Analysis of the Total Delay of IEEE 802.11e EDCA

advertisement
Analysis of the Total Delay of IEEE 802.11e EDCA
and 802.11 DCF
Paal E. Engelstad
Olav N. Østerbø
UniK/Telenor R&D
1331 Fornebu, Norway
paal.engelstad@telenor.com
Telenor R&D
1331 Fornebu, Norway
olav-norvald.osterbo@telenor.com
Keywords-802.11e; Queueing Delay; Performance Analysis;
EDCA; Z-transform of the Delay; Virtual Collision; NonSaturation.
I.
INTRODUCTION
Due to the inherent capacity limitations of wireless
technologies based on the IEEE 802.11 standard [1], the
WLAN easily becomes a bottleneck for communication. In
these cases, the Enhanced Distributed Channel Access (EDCA)
of the IEEE 802.11e standard [2] will be beneficial to prioritize
for example voice and video traffic over more elastic data
traffic. EDCA allows for differentiation between four different
access categories (ACs) at each station and a transmission
queue associated with each AC. Each AC at a station has a
conceptual "backoff instance" responsible for channel access
for each AC, often referred to as the Enhanced Distributed
Channel Access Function (EDCAF).
The majority of analytical work on the performance of
802.11e EDCA (and of 802.11 DCF) focuses on predicting the
throughput [3-7] and the mean delay of the medium access [47]. However, before the packet is being transmitted, it might be
stored in the reliable protocol buffer of the IP layer or in the
interface driver or be waiting in a transmission queue on the
network interface. Surprisingly little focus has been on
predicting also this type of delay, referred to as the “queueing
delay”.
The main contribution of this paper is that it makes an
analysis of the total delay in terms of both the queueing delay
and the medium access delay. While upper and lower bounds
of the total delay are provided in [8], this paper presents a more
exact estimation of the total delay, and validates it against
simulation results. The delay expressions are based on the
analysis on the delay distribution of 802.11 DCF and 802.11e
EDCA presented in [9].
The importance of the queueing delay is evident. In realistic
network scenarios, most of the MAC frames will carry a
higher-layer packet, such as a TCP/IP or a RTP/UDP/IP packet,
in the payload. A higher layer protocol or application will
normally not interfere with the inner workings of the IP or
MAC layer. It might observe that it is subject to delay (which is
the case for TCP and many applications running on top of
RTP), but it will normally not be able to distinguish between
different types of delays. Thus, in most cases it is the total
delay that counts. For analytical predictions of the delay of
802.11e EDCA (and of 802.11 DCF) to be useful, both the
queueing delay and the medium access delay should be
considered.
4000
AC[3]: Delay
Input = Output
3500
Throughput per AC [Kb/s ]
Abstract— A packet sent from an upper-layer protocol or
application over IEEE 802.11 [1] will first be placed in a
transmission queue. The packet delay caused by waiting here is
referred to as the queueing delay. When the packet reaches the
head of the queue it will start contending for channel access until
it is successfully transmitted over the medium (or finally
dropped). The delay associated with the medium access is
referred to as the MAC delay. The majority of analytical work on
the delay performance of IEEE 802.11 focuses on predicting only
the mean MAC delay, although higher layer applications and
protocols are interested in the total performance of the MAC
layer. The main contribution of this paper opposed to other
works is that it provides analytical predictions of the total delay,
which also includes the queueing delay. The analyses presented
apply to the priority schemes of the Enhanced Distributed
Channel Access (EDCA) mechanism of the IEEE 802.11e
standard [2]. However, by using an appropriate parameter
setting, the results presented are also applicable to the legacy
802.11 Distributed Coordination Function (DCF) [1]. The model
predictions are calculated numerically and validated against
simulation results.
3000
AC[3] (AC_VO)
2500
2000
1500
AC[2] (AC_VI)
1000
AC[0] (AC_BK)
500
AC[1] (AC_BE)
0
0
1000
2000
3000
4000
5000
6000
7000
8000
9000
10000
Traffic g e ne rate d pe r AC [Kb/s ]
Figure 1. Simulation results showing the throughput performance of EDCA.
We now use Fig. 1 to explain at which level of traffic
intensity an analysis of the total delay is of primary interest.
The figure shows results from a simulation with a number of
http://folk.uio.no/paalee
stations contending for channel access, and with equal amount
of traffic generated per AC and per station. The curves in solid
lines show the throughput of the four different ACs. With low
traffic load (i.e. in the left side of the figure) the channel is far
from saturated, and practically all generated traffic is sooner or
later successfully transmitted on the medium. This situation is
trivial; it exhibits very low delays, and a delay analysis is of
little interest here.
On the other hand, when the traffic load increases (i.e. to
the right in the figure) the throughput are below the dashed
