Presentation By: Daniel Mitchell, Brian Shaw, Steven Shidlovsky Paper By: Martin Heusse, Franck Rousseau, Gilles Berger-Sabbatel, Andrzej Duda 1 CS4516.

Slides:



Advertisements
Similar presentations
24-1 Chapter 24. Congestion Control and Quality of Service (part 1) 23.1 Data Traffic 23.2 Congestion 23.3 Congestion Control 23.4 Two Examples.
Advertisements

Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
Ethernet – CSMA/CD Review
Jaringan Komputer Lanjut Traffic Management Aurelio Rahmadian.
Achieving Quality of Service in Wireless Networks A simulation comparison of MAC layer protocols. CS444N Presentation By: Priyank Garg Rushabh Doshi.
Explicit and Implicit Pipelining in Wireless MAC Nitin Vaidya University of Illinois at Urbana-Champaign Joint work with Xue Yang, UIUC.
1 of 56 Idle Sense: An Optimal Access Method for High Throughput and Fairness in Rate Diverse Wireless LANs Martin HeusseFranck Rosseau Romaric GuillierAndrzej.
1 «Performance Analysis for a New Medium Access Control Protocol in Wireless LANs» By YOUNGGOO KWON and YUGUANG FANG Presentation by Ampatzis Efthimios.
1 End to End Bandwidth Estimation in TCP to improve Wireless Link Utilization S. Mascolo, A.Grieco, G.Pau, M.Gerla, C.Casetti Presented by Abhijit Pandey.
Contention Window Optimization for IEEE DCF Access Control D. J. Deng, C. H. Ke, H. H. Chen, and Y. M. Huang IEEE Transaction on Wireless Communication.
Module C- Part 1 WLAN Performance Aspects
Ad-Hoc Networking Course Instructor: Carlos Pomalaza-Ráez D. D. Perkins, H. D. Hughes, and C. B. Owen: ”Factors Affecting the Performance of Ad Hoc Networks”,
Dynamic Tuning of the IEEE Protocol to Achieve a Theoretical Throughput Limit Frederico Calì, Marco Conti, and Enrico Gregori IEEE/ACM TRANSACTIONS.
Performance Analysis of the Intertwined Effects between Network Layers for g Transmissions Wireless Multimedia Networking and Performance Modeling.
Wireless Network Design for Distributed Control Liu and Goldsmith - Appeared at CDC 2004 Presented by Vinod Namboodiri.
Evaluate IEEE e EDCA Performance Tyler Ngo CMPE 257.
802.11n MAC layer simulation Submitted by: Niv Tokman Aya Mire Oren Gur-Arie.
TCP over ad hoc networks Ad Hoc Networks will have to be interfaced with the Internet. As such backward compatibility is a big issue. One might expect.
Video Streaming Over Wireless: Where TCP is Not Enough Xiaoqing Zhu, Jatinder Pal Singh and Bernd Girod Information Systems Laboratory Stanford University.
Data Communication and Networks
Medium Start in TCP-Friendly Rate Control Protocol CS 217 Class Project Spring 04 Peter Leong & Michael Welch.
802.11n MAC layer simulation Submitted by: Niv Tokman Aya Mire Oren Gur-Arie.
ECE358: Computer Networks Spring 2012
Performance Anomaly of b Martin Heusse, Franck Rousseau, Gilles Berger-Sabbatel, Andrzej Duda IEEE INFOCOM 2003.
TCP: flow and congestion control. Flow Control Flow Control is a technique for speed-matching of transmitter and receiver. Flow control ensures that a.
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray, Jeffrey B. Carruthers, and David Starobinski Department of Electrical and Computer Engineering.
Opersating Mode DCF: distributed coordination function
2014 YU-ANTL Lab Seminar Performance Analysis of the IEEE Distributed Coordination Function Giuseppe Bianchi April 12, 2014 Yashashree.
3: Transport Layer3b-1 Principles of Congestion Control Congestion: r informally: “too many sources sending too much data too fast for network to handle”
Transport Layer 4 2: Transport Layer 4.
1 Dynamic Adaption of DCF and PCF mode of IEEE WLAN Abhishek Goliya Guided By: Prof. Sridhar Iyer Dr. Leena-Chandran Wadia MTech Dissertation.
Placement of WiFi Access Points for Efficient WiFi Offloading in an Overlay Network Adviser : Frank, Yeong-Sung Lin Presented by Shin-Yao Chen.
Recitation 8 Wireless Networks. Virtual carrier sensing First exchange control frames before transmitting data – Sender issues “Request to Send” (RTS),
Distributed Call Admission Control for VoIP over WLANs based on Channel Load Estimation Paolo Dini, Nicola Baldo, Jaume Nin-Guerrero, Josep Mangues-Bafalluy,
November 4, 2003APOC 2003 Wuhan, China 1/14 Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs Presented by Ruibiao Qiu Department of Computer.
Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel.
2000 년 11 월 20 일 전북대학교 분산처리실험실 TCP Flow Control (nagle’s algorithm) 오 남 호 분산 처리 실험실
Cisco 3 - Switching Perrine. J Page 16/4/2016 Chapter 4 Switches The performance of shared-medium Ethernet is affected by several factors: data frame broadcast.
Vertical Optimization Of Data Transmission For Mobile Wireless Terminals MICHAEL METHFESSEL, KAI F. DOMBROWSKI, PETER LANGENDORFER, HORST FRANKENFELDT,
Transport Layer3-1 TCP throughput r What’s the average throughout of TCP as a function of window size and RTT? m Ignore slow start r Let W be the window.
Hangguan Shan, Member, IEEE, Ho Ting Cheng, Student Member, IEEE, and Weihua Zhuang, Fellow, IEEE Cross-Layer Cooperative MAC Protocol in Distributed Wireless.
Recitation 8 Wireless Networks.
Planning and Analyzing Wireless LAN
An Energy Efficient MAC Protocol for Wireless LANs, E.-S. Jung and N.H. Vaidya, INFOCOM 2002, June 2002 吳豐州.
Jennifer Rexford Fall 2014 (TTh 3:00-4:20 in CS 105) COS 561: Advanced Computer Networks TCP.
Explicit and Implicit Pipelining in Wireless MAC Nitin Vaidya University of Illinois at Urbana-Champaign Joint work with Xue Yang, UIUC.
Medium Access Control in Wireless networks
TCP continued. Discussion – TCP Throughput TCP will most likely generate the saw tooth type of traffic. – A rough estimate is that the congestion window.
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Congestion Control 0.
Performance Evaluation of L3 Transport Protocols for IEEE (2 nd round) Richard Rouil, Nada Golmie, and David Griffith National Institute of Standards.
Wireless LAN Requirements (1) Same as any LAN – High capacity, short distances, full connectivity, broadcast capability Throughput: – efficient use wireless.
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
Performance Evaluation of L3 Transport Protocols for IEEE Richard Rouil, Nada Golmie and David Griffith National Institute of Standards and Technology.
Karn’s Algorithm Do not use measured RTT to update SRTT and SDEV Calculate backoff RTO when a retransmission occurs Use backoff RTO for segments until.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
Topics discussed in this section:
Topics in Distributed Wireless Medium Access Control
On the Physical Carrier Sense in Wireless Ad-hoc Networks
High Throughput Route Selection in Multi-Rate Ad Hoc Wireless Networks
Performance Issues & Improvement on MAC
The Impact of Multihop Wireless Channel on TCP Performance
Data Communication Networks
Wireless LAN Simulation IEEE MAC Protocol
연구 목표 Idle Sense: An Optimal Access Method for High Throughput and Fairness in Rate Diverse Wireless LANs. M. Heusse, F. Rousseau, R. Guillier, and A.
CSE 313 Data Communication
Enhanced-DCF Wireless MAC Protocol: Some Simulation Results
How MAC interacts with Capacity of Ad-hoc Networks – Interference problem Capacity of Wireless Networks – Part Page 1.
Chapter 6 Multiple Radio Access.
Presentation transcript:

