R&I R 28/2008 Olav Østerbø and Paal E. Engelstad WLAN QoS Analysis - A New Modelling Approach for 802.11e WLAN QoS Analysis - A New Modelling Approach for 802.11e R&I Research Report Title R 28/2008 WLAN QoS Analysis - A New Modelling Approach for 802.11e Author(s) ISBN / ISSN Security group Date Olav Østerbø and Paal E. Engelstad 82-423-0617-6 / 1500-2616 OPEN 2008.11.08 Abstract This document presents an analytical method to calculate the performance of 802.11 systems in general and the differentiation characteristics of 802.11e in particular. Like similar analytical methods, it is based on a Markov model of the system. Our proposed method is based on ensuring consistency between the macro-view and micro-view of the system, while previous models are mainly focusing on the micro-view. With the new method the system characteristics can be found by the macro-view approach, which represents a great simplification compared to previous methods. Another simplification is that the Laplace transform is used to study the delay in each Markov state, as well as the overall access delay and queueing delay. Finally, the model is extended to also include varying packet lengths and a more detailed description of the AIFS differentiation of 802.11e. Keywords 802.11, 802.11e, Markov, Bianchi, QoS, Performance, Virtual Collisions, Laplace, access delay, Queueing delay. Telenor R&I R 28/2008 WLAN QoS Analysis - A New Modelling Approach for 802.11e © Telenor ASA 2008.08.08 All rights reserved. No part of this publication may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without permission in writing from the publisher. Telenor R&I R 28/2008 WLAN QoS Analysis - A New Modelling Approach for 802.11e Preface This document presents the work of the WLAN QoS Analysis project that was carried out in 2008. This activity is part of the Wireless Broadband project at Telenor R&I. Telenor R&I R 28/2008 WLAN QoS Analysis - A New Modelling Approach for 802.11e Contents 1 Introduction .......................................................... 1 2 Combining micro and macro view to obtain throughput and system parameters ...................... 5 3 Virtual collisions and the mean slot length ........... 7 1.1 1.2 1.3 1.4 3.1 3.2 3.2.1 3.2.2 3.3 3.4 3.5 3.6 3.7 3.8 3.9 3.10 3.11 4 4.1 4.2 4.3 4.4 Communication scenarios addressed by the model ....................... 1 Our original model ................................................................... 3 The need for improving the model .............................................. 3 An outline of the document ....................................................... 4 What are virtual collisions?........................................................ 7 How virtual collisions affect model parameters ............................. 8 The collision probability ............................................................ 8 The duration of a slot on the radio channel (the “Slot Length”) ....... 8 The probability of a transmission on the radio channel .................. 9 The probability of a busy time slot ........................................... 10 The probability of a successful transmission............................... 10 Mean duration of a busy time slot without virtual collisions .......... 11 Mean duration of a busy time slot with virtual collisions ............... 12 Mean duration of a time slot with a successful packet ................. 14 Mean duration of a time slot with a frame collision without virtual collisions..................................................................... 15 Mean duration of a time slot with a frame collision with virtual collisions .............................................................................. 15 The slot length distribution for the RTS/CTS case both with and without virtual collisions (using the Laplace transform) ............... 15 Using the Laplace transform to obtain the access delay distribution..................................... 17 Description of the delay components ........................................ 17 The Laplace transform of the access delay ................................. 18 Specification of the countdown delay ........................................ 20 Delay distributions during countdown and freeze periods ............. 23 5 The queueing delay ............................................. 25 6 Concluding remarks ............................................ 27 6.1 6.2 Summary ............................................................................. 27 Issues for further work ........................................................... 27 References .................................................................. 29 7 7.1 7.2 Appendix ............................................................. 31 Sums ................................................................................... 31 Elements of Laplace inversion .................................................. 31 Significance for Telenor .............................................. 35 Telenor R&I R 28/2008 WLAN QoS Analysis - A New Modelling Approach for 802.11e Telenor R&I R 28/2008 WLAN QoS Analysis - A New Modelling Approach for 802.11e 1 Introduction 1.1 Communication scenarios addressed by the model This document presents an analytical model for IEEE 802.11 WLAN communication. The model covers communication both with and without 802.11e (i.e. with or without traffic differentiation/QoS.) As WLAN communication without 802.11e is basically a subset and a simplified version of our model, we will focus mainly on 802.11e communication in the document. Figure 1 illustrates a typical scenario addressed by the model. In the figure, the “AP” refers to the Access Point (AP) and each “STA” refers to a WLAN Station (STA). A number of STAs contend for the wireless medium to send traffic to the AP. This is a pure uplink scenario, where all traffic is sent from the STAs to the AP. However, the model might as well be used for other communication patterns, including the pure downlink scenario where all communication goes from the AP to the STAs. STA 8 STA 1 A STA 7 STA 2 STA 6 STA 3 STA 4 Figure 1 STA 5 A typical WLAN communication scenario addressed by the model The 802.11e extensions allow for differentiation between four different traffic classes, which are referred to as Access Categories (ACs). Each AC is allocated a separate queue on the station. The ACs are numbered so that the lowest priority AC is referred to as “AC 0” and the highest priority AC is referred to as “AC 3”. Figure 1 does not indicate the offered traffic load per AC. A typical scenario is that each STA is sending traffic of all four ACs and – for simplicity – is trying to send an equal amount of traffic of each of these ACs. To further simplify the scenario, one might assume that the packet lengths do not differ between the different ACs. (The latter might not be very realistic, because normally the voice traffic that is sent at the highest priority AC is normally of shorter packet length than the packet length of the best-effort or background data traffic sent at the lowest ACs). In this scenario, there will be 24 actively transmitting Telenor R&I R 28/2008 - 1 WLAN QoS Analysis - A New Modelling Approach for 802.11e queues in the scenario depicted in the figure, i.e. eight actively transmitting stations, each with four actively transmitting queues. In this scenario, the four actively transmitting queues on a station are contending internally for accessing the channel, before the queue that “wins” the internal contention is trying to transmit on the radio channel, contending with transmissions from the other STAs. The first round of internal contention between the queues on a STA is referred to as “virtual collisions” (VCs), and a model addressing this scenario is referred to as a “model with virtual collisions”. Virtual collisions will be explained in further detail later in this document. Another simple traffic scenario in Figure 1 is typically that each STA is sending traffic of only one AC each – and for simplicity – one might assume that each station tries to transmit an equal amount of traffic independent of which AC it is sending. To further simplify the scenario, one might assume that the packet lengths do not differ between the different ACs. For example, in Figure 1 STA 1 and STA 2 send traffic of AC 0, STA 3 and STA 4 send traffic of AC 1, STA 5 and STA 6 send traffic of AC 2, and STA 7 and STA 8 send traffic of AC 3. In this scenario, there is a total of only eight actively transmitting queues in the system (i.e. two queues of each AC). Furthermore, there is no internal contention between the queues on a station, because only one queue is actively transmitting traffic here. Consequently, there are no Virtual Collisions in the system. A model addressing this scenario is referred to as a “model without Virtual Collisions”. In Figure 2 we observe some simulation results illustrating the typical performance characteristics according to these types of uplink scenarios. In this specific case, 802.11b is used as the PHY layer and there are five actively transmitting stations, all trying to transmit an equal amount of traffic for each of the four ACs to the AP. The curves show the total amount of throughput per access category of successfully transmitted packets (sometimes also referred to as “goodput”). 