Giuseppe Bianchi, Ilenia Tinnirello

Similar documents
Giuseppe Bianchi, Ilenia Tinnirello

Mathematical Analysis of IEEE Energy Efficiency

Performance Analysis of the IEEE e Block ACK Scheme in a Noisy Channel

WiFi MAC Models David Malone

Wireless Internet Exercises

Performance analysis of IEEE WLANs with saturated and unsaturated sources

Modeling Approximations for an IEEE WLAN under Poisson MAC-Level Arrivals

Performance Evaluation of Deadline Monotonic Policy over protocol

A Comprehensive Study of the IEEE e Enhanced Distributed Control Access (EDCA) Function. Chunyu Hu and Jennifer C. Hou.

Modeling the Effect of Transmission Errors on TCP Controlled Transfers over Infrastructure Wireless LANs

Service differentiation without prioritization in IEEE WLANs

Performance analysis of IEEE WLANs with saturated and unsaturated sources

requests/sec. The total channel load is requests/sec. Using slot as the time unit, the total channel load is 50 ( ) = 1

Exact Distribution of Access Delay in IEEE DCF MAC

Detecting Stations Cheating on Backoff Rules in Networks Using Sequential Analysis

On the Validity of IEEE MAC Modeling Hypotheses

Modeling and Simulation NETW 707

Chapter 5. Elementary Performance Analysis

Optimization of IEEE Multirate Wireless LAN

On the MAC for Power-Line Communications: Modeling Assumptions and Performance Tradeoffs

Mean Field Markov Models of Wireless Local Area Networks

Effective Capacity-based Stochastic Delay Guarantees for Systems with Time-Varying Servers, with an Application to IEEE 802.

ANALYSIS OF THE RTS/CTS MULTIPLE ACCESS SCHEME WITH CAPTURE EFFECT

P e = 0.1. P e = 0.01

On the Energy Efficiency of IEEE WLANs

Optimal Physical Carrier Sense for Maximizing Network Capacity in Multi-hop Wireless Networks

Random Access Protocols ALOHA

1. WiMAX Wi-Fi Wi-Fi (AP) Wi-Fi 1 1 AP AP WLAN [1] [1] [1] WLAN [4] WLAN WLAN WLAN 1 WLAN WLAN WLAN N =3 [1] W

PERFORMANCE ANALYSIS OF WIRELESS LANS: AN INTEGRATED PACKET/FLOW LEVEL APPROACH

Information in Aloha Networks

ATM VP-Based Ring Network Exclusive Video or Data Traffics

Capacity and Delay Tradeoffs for Ad-Hoc Mobile Networks

Dynamic Power Allocation and Routing for Time Varying Wireless Networks

Integrity-Oriented Content Transmission in Highway Vehicular Ad Hoc Networks

Queueing Theory I Summary! Little s Law! Queueing System Notation! Stationary Analysis of Elementary Queueing Systems " M/M/1 " M/M/m " M/M/1/K "

TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS

Multicast With Prioritized Delivery: How Fresh is Your Data?

TCP over Cognitive Radio Channels

Wireless MAC Protocol Classification /Performance Wireless MAC 프로토콜성능분석

Maximum Sum Rate of Slotted Aloha with Capture

STABILITY OF FINITE-USER SLOTTED ALOHA UNDER PARTIAL INTERFERENCE IN WIRELESS MESH NETWORKS

Random Access Game. Medium Access Control Design for Wireless Networks 1. Sandip Chakraborty. Department of Computer Science and Engineering,

16:330:543 Communication Networks I Midterm Exam November 7, 2005

Timestepped Stochastic Simulation. of WLANs

A Simple Model for the Window Size Evolution of TCP Coupled with MAC and PHY Layers

IEEE abc-01/22r1

Introduction to queuing theory

Collision-aware Design of Rate Adaptation for Multi-rate WLANs

A New Technique for Link Utilization Estimation

A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation

Computer Networks More general queuing systems

Max-min Fairness in Mesh Networks

Channel Probing in Communication Systems: Myopic Policies Are Not Always Optimal

On the stability of flow-aware CSMA

Bit Error Period Determination and Optimal Frame Length Prediction for a Noisy Communication Channel

Energy Optimal Control for Time Varying Wireless Networks. Michael J. Neely University of Southern California

BIRTH DEATH PROCESSES AND QUEUEING SYSTEMS

Performance Analysis and Evaluation of Digital Connection Oriented Internet Service Systems

Optimal Association of Stations and APs in an IEEE WLAN

Lan Performance LAB Ethernet : CSMA/CD TOKEN RING: TOKEN

Approximate Queueing Model for Multi-rate Multi-user MIMO systems.

