Scheduling of real-time traffic in IEEE networks

Similar documents
4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

Local Area Networks NETW 901

Multiple Access Links and Protocols

Data and Computer Communications. Chapter 13 Wireless LANs

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

Wireless LANs. ITS 413 Internet Technologies and Applications

An Enhanced IEEE Retransmission Scheme

Wireless Communications

Scheduling of Real-time and Nonreal-time Traffics in IEEE Wireless LAN

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

Advanced Computer Networks WLAN

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

Computer Communication III

Department of Electrical and Computer Systems Engineering

Real-Time Medical Data over WLANs

Analysis of IEEE e for QoS Support in Wireless LANs

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du

Wireless Local Area Networks (WLANs) Part I

Supporting VBR VoIP Traffic in IEEE WLAN in PCF Mode

Data Communications. Data Link Layer Protocols Wireless LANs

Lesson 2-3: The IEEE x MAC Layer

Functions of physical layer:

Computer Networks. Wireless LANs

The MAC layer in wireless networks

Wireless Networked Systems

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

Mobile Communications Chapter 7: Wireless LANs

Advanced Computer Networks. WLAN, Cellular Networks

Configuring Advanced Radio Settings on the WAP371

PROPOSAL OF MULTI-HOP WIRELESS LAN SYSTEM FOR QOS GUARANTEED TRANSMISSION

A SURVEY OF QOS TECHNIQUES IN Drabu, Yasir Department of Computer Science, Kent State University

ICE 1332/0715 Mobile Computing (Summer, 2008)

Multiple Access Links and Protocols

Chapter 6 Medium Access Control Protocols and Local Area Networks

Providing Quality of Service Guarantees in Wireless LANs compliant to e

Strengthening Unlicensed Band Wireless Backhaul

Performance analysis of Internet applications over an adaptive IEEE MAC architecture

The Performance TCP/IP over wireless IEEE Link

e-pg Pathshala Quadrant 1 e-text

The MAC layer in wireless networks

Wireless Local Area Networks. Networks: Wireless LANs 1

Mohamed Khedr.

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

Mobile Communications Chapter 7: Wireless LANs

A Finite State Model for IEEE Wireless LAN MAC DCF

Lecture 16: QoS and "

A Frame Aggregation Scheduler for IEEE n

IEEE C802.16h-07/017. IEEE Broadband Wireless Access Working Group <

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Chapter - 1 INTRODUCTION

A RLC/MAC PROTOCOL ARCHITECTURE FOR A WIRELESS IP NETWORK

Cross Layer QoS Provisioning in Home Networks

Wireless and Mobile Networks

MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users

A Modified Point Coordination Function in IEEE Wireless LAN

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks

Effect of Fragmentation in WLAN Systems with Interference Problems

FAIR DELAY OPTIMIZATION-BASED RESOURCE ALLOCATION ALGORITHM FOR VIDEO TRAFFIC OVER WIRELESS MULTIMEDIA SYSTEM

Packet multiple access and the Aloha protocol

Institute of Electrical and Electronics Engineers (IEEE) IEEE standards

IEEE MAC Sublayer (Based on IEEE )

Class-based Packet Scheduling Policies for Bluetooth

Wireless LAN -Architecture

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. IEEE Computer Society

Solutions to Performance Problems in VoIP Over a Wireless LAN

IEEE or ETSI BRAN HIPERLAN/2: Who will win the race for a high speed wireless LAN standard?

A Study on Delay, Throughput and Traffic Measurement for Wi-Fi Connected Stations Based on MAC Sublayer

A Performance Investigation of the Modified PCF with Priority Scheme

RECENTLY, the information exchange using wired and

Wireless Communication and Networking CMPT 371

Enhancements and Performance Evaluation of Wireless Local Area Networks

Introduction to Wireless Networking CS 490WN/ECE 401WN Winter Lecture 4: Wireless LANs and IEEE Part II

Error-Sensitive Adaptive Frame Aggregation in n WLANs

A Modified Medium Access Control Algorithm for Systems with Iterative Decoding

Reliable Multicast Scheme Based on Busy Signal in Wireless LANs

ECEN 5032 Data Networks Medium Access Control Sublayer

CIS 632 / EEC 687 Mobile Computing

Wireless Communication and Networking CMPT 371

An Efficient Scheduling Scheme for High Speed IEEE WLANs

Transmission Control Protocol over Wireless LAN

IEEE Technical Tutorial. Introduction. IEEE Architecture

Delivering Voice over IEEE WLAN Networks

VoIP over wireless networks: a packet scheduling approach to provide QoS using Linux

CONTENTION BASED PROTOCOLS WITH RESERVATION MECHANISMS

Ferre, PL., Doufexi, A., Chung How, J. T. H., Nix, AR., & Bull, D. (2003). Link adaptation for video transmission over COFDM based WLANs.

CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA)

Overview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi

MAC in /20/06

Wireless Networks (CSC-7602) Lecture 8 (15 Oct. 2007)

Mobile & Wireless Networking. Lecture 7: Wireless LAN

Improving the Multiple Access Method of CSMA/CA Home Networks

MSIT 413: Wireless Technologies Week 8

Unit 7 Media Access Control (MAC)

MAC. Fall Data Communications II 1

Performance Evaluation of MAC DCF Scheme in WLAN

Overview. Wireless networks basics IEEE (Wi-Fi) a/b/g/n ad Hoc MAC protocols ad Hoc routing DSR AODV

Fairness in the IEEE network. Shun Y. Cheung

Wireless Networks (MAC)

CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments

Transcription:

Scheduling of real-time traffic in IEEE 802.11 networks Afonso, José A. Neves, Joaquim E. Universidade do Minho, Departamento de Electrónica Industrial Campus de Azurém, 4800-058 Guimarães, ortugal jose.afonso@dei.uminho.pt Abstract Real-time applications require the provision of time-bounded services from the network, however, the scheduling algorithms used in wired networks are not suitable for wireless networks because they assume that the channel is error free. Besides, the scheduler has only a limited knowledge of the arrival processes of the uplink traffic. In this paper, we propose scheduling algorithms for the transport of real-time traffic in IEEE 802.11 wireless LANs which deal with channel errors. We also present the simulation results obtained with these algorithms. Keywords: scheduling, real-time, error correction, IEEE 802.11. 1 Introduction Wireless networks present many advantages over their wired counterparts. The freedom from cables reduces costs with infrastructure, allows a quicker installation and increases the mobility. On the other side, these networks are subject to higher and more variable error rates. In order to provide quality of service (QoS) guarantees to its connections, a wireless network normally requires the presence of a central controller, usually located in a base station (BS) or access point (A), which is responsible for the scheduling of the transmissions made by all stations in the cell. For the transport of real-time traffic, the scheduler tries to assure that the packets are delivered before a specified deadline is reached. Many scheduling algorithms have been proposed in the literature for use in wired networks, such as the Weighted Fair Queueing (WFQ), suitable for handling asynchronous traffic, and the Earliest Due Date (EDD), for time-bounded traffic [1]. However, these scheduling algorithms are not appropriate for wireless networks because they assume that the channel is error free. Moreover, the access

point does not know when a packet arrives to the queue of a remote station, so it cannot rely on the packet tagging mechanisms used by conventional algorithms. A practical implementation of a scheduling algorithm should address these issues, as well as some characteristics of the wireless network, such as its medium access control (MAC) and error control (EC) functions. Many papers that deal with scheduling in wireless networks considering the channel errors have been published recently [2] [3], but their main concern is the fair sharing of the available bandwidth among asynchronous traffic flows. The transport of real-time traffic (voice) in IEEE 802.11 networks is considered both in [4] and [5]. However, the former assumes an error free channel, while the later does not consider the retransmission of lost frames. We presented results concerning the scheduling of real-time together with asynchronous traffic in HIERLAN/2 (High erformance Radio Local Area Network) networks in another paper [6]. In this paper, we propose scheduling algorithms for the transport of real-time traffic in IEEE 802.11 [7] networks. These algorithms are tailored to the particularities of these networks and deal with channel errors and retransmissions. The next section presents a brief overview of the IEEE 802.11, focusing on the access method conceived for the transport of real-time traffic. Section 3 describes the proposed scheduling algorithms, while section 4 presents simulation results obtained with these algorithms. Finally, the conclusions are presented on section 5. 2 Overview of IEEE 802.11 The IEEE 802.11 standards define several physical layer options, which allow a network to operate either in the infrared, 2.4 GHz or 5 GHz band. The fundamental access method of IEEE 802.11, called Distributed Coordination Function (DCF) 1, is a contention-based random access protocol more appropriate to the transport of asynchronous traffic. In order to provide support to timebounded traffic, an optional method called oint Coordination Function (CF) is also defined. The CF is a polling protocol which works under the coordination of the access point (A). The A defines a periodic superframe composed by a Contention Free eriod (CF), where the CF is used, followed by a Contention eriod (C), where the DCF is used, as show on Figure 1. After the nominal start of the superframe, the A waits for the channel to be idle for a CF InterFrame Space (IFS) period in order to start a new CF, which begins with the transmission of a Beacon frame by the A. During the CF, the A polls the stations present in the polling list according to the order and periodicity defined by the scheduling mechanism. The destination station responds to the poll 1 For a description of the DCF function, please refer to the standard [7].

