B. Bellalta Mobile Communication Networks

Similar documents
B. Bellalta Mobile Communication Networks

Mobile Communication Networks. (Intro) Wireless Local Area Networks

. 14 Byte for Acks. Due to this fact, the overhead is more relevant if the data contained in packets is sent to high rates:

Analytical Model for an IEEE WLAN using DCF with Two Types of VoIP Calls

Collision Free Hybrid Slot Protocol for Improving Performance in Wireless Networks

Lecture 16: QoS and "

Department of Electrical and Computer Systems Engineering

Mohamed Khedr.

Call Admission Control for IEEE Contention Access Mechanism

Quality of Service (QoS) Settings on AP541N Access Point

Wireless Communication

Efficient Transmission of H.264 Video over WLANs

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Mobile & Wireless Networking. Lecture 7: Wireless LAN

Mohammad Hossein Manshaei 1393

CSE 461: Wireless Networks

Solutions to Performance Problems in VoIP Over a Wireless LAN

Multiple Access Links and Protocols

A Beacon-Based Collision-Free Channel Access Scheme for IEEE WLANs

CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA)

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

Data and Computer Communications. Chapter 13 Wireless LANs

Wireless Networks (MAC)

Certified Wireless Network Administrator (CWNA) PW Chapter Medium Access. Chapter 8 Overview

Local Area Networks NETW 901

Duck-Yong Yang, Tae-Jin Lee, Member, IEEE, Kyunghun Jang, Jin-Bong Chang and Sunghyun Choi, Member, IEEE. Abstract

EDCA LIMITATION WITH HIGH TRAFFIC REAL TIME APPLICATIONS

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function

ICE 1332/0715 Mobile Computing (Summer, 2008)

Wireless Networking & Mobile Computing

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm

Modeling and Simulating Packet Dispersion in Wireless Networks

An energy-efficient MAC protocol for infrastructure WLAN based on modified PCF/ DCF access schemes using a bidirectional data packet exchange

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

Optimal CWmin Selection for Achieving Proportional Fairness in Multi-Rate e WLANs: Test-bed Implementation and Evaluation

WLAN Performance Aspects

Lesson 2-3: The IEEE x MAC Layer

Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica

Performance Comparison of IEEE e EDCA and b DCF Under Non- Saturation Condition using Network Simulator

An Efficient Scheduling Scheme for High Speed IEEE WLANs

Massive Random Access: Fundamental Limits, Optimal Design, and Applications to M2M Communications

Table of Contents 1 WLAN QoS Configuration 1-1

Wireless Networked Systems

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks

3.1. Introduction to WLAN IEEE

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

Unit 7 Media Access Control (MAC)

The MAC layer in wireless networks

Wireless MACs: MACAW/802.11

MAC in /20/06

Analysis of the Distribution of the Backoff Delay in DCF: A Step Towards End-to-end Delay Guarantees in WLANs

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

Evaluation of the backoff procedure of Homeplug MAC vs. DCF

PLUS-DAC: An Admission Control Scheme for IEEE e Wireless LANs

Wireless Network Security Spring 2012

Wireless Network and Mobility

ADAPTIVE ADMISSION CONTROL MECHANISM FOR IEEE E WLANS

Design and analysis of MAC protocols for wireless networks

Dynamic Rate Adaptation in IEEE WLANs

Analysis of the IEEE e EDCA Under Statistical Traffic

A Call Admission Control Scheme for Multimedia. Support Over IEEE Wireless LANs

CTS-to-self as a Protection Mechanism for the No Acknowledgment Protocol in VoIP WLANs

Modeling and Analysis of TCP Dynamics over IEEE WLAN

EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE WIRELESS NETWORKS

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS

Wireless Local Area Networks (WLANs) Part I

Cross-Layer Architecture for H.264 Video Streaming in Heterogeneous DiffServ Networks

Data Communications. Data Link Layer Protocols Wireless LANs

Page 1. EEC173B/ECS152C, Spring Wireless Mesh Networks. Wireless LAN or Cellular Networks. Introduction Flow Control Issues Rate Adaptation

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du

Multi-Rated Packet Transmission Scheme for IEEE WLAN Networks

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

Fu-Yi Hung ALL RIGHTS RESERVED

Midterm Review EECS 122. University of California Berkeley

Link Layer. (continued)

Computer Networks. Wireless LANs

Wireless LAN -Architecture

EBA: An Enhancement of IEEE DCF via Distributed Reservation

P B 1-P B ARRIVE ATTEMPT RETRY 2 1-(1-P RF ) 2 1-(1-P RF ) 3 1-(1-P RF ) 4. Figure 1: The state transition diagram for FBR.