Analysis of random-access MAC schemes

On queueing in coded networks queue size follows degrees of freedom

CSE 123: Computer Networks

Performance Analysis of a Threshold-Based Relay Selection Algorithm in Wireless Networks

Cross-layer Theoretical Analysis of NC-aided. Cooperative ARQ Protocols in Correlated Shadowed Environments (Extended Version)

On Selfish Behavior in CSMA/CA Networks

Cooperative HARQ with Poisson Interference and Opportunistic Routing

Throughput and Fairness Analysis of based Vehicle-to-Infrastructure Data Transfers

Analyzing Queuing Systems with Coupled Processors. through Semidefinite Programming

Computer Networks ( Classroom Practice Booklet Solutions)

On the Throughput, Capacity and Stability Regions of Random Multiple Access over Standard Multi-Packet Reception Channels

Markov decision processes with threshold-based piecewise-linear optimal policies

Message Delivery Probability of Two-Hop Relay with Erasure Coding in MANETs

Exploiting the Capture Effect to Enhance RACH Performance in Cellular-Based M2M Communications

arxiv:submit/ [cs.ni] 2 Apr 2011

Optimal Sleeping Mechanism for Multiple Servers with MMPP-Based Bursty Traffic Arrival

On the Throughput-Optimality of CSMA Policies in Multihop Wireless Networks

Lecture on Sensor Networks

Design and Analysis of a Propagation Delay Tolerant ALOHA Protocol for Underwater Networks

Open Loop Optimal Control of Base Station Activation for Green Networks

On the Stability and Optimal Decentralized Throughput of CSMA with Multipacket Reception Capability

Methodology for Computer Science Research Lecture 4: Mathematical Modeling

Power Controlled FCFS Splitting Algorithm for Wireless Networks

HDR - A Hysteresis-Driven Routing Algorithm for Energy Harvesting Tag Networks

The impact of varying channel capacity on the quality of advanced data services in PCS networks

STABILITY OF MULTICLASS QUEUEING NETWORKS UNDER LONGEST-QUEUE AND LONGEST-DOMINATING-QUEUE SCHEDULING

Generalized Two-Hop Relay for Flexible Delay Control in MANETs

Performance Evaluation of Queuing Systems

SCHEDULING is one of the core problems in the design

An Improved Bound for Minimizing the Total Weighted Completion Time of Coflows in Datacenters

Discrete Random Variables

Residual White Space Distribution Based Opportunistic Channel Access Scheme for Cognitive Radio Systems. Technical Report: TR-CSE June 2010

Residual White Space Distribution Based Opportunistic Channel Access Scheme for Cognitive Radio Systems. Technical Report: TR-CSE March 2010

On Selfish Behavior in CSMA/CA Networks

On Scheduling for Minimizing End-to-End Buffer Usage over Multihop Wireless Networks

Models and Techniques for Network Tomography

Design and Analysis of Multichannel Slotted ALOHA for Machine-to-Machine Communication

Performance Analysis of License Assisted Access LTE with Asymmetric Hidden Terminals

Transcription:

Capacity of WLAN Networs

Summary Ł Ł Ł Ł

Arbitrary networ capacity [Gupta & Kumar The Capacity of Wireless Networs ] Ł! Ł "!

