Supporting Deadline Monotonic Policy over Average Service Time Analysis

Similar documents
Saturated Throughput Analysis of IEEE e Using Two-Dimensional Markov Chain Model

Collision Probability in Saturated IEEE Networks

Mohammad Hossein Manshaei 1393

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF

Providing Throughput Guarantees in IEEE e Wireless LANs

Analytical Model for an IEEE WLAN using DCF with Two Types of VoIP Calls

Saturated Throughput Analysis of IEEE e EDCA

EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE WIRELESS NETWORKS

Saturation Throughput of IEEE e EDCA Based on Mean Value Analysis

An Efficient Scheduling Scheme for High Speed IEEE WLANs

A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment

WLAN Performance Aspects

Adaptive Fair Channel Allocation for QoS Enhancement in IEEE Wireless LANs

Project Report: QoS Enhancement for Real-Time Traffic in IEEE WLAN

P B 1-P B ARRIVE ATTEMPT RETRY 2 1-(1-P RF ) 2 1-(1-P RF ) 3 1-(1-P RF ) 4. Figure 1: The state transition diagram for FBR.

Performance Comparison of IEEE e EDCA and b DCF Under Non- Saturation Condition using Network Simulator

Evaluation of the backoff procedure of Homeplug MAC vs. DCF

Performance Evaluation of IEEE e

An Analytical Model for the IEEE le EDCF

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm

Exploiting Multi-User Diversity in Wireless LANs with Channel-Aware CSMA/CA

Analysis of CSMA/CA Systems under Carrier Sensing Error: Throughput, Delay and Sensitivity

Research Article Performance Analysis of IEEE DCF under Nonsaturation Condition

Collision Free Hybrid Slot Protocol for Improving Performance in Wireless Networks

IEEE Medium Access Control. Medium Access Control

Two-Tier WBAN/WLAN Healthcare Networks; Priority Considerations

Investigating MAC-layer Schemes to Promote Doze Mode in based WLANs

Performance evaluation of IEEE e

A Novel Framework for Radio Resource Management in IEEE Wireless LANs

COLLISION-AWARE ADAPTION OF CONTENTION WINDOW IN E WIRELESS LAN

Performance Analysis of WLANs Under Sporadic Traffic

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

Performance anomaly of b

The MAC layer in wireless networks

Reliable Multicast Scheme Based on Busy Signal in Wireless LANs

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function

Performance Study of IEEE DCF and IEEE e EDCA

Lecture 16: QoS and "

Queueing Analysis of IEEE MAC Protocol in Wireless LAN

Analysis of the Distribution of the Backoff Delay in DCF: A Step Towards End-to-end Delay Guarantees in WLANs

June 20th, École Polytechnique, Paris, France. A mean-field model for WLANs. Florent Cadoux. IEEE single-cell WLANs

Certified Wireless Network Administrator (CWNA) PW Chapter Medium Access. Chapter 8 Overview

A new Traffic Separation Mechanism (TSm) in Wireless e Networks: A simulation study

Enhancing the DCF mechanism in noisy environment

2 Related Work. 1 Introduction. 3 Background

AGOOD medium access control (MAC) protocol for wireless

Call Admission Control for IEEE Contention Access Mechanism

Title. Author(s)Nguyen, Thi Xuan My; Saivichit, Chaiyachet; Miyanaga. Issue Date Doc URL. Type. Note. File Information

Performance Analysis of IEEE e EDCA with QoS Enhancements through TXOP based Frameconcatenation

An Accurate Model for Energy Efficiency in IEEE WLANs

Adaptive EDCF: Enhanced Service Differentiation for IEEE Wireless Ad-Hoc Networks

Analysis of the IEEE e EDCA Under Statistical Traffic

Throughput and Energy Consumption Analysis of IEEE Slotted CSMA/CA. T.R. Park, T.H. Kim, J.Y. Choi, S. Choi, and W.H.