“input=output” line. This means that the channel is saturated,
and only a fraction of the generated traffic is successfully
transmitted. The frames that are not transmitted, are mainly
stacked on queues (or buffers), resulting in queueing overflow
or queues that grow to infinite lengths. This situation is not
useful to analyze, since no realistic communication will be
possible.
Hence, it is the intermediate region between the fully nonsaturated and fully saturation situations that is of primary
interest in terms of analysis of the total delay. For AC[3] this
region is marked with the dashed oval in the figure. The curve
in broken line in Fig. 1 shows the mean queueing delay
observed in the simulation, and the linear scale on the y-axis is
chosen so that 3000 kbps corresponds to 30 µs of queueing
delay for this curve. We observe that the queueing delay
increases quickly to infinity within the region marked with the
dashed oval.
 2 jW
Wi , j =  mi i , 0
2 Wi , 0
j = 0,1,...., mi − 1
j = mi ,...., Li
.
(1)
The behavior of 802.11e EDCA is analyzed by considering
a bi-dimensional Markov chain S ni , Bni for AC i where S ni is
(
)
a stochastic process representing the backoff stage and Bni is
the backoff counter. To model the post-backoff properly we
add an “extra” state S ni = −1 representing the case where the
post-backoff starts with an empty queue, and we take S ni = 0
for the case when the post-backoff starts with a non-empty
queue. The state space of the Markov chain S ni , Bni is denoted
( j , k ) where k = 0,1,...., Wi , j and j = −1,0,1,...., Li and where
(
)
we also have Wi , −1 = Wi ,0 . Fig. 2 illustrates the Markov chain
for the transmission process of a EDCAF of priority class i .
The Markov chain and its transition probabilities have been
described in detail in [9].
In order to analyze the total delay in the region of interest,
we need an analytical model that applies to the whole range
from a lightly loaded, non-saturated channel to a heavily
congested, saturated medium. The model presented in this
paper applies to the whole range and describes the priority
schemes of the Enhanced Distributed Channel Access (EDCA)
mechanism of the IEEE 802.11e standard [2]. By setting the
number of ACs, N, to one, and by using an appropriate
parameter setting, the results presented are also applicable to
the legacy 802.11 Distributed Coordination Function (DCF)
[1].
The remaining part of the paper is organized as follows:
The next section presents the analytical model used in the
subsequent analyses. Analyses of the MAC delay, the queueing
delay and the total delay are provided in Section III, Section IV
and Section V, respectively. In Section VI, the analytical
results are validated against simulation results. Finally follow
conclusions and proposed directions for further work.
II.
ANALYTICAL MODEL
For each AC, i (i = 0,...,3) , let Wi, j denote the contention
window size in the j th backoff stage i.e. after the j th
unsuccessful transmission; hence the minimum contention
window is given as Wi , 0 . Let also j = m i denote the j th
backoff stage where the contention window has reached the
maximum contention window, given by 2m Wi , 0 . Finally, let Li
i
denote the retry limit of the retry counter. Then:
http://www.unik.no/personer/paalee
Figure 2. Generic Markov Chain for a EDCAF of Access Category i (for both
Bianchi’s and Xiao’s models).
Let bi , j ,k denote the steady state distributions of the Markov
chain. An EDCAF transmits when it is in any of the states
where
Since
bi , j , 0 = pij bi , 0, 0
( j , 0)
j = 0,1,..., Li .
for j = 0,1,..., Li , the probability, τ i , of a transmission attempt
in a generic time slot is given as:
Li
τ i = ∑ bi , j , 0 = bi , 0, 0
j =0
1 − piLi +1
.
1 − pi
In [9] it is shown that τ i can be expressed as:
1
τi
+
=
Ai = AIFSN [i ] − AIFSN [ N − 1] .
(2)
Our results are valid for any of the three models
presented in Eq. (6), Eq. (7) and Eq. (8).
qi :
(1 − 2 p )
*
i
*
i
2(1 − p )
(
)
Wi ,0 (1 − p i )(1 − (2 p i ) mi ) + (1 − 2 p i )(2 p i ) mi (1 − p iLi − mi +1 ) (3)
2(1 − p )(1 − 2 p i )(1 − p
*
i
Li +1
i
)
(Wi , 0 − 1)q i p i
1 − p i (1 − ρ i )
+(
)
(1 +
) .
Li +1
qi
2(1 − p i* )
1 − pi
(
i
If each station is transmitting traffic of more than one
AC, there will be virtual collision handling between the
queues [10]. Then, the probability of unsuccessful
transmission, p i , is given by:
pi = 1 −
1 − pb
,
i
∏ (1 − τ
c
ps =
qi∗ :
)
(4)
c =0
where p b denotes the probability that the channel is
busy:
N −1
pb = 1 −
∏ (1 − τ )
i
ni
,
i =0
(5)
ρ :
probability, p i∗ , is the probability that the EDCAF
remains in the state between two transmission slots.
Different analytical models use different settings for
this parameter. The original Bianchi model [3] uses:
(Bianchi [3]) (6)
which assumes that the backoff counter is decremented
in each slot, even when there is a transmission or
collision on the channel. The model by Xiao [5], on the
contrary, assumes that the countdown is blocked in
busy slots, by setting:
pi∗ = pi .
(Xiao [5]) (7)
Finally, the model in [6-7] incorporates AIFS
differentiation into the model as a blocking probability:

A p 
pi∗ = min1, pi + i b  ,
1 −τ i 

where
(E/Ø [6-7]) (8)
N −1
∑ n τ (1 − p )
i =0
i i
i
.
i e
p
p
1 − p  s e −λ T + (1 − s )e −λ T
pb
 pb
i s
ρ :
i
i c



.
(12)
Let DiSAT denote the mean medium access delay where
the post-backoff delay is also included. In [9] it is
shown that DiSAT represents the service time of an
EDCAF. The utilization factor, ρ i , is therefore given
by [11]:
ρ i = min(1, λi DiSAT ) ,
∗
(11)
e − λ T (1 − pi* )
*
i
Unlike the collision probability, pi , the blocking
pi∗ = 0 ,
. (10)
In [9] it is shown that the probability that a packet
arrives during countdown blocking, qi∗ , in any of the
states (-1,k) in Fig. 1 can be expressed as:
qi* = 1 −
i
pi* :
)
where Te , Ts and Tc denote the real-time duration of an
empty slot, of a slot containing a successfully
transmitted packet and of a slot containing two or more
colliding packets, respectively, as detailed in [6].
Furthermore, p s is the probability that a time slot
contains a successfully transmitted packet:
estimated in the following:
pi :
In Fig.1 q i denotes the probability that at least one
packet will arrive in the transmission queue during the
following generic time slot while in the state (-1,0).
Thus, a condition is that the queue is empty at the
beginning of the slot. Furthermore, it is assumed that
the traffic arrives according to Poisson processes with a
packet rate of λi for each EDCAF of AC i. Then, q i is
calculated as:
qi = 1 − p s e − λiTs + (1 − pb )e − λiTe + ( pb − p s )e − λiTc
The various terms of this expression - and their physical
interpretations - have been explained in detail in [6]. The
remaining parameters pi , pi* , qi , qi∗ ρ ,and ρ ∗ , will be
i
(9)
(13)
ρi∗
denotes the probability that there is a
In Fig. 1
packet waiting in the transmission queue of the
EDCAF of AC i at the time a transmission is
completed (or a packet dropped). As shown in [9], ρi∗
can be determined by:
1 − ρi = Pi PB (1 − ρi∗ ) .
(14)
where Pi PB , is the probability of not receiving any
packets in the transmission queue while performing a
complete empty-queue post-backoff procedure. Pi PB
can be expressed in terms of qi∗⋅ by:
Pi PB =
III.
1 − (1 − q i* )
Wi , 0
.
Wi ,0 q i*
(15)
where the factor 1 / Wij reflects the uniform distribution of the
selection of the number of backoff slots at each stage.
i
For simplicity the term Dlevel , j ,s ( z ) is introduced as:
ANALYSIS OF THE MAC DELAY
j
A. The z-Transform of the Countdown Delay
Due to the slotted operation of the wireless protocol, the ztransform (rather than Laplace transform) is applied in order to
describe the delay [7]. The slot-length of the analytical model
must be chosen so that Te , Ts and Tc are equal to or multiple
integers of the slot-length.
i
i
Dlevel
, j , s ( z ) = ∏ Dstage ,l ( z ) .
Here, s is set to 0 to find the delay when the post-backoff is
undertaken before the transmission of each packet. This type of
i
, because under
delay is referred to as the saturation delay, DSat
saturation the post-backoff must always be taken into account.
The transform for this delay may be written as:
Using the model with countdown blocking [expressed by
Eq. (7) or Eq. (8)], the weighted average delay while being
blocked
during
countdown
can
be
written
as
Ts ps / pb + Tc (1 − ps / pb ) , with the corresponding z-transform
z T ps / pb + z T (1 − ps / pb ) . While the EDCAF is counting
s
Li
i
i
D Sat
( z ) = (1 − p i )∑ p ij z Ts + jTc Dlevel
, j ,0 ( z )
the probability of being blocked is pi∗ . When it is not blocked
anymore, the EDCAF will spend an empty time-slot, Te , when
moving to the next countdown state. Hence, the z-transform of
the total delay associated with one countdown state is:
i
Dstate
( z) = zT
e
1 − pi*
.
1 − p z ps / pb + z T (1 − ps / pb )
*
i
(
Ts
)
c
i
+ p iLi +1 z ( Li +1)Tc Dlevel
, Li , 0 ( z ) .
p
 pi*
p
Distate = Te +  s Ts + (1 − s )Tc 
,
pb  (1 − pi* )
 pb
(17)
while the second order moment, Distate 2 , can be determined by:
p
 pi*
2
p
Distate = Te 2 +  s Ts (2Te + Ts ) + (1 − s )Tc (2Te + Tc )
*
pb
 pb
 1 − pi
p

