Performance analysis of Internet applications over an adaptive IEEE MAC architecture

Similar documents
Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Wireless Local Area Networks (WLANs) Part I

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE WIRELESS NETWORKS

Unit 7 Media Access Control (MAC)

IEEE Medium Access Control. Medium Access Control

Mohamed Khedr.

Performance anomaly of b

Lecture 16: QoS and "

A Study on Delay, Throughput and Traffic Measurement for Wi-Fi Connected Stations Based on MAC Sublayer

An Efficient Scheduling Scheme for High Speed IEEE WLANs

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

E-BEB Algorithm to Improve Quality of Service on Wireless Ad-Hoc Networks

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Outline. CS5984 Mobile Computing. IEEE 802 Architecture 1/7. IEEE 802 Architecture 2/7. IEEE 802 Architecture 3/7. Dr. Ayman Abdel-Hamid, CS5984

A Comparative Analysis on Backoff Algorithms to Optimize Mobile Network

Multiple Access Links and Protocols

Computer Networks. Wireless LANs

Data and Computer Communications. Chapter 13 Wireless LANs

Adaptive Fair Channel Allocation for QoS Enhancement in IEEE Wireless LANs

ECE442 Communications Lecture 3. Wireless Local Area Networks

A Finite State Model for IEEE Wireless LAN MAC DCF

Local Area Networks NETW 901

Mohammad Hossein Manshaei 1393

Remarks On Per-flow Differentiation In IEEE

Wireless Networks (MAC)

Enhancing the DCF mechanism in noisy environment

Department of Electrical and Computer Systems Engineering

CMPE 257: Wireless and Mobile Networking

Wireless Local Area Network (IEEE )

CSE 461: Wireless Networks

Data Communications. Data Link Layer Protocols Wireless LANs

MAC in /20/06

Wireless LANs. ITS 413 Internet Technologies and Applications

Mobile & Wireless Networking. Lecture 7: Wireless LAN

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

Reliable Multicast Scheme Based on Busy Signal in Wireless LANs

AGOOD medium access control (MAC) protocol for wireless

CMPE 257: Wireless and Mobile Networking

Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica

ICE 1332/0715 Mobile Computing (Summer, 2008)

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

Performance Evaluation of IEEE e

Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks

On the Performance Enhancement of Wireless LAN - A Multi-polling Mechanism with Hidden Terminal Solution

Computer Communication III

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm

Lesson 2-3: The IEEE x MAC Layer

QoS Enhancement in IEEE Wireless Local Area Networks

P B 1-P B ARRIVE ATTEMPT RETRY 2 1-(1-P RF ) 2 1-(1-P RF ) 3 1-(1-P RF ) 4. Figure 1: The state transition diagram for FBR.

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

Comparison of the Quality of Service (QoS) on the IEEE e and the g Wireless LANs

Logical Link Control (LLC) Medium Access Control (MAC)

Rahman 1. Application

Introduction to Wireless Networking CS 490WN/ECE 401WN Winter Lecture 4: Wireless LANs and IEEE Part II

The MAC layer in wireless networks

High Performance Distributed Coordination Function for Wireless LANs

A Novel Framework for Radio Resource Management in IEEE Wireless LANs

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

3.1. Introduction to WLAN IEEE

ICE 1332/0715 Mobile Computing (Summer, 2008)

Prioritization scheme for QoS in IEEE e WLAN

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS

Performance evaluation of IEEE e

Transmission Control Protocol over Wireless LAN

Delivering Voice over IEEE WLAN Networks

Chapter 6 Medium Access Control Protocols and Local Area Networks

Introduction to IEEE

Wireless Networked Systems

Analyzing the Impact of DCF and PCF on WLAN Network Standards a, b and g

Wireless# Guide to Wireless Communications. Objectives

The MAC layer in wireless networks

Mobile Communications Chapter 7: Wireless LANs

Midterm Review EECS 122. University of California Berkeley

Improving the performance of Wireless LANs with MAC Adaptation

CSMA/IC: A New Class of Collision free MAC Protocols for Ad Hoc Wireless Networks

