Mohammad Hossein Manshaei 1393

Similar documents
WLAN Performance Aspects

Hands-On Exercises: IEEE Standard

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm

An Efficient Scheduling Scheme for High Speed IEEE WLANs

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

CSMA/CA Bottleneck Remediation in Saturation Mode with New Backoff Strategy

CSE 461: Wireless Networks

Mohamed Khedr.

Lecture 16: QoS and "

Fu-Yi Hung ALL RIGHTS RESERVED

Wireless Networking & Mobile Computing

MAC. Fall Data Communications II 1

IEEE Medium Access Control. Medium Access Control

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

Collision Probability in Saturated IEEE Networks

Data and Computer Communications. Chapter 13 Wireless LANs

Lesson 2-3: The IEEE x MAC Layer

Mobile & Wireless Networking. Lecture 7: Wireless LAN

Mohammad Hossein Manshaei

Computer Networks. Wireless LANs

Transmission Control Protocol over Wireless LAN

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

Wireless & Mobile Networking

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

Wireless Local Area Networks (WLANs) Part I

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay

Wireless LANs. ITS 413 Internet Technologies and Applications

Unit 7 Media Access Control (MAC)

Data Communications. Data Link Layer Protocols Wireless LANs

Performance analysis of the IEEE MAC protocol for wireless LANs

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

Computer Communication III

SRN Model for IEEE DCF MAC Protocol in Multi-hop Ad Hoc Networks with Hidden Nodes

Investigating MAC-layer Schemes to Promote Doze Mode in based WLANs

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

Lecture 25: CSE 123: Computer Networks Alex C. Snoeren. HW4 due NOW

MAC in /20/06

IEEE MAC Sublayer (Based on IEEE )

Lecture 24: CSE 123: Computer Networks Stefan Savage. HW4 due NOW

Enhancing the DCF mechanism in noisy environment

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

CMPE 257: Wireless and Mobile Networking

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

Two-phase Collision Avoidance to Improve Scalability in Wireless LANs

Multiple Access Links and Protocols

Midterm Review EECS 122. University of California Berkeley

Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica

EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE WIRELESS NETWORKS

Wireless Communication

June 20th, École Polytechnique, Paris, France. A mean-field model for WLANs. Florent Cadoux. IEEE single-cell WLANs

The IEEE Distributed Coordination Function in Small-Scale Ad-Hoc Wireless LANs

Title. Author(s)Nguyen, Thi Xuan My; Saivichit, Chaiyachet; Miyanaga. Issue Date Doc URL. Type. Note. File Information

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function

2 Related Work. 1 Introduction. 3 Background

Wireless Networks (MAC)

Local Area Networks NETW 901

Wireless LAN -Architecture

A Finite State Model for IEEE Wireless LAN MAC DCF

ICE 1332/0715 Mobile Computing (Summer, 2008)

An Accurate Model for Energy Efficiency in IEEE WLANs

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

Department of Electrical and Computer Systems Engineering

ECE442 Communications Lecture 3. Wireless Local Area Networks

Outline. CS5984 Mobile Computing. IEEE 802 Architecture 1/7. IEEE 802 Architecture 2/7. IEEE 802 Architecture 3/7. Dr. Ayman Abdel-Hamid, CS5984

Exploiting Multi-User Diversity in Wireless LANs with Channel-Aware CSMA/CA

Performance anomaly of b

Wireless Communication and Networking CMPT 371

Characterising the Behaviour of IEEE Broadcast Transmissions in Ad Hoc Wireless LANs

Introduction to IEEE

Outline / Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless. Regular Ethernet CSMA/CD

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS

Mobile Communications Chapter 7: Wireless LANs

Chapter 12 Multiple Access 12.1

VHDL Modeling of the CSMA/CA

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks

IEEE Wireless LANs

Mobile Communications Chapter 7: Wireless LANs

The MAC layer in wireless networks

Analytical Model for an IEEE WLAN using DCF with Two Types of VoIP Calls

Wireless Local Area Network (IEEE )