p
+ 2 s Ts + (1 − s )Tc 
pb
 pb

2
 pi* 


 1 − p* 
i 

2
(18)
The queuing delay analysis presented in this paper is also
applicable to Bianchi's model without countdown blocking,
which is expressed by Eq. (6). However, to reflect the
countdown delay of the Bianchi model, the expression
i
for Dstate
(z) in Eq. (16) and the resulting expressions for Distate
state 2
i
would need to be modified. These alternative
and D
expressions are provided in the appendix of this paper.
B. The z-Transform of the MAC Delay
The total delay in a backoff stage is derived by a geometric
sum over the probabilities associated with each countdown
state:
i
Dstage
, j ( z) =
Wij
i
( z ))
1 1 − ( Dstate
i
Wij 1 − Dstate
( z)
,
Under extreme non-saturation conditions, on the contrary,
the post-backoff is always completed before a new packet
arrives in the transmission queue. Thus, under these conditions
the post-backoff will not add to the transmission delay, as it did
when the saturation delays were calculated above, and s is now
set to 1 in Eq. (20). The transform of the non-saturation delay
can be found by [9]:
(16)
The first order moment of this countdown delay, Distate , is
found as:
(19)
(21)
j =0
c
down, the probability of facing an empty slot is 1 − pi∗ while
(20)
l =s
(22)
i
i
i
DSat
( z ) = Dstage
, 0 ( z ) DNon − Sat ( z ) .
i
The factor Dstage,0 ( z ) in Eq. (22) represents the delay
distribution of a complete post-backoff, and the equation
i
i
(z ) and DNon−
expresses that DSat
Sat (z ) form an upper and
lower bound on the MAC delay. These bounds were studied in
[8].
In this paper, on the contrary we let D i ( z ) denote the ztransform of a more exact MAC delay where only the last part
of the post-backoff might be included. The reason is that the
first part might be completed when a new packet arrives in the
empty queue, and only the remaining part of the post-backoff
should add to the MAC delay of that packet. Using the results
in [9], it is easy to show that D i ( z ) can be written:
i
i
D i ( z ) = D † stage,0 ( z ) DNon
− Sat ( z ) ,
(23)
where
i
i
D † stage , 0 ( z ) = Dstage
,0 ( z )
[
+ (1 − ρi ) (1 − D
∗i
stage , 0
( z )) − pi (1 − D
i
stage , 0
]
(24)
( z )) .
represents the delay distribution of the actual post-backoff. The
i
“extra” z-transform, D ∗ stage,0 ( z ) , in the first term stems from
the possibility that a packet arrives in an empty queue before
the post-backoff is completed and is given by:
i
D ∗ stage, 0 ( z ) =
W
i
( z)
1 (1 − q i* ) i , 0 − Dstate
PB
*
i
Pi Wij
(1 − q i ) − Dstate ( z )
Wi , 0
. (25)
i
The last term pi (1 − Dstage
,0 ( z ) ) in Eq. (24) stems from the “listenbefore-talk” mechanism and can be dropped if this mechanism
is not considered.
C. The Mean Medium Access Delay
Finally, the mean medium access delay when the postbackoff delay is taken into account, DiSAT , is found directly by
differentiation of the transform in Eq. (21):
DiSAT = (1 − p iLi +1 )(T s + Tc*
where
Distate
pi
D state
)+ i
1 − pi
2
Li
∑p
j =0
j
i
Note that DiSAT 2 − DiSAT ≥ 0 , since the slot-length of the analytical
model must be chosen so that Te , Ts and Tc are equal to or
multiple integers of the slot-length.
According to Eq. (32) the second order moment of the
2
delay, DiSAT , is needed in order to find the mean queueing
delay. By differentiating Eq. (21) twice we find the second
order moment as:
(
(
is defined in Eq. (17).
The mean MAC delay can be found by differentiating Eq.
(23), using Eq. (22), Eq. (24) and Eq. (25). This gives
Di =
DiSAT
− (1 − ρ i ) Di
PB
(
(27)
,
Wi , 0 − 1  state
 1 − P PB
 Di
Di PB =  ∗ iPB − p i
.
2 
q
P
 i i
(28)
D. The Variance of the MAC Delay
The variance of the MAC delay is found by double
differentiation of the transform in Eq. (21):
σ
IV.
( )
2
= D (1) + Di − Di
( 2)
i
(29)
ANALYSIS OF THE QUEUEING DELAY
1
DiSAT
∞
∞
∑ ∑d
k = 0 m = k +1
i , Sat
m
i
λ 1 − D Sat
( z)
z = i
.
ρi
1− z
k
1 − ρi
(30)
2
where expressions for Distate and Distate are given by Eq. (17)
and Eq. (18) and the sums R1i ,.., R5i are defined as:
Li
Li
i
R1i = ∑ pij (Wij − 1) , R2i = ∑ (Wij − 1) , R3 =
j =0
j =0
Li
R = ∑ pi (Wij − 1)(Wij − 2)
i
4
j
j =0
B. The Mean Queueing delay
Using Eq. (31), the mean M/G/1 queueing delay, ∆ i , can
be given by the second order moment of the delay:
λi  DiSAT − DiSAT 
2
λ D i ( 2 ) (1)
∆ i = ∆ (1) = i Sat
=
2(1 − ρ i )
i (1)