Project Report: QoS Enhancement for Real-Time Traffic in IEEE WLAN

Guide to Wireless Communications, Third Edition. Objectives

Performance Analysis for Channel Utilization in Wireless LAN

MAC. Fall Data Communications II 1

Wireless Networking & Mobile Computing

A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment

Wireless LAN -Architecture

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

Wireless Local Area Networks. Networks: Wireless LANs 1

International Journal of Emerging Technology and Advanced Engineering Website: (ISSN , Volume 2, Issue 1, January 2012)

CSE 6811 Ashikur Rahman

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

Wireless Communications

Advanced Computer Networks WLAN

Wireless Protocols. Training materials for wireless trainers

Overview. Wireless networks basics IEEE (Wi-Fi) a/b/g/n ad Hoc MAC protocols ad Hoc routing DSR AODV

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

A Scheme for Enhancing TCP Fairness and Throughput in IEEE WLANs

IEEE Wireless LANs Part I: Basics

International Journal of Technical Research and Applications e-issn: , Special, Issue 43 (March 2017), PP.

Transcription:

Journal of the Franklin Institute 343 (2006) 352 360 www.elsevier.com/locate/jfranklin Performance analysis of Internet applications over an adaptive IEEE 802.11 MAC architecture Uthman Baroudi, Mohammed Aijaz Mohiuddin Department of Computer Engineering, King Fahd University of Petroleum and Minerals, P.O. Box 1350, Dhahran, Saudi Arabia Received 4 February 2006; accepted 4 February 2006 Abstract This paper investigates the performance of Internet applications such as web browsing over an adaptive prioritized IEEE 802.11 MAC architecture. In this work, we investigate the consequences of applying these adapters on www and e-mail applications besides the video conferencing application. OPNET is used to simulate several scenarios of WLANs operating at 1 and 2 Mbps transmission rate. By means of throughput, media access delay, http object response, end-to-end delay and other metrics, the performance of the network under study is being evaluated. The results show an outstanding performance for these adapters and in particular under the (contention window adapter) compared to the original IEEE 802.11 standard. On the other hand, the results also show that the operation at high loads will have drastic effects on http application which manifest itself in very low throughput for such application. r 2006 The Franklin Institute. Published by Elsevier Ltd. All rights reserved. Keywords: WLAN; QoS; IEEE 802.11; Adaptive MAC 1. Introduction Over recent years there has been tremendous growth in wireless communications. This growth also encompasses the personal and business computing. The original IEEE 802.11 [1,2], standard was basically built to support data applications over contention-based access control protocol. As the use of multimedia applications increased it became obvious that WLANs support real-time applications with quality of service (QoS) guarantees the Corresponding author. Tel.: +966 3 860 4283; fax: +966 3 860 3059. E-mail address: ubaroudi@ccse.kfupm.edu.sa (U. Baroudi). 0016-0032/$30.00 r 2006 The Franklin Institute. Published by Elsevier Ltd. All rights reserved. doi:10.1016/j.jfranklin.2006.02.003

