Flexible Throughput Management in IEEE 802.11e Wireless LANs

advertisement
Flexible Throughput Management in IEEE 802.11e
Wireless LANs
Shafiqul Karim1, David Green2, Michael Rumsewicz3, Nigel Bean4
1
School of Electrical & Electronic Engineering, 2,3,4School of Mathematical Sciences
University of Adelaide, SA 5005, Australia
{1shafiqul.karim, 2david.green, 3michael.rumsewicz, 4nigel.bean}@adelaide.edu.au
Abstract—The IEEE 802.11e standard has been developed to
provide quality of service (QoS) support to a wireless local area
network (WLAN). The framework for the standard is defined
such that the precise configuration details are left open to allow
a variety of possible implementations. Therefore the challenge
lies in implementing a configuration to provide specific QoS
requirements in a WLAN. In this paper, we propose a control
scheme to provide flexible, throughput management. This scheme
is evaluated using simulations and is shown to perform very well.
I. I NTRODUCTION
The IEEE 802.11 standard [1] is currently the most popular
and widely deployed technology for wireless broadband access
to wired local area network (LAN) services and the Internet.
The IEEE 802.11 standard is similar to Ethernet, in that
only best effort service is provided. Best effort service in
most cases, is sufficient for network traffic based on Internet
services such as web browsing, e-mail, file transfers and peer
to peer (P2P) applications. However, in recent times interest
in providing QoS in WLANs has grown with the introduction
of Voice over Internet Protocol (VoIP) services and other
interactive services such as real-time audio/video streaming
and online games.
In order to satisfy the additional traffic demands and
service requirements placed on WLANs, the IEEE 802.11
Work Group established two clear research directions. Task
Group N was established in order to improve the overall
throughput/bandwidth capabilities of WLANs. The primary
focus has been on developing novel physical layer (PHY) specifications to provide the necessary improvements. Task Group
E was created to take an alternative approach. Their focus
has been on introducing service differentiation mechanisms at
the MAC layer level and as a result it replaces the MAC layer
implementation defined in the IEEE 802.11 standard. The task
group E finalized the IEEE 802.11e standard midway through
2005 and was approved and published in late 2005 [2].
The IEEE 802.11e standard defines the Hybrid Coordination
Function (HCF) for determining access to the transmission
channel. HCF introduces two access mechanisms, the Enhanced Distributed Channel Access (EDCA) and the HCF
Controlled Channel Access (HCCA). The two access mechanisms are extensions to the Distributed Coordination Function
(DCF) and optional Point Coordination Function (PCF) access
1-4244-1230-7/07/$25.00 © 2007 IEEE
mechanisms defined in the IEEE 802.11 standard.
The IEEE 802.11e standard does not define a configuration
for EDCA or HCCA that achieves the QoS goals of providing
flexible, throughput management. As a result, in this paper
we propose a control scheme configuration within the EDCA
framework that achieves these QoS goals.
Our control scheme provides flexible throughput management. The control scheme can be easily configured and
implemented into the EDCA framework. The remainder of
this paper is organized as follows. The DCF and EDCA
mechanisms are briefly reviewed and discussed in Section II
and Section III. The specific throughput service goals and the
required network architecture used to achieve these goals is
described in Section IV. In Section V we describe in the
detail the proposed control scheme. The control scheme is
investigated via simulations and the results are discussed in
Section VI. Finally, we conclude our paper in Section VII.
II. IEEE 802.11 DCF
The DCF access mechanism is a carrier sense multiple
access with collision avoidance (CSMA/CA) and binary exponential back-off system. A station with a data frame ready
to transmit observes the activity of the transmission channel
for an idle period interval equal to a distributed inter-frame
space (DIFS). After observing an idle period equal to a DIFS,
a station is required to wait for a random back-off interval
before commencing transmission.
The back-off interval is represented as a number of integer
slots, a slot refers to a fixed duration of time and the total
number of slots in the interval is referred to as the back-off
counter. The back-off counter is decremented each time the
transmission channel is observed to be idle for a slot duration.
Whenever activity is detected on the transmission channel, the
decrementing process is suspended and the current back-off
counter value is retained. When the transmission channel is
subsequently observed to be idle again for a DIFS interval, the
process of decrementing the back-off counter resumes using
the previously retained value. A station is allowed to transmit
its data frame immediately after its back-off counter reaches
zero.