Advanced Computer Networks WLAN

Chapter 6 Wireless and Mobile Networks

Wireless Communication and Networking CMPT 371

Modeling of Partially Overlapping Wireless Personal Area Networks

Multiple Access in Cellular and Systems

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver

Logical Link Control (LLC) Medium Access Control (MAC)

3.1. Introduction to WLAN IEEE

Page 1. Outline : Wireless Networks Lecture 11: MAC. Standardization of Wireless Networks. History. Frequency Bands

Nomadic Communications WLAN MAC Fundamentals

A Comparative Analysis on Backoff Algorithms to Optimize Mobile Network

The MAC layer in wireless networks

Research Article Performance Analysis of IEEE DCF under Nonsaturation Condition

Mohammad Hossein Manshaei 1393

Wireless Communications

MSIT 413: Wireless Technologies Week 8

Rahman 1. Application

Transcription:

Mohammad Hossein Manshaei manshaei@gmail.com 1393 1

An Analytical Approach: Bianchi Model 2

Real Experimentations HoE on IEEE 802.11b Analytical Models Bianchi s Model Simulations ns-2 3

N links with the same physical condition (single-collision domain): 1 2 3 N 4 3 2 AP 1 N-2 N-1 N We want to calculate the throughput of this network. MAC Layer π = Probability of Transmission PHY Layer P = Probability of Collision = More than one transmission at the same time = 1 (1- π) N-1 4

Sending unicast packets station has to for DIFS before sending receiver acknowledges at once (after ing for SIFS) if the packet was received correctly (CRC) automatic retransmission of packets in case of transmission errors sender receiver other stations DIFS SIFS ing time ACK DIFS Contention window t The ACK is sent right at the end of SIFS (no contention) 5

Sending unicast packets station can send RTS with reservation parameter after ing for DIFS (reservation determines amount of time the packet needs the medium) acknowledgement via CTS after SIFS by receiver (if ready to receive) sender can now send at once, acknowledgement via ACK other stations store medium reservations distributed via RTS and CTS sender receiver DIFS RTS SIFS CTS SIFS SIFS ACK other stations NAV (RTS) NAV (CTS) defer access DIFS Contention window t NAV: Net Allocation Vector RTS/CTS can be present for some packets and not for other 6

7

8 channel sender1 sender2 sender3 One slot time sender4 Collision Busy DIFS DIFS Busy Busy Busy DIFS Busy collision DIFS Busy Busy Busy

1 - p 1 / CW 0 (s(t), b(t)) (Backoff Stage, Backoff Timer) 1 1 1 1 ( 0, 0 ) ( 0, 1 ) ( 0, 2 ) ( 0, CW 0-2 ) ( 0, CW 0-1 ) p / CW 1 ( i - 1, 0 ) p / CW i ( i, 0 ) 1 1 1 1 ( i, 1 ) ( i, 2 ) ( i, CW i - 2 ) ( i, CW i - 1 ) p / Cw i + 1 ( m - 1, 0 ) p / CW m 1 1 1 1 ( m, 0 ) ( m, 1 ) ( m, 2 ) ( m, CW m - 2 ) ( m, CW m - 1 ) p 1 / CW m 9

channel Collision sender1 DIFS (0, 9) (0, 8) Busy (0, 8) (0, 7) (0, 6) Busy (0, 6) (0, 5) (0, 4) sender2 Busy (0, 6) (0, 5) (0, 4) (0, 3) Busy (0, 3) (0, 2) (0, 1) DIFS (1, 3) sender3 Busy (2, 6) (2, 5) (2, 4) (2, 3) Busy (2, 3) (2, 2) (2, 1) DIFS (3, 6) sender4 Busy (6, 4) (6, 3) (6, 2) (6, 1) DIFS (0, 7) Busy (0, 7) (0, 6) (0, 5) One slot time collision 10