U. Baroudi, M.A. Mohiuddin / Journal of the Franklin Institute 343 (2006) 352 360 353 same as their wired counterpart. Recently, many researchers have investigated this issue and proposed several mechanisms to tackle this problem. The focus was on developing adaptive schemes working on top of the existing distributed access control. The most important motivation for this approach is that the widely used wireless adapters are mainly supporting the distributed scheme. Then, by using simple software, the access control scheme can be adapted to the needs of the network. Further, it was stated in [3] that distributed medium access control (MAC) with QoS is more flexible and effective than the centralized MAC, as the dominant operational mode in IEEE 802.11 LANs is the distributed coordination function (DCF) mode [4]. Also many recent research shows that point coordination function (PCF) performs poorly either alone or incorporated with DCF mode. The contribution of this work is focused on analyzing the performance of Internet applications besides video conferencing using the prioritized adapters suggested in [3]. To the best of our knowledge, this work is the first in analyzing and discussing the influence of these adapters on Internet applications. Previous works were general in nature, assuming either general prioritized flows of packets as in [3] or real-time and non-real time applications without considering the unique traffic characteristics of www or e-mail applications as in [5]. This paper is organized as follows. In Section 2 details of IEEE 802.11 are present. In Section 3, we describe the various adapters that can be implemented over MAC core of WLAN proposed in [3]. In Section 4, we describe our implementation. Results are presented and discussed in Section 5. Further conclusion and references follow. 2. IEEE 802.11 MAC architecture [1] The wireless LAN protocol is based on the IEEE 802.11 series of standards. The standard defines a MAC sublayer and three physical (PHY) layers. The architecture of the IEEE 802.11 WLAN is designed to support a network where most decision-making is distributed across the mobile stations. 2.1. Media access control The IEEE 802.11 MAC supplies the functionality needed to provide a reliable delivery mechanism for user data over wireless media. The first function of the WLAN MAC is to provide a reliable data delivery service to the users. This is achieved through a frame exchange protocol at the MAC level. The second function of the WLAN MAC is to provide a fair mechanism to control access to shared wireless media. The WLAN MAC performs this function through two different access mechanisms: (a) A contention-based mechanism, called the DCF. (b) A centrally controlled access mechanism, called the PCF. 2.2. MAC frame exchange The minimum MAC frame exchange consists of two frames: a data frame sent from the source to the destination and an acknowledgement (ACK) frame sent from the destination

354 ARTICLE IN PRESS U. Baroudi, M.A. Mohiuddin / Journal of the Franklin Institute 343 (2006) 352 360 to the source. If the source does not receive an ACK, it tries to retransmit the data frame after it observes appropriate deference. There are retry limits associated with the frame retransmission. The protocol also suggests an optional use of request to send (RTS) and clear to send (CTS) frame exchanged between source and destination stations for media reservation. RTS is transmitted from the source station to the destination station and CTS is a response initiated by the destination station to the source station. This initial handshake is followed by the minimal MAC frame exchange. 2.3. Basic access mechanism The basic access mechanism is a carrier sense multiple access with collision avoidance (CSMA/CA) with binary exponential backoff. This access mechanism does not include collision detection functionality. DCF is a basic access mechanism described in the protocol. It uses physical and virtual carrier sense mechanism. If both mechanisms indicate that the medium is not in use for an interval of DIFS (distributed inter-frame space), the station starts transmitting the frame. If the medium is busy, however, the backoff algorithm is applied. The transmission is considered unsuccessful if no ACK is received from the destination. This may result in the retransmission of the frame. All asynchronous traffic uses the DCF. The centrally controlled access mechanism uses a polling and responses protocol to eliminate the possibility of contention for the medium. This access mechanism is called the PCF. A point coordinator (PC) controls the PCF. The PC is always located in an AP. In PCF operation, stations ask the PC to register them on a polling list. The PC then regularly polls the stations for traffic while delivering the traffic to the stations. The PCF is an optional part of the IEEE 802.11 standard that is built over the DCF and operates simultaneously with DCF. Synchronous traffic takes over the channel over asynchronous traffic through PCF. 3. Adapters of IEEE 802.11 MAC From the above brief introduction of IEEE 802.11 access mechanism, we notice the following parameters that can be dynamically varied to achieve an optimal network performance. Following [3], the following are the parameters used in the implementation of adaptive MAC. (a) Inter-frame space: The station waits for inter-frame space time and then sends the frame. In DCF, DIFS is used before sending RTS/DATA frame and SIFS is used before sending ACK/CTS frame. (b) Back off increasing factor: It is a scaling factor for contention window (CW). In DCF mode, when a collision is detected (no ACK is received), CW will be scaled by a backoffincreasing factor and new backoff time (BT) will be chosen again. (c) Minimum and maximum contention window size: To avoid collision, the DCF mode randomly chooses the BT from the interval (0,CW). CW is the contention window size and CW is in the interval of [CW min, CW max ]. By properly assigning different CW min, CW max, backoff increasing factor, we can prioritize the traffic. The following are the different adapters [1] we have implemented:

