Supporting Deadline Monotonic Policy over 802.11 Average Service Time Analysis

advertisement
Supporting Deadline Monotonic Policy over 802.11
Average Service Time Analysis
Inès El Korbi
Ecole Nationale des Sciences de l’Informatique
Laboratoire Cristal
Université de la Manouba, 2010 Tunisia
ines.korbi@gmail.com
Abstract
In this paper, we propose a real time scheduling policy over 802.11 DCF protocol called Deadline Monotonic
(DM). We evaluate the performance of this policy for a
simple scenario where two stations with different delay
constraints contend for the channel. For this scenario a
Markov chain based analytical model is proposed. From the
mathematical model, we derive expressions of the average
medium access delay called service time. Analytical results
are validated by simulation results using the ns-2 network
simulator.
1. Introduction
The IEEE 802.11 wireless LANs [2] become more and
more reliable to support applications with Quality of Service (QoS) requirements. Indeed, the IEEE 802.11e standard [3] was recently proposed to offer service differentiation over 802.11.
In the absence of a coordination point, the IEEE 802.11
defines the Distributed Coordination Function (DCF) based
on the Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) protocol. In the DCF protocol, a station shall ensure that the channel is idle when it attempts
to transmit. Then it selects a random backoff in the contention window [0, CW − 1] , where CW is the current window size and takes its values between the minimum and the
maximum contention window sizes. If the channel is sensed
busy, the station suspends its backoff until the channel becomes idle for a DIFS period after a successful transmission or an EIFS period after a collision. When the backoff
reaches 0, the packet is transmitted. A packet is dropped if
it collides after maximum retransmission attempts.
The IEEE 802.11e standard proposes the Enhanced Distributed Channel Access (EDCA) as an extension for DCF.
978-1-4244-1890-9/07/$25.00 ©2007 IEEE
Leila Azouz Saidane
Ecole Nationale des Sciences de l’Informatique
Laboratoire Cristal
Université de la Manouba, 2010 Tunisia
leila.saidane@ensi.rnu.tn
With EDCA, each station maintains four priorities called
Access Categories (ACs). Each access category is characterized by a minimum and a maximum contention window sizes and an Arbitration Inter Frame Spacing (AIFS).
Although IEEE 802.11e classifies the traffic into four prioritized ACs, there is still no guarantee of real time transmission service due to the lack of a satisfactory scheduling
method for various delay-sensitive flows. Different analytical models have been proposed to evaluate the performance
of 802.11e standard [9],[4], all inspired from Bianchi’s
model [1] that calculates saturation throughput of 802.11
DCF.
In this paper, we focus on delay sensitive flows and propose to introduce the Deadline Monotonic (DM) scheduling policy over 802.11 to satisfy the delay requirements
of such flows. Indeed DM is a real time scheduling policy that assigns static priorities to flow packets according
to their deadlines; the packet with the small deadline being assigned the highest priority [7]. Supporting the DM
policy over 802.11, requires a distributed scheduling and a
new medium access backoff policies.
Distributed scheduling over 802.11 was early introduced
in [5] to allow stations maintaining the priority of the Head
Of Line (HOL) packets (highest priority packet) of all other
stations. Thus, stations can have a vision of the packets being transmitted in the network and adjust their backoff accordingly. Using a distributed scheduling mechanism similar to [5], we introduce in this paper a new medium access
backoff policy to support DM over 802.11, where the backoff value is inferred from the deadline information.
We then propose a Markov chain based analytical model
to evaluate the performance of DM for a simple scenario
where two stations with different deadline constraints contend for the channel. This configuration will reflect the behavior of DM over 802.11 and the mathematical model can
be extended for more complex scenarios. For the considered configuration, we evaluate for each station the average
medium access delay called average service time. Analytical results will be validated against simulation results using
the ns-2 simulator [8].
The rest of this paper is organized as follows. In section II, we present the distributed scheduling and the new
medium access backoff policy to support DM over 802.11.
In section III, we present the mathematical model based on
the Markov chains analysis. Section IV present analytical
and simulation results of the average service time. Finally,
we conclude the paper and present our future work in Section V.