frame with a data frame. The A ends the CF with the transmission of a CF-End frame, either when the polling procedure is done for the superframe or when the value defined for the CF maximum duration parameter is achieved. The transmissions during the CF are spaced by Short InterFrame Space (SIFS) periods. During the CF, the acknowledgement (ACK) of a frame received without errors is piggybacked in the next frame 2. The frame containing the ACK, which is transmitted on the opposite direction, can be either a poll, response or CF-End frame. Superframe Contention Free eriod (CF) Contention eriod (C) Beacon D 1 +oll U 1 +ACK D 2 +oll+ack U 2 +ACK CF-End DCF D i - Downlink data to station i U i - Uplink data from station i Figure 1: Superframe structure and CF access procedure. When a DCF transmission initiated during the C of a superframe goes beyond the nominal start of the next superframe, the beginning of the CF is delayed because the A has to wait until the channel becomes idle in order to start the CF. Besides, the CF maximum duration is referenced to the nominal start of the superframe, so the CF is shortened. This effect is known as stretching. A DCF transmission can begin immediately before the nominal start of a new superframe, so the stretching can extend up to the time it takes to transmit a maximum size MDU (MAC rotocol Data Unit). 3 Scheduling Algorithms This section presents two scheduling algorithms for use with IEEE 802.11 networks. They were conceived to provide a fast recover of data frames corrupted due to channel errors. In the absence of errors, the following rules apply for both algorithms: The stations in the polling list are polled sequentially. Each station is polled once on each superframe. In the first algorithm, the retransmission of corrupted data is made in the next superframe at the same position in the sequence. Figure 2 shows an example that describes the use of this algorithm. The behavior for two stations (named 1 and 2) 2 Regardless of the its destination address.

is highlighted. In the absence of errors, a station responds to the polling frame by sending the data received from the upper layers since the previous time it was polled (as show for the station 2). When the data frame was corrupted in the previous superframe (station 1, superframe i-1), it is retransmitted on the current superframe, so the data that was supposed to be transmitted in this superframe is transmitted only in the next one, together with the respective data. Superframe i-1 CF max. Superframe i CF max. Superframe i+1 CF max. 1 2 C 1 2 C 1 2 C i-1 i-1 i-1 i i i+1 i+1 Figure 2: Example of the behavior of the first algorithm proposed In the second algorithm, when the access point receives a corrupted message, it puts the station address at the end of a retransmission list. After all the stations have been polled by the access point, it starts to poll the stations belonging to the retransmission list. Figure 3 presents an example of the use of this algorithm where the transmissions of stations 1 and 3 during the regular polling cycle are corrupted. After polling the last station on the polling list (station n), the access point polls the station 1, but the message is corrupted for the second time, so the station address is put on the retransmission list again. Then, the access point polls successfully the station 3 for the second time and the station 1 for the third time. After that, the retransmission list becomes empty, so the access point transmits a CF-End frame to finish the contention free period (CF). If the CF maximum duration is reached during the retransmission phase, the retransmission list is emptied and the corrupted data has to be transmitted on the next superframe during the regular polling cycle, the same way it is done in the first algorithm. Superframe i CF max. 1 2 3 n 1 3 1 C i 1 i 2 i 3 i n i 1 i 3 i 1 Figure 3: Example of the behavior of the second algorithm proposed

4 Simulation Results In order to evaluate the performance of the proposed algorithms, we developed a detailed model of the IEEE 802.11 network based on its standards. This model was implemented using OMNET++ [8], an open-source discrete event simulation software. Results were obtained from steady-state simulations. The simulations used the parameters relative to the version a of the network, know as IEEE 802.11a [9], which operates in the 5 GHz band using Orthogonal Frequency Division Multiplexing (OFDM) and allows bit rates ranging from 6 Mbit/s to 54 Mbit/s. The evaluation scenario consists of 30 terminals which transmit data to an access point. Each terminal generates CBR (Constant Bit Rate) traffic relative to one ATM (Asynchronous Transfer Mode) connection at 70.67 kbit/s, which corresponds to a cell interarrival time of 6 ms. The MDU payload is formed by concatenating the ATM cells waiting in the transmitter queue. The application envisioned with this scenario is to provide wireless access to an ATM based data acquisition and control system [10]. Table 1 presents the values of the configurable parameters of the network that were used in the simulations. For the fixed parameters, please refer to the standards. Table 1: arameters of IEEE 802.11a Transmission rate Superframe duration CF maximum duration 18 Mbit/s 6 ms 5 ms In order to minimize the jitter, the superframe duration of IEEE 802.11a was made equal to the cell interarrival time (6 ms). Thus, when the channel is error free, the terminals send a MDU containing a single cell each time they are polled. First results are relative to a scenario with no errors on the channel. Figure 4 shows the delay distribution for 3 out of the 30 connections. The delay suffered by the cells of a particular connection is practically constant. The cells from different connections were generated arbitrarily at the same time, beginning at t = 0, so the delays presented on the figure increase according to the polling sequence. In a more general case, the delay value will depend on the difference between the MDU transmission time and the cell arrival time, but will always be smaller than the cell interarrival time. The channel utilization associated to these 30 connections is high (64.7 %) because of the high overhead of the IEEE 802.11 protocol, namely when the payload length is small. The efficiency can be increased using a larger superframe, but the delay and jitter will be larger as well.