U. Baroudi, M.A. Mohiuddin / Journal of the Franklin Institute 343 (2006) 352 360 355 Probability 2/CW Priority 2 1/CW Priority 0 Priority 1 0 CW Fig. 1. Modified backoff distribution. (a) Contention window adapter (): Higher priority traffic should have smaller contention window size. (b) Backoff factor adapter (): Different priority packets have been assigned different backoff increasing factors. This adapter sets small backoff-increasing factor for highpriority traffic as follows: BIF is 2 for priority level 2, 3 for priority level 1 and 4 for priority level 0. (c) Backoff distribution adapter (): This adapter defines different backoff time distributions for different priority levels as shown in Fig. 1 where priority 2 is assigned to video conferencing traffic, priority 1 is assigned to HTTP traffic and priority 0 is assigned to e-mail traffic. By using different distributions, statistically high-priority traffic may have better chance to choose small BT than the low priority traffic. (d) Inter-frame space adaptor (): By this adapter, high-priority traffic may have smaller IFS than the low priority traffic as follows where j is the priority level: DIFS j ¼ DIFS þ slottime ð2 jþ; j ¼ 2; 1; 0. (1) 4. OPNET simulation OPNET version 10 was used for running our simulation. Three different applications HTTP, e-mail and video conferencing are configured such that video conferencing has the highest priority, then HTTP and the least is the e-mail application. This priority assignment can be done easily in OPNET by assigning different type of service values in application definitions. At MAC layer by reading these types of service values, different adapters are designed. Values for the adapters are taken from [1].

356 ARTICLE IN PRESS U. Baroudi, M.A. Mohiuddin / Journal of the Franklin Institute 343 (2006) 352 360 4.1. Traffic models Every mobile station can initiate simultaneously any of the above applications. All stations are identical in terms of traffic load. No mobility is assumed. Moreover, it is assumed that the server is located in the access point and it can provide all three applications. Video conferencing: Frame size is fixed at 500 bytes. The inter-arrival time is assumed to be uniformly distributed (0, 25). The start time for the incoming video frame is computed by adding the inter-arrival time to the pervious video frame completed. E-mail: A fixed size e-mail messages of 100 bytes each are generated where the interarrival time is uniformly distributed (0, 30). HTTP: http1.1 is used. The page inter-arrival is assumed to be uniformly distributed uniform (0, 1). Moreover, each page has the following properties: header file (html base file) is 1000 bytes, and a medium image composed of five objects. The size of each object is integer and uniformly distributed (500, 2000) bytes. We modify the wireless LAN model in the OPENT into an extensible architecture by implementing the,,, and. In order to study the effects of each adaptor to support prioritized service, we change the setting of adaptors to study the performance. Table 1 shows the IEEE 802.11 direct sequence spread spectrum OPNET simulation parameters when no differentiation is applied. 5. Results and discussion Extensive simulation runs were conducted and due to the space limitation, we shall limit the discussion to only few performance results under data rate of 1 and 2 Mbps and for different number of mobile stations. First, we compare the throughput of different adapters. Fig. 2 shows interesting results where the throughput for drops by 3% compared to IEEE 802.11. This can be attributed to the delay caused by prioritizing the traffic which will invoke the TCP congestion control and lead to the delay shown in Figs. 3 and 4. On the other hand, Fig. 5 illustrates that almost all schemes achieve identical throughput under 2 Mbps data rate. Thus, increasing the date rate may preclude the expected benefits from these new adapters. Also, we can observe the drop in the throughput as the number of stations increases and this is due to the contention among the users for limited bandwidth. Table 1 Simulation parameters settings Parameters Values DIFS 50 ms SIFS 10 ms Slot time 20 ms Maximum retry limit 7 CW min 31 CW max 1023 Backoff increase factor 2

U. Baroudi, M.A. Mohiuddin / Journal of the Franklin Institute 343 (2006) 352 360 357 740000 720000 700000 680000 660000 640000 620000 600000 580000 560000 Fig. 2. The average overall throughput (bit/s), R ¼ 1 Mbps. 1.00 0.80 0.60 0.40 0.20 0.00 Fig. 3. HTTP page response time (s). 80000 70000 60000 50000 40000 30000 20000 10000 0 Fig. 4. HTTP received traffic (bytes/s).