2. Supporting DM policy over 802.11
Using the DM policy within a node means that the packets are sorted by increasing order of their deadlines such
as the HOL packet has the shortest delay bound. With the
DCF, all the stations share the same transmission medium
and the HOL packets of all the stations will contend for
the channel with the same priority even they have different
deadlines.
The idea of introducing DM over 802.11 is to allow
stations having packets with short deadlines to access the
channel with higher priority than those having packets with
long deadlines. Providing such a QoS requires a distributed
scheduling and a new medium access policy.
2.1. Distributed Scheduling
To realize a distributed scheduling over 802.11, we introduce a broadcast priority mechanism similar to [5]. Indeed
each station maintains a local scheduling table with entries
for HOL packets of all other stations. Each entry in the
scheduling table of node Si comprises two fields (Sj, Dj)
where Sj is the source node MAC address (Address 2 field
in DATA packet and RA field in the ACK packet) and Dj
is the deadline of the HOL packet of Sj. To broadcast the
HOL packet deadlines, we propose to use the DATA/ACK
access mode. The deadline information requires two additional bytes to be encoded in DATA and ACK packets.
When a node Si transmits a DATA packet, it piggybacks
the deadline of its HOL packet. The nodes hearing the
DATA packet add an entry for Si in their local scheduling
tables by filling the corresponding fields. The receiver of
the DATA packet copies the priority of the HOL packet in
the ACK and sends it back. All the stations that did not hear
the DATA packet add an entry for Si using the information
in the ACK packet.
In the following, we propose a new medium access policy, where the backoff value is inferred from the packet
deadline.
2.2. DM medium access backoff policy
Let’s consider two stations S1 and S2 transmitting two
flows with the same deadline D1 (D1 is expressed as a number of 802.11 slots). The two stations having the same delay bound can access the channel with the same priority using the native 802.11 DCF. Now, we suppose that S1 and
S2 transmit flows with different delay bounds D1 and D2
such as D1 < D2, and generate two packets at time instants t1 and t2. If S2 had the same delay bound as S1,
its packet would have been generated at time t20 such as
t20 = t2 + D21, where D21 = (D2 − D1). At that time
S1 and S2 would have the same priority and transmit their
packets according to the 802.11 protocol.
Hence, when S2 has a packet to transmit, it selects a
802.11 backoff, but suspends this backoff during D21 idle
slots. The D21 slots elapsed, 802.11 backoff can therefore
be decremented.
Thus to support DM over 802.11, each station uses a new
backoff policy where the backoff is given by:
• The random backoff selected in [0, CW −1], according
to 802.11 DCF, called BAsic Backoff (BAB).
• The DM Shifting Backoff (DM SB): corresponds to
the additional backoff slots that a station with low priority (the HOL packet having a large deadline) adds to
its BAB to have the same priority as the station with
the highest priority (the HOL packet having the shortest deadline).
Whenever a station Si sends an ACK or hears an ACK
on the channel its DM SB is reevaluated as follows:
DM SB(Si) = Deadline(HOL (Si)) − DTmin (Si) (1)
Where DTmin (Si) is the minimum of the HOL
packet deadlines present in Si scheduling table and
Deadline(HOL (Si)) is the HOL packet deadline of node
Si.
Hence, when Si has to transmit its HOL packet with a
delay bound Di, it follows this procedure:
1- It selects a BAB in the contention window [0, CW − 1].
2- The WHole Backoff (WHB) is computed as:
W HB(Si) = DM SB(Si) + BAB(Si)
3- If ( the channel is idle) Then
Decrement W HB(Si).
(2)
Else If ( DATA packet heard ) Then
Update the scheduling table
If (Si is the receiver) Then
Copy the packet priority in ACK
Reevaluate DM SB(Si) before
4) We suppose that we are in stationary conditions, i.e.
the two stations have already sent one packet to each
other. Thus, the two stations have the same scheduling
table.
Each station Si will be modeled by a Markov Chain representing the whole backoff (WHB) process.
sending ACK
End If
Else
If (ACK is heard) Then
Update the scheduling table
Reevaluate DM SB(Si);
End If
End If
Repeat steps 2) and 3)
3.1. Markov chain modeling station S1
Figure 1 represents the Markov Chain modeling station
S1. The states of this Markov chain are described by the
following quadruplet (R, i, i − j, −D21) where:
• R : takes two values S2s and S2c . When R = S2s ,
station S2 is decrementing its shifting backoff (its
DM SB) during D21 slots and wouldn’t contend for
the channel. When R = S2c , the D21 slots were
elapsed and S2 will contend for the channel at the
same time as S1.