Receiver Model Ł Ł # Ł $%&% Ł $% '( * &%* r (1+ r Ł + 1 / n 1 / n log n

Area consumption for each TX Ł Ł,,

Area consumption for each TX Ł Ł,,

Area consumption for each TX r1 > r1 >(1+ r1 Ł Ł,,

Area consumption for each TX > r1 Ł Ł,,

Area consumption for each TX > r2 Ł Ł,,

Area consumption for each TX > (r1+r2/2 Ł Ł,,-

Area consumption for each TX > (r1+r2/2 Ł./

Area consumption for each TX r1/2 r2/2 Ł./

Area consumption for each TX Ł./0, Ł, 1 2

Bound on consumption area Ł 31 Ł 442 Ł 56/-1 2

Area Constraint Ł 7 6,4 n / 2 i1 2 1 ( r i 4 4 A

Channel Constraints Ł 5 5 5 ' 5 / 45 85 ' (5 / (95 65 Ł - : 1 Ł + & '/9 ;& &.: Ł./5& nt b1 h( b h1 1( H h th hop of bit b is on channel m in slot s nt b1 h( b n WT 2 W m n 2

Space Constraints Ł 7 2 2 Ł < r( h, b 16 Ł &,0 5&./../ 65& Ł &4& nt h( b b1 h1 2 2 r ( h, b 16 AWT nt h( b b1 h1 r 2 ( h, b H 16AWT 2 H

Convexity Convexity nt b b h h nt b b h h H WT A H b h r b h r H 1 2 ( 1 2 2 1 ( 1 16, (, ( 1

Space + Channel Constraints + Convexity Ł - $ 4 1 H nt h( b b1 h1 r( h, b 2 nt h( b b1 h1 r 2 ( h, b H 16AWT 2 H nt R nt h( b b1 h1 r( h, b 16AWT 2 H

Capacity upper bound Ł = 5&./ 4 nt R 16AWT 2 H WT 8An 8A W 1 R n Ł & W / n Ł > 2 W / n log n

Conclusions Ł? n / log n n Ł & Ł + 3 "4 @4&A"+ #,5> B

Performance Analysis of single-hop 802.11 DCF

Throughput Ł Represents the system efficiency (different definitions. Ł Overheads: bacoff, monitoring times, collisions, headers, ACK/RTS/CTS. Payload bits transmitted in average per each second Fraction of the channel time used for payload transmissions (normalized throughput

Delay Ł Time required for a pacet to reach the destination after it leaves the source. Ł Three different components: queue delay, service access delay, transmission delay. queue access tx

Saturation Analysis fered load meas. throughput of 0,85 0,80 0,75 0,70 0,65 0,60 0,55 offered load (nominal offered load (measured throughput (measured 0 40 80 120 160 200 240 280 320 360 400 simulation time (seconds Fixed number of stations, varying arrival rate Arrival rate higher than maximum throughput -> transmission queues build up until saturation (always full Saturation throughput : limit reached by the system throughput as the offered load increases

DCF Overheads

Frame Transmission Time Ł Let R be the data rate and R* the control rate. Ł Let P be the MSDU size [byte]. 20*8/R* 14*8/R* + 28*8/R P*8/R 14*8/R* T FRAME = T MPDU + SIFS + T ACK +DIFS T FRAME = T RTS + SIFS + T CTS +SIFS + T MPDU + SIFS + T ACK +DIFS

Overheads @ different rates (P=1500 bytes RTS/CTS Basic RTS/CTS Basic 0 2000 4000 6000 8000 Tra nsmssion Time (use c DIFS Ave Bacoff RTS+SIFS CTS+SIFS Payload+SIFS ACK

Protocol Overhead Ł Suppose to have just a single station, with a never empty queue Ł Each transmission is originated after a bacoff counter expiration Ł Since no collision is possible, and no channel error is considered, each bacoff is extracted in the range [0, CW min ] TX CYCLE A B C D 4 3 6 ENTIRE TX PROCESS Ł Different transmission cycles on the channel, composed of: 1 frame transmission time, which depends on the MSDU size; 2 random delay time, which depends on the bacoff extraction.