4000 Throughput per AC [Kb/s] 3500 3000 2500 2000 1500 1000 500 0 0 1000 2000 3000 4000 5000 6000 7000 8000 9000 10000 Traffic generated per AC [Kb/s] Figure 2 AC[3]: Simulations AC[2]: Simulations AC[0]: Simulations Input = Output AC[1]: Simulations A performance study of the differentiation characteristics of 802.11e 2 - Telenor R&I R 28/2008 WLAN QoS Analysis - A New Modelling Approach for 802.11e 1.2 Our original model We developed a first version of the model in the period 2004 – 2006. At that time there were few efforts modelling the differentiation characteristics of 802.11e, as the original Bianchi model considered plain 802.11 with only one traffic class. Furthermore, most efforts considered only the saturation throughput, which is found as the horizontal curves on the right side of Figure 2. However, in the leftmost part of the figure, the traffic load is so low that the system is totally unsaturated and nearly all traffic that is trying to be transmitted is eventually being successfully transmitted. (However, a frame might have to be retransmitted after a collision has been detected, in order to finally be considered as successfully transmitted.) Since nearly all traffic is eventually transmitted with success, the traffic curves follow the 45o input=output line in the leftmost part of the figure. By having a model that takes both saturation and non-saturation conditions into account, the model is able to predict the performance over all possible traffic loads. Especially when the differentiation characteristics of 802.11e are considered, it is fruitful to have a model that gives the full picture of how the performance changes with a changing traffic load, as illustrated in Figure 2. The differentiation characteristics between the two highest priority ACs in Figure 2 are primarily given by the fact that these two ACs have different minimum contention windows (and thus a different mean number of postbackoff slots). However, the fact that the two lowest priority ACs face full starvation at saturation conditions, is mainly attributed to the AIFS differentiation. Furthermore, since these two ACs have the same contention window (CW) settings, the difference between these two curves observed in the region between non-saturation and starvation is a direct consequence of the difference in AIFS differentiation. Another contribution of our previous model was a simple – and fairly accurate - model of the AIFS differentiation. The transmission of a frame (or “packet”) consists of two main delay components. First, the frame waits in the transmission queue, and this delay component is referred to as the queueing delay. When at the head of the queue, the frame is being attempted to be transmitted. This is referred to as the “access delay”. In fact, since the frame ends with a post-backoff, the service time of the frame is the sum of the access delay and the duration of the post-backoff. In our previous model, we calculated both access delay, service time and queueing delay. Using the z-transform to calculate the delay, we were able to calculate all moments of the delay distribution and thus, in principle, the full delay distribution of both access delay, service time and queueing delay. 1.3 The need for improving the model To the best of our knowledge, all models – including Bianchi’s original model for 802.11 saturation conditions and our own model for 802.11e differentiation and non-saturation conditions – were taking a micro-view approach to deriving the system characteristics. However, after taking a macro-view check of the model, we observed that inconsistencies between a micro-view approach and a macroview approach could be observed under some conditions. That potential inconsistency needed to be eliminated. Telenor R&I R 28/2008 - 3 WLAN QoS Analysis - A New Modelling Approach for 802.11e As a consequence, one of the main goals of the work presented in this document was to ensure consistency of the model. Furthermore, there was a need to simplify the model. This was another objective of the work presented in this document. It was assumed that a macro-view approach of the model could lead to a simpler method to derive the system characteristics. Thus, by ensuring consistency, there would also be potentials for simplifications. Inconsistency occurred especially in a non-slotted delay view, i.e. where each state of the Markov diagram could have a delay distribution not equal to all the other Markov states. Thus, by solving the aforementioned inconsistency, arbitrary delay characteristics would be an integral part of the model. The ztransform, which we used in our previous work, is particularly suitable for slotted systems and not these kinds of arbitrary delay characteristics. Therefore there was a need to use the Laplace transform instead, which is more appropriate in continuous-time systems. Thus, in addition to finding a simpler macro-view method, we introduced the Laplace transform as another way of meeting the objective of simplifying the model. Finally, we wanted to extend the model to cover more system aspects. To obtain this goal we had to find a more detailed description of the AIFS delay. Since our original model did not take differing packet lengths appropriately into account when calculating the slot length on the radio channel, we also had to consider different packet lengths of different ACs. 1.4 An outline of the document Chapter 2 presents a model that provides consistency between the micro-view and the macro-view. In Chapter 3, the slot length on the radio channel is calculated with differing packet lengths. It is found both for model variants with virtual collisions and model variants without virtual collisions. Then, the access delay and the queueing delay are found in Chapter 4 and Chapter 5, and a detailed model for AIFS differentiation is used when finding the access delay in Chapter 4. The Laplace transform is used when finding the delay characteristics in Chapter 4 and Chapter 5. Finally, conclusions are drawn in Chapter 6. 4 - Telenor R&I R 28/2008 WLAN QoS Analysis - A New Modelling Approach for 802.11e 2 Combining micro and macro view to obtain throughput and system parameters Performance modelling of IEEE 802.11 DCF and 802.11e EDCF is usually based on an imbedded Markov chain to obtain the transmission probability. Hence, an important part of the analysis is to find the steady state probabilities of the Markov chain, from which the transmission probability is derived [1]-[14]. With the imbedded Markov chain, the distribution of the delay in each state is absent. Instead, the state probabilities are found by counting the number of states that are visited as part of a successful transmission. This method is possible, because it is assumed that the system spends an equal amount of time in each Markov state (i.e. it is assumed that the model is “slotted”). At first sight this imbedded approach seems simple, because the state probabilities can be found without calculating the access delay. However, for the non-saturated analysis the mean service time (and thus also the mean access delay) must be found to determine the utilization factor (i.e. the probability of having an empty access queue). Thus, a delay analysis must be carried out anyhow. In this paper we will instead take a new, non-imbedded approach and start with doing the delay analysis. Our new non-imbedded method is considerably easier that the traditional imbedded method, because the system performance can be found without finding the steady state probabilities of the Markov chain. In addition, the new approach is quite intuitive. Our new approach is based on ensuring consistency between a macroscopic and microscopic viewpoint. Consistency is ensured by equating two different expressions for the throughput: • The first expression is obtained by a traditional microscopically slot level view, i.e. the throughput is expressed as the fraction of time for which the channel is used to successfully transmit frames. • The second way of expressing the throughput is by macroscopic level quantities as the offered traffic load and the mean access delay. In the following we consider a particular access queue for an Access Category (AC) in a WLAN operating under the EDCA mechanism. We assume that the arrival of frames follows a Poisson process with intensity λi , which we for simplicity assume to be equal for all class i AC queues. To keep full generality we assume that there is a total of N different classes indexed i = 0,1,.., N − 1 and that the number of queues for class i is ni , i.e. the total number of access queues equals K = N −1 ∑n i =0 i . (If each STA have all classes present, i.e. ni = n is the number of STAs in the WLAN and hence K = Nn .) Below we obtain two expressions for the throughput for a particular AC queue. The first one is obtained by a microscopic view of the channel in terms of slots where the throughput is expressed in the average payload information in a slot divided by the average duration of a slot time. The microscopic expression is found in the original model of Bianchi [1] and can be written: Telenor R&I R 28/2008 - 5 WLAN QoS Analysis - A New Modelling