Modeling the IEEE 802.11e EDCA for MAC parameter optimization

advertisement
Modeling the IEEE 802.11e EDCA for MAC parameter optimization
Boris Bellalta1 , Cristina Cano1 , Miquel Oliver1 , Michela Meo2
(1) Universitat Pompeu Fabra, Barcelona, Spain
{boris.bellalta,cristina.cano,miquel.oliver}.upf.edu
(2) Politecnico di Torino, Torino, Italy
michela.meo@polito.it
Abstract
A model of the IEEE 802.11e EDCA function is presented. The model is built to be simple, but
providing a clear description of the inter-relations between the EDCA MAC parameters (AIF S,
CWmin , CWmax and T XOP values) and the traffic flow characteristics (packet arrival rate and
packet length). The model is intended to be used as an abstraction of the IEEE 802.11e MAC
protocol in WLAN flow level simulations and/or analytical studies, such as Radio Resource Management and Call Admission Control. Moreover, as the model is able to capture the reciprocal
effects of tuning the MAC parameters, it can be used for optimization purposes as is presented in
this paper. Thus, using a multigoal optimization function, the optimal EDCA MAC parameters are
computed and evaluated in presence of elastic (BE) and rigid (V O) flows. The optimization process
has the goals of maximizing the elastic throughput while assuring the bandwidth-delay requirements
of the rigid flows. Finally, the outcomes allow us to define a procedure to tune iteratively the MAC
parameters, showing performances close to the optimal ones.
Keywords: IEEE 802.11e, EDCA, elastic and rigid flows
1
Introduction
IEEE 802.11 based WLANs [1] have become the most popular mobile/wireless broadband access to
Internet. Currently, the major part of the traffic carried by these networks is composed by traditional
internet services such as web browsing, e-mail or file transfer from P 2P applications [3]. However, voice
calls over Internet (VoIP) and other streaming or interactive services like real-time video or games will
play an important role in future heterogenous multiservice wireless networks.
In order to satisfy the higher traffic and the service requirements of novel applications, WLAN technology evolves in two clear directions: i) trying to maximize the utilization of the wireless channel with
novel PHY specifications, using OFDM and MIMO techniques and ii) improving traffic differentiation
mechanisms at MAC level, in order to manage properly the different traffic profiles.
First Access Points (AP) and wireless cards implementing the EDCA (Enhanced Distributed Channel Access) [2] are already commercially available under the WMM (Wireless MultiMedia) denomination. EDCA/WMM provides traffic differentiation by classifying the traffic flows in different Access
Categories (ACs) where each AC has its own MAC parameters.
About the parameters considered in EDCA, two basic questions arises: are optimal the standard
suggested parameters? Can other settings allow better performance results? In this paper we try to
answer these questions. To do this, a model of the IEEE 802.11e EDCA is developed. The model is
designed to be simple and computationally efficient but capable of capturing the main relationships
among MAC parameters in both saturated and non-saturated conditions. For more detailed and
complex (also in computational terms) models, refer to [4] for saturated traffic conditions or [5] and [7]
for unsaturated ones. Once the model is validated, it is used to find the optimal MAC parameters using
P29/1
a multi-objective optimization function. Finally, performance metrics obtained with the DCF , EDCA
and EDCA∗ (optimal parameters) are compared and used to present a simple EDCA parameter tuning
algorithm (EDCA − T A) which performs close to the optimal one.
2
A model of the IEEE 802.11e
The IEEE 802.11e EDCA classifies the traffic flows in Access Categories (ACs). Four ACs are defined,
each one associated to a single MAC transmission queue, where each AC has its own MAC parameters
and behaves independently of others. Letting ACj , with j = 1..4 the access category j, the basic
MAC parameters of each access category are labelled as: Arbitration Interframe Space (AIF Sj ), Minimum Contention Window (CWmin,j ), Maximum Contention Window (CWmax,j ) and Transmission
Opportunity (T XOPj ) 1 . The default values of each parameter are reported in Table 1.