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University

THE ANALYSIS OF BURST PACKET LOSSES IN SATURATED AD HOC NETWORKS USING SEMI-MARKOV PROCESS. A Thesis by. Samir Sharma

Distributed Delay Estimation and Call Admission Control in IEEE WLANs

Wireless Network Security Spring 2014

Infrastructure CSMA/CA Network With Multiple Service Classes

Wireless Network Security Spring 2015

The MAC layer in wireless networks

Analytical Models for Capacity Estimation of IEEE WLANs using DCF for Internet Applications

Wireless Communication and Networking CMPT 371

2 Related Work. 1 Introduction. 3 Background

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

QoS issues in Wi-Fi-WMM based triple play home networks

Wireless Network Security Spring 2013

Hands-On Exercises: IEEE Standard

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

ERBAR: an Enhanced Receiver-Based Auto-Rate MAC Protocol for Wireless Ad Hoc Networks

Performance Evaluation of IEEE e

Using Dynamic PCF to Improve the Capacity for VoIP Traffic in IEEE Networks

Wireless & Mobile Networking

Transcription:

IEEE 802.11e : EDCA B. Bellalta Mobile Communication Networks

Scenario STA AP STA Server Server Fixed Network STA Server Upwnlink TCP flows Downlink TCP flows STA AP STA What is the WLAN cell performance with bidirectional TCP traffic? STA

DCF (Distributed Coordination Function) Without the RTS/CTS handshake. EQ1:Queueing delay packet arrival (HOL) 1/λ MN1 packet arrival (queued) packet departure X1 1 DATA 1/λ MN2 BUSY 2 packet departure BUSY t backoff suspension (coll.) Queue empty X1 ACK empty slot MN3 DATA ACK BUSY COLLISION t ACK COLLISION t X2 BUSY DATA backoff suspension (succ.) The time (backoff) is slotted in empty slots of duration σ [seconds]

Exercise 1 Markov Chain (K=4) Traffic load: A = 4.5 * 0.2 = 0.9 Erlangs Balance Equations: Steady state probabilities: p(0)=2.4419e 01 p(1)=2.1977e 01 p(2)=1.9780e 01 p(3)=1.7802e 01 p(4)=1.6022e 01 EQ = 1.79 frames

Exercise 1

Exercise 1

Exercise 2 Assumptions: Poisson arrivals / Exponentially distributed service times. Real case: Statistical characterization of the service time in saturated IEEE 802.11 networks Zanella, A. De Pellegrini, F. Communications Letters, IEEE Publication Date: March 2005

Exercise 3 (a)

Exercise 3 (ρ=1)

Exercise 3 (ρ=1)

Exercise 3 (ρ=0.4)

Exercise 3 (ρ=0.4)

Exercise 4 & 5 4) Difficult to answer (non-linear). n : p, N, X, alfa, rho, tau, p, N,... B : rho, tau, p, N, X, alfa, rho, p=1-(1-tau)^n, tau=f(b) Impact of n > tau In terms of performance, it is better to have few nodes. 5) For example, a fixed-point approach. Others?

EDCA

15 VoIP over WLANs Voice over IP Economical alternative to traditional telephony. Wireless LANs August 2003 Broadband access network to internet. 178,000 new Skype users per day! VoIP over WLANs. A market opportunity. Complement/Substitute of current cellular networks. Technical limitations.

16 VoIP over WLANs Voice over IP Economical alternative to traditional telephony. Wireless LANs Broadband access network to internet. VoIP over WLANs. A market opportunity. Complement/Substitute of current cellular networks. Technical limitations. August 2003 178,000 new Skype users per day!

VoIP over WLANs Limitations for VoIPoWLAN (and other real time services) Protocol overheads. Capacity varying channels (multi rate). Random Access MAC. Bandwidth penalty due to the distributed access. Unfairnes Downlink/Uplink. Difficult coexistence between heterogeneous (rigid and elastic) flows. Hand off / Roaming between WLANs. 17

18 VoIP over WLANs Example: Rdata = 2 Mbps, Rbasic = 1 Mbps, VoIP codec: G.729 (8 Kbps) Downlink/Uplink TCP flows simultaneous VoIP calls TCP packets ACK packets ACK packets TCP packets VoIP call ACK packets TCP packets VoIP call IEEE Solution: EDCA (Enhanced Distributed Channel Access): Traffic differentiation at MAC layer + CAC optional. EDCA is too conservative. Static Traffic Differentiation without Admission Control.