2(1 − ρ i )
.
Li
jpij (Wij − 1) ,
∑
j =1
and R i = L p j (W − 1) j −1 W .
∑ i ij ∑ is
5
i
j =1
(34)
s =0
C. The Variance of the Queueing Delay
We can go further to find the variation of the queueing
delay through its second order moment, found by
differentiation of Eq. (31) twice:
∆i ( 2) (1) =
( )
i ( 3)
(1)
λi DSat
+ 2 ∆i
3(1 − ρi )
2
.
(32)
(35)
Thus, the variance of the queueing delay is expressed as:
( )
λ D (1)
=
+ ∆ (∆ + 1) .
3(1 − ρ )
σ ∆2 = ∆i ( 2 ) (1) + ∆ i − ∆ i
2
i
(31)
.
i
1 − ρ i Dˆ Sat
( z)
)
i
2 i
2 R
R
R i − R3i 
+  Distate   4 + 5
+ Distate 1 ,

  3
2 
2
Then, the z-transform of the waiting time follows by the
Pollaczek-Khintchine formula [11]:
∆i ( z ) =
(33)
Explicit expressions for the sums are given in [8]. They are
not repeated here, due to the space limitations of this paper.
A. The z-Transform of the Queueing Delay
Due to the use of the z-transform in a slotted time system,
we apply a slightly modified form of the Pollaczek-Khintchine
formula to obtain the z-transform of the queueing delay. The
service time is determined by the saturation-delay, DiSAT , as
seen from Eq. (21). Thus, the z-transform of the residual
service time distribution in the queue is:
i
Dˆ Sat
( z) ≡
)


pi  i
 R1 − p Li +1R2i + Tc Ri3 
+ Distate  Ts + Tc

i
1 − pi 


where
2
Di
)