• i : the value of the BAB selected by S1 in [0, W − 1].
4- If (W HB(Si) = 0) Then transmit.
• j : the current backoff value of S1. So (i − j) corresponds to the remaining backoff slots before reaching
0.
The steps 1-4 are repeated until the packet is correctly
transmitted or dropped. The contention window CW is doubled at each retransmission attempt until it reaches CWmax.
• D21 : corresponds to D2 − D1. We choose the
negative notation −D21 for S1 to express the fact
that S2 has a positive DM SB equals to D21 and
DM SB (S1) = 0.
End If
3. Mathematical Model of the DM policy over
802.11
In the hereby section, we propose a mathematical model
to evaluate the performance of the DM policy using Markov
chains analysis [1]. We consider the following assumptions:
1) The system under study comprises two stations S1 and
S2, such as Si transmits a flow F i having a deadline
Di and D1 < D2. We define D21 = (D2 − D1) as
the difference between the two delay bounds.
2) We operate in saturation conditions: each station has
immediately a packet available for transmission after
the service completion of the previous packet [1].
3) A station selects a BAB in a contention window
[0, W − 1]. We consider that each station selects a
802.11 backoff in the same contention window of size
W independently of the transmission attempt. This is
a simplifying assumption to limit the complexity of the
mathematical model.
Initially S1 selects a random BAB and is in one of the
states (S2s , i, i, −D21) , i = 0..W − 1. During (D21 − 1)
slots, S1 decrements its backoff with the probability 1
and moves to one of the states (S2s , i, i − j, −D21), i =
0.. (W − 1), j = min(max(0, i − 1), D21 − 1). Indeed during these slots, S2 is decrementing its DM SB
and wouldn’t contend for the channel. When S1 decrements its D21th slot it knows that henceforth, S2 can contend for the channel (the D21 slots were elapsed). Hence,
S1 moves to one of the states (S2c , i, i − D21, −D21),
i = D21..W − 1. If the BAB initially selected by S1
is smaller than D21, then S1 transmits when its backoff
reaches 0. If S2 transmits before S1 backoff reaches 0, the
next packet of S2 will decrement another DM SB and S1
will see the channel free again for D21 slots.
3.2. Markov chain modeling station S2
Figure 2 represents the Markov Chain modeling station
S2. Each state of S2 Markov chain is represented by the
quadruplet (i, k, D21 − j, D21) where:
Figure 1. Markov Chain modeling station S1
• i : refers to the BAB value selected by S2 in
[0, W − 1].
the explanations above, each station Markov chain states
can be divided in two groups:
• k : refers to the current BAB value.
- ξ1 : the set of states of S1 for which S2 will not contend
(states colored in blue in figure 1).
n
o
ξ1 = (S2s , i, i − j, −D21)i=0..W −1,j=0.. min(max(0,i−1),D21−1) .
• D21 − j : refers to the current DM SB of S2, j ∈
[0, D21].
• D21 : corresponds to (D2 − D1).
When S2 selects a BAB, its DM SB equals D21 and
is in one of states (i, i, D21, D21), i = 0..W − 1. If S2
observes the channel idle during D21 slots, it moves to
one of the states (i, i, 0, D21), i = 0..W − 1, where it ends
its shifting backoff. At that time, S2 begins decrementing its basic backoff. If S1 transmits, S2 re-initializes
its shifting backoff and moves again to one of the states
(i, i, D21, D21), i = 1..W − 1.
3.3. Blocking probabilities in the Markov
chains
We notice from figure 1 that when S1 is in one of
the states (S2s , i, i − j, −D21), i = 0..W − 1, j =
min (max (0, i − 1) , D21 − 1), it decrements its backoff
with the probability 1. That means that when S1 is in
one of these states, it knows that S2 is decrementing its
DM SB and is in one of the states (i, i, D21 − j, D21),
i = 0..W − 1, j = 0.. (D21 − 1).