Approach for 802.11e si = τ i (1 − p i ) E[ DiMSDU ] σ (1) where σ is the mean slot length, E[ DiMSDU ] is the mean time required to transmit the data payload of the DATA frame, τ i is the transmission probability and pi , is the collision probability for AC i . On the other hand, by applying a macroscopic approach, we may consider this particular queue as a single server with mean service time E[ DiSat ] , i.e. the mean time it takes to transmit a frame including the post-backoff period. With the arrival rate λi the queue has the load (utilization factor) ρ i = min[1, λi E[ DiSat ]] . The “carried load”, obtained by subtracting those frames that are lost by expiration of the retry limit Li , is then (1 − piLi +1 ) ρ i . However, on average only E[ DiMSDU ] part of the transmissions carries useful full traffic. Hence the E[ DiSat ] normalized throughput si may be written as: si = (1 − piL +1 ) ρ i i E[ DiMSDU ] E[ DiSat ] (2) By (1) and (2) we obtain the fundamental τ -equation: (1 − p iLi +1 ) σ τi = ρi 1 − pi E[ DiSat ] (3) This can be written separately as: (1 − p iLi +1 ) τi = λiσ for λi E[ DiSat ] < 1 and 1 − pi (4) (1 − p iLi +1 ) σ for λi E[ DiSat ] ≥ 1 1 − p i E[ DiSat ] (5) τi = The two equations above give the important and basic relation between the transmission probability and the collision probability. They show that we have two different modes of operation: • Non-saturation (when λi E[ DiSat ] < 1 ) and • Saturation (when λi E[ DiSat ] ≥ 1 ) This modelling approach is fundamentally different from other approaches using Markov modelling. Moreover, it is more general and only depends on the mean slot length and the mean access delay. Hence, to specify the model, both the mean slot length σ and the mean service time E[ D ] must be expressed in terms of system parameters. This is done in the next two chapters of this paper. Sat i Finally, observe that the saturation case coincides with a Bianchi type model E[ Sl ] 1 = (equation (5)) only if where E[ N iSat ] is the mean number of Sat E[ N i ] E[ DiSat ] Markov-states visited for a frame. 6 - Telenor R&I R 28/2008 WLAN QoS Analysis - A New Modelling Approach for 802.11e 3 Virtual collisions and the mean slot length 3.1 What are virtual collisions? IEEE 802.11e introduces a mechanism called “virtual collisions”, which occurs between queues on the same station. If two or more queues at the station are trying to transmit in the same time slot (of the radio channel), only the highest priority queue of these queues is allowed to transmit (Figure 3). The other queues go into backoff, just as if the transmission of the frame in this queue had been involved in a real collision on the radio channel. The highest priority queue of the queues that wants to transmit in a time slot goes only into backoff if the frame it transmits is involved in a collision on the radio channel. Figure 3 Internal transmission conflicts between the different queues at a station are taken care of by the Virtual Collision Handler With “vanilla” 802.11 (i.e. 802.11 without 802.11e), there are naturally no virtual collisions. With 802.11e, on the other hand, there might be scenarios both without and with virtual collisions. In a scenario where each station is actively transmitting traffic of only one AC at the time, there will be differentiation between the ACs on the radio channel, but no virtual collisions occurring between queues on the stations. On the other hand, in a scenario where one or more stations are actively transmitting traffic of more than one AC simultaneously, there will be virtual collisions in the system. In this case, the virtual collisions need to be taken into account in the model. When discussing 802.11e in the following, we will consider two extreme scenarios. In the first scenario, referred to as “with virtual collisions”, there are Telenor R&I R 28/2008 - 7 WLAN QoS Analysis - A New Modelling Approach for 802.11e n stations in total, each queue transmitting traffic of all N ACs simultaneously. In the other scenario, referred to as “without virtual collisions”, there are n0 stations transmitting only traffic of AC 0, n1 stations transmitting only traffic of AC 1, and so forth, and finally nN-1 stations transmitting only traffic of AC N - 1. If in the latter case we assume that ni = n for all i, there is a total of n*N stations in the system. Then, both scenarios are quite similar since there is a total of n * N actively transmitting queues in both. In this case, the biggest difference between the two scenarios is whether or not virtual collisions occur within each of the n groups of N queues in the system. 3.2 How virtual collisions affect model parameters 3.2.1 The collision probability Whether virtual collisions are part of the model or not affects the definition of the collision probability. Without virtual collisions, the collision probability can be written [11]: N −1 pi = (1 − τ j ) ∏ j =0 nj (Without virtual collisions) (1 − τ i ) (6) Otherwise, if there are virtual collisions, the collision probability can instead be written [11]: N −1 pi = ∏ (1 − τ j ) nj j =0 i (With virtual collisions) ∏ (1 − τ j ) (7) j =0 3.2.2 The duration of a slot on the radio channel (the “Slot Length”) The mean duration of a slot on the radio channel, σ, can be written as the sum σ = σe + σc + σs, where: • σe is the probability that the slot is empty, (1 − pb ) , times its duration, Te, • σc is the probability that the slot contains a packet collision, times c the duration of the collision D , and • σs is the probability that the slot contains a successfully s transmitted packet times its duration D . If all packets are of the same length, the slot length can generally be written: σ = (1 − p b )Te + ( p b − p s ) D c + p s D s (8) In this case, the presence of virtual collisions only affects the collision parameter of the model. However, if packets are of different lengths, the slot length is affected. The way to calculate the mean slot length then depends on whether or not there are virtual collisions. 8 - Telenor R&I R 28/2008 WLAN QoS Analysis - A New Modelling Approach for 802.11e 3.3 The probability of a transmission on the radio channel Before estimating the slot duration with or without the existence of virtual collisions, and with or without varying packet lengths, we need to determine the probability of a transmission on the radio channel. This probability will be used later in this chapter. We define τ~i as the probability that a station transmits on the radio channel. If there are no virtual collisions in the system, τ~i is defined as: τ~i = τ i . (Without virtual collisions) (9) Otherwise, if there are virtual collisions, τ~i is defined as: N −1 τ~i = τ i ∏ (1 − τ j ) , (With virtual collisions) (10) j = i +1 where ∏ is defined so that N −1 ∏ (1 − τ j ) = (1 − τ N j N = −2 Let −1 N −1 N −1 (1 − τ j ) = 1 , ∏ (1 − τ j ) = (1 − τ N −1 ) , ∏ j = N −1 j=N )(1 − τ N − 2 ) and so forth. τ~ STA denote the probability that a STA will transmit on the radio channel. τ~ STA can be written as: N −1 τ~ STA = 1 − ∏ (1 − τ j ) . (11) j =0 This equation holds whether there are virtual collisions or not. Without virtual collisions, this relation is trivial, since obviously the probability that no queues N −1 at the STA is transmitting can be written ∏ (1 − τ j ) . In the following it will be j =0 shown that the relation is also valid if there are virtual collisions. First note that with virtual collisions, transmission attempts on a node are mutually exclusive, so that the probability that an STA will transmit on the radio channel, STA = be written as the sum τ~ N −1 N −1 N −1 i =0 i =0 j =i +1 τ~ STA , can ∑τ~i = ∑τ i ∏ (1 − τ j ) . Thus, if one is able to show that the relation N −1 N −1 N −1 i =0 j = i +1 j =0 ∑τ i ∏ (1 − τ j ) = 1 − ∏ (1 − τ j ) (12) holds for all N>1, it proves the validity of the equation above, also when there are virtual collisions. Telenor R&I R 28/2008 - 9 WLAN QoS Analysis - A New Modelling Approach for 802.11e Relation (12) is shown by induction: For N=1, we have 0 0 i =0 j = i +1 ∑τ i ∏ (1 − τ j ) = τ 0 and 1−1 1 − ∏ (1 − τ j ) = τ 0 , so the relation is obviously valid for N=1. If we assume that j =0 the relation is valid for N. Then we have for N + 1: N N ⎡ N −1 N −1 ⎤ ⎡ N −1 ⎤ N i =0 j = i +1 ⎣ i =0 j = i +1 ⎦ ⎣ j =0 ⎦ j =0 ∑τ i ∏ (1 − τ j ) = (1 − τ N )⎢∑τ i ∏ (1 − τ j )⎥ + τ N = (1 − τ N )⎢1 − ∏ (1 − τ j )⎥ + τ N = 1 − ∏ (1 − τ j ) Since the relation is also valid for N + 1, the relation is proved by induction. Q.E.D. 3.4 The probability of a busy time slot During countdown periods the access queue in consideration does not try to transmit, which means that the corresponding probabilities must be calculated as a system without that particular queue present. Similarly, during AIFSN “freeze periods” all the lower priority STAs are blocked and the probabilities must be calculated as if all these STAs were removed from the system. To write the probabilities effectively, we introduce the following vector notation where ( n 0 ,..., n N −1 ) denotes a system with n i class i queues ( i = 0,..., N − 1 ): Let pb denote the probability of a busy time slot. Note that p e = (1 − p b ) is the probability that no STA is transmitting, so that with n different queues of each AC i, we have (1 − pb ) = (1 − τ~ STA ) n . Hence: N −1 p e = p e (n 0 ,..., n N −1 ) = ∏ (1 − τ l ) n (13) p b = p b (n 0 ,..., n N −1 ) p e = 1 − p e (14) l l =0 These relations are valid whether there are virtual collisions or not. 3.5 The probability of a successful transmission The probability of a successful transmission for a class j attempt is p s , j = p s , j ( n 0 ,..., n N −1 ) = n j τ j (1 − p j ) ; j = 0,..., N − 1 (15) and further the probability of a successful transmission N −1 p s = p s (n 0 ,..., n N −1 ) = ∑ n j τ j (1 − p j ) (16) j =0 where p j is the collision probability for a class j attempt and is given by either (6) for a system without virtual collision handling or (7) for a system with virtual collision handling. 