2
2
pi 

DiSAT = 1 − p Li +1  Ts 2 + Tc
i
1 − pi 


pi  pi

+ 2Tc 1 − ( Li + 1) p Li + Li p Li +1  Ts + Tc
i
i
−
1
pi  1 − pi

(Wij − 1) , (26)
i
i ( 3)
Sat
i
(36)
i
i
V.
ANALYSIS OF THE TOTAL DELAY
One of the main performance measures of IEEE 802.11
EDCA is the total delay for a packet to be transmitted over the
wireless medium, and this includes the MAC delay as well as
the queueing delay. If Ti represents the total delay, then the
corresponding z-transform is simply the product of the ztransform D i (z ) of the MAC delay in Eq. (23), and the z-
transform ∆i (z ) of the queueing delay in Eq. (31):
T i ( z ) = D i ( z )∆i ( z ) .
(37)
λi  DiSAT − DiSAT 
2
Ti = Di + ∆ i = Di +

2(1 − ρ i )
(38)
 ,
where Di is given by Eq. (27) and Eq (28) and the expressions
2
for DiSAT and DiSAT are found in Eq. (26) and Eq. (33).
Similar the variance of the total delay is the sum of the
variances of the MAC delay and the queueing delay, and
hence:
σ T2 = σ D2 + σ ∆2
i
i
(39)
,
i
where σ D2 i is given by Eq. (29) and σ ∆2 is given by Eq. (36).
i
VI.
VALIDATIONS
A. Simulation Setup
We compared numerical computations in Mathematica with
ns-2 simulations, using the TKN implementation of 802.11e
[12] for the ns-2 simulator.
The scenario selected for validations is 802.11b with long
preamble and without the RTS/CTS-mechanism. The
parameter settings for 802.11b are found in [13]. Based on
these, the model parameters Te = 20µs , Ti ,MSDU = T1024 = 520µs
and TS = Tc = 1321.1 µs were estimated.
Parameters such as CWmin and CWmax are overridden by
the use of 802.11e [2]. For the validations, the default 802.11e
values were used, after setting aCWmin equal to 31 according
to the 802.11b specification.
The node topology of the simulation uses five different
stations, QSTAs, contending for channel access. Each QSTA
uses all four ACs, and virtual collisions therefore occur.
Poisson distributed traffic consisting of 1024-bytes packets was
generated at equal amounts to each AC.
B. Validation of the Medium Access Delay Predictions
Fig. 3 compares the mean MAC delay predicted by the
analyses presented in this paper with simulation results. It is
observed that the analytical model gives a fairly good
description of the mean MAC delay. However, the simulation
curves are considerably more “smooth” than the analytical
curves. The figure also shows that the MAC delay of AC[0]
and AC[1] goes to infinity. This is a situation referred to as
medium access starvation, because AC[0] and AC[1] are
starved, and may not access the channel. The analysis predicts
that this starvation occurs at slightly lower channel load than
what was observed in the simulations.
C. Validation of the Queueing Delay Predictions
Fig. 4, Fig. 5, Fig. 6 and Fig. 7 present analytical
predictions of the queueing delay for AC[3], AC[2], AC[1] and
AC[0], respectively, and compare the predictions with
simulation results.
The figures show that the queueing delay of all the ACs
goes to infinity. This is a situation referred to as queueing
starvation, because all higher layer protocols are starved from
communication when the queueing delay is infinite (or when
buffered packets are dropped).
It is observed that the analysis gives a fairly good
description for the queueing delay experienced by the
simulations. However, there are some discrepancies between
the analysis and the simulations, especially for AC[1] and
AC[2].
250
AC[3] - Analysis
Mean Queueing Delay (ms)
The mean total delay is then simply:
200
AC[3] - Simulation
150
100
50
Mean Medium Access Delay (ms)
45
0
40
0
35
500
1000
1500
2000
2500
3000
Traffic generated per AC [Kb/s]
30
Figure 4. Mean queueing delay comparison of AC[3] between analytical and
simulation results.
25
20
15
10
5
0
0
1000
2000
3000
4000
5000
6000
Traffic generated per AC [Kb/s]
AC[3] - Analysis
AC[2] - Analysis
AC[1] - Analysis
AC[0] - Analysisl
AC[3] - Simulation
AC[2] - Simulation
AC[1] - Simulation
AC[0] - Simulation
Figure 3. Mean MAC delay comparison between analytical (numerical) and
simulation results of all ACs.
Earlier work has mostly focused on the mean saturation
delay of the medium access [4-5], while the mean nonsaturation delay is provided in [6-7]. These two results form an
upper and a lower bound on the actual mean medium access