1-p 1/CW 0 1 1 1 1 (0,0) (0,1) (0,2) (0,CW 0-2) (0,CW 0-1) p/cw 1 (i-1,0) p/cw i Stationary distribution: { } bik, = lim t P s( t) = i, b( t) = k, i (0, m), k (0, CWi 1) 1 1 1 1 (i,0) (i,1) (i,2) (i,cw i -2) (i,cw i -1) p/cw i+1 (m-1,0) p/cw m Probability of transmission: 1 1 1 1 (m,0) (m,1) (m,2) (m,cw m -2) (m,cw m -1) p 1/CW m 11

Successful Transmission 1-p 1/CW 0 1 1 1 1 (0,0) (0,1) (0,2) (0,CW 0-2) (0,CW 0-1) p/cw 1 (i-1,0) p/cw i 1 1 1 1 (i,0) (i,1) (i,2) (i,cw i-2) (i,cw i-1) p/cw i+1 (m-1,0) p/cw m 1 1 1 1 (m,0) (m,1) (m,2) (m,cwm-2) (m,cwm-1) p 1/CW m 12

Bianchi s Model: Two Dimensional Markov Chain 1-p 1/CW 0 1 1 1 1 (0,0) (0,1) (0,2) (0,CW 0-2) (0,CW 0-1) p/cw 1 (i-1,0) Collision p/cw i 1 1 1 1 (i,0) (i,1) (i,2) (i,cw i -2) (i,cw i -1) p/cw i+1 (m-1,0) p/cw m 1 1 1 1 (m,0) (m,1) (m,2) (m,cw m -2) (m,cw m -1) p 1/CW m 13

( i - 1, 0 ) p / CW i 1 1 1 ( i, 0 ) ( i, 1 ) ( i, 2 ) ( i, CW i - 2 ) ( i, CW i - 1 ) b i,0 = p b i-1,0 (m-1,0) p/cw m 1 1 1 (m,0) (m,1) (m,2) (m,cw m-2) (m,cw m-1) p 1/CW m b m,0 = p b m-1,0 + p b m,0 14

After some derivations à system of two nonlinear equations with two variables p and p: { è Can be solved numerically to obtain p and p 15

Throughput of node i: E[ Payload Transmitted by user i in a slot time] PP s trl τ i = = E[ Duration of slot time] P P T + P (1 P ) T + (1 P ) T s tr s tr s c tr id P tr : Probability of at least one transmission in slot time P s : Probability of successful transmission during a random time slot L: Average packet payload size T s : Average time to transmit a packet of size L T c : Average time of collision T id : Duration of the idle period t ACK : ACK transmission time t H : Header transmission time t L : Payload transmission time P P tr s = 1 (1 π ) = N Nπ(1 π) 1 (1 π ) N 1 s H L ACK c H L N T = t + t + SIFS+ σ + t + DIFS+ σ T = t + t + DIFS+ σ 16

Basic Mode RTS/CTS 17

Analytical model to express the performance of IEEE 802.11 networks More sophisticated models have been developed since then Don t forget checking the related write up: «Performance Analysis of the IEEE DCF: Bianchi Model» 18