Modeling of Partially Overlapping Wireless Personal Area Networks

THE MAC LAYER PACKET SERVICE TIME DISTRIBUTIONS OF DCF IN THE IEEE PROTOCOL

B. Bellalta Mobile Communication Networks

Towards the Performance Analysis of IEEE in Multi-hop Ad-Hoc Networks

A Comparative Analysis on Backoff Algorithms to Optimize Mobile Network

Analysis of Broadcast Non-Saturation Throughput as a Performance Measure in VANETs

A Medium Access Control Protocol with Retransmission using NACK and Directional Antennas for Broadcasting in Wireless Ad-Hoc Networks

Wireless Communication

CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA)

Fu-Yi Hung ALL RIGHTS RESERVED

A Finite State Model for IEEE Wireless LAN MAC DCF

IEEE e QoS for Wireless LAN:

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Adaptive Packetization for Error-Prone Transmission over WLANs with Hidden Terminals

Wireless Networked Systems

Setting the Parameters Right for Two-hop IEEE e Ad Hoc Networks

QoS issues in Wi-Fi-WMM based triple play home networks

A SCHEME FOR IMPROVED DELAY AND FRAME DROP PROBABILITIES IN e NETWORKS

Fairness Enhancement Scheme for Multimedia Applications in IEEE e Wireless LANs

Prioritization scheme for QoS in IEEE e WLAN

Fairness and Transmission Opportunity Limit in IEEE802.11e Enhanced Distributed Channel Access

Wireless Networking & Mobile Computing

Department of Electrical and Computer Systems Engineering

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

Modeling and Analysis of TCP Dynamics over IEEE WLAN

Performance analysis of Internet applications over an adaptive IEEE MAC architecture

On the Performance Enhancement of Wireless LAN - A Multi-polling Mechanism with Hidden Terminal Solution

Fairness in the IEEE network. Shun Y. Cheung

Wireless Networks (MAC)

The MAC layer in wireless networks

Medium Access Control Sublayer

Two-phase Collision Avoidance to Improve Scalability in Wireless LANs

ECE442 Communications Lecture 3. Wireless Local Area Networks

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver

Mohamed Khedr.

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS

. 14 Byte for Acks. Due to this fact, the overhead is more relevant if the data contained in packets is sent to high rates:

An Improved IEEE CSMA/CA Medium Access Mechanism Through the Introduction of Random Short Delays

CMPE 257: Wireless and Mobile Networking

CSE 461: Wireless Networks

IEEE e/802.11k wireless LAN: spectrum awareness for distributed resource sharing

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

ICE 1332/0715 Mobile Computing (Summer, 2008)

SRN Model for IEEE DCF MAC Protocol in Multi-hop Ad Hoc Networks with Hidden Nodes

Characterising the Behaviour of IEEE Broadcast Transmissions in Ad Hoc Wireless LANs

Analytical Modeling of TCP Clients in Wi-Fi Hot Spot Networks

Transcription:

Supporting Deadline Monotonic Policy over 802. Average Service Time Analysis Inès El Korbi Ecole Nationale des Sciences de l Informatique Laboratoire Cristal Université de la Manouba, 200 Tunisia ines.korbi@gmail.com Leila Azouz Saidane Ecole Nationale des Sciences de l Informatique Laboratoire Cristal Université de la Manouba, 200 Tunisia leila.saidane@ensi.rnu.tn Abstract In this paper, we propose a real time scheduling policy over 802. DCF protocol called Deadline Monotonic DM. e evaluate the performance of this policy for a simple scenario where two stations with different delay constraints contend for the channel. For this scenario a Markov chain based analytical model is proposed. From the mathematical model, we derive expressions of the average medium access delay called service time. Analytical results are validated by simulation results using the ns-2 network simulator.. Introduction The IEEE 802. wireless LANs [2] become more and more reliable to support applications with Quality of Service QoS requirements. Indeed, the IEEE 802.e standard [3] was recently proposed to offer service differentiation over 802.. In the absence of a coordination point, the IEEE 802. defines the Distributed Coordination Function DCF based on the Carrier Sense Multiple Access with Collision Avoidance CSMA/CA protocol. In the DCF protocol, a station shall ensure that the channel is idle when it attempts to transmit. Then it selects a random backoff in the contention window [0, C ], where C is the current window size and takes its values between the minimum and the maximum contention window sizes. If the channel is sensed busy, the station suspends its backoff until the channel becomes idle for a DIFS period after a successful transmission or an EIFS period after a collision. hen the backoff reaches 0, the packet is transmitted. A packet is dropped if it collides after maximum retransmission attempts. The IEEE 802.e standard proposes the Enhanced Distributed Channel Access EDCA as an extension for DCF. ith EDCA, each station maintains four priorities called Access Categories ACs. Each access category is characterized by a minimum and a maximum contention window sizes and an Arbitration Inter Frame Spacing AIFS. Although IEEE 802.e classifies the traffic into four prioritized ACs, there is still no guarantee of real time transmission service due to the lack of a satisfactory scheduling method for various delay-sensitive flows. Different analytical models have been proposed to evaluate the performance of 802.e standard [9],[4], all inspired from Bianchi s model [] that calculates saturation throughput of 802. DCF. In this paper, we focus on delay sensitive flows and propose to introduce the Deadline Monotonic DM scheduling policy over 802. to satisfy the delay requirements of such flows. Indeed DM is a real time scheduling policy that assigns static priorities to flow packets according to their deadlines; the packet with the small deadline being assigned the highest priority [7]. Supporting the DM policy over 802., requires a distributed scheduling and a new medium access backoff policies. Distributed scheduling over 802. was early introduced in [5] to allow stations maintaining the priority of the Head Of Line HOL packets highest priority packet of all other stations. Thus, stations can have a vision of the packets being transmitted in the network and adjust their backoff accordingly. Using a distributed scheduling mechanism similar to [5], we introduce in this paper a new medium access backoff policy to support DM over 802., where the backoff value is inferred from the deadline information. e then propose a Markov chain based analytical model to evaluate the performance of DM for a simple scenario where two stations with different deadline constraints contend for the channel. This configuration will reflect the behavior of DM over 802. and the mathematical model can be extended for more complex scenarios. For the considered configuration, we evaluate for each station the average 978--4244-890-9/07/$25.00 2007 IEEE

