EDCA LIMITATION WITH HIGH TRAFFIC REAL TIME APPLICATIONS

Similar documents
Australian Journal of Basic and Applied Sciences. Evaluate QOS parameters for VOIP using IEEE (DCF) and IEEE802.11e (EDCA)

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

Table of Contents 1 WLAN QoS Configuration 1-1

Mohamed Khedr.

Unit 7 Media Access Control (MAC)

Wireless Communication

Quality of Service (QoS) Settings on AP541N Access Point

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

CSE 461: Wireless Networks

IEEE Medium Access Control. Medium Access Control

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS

Wireless LANs. ITS 413 Internet Technologies and Applications

Wireless Networked Systems

Analysis of IEEE e for QoS Support in Wireless LANs

COLLISION-AWARE ADAPTION OF CONTENTION WINDOW IN E WIRELESS LAN

Wireless Local Area Networks (WLANs) Part I

Simulating coexistence between y and h systems in the 3.65 GHz band An amendment for e

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay

B. Bellalta Mobile Communication Networks

Lecture 16: QoS and "

A new Traffic Separation Mechanism (TSm) in Wireless e Networks: A simulation study

Call Admission Control for IEEE Contention Access Mechanism

Collision Free Hybrid Slot Protocol for Improving Performance in Wireless Networks

Certified Wireless Network Administrator (CWNA) PW Chapter Medium Access. Chapter 8 Overview

ECE442 Communications Lecture 3. Wireless Local Area Networks

EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE WIRELESS NETWORKS

. 14 Byte for Acks. Due to this fact, the overhead is more relevant if the data contained in packets is sent to high rates:

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du

ICE 1332/0715 Mobile Computing (Summer, 2008)

Fairness and Transmission Opportunity Limit in IEEE802.11e Enhanced Distributed Channel Access

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

Department of Electrical and Computer Systems Engineering

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

Computer Communication III

Dynamic Traffic Prioritization and TXOP Allocation in e Based Multihop Wireless Networks

MAC. OSI Layer 2 (Data Link) OSI Layer 1 (Physical)

CMPE 257: Wireless and Mobile Networking

A Performance Analysis of IEEE Networks in the Presence of Hidden Stations

A Tool for Simulating IEEE e Contention-based Access

MAC. Fall Data Communications II 1

Samsung Smart WLAN Solution

ENSC-894 Communication Networks Spring Analysis of Enhanced Distributed Channel Access (EDCA) in Wireless LAN using OPNET.

Multiple Access Links and Protocols

Mobile & Wireless Networking. Lecture 7: Wireless LAN

Two-Tier WBAN/WLAN Healthcare Networks; Priority Considerations

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

MAC in /20/06

Performance Comparison of IEEE e EDCA and b DCF Under Non- Saturation Condition using Network Simulator

IEEE e Enhanced QoS

IEEE e QoS for Wireless LAN:

Performance analysis of Internet applications over an adaptive IEEE MAC architecture

Data and Computer Communications. Chapter 13 Wireless LANs

Performance Evaluation of IEEE e

Prioritization scheme for QoS in IEEE e WLAN

Modeling of Partially Overlapping Wireless Personal Area Networks

Performance evaluation of IEEE e

CSMA/IC: A New Class of Collision free MAC Protocols for Ad Hoc Wireless Networks

3.1. Introduction to WLAN IEEE

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

Mohammad Hossein Manshaei 1393

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

WLAN Performance Aspects

A Survey on Modified RTS/CTS Mechanism

Improving the performance of Wireless LANs with MAC Adaptation

Wireless Network Security Spring 2014

University of Nairobi. School of Computing and Informatics

Announcements : Wireless Networks Lecture 11: * Outline. Power Management. Page 1

A Novel Framework for Radio Resource Management in IEEE Wireless LANs

A Sustained QoS Solution by Contention Adaptation in IEEE e Wireless LANs

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

CMPE 257: Wireless and Mobile Networking

The MAC layer in wireless networks

Key-Words: Ad hoc network, multimedia, QoS, routing protocol.