Figure 4: Delay distribution for IEEE 802.11a with no errors The following results are based on the previous scenario, this time with the introduction of channel errors. A bit error rate (BER) of 10-4 respective to the MAC layer was used. Results are shown only for the connection of the first terminal (RT1) because the other connections present similar results. Figure 5 shows the delay distribution using the first scheduling algorithm, while Figure 6 presents the results obtained with the second algorithm. The overall channel utilization are 65.6 % and 69.3 %, respectively, which means a increase of 1.4 % and 7.1 % with respect to the error-free scenario. Figure 5: Delay distribution of RT1 connection with BER = 10-4 (first algorithm)

Figure 6: Delay distribution of RT1 connection with BER = 10-4 (second algorithm) The second algorithm presents a much smaller delay variation, which compensates the moderately higher channel utilization. Most of the cells are retransmitted on the same superframe where they were initially transmitted, although a few cells have to be retransmitted in the following superframe because the maximum size of the CF is reached. 5 Conclusions In this paper, we proposed scheduling algorithms for the transport of real-time traffic in IEEE 802.11 networks. The delay performance obtained with the second algorithm was much better and show that, in the presence of moderate levels of error, lost frames can be quickly recovered using retransmission, with the requirement of only a small percentage of extra bandwidth. The throughput efficiency achieved with the proposed scenario was low due to the high overhead introduced by the IEEE 802.11 MAC protocol for the transport of small packets. In this respect, the HIERLAN/2 network is a better alternative according to our results. The packet error rate (ER) can be reduced with the use of a more robust (lower bit rate) HY mode, thus we conceived an adaptive mechanism for deal with burst errors. We also implemented a model of the DCF function on the simulator, which allows the evaluation of the performance of the system with a combination of realtime and asynchronous traffic. We expect to publish the outcome of these works

soon, as well as a comparison between the IEEE 802.11 and the HIERLAN/2 systems. References [1] Keshav, S. (1999), An Engineering Approach to Computer Networking, Chapter 9: Scheduling, Addison-Wesley. [2] Lu, S. et al. (1999), Fair Scheduling in Wireless acket Networks, IEEE/ACM Transactions on Networking, vol. 7, no. 4, pp. 473-489. [3] Lin,. et al (2000), A Wireless Fair Scheduling Algorithm for Error-rone Wireless Channels, ACM WoWMoM, pp. 11-20. [4] Coutras, C., Gupta, S. and Shroff N.B. (2000), Scheduling of real-time traffic in IEEE 802.11 wireless LANs, Wireless Networks, vol. 6, pp. 457-466. [5] Crow, B., Widjaja, I, Kim J.G. and Sakai,.T. (1997), IEEE 802.11 Wireless Local Area Networks, IEEE Communications Magazine, vol. 35, no. 9, pp 116-126. [6] Afonso, J. and Neves, J.E. (2003), erformance Simulation of HIERLAN/2 with Low Debit Traffic for Real Time Data Acquisition and Control Applications, 4th Conference on Telecommunications, Aveiro, ortugal, pp. 139-142. [7] IEEE 802 LAN/MAN Standards Committee (1999), art 11: Wireless LAN Medium Access Control (MAC) and hysical Layer (HY) Specifications. [8] Varga, A. (2000) OMNET++ Discrete Event Simulation System, User Manual, Technical University of Budapest, Department of Telecommunications. http://www.omnetpp.org/ [9] IEEE 802 LAN/MAN Standards Committee (1999) art 11: Wireless LAN Medium Access Control (MAC) and hysical Layer (HY) Specifications: High-speed hysical Layer in the 5 GHz Band. [10] Neves, J.E. (1999), Modular Architecture for High Flexibility ATM Based Control System, ACC/OECC, Beijing, China.