However, when S1 is in one of the states
(S2c , i, i − D21, −D21), i = D21.. (W − 1), S2
has already decremented its DM SB and can now
contend for the channel by decrementing its basic
backoff. In this case, S2 will be in one of the states
(i, i, 0, D21)i=0..W −1 ∪ (i, i − 1, 0, D21)i=2..W −1 . From
- γ1 : the set of states of station S1 for which S2 can contend and decrements its BAB (states colored in pink in
figure 1).
γ1 = (S2c , i, i − D21, −D21)i=D21..W −1 .
- ξ2 : the set of states of S2 where S2 does not contend for
the channel (states colored in blue in figure 2).
n
o
ξ2 = (i, i, D21 − j, D21)i=0..W −1,j=0..D21−1 .
- γ2 : the set of states of S2, where S2 contends for the
channel (states colored in pink in figure 2).
γ2 = (i, i, 0, D21)i=0..W −1 ∪ (i, i − 1, 0, D21)i=2..W −1
Thus when S1 is in one of the states of ξ1 , S2 is obligatory in of the states of ξ2 . Similarly, when S1 is in one of
the states of γ1 , S2 is obligatory in of the states of γ2 .When
the station S2 is in one states of ξ2 , S2 is blocked with the
probability τ11 , this probability corresponds to the probability that S1 transmits knowing that it is in one of the states
of ξ1 . So:
τ11 =Pr [S1 transmits /ξ1 ]
=
W −1
P
i=0
(S2s ,0,0,−D21)
π1
min(max(0,i−1),D21−1)
(S2s ,i,i−j,−D21)
π1
j=0
P
(3)
Figure 2. Markov Chain modeling station S2
(R,i,i−j,−D21)
where π1
is the probability of the state
(R,
i,
i
−
j,
−D21)
in
the
stationary conditions and Π1 =
n
o
(R,i,i−j,−D21)
π1
is the probability vector of S1. We also
define τ12 , the probability that S2 is blocked knowing that
station S1 is in one of the states of γ1 . So:
3.4. Transition probability matrix of S1
Let P1 be the transition probability matrix of S1 and
P1 {i, j} is the probability to transit from state i to state
j. The transitions probabilities of station S1 are:
(S2c ,D21,0,−D21)
τ12 = Pr [S1 transmits /γ1 ] =
π1
(4)
W −1
P
(S2c ,i,i−D21,−D21)
π1
i=D21
In the same way, when S2 is in one of the states of ξ2 ,
S1 will decrement its backoff with the probability 1. Indeed,
no one of the ξ2 states corresponds to a transmission state
(those states describe the shifting backoff decremented by
S2). However, when S2 is in one of the states of γ2 , it contends for the channel and S1 is blocked with the probability
τ22 , such as:
τ22 =Pr [S2 transmits /γ2 ]
(i,0,0,D21)
= W −1
P
π2
(i,i,0,D21)
π2
i=0
W −1
+
P
(5)
(i,i−1,0,D21)
π2
P1 {(S2s , i, i − j, −D21) , (S2s , i, i − (j + 1) , −D21)} = 1,
i = 2..W − 1, j = 0.. min (max (0, i − 2) , D21 − 2)
P1 {(S2s , i, i − D21 + 1, −D21) , (S2c , i, i − D21, −D21)} = 1,
(8)
i = D21..W − 1
P1 {(S2s , i, 1, −D21) , (S2s , 0, 0, −D21)} = 1,
i = 1.. min (W − 1, D21 − 1)
(9)
P1 {(S2c , i, i − D21, −D21) , (S2c , (i − 1), (i − 1 − D21), −D21)}
= 1 − τ22 , i = D21 + 1..W − 1
(10)
c
s
P1 {(S2 , i, i − D21, −D21) , (S2 , (i − D21), (i − D21), −D21)}
= τ22 , i = D21 + 1..W − 1
(11)
P1 {(S2s , 0, 0, −D21) , (S2s , i, i, −D21)} =
1
W
, i = 0..W − 1 (12)
If (D21 < W ) then :
P1 {(S2c , D21, 0, −D21) , (S2s , i, i, −D21)} =
i=2
1
W
, i = 0..W − 1
(13)
(i,k,i−j,D21)
where π2
is the probability of the state
(i,
k,
i
−
j,
D21)
in
the
stationary
conditions and Π2 =
n
o
(i,k,i−j,D21)
π2
is the probability vector of S2. The blocking probabilities described above allows deducing the transition state probabilities and having the transition probability matrix Pi , for each station Si. Therefore, we can evaluate the state probabilities by solving the following system
[6]:
(
Π
i Pi = Πi
P
j
πi = 1
j
(6)
(7)
By replacing P1 and Π1 in (6) and solving the resulting
(R,i,i−j−D21)
system, we can express π1
as a function of τ22 ,
where τ22 is given by (5).