medium access delay called average service time. Analytical results will be validated against simulation results using the ns-2 simulator [8]. The rest of this paper is organized as follows. In section II, we present the distributed scheduling and the new medium access backoff policy to support DM over 802.. In section III, we present the mathematical model based on the Markov chains analysis. Section IV present analytical and simulation results of the average service time. Finally, we conclude the paper and present our future work in Section V. 2. Supporting DM policy over 802. Using the DM policy within a node means that the packets are sorted by increasing order of their deadlines such as the HOL packet has the shortest delay bound. ith the DCF, all the stations share the same transmission medium and the HOL packets of all the stations will contend for the channel with the same priority even they have different deadlines. The idea of introducing DM over 802. is to allow stations having packets with short deadlines to access the channel with higher priority than those having packets with long deadlines. Providing such a QoS requires a distributed scheduling and a new medium access policy. 2.. Distributed Scheduling To realize a distributed scheduling over 802., we introduce a broadcast priority mechanism similar to [5]. Indeed each station maintains a local scheduling table with entries for HOL packets of all other stations. Each entry in the scheduling table of node Si comprises two fields Sj, Dj where Sj is the source node MAC address Address 2 field in DATA packet and RA field in the ACK packet and Dj is the deadline of the HOL packet of Sj. To broadcast the HOL packet deadlines, we propose to use the DATA/ACK access mode. The deadline information requires two additional bytes to be encoded in DATA and ACK packets. hen a node Si transmits a DATA packet, it piggybacks the deadline of its HOL packet. The nodes hearing the DATA packet add an entry for Si in their local scheduling tables by filling the corresponding fields. The receiver of the DATA packet copies the priority of the HOL packet in the ACK and sends it back. All the stations that did not hear the DATA packet add an entry for Si using the information in the ACK packet. In the following, we propose a new medium access policy, where the backoff value is inferred from the packet deadline. 2.2. DM medium access backoff policy Let s consider two stations S and S2 transmitting two flows with the same deadline D D is expressed as a number of 802. slots. The two stations having the same delay bound can access the channel with the same priority using the native 802. DCF. Now, we suppose that S and S2 transmit flows with different delay bounds D and D2 such as D < D2, and generate two packets at time instants t and t2. If S2 had the same delay bound as S, its packet would have been generated at time t2 such as t2 = t2 + D2, where D2 = D2 D. At that time S and S2 would have the same priority and transmit their packets according to the 802. protocol. Hence, when S2 has a packet to transmit, it selects a 802. backoff, but suspends this backoff during D2 idle slots. The D2 slots elapsed, 802. backoff can therefore be decremented. Thus to support DM over 802., each station uses a new backoff policy where the backoff is given by: The random backoff selected in [0, C ], according to 802. DCF, called BAsic Backoff BAB. The DM Shifting Backoff DM SB: corresponds to the additional backoff slots that a station with low priority the HOL packet having a large deadline adds to its BAB to have the same priority as the station with the highest priority the HOL packet having the shortest deadline. henever a station Si sends an ACK or hears an ACK on the channel its DMSB is reevaluated as follows: DMSBSi = DeadlineHOL Si DT min Si here DT min Si is the minimum of the HOL packet deadlines present in Si scheduling table and DeadlineHOL Si is the HOL packet deadline of node Si. Hence, when Si has to transmit its HOL packet with a delay bound Di, it follows this procedure: - It selects a BAB in the contention window [0, C ]. 2- The Hole Backoff HB is computed as: HBSi = DMSBSi + BABSi 2 3- If the channel is idle Then Decrement HBSi.

Else If DATA packet heard Then End If Else End If Update the scheduling table If Si is the receiver Then End If Copy the packet priority in ACK Reevaluate DMSBSi before sending ACK If ACK is heard Then End If Update the scheduling table Reevaluate DMSBSi; Repeat steps 2 and 3 4- If HBSi = 0 Then transmit. The steps -4 are repeated until the packet is correctly transmitted or dropped. The contention window C is doubled at each retransmission attempt until it reaches Cmax. 3. Mathematical Model of the DM policy over 802. In the hereby section, we propose a mathematical model to evaluate the performance of the DM policy using Markov chains analysis []. e consider the following assumptions: The system under study comprises two stations S and S2, such as Si transmits a flow F i having a deadline Di and D < D2. e define D2 = D2 D as the difference between the two delay bounds. 2 e operate in saturation conditions: each station has immediately a packet available for transmission after the service completion of the previous packet []. 3 A station selects a BAB in a contention window [0, ]. e consider that each station selects a 802. backoff in the same contention window of size independently of the transmission attempt. This is a simplifying assumption to limit the complexity of the mathematical model. 4 e suppose that we are in stationary conditions, i.e. the two stations have already sent one packet to each other. Thus, the two stations have the same scheduling table. Each station Si will be modeled by a Markov Chain representing the whole backoff HB process. 3.. Markov chain modeling station S Figure represents the Markov Chain modeling station S. The states of this Markov chain are described by the following quadruplet R, i, i j, D2 where: R : takes two values S2 s and S2 c. hen R = S2 s, station S2 is decrementing its shifting backoff its DMSB during D2 slots and wouldn t contend for the channel. hen R = S2 c, the D2 slots were elapsed and S2 will contend for the channel at the same time as S. i : the value of the BAB selected by S in [0, ]. j : the current backoff value of S. So i j corresponds to the remaining backoff slots before reaching 0. D2 : corresponds to D2 D. e choose the negative notation D2 for S to express the fact that S2 has a positive DMSB equals to D2 and DMSB S = 0. Initially S selects a random BAB and is in one of the states S2 s, i, i, D2, i = 0... During D2 slots, S decrements its backoff with the probability and moves to one of the states S2 s, i, i j, D2, i = 0.., j = minmax0, i, D2. Indeed during these slots, S2 is decrementing its DMSB and wouldn t contend for the channel. hen S decrements its D2 th slot it knows that henceforth, S2 can contend for the channel the D2 slots were elapsed. Hence, S moves to one of the states S2 c, i, i D2, D2, i = D2... If the BAB initially selected by S is smaller than D2, then S transmits when its backoff reaches 0. If S2 transmits before S backoff reaches 0, the next packet of S2 will decrement another DMSB and S will see the channel free again for D2 slots. 3.2. Markov chain modeling station S2 Figure 2 represents the Markov Chain modeling station S2. Each state of S2 Markov chain is represented by the quadruplet i, k, D2 j, D2 where:

Figure. Markov Chain modeling station S i : refers to the BAB value selected by S2 in [0, ]. k : refers to the current BAB value. D2 j : refers to the current DMSB of S2, j [0, D2]. D2 : corresponds to D2 D. hen S2 selects a BAB, its DMSB equals D2 and is in one of states i, i, D2, D2, i = 0... If S2 observes the channel idle during D2 slots, it moves to one of the states i, i, 0, D2, i = 0.., where it ends its shifting backoff. At that time, S2 begins decrementing its basic backoff. If S transmits, S2 re-initializes its shifting backoff and moves again to one of the states i, i, D2, D2, i =... 3.3. Blocking probabilities in the Markov chains e notice from figure that when S is in one of the states S2 s, i, i j, D2, i = 0.., j = min max 0, i, D2, it decrements its backoff with the probability. That means that when S is in one of these states, it knows that S2 is decrementing its DMSB and is in one of the states i, i, D2 j, D2, i = 0.., j = 0.. D2. However, when S is in one of the states S2 c, i, i D2, D2, i = D2.., S2 has already decremented its DM SB and can now contend for the channel by decrementing its basic backoff. In this case, S2 will be in one of the states i, i, 0, D2 i=0.. i, i, 0, D2 i=2... From the explanations above, each station Markov chain states can be divided in two groups: - ξ : the set of states of S for which S2 will not contend states colored in blue in figure. } ξ = {S2 s, i, i j, D2 i=0..,j=0.. minmax0,i,d2. - γ : the set of states of station S for which S2 can contend and decrements its BAB states colored in pink in figure. γ = { S2 c, i, i D2, D2 i=d2.. }. - ξ 2 : the set of states of S2 where S2 does not contend for the channel states colored in blue in figure 2. } ξ 2 = {i, i, D2 j, D2 i=0..,j=0..d2. - γ 2 : the set of states of S2, where S2 contends for the channel states colored in pink in figure 2. γ 2 = { i, i, 0, D2 i=0.. i, i, 0, D2 i=2.. } Thus when S is in one of the states of ξ, S2 is obligatory in of the states of ξ 2. Similarly, when S is in one of the states of γ, S2 is obligatory in of the states of γ 2.hen the station S2 is in one states of ξ 2, S2 is blocked with the probability τ, this probability corresponds to the probability that S transmits knowing that it is in one of the states of ξ. So: τ =Pr [S transmits /ξ ] 3 = π S2s,0,0, D2 minmax0,i,d2 π S2s,i,i j, D2 i=0 j=0