Mobile Networks: http://mobnet.epfl.ch Performance Analysis of the IEEE 802.11 Distributed Coordination Function: Bianchi Model Mohammad Hossein Manshaei and Jean-Pierre Hubaux March 2010 1 Introduction Currently, IEEE 802.11 is the de facto standard for WLANs [1]. It specifies both the medium access control and the physical layers for WLANs. The scope of IEEE 802.11 working groups (WGs) is to propose and develop MAC and PHY layer specifications for WLAN to handle mobile and portable stations. In this standard, the MAC layer operates on top of one of several possible physical layers. Medium access is performed using carrier sense multiple access with collision avoidance (CSMA/CA). Concerning the physical layer, four IEEE 802.11 standards are available at the time of this writing: a, b, g, and n. The first IEEE 802.11 compliant products were based on 11b. Since the end of 2001, higher rate products based on the IEEE 802.11a standard have appeared on the market [2]. The IEEE 802.11 working group has approved the 802.11g standard in June 2003, which extends the rate of the IEEE 802.11b to 54 Mbps [3]. The 802.11g PHY layer employs all available modulations specified for 802.11a/b. IEEE 802.11n is a recent amendment which improves the rate (up to to 600 Mbit/s) by adding multiple-input multiple-output (MIMO) and many other newer features. In Section 2 of this document, we briefly describe the operating principles of the IEEE 802.11 MAC layer, which need to be known for a proper understanding of the IEEE 802.11 performance evaluation. There are different analytical models and simulation studies of the 802.11 MAC layer in saturated condition. In Section 3, we present one of the most well-known analytical model, the so-called Bianchi model [4], to analyze the performance of IEEE 802.11 MAC layer. Finally in Section 4, we present the numerical solution of Bianchi model for the 802.11a/b networks. 2 IEEE 802.11 MAC layer The distributed coordination function (DCF) is the basic medium access mechanism of IEEE 802.11, and uses a carrier sense multiple access with collision avoidance (CSMA/CA) algorithm to mediate the access to the shared medium. The standard also describes centralized, polling-based access mechanism, the point coordination function (PCF) which is very rarely used in practice. The DCF protocol in IEEE 802.11 standard defines how the medium is shared among stations. It includes a basic access method and an optional channel access method with request-to-send (RTS) and clear-to-send (CTS) exchanged as shown in Figure 1 and 2, respectively. First, we explain the basic access method. 1

Other NAV update CW Source DATA Destination ACK time: DIFS SIFS DIFS Figure 1: Basic access CSMA/CA protocol Other NAV update with RTS and DATA CW Source RTS DATA Destination CTS ACK Other NAV update with CTS time: DIFS SIFS SIFS SIFS DIFS CW Figure 2: RTS/CTS exchange in the CSMA/CA protocol If the channel is busy for the source, a backoff time (measured in slot times) 1 is chosen randomly in the interval [0, CW ), where CW stands for the contention window. This timer is decreased by one as long as the channel is sensed idle for a DIFS, i.e., distributed inter-frame space time. DIFS is equal to SIF S+2 SlotT ime, where SIFS stands for short inter-frame space (see values in Table 1). The timer stops when the channel is busy and resumes when the channel is idle again for at least a DIFS period. CW is an integer whose range is determined by the PHY layer characteristics: CW min and CW max. CW is doubled after each unsuccessful transmission, up to the maximum value equal to CW max + 1. When the backoff timer reaches zero, the source transmits the packet. The ACK is transmitted by the receiver immediately after a period of duration equal to SIFS. When a packet is transmitted, all other stations hearing this transmission adjust their net allocation vector (NAV). The NAV maintains a prediction of future traffic on the medium based on the duration information that is announced in Data frames (or RTS/CTS frames as will be explained in the following) prior 1 The slot time is the sum of the Receiver-to-Transmitter turnaround time, MAC processing delay, and clear channel assessment (CCA) detect time [1]. The value of slot time for different PHY layer protocols is shown in Table 1. 2