delay. Likewise, an upper and a lower bound on the queueing
delay are provided in [8]. In this paper, on the contrary, more
exact expressions for the MAC delay and the queueing delay
are found. The results are validated against simulation results.
250
Mean Queueing Delay (ms)
AC[2] - Analysis
200
AC[2] - Simulation
150
100
It is observed that the predictions of the mean MAC delay
and the mean queueing delay match relatively well with
simulations.
50
0
0
500
1000
1500
2000
2500
Traffic generated per AC [Kb/s]
VIII. FURTHER WORK
Figure 5. Mean queueing delay comparison of AC[2] between analytical and
simulation results.
250
Mean Queueing Delay (ms)
AC[1] - Analysis
200
AC[1] - Simulation
150
At the time of writing, however, a new version of the TKN
simulation module has been released (as of February 16 2006).
The new release implements the backoff changes seen in the
final draft version 13 of the standard.
100
50
0
0
500
1000
1500
2000
Traffic generated per AC [Kb/s]
Figure 6. Mean queueing delay comparison of AC[1] between analytical and
simulation results.
AC[0] - Analysis
200
AC[0] - Simulation
150
100
50
0
0
250
500
In follow-up work, we plan to compare the impact of the
backoff countdown method on the predictions of the total
delay, by comparing Bianchi's model with Xiao's model, and
by comparing simulation results with different methods for
decrementing the backoff counter.
B. Analysis of Jitter and of the Delay Variance
An expression of the variance of the total delay is found
through Eq. (39), Eq. (29) and Eq. (36). Further work should
find this variance by deriving explicit expressions for Di( 2) (1) ,
i ( 3)
and for DSat
(1) . The variance of total delay can then be
compared with simulation results. We plan to undertake this
work as a first step on the way to an analytical jitter analysis of
802.11 EDCA and of 802.11 DCF.
250
Mean Queueing Delay (ms)
A. Refining the Model for the Countdown Delay
This paper uses the model of Xiao - with the expression for
i
Dstate
( z) found in Eq. (17) - primarily because it easily
incorporates AIFS differentiation into the model through Eq.
(8). It is also convenient, since the TKN module used for
simulation of 802.11e EDCA in ns-2 implements the draft
version 4 of the standard, where this model is adequate.
750
1000
1250
1500
Traffic generated per AC [Kb/s]
Figure 7. Mean queueing delay comparison of AC[0] between analytical and
simulation results.
VII. CONCLUSION
The mean medium access delay and the mean queueing
delay together constitute the average total delay of the MAC, as
seen from an upper layer protocol or application.
This paper predicts both the medium access delay and the
queueing delay. The analysis is based on a Markov model that
covers the full range from a non-saturated to a fully saturated
channel.
C. Delay-Oriented Admission Control
Queueing starvation occurs when the utilization factor
ρi = min(1, λi DiSAT ) equals 1, and the queue length is thus
theoretically infinite, resulting in buffer overflow in practical
situations. At this point the medium access delay, Di , equals
DiSAT , because the post-backoff delay must always be taken into
account under saturation conditions. The size of the medium
access delay when the queueing starvation occurs depends on
the size of the traffic intensity λi . Since the medium access
delay, Di , is finite in this situation, while it is infinite under
medium access starvation, it is safe to say that the queueing
starvation normally occurs before the medium access
starvation occurs.
The queueing starvation is therefore the limiting factor on
the usability of 802.11. As a consequence, model-based
admission control should try to configure the system to ensure
that the MAC delay matches the admitted rate of the traffic of
each
EDCAF.
If
the
utilization
factor
SAT
of
an
EDCAF
of
AC
i
equals
1, the
ρ EDCAF = min(1, λ EDCAF Di )
admitted traffic of the EDCAF does not get the resources it
should be granted. In other words, the admission control must
avoid that admitted traffic of an EDCAF is subject to queueing
starvation. This will be explored in follow-up work.
ACKNOWLEDGMENTS
This work has been supported by the OBAN project, which
is funded by the European Commissions 6th Framework