AC
0 (Background: BK)
1 (Best effort: BE)
2 (Video: VI)
3 (Voice: VO)
Aj
7
3
2
2
T XOPj (ms)
0
0
6.016
3.264
Bj (packets)
0
0
4
2
CWmin,j
CWmin
CWmin
CWmin /2
CWmin /4
CWmax,j
CWmax
CWmax
CWmin
CWmin /2
Table 1: Default EDCA values
2.1
Modeling a node
A mobile node (including the AP) is modeled as a single queue of length K packets. Packets arrive
to the M Ni queue following a Poisson process with rate αi , where subscript i identifies the node i in
the network (i = 1 . . . n). The packet arrival rate is related to the bandwidth Br,i and the average
packet length E{Li } (assumed to be exponentially distributed) of the traffic flow active in M Ni ,
αi = Br,i /E{Li }. Packet service rate depends on the M Ni MAC parameters (BEBi,j , T XOPi,j and
AIF Si,j ) but also on the behavior of the others M N s (which also depends on their MAC parameters
and traffic profile). As we consider a single AC per node, the j subscript is avoided.
2.2
Channel probabilities
During the back-off process a M N senses continuously the channel, which can be in one of these three
states: empty, in a successful transmission or in a collision. Another possible state, not considered
here as the channel is assumed to be error-free, is the erroneous, meaning a successful transmission
but containing erroneous bits due to channel impairments.
Let pe,i , ps,i and pc,i be the probabilities with that M Ni sees each channel state. These probabilities
are related to the stationary transmission probability of the other n − 1 nodes, τj , j 6= i, and are given
by
pe,i =
Y
(1 − τj )
j6=i
2.3
ps,i =
X
τz
z6=i
Y
(1 − τj )
pc,i = 1 − pe,i − ps,i
(1)
j6=z6=i
Average slot duration
From the point of view of the M Ni , the back-off counter is only decreased after sensing the channel
free for σ seconds (one slot time). If during the back-off count-down the channel is sensed busy, the
back-off counter is frozen until the channel is detected free once again. Therefore, the time between
1
For simplicity, a fixed number of Bj packets, independent of their length, is considered.
P29/2
http://folk.uio.no/paalee/
two back-off decrements is a random variable which depends on previous channel probabilities and the
duration of the events related with them, which its expected value is
Bk ,•
•
αi = pe,i σ + ps,i (ETs,i
+ σ) + pc,i (ETc,i
+ σ)
(2)
• is the expected duration of a collision and ET Bk ,• is the expected duration of a
where ETc,i
s,i
successful transmission. The • denotes that this expected duration is from the point of view of the
M Ni which is in back-off.
To obtain the values for these channel durations, the multiple-packet transmission (EDCA’s T XOP )
for M Nk6=i has to be considered. Thus, the duration of a successful transmission depends on: i) the
packet length statistics of the transmitting node, ii) the ACK policy considered and iii) the number of
packets transmitted, which also depends on the queue occupation and the T XOP value (upper limit) of
the transmitting node (M Nk ). Notice that, higher values of T XOP will increase the time the channel
is occupied by M Nk . However, at the same time, the number of channel attempts by M Nk is expected
to be lower (which is only true if the M Nk is un-saturated) which results in higher pe,i values. In the
• only
other side, the duration of a collision comprises always a single MPDU transmission, so ETc,i
depends on the packet length statistics of the colliding nodes. To compute them, refer to [9].
At worst, from the point of view of the other nodes, we will assume that M Nk always transmits
Bk ,•
bulks of Bk packets (independently of its queue occupancy), resulting in a channel use equal to ETs,k
seconds at each successful transmission.
2.4
Transmission Probability
The probability that the M Ni transmits in a random chosen slot, τi , depends on i) M Ni has data to
be transmitted and ii) its AC parameters and iii) the behavior of other nodes. Taken into account all
contributions, the transmission probability is
τi =
ρi
EBia + 1
(3)
where the EBia includes the count-down slots from the BEBi instance (EBi ) and the extra blocked
slots due to the AIF Si behavior, with EBia = Ai + EBi + EBib . Note that we are approximating the
AIF S effect as extra slots (EBib ) that M Ni has to wait.