Cooperative Communication Protocol based on Relay Node Grouping in Wireless Networks

Data Communications. Data Link Layer Protocols Wireless LANs

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs

CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA)

Local Area Networks NETW 901

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

Wireless Local Area Networks. Networks: Wireless LANs 1

Multiple Access in Cellular and Systems

A Comparative Analysis on Backoff Algorithms to Optimize Mobile Network

The MAC layer in wireless networks

SENSOR-MAC CASE STUDY

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Junseok Kim Wireless Networking Lab (WINLAB) Konkuk University, South Korea

A Finite State Model for IEEE Wireless LAN MAC DCF

Wireless Network Security Spring 2015

E-BEB Algorithm to Improve Quality of Service on Wireless Ad-Hoc Networks

ECE 4450:427/527 - Computer Networks Spring 2017

Computer Networks. Wireless LANs

QoS issues in Wi-Fi-WMM based triple play home networks

Performance Evaluation of WLAN Scenarios in OPNET Modeler

Wireless Local Area Network (IEEE )

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Cross-Layer Architecture for H.264 Video Streaming in Heterogeneous DiffServ Networks

Transcription:

EDCA LIMITATION WITH HIGH TRAFFIC REAL TIME APPLICATIONS 1 AHMED ABU-KHADRAH, 2 ZAHRILADHA ZAKARIA, 3 MOHDAZLISHAH OTHMAN 1,2,3 Centre for Telecommunication Research and Innovation (CeTRI), Faculty of Electronic and Computer Engineering, Universiti Teknikal Malaysia Melaka (UTeM), Hang Tuah Jaya 76100 Durian Tunggal Melaka Malaysia E-mail: 1 abosuliman2@yahoo.com, 2 zahriladha@utem.edu.my, 3 azlishah@utem.edu.my ABSTRACT The simplicity of expanding and maintenance wireless network helped to use it widely in the public locations such as parks, airports and bus stations. Distributed Coordination Function (DCF) and Enhanced Distributed Channel Access (EDCA) protocols are used with WLANs. DCF protocol sends its data without any priority between different data types, and does not give any advantage of real time application such as voice over internet protocol (VOIP) or video conference. However EDCA protocol divides data to different class s voice, video, best effort and background. Each class has its own priority and parameters. The default values of EDCA protocol give voice traffic the highest priority. Quality of Service (QOS) parameters such as end to end delay, packet loss and jitter values determine if the protocol support QOS or otherwise. This paper evaluates the performance of DCF protocol and EDCA protocol by using OPNET simulation and shows the differences between them, depending on QOS parameter values. The result of simulation shows the limitation of EDCA protocol when increasing the number of VOIP users. Therefore the EDCA protocol tolerates specific number of real time applications with acceptable values of QOS parameters. Keywords: DCF, EDCA, QOS 1. INTRODUCTION The wireless network was spread in the world; it is used at homes, offices and also in the public locations such as airports, restaurants and bus stations. Nowadays the increment of using smart phones that have many wireless applications increased the concern to enhance the performance of wireless networks. The real time applications such as voice over internet protocol (VOIP) and video conference consider the real challenge for WLAN, because these applications need restrict time to reach destination and specific percentage of packet loss that can tolerate it. So the WLAN must support QOS to success when using real time application [1]. This means the end to end delay must be less than 150 ms and the percentage of packet loss does not increase than 1% [2]. The prevalence of the internet in all fields of the life and low cost of it make the VOIP application more common, Figure 1 describes how VOIP applications work in different locations. Figure 1: Using VOIP in different location. There are some differences between wired and wireless networks. The wireless networks have more overhead packet and limitation in bandwidth rather than wired networks. In addition to that the weather and the size of wall inside building also affect to the efficiency of wireless networks [3]. IEEE802.11 standard is used widely in wireless network, because it uses unlicensed channel and easy to expand and maintenance with low cost [4]. DCF protocol and EDCA protocol are used in IEEE802.11 standard, DCF deals with data as best 261