10 - Telenor R&I R 28/2008 WLAN QoS Analysis - A New Modelling Approach for 802.11e 3.6 Mean duration of a busy time slot without virtual collisions In order to study the mean duration on the radio channel of a transmission attempt, σc + σs, we first introduce an ordering function, F(j) = i, i,j in {0, 1, …, N-1} that reorders the indices access categories so that DF(j) ≤ DF(j+1). This means that by using the F(j) instead of i as the index of the AC, all the ACF(j) are ordered so that the average transmission length (i.e. transmission overhead and packet length) is non-increasing as the index j is incremented. Let us assume that in a given time slot on the radio channel, there is one or many frames attempted to be transmitted. The mean duration of this slot can be found by dividing the transmission attempts into N - 1 of mutually exclusive events: 0. Amongst the transmission attempts in a time slot on the radio channel, there is at least one frame of ACF(0), i.e. at least one frame of the shortest packet duration. 1. • Then, the duration of the time slot is then DF(0), i.e. since DF(j) ≥ DF(j+1). • The probability of this event is [1 − (1 − τ F ( 0 ) ) nF ( 0 ) ]. Amongst the transmission attempts in a time slot on the radio channel, there are no frames of ACF(0), but at least one frame of ACF(1). 2. • The duration of the time slot is then DF(1), i.e. since DF(j) ≥ DF(j+1). • The probability of this event is (1 − τ F ( 0 ) ) nF ( 0 ) [1 − (1 − τ F (1) ) n F (1 ) ]. Amongst the transmission attempts in a time slot on the radio channel, there are no frames of ACF(0) and ACF(1), but at least one frame of ACF(2), i.e. the duration of the time slot is then E(DF(2)). • The duration of the time slot is then DF(2), i.e. since DF(j) ≥ DF(j+1). • The probability of this event is (1 − τ F ( 0 ) ) ... nF (0) (1 − τ F (1) ) n F (1 ) [1 − (1 − τ F ( 2 ) ) nF ( 2) ]. (and so forth) N-1. Amongst the transmission attempts in a time slot on the radio channel, there are no frames of ACF(0)…ACF(N-2), but at least one frame of ACF(N-1), • The duration of the time slot is then DF(N-1). • The probability of this event is (1 − τ F ( 0 ) ) nF (0) (1 − τ F (1) ) n F (1) ...(1 − τ F (1) ) n F ( N −1) [1 − (1 − τ F ( N −1) ) nF ( 2) ]. 0 If we define ∏ ( f ( j )) = 0 , we can write the probabilities of an event e (being j =0 any of the events 0, 1, …, N - 1 described above) as: e ∏ (1 − τ F ( k −1) ) n F ( k −1) [1 − (1 − τ F ( e ) ) nF (e) ] (17) k =0 Telenor R&I R 28/2008 - 11 WLAN QoS Analysis - A New Modelling Approach for 802.11e and the mean delay of the transmission attempts is thus: N −1 σc + σs = j ∑ D ∏ (1 − τ j =0 F ( j) F ( k −1) ) n F ( k −1) [1 − (1 − τ F ( j ) ) nF ( j ) (18) ] k =0 It is easy to show that the mean delay of the time slot with one or many transmission attempts can be rewritten as: σc + σs = D F ( 0 ) − (1 − pb ) D F ( N −1) + N −2 ∑[D j =0 j F ( j +1) − DF ( j ) ]∏ (1 − τ F ( k −1) ) n F ( k −1) (19) k =0 N −1 where the definition pb = 1 − ∏ (1 − τ k ) nk is used. k =0 If we set all the packet lengths as equal, we have DF(j) = DF(j+1) = D for all j , and the mean delay of the time slot with one or many transmission attempts resolves to: σc + σs = p b D 3.7 Mean duration of a busy time slot with virtual collisions When considering virtual collisions, let us assume that there are n STAs, each with N-1 actively transmitting queues, i.e. when considering virtual collisions it is natural to assume that ni = n for all i ∈ {0, 1, …, N - 1}. On a station, there are N mutually exclusive transmission events during a time slot on the radio channel. These N events comprise the N-1 events that a frame of AC i i ∈ {0, 1, …, N - 1}, is transmitted, occurring at the probability τ~i , and the event that no frame is transmitted. The latter event occurs at the probability N −1 N −1 i =0 j =0 1 − ∑ τ~i = ∏ (1 − τ j ) = 1 − τ~ STA (20) according to Section 3.2. Let us first reuse the ordering function, F(j) = i, i,j in {0, 1, …, N - 1}, from Section 3.2. F(j) reorders the indices of access categories so that DF(j) ≥ DF(j+1). N −1 Note that ∑τ~ i= j F (i ) is the probability that a station transmits a frame with a duration DF(j) or longer, but no frames of durations DF(0), …, DF(j-1). Thus, N −1 (1 − (1 − ∑τ~F (i ) ) n ) is the probability that at least one station transmits a packet i= j with a duration DF(j) or longer. 12 - Telenor R&I R 28/2008 WLAN QoS Analysis - A New Modelling Approach for 802.11e DERIVATION ALTERNATIVE 1: N −1 Note that (1 − (1 − ∑τ~F (i ) ) n ) is the probability that at least one station transmits i= j N −1 a packet with a duration DF(j). Hence, N −1 (1 − (1 − ∑τ~F ( i ) ) n ) − (1 − (1 − ∑τ~ i= j i = j +1 F (i ) ) n ) is the probability that at least one station transmits a packet with a duration DF(j) or longer minus the probability that at least one station transmits a packet with a duration DF(j+1) or longer, under the condition that j < N - 1. In other words, N −1 (1 − (1 − ∑τ~F ( i ) ) n ) − (1 − (1 − i= j N −1 ∑τ~F (i ) )n ) = (1 − i = j +1 N −1 N −1 i = j +1 i= j ∑τ~F (i ) )n − (1 − ∑τ~F (i ) )n is the probability that at least one station transmits a frame of duration DF(j), but no station transmits frames of longer durations. For j = N - 1, on the other hand, (1 − (1 − τ~F ( N −1) ) n ) is the probability that at least one station transmits of frame duration DF(N-1) or longer, since there are no frames of longer duration anyway. Hence, the mean delay of the busy slot can be written: σc + σs = D F ( N −1) (1 − (1 − τ~F ( N −1) ) n ) + N −2 ∑D j =0 F ( j) N −1 N −1 ⎤ ⎡ n n ~ ~ ⎢(1 − ∑ τ F (i ) ) − (1 − ∑ τ F (i ) ) ⎥ i= j i = j +1 ⎦ ⎣ (21) If we set all the packet lengths as equal, we have Di = Di+1= E(D) for all i =0, …, N - 2, then the mean delay of the busy time slot resolves to: σc + σs = DF ( N −1) − DF (0) (1 − N −1 N −1 N −1 i =0 i =0 i =0 ∑τ~F (i) ) n = DF ( N −1) − DF (0) ∏ (1 −τ i ) n = D(1 − ∏ (1 −τ i ) n ) With ni = n, the definition of pb is: N −1 pb = 1 − ∏ (1 − τ i ) n (22) i =0 Using this definition, the mean delay of a busy time slot, given that the transmission duration of all ACs is equal to D, can be written: σc + σs = Dpb (23) DERIVATION ALTERNATIVE 2: The delay of a packet of the AC with the shortest frame duration, ACF(0), is DF(0). Therefore, the mean delay of a busy time slot is minimum equal to N −1 N −1 i =0 i =0 D F ( 0 ) (1 − (1 − ∑ τ~F ( i ) ) n ) , since (1 − (1 − ∑τ~F ( i ) ) n ) is the probability that there is a frame transmitted on the channel. We use this measure as our first approximation. However, the other ACs, AC F(1) … AC F(N-1) have all a frame duration that is at least equal to DF(1), and the probability that there are any such frames on the channel is (1 − (1 − N −1 ∑τ~ i =1 [ F (i ) ) n ) . We compensate for this in our ] first approximation by adding the term D F (1) − D F ( 0 ) (1 − (1 − N −1 ∑τ~ i =1 F (i ) ) n ) Thus, as Telenor R&I R 28/2008 - 13 WLAN QoS Analysis - A New Modelling Approach for 802.11e our improved approximation, the mean delay of a busy time slot is minimum equal to D F ( 0 ) (1 − (1 − ∑τ~F (i ) ) n ) + [DF (1) − DF (0) ](1 − (1 − ∑τ~F (i ) ) n ) . N −1 N −1 i =0 i =1 Compensating for this in the same way leads to the new approximation N −1 N −1 N −1 D (1 − (1 − τ~ ) n ) + [D − D ](1 − (1 − τ~ ) n ) + [D − D ](1 − (1 − τ~ ) n ) Finally, when F ( 0) ∑ i =0 F (i ) F (1) ∑ F ( 0) i =1 F (i ) F ( 2) F (1) ∑ i =1 F (1) we have compensated for the assumption that the delay of the ACF(N-2), DF(N-2) equals the delay of the highest ACF(N-1), DF(N-1), we have finally derived an exact expression for the mean delay of a busy time slot: σc + σs = D F ( 0 ) (1 − (1 − N −1 N −1 ∑τ~ i =0 F (i ) [ ] N −1 ) n ) + ∑ D F ( j ) − D F ( j −1) (1 − (1 − ∑ τ~F (i ) ) n ) j =1 (24) i= j We observe that this is another way of writing the same expression found for “derivation alternative 1” above. With ni = n, the definition of pb is: N −1 pb = 1 − ∏ (1 − τ i ) n (25) i =0 Using this definition, the mean delay of a busy time slot can be written: σc + σs = D F ( 0 ) p b + ∑ [D N −1 j =1 F ( j) ] N −1 − D F ( j −1) (1 − (1 − ∑ τ~F (i ) ) n ) (26) i= j As before, if we set all the packet lengths as equal, we have Di = Di+1 = D for all i = 0,…, N - 2, then the mean delay of the busy time slot resolves to: σc + σs = Dpb (27) 3.8 Mean duration of a time slot with a successful packet In the radio slots where there is only one STA performing a transmission attempt, the transmission is successful. The duration of the radio slot is determined by the length of the successfully transmitted frame. The probability of the occurrence of a successfully transmitted frame is a sum of N-1 mutually exclusive events, where the transmitted frame is of ACi , i = 0, …, N - 1. The mean duration of a slot on the radio channel that contains a successful packet is therefore: N −1 σs = ∑D nτ i =0 i i i (1 − pi ) (28) Note that the probability (1 - pi) is the probability that no other STAs are transmitting and that no higher ACi on the same STA are trying to transmit. In other words, if there are virtual collisions in the model, this is accommodated for by (1 - pi) in the expression above. Hence, the expression is valid whether or not there are virtual collisions in the system. (However, the expression for pi depends on whether there are virtual collisions or not, i.e. expressed by either (6) or (7) above. Furthermore, when considering virtual collisions it is natural to assume that ni = n for all i ∈ {0, 1, …, N - 1} in the expression, as pointed out earlier). 