Exact Distribution of Access Delay in IEEE DCF MAC

Similar documents
Performance Analysis of the IEEE e Block ACK Scheme in a Noisy Channel

Giuseppe Bianchi, Ilenia Tinnirello

Giuseppe Bianchi, Ilenia Tinnirello

Detecting Stations Cheating on Backoff Rules in Networks Using Sequential Analysis

Mathematical Analysis of IEEE Energy Efficiency

Performance Evaluation of Deadline Monotonic Policy over protocol

Wireless Internet Exercises

Modeling and Simulation NETW 707

Modeling Approximations for an IEEE WLAN under Poisson MAC-Level Arrivals

requests/sec. The total channel load is requests/sec. Using slot as the time unit, the total channel load is 50 ( ) = 1

WiFi MAC Models David Malone

Performance analysis of IEEE WLANs with saturated and unsaturated sources

Integrity-Oriented Content Transmission in Highway Vehicular Ad Hoc Networks

A Comprehensive Study of the IEEE e Enhanced Distributed Control Access (EDCA) Function. Chunyu Hu and Jennifer C. Hou.

TCP over Cognitive Radio Channels

ANALYSIS OF THE RTS/CTS MULTIPLE ACCESS SCHEME WITH CAPTURE EFFECT

Service differentiation without prioritization in IEEE WLANs

EE 550: Notes on Markov chains, Travel Times, and Opportunistic Routing

Analysis of random-access MAC schemes

Performance analysis of IEEE WLANs with saturated and unsaturated sources

Information in Aloha Networks

Modeling the Effect of Transmission Errors on TCP Controlled Transfers over Infrastructure Wireless LANs

Optimal Association of Stations and APs in an IEEE WLAN

P e = 0.1. P e = 0.01

Overload Analysis of the PH/PH/1/K Queue and the Queue of M/G/1/K Type with Very Large K

Timestepped Stochastic Simulation. of WLANs

Multiaccess Communication

Message Delivery Probability of Two-Hop Relay with Erasure Coding in MANETs

Cross-layer Theoretical Analysis of NC-aided. Cooperative ARQ Protocols in Correlated Shadowed Environments (Extended Version)

On the Validity of IEEE MAC Modeling Hypotheses

Generalized Two-Hop Relay for Flexible Delay Control in MANETs

TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS

AN ENHANCED ENERGY SAVING STRATEGY FOR AN ACTIVE DRX IN LTE WIRELESS NETWORKS. Received December 2012; revised April 2013

On queueing in coded networks queue size follows degrees of freedom

Markov Chain Model for ALOHA protocol

Power Controlled FCFS Splitting Algorithm for Wireless Networks

On the MAC for Power-Line Communications: Modeling Assumptions and Performance Tradeoffs

On Selfish Behavior in CSMA/CA Networks

Random Access Protocols ALOHA

CSE 123: Computer Networks

Throughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting

Lan Performance LAB Ethernet : CSMA/CD TOKEN RING: TOKEN

Capacity and Delay Tradeoffs for Ad-Hoc Mobile Networks

Waiting-Time Distribution of a Discrete-time Multiserver Queue with Correlated. Arrivals and Deterministic Service Times: D-MAP/D/k System

Maximizing throughput in zero-buffer tandem lines with dedicated and flexible servers

1. WiMAX Wi-Fi Wi-Fi (AP) Wi-Fi 1 1 AP AP WLAN [1] [1] [1] WLAN [4] WLAN WLAN WLAN 1 WLAN WLAN WLAN N =3 [1] W

Lecture on Sensor Networks

PERFORMANCE ANALYSIS OF WIRELESS LANS: AN INTEGRATED PACKET/FLOW LEVEL APPROACH

On the Throughput, Capacity and Stability Regions of Random Multiple Access over Standard Multi-Packet Reception Channels

Optimal Physical Carrier Sense for Maximizing Network Capacity in Multi-hop Wireless Networks

A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation

Modeling the Residual Energy and Lifetime of Energy Harvesting Sensor Nodes

Power Laws in ALOHA Systems

Approximate Queueing Model for Multi-rate Multi-user MIMO systems.