effort service without any priority between different types of data [5]. However EDCA protocol divides data to four access categories depending on the types of data. In this paper, we propose the difference between the DCF and EDCA protocol as well as evaluating how the ECDA protocol supports QOS with less delay and packet loss. The limitation in the EDCA protocol when increasing the real time application users will also be determined. 2. DCF PROTOCOL IEEE802.11 uses DCF protocol, which depends on Carrier Sense Multiple Access Collision Avoidance mechanism CSMA/CA [6]. There are two ways to send data in DCF protocol, the first one basic way method and the second request to send (RTS) and clear to send (CTS) method. In the basic method the station senses the medium if it is idle or not after Distributed Inter Frame Space (DIFS) time. If the medium is free, the station start sends its data and reserved the medium. In this case all stations in the network set the Network Allocation Vector (NAV), which means the medium is reserved. If another station tries to send at this time it will be deferred and takes backoff time which calculated randomly to avoid collision. When the data reach destination, it wait Short Inter Frame Space (SIFS) and sends the acknowledge (Ack) to the sender [7]. Figure 2 illustrates how basic method in DCF protocol works. are interferences between the ranges of the access points. The basic method of DCF does not solve this problem because all stations unable to hear each others in different access point ranges, but when using RTS/CTS method the hidden node problem will be solved [8]. With RTS/CTS method the station that requires sending data, senses the medium after DIFS time to check if it is idle or not. If it is idle it sends RTS to the destinations per requirement. Then the destination sends CTS after SIFS time when it is free, therefore by this mechanism all the stations in the network heard each other s and avoid the hidden node problem, as it is shown in Figure 3. If the station senses the medium busy, it will take backoff time that calculates randomly depending on the contention window minimum and maximum size (CWmin,CWmax). By using Eq. 1, the backoff time can be calculated. At the first collision the integer random value selects from [0,CWmin]. If the collision happens again the CW will be duplicated until reach CWmax [9]. Backoff time= random() Slot Time (1) Where random() is integer value between [0,CW] and CW between[cwmin,cwmax]. Figure 3: RTS/CTS method. 3. EDCA PROTOCOL Figure 2: Basic method of DCF. The RTC/CTS method is used with DCF protocol to avoid collision and solve the hidden node problem. This problem happens when a network has more than one access point and there EDCA protocol is used in 802.11e standard which is considered enhancement for the DCF protocol. The DCF protocol sends data without any priority, which means there is no preference for real time application than other types. Therefore, the EDCA protocol comes and divides data to different access categories (AC s); voice, video, besteffort and background traffics. EDCA protocol gives each AC specific priority as shown in Table 1 [10]. This mechanism helps the real time application to send 262

its data faster than other types. In the default EDCA priority the voice data takes the highest priority which makes it has less delay and packet loss. Figure 4 describes how EDCA protocol divides data to four classes depending on the types of the data. EDCA also gives each AC different parameters than others. The parameters are Contention Window (CW), Arbitration Inter Frame Space(AIFS) and Transmit Opportunity Length (TXOP) [11]. Table 1: Default Priorities For EDCA Protocol Priority Access Designation Category 1 AC_BK Background 2 AC_BK Background 0 AC_BE Best Effort 3 AC_BE Best Effort 4 AC_VI Video 5 AC_VI Video 6 AC_VO Voice 7 AC_VO Voice CW parameter is used to calculate the backoff time by selecting the random value between [1, CW]. The first value of CW sets to CWmin for the first transmission [12]. If the collision happens again the CW will increase until reach CWmax. The difference between DCF and EDCA is CWmin and CWmax have different values for each AC in EDCA protocol, but DCF protocol has only one value of CWmin and CWmax [13]. value for each AC it will cause different priority between AC s. Figure 5 shows how changing the values of the AIFS leads to different priorities [14]. According to figure (5) the voice takes the lowest value. That means needing less time transmit its data. The AIFS can be calculated depending on the AIFSN value which represents the number of slot time after the SIFS [15]. Eq. 2 explains how the AIFS is calculated. AIFS[AC]=SIFS+AIFSN[AC] Slot Time (2) The third parameter, TXOP represents the maximum duration time to reserve the medium. The high value of the TXOP means the higher priority [9]. In general all three parameters CW, AIFS and TXOP affect to the priority for AC but the AIFS plays the important factor to determine the priority. In addition to that, when decreasing, the backoff time will decrees also. Figure 5: How AIFS Determine Priorities. 4. SIMULATION RESULTS AND DISCUSSION 4.1 Scenario1 Figure 4: EDCA Access Categories And Priorities. The second parameter, AIFS is used to determine the priority of the AC s. It is the amount of time that waits until sense the medium or start count down the backoff counter. By changing the AIFS In the first scenario we design wireless network using OPNET simulation. Scenario 1 has ten wireless nodes, one access point and one server. Inside the scenario we define different traffics voice, best effort and background. Afterwards applied these traffics to the nodes; node_6 and node_9 send best effort traffic, node_3 and node_4 send background traffic, the rest send the mixture of voice, best effort and background traffic. In this scenario we want to measure QOS parameters end to end delay, packet loss and jitter for both DCF protocol and EDCA protocol. Figure 6 describes the components of the first scenario. 263