14 - Telenor R&I R 28/2008 WLAN QoS Analysis - A New Modelling Approach for 802.11e If we set all the packet lengths as equal, we have DF(j) = DF(j+1) = D for all j, and the mean delay of a time slot with a successfully transmitted packet resolves to: N −1 σs = D ∑p i =0 i ,s =Dp s (29) 3.9 Mean duration of a time slot with a frame collision without virtual collisions In the radio slots where more than one frame is attempted to be transmitted, a collision will occur. The mean delay of a collision is the mean delay of a busy slot (i.e. a slot containing one or more transmission attempts) minus the mean delay of a slot containing exactly one transmission attempt: N −1 N −1 N −1 σc = D p + [ D − D ] (1 − τ ) n [1 − (1 − τ ) n ] − D n τ (1 − p ) ∑ j −1) j ∏ k ∑ F ( j) j j 0 b i j k j =1 i (30) j =0 k = j +1 This expression is derived by subtracting equation (28) from (18) above. If we set all the packet lengths as equal, we have Di = Dj+1 = D for all j =0, …, N - 2, and the mean delay of a time slot with a collision resolves to: σc = D ( p b − p s ) (31) 3.10 Mean duration of a time slot with a frame collision with virtual collisions When considering the virtual collisions, the mean delay of a collision is the mean delay of a busy slot (calculated with virtual collisions) minus the mean delay of a slot containing exactly one transmission attempt (also calculated with virtual collisions): σc = D p + [D − D ∑ F ( j ) F ( j −1) ](1 − (1 − ∑τ~F (i ) )n ) − ∑ DF ( j ) n jτ j (1 − p j ) F (0) b N −1 N −1 N −1 j =1 i= j j =0 (32) This expression is derived by subtracting equation (28) from (21) above. If we set all the packet lengths as equal, we have Di = Dj+1 = D for all j =0, …, N - 2, and the mean delay of a time slot with a collision resolves to: σc = D ( p b − p s ) . 3.11 The slot length distribution for the RTS/CTS case both with and without virtual collisions (using the Laplace transform) When considering the slot length above we have assumed that all data traffic are sent with the basic medium access mechanism, comprising a two-way handshake of a DATA frame and the return of an ACK (acknowledgment) frame. However, there is also an alternative access mechanism where the DATA and ACK exchange is preceded by an exchange of an RTS (request-to-send) and a Telenor R&I R 28/2008 - 15 WLAN QoS Analysis - A New Modelling Approach for 802.11e CTS (clear-to-send) frame. The latter mechanism results in a four-way handshake. In the DATA/ACK case considered above, the duration of a slot with a successfully transmitted packet, as well as the duration of a slot with a packet collision, are given by the packet lengths. However, with the RTS/CTS mechanism, all collisions (at least in theory) are resolved during the RTS/CTS exchange. Since this exchange has a fixed, predefined duration, the durations of the collisions are not dependent on packet lengths. In this section, we will consider this case. N −1 Recall first that the idle/busy channel probabilities are pe = ∏ (1 − τ l ) nl and l =0 pb = 1 − pe and that the probability of a successful transmission for a class j N −1 attempt is p s , j = n jτ j (1 − p j ) for j = 0,..., N − 1 . Recall also that p s = ∑ p s ,i is the j =0 probability of a successful transmission where p j is the collision probability for a class j attempt and is given by either (6) for a system without virtual collision handling or (7) for a system with virtual collision handling. For the RTS/CTS case the duration of a collision is constant and equal for all ACs, i.e. we have DiC = D C ; i = 0,..., N − 1 . With this assumption the Laplace transform of the duration of the generic slot length Σ( s ) will be the weighted sum: N −1 Σ( s ) = (1 − pb )e − sT + ∑ p s ,i e e i =0 − sD S + ( pb − p s )e − sD C (33) and the corresponding mean slot length is easily found by differentiation: N −1 σ = (1 − pb )T e + ∑ ps ,i DiS + ( pb − ps ) D C . i =0 16 - Telenor R&I R 28/2008 (34) WLAN QoS Analysis - A New Modelling Approach for 802.11e 4 Using the Laplace transform to obtain the access delay distribution Except for a few earlier works (especially [13] but also [12] and [15]) where the z-transform has been used to obtain the distribution of channel access delay, the main focus has been on deriving expressions for the mean access delay. However, to be able to obtain higher layer delay due to queueing, we need to analyse the distribution of the access delay. This queueing delay will contribute to the overall delay and thus be part of the corresponding QoS over the WLAN. Since we propose a non-slotted model for analysing the 802.11e EDCA mechanism, we use the Laplace transform rather than the z-transform as the tool to describe the delay distribution. Another aspect is also that the Laplace transform is more commonly used in queueing analysis, and hence many results are given in terms of Laplace rather than z-transforms. 4.1 Description of the delay components We let DiSat denote the channel access delay for a successful transmission for AC i . In the following we shall find an expression for the Laplace transform DiSat ( s ) = E[ s − sDi ] of the access delay. Sat For AC i we define the following (discrete) stochastic variables: • the number of retries (collisions) before obtaining a successful C Ni transmission • CD N i, j the (starting) value of the backoff counter for the j ’th retry attempt; j = 0,1,..., Li where Li is the retry limit By assuming a fixed collision probability for each transmission attempt; follows that C P ( N i = j ) = (1 − p i ) p i j pi , it ; j = 0,1,..., Li is a (truncated) geometrical distribution, and we also define C P ( N i = Li + 1) = P ( drop ) = pi Li +1 as the probability that a frame is dropped due to expiration of the retry limit. For each retry attempt j the backoff counter is chosen from a uniform distribution over [0, Wi , j − 1] , i.e., CD P( N i, j = l ) = 1 Wi , j ; l = 0,1,..., Wi , j − 1 , where Wi , j is the corresponding window size. Similarly, we also define the corresponding (stochastic) delay components: • DiS the delay for a successful transmission which is assumed to be constant, • DiC, j the delay for the j ’th (unsuccessful transmission) retry which is assumed to be constant equal to DiC ; independent of the actual retry number, • DiCD , j ,k the delay in connection with the k ’th countdown decrement cycle for the j ’th retry also including periods where the countdown process is frozen due to AIFS differentiation. Telenor R&I R 28/2008 - 17 WLAN QoS Analysis - A New Modelling Approach for 802.11e Hence we have: DiSat = DiS + CD N iC N i , j −1 N iC −1 ∑ DiC, j + ∑ j =0 DiCD ∑ , j ,k k =0 j =0 (35) for a transmission attempt that is successful, i.e. that is not dropped due to the retry limit and Sat i D Li = ∑D j =0 C i, j CD Li N i , j −1 +∑ ∑ DiCD, j ,k (36) j =0 k =0 for a transmission attempt that is dropped due to expiration of the retry limit. In these expressions j = 0 in the last (double) sums represents the delay due to post-backoff, which is part of the access delay (Figure 4). Idle -Idle state -Collision -Successful 1 − ρi -Countdown pi states 1 / Wi , 0 1 − pi ρ i (1 − p i ) Post-backoff DS ρ i pi D 0C D i,0,0 D i , 0 ,1 D i , 0 ,W Di ,1, 0 Di ,1,1 Di ,1,W i,0 D i , 0 ,W −2 i ,0 −1 1 / W i ,1 1 − pi 1’st retry DS pi D 1C Di ,1,W i ,1 − 2 i , 1 −1 1 / Wi , j 1 − pi j’st retry DS Di , j ,0 pi D Cj Di , j ,1 Di , j ,W Di , j ,W i , j −2 i , j −1 1 / W i , j +1 1 / W i , Li 1 − pi Li’st retry DS pi Drop Figure 4 Di , Li , 0 Di , Li ,1 Di , L ,W 1 i , Li −2 Di , L ,W i i , Li −1 Countdown diagram with the different states 4.2 The Laplace transform of the access delay We now assume that the stochastic variables are all independent and take DiS ( s ) = s − sDi as the Laplace transform for a successful transmission and S further DiC, j identically distributed for j = 0,1,..., Li with the Laplace transform DiC ( s ) = e − sDi . When first entering the window countdown procedure for each C 18 - Telenor R&I R 28/2008 WLAN QoS Analysis - A New Modelling Approach for 802.11e retry attempt, i.e. when k = 0 , one has to perform a full AIFS deferring period before sensing if the channel is idle or not. This is not the case for the other states k = 1,..., Wi , j − 1 where the countdown occurs if the channel is idle. Hence AIFS we have DiCD and an