An Improved Analytical Model for IEEE802.11e Enhanced Distributed Channel Access

advertisement
2007 International Symposium on Information Technology Convergence
An Improved Analytical Model for IEEE802.11e Enhanced
Distributed Channel Access
Ye Yan
School of Electrical Engineering
and Computer Sciences
Seoul National University
Seoul, South Korea 151–744
Email: yy@cnslab.snu.ac.kr
Ce Pan
School of Electronics
and Information Engineering
Chonbuk National University
Jeonju Jeollabuk-do South Korea 561-756
pance@chonbuk.ac.kr
Abstract
hanced distributed channel access (EDCA) and HCF
controlled channel access (HCCA). EDCA is a contention based access mechanism, whereby HCCA is an
optional polling based access mechanism.
In this paper, we propose an improved discrete threedimension Markov chain model to describe the IEEE
802.11e EDCA characteristics. The unifying model is
designed to compute the sustained probabilistic properties for each prioritized AC under saturation condition. In this framework, we consider elaborately the
modified the AIFS and backoff co-operation process in
EDCA defined by the IEEE 802.11e standard rather
than those previous literature which concern the original EDCF protocol defined by draft version. Comprehensive simulation studies validate our analytical approach is quite fair in predicting the system saturation
throughput. Ultimately, our model and analysis can
provide an in-depth understanding and insights into the
IEEE 802.11e EDCA features.
Many previous works [7]-[11] have conducted the analytical modeling of EDCA which is the basic MAC
mechanism of IEEE 802.11e standard. Basically, the
analytical modeling is derived form the discrete Markov
chain model for IEEE 802.11 DCF introduced by
Bianchi[12]. However, all of these models do not
consider the modified backoff countdown operation in
the IEEE 802.11e EDCA accurately, which should cooperate with the AIF countdown operation. As a typical one among these works, Xiao [10] extends the
model to the prioritized schemes by introducing multiple ACs with distinct parameter settings, such as the
minimum and maximum contention windows (CWmin
and CWmax). Furthermore, this model also introduces
finite retry limits. A very important differentiation
mechanism lacking in Xiao’s model, however, is the
AIFS procedure. Xiao assumed equal AISFN to all
access category. So, Xiao’s model only develops a twodimensional markov chain model for the case of general ACs. Although this type of models reflects some
modified behaviors of the EDCA backoff countdown,
there are some very important points not considered
accurately: the channel must be sensed idle during the
whole AIFS period before the backoff countdown procedure starts. Meanwhile the remaining backoff counter
should cut down advance one before the backoff process. So these models which only have two-dimension
markov chain model could not cover this co-operation
process in EDCA accurately because of the inherent
limitation.
1. Introduction
Recently, the popularity of WLANs, especially the
appearing of IEEE 802.11 standard [1], has generated
many interests in modeling and further improving the
performance of the original protocol. Due to the inherent capacity limitations of wireless technologies, the
IEEE 802.11 WLAN always tends to be a bottleneck
for multimedia communication. Therefor, one of the
recent major interests is on the quality of service (QoS)
improvement of the original IEEE 802.11 standard,
which is specified by the IEEE 802.11e standard [2]. As
an extension to the IEEE 802.11 standard, the IEEE
802.11e protocol is designed to enhance QoS supporting of WLAN in MAC layer. The IEEE 802.11e standard defines hybrid coordination function (HCF) as
its access mechanism, which uses two modes, i.e. en-
0-7695-3045-1/07 $25.00 © 2007 IEEE
DOI 10.1109/ISITC.2007.74
Some researchers [13]-[15] have realized this problem in those previous works and have tried to handle
135
the retry limit of retrying counter, if the transmission
is still unsuccessful after (Li + 1)th backoff stage, the
packet will be dropped. Then:
 j
for j = 0, 1, · · · , mi − 1, if Li > mi
 2 Wi,0
2m
for j = mi , · · · , Li , if Li > mi
Wi,j =
i Wi,0
 j
2 Wi,0
for j = 0, 1, · · · , Li , if Li ≤ mi
(1)
Figure 1. Backoff process rule difference between EDCA and DCF
3. ANALYTICAL MODEL
3.1
it by extending two-dimensional markov chain model
into three-dimensional one. For instance, the T.F.M
’s model [14] introduces a three-dimensional markov
chain, it can handle the co-operation problem easily
and obtain a more accurate model to the EDCA mechanism. However, since these models consider different
ACs individually, the corresponding analysis procedure
should also be separate, which makes the complexity of
the whole EDCA system modeling and analysis much
further. The rest of the paper is organized as follow:
Section 2 provides a brief summary of some important
IEEE 802.11e EDCA features. Section 3 describes the
improved model and the corresponding analytical development. The comprehensive comparisons of the numerical outputs of our proposed model to both the simulation results and some previous related researches are
provided in Section 4. The conclusions of this paper are
drawn in Section 5.
Markov chain model analysis
For each unsuccessful transmission attempt, the
backoff instance moves to next state in a row below
at probability . If a packet has not been transmitted
successfully after attempts, the packet will be dropped
at the accumulated frame dropping probability :
Pi,drop = PiLi +1 bi,0,0,0
The probability of an unsuccessfully transmission attempt at stage j is , then
bi,j,0,0 = Pij bi,0,0,0
bi,j,k,0 =
And
bi,j,k,d =
Backoff and AIFs co-operation
Wi,j − k
bi,j,0,0 0 ≤ j ≤ Li , 1 ≤ k ≤ Wi,j − 1
Wi,j
(4)