caused by contentions inside the network; therefore some packets do not reach the destination. To support QOS the percentage of packet loss must not increase than 1%. According to the Figure 8 the packet loss for voice application when using the DCF protocol is 4.16%, but when with the EDCA protocol it is 0.004%. These results describe how the EDCA supports QOS because the value less that 1%. Figure 6: Scenario 1 Components. In the first we want to measure the end to end delay for both DCF and EDCA. End to end delay counts the waste time when the sound comes out from sender until reach the receiver. The value of end to end delay must be less than 150 ms to support QOS. Figure 7 shows the difference between DCF and EDCA protocol for end to end delay when sending voice application. Figure 8: Traffic Received For Voice Application In Scenario1. The difference time between arriving packets is called jitter; Figure 9 shows the values of jitter when using EDCA protocol and DCF protocol. In addition to that, it describes how the jitter decreases when using EDCA protocol. Figure 7: End To End Delay For Voice Application In Scenario1. According to Figure 7 the end to end delay when using DCF protocol is 0.512 second, but when using EDCA protocol it becomes 0.0608 second. Depending on these results the EDCA protocol supports QOS because the value less than 150ms. Figure 8 presents the number of receive packets when sending 100 packets /second. From this value the packet loss can be calculated. The packet loss is Figure 9: Jitter For Voice Application In Scenario1. DCF protocol depends on the CSMA / CA mechanism and applying this mechanism to all types of data without any priority between different types. DCF protocol does not provide the voice application or video application any advantage to 264

send its data first. The besteffort and background data can tolerate more delay than real time application. So with DCF protocol the end to end delay and the packet loss will increase and do not support QOS. However EDCA protocol divides data to different AC s depending on the types of data and gives each AC specific value of EDCA parameters to determine the priority. The voice application has the highest priority, so the voice recorded less end to end delay about 0.0608 second and less packet loss about 0.004%. 4.2 Scenario2 In this scenario we design wireless network using EDCA protocol only. There are eleven wireless nodes, one access point and one server. As in scenario1 we define three traffic voice, best effort and background. We also applied the applications on the nodes as in scenario1, except adding one wireless node (node_17) with voice, besteffort and background traffic. The main different between scenario1 and scenario2 is the scenario2 has seven nodes use voice application but scenario1 has six nodes. Figure 10 shows the components of scenario2. external collision will rise and lead to high values of end to end delay and packet loss. So there is a limitation when used EDCA protocol with real time application because EDCA can tolerate a specific number of voice and video applications in the same network. The default values of EDCA protocol parameters lead to increase the number of internal collisions because these values do not change depending on the situation of the network. Nowadays, researchers are trying to enhance the EDCA protocol by adjusting the contention window values depending on the number of collisions inside the networks. Figure 11:End To End Delay For Voice Application In Scenario 2. Figure 10: Scenario 2 Components In scenario2 we want to measure the QOS parameters and concern on end to end delay and packet loss. After increasing the number of nodes that use the voice application, the average of end to end delay becomes 0.5188 second and the average of packet loss is 14.62% according to Figure 11 and Figure 12. Depending on these results, EDCA protocol has limitations when increasing the number of voice or video applications. This means when the numbers of real time application increase, the internal and Figure 12:Traffic Received For Voice Application In Scenario2. 5. CONCLUSION DCF protocol sends data as a best effort service without any priority between different types of data. When using voice or video applications with 265