ordinary , j , 0 as the sum of an AIFS deferring period Di CD countdown period DiCD , . For the other countdown periods Di , j , k we assume that they are all identically distributed with Laplace transforms DiCD ( s ) = E[ s k = 1,..., Wi , j − 1 ; and further the Laplace transform for D E[ s ] = DiAIFS ( s ) DiCD ( s ) ; j = 0,1,..., Li . By conditioning on E[e −sD Sat i E[e −sD Sat i ] for is CD i , j ,0 − sDiCD , j,0 − sDiCD , j ,k C Ni C Ni CD = j; N i ,s = l s , and C Ni = j CD N i ,s = l s s = 0,1,..., j we may write: ( ) ∏ (D CD i (s) ) ∏ (D CD i ( s) s = 0,1,..., j ] = DiS ( s ) DiAIFS ( s ) DiC ( s ) CD = L i + 1; N i , s = l s , ( s = 0,1,..., Li ] = DiAIFS ( s ) DiC ( s ) j j Li +1 s =0 Li s =0 ) ls ) ls for j = 0,1,..., Li and . Finally by un-conditioning we obtain: DiSat ( s) = E[ s − sDi ] Sat ( Li ) ( AIFS = (1 − pi ) DiS ( s )∑ pi DiAIFS ( s ) DiC ( s ) Dilevel ( s ) DiC ( s) , j ( s ) + p i Di j ) j =0 Li +1 Dilevel , Li ( s ) (37) where we have defined the product j stage Dilevel ( s ) with Distage ( s) = , j ( s ) = ∏ Di ,l ,l l =0 ( ) Wi , l 1 1 − DiCD ( s ) Wi ,l 1 − DiCD ( s ) (38) The Laplace transform DiSat (s) is the key for the further analysis. After differentiating, we find the mean channel access delay as: ⎛ ⎞ R1 p E[ DiSat ] = (1 − p L +1 )⎜⎜ DiS + i ( DiC + E[ DiAIFS ]) ⎟⎟ + i E[ DiCD ] 1 − pi ⎝ ⎠ 2 i i (39) and R i is given by the sum: 1 Li Ri1 = ∑ pij (Wij − 1) (40) j =0 By performing the summation for the case m i ≤ Li the following explicit expression for Ri1 is obtained: m +1 L +1 ⎛ 1 − (2 pi ) m +1 ⎞ 1 − pi L +1 p − pi ⎟− Ri1 = Wi 0 ⎜ + 2m i ⎜ 1− 2 p ⎟ 1− p 1 − pi i i ⎝ ⎠ i i i i (41) i Higher order moments of the access delay Di Sat are possible to obtain. Telenor R&I R 28/2008 - 19 WLAN QoS Analysis - A New Modelling Approach for 802.11e 4.3 Specification of the countdown delay To complete the description of the access delay we also need to specify the countdown delay DiCD . This modelling will be a very important part of the analysis, since the AIFSN differentiation must be included in this delay. To do that we introduce a so-called “AIFSN freeze counter” for each window countdown state representing the slots where a STA is blocked due to AIFSN differentiation; i.e. these slots are only available for higher priority STAs. Hence, for a STA from a particular AC to be able to decrease the backoff counter by one, Ai consecutive slots have to be idle (for the higher priority STAs), and then also the next slot must be idle. Hence, we decrease the AIFS freeze counter by one for each idle slot (for higher priority STAs). If some of the above mentioned slots are taken, the freeze counter is reset to its initial value Ai and the algorithm is repeated, see Figure 5. For an ordinary countdown period (not the first one after a retry) the delay is the slot length T e if the channel is sensed idle with probability g i . However, if the channel is sensed busy with the delay of a transmission attempt DiTr with probability 1 − g i , the STA enters an AIFS deferring period with delay DiAIFS . D iAIFS D iCD 1− gi gi Te Figure 5 D iTr Model for the backoff window countdown period Then after each AIFS deferring period DiAIFS , with probability g i the channel is idle for a duration equal to the length of a slot length T e . Otherwise (i.e. with probability 1 − g i ), the channel is busy or a duration DiTr corresponding to the length of a transmission attempt, either successful or not. In the latter case, the freeze counter is reset and a new AIFS freeze countdown period is entered. The Laplace transform of the countdown delay DiCD (s) is therefore obtained as a geometrical sum of contributions, and may be written as: DiCD ( s ) = g i e − sT 1 − (1 − g i ) DiTr ( s ) DiAIFS ( s ) e (42) To obtain the delay for the AIFSN freeze countdown period, we consider the delay in a system consisting of Ai stages where the time spent in each stage k = (1,..., Ai ) is either the slot length T e , with probability hi ,k , or DiTr,k , the delay corresponding to the duration of a transmission attempt, either successful or not, with probability 1 − hi ,k , and the freeze counter is reset and enters the first level, see Figure 6. During the AIFSN freeze period all the lower priority STAs 20 - Telenor R&I R 28/2008 WLAN QoS Analysis - A New Modelling Approach for 802.11e are blocked and do not contribute to the corresponding “idle” channel probabilities hi ,k . Therefore the probabilities hi ,k have to be different form g i above (and hence these “idle” channel probabilities will depend on the stage k ). We denote Di ,k the time it takes to reach level k + 1 for the first time (without including the service time of that level). Recursively, we then obtain the following relations between the Laplace transforms Di ,k ( s ) : Di , k ( s ) = hi ,k e − sT Di ,k −1 ( s ) e 1 − (1 − hi ,k ) DiTr,k ( s ) Di ,k −1 ( s ) for k = 1,..., Ai (43) where we define Di , 0 ( s ) = 1 . D i ,1 1 − h i ,1 h i ,1 Te D iTr,1 D i,2 1 − hi ,2 hi , 2 Te D iTr, 2 D iAIFS = D i , A i hi , A i 1 − hi , A i Te Figure 6 D iTr, Ai Model for the delay of an AIFSN freeze period By taking k = Ai as a starting point and then by using (43) recursively, we obtain the Laplace transform of the AIFSN freeze period DiAIFS (s ) as a (finite) continued fraction on the form: hi , A e −sT hi , A −1e − sT ... e i e i DiAIFS ( s) = Di , A ( s ) = 1 − (1 − hi , A ) D i i 1 − (1 − hi , A ) D ( s) i Tr i , Ai Tr i , Ai −1 − sTe i , Ai −1 ( s )... h e (44) .... 1 − (1 − hi , A −1 ) DiTr, A −1 ( s)... i i Telenor R&I R 28/2008 - 21 WLAN QoS Analysis - A New Modelling Approach for 802.11e (If Ai = 0 for some values of i , the AIFSN freeze period is set to zero, and hence we may write Di , Ai ( s) = 0 for those cases.) Although (44) gives an explicit expression for the Laplace transform DiAIFS (s ) the recursion (43) is more useful and gives an effective algorithm to calculate the transform numerically. Moreover, it is also effective to obtain the moments of the delay. Differentiating the relation (43) gives: E[ Di ,l ] = E[ Di ,l −1 ] + Gi ,l hi ,l where (45) Gi ,l = hi ,l T e + (1 − hi ,l ) E[ DiTr,l ] for l = 1,..., Ai . (46) Solving the recursion (45) gives: E[ Di ,k ] = 1 (Gi,1 + hi,1Gi,2 + ... + hi,1hi,2 ....hi,k −1Gi,k ) for k = 1,..., Ai hi ,1hi , 2 ...hi ,k (47) Where the expression for Gi ,l is given by (46). Similarly for the second order moment we find: E[ Di ,l −1 ] + Gi2,l 2 E[ Di ,l ] = 2 hi ,l where 2 (48) 2 Gi2,l = hi ,l T e + (1 − hi ,l ) E[ DiTr,l ] − 2(hi ,l T e + (1 − hi ,l ) E[ DiTr,l ]) 2 + (49) 2hi ,l (1 − hi ,l ) E[ Di ,l ]2 + 2hi ,l (2(hi ,l T e + (1 − hi ,l ) E[ DiTr,l ]) − T e ) E[ Di ,l ] for l = 1,..., Ai . As above we find the following expression for the second order moment: E[ Di ,k ] = 2 ( 1 Gi2,1 + hi ,1Gi2, 2 + ... + hi ,1hi , 2 ....hi ,k −1Gi2,k hi ,1hi , 2 ...hi ,k ) for (50) k = 1,..., Ai where Gi2,l is given by (49) (and (46) and (47) give expressions for E[ Di ,k ] ). Finally by differentiating (42) we obtain the following expressions for the first two moments of the (window) countdown delay: E[ DiCD ] = T e + 1 − gi ( E[ DiTr ] + E[ Di , Ai ]) gi (51) where expression for E[ Di , Ai ] is given by (47) and 2 2 E[ DiCD ] = T e + ⎛ 1 − gi 2⎜⎜ ⎝ gi ( ) 2 2 (1 − g i ) E[ DiTr ] + 2 E[ DiTr ]E[ Di , A ] + E[ DiTr ] + 2T e ( E[ DiTr ] + E[ Di , A ]) + gi i 2 ⎞ ⎟⎟ ( E[ DiTr ] + E[ Di , A ]) 2 ⎠ i (52) i where expressions for E[ Di , Ai ] and E[ Di , A 2 ] are given by (47) and (50) above i (and we define E[ Di , A ] = E[ Di , A ] = 0 if Ai = 0 ). 2 i i In the following we shall assume that all the freeze countdown delays DiTr,k are equally distributed according to DiTrFr (which may be different from the delay 22 - Telenor R&I R 28/2008 WLAN QoS Analysis - A New Modelling Approach for 802.11e DiTr since during the AIFSN freeze periods only the higher priority STAs are active) and also that “freeze idle channel” probabilities hi ,k = hi are all equal for k = 1,..., Ai . With these assumptions the summations in (47) yield the summation of geometrical series, and we obtain: E[ DiAIFS ] = E[ Di , Ai ] = 1 − hi hi Ai Ai ( E[ DiTrFr ] + hi T e) 1 − hi (53) and hence: E[ DiCD ] = T e + 1 − gi gi Ai ⎛ ⎞ ⎜ E[ DiTr ] + 1 − hAi ( E[ DiTrFr ] + hi T e ) ⎟ i ⎜ ⎟ 1 − hi hi ⎝ ⎠ (54) (Observe that (54) also applies for the ACs where Ai = 0 since the last term including Ai vanishes.) The second order moment is given by (52) where we find the following explicit expression for the second order moment of the AIFSN freeze delay period: AIFS 2 i E[ D ] = E[ Di , Ai 2 A ⎛ 1 − hi Ai 1 − hi i hi TrFr 2 e2 ⎜ E D T ]= ( [ ] + ) + 2 i A ⎜ h Ai 1 − hi hi i ⎝ i 2 ⎞ ⎟ ( E[ DiTrFr ] + hi T e ) 2 ⎟ 1 − hi ⎠ A (1 − h ) 1 − h i h Te − 2( i Ai i − Ai −i1 )( E[ DiTrFr ] + i T e ) 1 − hi (1 − hi ) hi hi (55) A To complete the description above we must specify the “media idle” probabilities g i and hi ,k , as well as the Laplace transforms of the corresponding duration of a transmission attempt DiTr (s) and DiTr, k ( s ) . 