Presentation By: Daniel Mitchell, Brian Shaw, Steven Shidlovsky Paper By: Martin Heusse, Franck Rousseau, Gilles Berger-Sabbatel, Andrzej Duda 1 CS4516 C10 February 11, 2010

OutlineOutline  b Basics  The Anomaly  Simulation Verification  Experimental Verification CS4516 C10 2

AbstractAbstract When one host on a IEEE b network is forced to transmit at less than the maximum bit rate of 11 Mbps then all other hosts are forced to also transmit at this lower rate When one host on a IEEE b network is forced to transmit at less than the maximum bit rate of 11 Mbps then all other hosts are forced to also transmit at this lower rate 3 CS4516 C10

Behind the Problem  Access method – Distributed Coordination Function (DCF) –Uses CSMA/CA  Low quality radio transmissions will result in a decrease in bit rate – 5.5, 2, or 1 Mbps  Performance anomaly caused –Privileges low speed hosts, penalize high speed hosts 4 CS4516 C10

DFC Performance  Overall transmission time T = t tr + t ov  Each packet has constant overhead time t ov = DIFS + t pr + SIFS + t pr + t ack DIFS = Time wait between senses of channel SIFS = Period access point waits to send ACK t pr = PLPC Transmission time t ack = MAC acknowledgement transmission time 5 CS4516 C10