19 Multimedia Traffic Flows General Classification (queue occupation). Elastic flows (TCP based): use all available bandwidth, fair with other elastic flows. saturated source/queue with : B L/X, ρ =1 Streaming/Rigid flows (UDP based): use only the bandwidth required. finite load (un saturated) source/queue with: B ρ L/X, ρ 1 User Perception Rigid Traffic (UDP) Good Bad Minimum Bandwidth Video/audio streaming Voice over IP B Multimedia User Perception Elastic Traffic (TCP) Better Web (HTTP) FTP, e mail,... Worst B

The DCF/EDCA model

21 The scenario MN B=200 Kbps MN B=100 Kbps MN MN1 MN B=120 Kbps AP B=450 Kbps Be=max. av. MN B=max. av. MN B=max. av. MN MN2 B=max. av. MN B=80 Kbps MN and AP share the channel using a random access MAC protocol.

22 IEEE 802.11 MAC Model (DCF) Each node is modelled by a M/M/1/K queue with packet arrival rate λ k (α = λ) and service time X. Assumption: Poisson arrivals and service time exponentially distributed. The model accounts for: queuing delays, packet losses. λ k X K EQ1:Queueing delay packet arrival (HOL) 1/λ MN1 packet arrival (queued) packet departure X1 1 DATA Queue empty X1 ACK 1/λ MN2 packet departure BUSY 2 DATA ACK BUSY COLLISION t ACK COLLISION t X2 BUSY backoff suspension DATA

23 IEEE 802.11 MAC Model (DCF) Each node is modelled by a M/M/1/K queue with packet arrival rate λ k and service time X. Assumption: Poisson arrivals and service time exponentially distributed. The model accounts for: queuing delays, packet losses. λ k X K EQ1:Queueing delay packet arrival (HOL) 1/λ MN1 packet arrival (queued) packet departure X1 1 DATA Queue empty X1 ACK 1/λ MN2 packet departure BUSY 2 DATA ACK BUSY COLLISION t ACK COLLISION t X2 BUSY backoff suspension DATA

24 DCF EDCA EQ1:Queueing delay packet arrival (HOL) 1/λ MN1 packet arrival (queued) packet departure X1 1 DATA ACK BUSY 2 empty slot packet departure BUSY t backoff suspension (coll.) Queue empty X1 1/λ MN2 MN3 DATA ACK BUSY COLLISION t ACK COLLISION t X2 BUSY DATA backoff suspension (succ.) BEB AIFS TXOP

25 IEEE 802.11e MAC Model (EDCA) : TXOP Multiple packet transmission each time a MN/AP gets the channel The overall network throughput increases (S=Data/Time [bps]) Less wasted time in random access. Packet arrival MN 1 Packet arrival (Queued) DATA Packet arrival Packet arrival busy DATA ACK t DATA ACK busy DATA Packet arrival (Queued) DATA Packet arrival MN 2 Packet arrival (Queued) busy MN 2 MN 1 ACK No TXOP Service Time (X) ACK GAIN Packet arrival (Queued) busy ACK busy ACK DATA ACK TXOP t GAIN Service Time (X) DATA DATA t ACK t

26 IEEE 802.11e MAC Model (EDCA) : TXOP Each user is modeled as an M/G[1,B]/1 queue (bulk service time queue) TXOP (Burst length): maximum consecutive number of frames transmitted at each successful attempt. 0 1 2 i=b Renewal Analysis j K Departure distribution. Average TXOP length Average TXOP duration Stationary (equil.) distribution. Blocking Probability. Queue occuppation. Queuing delay.

27 IEEE 802.11e MAC Model (EDCA): AIFS AIFS MN1 BUSY BUSY BUSY BUSY BUSY t Extra blocked slots due to AIFS Aggregate load from other nodes MN1 BUSY Service Time BUSY BUSY BUSY BUSY Transmission Prob. t

IEEE 802.11e MAC Model (EDCA): EB, p Expected BackOFF slots Cond. Collision Probability Prioritizing a flow: TXOP AIFS CWmin This model is able to capture the impact of the other flows with different MAC parameters. 28

29 Wireless Scenario Single Hop Ad Hoc network. No hidden terminals and ideal channel conditions. Channel access based on the DCF (BA and RTS/CTS). Two types of flows: streaming (UPD like) and elastic (TCP like). 2 1 i n 3 n 1

30 Results Single cell WLAN (ad hoc) Two types of flows: S1 (streaming ~ unsaturated) Bs = 100 Kbps L = 400 bytes E1 (elastic ~ saturated) Be (network dependant) L = 1500 bytes Default WLAN MAC parameters 0 S1 flows. Solution (1): AIFS (elastic flows, A=3) 8 S1 flows The TCP throughput is reduced. S1 saturation point