Cooperative HARQ with Poisson Interference and Opportunistic Routing

Performance Analysis and Evaluation of Digital Connection Oriented Internet Service Systems

Optimal Link Adaptation in Wideband CDMA Systems

LECTURE 3. Last time:

Collision-aware Design of Rate Adaptation for Multi-rate WLANs

Delay and throughput analysis of tree algorithms for random access over noisy collision channels

Chapter 5. Elementary Performance Analysis

16:330:543 Communication Networks I Midterm Exam November 7, 2005

Tuning the TCP Timeout Mechanism in Wireless Networks to Maximize Throughput via Stochastic Stopping Time Methods

Jitter Analysis of an MMPP 2 Tagged Stream in the presence of an MMPP 2 Background Stream

Efficient Nonlinear Optimizations of Queuing Systems

Data Gathering and Personalized Broadcasting in Radio Grids with Interferences

Performance Evaluation of Queuing Systems

Channel Selection in Cognitive Radio Networks with Opportunistic RF Energy Harvesting

Discrete Random Variables

A FAST MATRIX-ANALYTIC APPROXIMATION FOR THE TWO CLASS GI/G/1 NON-PREEMPTIVE PRIORITY QUEUE

An engineering approximation for the mean waiting time in the M/H 2 b /s queue

A DIFFUSION MODEL FOR UWB INDOOR PROPAGATION. Majid A. Nemati and Robert A. Scholtz. University of Southern California Los Angeles, CA

MARKOV PROCESSES. Valerio Di Valerio

Performance Analysis of ARQ Protocols using a Theorem Prover

Effective Capacity-based Stochastic Delay Guarantees for Systems with Time-Varying Servers, with an Application to IEEE 802.

Residual White Space Distribution Based Opportunistic Channel Access Scheme for Cognitive Radio Systems. Technical Report: TR-CSE June 2010

Residual White Space Distribution Based Opportunistic Channel Access Scheme for Cognitive Radio Systems. Technical Report: TR-CSE March 2010

A Starvation-free Algorithm For Achieving 100% Throughput in an Input- Queued Switch

Adaptive Reverse Link Rate Control Scheme for cdma2000 1xEV-DO Systems

Lecture 7: Simulation of Markov Processes. Pasi Lassila Department of Communications and Networking

ATM VP-Based Ring Network Exclusive Video or Data Traffics

A Simple Model for the Window Size Evolution of TCP Coupled with MAC and PHY Layers

Queueing Theory and Simulation. Introduction

A Game-Theoretic Model for Medium Access Control

communication networks

Entropy in Communication and Chemical Systems

Feedback Capacity of a Class of Symmetric Finite-State Markov Channels

cs/ee/ids 143 Communication Networks

Design and Analysis of a Propagation Delay Tolerant ALOHA Protocol for Underwater Networks

Part I Stochastic variables and Markov chains

A Markov chain approach to quality control

Mean Field Markov Models of Wireless Local Area Networks

DIFS DIFS DIFS DIFS DIFS DIFS. defer

Morning Session Capacity-based Power Control. Department of Electrical and Computer Engineering University of Maryland

A New Technique for Link Utilization Estimation

Appendix A Prototypes Models

Analysis and Performance Evaluation of Dynamic Frame Slotted-ALOHA in Wireless Machine-to-Machine Networks with Energy Harvesting

THE Slotted Aloha (S-Aloha) protocol, since its appearance

Traversing Virtual Network Functions from the Edge to the Core: An End-to-End Performance Analysis

On the Optimality of Myopic Sensing. in Multi-channel Opportunistic Access: the Case of Sensing Multiple Channels

Transcription:

Exact Distribution of Access Delay in IEEE 8.11 DCF MAC Teerawat Issariyakul, Dusit Niyato, Ekram Hossain, and Attahiru Sule Alfa University of Manitoba and TRLabs Winnipeg, MB, Canada. Email: teerawat, tao, ekram, alfa}@ee.umanitoba.ca. Abstract This paper presents an analytical framework to calculate the probability mass function (pmf) of channel access delay in IEEE 8.11 Distributed Coordination Function (DCF) Medium Access Control (MAC) mechanism. The access delay is defined as the time between a station chooses a new backoff value and the time it is able to access the channel for data packet transmission. Using a Markov process, the access delay is modeled as having phase-type distribution. Since the back-off is frozen when the channel is sensed busy, the access delay distribution is observed to be composed of noncontinuous clusters. The envelope of the pmf as well as the envelope of each cluster resemble hyper-exponential distribution. While the proposed model is flexible enough to accommodate any distribution of MAC data frame length, the numerical results presented in this paper are for the fixed-length data frames. The model would be useful in many aspects such as queueing analysis and/or designing energy-efficient MAC protocols compatible with the IEEE 8.11 DCF standard. Index Terms IEEE 8.11 DCF, channel access delay, discrete time Markov chain, phase-type distribution. I. INTRODUCTION During the past few years, wireless local area networks (WLANs) have become very popular in a broad range of applications. Today, WLANs are deployed in many places like universities, corporate offices, airports, or even residential houses. Most of these WLANs are based on the IEEE 8.11 standard [1], first launched in 1997. Since then, the standard has been thoroughly investigated in two major aspects. The first aspect aims at improving the performance of IEEE 8.11, while the second is to analyze the performance of IEEE 8.11. In this paper, we limit our study to analyzing the medium access control (MAC) performance of the IEEE 8.11. IEEE 8.11 specifies Point Coordination Function (PCF) and Distributed Coordination Function (DCF) as its MAC protocols. Due to its distributed nature, DCF is more challenging to analyze and optimize. One of the earliest analytical works on modeling and analysis of DCF was presented in [] assuming continuously backlogged data flows (i.e., under saturation condition) and errorfree wireless channel. Performance of DCF MAC under saturation condition in presence of random errors due to wireless channel was analyzed in [3] and [4] considering limited persistence automatic repeat request (ARQ)-based error recovery protocol. However, all these works derived only long-term average throughput and delay assuming that the back-off value is not frozen This work was supported in part by the Telecommunications Research Labs (TRLabs), Winnipeg, Canada, in part by the Natural Sciences and Engineering Research Council (NSERC) of Canada, and in part by University of Manitoba Graduate Fellowship (UMGF). when the channel is busy, which may not be the case for 8.11 DCF. By overcoming this limitation, the performance of DCF MAC under non-saturation condition was analyzed in [5] and [6] based on a M/G/1/K and a G/G/1 queueing model, respectively. Utilizing Z-transform, [5] and [6] developed a methodology to calculate the probability generating function (PGF) of average MAC-layer access delay 1 for uniformly distributed data frame length. However, to obtain the probability mass function (pmf) from the PGF, it requires to perform inversion of Z-transforms which might be computationally very expensive. This paper resorts to a matrix-based approach, which avoids the use of complicated transformations and directly calculates the exact pmf of MAC-layer channel access delay. Unlike [5] and [6], we propose an efficient approach to iteratively determine the pmf of the access delay time. While [5] and [6] obtained the expected access delay by differentiating the calculated PGF, we derive a closed-form solution (which is computationally much more efficient) for this metric. Also, rather than assuming a uniform distribution for packet lengths, we generalize our model to support any packet length distribution. Moreover, the pmf for access delay can be obtained for any given back-off window size, which is significant in that this information can be used for buffer management/packet dropping at a mobile station. Classified as phase-type (P H) distribution, the derived results can later be extended for queueing analysis of IEEE 8.11 DCF, for example, by using G/PH/1 or BMAP/PH/1 models. The organization of the rest of the paper is as follows. Section II provides the preliminaries on the IEEE 8.11 DCF and the P H-distribution. In Section III, we present a Markov model for analyzing channel access delay for the 8.11 DCF MAC in which the access delay is modeled to have a PH distribution. Section IV discusses the numerical and the simulation results, and some useful implications of the obtained results. Finally, conclusions are stated in Section V. A. IEEE 8.11 DCF MAC II. BACKGROUND IEEE 8.11 DCF consists of two main mechanisms: contention window adjustment and back-off mechanisms [1]. Once a station (STA) is turned on, it sets the contention window to the minimum value (CW min ). The contention window is doubled for every transmission failure until it reaches the maximum 1 Average MAC-layer access delay is the access delay averaged over all possible back-off values and contention windows.