2.4.1
Binary Exponential Back-Off (BEB)
Prior to transmit, a MN starts a backoff instance. The same expression obtained by Bianchi [8] is used
to calculate the average number of slots, EBi , that M Ni has to wait before to transmit a packet.
2.4.2
Arbitration Interframe Space (AIFS)
An approach similar to [5] is used to compute the average number of blocked slots due to the AIF Si
duration, EBib . Thus, the number of transmissions observed by M Ni during its back-off countdown is
ptr,i · EBi , with
ptr,i = 1 −
Y
(1 − τj )
(4)
j6=i
which is the probability that M Nk6=i transmit while M Ni is in back-off. Thus, the average extra
number of blocked slots is
EBib = ptr,i · EBi · Ai
(5)
Notice how the impact of Ai is related to the transmission probability of the other nodes. For instance,
EBib is equal to 0 if there are no other M N transmitting.
P29/3
2.4.3
Queue utilization
Under the assumption that each packet is released from the transmission queue each time its corresponding ACK is received (so, no Block ACK is considered), the M Ni is modeled as a simple
M/M/1/Ki queue with departure rate depending on the T XOPi limit (Bi , measured in packets).
Thus, for the M Ni , the departure rates are modeled as
µi = Bi /XiBi
(6)
where XiBi is the TXOP service time for M Ni due to a transmission of Bi packets. The queue
utilization from M Ni , ρi is computed as the probability that the queue is not empty, so ρi = 1 − π0s ,
from the queue steady state probability distribution.
2.5
Packet Service Time
The packet service time is the effective delay since a packet is ready to be transmitted (head of the
queue) until it is released from the queue, as it has been correctly delivered or discarded due to a
maximum retry limit Ri .
Considering ideal channel conditions, a packet is not correctly received only if it suffers a collision.
The conditional probability of packet collision for M Ni is
ptr,i = 1 −
Y
(1 − τk )
(7)
k6=i
which is equivalent to the probability that at least another M Nk6=i transmits in the same slot
than M Ni . The average number of transmissions that a packet undergoes is computed under the
independence assumption as,
Mi =
i +1
1 − pR
i
1 − pi
(8)
Finally, the service time is given by
Bi
XiBi = (Mi − 1) (EBia αi + ETc,i ) + EBia αi + Ts,i
(9)
Bi
where Mi is the average number of required transmissions, αi is the average slot duration, Ts,i
is the
duration of a Bi packets burst transmission and ETc,i is the average duration of a collision involving
node i.
Traffic Flow
elastic (E)
rigid (R)
Bandwidth
max.available
100 Kbps
Frame Length
1500 Bytes
200 Bytes
Table 2: Traffic Profiles
3
Model and Scenario Validation
A single-hop ad-hoc scenario with ne = 4 nodes carrying an elastic (saturated) flow and ns (variable)
nodes carrying a rigid one (un-saturated) is built. The traffic profile for each node class is shown in
Table 2 and results are plotted in Fig. 1. Analitical results are compared with the ones obtained from a
detailed simulator of the IEEE 802.11e EDCA MAC protocol, developed using the COST (Component
Oriented Simulation Toolkit) simulation package [10]. The parameters used to validate the model are
shown in Table 3.
P29/4
Parameter
Rdata
AIF Sj ,
SIFS
TXOP
SLOT (σ)
RTS
MAC header
PLCP preamble
Retry Limit (R)
Value
2 M bps
see Table 1
10 µs
see Table 1
20 µs
160 bits @ Rbasic
240 bits @ Rdata
144 bits @ Rbasic
7
Parameter
Rbasic
RP HY
CWmin = 32
CWmax
ACK
CTS
MAC FCS
PLCP header
K (Queue length)
Value
1 M bps
1 M bps
see Table 1
see Table 1
112 bits @ Rbasic
112 bits @ Rbasic
32 bits @ Rdata
48 bits @ Rbasic
20 packets
Table 3: System parameters of the IEEE 802.11b specification [1]
5
14
5
x 10
18
B=1 sim
B=4 sim
B=8 sim
B=1 model
B=4 model
B=8 model
12
x 10
B=1 sim
B=4 sim
B=8 sim
B=1 model
B=4 model
B=8 model
16
14
10
12
8
bps
bps
10
8
6
6
4
4
2
2
0
0
2
4
6
8
10
12
14
R flows
0
0
5
10
15
R flows
(a)
(b)
Figure 1: Aggregate Throughput for (a) Elastic flows and (b) Rigid flows
Three values of Bi for rigid flows are considered: 1, 4 and 8. The other parameters are equal to the
defined in [2] for the AC V O. As can be seen, both simulation and model match very well. Moreover,
from Fig. 1 the benefits of using higher Bi limits can be explained. For example, considering the
no utilization of the T XOP mechanism (single packet transmission, Bi = 1) only 4 rigid flow behave
correctly. However, increasing the T XOP value, the system reaches up to 8/9 rigid flows respectively.