Model Validation Single cell WLAN (ad hoc) Two types of flows: S1 (streaming ~ unsaturated) E1 (elastic ~ saturated) Bs = 100 Kbps L = 400 bytes Be (network dependant) L = 1500 bytes Solution (2): TXOP S1 (=4) 7 S1 flows. CWmin,E1 (=64) 6 S1 flows. 31

32 Call Admission Control

Problem statement: Providing QoS Flow level Admission Control. Adaptive selection of MAC parameters. 33

34 Problem statement: Providing QoS Flow level Admission Control. Adaptive selection of MAC parameters. maximize performance (under the QoS) random access MAC (Performance)=f(MAC parameters, number of nodes, traffic profile each node) non-linear relation

35 The available bandwidth estimation problem Ideal Channel Sharing Random Access Channel Sharing Bandwidth Bandwidth Flow rejected Available bandwidth Bandwidth penalty Flow rejected Available bandwidth n... the bandwidth penalty due to the distributed access depends on the number of flows active and the traffic profile of each flow.... how to decide if a flow can be admited? We have to compute or to test if the new flow is possible. n

Multi rate Problems on VoIP capacity 36

Transmission Rates PHY Rate: The PHY Preamble and Header are transmitted at this rate (lowest) Basic Rate: Maximum rate common to all STAs Control frames are transmitted at BASIC rate. MAC Headers are transmitted at BASIC rate. Multiple Data Rates: Rate at which data is transmitted Based on the channel conditions of the STA / AP. Good: Higher rates (less redundancy bits, higher modulations) Bad: Lower rates (more redundancy bits, lower modulations)

Multi rate transmission (Multiple data rates) 1 Mbps 2 Mbps 5.5 Mbps 11 Mbps Direct relationship between communication rate and the channel quality required for that rate As distance increases, channel quality decreases Therefore: tradeoff between communication range and link speed Multi rate provides flexibility to meet both consumer demands Coverage Speed (high data rates)

Rate (Mbps) Efficiency MAC Overhead 11.0 Data 5.5 2.0 1.0 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 Medium Time (milliseconds)

Auto Rate Protocols Selects the rate to use for a packet ARF Adaptive based on success/failure of previous packets Simple to implement Doesn t require the use of RTS CTS or changes to 802.11 spec Receiver Based Auto Rate (RBAR) Uses SNR measurement of RTS to select rate Faster & more accurate in changing channel Requires some tweaks to the header fields Opportunistic Auto Rate (OAR) Adds packet bursting to RBAR Allows nodes to send more when channel conditions are good Implements temporal fairness instead of packet fairness

IEEE 802.11a Rates

IEEE 802.11a Ideal rate, acceptable BER

43 Multirate wireless 11Mbps 11Mbps AP 11Mbps 11Mbps etc

44 Multirate wireless 1Mbps 11Mbps AP 11Mbps 11Mbps etc

45 Problem Statement While total cell capacity is around 12 calls when all of them transmit at 11Mbps this capacity falls with any change from fast to slow flows Distribution of VoIP flows in a cell (G.711 codec)

Multihop (Mesh) Networks VoIP capacity 46

Hidden Terminal Problem (a) A C Data Frame A transmits data frame B (b) Data Frame A B C senses medium, station A is hidden from C Data Frame C C transmits data frame & collides with A at B

CSMA with Collision Avoidance (RTS/CTS) (a) B RTS C A requests to send (b) CTS B A CTS C B announces A ok to send (c) Data Frame A sends B C remains quiet

CSMA/CA (optional) RTS Data Source SIFS CTS SIFS SIFS Ack Destination DIFS NAV (RTS) Other NAV (CTS) NAV (Data) Defer access

50 VoIP Capacity in a mesh network VoIP calls (G.279) MP MP MP MP Single channel 2 Mbps Channel Contention (MAC) hidden nodes D. Niculescu. S. Ganguly, K. Kim, R. Izmailov; Performance of VoIP in a 802.11 Wireless Mesh Network. IEEE Infocom 2006, Barcelona, Spain.

51 VoIP Capacity in a mesh network VoIP calls A MP MP MP MP Multiple channels (Two channels) Channel Contention (MAC) hidden nodes VoIP calls B MP MP MP MP NO Channel Contention (MAC) NO hidden nodes Multiple channels (Three channels)

VoIP Capacity in a mesh network D. Niculescu. S. Ganguly, K. Kim, R. Izmailov; Performance of VoIP in a 802.11 Wireless Mesh Network. IEEE Infocom 2006, Barcelona, Spain. 52