Max Throughput Computation TX CYCLE A B C D b B b C b D ENTIRE TX PROCESS Ł From the throughput definition: S P i T FRAME b i i Ł After each transmission, bacoff counters are regenerated. From Renewal Theory: S E[ T E[ P] ] E[ b] FRAME Ł In the case of fixed pacet size, given CW min : S T FRAME P CW min / 2

Max Throughput Max Throughput (normalized (normalized! " # $ % & ' ( * +.-, / 10 2 34.65 / 17 2 34.-, / 0 10 2 34.65 / 0 10 2 34

Saturation Throughput Analysis

802.11 DCF Bianchi s model approach Step 1: Discrete-Time model of bacoff for tagged STA bacground STAs summarize into a unique collision probability value p bacground STA Step 2: find transmission prob. t Result: t versus p non-lin function Step 3: assume bacground STAs behave as tagged STA, i.e. transmit with probability t Result: p versus t non-lin function Step 4: solve non linear 2eqs system Tagged STA Finite number n of STA Step 5: find performance figures Throughput, Delay

Discrete Not Uniform Time scale Bacoff for station A FRAME ACK SIFS DIFS A Slot time = Time interval between two consecutive bacoff time counter decrements: idle bacoff slot busy time + DIFS + 1 bacoff slot

DCF as -persistent CSMA Model Time. Actual Time -In each system slot, each station accesses with probability (and does not access with probability 1-. -Each system slot can assume 3 different sizes: idle slot, successful slot, collision slot. -The ey assumption is that is fixed slot by slot (and then also the collision probability p.

Channel Access Probability Given the time scale, 1 transmission every bacoff + 1 slot 7 6 5 4 3 2 1 0 6 5 4 3 2 1 0 9 8 7 6 5 4 3 2 1 0 8 slots 7 slots 10 slots Note that the access cycle length in discrete time slot is not related to the actual channel time (e.g., the last cycle is the shortest cycle according the channel time, but the longest one according to the model time Whenever W 0 =W 1 =..=W R =W, from renewal theory: =1 / (W/2+1 = 1/ (E[W] + 1 (alternatively, 1/ =E[W]+1 In general, the access time depends on the bacoff stage, i.e. on the number of consecutive collisions.. N.B. Access cycle = transmission cycle for a given station

Formal derivation Formal derivation i s TX P TX i s P TX P i s P i s TX P i s P TX i s P TX P / ( / ( ( ( / ( ( / ( ( R o i R i i s TX P TX i s P TX P i s P i s TX P 0 / ( / ( 1 ( 1 ( / (

Bacoff stage Probablity Suppose to now the collision probability p: We are in stage i if we were in stage i-1 in the previous attempt and we experienced a collision: Pr(s=i/TX=Pr(s=i-1/TX p; After a success or after R collisions, we come bac to stage 0. Then, this probability has a geometric distribution: i (1 p p P( s i TX i(0,1,... R R1 1 p 1-p p p p 0 1 2 R 1-p 1-p 1

Channel Access Probability (2 We can finally express the channel access probability as a function of the collision probability p and of the average bacoff values W i /2: 1 p 1 p 1 W R i i p 1 R 1 i0 2 Note: does not depend on the bacoff value distribution, but only on the average value!!!

How much is p??? The conditional collision probability p, i.e. the probability to experience a collision in a given slot, given that the tagged station is transmitting, is the probability that at least one of the other N-1 stations is accessing the channel. If we assume that all the stations have the same behavior, and then access the channel with probability, it is easily expressed as: p=1 (1- N-1

From &p to Throughput Performance S P E[ T s SUCC Ps E[ P] ] P E[ T c COLL ] P idle Ps E[ P] E[ slot] P N-1 s : Pr success in a contention slot = N (1- =N (1-p P idle = 1- (1- N P c = 1-P S -P idle

Delay Computation Ł Very easy, via Little s Result! Clients: Contending pacets which will be ultimately delivered Server: DCF protocol Delay: system permanence time D = E[N] / acc Ł In static scenarios and saturation: A new client is accepted if the pacet is transmitted before the retry limit expiration Arrival rate : e new pacet arrives to the system : When a pacet is successfully transmitted When a pacet is dropped because of a retry limit expiration Accepted traffic acc =throughput! acc ST1 ST4 ST2 ST3 ST5

Retry Limit = Ł = Throughput [p/s] D N S / N E[ P] N P S E[ slot] ST2 ST4 ST1 ST5 ST3

Ł E[N] = N(1-p lost Retry Limit = R D E[ N] acc N(1 plost S / E[ P] acc ST2 ST4 ST3 R ST1 ST5

