27-29, 1995, pp. 648-652. [3] A. Kanjanavapastit and B. Landfeldt, A modified point coordination function in IEEE 802.11 wireless LAN, in Proc. IEEE ICON 03, Sydney, Australia, Sept. 28 - Oct. 1, 2003, pp. 561-566. [4] A. Kanjanavapastit and B. Landfeldt, An analysis of a modified point coordination function in IEEE 802.11, in Proc. IEEE PIMRC 03, vol. 2, Beijing, China, Sept. 7-10, 2003, pp. 1732-1736. [5] A. Kanjanavapastit and B. Landfeldt, A performance investigation of the Modified under hidden station problem, in Proc. ICCCAS 04, Chengdu, China, June 27-29, 2004. [6] Wireless LAN Medium Access Control (MAC) And Physical Layer (PHY) Specifications: Medium Access Control (MAC) Enhancements for Quality of Service (QoS), IEEE Std. 802.11e/D5.0, 2003. [7] T. Suzuki and S. Tasaka, Performance evaluation of priority-based multimedia transmission with the in an IEEE 802.11 standard wireless LAN, in Proc. IEEE PIMRC 01, vol. 2, San Diego, USA, Sept. 30 - Oct. 3, 2001, pp. G-70 - G-77. [8] Z. Liqiang and F. Changxin, M-: modified IEEE 802.11 protocol implementing QoS, Electronics Letters, vol. 38, pp. 1611-1613, Nov. 2002. [9] A. Ganz, A. Phonphoem, and Z. Ganz, Robust superpoll with chaining protocol for IEEE 802.11 wireless LANs in support of multimedia applications, Wireless Networks, vol. 48, no.7, pp. 2245-2272, Sept. 1969. [10] A. Kopsel and A. Wolisz, Voice transmission in an IEEE 802.11 WLAN based access network, in Proc. 4th ACM Int. Works. Wireless Mobile Multimedia, 2001, pp. 23-32. [11] P. Brady, A model for generating on-off speech patterns in two-way conversations, Bell Syst. Tech. J., vol. 7, pp. 65-73, 2001. [12] F. Fitzek and M. Reisslein, MPEG-4 and H.263 traces for network performance evaluation, IEEE Network, vol. 15, no. 6, pp. 40-53, Nov./Dec. 2001. [13] A. Grilo, M. Macedo, and M. Nunes, A scheduling algorithm for QoS support in IEEE802.11E networks, IEEE Wireless Commun. Mag., pp. 36-43, June 2003. [14] Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Medium Access Control (MAC) Enhancements for Quality of Service (QoS), IEEE Std. 802.11e/D3.0, 2002. Apichan Kanjanavapastit received his bachelor degree and master degree in Telecommunication Engineering from Mahanakorn University of Technology in 1994 and 1998 respectively. Recently, he received his PhD degree from the University of New South Wales, Australia in 2005. Curently, he is working as a lecturer in the Research Center of applied Electromagnetic Waves (RCEW), Mahanakorn University of Technology. His research interests include wireless LANs, wireless sensor networks, computer networks, and mobile communications. Bjorn Landfeldt received his PhD degree from the University of New South Wales, Australia in 2000. Currently, he is a CISCO Senior Lecturer of Internet Technologies at the University of Sydney, Australia. His research interests include networked and distributed systems, networked QoS, mobility Management, and wireless Networks.