4.4 Delay distributions during countdown and freeze periods To find the Laplace transform D Tr (s) for the duration of a transmission attempt, we limit ourselves to the case where the duration of colliding transmissions are all equal i.e. we take DiC = D C ; i = 0,..., N − 1 . With this assumption the Laplace transform will be a weighted sum: N −1 p s ,l l =0 pb D Tr ( s ) = D Tr ( s; n 0 ,..., n N −1 ) = ∑ e − sDl + (1 − S p s − sD C )e pb (56) The corresponding first two moments are easily found by differentiation: N −1 p s ,l l =0 pb E[ D Tr ] = D1Tr ( n 0 ,..., n N −1 ) = ∑ N −1 p s ,l l =0 pb E[ D Tr ] = D 2 Tr ( n 0 ,..., n N −1 ) = ∑ 2 DlS + (1 − 2 ps ) D C and pb (57) ps 2 )D C pb (58) DlS + (1 − The corresponding results valid during the countdown period of a class i transmission are found by removing that particular queue, i.e. by letting n i → n i − 1 . Hence we have for i = 0,..., N − 1 : g i = pe (n0 ,..., ni − 1,..., n N −1 ) , (59) Telenor R&I R 28/2008 - 23 WLAN QoS Analysis - A New Modelling Approach for 802.11e DiTr ( s) = DTr ( s; n0 ,..., ni − 1,..., nN −1 ) , (60) E[ DiTr ] = D1Tr (n 0 ,..., ni − 1,..., n N −1 ) and (61) 2 (62) E[ DiTr ] = D 2 Tr ( n 0 ,..., n i − 1,..., n N −1 ) For the AIFSN differentiation we assume that the parameters are ordered so that A0 ≤ A1 ≤ .... ≤ AN −2 ≤ AN −1 = 0 , i.e. the queues with priority l have AIFSN parameter AN −l ; l = 1,..., N . We consider only the cases where Ai > 0 . (If Ai = 0 there will be no freeze countdown for that class.) For each “freeze counter” value k we let lk be the largest integer such that k > AN −l , i.e. lk = max {l k > AN −l }. l =1,..., N Then all the queues with lower priority than lk are blocked due to AIFSN differentiation, and hence all these low priority queues must be removed from the calculations. We find for i = 0,..., N − 1 ; k = 1,..., Ai : hi , k = pe (0,...,0, n N −l ,..., n N −1 ) , (63) DiTr,k ( s ) = D Tr ( s;0,...,0, n N −l ,..., n N −1 ) , (64) E[ DiTr,k ] = D1Tr (0,...,0, n N −l ,..., n N −1 ) and (65) k k k 2 (66) E[ DiTr,k ] = D 2Tr (0,...,0, nN −lk ,..., nN −1 ) For the approximation where we assume that all the freeze countdown delays DiTr,k are equally distributed according to DiTrFr and where the “freeze idle channel” probabilities hi ,k = hi are all equal, we take the value for k = Ai in the expression above, i.e. hi = hi , Ai , DiTrFr ( s ) = DiTr, A ( s ) , E[ DiTrFr ] = E[ DiTr, A ] and i TrFr 2 i E[ D Tr 2 i , Ai ] = E[ D i ]. Observe that the derivation above covers both the RTS/CTS case and also the case where all packet lengths are equal. 24 - Telenor R&I R 28/2008 WLAN QoS Analysis - A New Modelling Approach for 802.11e 5 The queueing delay The access delay only gives part of the delay for frames competing for transmission over the shared 802.11e radio network. For each STA there is a transmission queue - and hence a waiting time - associated to each AC. This waiting time has to be added to the access delay to get the performance of the WLAN. Seen as a whole, the STAs and the radio channel may be viewed as a single server where several queues are attached and where the EDCF regulates the usage of the server. Approximately, however, when seen from a particular queue, the system acts as a single server queue. The service time equals the time duration from a frame is at the front of the queueing device until it has completed the transmission over the radio channel also have completed the post backoff. Thus, the service time is equal to DiSat , which is given by (35) or (36), and with the Laplace transform DiSat ( s ) = E[ s − sDi ] by (37). Sat In this view, the interaction between the different STAs is incorporated in the collision probabilities, as well as in the parameters describing the countdown delay. Hence with this approximation and the assumption of Poisson arrival processes, we may describe the queueing delay by an M/G/1 model. If we denote the waiting time in the access queue as Wi Sat , then the PollaczekKhinchin formula [16] gives the Laplace transform Wi Sat ( s ) = E[ s − sWi ] as: Sat Wi Sat ( s) = s(1 − ρ i ) s − λi (1 − DiSat ( s)) (67) and further the mean waiting time E[Wi Sat ] is given as: 2 E[Wi Sat ] = λi E[ DiSat ] 2(1 − ρ i ) (68) Hence, the first order moment of the waiting time Wi Sat requires the second order moment of DiSat as well as the load ρ i = λi E[ DiSat ] . After some algebra we obtain by differentiating (37) twice: ⎛ 2 2 2 2 ⎞ p E[ DiSat ] = 1 − p Li i +1 ⎜⎜ DiS + i ( DiC + 2 DiC E[ DiAIFS ] + E[ DiAIFS ]) ⎟⎟ + 1 − pi ⎝ ⎠ ( ) ⎛ ⎞ p p 2( DiC + E[ DiAIFS ]) 1 − ( Li + 1) p Li i + Li p iLi +1 ⎜⎜ DiS + i ( DiC + E[ DiAIFS ]) ⎟⎟ i + 1 − pi ⎝ ⎠ 1 − pi ( ( D + E[ D C i AIFS i (E[ D ]) ⎛⎜⎜ R3 CD i 4 i 2 ⎝ ) ⎡⎛ ⎤ ⎞ p ]) ⎢⎜⎜ DiS + i ( DiC + E[ DiAIFS ]) ⎟⎟ Ri1 − p Li i +1Ri2 + ( DiC + E[ DiAIFS ]) Ri3 ⎥ + 1 − pi ⎠ ⎣⎢⎝ ⎦⎥ ( + ) (69) 1 2 R Ri5 − Ri3 ⎞ ⎟ + E[ DiCD ] i 2 ⎟⎠ 2 where the sum Ri1 is given by (41) and the other sums Ri2 , …, Ri5 are defined by: Li Ri2 = ∑ (Wij − 1) , (70) j =0 Telenor R&I R 28/2008 - 25 WLAN QoS Analysis - A New Modelling Approach for 802.11e Li Ri3 = ∑ jpij (Wij − 1) , (71) j =1 Li Ri4 = ∑ pij (Wij − 1)(Wij − 2) and (72) j =0 Li j −1 j =1 s =0 Ri5 = ∑ pij (Wij − 1)∑ Wis ; (73) where the two first moments of DiAIFS and countdown delay DiCD are given in section 4.3. Moreover, explicit expressions for the sums Ri2 , …, Ri5 are given in the Appendix. 26 - Telenor R&I R 28/2008 WLAN QoS Analysis - A New Modelling Approach for 802.11e 6 Concluding remarks 6.1 Summary This document presents an analytical method to calculate the performance of 802.11 systems in general, and the differentiation characteristics of 802.11e in particular. Like similar analytical methods, it is based on a Markov model of the system. The main contribution of this document is the proposal of a new method for finding the system performance. Our proposed method is ensuring consistency between the macro-view and micro-view of the system. Previous methods, on the contrary, are mainly focusing on the micro-view, and inconsistency between these two views could therefore be observed when the distribution of the time the system spends in a Markov state could differ between two different states. With the new method the system characteristics can be found by using the macro-view approach, instead of using the micro-view approach. The macroview approach represents a great simplification compared to previous methods, because the state distributions of the Markov chain do not have to be resolved. Instead, the system characteristics are found directly by studying the time the system spends in each of the Markov states, and the state distributions do not need to be resolved. Furthermore, we have also provided extensions compared to our previous method. The first extension is to allow for different packet lengths for different access categories, in contrast to our previous model, where we assumed that all packets of all access categories were of the same length. The packet length primarily influences the mean duration of the slot length on the radio channel. The slot length was found both for a system with virtual collisions and for a system without virtual collisions. The second extension is model for the AIFS differentiation of 802.11e that is more physically detailed than that in our previous work. Since the new method accounts for an arbitrary delay of each Markov state, the Laplace transform is more appropriate than the z-transform. While our previous work used the z-transform to study the delay characteristics of the Markov chain and of the system in general, this document analyses the delay with the Laplace transform. The access delay and the queueing delay are found by the Laplace transform. 6.2 Issues for further work The scope of our work was to provide consistency, simplifications and model extensions. However, we went a step further and started simulation work to fine-tune the model in accordance with the simulation tool. As this can be quite a time-consuming task, we started the work more than a month before the deadline of this document. Unfortunately, after three weeks of work a disc crash occurred. Our work was lost, and the simulation results could not be presented in this report. However, carrying out this task would be a fruitful issue for further work, since a fine-tuned model might be used to calculate the performance of the WLAN systems of Telenor with higher accuracy. Telenor R&I R 28/2008 - 27 WLAN QoS Analysis - A New Modelling Approach for 802.11e The model can also be used to gain further insight into WLAN technology and performance. For example, it could prove useful to do a comparison study between different AIFS mechanisms. Since the high priority traffic, such as voice, typically consists of short packets, while low priority best-effort traffic typically consists of long packets one should also study the effect that the packet length has on the differentiation features of the system. It might also be valuable for Telenor to use the model to explore more realistic scenarios, including actual services, different traffic patterns, asymmetry in the patterns etc. The performance of TCP over WLAN, including the layer interactions between WLAN differentiation and TCP congestion control, is also an issue that deserves further exploration. 