Figure 2. Markov Chain modeling station S2 where π R,i,i j, D2 is the probability of the state R, { i, i j, D2 } in the stationary conditions and Π = is the probability vector of S. e also π R,i,i j, D2 define τ 2, the probability that S2 is blocked knowing that station S is in one of the states of γ. So: τ 2 = Pr [S transmits /γ ] = π S2c,D2,0, D2 π S2c,i,i D2, D2 i=d2 In the same way, when S2 is in one of the states of ξ 2, S will decrement its backoff with the probability. Indeed, no one of the ξ 2 states corresponds to a transmission state those states describe the shifting backoff decremented by S2. However, when S2 is in one of the states of γ 2, it contends for the channel and S is blocked with the probability τ 22, such as: τ 22=Pr [S2 transmits /γ 2 ] = i=0 π i,0,0,d2 2 π i,i,0,d2 2 + i=2 π i,i,0,d2 2 π i,k,i j,d2 2 where π i,k,i j,d2 2 is the probability of the state i, { k, i j, D2 } in the stationary conditions and Π 2 = is the probability vector of S2. The blocking probabilities described above allows deducing the transition state probabilities and having the transition probability matrix P i, for each station Si. Therefore, we can evaluate the state probabilities by solving the following system [6]: { ΠiP i = Π i π j i = 6 j 4 5 3.4. Transition probability matrix of S Let P be the transition probability matrix of S and P {i, j} is the probability to transit from state i to state j. The transitions probabilities of station S are: P {S2 s, i, i j, D2, S2 s, i, i j +, D2} =, i = 2.., j = 0.. min max 0, i 2, D2 2 P {S2 s, i, i D2 +, D2, S2 c, i, i D2, D2} =, i = D2.. P {S2 s, i,, D2, S2 s, 0, 0, D2} =, i =.. min, D2 P {S2 c, i, i D2, D2, S2 c, i, i D2, D2} = τ 22, i = D2 +.. P {S2 c, i, i D2, D2, S2 s, i D2, i D2, D2} = τ 22, i = D2 +.. 7 8 9 0 P {S2 s, 0, 0, D2, S2 s, i, i, D2} =, i = 0.. 2 If D2 < then : P {S2 c, D2, 0, D2, S2 s, i, i, D2} =, i = 0.. 3 By replacing P and Π in 6 and solving the resulting system, we can express π R,i,i j D2 as a function of τ 22, where τ 22 is given by 5. 3.5. Transition probability matrix of S2 Let P 2 be the transition probability matrix of S2. The transitions probabilities of S2 are:

P 2 {i, i, D2 j, D2, i, i, D2 j +, D2} = τ, i = 0.., j = 0.. D2 P 2 {i, i, D2 j, D2, i, i, D2, D2} = τ, i = 0.., j = 0..D2 P 2 {i, i, 0, D2, i, i, 0, D2} = τ 2, i = 2.. 4 5 6 P 2 {,, 0, D2, 0, 0, 0, D2} = τ 2 7 P 2 {i, i, 0, D2, i, i, D2, D2} = τ 2, i =.. 8 P 2 {i, i, 0, D2, i, i, D2, D2} = τ 2, i = 2.. P 2 {i, i, 0, D2, i, i 2, 0, D2} = τ 2, i = 3.. 9 20 P 2 {0, 0, 0, D2, i, i, D2, D2} =, i = 0.. 2 Replacing P 2 and Π 2 in 6 and solving the resulting system, we can express π i,k,d2 j,d2 2 as a function of τ and τ 2 given respectively by 3 and 4. Moreover, by replacing π R,i,i j,d2 and π i,k,d2 j,d2 2 by their values, in equations 3, 4 and 5, we obtain a system of non linear equations as follows: τ = f τ 22 τ 2 = f τ 22 τ 22 = f τ, τ 2 under the constraint: τ > 0, τ 2 > 0, τ 22 > 0, τ <, τ 2 <, τ 22 < 22 Solving the above system 22, allows deducing the expressions of τ, τ 2 and τ 22, and deriving the state probabilities of S and S2 Markov chains. 4. Average Service time computation In this section, we evaluate the average MAC layer service time of S and S2 using DM policy. The service time is the time interval from the time instant that a packet becomes at the head of the queue and starts to contend for transmission to the time instant that either the packet is acknowledged for a successful transmission or dropped [0]. e propose to evaluate the Z-Transform of the MAC layer service time [4] to derive an expression of the average service time. The average service time depends on the duration of an idle slot T e, the duration of a successful transmission T s and the duration of a collision T c [], [4]. e have: T s=t P HY + T MAC + T p + T D + SIF S +T P HY + T ACK + T D + DIF S 23 here T P HY, T MAC and T ACK are the durations of the PHY header, the M AC header and the ACK packet [4],[]. T D is the time required to transmit the two bytes deadline information and T p is the time required to transmit the data payload. If we consider a constant size packets for both stations, we have T s = T c. As T e is the smallest duration event, the duration of all events will be given by Tevent T e. 4.. Z-transform of S service time To evaluate the Z-transform of station S service time T S Z, we define: H R,i,i j, D2 Z : The Z-transform of the time already elapsed from the instant S selects a basic backoff in [0, ] i.e. being in one of the states S2 s, i, i, D2 to the time it is found in the state R, i, i j, D2. e compute H R,i,i j, D2, for each state of S Markov chain as follows: H S2 s,, j, D2 Z = Zj, j = 0..D2 24 H S2 s,i,i, D2 Z = Z, i = D2.. 2 25 H S2 s,i,i, D2 Z = τ 22Z Ts T e H S2 c,i+d2,i, D2 Z +, i =.. max 0, D2 H S2 s,i,i j, D2 Z = Z j H S2 s,i,i, D2 Z, i =.. 2, j =.. mini, D2 26 27 H S2 c,i,i D2, D2 Z = Z D2 H S2 s,i,i, D2 Z + τ 22 ZH S2 c,i+,i+ D2, D2 Z, i = D2.. 2 H S2 s,0,0, D2 Z = + min,d2 i= 28 H S2 s,i,, D2 Z 29 If the station S transmission state is S2 s, 0, 0, D2, the transmission will be successful since S2 was decrementing its shifting backoff. hereas when the station S transmission state is S2 c, D2, 0, D2, the transmission occurs successfully only if S2 doesn t transmit with the probability τ 22. Otherwise S selects another backoff and tries another transmission. After m retransmissions, if the packet is not acknowledged, it will be dropped. So: i=0 τ 22Z Tc m+ T e T S Z = H S2 c,d2,0, D2 Z + H S2 s,0,0, D2 Z + τ 22 H S2 c,d2,0, D2 Z m τ 22Z Tc i T e T s H S2 c,d2,0, D2 Z Z T e 30

4.2. Z-transform of S2 service time In the same way, we define T S 2 Z, the Z-transform of station S2 service time. e have: H2 i,k,d2 j, D2 Z: The Z-transform of the time already elapsed from the instant S2 selects a basic backoff in [0, ] i.e. being in one of the states i, i, D2, D2 to the time it is found in the state i, k, D2 j, D2, and: H2 i,i,d2,d2 Z =, i = 0 and i = 3 Ts H2 i,i,d2,d2 Z = + τ2z Te H i+,i,0,d2 Z, i =.. 2 32 To compute H2 i,i,d2 j,d2 Z, we define T j dec Z, such as: So: Tdec 0 Z= 33 T j dec Z= τ Z, j =..D2 τ Z Ts Te T j dec Z 34 T S 2 Z = τ 2Z Tc m+ T e H2 0,0,0,D2 Z + τ 2 Z Ts Te H2 0,0,0,D2 Z 40 m τ 2Z Tc i T e H2 0,0,0,D2 Z i=0 4.3. Average service time From equations 30 and 40, we can derive the average service time of both stations S and S2. The average service time of station Si will be denoted by X i and is given by: X i = T S i 4 here T S i Z, is the derivate of the service time Z- transform of station Si [6]. For Numerical results, S and S2 transmit 52 bytes data packets using 802..b MAC and PHY layers parameters with a data rate equal to Mbps. For simulation scenarios, the transmission range of each node covers 250m and the distance between S and S2 is 5m. Figure 3 represent the average service time of both stations S and S2 as a function of the contention window size for different values of D2 = D2 D D2 is given in slots. H2 i,i,d2 j,d2 Z = H2 i,i,d2 j+,d2 Z T j dec Z, i = 0.., j =..D2 H2 i,i,0,d2 Z = τ 2ZH2 i,i,0,d2 Z i = 2.., τ 2 Z Ts Te T D2 dec Z 35 36 37 e also have : H2 i,i,0,d2 Z = τ 2 Z H2 i+,i,0,d2 Z +H2 i,i,0,d2 Z, i = 2.. 2 and: H2, 2,0,D2 Z = τ 2 ZH2,,0,D2 Z 38 According to figure 2 and using 3, we have: H2 0,0,0,D2 Z = τ 2ZH2,,0,D2 Z +H2 0,0,0,D2 Z τ 2 Z Ts Te T D2 dec Z 39 Therefore, we can derive an expression of S2 Z- transform service time as follows: Figure 3. Average Service Time vs Contention indow Size Figure 3 also compares the average service time of S and S2 to the one obtained with 802.. It shows that all the curves of the average service time of S are below the of one of 802. and the curves of the average service time of S2 are above the one of 802.. In figure 4, we represent