value (CW max ). If the transmission is successful, the contention window will be reset to CW min. The back-off mechanism in IEEE 8.11 DCF MAC is illustrated in Fig. 1. After window adjustment, an STA waits for Distributed InterFrame Space (DIFS) period of time and calculates a back-off value which is a random variable uniformly distributed between and CW (CW is the value of the current contention window). After this point, the back-off value is decreased by one for every idle time slot. When the channel becomes busy, the back-off is frozen until the channel is idle for DIFS period of time. At the end of DIFS, the back-off value is still the same as what it was before the channel had been busy [5],[7]. After that, the STA starts decreasing the back-off value by one for each subsequent time slot. When the back-off value reaches zero, the STA can transmit data in the next time slot. Fig. 1. Back-off =6 5 4 3 DIFS = L = MAC-Layer Delay Channel Busy (L) DIFS 3 1 8 7 6 5 4 3 1 1 Back-off mechanism in IEEE 8.11 DCF. Data Transmission As an option, the IEEE 8.11 DCF MAC can use a handshake mechanism to reduce the impact of hidden nodes. As in Fig., an STA intending to transmit data must first transmit a Ready To Send (RTS) packet. Upon receiving an RTS packet, the receiving node transmits a Clear To Send (CTS) packet back to the sender. Then, the sender can start sending a DATA packet. Finally, the receiver informs the sender of successful reception by sending back an ACKnowledgment (ACK) packet. Except for the RTS, each STA has to sense the channel idle for Short InterFrame Space () period of time before sending any packet. Since is shorter than DIFS, only the RTS packet will be vulnerable to collision if all STAs are in the same area. Fig.. DIFS Transmitter Receiver RTS Other nodes CTS DATA NAV(DATA) NAV(CTS) NAV(RTS) Handshake mechanism in IEEE 8.11 DCF. ACK B. Absorbing Markov Chain and P H Distribution An absorbing Markov chain is a Markov process which finally stops at an absorbing state [8]. Consider a discrete time Markov chain (DTMC) with the first state and all the subsequent states being absorbing and transient states, respectively. A general form The channel is considered to be idle when there is no on-going transmission. of the corresponding transition probability matrix (TPM) P 3 can be written as in (1) below ( ) 1 P = (1) ω Ω where the matrices ω and Ω are called absorbing and transient TPMs, respectively. Throughout this paper, we denote all-zero, all-one, and identity matrices by, e, and I, respectively. The pmf that the DTMC is absorbed at step d (f D (d)) and the expected time to absorption (E[D]) can be calculated from ()-(3) [9] α, d = f D (d) = αω d 1 () ω, d 1 E[D] = α(i Ω) 1 e (3) where α and α represent the probability that the DTMC starts at the absorbing and the transient states, respectively. III. MODELING AND ANALYSIS OF CHANNEL ACCESS DELAY UNDER IEEE 8.11 DCF MAC A. System Model and Assumptions Consider an 8.11 WLAN with N mobile stations (STAs). The STAs are assumed to be in the range of each other and each STA implements the IEEE 8.11 DCF with the same parameter settings. We assume that unsuccessful data transmission is caused only by data collision (i.e., when more than one STA transmits simultaneously). In presence of the handshake mechanism, collisions are associated only with the RTS packets when the back-off values of more than one backlogged STAs expire in the same time slot. If an RTS is successfully transmitted, other STAs will refrain from transmission and no collision will occur. We model the system with variable-size data frames, and also simplify the results for a special case with fixed size data frames. B. Mathematical Model We define MAC-layer access delay as the time interval from the point where the contention window is adjusted to the point where the back-off value becomes zero (Fig. 1). The access delay is therefore conditioned on the current contention window. We also define unconditional MAC-layer access delay as an interval from the point where the contention window is set to CW min to the point where the transmission is successful. In the following, we model the access delay in terms of transmission probability (p tx ) which is defined as the probability that an STA will have zero back-off value and have data to transmit. Under saturation condition, p tx can be calculated by using the method in []. Under non-saturation condition, p tx can be approximated by the model in [5]. We divide the analysis into two parts. The first part derives the pmf of channel access delay conditioned on a particular value of back-off timer. The second part utilizes the results from the first part and calculates the unconditional pmf of the channel access delay. 3 Throughout this paper, we use regular and boldface letters to represent scalar values and matrices, respectively.