to the actual exchange of. In addition, whenever a node detects an erroneous frame, the node defers its transmission by a fixed duration indicated by EIFS, i.e., extended inter-frame space time. This time is equal to the SIF S + ACK time + DIF S time. The contention window is initially set to the minimum value of CW min, equal for example to 15 (see Table 1). Every time a collision occurs, this is interpreted as a high load of the network, and each station involved in the collision throttles down its transmission rate by doubling the size of its contention window. In this way, the contention window can take values equal for example to 31, 63, 127, 255, 511, up to CW max = 1023. Larger contention windows slow down the transmission of packets and reduce the probability of collisions. In case of a successful (i.e. collision-free) transmission, the transmitting station brings the value of its contention window back to CW min. The mechanism we have just described is called exponential backoff or binary exponential backoff. If the optional access method is used, an RTS frame should be transmitted by the source and the destination should accept the transmission by sending a CTS frame prior to the transmission of the actual packet. Note that stations in the sender s range that hear the RTS packet should update their NAVs and defer their transmissions for the duration specified by the RTS. Nodes that overhear the CTS packet update their NAVs and refrain from transmitting. In this way, the transmission of the packet and its corresponding ACK can proceed without interference from other nodes (hidden nodes problem). Table 1 shows the important time interval between frames in different standard specification called inter-frame space (IFS) [2, 5, 3]. IEEE 802.11g uses the IFS corresponding to its operating mode. Table 1: Inter frame space and CW time for different PHY layers. Parameters 802.11a 802.11b 802.11b 802.11b 802.11b (FH) (DS) (IR) (High Rate) Slot Time (µs) 9 50 20 8 20 SIFS (µs) 16 28 10 10 10 DIFS (µs) 34 128 50 26 50 EIFS (µs) 92.6 396 364 205 or 193 268 or 364 CW min (SlotT ime) 15 15 31 63 31 CW max(slott ime) 1023 1023 1023 1023 1023 Physical Data Rate (Mbps) 6 to 54 1 and 2 1 and 2 1 and 2 1, 2, 5.5, and 11 3 Bianchi Model The main contribution of Bianchi s model is the analytical calculation of saturation throughput in a closed-form expression. The model also calculates the probability of a packet transmission failure due to collision. It assumes that the channel is in ideal conditions, i.e., there is no hidden terminal and capture effect. Bianchi uses a two-dimensional Markov chain of m + 1 backoff stages in which each stage represents the backoff time counter of a node, see Figure 3. A transition takes place upon collision and successful transmission, to a higher 2 stage (e.g., from stage i 1 to stage i in Figure 3) and 2 Actually it appears lower in the figure. 3

to the lowest stage (i.e., stage 0) respectively. Figure 3: Markov chain model of backoff window size in CSMA/CA. In each stage, CW i is the maximum value for the contention window and is equal to 2 i (CW min + 1) (Note that we define for convenience W min = CW min + 1 and that CW max is equal to 2 m W min 1). If a correct transmission takes place in any (i, 0) state, a random backoff will be chosen between 0 and CW 0 1 1 p with probability of CW 0. This case is represented by states (0, 0) to (0, CW 0 1) in the Markov chain. In the case of collision (e.g., in state (i 1, 0)), a random backoff will be chosen (between 0 and CW i 1, each with probability p/cw i ). This case is represented by states (i, 0) to (i, CW i 1) in the Markov chain. From [4], c IEEE, 2000. This model adopts a discrete and integer time scale. In this time scale, t and t + 1 correspond to the beginning of two consecutive slot times. Each station decrements its backoff time counter at the beginning of each slot time. Note that as the backoff time decrement is stopped when the channel is busy, the time interval between t and t + 1 may be much longer than the defined slot time for 802.11, as it may include a packet transmission or a collision. Each state of this bidimensional Markov process is represented by {s(t), b(t)}, where b(t) is the stochastic process representing the backoff time counter for a given station and s(t) is the stochastic process representing the backoff stage (0, 1,, m) of the station at time t. This model assumes 4