X and X 2 as a function of D2, = 28. e notice that the average service time of station S flow decreases as D2 increases. The opposite scenario happens for S2 flow. e can therefore conclude that compared to 802., the DM policy offers better delay guarantees for the flow with the small deadline. [3] IEEE 802. G, Draft Supplement to Part : ireless Medium Access Control MAC and physical layer PHY specifications: Medium Access Control MAC Enhancements for Quality of Service QoS, IEEE 802.e/D3.0, Jan. 2005. [4] Engelstad, P.E. and Osterbo O.N., Queueing Delay Analysis of 802.e EDCA, Proceedings of The Third Annual Conference on ireless On demand Network Systems and Services ONS 2006, France, Jan. 2006. [5] Kanodia, V., Li, C., Distribted Priority Scheduling and Medium Access in Ad-hoc Networks, ACM ireless Networks, Volume 8, Nov. 2002. [6] Kleinrock, L., Queuing Systems,Vol., John iley, 975. [7] Leung, J. Y. T., hitehead, J, On the Complexity of Fixed-Priority Scheduling of Periodic, Real-Time Tasks, Performance Evaluation Netherlands, pp. 237-250, Dec. 982. Figure 4. Average Service Time vs D2 5. Conclusion In this paper we proposed to support the DM policy over 802. protocol. Therefore, we used a distributed scheduling algorithm and introduced a new medium access policy. Then we proposed a mathematical model to evaluate the performance of the DM policy for a scenario where two stations with different delay bounds contend for the channel. Analytical and simulation results show that the station with the shortest deadline has the shortest medium access delay. e can hence conclude that DM performs service differentiation over 802. and offers better guaranties in terms of average service time for the flow having the small deadline. In future works, we intend to generalize the deadline monotonic analytical model to n contending stations transmitting real time flows with different deadline constraints. [8] McCanne, S., Floyd, S., The network simulator - ns-2, http://www.isi.edu/nsnam/ns/. [9] Xiao, Y., Performance analysis of IEEE 802.e EDCF under saturation conditions, Proceedings of ICC, Paris, France, June 2004. [0] Zhai, H., Kwon, Y., Fang, Y., Performance Analysis of IEEE 802. MAC protocol in wireless LANs, ireless Computer and Mobile Computing, 2004. References [] Bianchi, G., Performance Analysis of the IEEE 802. Distributed Coordination Function, IEEE J- SAC Vol. 8 N. 3, Mar. 2000, pp. 535-547. [2] IEEE 802. G, Part : ireless LAN Medium Access Control MAC and Physical Layer PHY specification, IEEE 999.