3.5. Transition probability matrix of S2
Let P2 be the transition probability matrix of S2. The
transitions probabilities of S2 are:
P2 {(i, i, D21 − j, D21) , (i, i, D21 − (j + 1), D21)} = 1 − τ11 ,
i = 0..W − 1, j = 0.. (D21 − 1)
(14)
P2 {(i, i, D21 − j, D21) , (i, i, D21, D21)} = τ11 ,
(15)
i = 0..W − 1, j = 0..(D21 − 1)
[4],[1]. TD is the time required to transmit the two bytes
deadline information and Tp is the time required to transmit the data payload. If we consider a constant size packets
for both stations, we have Ts = Tc .
As Te is the smallest duration event, the duration of all
events will be given by d Tevent
Te e.
P2 {(i, i, 0, D21) , (i, i − 1, 0, D21)} = 1 − τ12 ,
i = 2..W − 1
(16)
4.1. Z-transform of S1 service time
P2 {(1, 1, 0, D21) , (0, 0, 0, D21)} = 1 − τ12
(17)
P2 {(i, i, 0, D21) , (i, i, D21, D21)} = τ12 , i = 1..W − 1
(18)
P2 {(i, i − 1, 0, D21) , (i − 1, i − 1, D21, D21)} = τ12 ,
i = 2..W − 1
(19)
P2 {(i, i − 1, 0, D21) , (i − 1, i − 2, 0, D21)} = 1 − τ12 ,
i = 3..W − 1
(20)
To evaluate the Z-transform of station S1 service time
T S1 (Z), we define:
H1(R,i,i−j,−D21) (Z) : The Z-transform of the time already elapsed from the instant S1 selects a basic backoff in
[0, W − 1] (i.e. being in one of the states (S2s , i, i, −D21))
to the time it is found in the state (R, i, i − j, −D21) .
P2 {(0, 0, 0, D21) , (i, i, D21, D21)} =
1
W
, i = 0..W − 1
(21)
Replacing P2 and Π2 in (6) and solving the resulting sys(i,k,D21−j,D21)
tem, we can express π2
as a function of τ11
and τ12 given respectively by (3) and (4). Moreover, by re(R,i,i−j,D21)
(i,k,D21−j,D21)
placing π1
and π2
by their values,
in equations (3), (4) and (5), we obtain a system of non linear equations as follows:
We compute H1(R,i,i−j,−D21) , for each state of S1
Markov chain as follows:
H1(S2s ,W −1,W −1−j,−D21) (Z) =
H1(S2s ,i,i,−D21) (Z) =
1
Z, i = (W − D21) .. (W − 2)
W
H1(S2s ,i,i,−D21) (Z) = τ22 Z
1
+W
1 j
Z , j = 0..D21
W
T
d T se e
(24)
(25)
H1(S2c ,i+D21,i,−D21) (Z)
, i = 1.. max (0, (W − 1 − D21))
(26)

τ11 = f (τ22 )



τ12 = f (τ22 )
τ22 = f (τ11 , τ12 )


under the constraint:

τ11 > 0, τ12 > 0, τ22 > 0, τ11 < 1, τ12 < 1, τ22 < 1
H1(S2s ,i,i−j,−D21) (Z) = Z j H1(S2s ,i,i,−D21) (Z) ,
i = 1..W − 2, j = 1.. min(i − 1, D21 − 1)
Solving the above system (22), allows deducing the expressions of τ11 , τ12 and τ22 , and deriving the state probabilities
of S1 and S2 Markov chains.