Throughput Efficiency  Equation to determine useful throughput –P = (T tr /T) * (1500/1534)  Result: 70% useful throughput  Thus 11 Mbps has 7.74 Mbps useful data 6 CS4516 C10

Multiple Hosts  Increases overall transmission time  Decreases the proportion of useful throughput P(N) = t tr /T(N)  T(N) = Overall transmission time due to multiple hosts 7 CS4516 C10

The Anomaly  Since the slow hosts need more time to transmit the same data, all the hosts slow down to roughly the same speed –The slow host holds the channel for a proportionately longer amount of time!  This anomaly occurs regardless of how many fast hosts are present  Collisions and contention affect all hosts proportionally 8 CS4516 C10

Why the Anomaly Exists  sd: Amount of data to be transmitted  Time to transmit data = sd/(data rate)  Over the long term, CSMA/CA provides each host with an equal probability of accessing the channel –Therefore, all hosts will have the opportunity to transmit the same amount of data –Fast hosts have a lower channel utilization 9 CS4516 C10

Further Discussions  See Heuse, et. al. page 3 for the full mathematics. –Contention periods and collisions are accounted for.  UDP is expected to obey the mathematical models as generally no ACK packets are sent.  TCP behaves as though there is 2 slow hosts, but can be shown mathematically to behave similarly. –The second slow host is the ACK packets returning to it. –TCP also incorporates congestion control, so a host may stop transmitting when its data rate is substantially below the 1Mbps minimum. 10 CS4516 C10

VerificationVerification  A simulation was conducted to verify the mathematical results. –Simulator is targeting a worst-case scenario: The channel is always busy the first time a node wants to transmit. –All nodes configured to use b with exponential backoff  Simulation showed the mathematics are good, though not perfect –The error: Other factors, besides the proportion of collisions, affect the average time spent in collisions 11 CS4516 C10

Proportion of Collisions  The mathematics assume a greater number of collisions than the simulation shows, particularly for very large numbers of hosts 12 CS4516 C10 Figure 3

ThroughputThroughput  The performance anomaly is observed. Note that no configuration gets acceptable throughput for very large numbers of hosts. This triggers TCP congestion control algorithms and may force hosts to stop transmitting. 13 CS4516 C10 Figure 4

Experimental Verification  Measure Throughput Four notebooks(Marie, Milos, Kea, Bali) Four notebooks(Marie, Milos, Kea, Bali) RedHat 7.3, b cards RedHat 7.3, b cards Access Point is not the bottleneck Access Point is not the bottleneck 14 CS4516 C10

Tool Used  Netperf:: generates TCP or UDP traffic and measures throughput  Tcpperf:: generates TCP traffic and measures the throughput  Udpperf:: generates UDP traffic and measures the throughput  Measurements done with netperf, compared to results of tcpperf and udpperf 15 CS4516 C10

Test 1: No Mobility  All hosts near access point  Force one to use degraded bit rate  One test run with TCP, the other with UDP  Using 2 hosts, 3 hosts, and 4 hosts, at bit rates 11, 5.5, 2, and 1 for Bali (slow host)  For TCP, hosts are competing with the access point, which is sending TCP ACKs on behalf of the destination  For UDP, hosts compete with each other 16 CS4516 C10

17 CS4516 C10

Test 1: Discussion  Measured values correspond well to analytical values (better for UDP)  TCP traffic pattern more complex, due to Access Point competing with hosts (TCP ACKs), dependence on overall RTT and bottleneck link  Pattern can become correlated with data segment traffic, since TCP ACK is sent upon arrival of data segment 18 CS4516 C10

Test 2: Mobile Hosts  Bali (slow host) is a mobile host, bit rate automatically adapts to varying transmission conditions  Other hosts located near access point with good conditions 19 CS4516 C10

20 CS4516 C10

Test 2: Discussion  For TCP, when transmission conditions are bad ( ) the throughput of Marie increases. This is due to Bali limiting its sending rate in adverse conditions  Note, at 380, Bali stops sending completely even if its bit rate is not 0, and Marie gains almost all available throughput  UDP shows similar results, although Marie’s gains during adverse conditions are not quite as large, unless Bali stops sending 21 CS4516 C10

Related Work  There have been many other papers studying WLANs, but no prior papers use varying bit rates for hosts  Most other papers use simulations, rather than analysis, which can give complex results  Short-term unfairness of CSMA-based medium access protocols is also a topic of interest 22 CS4516 C10

ConclusionsConclusions  Throughput much lower than nominal bit rate  Proportion of useful throughput depends strongly on number of hosts  If a host degrades its bit rate due to bad transmission conditions, other hosts throughputs will drop roughly to the rate of the slower host  However, in real conditions using TCP, the slow host will be subject to packet loss, limiting its sending rate, allowing other hosts to take advantage of the unused capacity 23 CS4516 C10