The same model using an M/M/1[1,Bi ] /Ki bulk queue had been validated in [9].
Searching the optimal EDCA parameters (EDCA∗ )
4
In order to compute the optimal working parameters, a multi-goal optimization function is used. Four
objectives are defined: i) to guarantee the rigid throughput, ii) a queue utilization of rigid flows near
ρV O = 0.8, iii) an average queuing delay (including service time) lower than 150 ms and iv) the
maximum allowable elastic throughput. The set of weights are: i) the rigid throughput is considered
a hard constraint (1 %), ii) a low level of flexibility for ρV O (10 %), iii) a soft requirement for
the average queueing delay (10%) 2 and iv) a very soft requirement for the best-effort throughput
2
as the queue length of MN is limited to 20 packets, the average delay had a very lower influence during the optimization
process
P29/5
(75 %)). The optimization problem is solved by using the MATLAB 3 package. The allowed range
for MAC parameters is: CWmin,BE = [32, 1024], CWmin,V O = [8, 32], ABE = [3, 7], AV O = [2],
T XOPBE = [1, 7] and T XOPV O = [1, 7].
To obtain the optimal parameters a fixed number of elastic flows equal to ne = 3 and a variable
number of rigid flows ns are considered. Packet lengths are the same shown in Table 2 but three
different bandwidth BV O values are considered for rigid flows: 100, 150 and 200 Kbps. The optimal
parameters are shown in Table 4. From these results, next tendencies are observed:
1. The CWmin,BE and CWmin,V O are used only for a ”fine-tuning” optimization. These parameters
are only significatively modified when all other parameters are at their maximum/minimum
values.
2. As we are trying to maximize the BE throughput, the T XOPBE starts with higher values. It is
decreased as the contention increases (ns flows increases). However, which is remarkable, prior
to decrease this value, the system tries to check whether higher values of T XOPV O are feasible.
For example with BV O = 150 Kbps and ns = 4, a single increment of T XOPV O allows also to
increase T XOPBE , regarding the optimal parameters for ns = 3.
3. The T XOPV O starts with lower values and it is increased as contention increases.
4. AIF SBE only is increased when both T XOPBE and T XOPV O are near its minimum/maximum
value. Is interesting to see how its influence is related with the traffic load. Thus, increasing the
number of V O flows could not require increase the AIF SBE value.