the DCF protocol, the end to end delay and packet loss will increase and therefore it will not support QOS. In contrast, when using EDCA protocol with real time application, the end to end delay, jitter and packet loss support QOS as it is shown in scenario1. It is because the EDCA protocol divides data to different classes and gives the voice the highest priority. But the numbers of real time application users affect the QOS parameters as it is presented in scenario2. According to the results of scenario2, the end to end delay and packet loss do not support QOS. So there is a limitation in EDCA protocol caused by increasing the collision inside the network. EDCA parameters such as CW and AIFS are fixed for each access category, and trying to make these values flexible depending on the number of collisions inside network may solve this limitation. REFERENCES: [1] K. Kosek, M. Natkaniec, L. Vollero, and A. R. Pach, An Analysis of Star Topology IEEE 802. 11e Networks in the Presence of Hidden Nodes, Information Networking, 2008. ICOIN 2008. International Conference on. IEEE, pp. 1 5, 2008. [2] J. Fitzpatrick, S. Murphy, M. Atiquzzaman, and J. Murphy, Evaluation of VoIP in a Mobile Environment using an end-to-end Handoff Mechanism, 2007 16th IST Mobile and Wireless Communications Summit, pp. 1 5, Jul. 2007. [3] D. G.V, B.R.Prakash, and B. Prakash, Performance improvement using adaptation of the contention window in IEEE802.11e WLAN, World Journal of Science and Technology, vol. 2, no. 5, pp. 10 14, 2012. [4] G. R. Hiertz, D. Denteneer, S. Max, R. Taori, J. Cardona, L. Berlemann, and B. Walke, IEEE 802.11 s: the WLAN mesh standard, Wireless Communications, IEEE, no. February, pp. 104 111, 2010. [5] F. U. Ahemd and S. K. Sarma, QoS and Admission Controller in IEEE 802.11e WLAN, 2013 4th International Conference on Intelligent Systems, Modelling and Simulation, pp. 468 471, Jan. 2013. [6] T. Sugimoto, N. Komuro, H. Sekiya, S. Sakata, and K. Yagyu, Maximum throughput analysis for RTS/CTS-used IEEE 802.11 DCF in wireless multi-hop networks, International Conference on Computer and Communication Engineering (ICCCE 10), vol. 3, no. May, pp. 1 6, May 2010. [7] G. Sharma, A. Ganesh, and P. Key, Performance analysis of contention based medium access control protocols, Information Theory, IEEE Transactions, vol. 55, no. 4, pp. 1665 1682, 2009. [8] S. Ray, D. Starobinski, S. Member, A. The, and R. T. S. Cts, On False Blocking in RTS / CTS- Based Multihop Wireless Networks, Vehicular Technology, IEEE Transactions, vol. 56, no. 2, pp. 849 862, 2007. [9] A. Hamidian and U. Körner, An enhancement to the IEEE 802.11e EDCA providing QoS guarantees, Telecommunication Systems, vol. 31, no. 2 3, pp. 195 212, Mar. 2006. [10] R. Bolla, R. Rapuzzi, and M. Repetto, On the Effectiveness of IEEE 802. 11e Implementations in Real Hardware, Wireless Communication Systems, 2009. ISWCS 2009. 6th International Symposium on. IEEE, 2009, pp. 303 307, 2009. [11] W. Lai and E. Liou, A novel cross-layer design using comb-shaped quadratic packet mapping for video delivery over 802. 11e wireless ad hoc networks, EURASIP Journal on Wireless Communications and Networking, pp. 1 28, 2012. [12] A. Gupta, P. S. Patheja, and N. Raza, NOVEL CHANNEL ACCESS METHOD IN WIRELESS SENSOR NETWORK USING CSMA / CA, Asian Journal of Computer Science & Information Technology, vol. 10, pp. 129 132, 2013. [13] P. Serrano, A. Banchs, P. Patras, S. Member, A. Azcorra, and S. Member, Optimal Configuration of 802. 11e EDCA for Real- Time and Data Traffic, Vehicular Technology, IEEE Transactions, vol. 59, no. 5, pp. 2511 2528, 2010. [14] M. T. Koprivica, M. M. Ili, A. M. Neškovi, and N. J. Neškovi, An Empirical Study of the EDCA QoS Mechanism for Voice over WLAN, Telfor Journal, vol. 3, no. 1, pp. 3 8, 2011. [15] C. Huang, W. Liao, and S. Member, Throughput and Delay Performance of IEEE 802. 11e Enhanced Distributed Channel Access ( EDCA ) Under Saturation Condition, Wireless Communications, IEEE Transactions, vol. 6, no. 1, pp. 136 145, 2007. 266