Pacet loss probability Pacet loss probability Ł In a generic contention slot, with access probability, the pacet loss probability depends on the number of already suffered collisions: R i lost i s P i s lost P p 0 ( / ( i 0 i R p i s lost P 1 / ( 2 / (1 1 (1 / ( / ( ( ( 1 i R i W p p p i s TX P TX i s P TX P i s P

How to tae into account the 2-way or 4-way access mode? Ł By simply defining opportunely frame transmission times and collision times. Assuming fixed MPDU size: BASIC ACCESS: T FRAME = T MPDU + SIFS + T ACK + DIFS T COLL RTS/CTS: = T MPDU + DIFS T FRAME = T RTS + SIFS + T CTS +SIFS T MPDU + SIFS + T ACK + DIFS T COLL = T RTS + DIFS Note: The channel access probability and the collision probability do not depend on the employed access mode!

EDCA model

CW differentiation < 5 (1 2 p (1 2(1 2 p p R 1 (1 W p (1 R p 1 (1 (2 p R 1,13 p C (1 r 1 1 (1 n r

Per Per-class Throughput class Throughput < & (1 1 1 ( 1, 1 C r r n r n success p n n P r & c C r success C r n r C r s success C r n r success T P T P E P P S r r 1 1 1 1 ( (1 1 ( (1 ] [ (

Throughput Ratio Throughput Ratio ( ( P j P S S success success j +4 2 W 1 2 j j j j j j j n W W n W n W n n n S S (1 (1

Performance Optimizations

Throughput vs CWmin P=1000 bytes

And in actual networs? Ł CW opt =f(load, AIFSN, but.. Load estimation Function f evaluation f depends on the traffic sources, which need to be estimated and modeled! complex f expressions for notsaturated traffic sources no close expression for every traffic conditions..

How to compute CWopt? Ł Our solution: not fixed CWmin, but adaptive corrections on the basis of the channel monitoring status, to force idle slots and collision equalization [Gallagher]? CWmin = CWopt CWmin(t = CWmin(t-1 + CW CW has an opposite effects on the two different events of channel wastes of the access protocol: BACKOFF, COLLISIONS Large CW -> too long bacoff expirations Small CW -> too high collision probability Optimal CW as a tradeoff between these channel wastes different tuning algorithms are possible based on: If (COLLISIONS > BACKOFF -> increase the CWmin If (BACKOFF > COLLISIONS -> decrease the CWmin No estimation of the system status, but simple channel monitoring of BACKOFF and COLLISIONS Intrinsically suitable for dynamic networ conditions

An example Ł Ł Assume that every 10 seconds a new data station joins the networ.. At each beacon: double the contention window at each beacon in which the collisions overcome the bacoff times; half the contention window at each beacon in which the bacoff overcomes the collision times. +1 +1 +1 +1 +1 +1 +1 +1 +1 +1 time

An example Ł Ł Assume that every 10 seconds a new data station joins the networ.. At each beacon: double the contention window at each beacon in which the collisions overcome the bacoff times; half the contention window at each beacon in which the bacoff overcomes the collision times. +1 +1 +1 +1 +1 +1 +1 +1 +1 +1 time

An example Ł Ł Assume that every 10 seconds a new data station joins the networ.. At each beacon: double the contention window at each beacon in which the collisions overcome the bacoff times; half the contention window at each beacon in which the bacoff overcomes the collision times. +1 +1 +1 +1 +1 +1 +1 +1 +1 +1 time

References: Ł G. Bianchi, Performance Analysis of the IEEE 802.11 Distributed Coordination Function, IEEE Journal on Selected Areas in Communications, vol. 18, no. 3, March 2000 Ł G. Bianchi, and I. Tinnirello, Remars on IEEE 802.11 DCF Performance Analysis, to appear in IEEE Communication Letters Ł F. Cali, M. Conti, and E. Gregori, "Dynamic Tuning of the IEEE 802.11 Protocol to Achieve a Theoretical Throughput Limit," IEEE/ACM Trans. Networing (TON, vol. 8, No. 6, Dec. 2000 Ł Giuseppe Bianchi and Sunghyun Choi, "IEEE 802.11 Ad-Hoc Networs," a chapter in Wireless Ad hoc and Sensor Networs, Ed. Kluwer, to be published in 2004.