that in each transmission attempt, regardless of the number of retransmissions suffered, each packet collides with constant and independent probability p. In other words, p is the probability that, in a slot time, at least one of the N 1 remaining stations transmits as well. If at steady state each remaining station transmits a packet with probability π, p can be written as: p = 1 (1 π) N 1 (1) Let b i,k = lim t P {s(t) = i, b(t) = k}, i (0, m), k (0, CW i 1) be the stationary distribution of the chain. A transmission occurs when the backoff time counter is equal to zero. Thus, we can write the probability that a station transmits in a randomly chosen slot time as: π = m b i,0 (2) i=0 For the above Markov chain, it is easy to obtain a closed-form solution for b i,0 as a function of p. First, we can write the stationary distribution of the chain for b i,0, b m,0, and b i,k : b i,0 = p i b 0,0 0 < i < m b m,0 = pm 1 p b 0,0 (3) b i,k = CW i k CW i b i,0 0 i m, 0 k CW i 1 The first and second expressions in (3) account from the fact that b i 1,0 p = b i,0 for 0 < i < m and b m 1,0 p = (1 p)b m,0. The third equation can be obtained considering the fact that m i=0 b i,0 = b 0,0 1 p and taking the chain regularities into account (for k (1, CW i 1)), that is: b i,k = CW i k (1 p) m j=0 b j,0 i = 0 p b CW i i 1,0 0 < i < m (4) p (b m 1,0 + b m,0 ) i = m By imposing the normalization condition and considering Equation (3), we can obtain b 0,0 as a function of p: 1 = = = m i=0 m i=0 m i=0 CW i 1 k=0 b i,k CW i 1 b i,0 k=0 b i,0 CW i + 1 2 CW i k CW i m = i=0 m 1 b i,0 2 i W min + 1 2 W min + 1 ( ( 2 = b 0,0 + b 0,0 p i i )) ( W min + 1 b0,0 p m ) ( 2 m ) W min + 1 + 2 2 1 p 2 i=1 [ ] = b m 1 0,0 ( W min + 1 + (2p) i W min + p i) + pm 2 1 p (2m W min + 1) i=1 [ ( = b m 1 ) ] 0,0 W min (2p) i + (2p)m + 1 2 1 p 1 p i=0 (5) 5

Thus b 0,0 can be written as: b 0,0 = 2(1 2p)(1 p) (1 2p)(W min + 1) + pw min (1 (2p) m ) Finally, considering equations (2), (3), and (6), the channel access probability π of a node is derived as a function of the number of backoff stage levels m, the minimum contention window value W min, and the collision probability p: (6) π = = m i=0 b i,0 = b 0,0 1 p = 2(1 2p) (1 2p)(W min + 1) + pw min (1 (2p) m ) 2 1 + W min + pw min m 1 k=0 (2p)k Equations (1) and (7) form a system of two nonlinear equations that has a unique solution and can be solved numerically for the values of p and π (e.g., one can use the solve function in MATLAB to obtain the values for p and π). Once these probabilities are obtained, the saturation throughput, which is the average information payload transmitted in a slot time over the average duration of a slot time, can be computed as follows: (7) τ = = E[P ayload information transmitted in a slot time] E[Duration of slot time] P s P tr L P s P tr T s + P tr (1 P s )T c + (1 P tr )T id (8) where P tr = 1 (1 π) N is the probability that there is at least one transmission in the considered slot time; L is the average packet payload size; T s is the average time needed to transmit a packet of size L (including the inter-frame spacing periods [4]); P s = Nπ(1 π)n 1 is the probability of a 1 (1 π) N successful transmission; T id is the duration of the idle period (a single slot time); and T c is the average time spent in the collision. T c and T s can be calculated for the basic transmission mode (i.e., no RTS and CTS packets) with: { Ts = H + L + SIF S + σ + ACK + DIF S + σ (9) T c = H + L + DIF S + σ where H, L, and ACK are the transmission times needed to send the packet header, the payload, and the acknowledgment, respectively. σ is the propagation delay. Note that for RTS/CTS transmission mode, T c and T s can be calculated by: { Ts = RT S + SIF S + σ + CT S + SIF S + σ + H + L + SIF S + σ + ACK + DIF S + σ T c = RT S + DIF S + σ (10) 6