Pi bi,j,k+1,0 +bi,j,0,0 /Wi,j
(1−qi )d




bi,j,0,0 /Wi,j
(1−qi )d
1 ≤ d ≤ Ai , 1 ≤ k ≤ Wi,j − 2, 0 ≤ j ≤ Li
1 ≤ d ≤ Ai , k ≤ Wi,j − 1, 0 ≤ j ≤ Li
(5)
By substituting (2) into (5) and (6), through normalizing all the stable probability distribution bi,j,k,d can be
express with Ai , Li , Pi , qi , Wi,j , and bi,0,0,0 . Therefore,
bi,0,0,0 is
In the IEEE 802.11e standard, the first backoff
countdown occurs only after its corresponding AIFS.
Specially, the EDCA backoff instance advances one
time slot further comparing to the DCF operation
whenever channel becomes busy. At the meanwhile,
it will wait one extra slot after counter reached zero
before its transmission. Fig.1 shows a simple example
for this backoff and AIFS co-operation process (in the
case of AIFS=DIFS).
2.2
(3)
From chain regularities, we have:
2. FEATURES IN EDCA
2.1
(2)
bi,0,0,0 =
1
Li
j=0
i)
[ 1−(1−q
(1−qi )Ai
Ai
1 Wi,j −1
Pi
qi (
2
+ 1) +
Wi,j +1
]Pij
2
(7)
Contention Windows (CW)
3.2
For each ACi (i = 0, · · · , 3), let Wi,j denote the
contention window size in the jth backoff stage, after jth continuous unsuccessful transmission. we define Wi,0 = CWi,min + 1. we also denote j = mi as
the jth backoff stage when the contention window size
has reached CW max + 1. Finally, we let Li denote
System equations
The channel is deemed idle if and only if no single
ACi is using. As a result, the probability τi that the
channel stays busy is
pi = 1 −
3
(1 − τi )ni
i=0
136
(8)
Wi,j
Ai
−2 Li
1=
j=0
=
bi,j,k,d +
Ai
Li bi,j,Wi,j −1,d +
j=0 d=1
k=0 d=1
Li
j
P W (W −1)
1−(1−qi )Ai Pi
bi,0,0,0 {
[ i i,j 2 i,j
(1−qi )Ai qi Wi,j
j=0
Li
Wi,j
−1
j=0
k=0
+ Wi,j − 1] +
1/W0
pi
pi
0,1,0
qi
1-qi
0,2,0
...
pi
0,W0-1,0
1-pi
...
1-pi
...
1-qi
...
1-qi
qi
j,0,1
j,Wj-1,Ai
1-qi
1-qi
qi
qi
j,1,1
pi
j,0,0
j,Wj-1,1
1-qi
pi
j,1,0
1-pi
Pi
qi
j,2,1
1-qi
1-qi
1-Pi
j,2,Ai
...
j,1,Ai
j,0,Ai
...
1/Wj
1-qi
j,2,0
...
Li
j=0
j
1−(1−qi )Ai Pi
(1−qi )Ai qi Wi,j
+
The probability qi that the ACi
busy during the AIF period is

0



3


(1−τi )ni
1−
qi =
i=2

3



 1−
(1−τi )ni
i=1
j,Wj-1,0
...
Li,0,1
1-pi
Li,1,0
qi
1-qi
pi
Li,2,0
qi
Li,Wm-1,1
Li,2,1
1-qi
pi
1-qi
1-qi
qi
Li,1,1
1-qi
Li,Wm-1,Ai
...
qi
...
...
1-qi
...
(9)
senses the channel
d=0
d=1
(10)
d≥2
Where d is the remaining AIF time period in term of
the number of time slots.
Due to both external collision and virtual internal
collision, the conditional collision probability of ACi is
Pi = 1 − (1 − τi )ni −1
Li,2,Ai
Li,1,Ai
1-qi
Pi
(6)
3
(1 − τh )nh
(11)
h>i
Li,0,Ai
1-Pi
j=0
Wi,j +1 j
Pi }
2
j=0
1-pi
1/WL
Li,0,0
Li
where ni is the total number of active ACi .
Let τi denote the transmission attempt probability
that backoff instance in priority class i transmits during a generic slot time, independent on weather the
transmission results in a collision or not:

Li



bi,j,0,0
i = 3 (highest priority)

j=0
τi =
Li



bi,0,0,0 i = 3
 (1 − Pb )
0,W0-1,1
1-qi
1-pi
Pi
qi
0,2,1
1-qi
0,0,0
...
qi
0,1,1
1-qi
1-qi
...
qi
0,0,1
1-Pi
1-qi
...
1-qi
...
1-qi
0,W0-1,Ai
0,2,Ai
0,1,Ai
0,0,Ai
bi,j,k,0
1-qi
...
Li,Wm-1,0
1-pi
If we don’t consider the virtual collisions which occur
only within the station between internal access categories, we have Pi = pi in equation (11) instead.
Equations (8)-(11) form a set of nonlinear equations.
It can be solved by means of numerical methods, then
all the transition probabilities and steady state probabilities can be obtained.
3.3
PERFORMANCE ANALYSIS
Let Pi,s denotes the probability that a packet from
any of the backoff instances of priority class i is transmitted successfully at probability Pi,s in a time slot:
Drop
Figure 2. Markov chain for the EDCA procedure of ACi
Pi,s = ni τi (1 − Pi )
(12)
Let Ps denote of the probability that a packet from any
class is transmitted successfully in a time slot:
Ps =
3
i=0
137
Pi,s
(13)
Then the throughput of priority class i, can be calculated as the average duration of successfully transmitted packets by the average duration of a contention slot
that follows the special time scale of our model:
Normalized
throughput
(14)
where Ti,M SDU denotes the average time required to
transmit the MSDU of a data packet, T e denotes the
duration of a time slot, while T s and T c denote the
duration of a slot containing a successfully transmitted
packet and of a containing two or more colliding packet
respectively. The value of T s and T c can be calculated
by
0.3
0.2
0.1
5
10
15
20
25
30
35
Number of QSTAs
AC_VO(Xiao's model)
AC_VO(Proposed model)
TSbasic = TH + TE[P ] + SIF S + δ + TACK + AIF Smin + δ
TCbasic = TH + TE[P ] + AIF Smin + δ
(15)
for basic access mode and optional RTS/CTS mode
respectively. Where denote the time to transmit the
header (including MAC header, physical layer header
and/or tail), the time to transmit an ACK, SIFS, and
the time to transmit a payload with the mean length
respectively. TRT S and TCT S denote the time to transmit an RTS frame and a CTS frame, respectively. δ is
the maximum propagation delay.
AC_VO(T.F.M's model)
AC_VO(Simulation)
Figure 3. Saturation throughput comparison
among some numerical models and Simulation results in AC VO
0.045
0.04
0.035
0.03
0.025
0.02
0.015
0.01
0.005
0
NUMERICAL AND SIMULATION
RESULTS
5
10
15
20
25
30
35
Number of QSTAs
AC_BE(Xiao's model)
AC_BE(Proposed model)
In this part, we compared numerical computations
of our analytical model with some other previous ones
and ns-2 simulation results as well. We apply the IEEE
802.11b [16] PHY parameters set. For demonstration
purposes, we adopt two different priority access categories, i.e., AC VO and AC BE. However, our proposed unified analytical model is very general so that
we can adopt it for every access category under same
frame work. Fig.3 and 4 shows the numerical saturation throughput comparison of our proposed analytical
model to simulation results and some related previous
works as well over the number of station increasing
from 5 to 35 with two different priority access category
AC VO and AC BE. As illustrated in this figure, we
can observe the almost exact match between the numerical results of our proposed analytical model and
the simulation results as the total number of participated stations increasing while these two different priorities ACs will show their different capacity in form
of saturation throughput.
For the difference between with and without virtual collision handling, we
show both the saturation throughput of higher priority AC(AC VI) and lower one(AC BE) in Fig.5. we can
AC_BE(T.F.M's model)
AC_BE(Simulation)
Normalized throughpu
(AC_VO)
Figure 4. Saturation throughput comparison
among some numerical models and Simulation results in AC BE
0.035
0.5
0.45
0.4
0.35
0.3
0.25
0.2
0.15
0.1
0.05
0
0.03
0.025
0.02
0.015
0.01
0.005
0
5
10
15
20
25
30
35
Number of stations
AC_VO(With virtual collision handling)
AC_VO(Without virtual collision handling)
AC_BE(With virtual collision handling)