1) Channel Access Delay Conditioned on a Back-off Value: Consider a two-dimensional absorbing DTMC (B n, T n ) defined at time slot n. The first variable, B, 1,, B} is the backoff value. The second variable, T n 1,, L} is the length of a busy period due either to data transmission or collision. The DTMC starts (initial state) from the point where B = B and finishes when B = (in an absorbing state). Based on this formulation, the corresponding TPM, P can be formulated as in (1), where (ω Ω) = [Q] i,j = [R] i,j = Re Q R Q........... R Q R Q p c, i = 1, j = L c p dj, i = 1, j = L dmin,, L dmax } 1, i =,, L}, j = i 1 1 pc p d, i = 1, j = 1 p dj = p d f Ldata (j L HDR ), p d = j (4) (5) (6) p dj. (7) In the above equations, [A] c,d represents the entry in row c column d of matrix A, L d = L DAT A + L HDR, L HDR = L RT S + L CT S + L ACK + 3L SIF S + L DIF S, and L c = L RT S + L EIF S. Here, L RT S, L CT S, L DAT A, L ACK, L DIF S, L SIF S, and L EIF S (Extended InterFrame Space) are the lengths of the corresponding packets and f Ldata (l), l L dmin L HDR,, L dmax L HDR } is the probability that the length of DAT A is l. Matrices R and Q with size L = maxl c, L dmax } represent the probability that the back-off counter will and will not decrease in the next step (or time slot). Embedded in R (the back-off decreases by one) is the probability (1 p c p d ) that the channel will be idle. With probabilities p c and p dl, the process moves to column L c and l of Q (the back-off remains the same), where p d = (N 1) p tx (1 p tx ) N (8) p c = 1 (1 p tx ) N 1 p d. (9) After Q and R matrices are formulated, we use () and (3) to calculate pmf (f D B (d b)) and the expectated channel access delay (E[D B]). Mathematically, f D B (d b) = αω d 1 ω (1) E[D B] = α(i Ω) 1 e (11) where α is an initial probability row vector, whose entry L(B 1) + 1 is one and all other entries are zero. From (1) and (11), the complexity of calculating f D B (d b) and E[D B] can be determined based on the complexity of computing Ω d 1 and the matrix inversion (I Q) 1. Since the size of Ω is fairly large, calculation of (1) and (11) could require substantial amount of memory and computational effort. Hereafter, we simplify the solution for a special case with fixedsize data length, where L max = L d and f L (l) is 1 for l = L d L HDR and is zero otherwise. The solutions for f D B (d b) and E[D B] in this case can be calculated with reduced complexity (of O(L ) and O(1), respectively, compared to O(L 3 )). Using the sparse structure of α and ω, we can expand (1) and (11) as follows: f D B (d b) = (1 p d p c ) [Ω d 1 ] L(B 1)+1,1 (1) E[D B] = B L [(I Ω) 1 ] L(B 1)+1,j. (13) Since Ω is a bi-diagonal matrix, [Ω k ] i,j in (1) can be calculated by using the following heuristics: Q [Ω k ] i,j, i = j [Ω k+1 ] i,j = R [Ω k ] i 1,j + Q [Ω k ] i,j, i < j (14), i > j [ Ω 1 ] Q, i = j = R, i = j + 1 (15) i,j. The model complexity can be further reduced by considering the special structures of Q and R. Denoting row i of an arbitrary matrix A by A i, we simplify (14) to pc A (QA) i = Lc + p d A Ld, i = 1 (16) A i+1, i =,, L} (1 pc p (RA) i = d ) A 1, i = 1 (17), i =,, L}. This special structure also leads to the closed-form solution for E[D B] as in (18) E[D B] = B(1 + p c(l c 1) + p d (L d 1)) 1 p c p d = B t B (18) where t B is the time required for the back off value to decrease by one unit. The proof of (18) is given in the Appendix. Note that, t B can be obatined by multiplying the average busy period (1 + p c (L c 1) + p d (L d 1)) with 1/(1 p c p d ), the average number of busy periods. The access delay for back-off B is just the time required for the back-off value to decrease by B units. ) Unconditional Channel Access Delay: Using the total probability theorem, we derive the pmf for the unconditional channel access delay (f D (d)) as follows: f D (d) = M f D W (d w i ) π wi (19) i=1 where f D W (d w) is the pmf of access delay conditioned on contention window w, π wi = [π w ] 1,i is the probability that the contention window is w i, and M is the number of back-off windows. We calculate π w by using a DTMC W n representing the contention window of an STA at the moment that it is adjusted. Based on the window adjustment mechanism discussed in section II-A, we formulate the TPM (W) with size M for this DTMC as in (). By using the limiting property of the DTMC, namely, π w = π w W, we obtain π w in (1). Then, we calculate f D W (d w) from (), by using Bayes s theorem.