Program. However, the information in this document is
provided as is, and no guarantee is given that the information is
fit for any purpose. Other OBAN partners are not committed
under any circumstances by its content.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
IEEE 802.11 WG, "Part 11: Wireless LAN Medium Access Control
(MAC) and Physical Layer (PHY) specification", IEEE 1999.
IEEE 802.11 WG, "Draft Supplement to Part 11: Wireless Medium
Access Control (MAC) and physical layer (PHY) specifications:
Medium Access Control (MAC) Enhancements for Quality of Service
(QoS)", IEEE 802.11e/D13.0, Jan. 2005.
Bianchi, G., "Performance Analysis of the IEEE 802.11 Distributed
Coordination Function", IEEE J-SAC Vol. 18 N. 3, Mar. 2000, pp. 535547.
Ziouva, E. and Antonakopoulos, T., "CSMA/CA performance under
high traffic conditions: throughput and delay analysis", Computer
Communications, vol. 25, pp. 313-321, Feb. 2002.
Xiao, Y., "Performance analysis of IEEE 802.11e EDCF under
saturation conditions", Proceedings of ICC, Paris, France, June 2004.
Engelstad, P.E., Østerbø O.N., "Non-Saturation and Saturation Analysis
of IEEE 802.11e EDCA with Starvation Prediction", Proceedings of the
Eighth ACM International Symposium on Modeling, Analysis &
Simulation of Wireless and Mobile Systems (ACM MSWiM 2005),
Montreal,
Canada,
Oct.
10-13,
2005.
(See
also:
http://www.unik.no/~paalee/research.htm.)
Engelstad, P.E., Østerbø O.N., "Delay and Throughput Analysis of IEEE
802.11e EDCA with AIFS Differentiation under Varying Traffic Loads",
Proceedings of the Fifth International IEEE Workshop on Wireless
Local Networks (WLN ’05), Sydney, Australia, Nov. 15-17, 2005. (See
also: http://www.unik.no/~paalee/PhD.htm.)
Engelstad, P.E. and Østerbø O.N., "Queueing Delay Analysis of 802.11e
EDCA", Proceedings of The Third Annual Conference on Wireless On
demand Network Systems and Services (WONS 2006), Les Menuires,
France, Jan. 18-20, 2006. (See also: http://hal.inria.fr/inria-00001016 or
http://hal.inria.fr/view_by_stamp.php?label=WONS2006&langue=en&a
ction_todo=view&id=inria-00001016&version=1 .)
[9]
[10]
[11]
[12]
[13]
Engelstad, P.E. and Østerbø O.N., "The Delay Distribution of IEEE
802.11e EDCA and 802.11 DCF", Proceedings of the 25th IEEE
International Performance Computing and Communications Conference
(IPCCC'06), Phoenix, Arizona, April 10 - 12, 2006. (See also:
http://www.unik.no/~paalee/research.htm.)
Engelstad, P.E., Østerbø O.N., "Differentiation of the Downlink 802.11e
Traffic in the Virtual Collision Handler", Proceedings of the Fifth
International IEEE Workshop on Wireless Local Networks (WLN ’05),
Sydney,
Australia,
Nov.
15-17,
2005.
(See
also:
http://www.unik.no/~paalee/PhD.htm.)
Kleinrock, L., “Queuing Systems,Vol. I”, John Wiley, 1975.
Wietholter, S. and Hoene, C., "Design and verification of an IEEE
802.11e EDCF simulation model in ns-2.26", Technische Universitet at
Berlin, Tech. Rep. TKN-03-019, November 2003.
IEEE 802.11b WG, "Part 11: Wireless LAN Medium Access Control
(MAC) and Physical Layer (PHY) specification: High-speed Physical
Layer Extension in the 2.4 GHz Band, Supplement to IEEE 802.11
Standard", IEEE, Sep. 1999.
APPENDIX
i
It is clear that the expression for Dstate
( z) should reflect the
Markov model chosen. This paper uses the model of Xiao i
with the expression for Dstate
( z) found in Eq. (17) - primarily
because it easily incorporates AIFS differentiation into the
model through Eq. (8). Secondarily, the TKN module used for
simulation of 802.11e EDCA in ns-2 implements the draft
version 4 of the standard, where this model is adequate.
With the model of Bianchi, on the contrary, there is no
countdown blocking [expressed by Eq. (6)], and the weighted
average delay associated with the countdown of the backoff
counter can be written Te (1 − pb ) + Ts ps + Tc ( pb − ps ) . Hence, the
corresponding z-transform is simply:
i , BIANCHI
Dstate
( z) = (1 − pb ) zTe + ps zTs + ( pb − ps ) zTc .
(40)
The first order moment of this countdown delay DiBIANCHI , state is
found as:
DiBIANCHI , state = (1 − p b )Te + p s Ts + ( p b − p s )Tc ,
(41)
while the second order moment, DiBIANCHI ,state 2 , can be
determined by:
2
DiBIANCHI , state = (1 − p b )Te2 + p s Ts2 + ( p b − p s )Tc2 .
(42)
Download