nr
1
2
3
4
5
6
7
8
9
10
11
Br = 100 Kbps
BE
VO
{32, 7, 3}
{9, 4, 2}
{32, 7, 3}
{9, 4, 2}
{32, 7, 3}
{9, 3, 2}
{32, 7, 3}
{9, 6, 2}
{32, 7, 4} {10, 8, 2}
{32, 7, 3} {10, 7, 2}
{32, 7, 3}
{9, 7, 2}
{32, 7, 3} {10, 7, 2}
{33, 6, 3}
{9, 5, 2}
{35, 2, 4} {10, 8, 2}
{377, 1, 7} {15, 8, 2}
Br = 150 Kbps
BE
VO
{32, 7, 3} {9, 3, 2}
{32, 7, 3} {9, 3, 2}
{32, 6, 3} {9, 4, 2}
{32, 7, 3} {9, 5, 2}
{32, 7, 3} {11, 8, 2}
{32, 7, 4} {9, 8, 2}
{45, 1, 7} {16, 8, 2}
···
···
···
···
···
···
···
···
Br = 200 Kbps
BE
VO
{32, 7, 3} {8, 4, 2}
{32, 7, 3} {9, 5, 2}
{32, 7, 4} {9, 6, 2}
{32, 2, 3} {8, 4, 2}
{32, 1, 5} {8, 7, 2}
···
···
···
···
···
···
···
···
···
···
···
···
Table 4: Optimization suggested MAC parameters, with {CWmin,i , Ai , Bi }
Using the optimal settings, called EDCA∗ , the system performance is plotted in Fig. 2. Notice
that using the DCF any rigid flow is able to achieve its throughput requirements as the elastic flows
starve the rigid ones. This is solved by using the EDCA (fixed parameters) which show a clear and
strict traffic differentiation between the V O and BE ACs. However, allowing higher ρV O values than
the ones provided by EDCA, the overall performance is improved using the EDCA∗ parameters. For
all three BV O values, using EDCA∗ there are an increment of one rigid flow over the maximum number
of supported rigid flows from EDCA at the cost of reducing the BE throughput only in this point.
For any other number of ns a higher BE throughput is obtained.
3
c http://www.mathworks.com
°
P29/6
6
2
6
x 10
2
DCF − R
DCF − E
EDCA − R
EDCA − E
EDCA* − R
EDCA* − E
1.8
1.6
6
x 10
2
DCF − R
DCF − E
EDCA − R
EDCA − E
EDCA* − R
EDCA* − E
1.8
1.6
1.6
bps
1.2
bps
1.4
1.2
bps
1.4
1.2
1
1
0.8
0.8
0.8
0.6
0.6
0.6
0.4
0.4
0.4
0.2
0.2
0.2
0
0
2
4
6
R flows
8
10
0
12
0
1
2
3
(a)
4
5
R flows
6
7
8
9
0
10
12
7
ρVO
VO
10
6
1
0.5
8
5
DCF
EDCA
EDCA*
ρ
ρVO
0.5
4
1.5
1
6
R flows
3
DCF
EDCA
EDCA*
1
4
2
(c)
1.5
2
1
R flows
DCF
EDCA
EDCA*
0
0
(b)
1.5
0
DCF − R
DCF − E
EDCA − R
EDCA − E
EDCA* − R
EDCA* − E
1.8
1.4
1
x 10
0
0.5
0
1
2
3
(d)
4
5
R flows
6
7
8
9
10
0
0
(e)
1
2
3
4
R flows
5
6
7
8
(f)
Figure 2: Throughput (a) 100 Kbps, (b) 150 Kbps, (c) 200 Kbps and Queue Utilization (d) 100 Kbps
(e) 150 Kbps (f) 200 Kbps
4.1
Setting different ρ levels
The goal over the V O queue utilization provides a threshold between queuing delay and losses for
V O flows and the flexibility to allocate extra resources to the BE AC flows. This means that lower
objective values for ρV O will give higher protection to V O flows (less losses and delay) but also lower
throughput for BE flows. Setting a bandwidth of BV O = 150 Kbps, with ns = 5 and ne = 3, the
parameter evolution for different ρV O values is described in Table 5. Notice that we have increased
the range of possible AV O values up to 7 to provide more freedom to the optimization function.
The BE throughput resulting of setting different ρV O objective values is shown in Fig. 3. Note
how lower ρV O are conservative and are obtained by decreasing the BE performance. Although, higher
ρV O allow the system to allocate more resources for the BE flows.
5
A parameter tuning algorithm (EDCA − T A)
As the optimization process is computationally costly, a simple algorithm capable of capture the
tendencies observed is required. Then, we have proposed the following tuning algorithm.
