Dynamic Tuning of the IEEE 802.11 Protocol to Achieve a Theoretical Throughput Limit Frederico Calì, Marco Conti, and Enrico Gregori IEEE/ACM TRANSACTIONS.

Slides:



Advertisements
Similar presentations
Min Song 1, Yanxiao Zhao 1, Jun Wang 1, E. K. Park 2 1 Old Dominion University, USA 2 University of Missouri at Kansas City, USA IEEE ICC 2009 A High Throughput.
Advertisements

Medium Access Issues David Holmer
Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
SELECT: Self-Learning Collision Avoidance for Wireless Networks Chun-Cheng Chen, Eunsoo, Seo, Hwangnam Kim, and Haiyun Luo Department of Computer Science,
An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Network
Modeling and Throughput Analysis for SMAC Ou Yang
1 A Novel Topology-blind Fair Medium Access Control for Wireless LAN and Ad Hoc Networks Z. Y. Fang and B. Bensaou Computer Science Department Hong Kong.
Distributed Control Algorithms for Service Differentiation in Wireless Packet Networks Michael Barry, Andrew T Campbell, Andras Veres
On Optimizing Backoff Counter Reservation and Classifying Stations for the IEEE Distributed Wireless LANs.
KAIST Sift: A MAC Protocol for Event-Driven Wireless Sensor Networks Suho Yang (CS710: November 4, 2008) Kyle Jamieson, Hari Balakrishnan, Y.C. Tay LNCS.
Jesús Alonso-Zárate, Elli Kartsakli, Luis Alonso, and Christos Verikoukis May 2010, Cape Town, South Africa, ICC 2010 Coexistence of a Novel MAC Protocol.
Contention Window Optimization for IEEE DCF Access Control D. J. Deng, C. H. Ke, H. H. Chen, and Y. M. Huang IEEE Transaction on Wireless Communication.
Module C- Part 1 WLAN Performance Aspects
Slow Start Backoff Algorithm for Wireless Ad Hoc Networks Der-Jiunn Deng Department of Computer Science and Information Engineering National Changhua University.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
The Impact of Multihop Wireless Channel on TCP Throughput and Loss Presented by Scott McLaren Zhenghua Fu, Petros Zerfos, Haiyun Luo, Songwu Lu, Lixia.
IEEE Wireless LAN: Capacity Analysis and Protocol Enhancement F. Cali, M. Conti, E. Gregori IEEE Wireless LAN: Capacity Analysis and Protocol.
On the Performance Behavior of IEEE Distributed Coordination Function M.K.Sidiropoulos, J.S.Vardakas and M.D.Logothetis Wire Communications Laboratory,
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray, Jeffrey B. Carruthers, and David Starobinski Department of Electrical and Computer Engineering.
Delay Analysis of IEEE in Single-Hop Networks Marcel M. Carvalho, J.J.Garcia-Luna-Aceves.
A Multichain Backoff Mechanism for IEEE WLANs Alkesh Patel & Hemant Patel ECE 695 – Leading Discussion By : Shiang- Rung Ye and Yu-Chee Tseng.
Opersating Mode DCF: distributed coordination function
1 SenMetrics’05, San Diego, 07/21/2005 SOSBRA: A MAC-Layer Retransmission Algorithm Designed for the Physical-Layer Characteristics of Clustered Sensor.
A Virtual Collision Mechanism for IEEE DCF
2014 YU-ANTL Lab Seminar Performance Analysis of the IEEE Distributed Coordination Function Giuseppe Bianchi April 12, 2014 Yashashree.
1 Real-Time Traffic over the IEEE Medium Access Control Layer Tian He J. Sobrinho and A. krishnakumar.
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
1 Dynamic Adaption of DCF and PCF mode of IEEE WLAN Abhishek Goliya Guided By: Prof. Sridhar Iyer Dr. Leena-Chandran Wadia MTech Dissertation.
Company LOGO Provision of Multimedia Services in based Networks Colin Roby CMSC 681 Fall 2007.
Distributed Call Admission Control for VoIP over WLANs based on Channel Load Estimation Paolo Dini, Nicola Baldo, Jaume Nin-Guerrero, Josep Mangues-Bafalluy,
Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel.
Hybrid OFDMA/CSMA Based Medium Access Control for Next- Generation Wireless LANs Yaser Pourmohammadi Fallah, Salman Khan, Panos Nasiopoulos, Hussein Alnuweiri.
R ANDOM A CCESS N ETWORKS CSMA F AMILIES 1. References Chapter 9 of the book. Throughput Analysis for Persistent CSMA Systems, HIDEAKI TAKAGI AND LEONARD.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Unit-II Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Performance Analysis of the Distributed Coordination Function under Sporadic Traffic joint work with C.-F. Chiasserini (Politecnico di Torino)
Chapter 6 Multiple Radio Access
Performance Analysis of IEEE Distributed Coordination Function (DCF) Author : Giuseppe Bianchi Presented by: 李政修 December 23, 2003.
Hangguan Shan, Member, IEEE, Ho Ting Cheng, Student Member, IEEE, and Weihua Zhuang, Fellow, IEEE Cross-Layer Cooperative MAC Protocol in Distributed Wireless.
Access Delay Distribution Estimation in Networks Avideh Zakhor Joint work with: E. Haghani and M. Krishnan.
Planning and Analyzing Wireless LAN
An Energy Efficient MAC Protocol for Wireless LANs, E.-S. Jung and N.H. Vaidya, INFOCOM 2002, June 2002 吳豐州.
THROUGHPUT ANALYSIS OF IEEE DCF BASIC IN PRESENCE OF HIDDEN STATIONS Shahriar Rahman Stanford Electrical Engineering
Rami Melhem Sameh Gobriel & Daniel Mosse Modeling an Energy-Efficient MAC Layer Protocol.
6 November 2002 MAC protocol 1 Optimization of the Efficiency of MAC Protocols for WLANs Raffaele Bruno MobileMAN kickoff meeting.
Content caching and scheduling in wireless networks with elastic and inelastic traffic Group-VI 09CS CS CS30020 Performance Modelling in Computer.
1 An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Networks Tijs van Dam, Koen Langendoen In ACM SenSys /1/2005 Hong-Shi Wang.
Quality of Service Schemes for IEEE Wireless LANs-An Evaluation 主講人 : 黃政偉.
Mitigating starvation in Wireless Ad hoc Networks: Multi-channel MAC and Power Control Adviser : Frank, Yeong-Sung Lin Presented by Shin-Yao Chen.
Medium Access Control in Wireless networks
CHANNEL ALLOCATION FOR SMOOTH VIDEO DELIVERY OVER COGNITIVE RADIO NETWORKS Globecom 2010, FL, USA 1 Sanying Li, Tom H. Luan, Xuemin (Sherman) Shen Department.
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
4 Introduction Carrier-sensing Range Network Model Distributed Data Collection Simulation 6 Conclusion 2.
Distributed-Queue Access for Wireless Ad Hoc Networks Authors: V. Baiamonte, C. Casetti, C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di.
COE-541 LAN / MAN Simulation & Performance Evaluation of CSMA/CA
LA-MAC: A Load Adaptive MAC Protocol for MANETs IEEE Global Telecommunications Conference(GLOBECOM )2009. Presented by Qiang YE Smart Grid Subgroup Meeting.
Performance Enhancement of Multirate IEEE WLANs with Geographically Scattered Stations 1 Duck-Yong Yang, 2 Tae-Jin Lee, 3 Kyunghun Jang, 3 Jin-Bong.
MAC Protocols for Sensor Networks
David S. L. Wei Joint Work with Alex Chia-Chun Hsu and C.-C. Jay Kuo
Cognitive Link Layer for Wireless Local Area Networks
Lab 7 – CSMA/CD (Data Link Layer Layer)
IEEE Protocol: Design and Performance Evaluation of An Adaptive Backoff Mechanism JSAC, vol.18, No.9, Sept Authors: F. Cali, M. Conti and.
Provision of Multimedia Services in based Networks
Author: Giuseppe Bianchi
The Impact of Multihop Wireless Channel on TCP Performance
Maximizing MAC Throughputs by Dynamic RTS-CTS Threshold
Frederico Calì Marco Conti Enrico Gregori Presented by Andrew Tzakis
of the IEEE Distributed Coordination Function
Enhanced Backoff Scheme in CSMA/CA for IEEE
Chapter 6 Multiple Radio Access.
Presentation transcript:

Dynamic Tuning of the IEEE Protocol to Achieve a Theoretical Throughput Limit Frederico Calì, Marco Conti, and Enrico Gregori IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 8, NO. 6, DECEMBER 2000

Overview Introduction IEEE Capacity Analysis IEEE Protocol Comments Conclusions

Introduction – (1) The existing IEEE protocol is contention-based, which allows stations to access the wireless channel randomly. Its performance degrades under heavy network load due to the high collision probability.

Introduction – (2) Motivation: find the optimal contention window (CWIN) size which boosts up the throughput.  The value of CWIN which is large enough to minimize the collision probability and small enough to minimize the backoff interval.

Introduction – (3) An analytical model is built to derive the average size of the contention window which maximizes the throughput. Observations:  Depending on the network configuration, the standard can operate very far from the theoretical throughput limit.  An appropriate tuning of the backoff algorithm can drive the IEEE protocol close to the theoretical throughput limit.

Introduction – (4) Hence a distributed algorithm IEEE is proposed that enables each station to tune its backoff algorithm at run-time.

IEEE Capacity Analysis (1) No RTS/CTS mechanism No dependency on the physical layer technology WLAN configuration

A model with a finite number of stations (M) which always have a packet ready for transmission. For each transmission attempt, a station is assumed to use a backoff interval sampled from a geometric distribution with parameter p, where IEEE Capacity Analysis (2)

In the real IEEE backoff algorithm, a station transmission probability depends on the history. However, our model of the protocol behavior provides accurate estimates of the IEEE protocol behavior from a capacity analysis standpoint. IEEE Capacity Analysis (3)

Protocol Capacity (Max throughput) t v = average virtual transmission time m - = average message length IEEE Capacity Analysis (4) ……..(1)

S = time required to complete a successful transmission (DATA-ACK frame exchange without collision) IEEE Capacity Analysis (5)

Derivation of the average message length IEEE Capacity Analysis (6)

IEEE Capacity Analysis (7) Derivation of E[B]: Corollary: Given Lemma 2

Derivation of the average t v IEEE Capacity Analysis (8) ……..(2)

The assumption on the backoff algorithm implies that the future behavior of a station does not depend on the past. The idle period times are i.i.d. sampled from a geometric distribution with an average. The collision lengths are i.i.d with average. IEEE Capacity Analysis (9)

IEEE Capacity Analysis (10) ……..(3)

IEEE Capacity Analysis (11)

From (1), (3) and Lemma 3 IEEE Capacity Analysis (12) ……..(4)

Validate the analytical model via simulation. Given M and q, how close are the throughput derived analytically and that derived from simulation ? IEEE Capacity Analysis (13)

IEEE Capacity Analysis (14)

IEEE Capacity Analysis (15)

Given M and q, find p which maximizes the capacity in (4).  M = the number of stations  p = a parameter for the geometric distribution of the backoff time  q = a parameter for the geometric distribution of the packet length (number of slots) IEEE Capacity Analysis (16)

IEEE Capacity Analysis (17) For a given packet length distribution, the maximum value of the capacity corresponds to the minimum value of the average virtual transmission time (t v ).

IEEE Capacity Analysis (18) Goal: Find p (p min ) to minimize tv:

IEEE Capacity Analysis (19)

IEEE Capacity Analysis (20)

Motivation Based on the simulation, the IEEE protocol with an appropriate setting of the CWIN size (optimal CWIN) can reach the theoretical limit. IEEE (1)

IEEE (2)

Tune the value of E[CWIN] based on p min at run time such that the capacity is maximized. Both E[Coll] and E[N c ] can be estimated by observing the channel status. A station can obtain p min with a minimization algorithm. IEEE (3)

The minimization algorithm is NOT suitable for a run-time computation as it very complex computationally. A heuristic is introduced to approximate p min. IEEE (4)

Approximate p min by finding p satisfying The selection of p min guarantees that E[Coll] < 1. IEEE (5)

IEEE (6)

IEEE (7)

The contention window size is updated at the end of any virtual transmission time that contains at least one collision. IEEE (8)

IEEE (9)

The previous results were obtained under the following assumptions:  M (the number of stations) is known before.  No hidden terminals Study how IEEE is sensitive to  the number of active stations  Hidden terminals IEEE (10)

Knowing M beforehand is a strong assumption.  In a real network, the number of active stations is highly variable.  M cannot be more or less the same all the time Relax this assumption and analyze the sensitiveness of the IEEE capacity to the number of active stations. IEEE (11)

IEEE (12) Assume M=100

The number of active stations (M) should be estimated at run time. M can be computed provided that the average number of empty slots in a virtual transmission time is known. IEEE (13)

IEEE (14)

To avoid sharp changes in the estimated value of M, is introduced IEEE (15)

IEEE (16)

IEEE (17) 10010

IEEE (18)

Relax the 2 nd assumption – Hidden stations exist.  Study how hidden stations affect the performance of our protocol by causing erroneous statistics. Analyze the impact on our protocol of three events that may occur when hidden stations are present.  missed ACK,  carrier sensing fault and  not-detected transmission IEEE (19) – Hidden stations

Missed ACK The hidden station problem may cause a station to miss the ACK. Consequences  Observes a longer virtual transmission time  Considers a successful transmission to be a collision IEEE (20) – Hidden stations

IEEE (21) – Hidden stations Missed ACK

Carrier Sensing Fault A station (1) wrongly senses the wireless medium has been idle while a hidden station is transmitting and (2) starts transmitting. Consequences  Generate collisions IEEE (22) – Hidden stations

Non-detected Transmission A station cannot observe some collisions and successful transmissions and mistakenly interpret that the channel is idle. Consequences  Overestimate the idle-period length.  Underestimate the number of collision and the collision length. IEEE (23) – Hidden stations

A probabilistic model is used to associate each phenomenon to a probability H1: the probability that a station misses an ACK. H2: the probability that, due to a carrier sensing fault, a station which does not detect an ongoing transmission starts transmitting. H3: the probability that a station overestimate the idle-period length. IEEE (24) – Hidden stations

IEEE (25) – Hidden stations (50 active stations) Given H1=H2=H3=H

IEEE (26) – Hidden stations

IEEE (27) – Hidden stations

IEEE (28) – Hidden stations

Good Make valid assumptions - the geometric distribution of backoff time E[B].  Justified by comparing figures derived from the simulation and the mathematical analysis. Demonstrate how to handle the big assumption step by step. Comments – (1)

Bad The overhead incurred for estimating p min is not shown.  It won’t appear if IEEE is simulated in ns-2. Comments – (2)

Conclusions A distributed algorithm IEEE is proposed that enables each station to tune its backoff algorithm at run-time. The throughput can be optimized such that it is close to the theoretical upper bound.