1 p c p d, i = 1,, M}, j = 1 p W = c + p d, i = j 1, j =,, M} or i = M, j = M. (1 p c p d ) (p c + p d ) i 1, π wi = i = 1,, M 1} (p c + p d ) i 1, i = M. f D W (d w) = b= = 1 w P rb = b W = w} f D B (d b) b= () (1) f D B (d b). () In (), P rb = b W = w} = 1/w is the probability that an STA selects its back-off value b when the current contention window is w, and f D B (d b) is calculated by using (1). Finally, we calculate the pmf for the unconditional access delay by using (1) and () in (19). Similarly, we calculate the expected MAC-layer access delay conditioned on contention window w (E[D w]) and unconditional expected MAC-layer access delay (E[D]) as follows: E[D w] = E[D] = b= M i=1 1 w b t B = w 1 t B (3) w i 1 t B π wi = W 1 t B. (4) Similar to E[D B], E[D w] is the product of average backoff decreasing time and the average back-off value. In the unconditional case, E[D] is obtained by replacing w with the average contention window W (= M i=1 w i π wi ). IV. NUMERICAL AND SIMULATION RESULTS A. Parameter Settings and Model Validation Unless otherwise specified, we assume the parameter setting as in Table I [1]. Each STA operates under saturation condition and we calculate the value of p tx using the method in []. The results for the non-saturation case can be obtained by calculating p tx following [5]. We derive the pmf (f D (d)) of the MAC-layer access delay for a tagged STA in presence of other N 1 STAs. Based on fixed DATA frame length specified in Table I, L c = 7 time slots and L d = 4 time slots. To validate our model, we run simulations with the same settings as those used for obtaining the numerical results from the model. All the simulation results are observed to be fairly close to those obtained from (19). However, we only show simulation results in Fig. 3 for the sake of better legibility of the figures. B. Numerical Results Fig. 3 reveals that the channel access time distribution is noncontinuous and consists of several clusters. Due to fixed length L d, data transmission by one of the other STAs increases the access delay by L d. The n th (n > ) cluster in the pmf is contributed mostly by n data transmissions (by other STAs) TABLE I DEFAULT PARAMETER SETTING FOR IEEE 8.11 DCF Parameter Value Channel Rate Mbps Slot Time µs L SIF S 1 µs L DIF S 5 µs Physical Header 19 bits MAC Header 7 bits L RT S 16 bits L CT S 11 bits L DAT A 8 bits L ACK 11 bits Range of Contention Window [3, 14] Number of STAs 5 before the tagged STA acquires a channel access. Therefore, these clusters are located at approximately L d time slots apart and each cluster peak decreases at the rate of p d. Probability mass function..15.1.5 5 15 5 35 Model Simulation Fig. 3. Probability mass function of channel access delay (for the parameters as shown in Table I). Within cluster n, the first non-zero probability is due to the tagged STA selecting back-off value of 1 and the channel becomes idle in the slot after n consecutive data transmissions. Higher probability of channel access delay in cluster n results from increasing idle back-off slots. Each idle slot occurs with probability 1 p c p d. Therefore, the probability of increasing access delay decreases geometrically with rate 1 p c p d. However, there are ( ) n+i n combinations which correspond to n data transmissions and i idle slots, resulting in the same access delay nl d +i. With respect to the number of idle slots, the probability of higher access delay increases due to the combination coefficient and decreases due to the geometric decreasing rate. Not until reaching the L th c entry in cluster n, will the pmf be contributed by another possibility: n data transmissions and one collision. Again, the pmf after this point increases due to the combination coefficient, and decreases because of 1 p c p d. This phenomenon repeats every L c time slots but the intensity is scaled down due to more number of collisions. Since L c is comparatively small, the tail of a sub-cluster contributed by data collision spreads out to neighboring sub-clusters, and the tails within each cluster do not fluctuate considerably. Fig. 4 plots the pmf with similar settings but the number of STAs is now changed to 15. In this case, p d increases from 16.5% to 8.7%, and p c increases from 1.9% to 6.75%. Since 1 p c p d is smaller, each peak decays more quickly. Now, each spike does not spread to adjacent spike as much as