1. Initialize the parameter vector to the EDCA defined parameters, so ξ = [BE : (32, 7, 3), V O :
(8, 1, 2)]. Set the goals vector G = (SV O , D) to the desired values of throughput SV O and delay
P29/7
Objective ρV O
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
B = 150
BE
{177, 1, 4}
{81, 1, 5}
{32, 2, 3}
{32, 1, 1}
{32, 4, 1}
{32, 3, 1}
{32, 2, 1}
{39, 7, 5}
{32, 2, 1}
Kbps
VO
{8, 7, 2}
{8, 8, 2}
{8, 6, 2}
{8, 5, 2}
{8, 8, 2}
{8, 6, 2}
{9, 4, 2}
{11, 4, 2}
{8, 4, 3}
Table 5: Optimization suggested MAC parameters, with {CWmin,i , Ai , Bi }
5
1.5
11
EDCA
EDCA*
ρVO objective
x 10
EDCA−R
*
EDCA −R
EDCA−E
EDCA*−E
10
9
8
1
7
bps
ρVO
6
5
4
0.5
3
2
1
0
0
0.1
0.2
0.3
0.4
ρ
VO
0.5
0.6
objective
0.7
0.8
0.9
1
0
0
0.1
0.2
0.3
0.4
ρ
VO
(a)
0.5
0.6
objective
0.7
0.8
0.9
1
(b)
Figure 3: (a) Goodness of fitting (ρV O ) (b) Throughput for different ρV O values
D (mean and jitter). Go to 2.
2. Using the current parameters ξ. Check whether the goals (allowing a 1 % of packet losses) are
achieved or the maximum number of iterations have been reached. If so, go to Step 4. Else, go
to Step 3.
3. Increase/Decrease sequentially (only one change each iteration):
(a) T XOPV O → T XOPV O + 1. Update ξ. Go to Step 2.
(b) ABE → ABE − 1. Update ξ. Go to Step 2.
(c) T XOPBE → T XOPBE − 1. Update ξ. Go to Step 2.
If the maximum values of all three parameters have been reached, double at each iteration the
value of CWmin,BE until its maximum value is reached. Update ξ. Go to Step 2.
4. Set the working parameters to ξ.
Running the algorithm in the same conditions in what the EDCA∗ parameters have been obtained,
the MAC parameters resulting are shown in Table 6. Notice the similar behavior with the optimal
parameters of previous section. Moreover, in Fig 4 there are plotted the aggregate throughput and
the queue utilization for the EDCA∗ and the EDCA − T A parameters. Rigid throughput is perfectly
matched by the proposed algorithm as it is the main objective of the EDCA−T A algorithm. However,
P29/8
nr
1
2
3
4
5
6
7
8
9
10
11
Br = 100
BE
{32, 7, 3}
{32, 7, 3}
{32, 7, 3}
{32, 7, 3}
{32, 7, 4}
{32, 7, 4}
{32, 6, 4}
{32, 6, 5}
{32, 5, 6}
{32, 2, 7}
{1024, 1, 7}
Kbps
VO
{8, 2, 2}
{8, 2, 2}
{8, 2, 2}
{8, 2, 2}
{8, 2, 2}
{8, 2, 2}
{8, 3, 2}
{8, 3, 2}
{8, 4, 2}
{8, 6, 2}
{8, 8, 2}
Br = 150
BE
{32, 7, 4}
{32, 7, 4}
{32, 7, 4}
{32, 6, 4}
{32, 6, 5}
{32, 4, 6}
{256, 1, 7}
···
···
···
···
Kbps
VO
{8, 2, 2}
{8, 2, 2}
{8, 2, 2}
{8, 3, 2}
{8, 3, 2}
{8, 4, 2}
{8, 8, 2}
···
···
···
···
Br = 200 Kbps
BE
VO
{32, 7, 4} {8, 2, 2}
{32, 6, 4} {9, 2, 2}
{32, 6, 4} {9, 3, 2}
{32, 5, 5} {8, 4, 2}
{32, 2, 7} {8, 6, 2}
···
···
···
···
···
···
···
···
···
···
···
···
Table 6: Parameter selected from algorithm, with {CWmin,i , Ai , Bi }
not significant lower values than the optimal are obtained for the BE throughput. Notice also, the
similar evolution of the ρV O with both parameter sets.