H1(S2c ,i,i−D21,−D21) (Z) = Z D21 H1(S2s ,i,i,−D21) (Z)
+ (1 − τ22 ) ZH1(S2c ,i+1,i+1−D21,−D21) (Z) , i = D21..W − 2
(28)
1
H1(S2s ,0,0,−D21) (Z) =
W
min(W −1,D21−1)
+
4. Average Service time computation
X
H1(S2s ,i,1,−D21) (Z)
(29)
i=1
In this section, we evaluate the average MAC layer service time of S1 and S2 using DM policy. The service time
is the time interval from the time instant that a packet becomes at the head of the queue and starts to contend for
transmission to the time instant that either the packet is acknowledged for a successful transmission or dropped [10].
We propose to evaluate the Z-Transform of the MAC layer
service time [4] to derive an expression of the average service time. The average service time depends on the duration
of an idle slot Te , the duration of a successful transmission
Ts and the duration of a collision Tc [1], [4]. We have:
If the station S1 transmission state is (S2s , 0, 0, −D21) ,
the transmission will be successful since S2 was decrementing its shifting backoff. Whereas when the station S1 transmission state is (S2c , D21, 0, −D21), the transmission occurs successfully only if S2 doesn’t transmit with the probability (1 − τ22 ). Otherwise S1 selects another backoff and
tries another transmission. After m retransmissions, if the
packet is not acknowledged, it will be dropped. So:
T S1 (Z) =
d
τ22 Z
Tc
e
Te
m+1
H1(S2c ,D21,0,−D21) (Z)
Ts =(TP HY + TM AC + Tp + TD ) + SIF S
+(TP HY + TACK + TD ) + DIF S
(27)
(22)
+ H1(S2s ,0,0,−D21) (Z) + (1 − τ22 ) H1(S2c ,D21,0,−D21) (Z)
(23)
m P
Tc
i
τ22 Z d T e e H1(S2c ,D21,0,−D21) (Z)
Z
d Ts e
Te
i=0
Where TP HY , TM AC and TACK are the durations of the
PHY header, the M AC header and the ACK packet
(30)
4.2. Z-transform of S2 service time
In the same way, we define T S2 (Z), the Z-transform of
station S2 service time. We have:
H2(i,k,D21−j,−D21) (Z): The Z-transform of the time
already elapsed from the instant S2 selects a basic
backoff in [0, W − 1] (i.e. being in one of the states
(i, i, D21, D21)) to the time it is found in the state
(i, k, D21 − j, −D21) , and:
H2(i,i,D21,D21) (Z) =
H2(i,i,D21,D21) (Z) =
1
, i = 0 and i = W − 1
W
1
W
+ τ12 Z
T
e
d Ts e
(31)
H1(i+1,i,0,D21) (Z) ,
i = 1.. W − 2
+ (1 − τ12 ) Z
m P
τ12 Z
0
Tdec
(Z)=1
j
Tdec
(33)
(1 − τ11 ) Z
(Z)=
1 − τ11 Z
T
e
d Ts e
, j = 1..D21
j−1
Tdec
(Z)
(34)
So:
T
T
e
d Ts e
d T ce e
H2(0,0,0,D21) (Z)
(40)
i
H2(0,0,0,D21) (Z)
i=0
4.3. Average service time
From equations (30) and (40), we can derive the average
service time of both stations S1 and S2. The average service time of station Si will be denoted by Xi and is given
by:
(32)
j
To compute H2(i,i,D21−j,D21) (Z) , we define Tdec
(Z) ,
such as:
m+1
Tc
T S2 (Z) = τ12 Z d T e e H2(0,0,0,D21) (Z)
(1)
Xi = T Si
(1)
(41)
(1)
T Si
Where
(Z) , is the derivate of the service time Ztransform of station Si [6].