28 - Telenor R&I R 28/2008 WLAN QoS Analysis - A New Modelling Approach for 802.11e References [1] Bianchi, G., "Performance Analysis of the IEEE 802.11 Distributed Coordination Function", IEEE J-SAC Vol. 18 N. 3, Mar. 2000, pp. 535-547. [2] Ziouva, E. and Antonakopoulos, T., "CSMA/CA performance under high traffic conditions: throughput and delay analysis", Computer Communications, vol. 25, pp. 313-321, Feb. 2002. [3] Xiao, Y., "Performance analysis of IEEE 802.11e EDCF under saturation conditions", Proceedings of ICC, Paris, France, June 2004. [4] Malone, D.W., Duffy, K. and Leith, D.J., "Modelling the 802.11 Distributed Coordination Function with Heterogeneous Load", Proceedings of Rawnet 2005, Riva Del Garda, Italy, April 2005. [5] G. Bianchi and I. Tirinello, “Remarks on IEEE 802.11 DCF Performance Analysis”, IEEE Comm Lett., vol. 9, no. 8, Aug. 2005. [6] Y. Xiao, “Performance analysis of priority schemes for IEEE 802.11 and IEEE 802.11e wireless LANs”, IEEE Trans. Wirel. Comm., vol. 9, no. 4, July 2005. [7] P. E. Engelstad and O. Østerbø, “Analysis of QoS in WLAN”, Telectronikk , vol 1, 2005. [8] Engelstad, P.E., Østerbø O.N., "Non-Saturation and Saturation Analysis of IEEE 802.11e EDCA with Starvation Prediction", Proceedings of the Eighth ACM International Symposium on Modeling, Analysis & Simulation of Wireless and Mobile Systems (ACM MSWiM 2005), Montreal, Canada, Oct. 10-13, 2005. [9] Engelstad, P.E., Østerbø O.N., "An Analytical Model of the Virtual Collision Handler of 802.11e", Proceedings of the Eighth ACM International Symposium on Modeling, Analysis & Simulation of Wireless and Mobile Systems (ACM MSWiM 2005), Montreal, Canada, Oct. 10-13, 2005. [10] Engelstad, P.E., Østerbø O.N., "Differentiation of Downlink 802.11e EDCA Traffic in the Virtual Collision Handler", Proceedings of the 30th Annual IEEE Conf. on Local Computer Networks (LNC ’05), WLN, Sydney, Australia, Nov. 15-17, 2005. [11] Engelstad, P.E., Østerbø O.N., "Delay and Throughput Analysis of IEEE 802.11e EDCA with AIFS Differentiation under Varying Traffic Loads", Proceedings of the 30th Annual IEEE Conf. on Local Computer Networks (LNC ’05), WLN, Sydney, Australia, Nov. 15-17, 2005. [12] Engelstad, P.E., Østerbø O.N., "Queueing Delay Analysis of 802.11e EDCA", Proceedings of The Third Annual Conference on Wireless On demand Network Systems and Services (WONS 2006), Les Menuires, France, Jan. 18-20, 2006. [13] Engelstad, P.E., Østerbø O.N., "The Delay Distribution of IEEE 802.11e EDCA", Proceedings of the 25th IEEE International Performance Computing and Communications Conference (IPCCC'06), Phoenix, Arizona, April 10 - 12, 2006. Telenor R&I R 28/2008 - 29 WLAN QoS Analysis - A New Modelling Approach for 802.11e [14] Engelstad, P.E., Østerbø O.N., "Closed-form Solution of the Bianchi Model for 802.11 DCF and IEEE 802.11e EDCA", Proceedings of the 15th IST Mobile & Wireless Communication Summit (ISTsummit’06), Myconos, Greece (Hellas), June 4-8, 2006. [15] Engelstad, P.E., Østerbø O.N., "Analysis of the Total Delay of IEEE 802.11e EDCA and 802.11 DCF", Proceedings of IEEE International Conference on Communication (ICC'2006), Istanbul, June 11-15, 2006. [16] Kleinrock, L., “Queueing Systems,Vol. 1”, John Wiley, 1975. [17] Abate J.,Whitt W., Numerical Inversion of Laplace Transforms of Probability Distributions, ORSA Journal on Computing, Vol. 7, No.1, Winter 1995, pp 38-43. [18] Abate, J., Valko P. P.,Multi-precision Laplace transform inversion, Int. J. Numer. Meth. Engng. 2004; 60, pp 979–993. [19] Wong R. 1989. Asymptotic Approximations of Integrals, Academic Press, Inc. San Diego, CA. 30 - Telenor R&I R 28/2008 WLAN QoS Analysis - A New Modelling Approach for 802.11e 7 Appendix 7.1 Sums By performing the summation for the case mi ≤ Li we obtain the following explicit expressions for the sums Ri2 ,…, Ri5 : ( ) Ri2 = Wi 0 2 m ( 2 + Li − mi ) − 1 − ( Li + 1) i ( (74) ) ⎛ 2 p 1 − ( mi + 1)(2 pi ) m + mi (2 pi ) m +1 + Ri3 = Wi 0 ⎜ i ⎜ (1 − 2 pi )2 ⎝ 2 mi ( pi (mi + 1) pi i mi − mi pi mi +1 i − (Li + 1) pi + Li pi Li Li +1 (1 − pi )2 )⎞⎟ + p (1 − (L + 1) p ⎟ ⎠ i i Li i (1 − pi )2 + Li pi Li +1 ) mi +1 L +1 mi +1 − pi i ⎞⎟ 2 ⎛ 1 − ( 4 pi ) mi pi Ri4 = Wi 0 ⎜ + 4 ⎜ 1− 4p ⎟− 1 − pi i ⎝ ⎠ (76) m +1 L +1 L +1 ⎛ 1 − (2 pi ) mi +1 1 − pi i p i − pi i ⎞⎟ 3Wi 0 ⎜⎜ + 2 mi i + 2 ⎟ 1 − pi 1 − pi ⎝ 1 − 2 pi ⎠ mi +1 ⎛ 1 − (2 pi ) mi +1 1 − pi mi +1 ⎞ 1 − (2 pi ) mi +1 ⎞ 2 ⎛ 1 − ( 4 pi ) ⎟+ ⎟ − Wi 0 ⎜ Ri5 = Wi 0 ⎜⎜ − − ⎟ ⎜ 1− 2p 1 − 2 pi ⎠ 1 − pi ⎟⎠ i ⎝ 1 − 4 pi ⎝ ( ) ( m L L +1 m +1 L +1 ⎛ p p i − (Li − mi + 1) pi i + ( Li − mi ) pi i pi i − pi i ⎞⎟ mi Wi 0 2 Wi 0 − 1 ⎜⎜ 2 mi i i + − 2 1 ⎟ 1 − pi (1 − pi )2 ⎝ ⎠ ( ) mi (75) ) (77) The sum S kN = N ∑ j ( j − 1)...( j − k ) = j = k +1 ( N + 1) N ( N − 1)...( N − k ) for N ≥ k + 1 ( k + 2) Proof by induction: Ok for N = k + 1 . Assume hypothesis ok for N ≥ k + 1 then S kN +1 = S kN + ( N + 1) N ( N − 1)...( N + 1 − k ) = ( N + 1) N ( N − 1)...( N − k ) + ( N + 1) N ( N − 1)...( N + 1 − k ) (k + 2) ⎛ N − k ⎞ ( N + 2)( N + 1) N ( N − 1)...( N + 1 − k ) = ( N + 1) N ( N − 1)...( N + 1 − k )⎜ + 1⎟ = (k + 2) ⎝ k +2 ⎠ i.e. hypothesis ok for N + 1 . 7.2 Elements of Laplace inversion Suppose we are working with a stochastic variable W where the Laplace ~ transform W ( s) = E[e − sW ] is known. Then the probability density function (PDF) Telenor R&I R 28/2008 - 31 WLAN QoS Analysis - A New Modelling Approach for 802.11e and distribution function (DF) may be written by the inversion integral as follows: w(t ) = ~ 1 e stW ( s )ds and 2πi ∫γ W (t ) = P{W ≤ t} = (78) 1 e st ~ W ( s )ds 2πi ∫γ s (79) { } where the integration line is parallel with the imaginary axis γ = s s =a + iy and where a > 0 is a constant and y ∈ (−∞, ∞) . Numerical inversion of Laplace transforms is generally difficult, but several methods are available in the literature [17], [18]. It is possible to obtain an accurate approximation of the inversion of Laplace transforms by applying Large Deviation (LD) theory. Normally this is done by writing the inversion integral above on the following form: w(t ) = 1 e f ( s ,t ) ds 2πi ∫γ W (t ) = 1 + (80) 1 e f ( s ,t ) ds where 2πi ∫γ s ~ f ( s, t ) = st + log(W ( s)) (81) (82) We have changed the integration in the last integral to a line to the left of the origin, i.e. γ = s s =a + iy where a < 0 . (By doing this we have to pick up the { } residue for s = 0 ). Approximations of the inversion integrals may be found by considering asymptotic expansions for large t by applying the method of Steepest Descent or Saddle Point method. (See for instance [19] for a thorough description of the method.) This method will work well for the integral (80) but will not give accurate approximation for (81) due to the pole at s = 0 . By applying the ordinary saddle point method for the integral (80) one finds the following approximation w LD (t ) = 1 2πh(r (t )) e f ( r ( t ),t ) (83) where r (t ) is the saddle point which is the value when f ( s, t ) attains its minimum as function of s , i.e. is the solution of the equation ~ ∂f ( s, t ) W ′( s ) = ~ + t = 0 and further ∂s W (s) 2 ~ ~ ∂ 2 f ( s, t ) W ′′( s) ⎛ W ′( s) ⎞ = ~ −⎜ ~ ⎟ . h( s ) = ∂s 2 W ( s) ⎜⎝ W ( s) ⎟⎠ (84) (85) It turns out that the “ordinary” Saddle Point method fails to approximate the integral (81) when the root r (t ) is close to the pole at s = 0 . It is, however, possible to extract the pole and obtain an Uniform Asymptotic Approximation (UAA) that is uniform with respect to t and also yields in the area where r (t ) is close to zero. The corresponding asymptotic expansion is given by: 32 - Telenor R&I R 28/2008 WLAN QoS Analysis - A New Modelling Approach for 802.11e W UAA (t ) = 1 − ⎧⎪ sign (r (t )) ⎫⎪ 1 1 erfc (− sign (r (t )) − 2 f (r (t ), t ) ) + e f ( r (t ),t ) ⎨ − ⎬ 2 ⎪⎩ r (t ) 2πh(r (t )) 2 − πf (r (t ), t ) ⎪⎭ (86) The main effort (or complexity) by applying the Saddle Point methods is to locate the saddle point r (t ) , and the equation has to be solved for each value of t. The accuracy of the UAA method is impressive and gives results very close to the exact convolutions for a very broad range of parameters also including cases where the asymptotic is not exactly fulfilled. Telenor R&I R 28/2008 - 33 WLAN QoS Analysis - A New Modelling Approach for 802.11e 34 - Telenor R&I R 28/2008 WLAN QoS Analysis - A New Modelling Approach for 802.11e Significance for Telenor The work carried out in the WLAN QoS Analysis project and the presented model that was developed in this project give a profound understanding of the detailed working of 802.11 WLAN and of the QoS features of 802.11e. This insight will be useful in future research projects, but also to answer questions regarding Telenor’s daily WLAN operations. Furthermore, by using the model we are able to predict the performance of WLAN without having to do time consuming simulations. While simulations normally are done in days and weeks, calculations from the model are done in seconds. Therefore, the model will hopefully be useful for future WLAN projects. Finally, the model contributes to enhancing Telenor R&I’s visibility and impact, which is part of Telenor R&I’s key performance indicators. As an example, our previous model that has now been improved as described in this document, has been cited by more than 86 different other works, i.e. in journal articles, conference papers, standardization documents, theses, etc. This means that our model is highly visible abroad and that our work is appreciated by persons and entities outside Telenor. Telenor R&I R 28/2008 - 35