6
2
6
x 10
2
EDCA−TA − E
EDCA* − E
EDCA−TA − R
EDCA* − R
1.8
6
x 10
2
EDCA−TA − E
EDCA* − E
EDCA−TA − R
EDCA* − R
1.8
1.2
1.2
bps
1.4
1.2
bps
1.6
1.4
bps
1.6
1.4
1
1
0.8
0.8
0.8
0.6
0.6
0.6
0.4
0.4
0.4
0.2
0.2
0.2
0
2
4
6
R flows
8
10
12
0
1
2
3
4
5
6
7
8
9
0
ρr
1
0.5
12
7
EDCA−TA
EDCA*
ρr
ρr
0.5
10
6
1.5
1
8
5
EDCA−TA
EDCA*
1
6
R flows
4
(c)
1.5
4
3
R flows
EDCA−TA
EDCA*
2
2
(b)
1.5
0
1
R flows
(a)
0
EDCA−TA − E
EDCA* − E
EDCA−TA − R
EDCA* − R
1.8
1.6
1
x 10
0
0.5
0
1
2
3
4
5
R flows
(d)
(e)
6
7
8
9
0
0
1
2
3
4
R flows
5
(f)
Figure 4: Performance comparison between EDCA∗ and EDCA − T A
P29/9
6
7
8
6
Conclusions
The parameters suggested by EDCA are designed to provide a clear traffic differentiation, which could
reduce unnecessarily the performance of BE traffic. To solve this situation, we have proposed a simple
tuning algorithm which, compared with EDCA: i) increases the maximum number of feasible V O flows
and ii) improves significantly the throughput for the BE active flows. These gains are expected to be
greater as the data rate of the system increases.
7
Acknowledgements
This work was partially supported by Spanish Government under project TIC2003-09279-C02-01, and
by the European Commission under NEWCOM network of excellence.
References
[1] IEEE Std 802.11-1997; Information Technology- telecommunications And Information exchange
Between Systems-Local And Metropolitan Area Networks-specific Requirements-part 11: Wireless
Lan Medium Access Control (MAC) And Physical Layer (PHY) Specifications, IEEE Std 802.111997.
[2] IEEE Std 802.11e; Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY)
specifications; Amendment: Medium Access Control (MAC) Quality of Service Enhancements, IEEE
Std 802.11e-2005.
[3] C. Na, J. K. Chen, T. S. Rappaport; Hotspot Traffic Statistics and Throughput Models for Several
Applications, IEEE Globecom 2004, Dallas, Texas, USA, November 2004.
[4] J. W. Robinson, T. S. Randhawa; Saturation Throughput Analysis of IEEE 802.11e Enchanced
Distributed Coordination Function, IEEE JSAC, Vol, 22, No. 5, June 2004.
[5] Paal E. Engelstad and Olav N. Østerbø; Non-Saturation and Saturation Analysis of IEEE 802.11e
EDCF with Starvation Prediction, ACM/IEEE MSWIM 2005, Montreal, Quebec, Canada, November 2005.
[6] L. Scalia, I. Tinnirello; Differentiation mechanisms for heterogeneous traffic integration in IEEE
802.11 networks, IEEE BroadNets, Workshop on Broadband Wireless Multimedia, San José, California, October 2004.
[7] Peter Clifford, Ken Duffy, John Foy, Douglas J. Leith and David Malone; Modeling 802.11e for
data traffic parameter design, WiOpt, Limassol, Cyprus, April 2006.
[8] Giuseppe Bianchi; Performance Analysis of the IEEE 802.11 Distributed Coordination Function,
IEEE Journal on Selected Areas in Communications, Vol. 18, No. 3, March 2000.
[9] B. Bellalta, M. Meo, M. Oliver; A BEB-based Admission Control for VoIP calls in WLAN with
coexisting elastic TCP flows, ITC/IEEE NEW2AN’06. St. Pertersburg, Russia, June 2006.
[10] COST: Component Oriented Simulation Toolkit, http://www.cs.rpi.edu/ cheng3/sense/, Center
of Pervasive Computing and Networking, Computer Science Department, Renssealer Polytechnic
Institute, NY
P29/10
Download