For Numerical results, S1 and S2 transmit 512
bytes data packets using 802.11.b MAC and PHY layers’parameters with a data rate equal to 11Mbps. For simulation scenarios, the transmission range of each node covers
250m and the distance between S1 and S2 is 5m. Figure 3
represent the average service time of both stations S1 and
S2 as a function of the contention window size W for different values of D21 = (D2 − D1) (D21 is given in slots).
j
H2(i,i,D21−j,D21) (Z) = H2(i,i,D21−j+1,D21) (Z) Tdec
(Z) ,
i = 0..W − 1, j = 1..D21
(35)
H2(i,i−1,0,D21) (Z) =
(1−τ12 )ZH2(i,i,0,D21) (Z)
Ts
d
e
1−τ12 Z Te T D21 (Z)
i = 2..W − 1
,
dec
(36)
(37)
We also have :
H2(i,i−1,0,D21) (Z)= (1 − τ12 ) Z H2(i+1,i,0,D21) (Z)
+H2(i,i,0,D21) (Z) , i = 2..W − 2
and:
H2(W −1,W −2,0,D21) (Z) = (1 − τ12 ) ZH2(W −1,W −1,0,D21) (Z)
(38)
Figure 3. Average Service Time vs Contention Window Size
According to figure 2 and using (31), we have:
H2(0,0,0,D21) (Z) =
(1−τ12 )ZH2(1,1,0,D21) (Z)
Ts
d
e
1−τ12 Z Te T D21 (Z)
dec
(39)
+H2(0,0,0,D21) (Z)
Therefore, we can derive an expression of S2 Ztransform service time as follows:
Figure 3 also compares the average service time of S1
and S2 to the one obtained with 802.11. It shows that all
the curves of the average service time of S1 are below the
of one of 802.11 and the curves of the average service time
of S2 are above the one of 802.11. In figure 4, we represent
X1 and X2 as a function of D21, (W = 128). We notice
that the average service time of station S1 flow decreases
as D21 increases. The opposite scenario happens for S2
flow. We can therefore conclude that compared to 802.11,
the DM policy offers better delay guarantees for the flow
with the small deadline.
[3] IEEE 802.11 WG, ”Draft Supplement to Part 11:
Wireless Medium Access Control (MAC) and physical layer (PHY) specifications: Medium Access Control (MAC) Enhancements for Quality of Service
(QoS)”, IEEE 802.11e/D13.0, Jan. 2005.
[4] Engelstad, P.E. and Osterbo O.N., ”Queueing Delay Analysis of 802.11e EDCA”, Proceedings of
The Third Annual Conference on Wireless On demand Network Systems and Services (WONS 2006),
France, Jan. 2006.
[5] Kanodia, V., Li, C., ”Distribted Priority Scheduling and Medium Access in Ad-hoc Networks”, ACM
Wireless Networks, Volume 8, Nov. 2002.
[6] Kleinrock, L., “Queuing Systems,Vol. 1”, John Wiley,
1975.
[7] Leung, J. Y. T., Whitehead, J, “On the Complexity
of Fixed-Priority Scheduling of Periodic, Real-Time
Tasks”, Performance Evaluation (Netherlands), pp.
237-250, Dec. 1982.
Figure 4. Average Service Time vs D21
5. Conclusion
In this paper we proposed to support the DM policy over
802.11 protocol. Therefore, we used a distributed scheduling algorithm and introduced a new medium access policy.
Then we proposed a mathematical model to evaluate the
performance of the DM policy for a scenario where two stations with different delay bounds contend for the channel.
Analytical and simulation results show that the station with
the shortest deadline has the shortest medium access delay.
We can hence conclude that DM performs service differentiation over 802.11 and offers better guaranties in terms of
average service time for the flow having the small deadline.
In future works, we intend to generalize the deadline monotonic analytical model to n contending stations transmitting
real time flows with different deadline constraints.
References
[1] Bianchi, G., ”Performance Analysis of the IEEE
802.11 Distributed Coordination Function”, IEEE JSAC Vol. 18 N. 3, Mar. 2000, pp. 535-547.
[2] IEEE 802.11 WG, ”Part 11: Wireless LAN Medium
Access Control (MAC) and Physical Layer (PHY)
specification”, IEEE 1999.
[8] McCanne, S., Floyd, S., The network simulator - ns-2,
http://www.isi.edu/nsnam/ns/.
[9] Xiao, Y., ”Performance analysis of IEEE 802.11e
EDCF under saturation conditions”, Proceedings of
ICC, Paris, France, June 2004.
[10] Zhai, H., Kwon, Y., Fang, Y., ”Performance Analysis of IEEE 802.11 MAC protocol in wireless LANs”,
Wireless Computer and Mobile Computing, 2004.
Download