4 Numerical Solution In this section we present the numerical solution results of the Bianchi model. We use MATLAB to solve the two nonlinear equations (1) and (7) numerically. The system values are those specified for the DSSS 802.11b and 802.11a in Table 1. The channel bit rate has been assumed equal to 1 and 6 Mbps for 802.11b and 802.11a respectively. We assume that the packet payloads to be transmitted are all 1000-octet long. Figure 4 and 5 show the saturation throughput of IEEE 802.11a and 802.11b networks with basic transmission mode and with RTS/CTS packets, using the Bianchi model. Each curve correspond to a different value of the maximum backoff stage, i.e., m. Saturation Throughput (bps) 4.5 4 3.5 3 2.5 5 x 106 m=3 m=4 m=5 m=6 m=7 2 0 10 20 30 40 50 Number of Mobile Stations (a) Saturation Throughput (bps) 4.5 4 3.5 3 2.5 5 x 106 m=3 m=4 m=5 m=6 m=7 2 5 10 15 20 25 30 35 40 45 50 Number of Mobile Station (b) Figure 4: Saturation throughput for 802.11a for 6 Mbps physical rate: (a) Basic transmission mode, (b) RTS/CTS transmission mode. Saturation Throughput (bps) 8.5 8 7.5 7 6.5 6 5.5 9 x 105 m=3 m=4 m=5 m=6 m=7 Saturation Throughput 9 x 105 8.5 8 7.5 7 6.5 6 5.5 m=3 m=4 m=5 m=6 m=7 5 5 10 15 20 25 30 35 40 45 50 Number of Mobile Stations (a) 5 5 10 15 20 25 30 35 40 45 50 Number of Mobile Stations (b) Figure 5: Saturation throughput for 802.11b DSSS for 1 Mbps physical rate: (a) Basic transmission mode, (b) RTS/CTS transmission mode. As expected, the RTS/CTS transmission modes show better throughput performance for the high number of mobile stations as it avoids the collision between the long packets. Another interesting observation is that the saturation throughput increases for the higher maximum backoff stages. Note that the Bianchi model does not take into consideration the retransmission limit and the maximum backoff stage as defined by the IEEE standard specification [1]. In 2002, Wu et al. [6] proposed a refinement of Bianchi s model by considering finite packet 7

retry limits. The retransmission limit is defined in the IEEE 802.11 MAC standard specification with the help of the two following counters: short retry count (SRC) and long retry count (LRC). These counters are incremented and reset independently. SRC is incremented every time an RTS fails whereas LRC is incremented when transmission fails. Both SRC and LRC are reset to zero after a successful transmission. Data frames are discarded when LRC (SRC) reaches dot11longretrylimit (dot11shortretrylimit). The default values for dot11longretrylimit and dot11shortretrylimit are 4 and 7 respectively. Considering this limitation, the Markov chain proposed by Bianchi is modified in [6]. Unlike Bianchi model [4], in the Wu s model, m is the maximum backoff stage (retransmission count) which is different for the and RTS frames. In Wu s model, m represents the maximum contention window, i.e. 2 m (CW min + 1) = (CW max + 1). In fact, the key difference between Bianchi s model [4] and Wu s model [6], concerns the Markov chain models. They are different because Wu s model considers the effects of frame retransmission limit. The interested reader is referred to [6] for more information. References [1] L. S. Committee, ANSI/IEEE Std 802.11:Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. IEEE Computer Society, 1999. [2] IEEE 802.11 WG part 11a. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications, High-speed Physical Layer in the 5 GHz Band, 1999. [3] IEEE 802.11 WG part 11g. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications, Further Higher Speed Physical Layer Extension in the 2.4 GHz Band, 2003. [4] G. Bianchi, Performance analysis of the ieee 802.11 distributed coordination function, Selected Areas in Communications, IEEE Journal on, vol. 18, no. 3, pp. 535 547, 2000. [5] IEEE 802.11 WG part 11b. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications, Higher Speed PHY Layer Extension in the 2.4 GHz Band, 1999. [6] H. Wu, Y. Peng, K. Long, and J. Ma, Performance of Reliable Transport Protocol over IEEE 802.11 Wireless LAN: Analysis and Enhancement, in Proceeding of the IEEE Conference on Computer Communications (INFOCOM), New York, NY, June 2002. 8