Probability mass function Probability mass function it does in Fig. 3. We can observe more clearly that each subcluster contributed by data collision decreases exponentially and occurs at L c time slots apart. Also, since the height of the first spike in each cluster decreases geometrically, the cluster peak shifts to the right as the cluster number (n) increases. Now, we can observe that the envelope of each cluster resembles hyperexponential distribution, whose mean shifts to the right as n increases. Similarly, each spike in a particular cluster can also be modeled by the same distribution with right-shifted mean for increasing access delay. 6 x 1 3 4 5 15 5 35 Fig. 4. Probability mass function of channel access delay for 15 STAs. Although each spike dies out more quickly, since p c is larger in this case, there are more number of discernible spikes in each cluster (as compared to those in Fig. 3). This is especially true for large n, where there are lesser number of idle slots. Compared to Fig. 3, there are more number of non-negligible clusters, each of which occupies more space in time..1.8.6.4. 5 1 15 Fig. 5. Probability mass function of access delay when data length is 4 bits. Next, we set DATA length to 4 bits (correspondingly L d = 5 slots) and plot the pmf in Fig. 5. In this case, the clusters are more closely located. The sub-clusters within a cluster spill over other sub-clusters, both in the same and different clusters. Due to this overlapping, each cluster looks smoother than each of those in Fig. 3. However, since p c and p d are the same as those in Fig. 3, there are approximately 1 significant clusters in Fig. 5 (as in Fig. 3). V. CONCLUSIONS We have modeled the channel access delay for IEEE 8.11 DCF MAC as having phase-type distribution. We have used the special structures of the transition probability matrices to reduce the computational complexity and the memory requirements to an acceptable level. We have observed that the access delay distribution in the system with fixed data length is non-continuous. The envelope of the distribution resembles a hyper-exponential distribution. Therefore, it could be reconstructed by using only few parameters such as the probability of a slot being idle, data length and collision length. The pmf could be very useful in the design of more efficient MAC protocols as well as for queueing analysis in an IEEE 8.11 network. APPENDIX LEMMA 1: For Ω defined in (4), T, i = j [(I Ω) 1 ] i,j = TRT, i > j where T = (I Q) 1 and R is defined in (6). (5) Proof: We prove (5) by induction. Suppose that T = (I Ω) 1 and that (5) is true when the size of Ω is M. From the relation (I Ω)T = I, (I Q)[T] M+1,j RTRT =, j = 1,, M 1} (I Q)[T] M+1,M RT = (I Q)[T] M+1,M+1 = I. (6) Now let t i be the i th row of T. From (I Q)T = I, t 1 p c t Lc p d t Ld = e T 1 and t i t i 1 = e T i, i =,, L}, where et i is a row vector whose entry i is one and all other entries are zero. Accordingly, t 1 = 1, i = 1 p c+p d, i =,, L c } p d, i = L c + 1,, L d } (7) and the i th row of RT is (1 p c p d )t 1 for i = 1 and is otherwise. Since [RT] 1,1 = 1 and [RT] i,j =, j > 1, (RT) i = RT, i I + and the first row of TRT is t 1. By applying this relation to (6), Lemma 1 is proven. By applying Lemma 1 to (13), L E[D B] = [(B 1) TRT + T] 1,j = B L = B(1 + p c(l c 1) + p d (L d 1)) 1 p c p d (8) which proves (18). REFERENCES [1] IEEE 8.11 - Wireless LAN medium access control (MAC) and physical layer (PHY) specifications, IEEE inc. Std., 1999. [] G. Bianchi, Performance analysis of the IEEE 8.11 distributed coordination function, IEEE Journal on Selected Areas in Commun., vol. 18, no. 3, pp. 535 547, Mar.. [3] Z. Hadzi-Velkov and B. Spasenovski, Saturation throughput - delay analysis of IEEE 8.11 DCF in fading channel, in Proc. of IEEE ICC 4, June 4. [4] P. Chatzimisios, A. C. Boucouvalas, and V. Vitsas, Performance analysis of IEEE 8.11 DCF in presence of transmission errors, in Proc. of IEEE ICC 4, June 4. [5] H. Zhai, Y. Kwon, and Y. Fang, Performance analysis of IEEE 8.11 MAC protocols in wireless LANs, Wireless Commun. and Mobile Computing, vol. 4, no. 8, pp. 917 931, Dec. 4. [6] O. Tickoo and B. Sikdar, Queueing analysis and delay mitigation in IEEE 8.11 random access mac based wireless networks, in Proc. of IEEE INFOCOM 4, Mar. 4. [7] C. H. Foh and J. W. Tantra, Comments on IEEE 8.11 saturation throughput analysis with freezing backoff counters, IEEE Communications Letters, vol. 9, no., pp. 13 13, Jan. 5. [8] K. S. Trivedi, Probability and Statistics with Reliability, Queuing and Computer Science Applications. New York: Wiley & Sons, Inc.,. [9] M. F. Neuts, Matrix-Geometric Solutions in Stochastic Models. The John Hopkins University Press, 1981. t 1