358 ARTICLE IN PRESS U. Baroudi, M.A. Mohiuddin / Journal of the Franklin Institute 343 (2006) 352 360 Next, we study the medium access delay and the end-to-end delay for the video conferencing traffic. From Fig. 6, we can tell that at low traffic, causes the end-to-end delay to be doubled and this is due to the conservative policy in assigning the backoff slots. However, at higher loads, all schemes have identical performance. Considering the performance of e-mail application, Figs. 7 and 8 show that this application had suffered the most among the three applications. Also, under scheme, e-mail suffers high delay compared to IEEE 802.11. Moreover, these performance results reemphasis the above-mentioned issue that under, the Internet applications suffer the highest delay. Finally, we look at the total number of backoff slots at the access point for all schemes. Fig. 9 illustrates that under low-load conditions, provides the least number of backoff slots while at high load all schemes behave almost the same. 1400000 1200000 1000000 800000 600000 400000 200000 0 Fig. 5. The average overall throughput (bit/s), R ¼ 2 Mbps. 0.025 0.020 0.015 0.010 0.005 0.000 Fig. 6. Average end-to-end delay for video conference (s), R ¼ 2 Mbps.

U. Baroudi, M.A. Mohiuddin / Journal of the Franklin Institute 343 (2006) 352 360 359 1.60 1.40 1.20 1.00 0.80 0.60 0.40 0.20 0.00 Fig. 7. Average e-mail upload response time (s), R ¼ 2 Mbps. 3.50 3.00 2.50 2.00 1.50 1.00 0.50 0.00 Fig. 8. Average e-mail download response time (s), R ¼ 2 Mbps. 6. Conclusions In this work, the performance of Internet applications such as web browsing over an adaptive prioritized IEEE 802.11 MAC architecture was studied. Several adapters were studied using OPNET simulation where several scenarios of WLANs operating at 1 and 2 Mbps transmission rate were conducted. Three competing applications were studied, namely video conferencing, www and e-mail. To ensure the adaptive nature and simplicity of the adapters, prioritization is implicitly applied without any intervention from the network operator. By means of throughput, media access delay, http object response, endto-end delay and other metrics, the performance of the network under study has been evaluated. The results show, in contrary to the previous published results [3], that no clear conclusion can be driven out of these adapters. The results also show that the operation at high traffic load will have drastic effects on http application which manifest itself in very

360 ARTICLE IN PRESS U. Baroudi, M.A. Mohiuddin / Journal of the Franklin Institute 343 (2006) 352 360 700000 600000 500000 400000 300000 200000 100000 0 Fig. 9. The average number of backoff slots, R ¼ 2 Mbps. low throughput for such application. In conclusion, the network operator must be very careful in applying these adapters, especially when real-time application traffic load is high. Acknowledgment The authors wish to acknowledge the support of King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia during the course of this work. References [1] IEEE 802.11, Wireless LAN medium access control (MAC) and physical layer specification, 1997. [2] W. Stallings, Local and Metropolitan Area Networks, sixth ed., Prentice-Hall Publishers, Boston, 2001. [3] W. Liu et al., A QoS-enabled MAC architecture of prioritized service in IEEE 802.11 WLANS, IEEE GLOBECOM 2003, pp. 3802 3807. [4] L. Zhao, C. Fan, Enhancement of QoS differentiation over IEEE 802.11 WLAN, IEEE Commun. Lett. 8 (8) (2004) 494 496. [5] Y. Kwon, Y. Fang, H. Latchman, Design of MAC protocols with fast collision resolution for wireless local area networks, IEEE Trans. Wireless Commun. 3 (3) (2004) 793 807.