AC_BE(Without virtual collision handling)
Figure 5. Saturation throughput with/without
virtual collision
138
Normalized throughpu
(AC_BE)
4
0.4
0
Normalized
throughput
Pi,s Ti,M SDU
Si =
(1 − Pb )Te + Ps Ts + (Pb − Ps )Tc
0.5
easily find the fact that virtual collision mechanism favors even higher priority AC (AC VI), meanwhile devest the priority form the lower one (AC BE) . Also
the results show the virtual collision has little effect on
throughput performance under saturation condition especially the outer collisions are getting extremely drastic when the number of participated stations increasing.
5
[6] Robinson, J.W.; Randhawa, T.S., ”Saturation
throughput analysis of IEEE 802.11e enhanced
distributed coordination function,” Selected Areas
in Communications, IEEE Journal on Volume 22,
Issue 5, June 2004 Page(s):917 - 928.
[7] Engelstad, P.E.; Osterbo, O.N., ”Delay and
Throughput Analysis of IEEE 802.11e EDCA
with Starvation Prediction,” Local Computer Networks, 2005. 30th Anniversary. The IEEE Conference on 15-17 Nov. 2005 Page(s):647 - 655.
Conclusion
[8] Hua Zhu; Chlamtac, I., ”Performance analysis
for IEEE 802.11e EDCF service differentiation,”
Wireless Communications, IEEE Transactions on
Volume 4, Issue 4, July 2005 Page(s):1779 - 1788
In this paper, we have presented a unified three dimensional discrete Markov model to analyze the IEEE
802.11e EDCA mode under saturation condition. All
the important new features of the EDCA, viz., AIFS
and backoff co-operation process, different CW parameter setting, retransmission limit and virtual collision
handling have been taken into account in our analytical
modeling. So, this model can capture these new operations that defined in the final version of the IEEE
802.11e standard rather than those previous works
which are mostly based on the draft version.
The model and analysis provide an in-depth understanding and insights into IEEE 802.11 EDCA mechanism. They can also provide helpful and powerful analytical supports for further study, such as parametrization for different types of traffic, call admission control
schemes and active queue management for further QoS
improvement in WLANs.
[9] Yang Xiao, ”Performance analysis of priority
schemes for IEEE 802.11 and IEEE 802.11e
wireless LANs,” Wireless Communications, IEEE
Transactions on Volume 4, Issue 4, July 2005
Page(s):1506 - 1515.
[10] Jie Hui; Devetsikiotis, M., ”A unified model
for the performance analysis of IEEE 802.11e
EDCA,” Communications, IEEE Transactions on
Volume 53, Issue 9, Sept. 2005 Page(s):1498 1510.
[11] G. Bianchi, ”Performance analysis of the IEEE
802.11 distributed coordination function,” IEEE
JSAC, vol. 18, no. 3, March 2000.
[12] Tzu-Chieh Tsai; Ming-Ju Wu;, ”An analytical model for IEEE 802.11e EDCA,” Communications, 2005. ICC 2005. 2005 IEEE International Conference on Volume 5, 16-20 May 2005
Page(s):3474 - 3478 Vol. 5.
References
[1] IEEE Std 802.11-1997
[2] IEEE Std 802.11e-2005
[3] B. Smith, S. Choi, J. Prado, S. Shankar, and S.
Mangold, ”IEEE 802.11e Contention-Based Channel Access (EDCF) Performance Evaluation,” in
Proc. IEEE ICC 2003, Anchorage, Alaska, USA,
May, 2003
[13] Tantra, J.W.; Chuan Heng Foh; Mnaouer,
A.B.;, ”Throughput and delay analysis of the
IEEE 802.11e EDCA saturation,” Communications, 2005. ICC 2005. 2005 IEEE International Conference on Volume 5, 16-20 May 2005
Page(s):3450 - 3454 Vol. 5.
[4] P. Garg, R. Doshi, R. Greene, M. Baker, M.
Malek, and X. Cheng, ”Using IEEE 802.11e MAC
for QoS over Wireless,” in Proc. IEEE International Performance Computing and Communications Conference 2003, Phoenix, Arizona, U.S.A.,
April 2003
[14] Zhifeng Tao; Panwar, S.;, ”Throughput and delay analysis for the IEEE 802.11e enhanced distributed channel access,” Communications, IEEE
Transactions onVolume 54, Issue 4, April 2006
Page(s):596 - 603.
[15] IEEE Std 802.11b-1999
[5] S. Mangold, G. Hiertz, B. Walke, ”IEEE 802.11e
Wireless LAN -Resource Sharing with Contention
Based Medium Access,” IEEE PIMRC 2003, Beijing, China, September, 2003
139
Download