The number of slots in a back-off counter is randomly
selected from the range [0, CW-1], where CW is the current
295
ICON 2007
back-off contention window size. The CW used is within
a fixed range defined by CW min and CWmax . The first
transmission attempt for a frame made by a station uses a
CW value set to the minimum value defined by CW min . With
each unsuccessful frame transmission attempt, the CW value
is doubled until the maximum value CW max is reached. A
station will continue attempting to retransmit a frame until a
retransmission counter elapses causing the station to simply
drop the frame.
A successful transmission involves the receiver station acknowledging it has correctly received a data frame from the
transmitter station. The receiver station will transmit an acknowledgment (ACK) frame back to the transmitter station, after an interval equal to a short inter-frame space (SIFS) elapses
from receiving the data frame. If an ACK is not received within
an ACK timeout duration, the transmitter station assumes
the data frame was not received. The transmitter station will
simply reschedule the data frame for retransmission according
to the procedures described above.
DCF also uses beacon frame broadcasts at fixed intervals to
provide management services within a WLAN. Some of the
management services provided include, timing synchronization, broadcasting the network identifier, the network security
information and supported PHY transmission bit rates.
III. IEEE 802.11 E EDCA
EDCA implements four virtual DCF access mechanisms
within the MAC layer of a single station. The DCF access
mechanism is the primary access mechanism used in IEEE
802.11 based wireless networks.
The four virtual DCF entities are referred to as access
categories (ACs), each of which achieves a differentiated
level of access to the transmission channel. Differentiation
is achieved by varying the amount of time each AC must
sense the transmission channel being idle and the size of the
contention window (CW) it uses in the back-off process [2].
The classification terminology for each AC as defined in the
standard is shown in Table I.
SIF S: Short Inter-frame Space interval duration.
SlotT ime: Slot duration.
In order for service differentiation to exist for an arbitrary
AC i and AC j, where 0 ≤ i < j ≤ 3 (AC Priority), at least
one of the following inequalities must be strict, CW min [i] ≥
CW min [j], CW max [i] ≥ CW max [j] and AIFSN[i] ≥ AIFSN[j].
As a result AC j will have a better chance to access the
transmission channel than AC i.
If more than one AC queue in the one station finishes its
back off procedure at the same time, the higher priority AC
is given the right to transmit. While the lower priority AC
assumes a collision has occurred and reschedules a retransmission. This is described as a virtual collision within a station.
EDCA also introduces the idea of a transmission opportunity (TXOP). The TXOP is the maximum period of time a
station can hold the transmission channel while transmitting
frames. A station cannot initiate a frame transmission if the
time it would take to successfully transmit the frame exceeds
the prescribed TXOP duration. Each AC can be assigned a
specific TXOP-Limit.
EDCA extends the use of beacon frames in WLANs to
include broadcasting AC specific parameters. The EDCA
parameter set for each AC which is broadcast includes, the
AIFSN, CW min , CW max and TXOP-Limit. The beacon frame
structure used in the IEEE 802.11e EDCA standard defines
the range and allowable values that can be used for setting
AIFSN, CW min , CW max and TXOP-Limit for each AC. For
further information please refer to [2].
EDCA is able to introduce QoS into the MAC layer primarily through service differentiation. The four ACs are used
to classify higher layer traffic and allows each to receive a
differentiated level of service. The ability of beacon frames to
broadcast the EDCA parameter set allows it be dynamically
changed as required to achieve a desired result. Thus the
challenge lies in determining a specific configuration of the
EDCA mechanism that achieves the desired service result.
IV. S YSTEM A RCHITECTURE AND D ESIRED S ERVICE
G OALS
TABLE I
ACCESS C ATEGORIES
AC Priority
0
1
2
3
AC
AC BK
AC BE
AC VI
AC VO
AC Designation
Background
Best Effort
Video
Voice
Each AC is assigned an interval referred to as an arbitration
inter-frame space (AIFS) and a range for its CW value. The
AIFS value determines the period of time an AC must sense
the transmission channel being idle and the respective CW
value governs the back-off process used [2].
So, AC[i] (i = 0,1,2,3), has the following parameters defined,
AIFSN[i] to determine the AIFS[i] duration, initial contention
window size CW min [i] and a maximum allowable contention
window size CW max [i]. AIFS[i] is computed as
AIF S[i] = SIF S + (AIF SN [i] × SlotT ime),
(1)
In this paper our goal is to develop a specific configuration
to implement within the EDCA framework that provides
flexible, throughput management. We restrict our configuration
only to an infrastructure based WLAN.
An infrastructure based WLAN is chosen since an access
point (AP) is present in this form of network. The AP is a central device in the network with the responsibility for relaying
frame transmissions and broadcasting beacon frames. These
two characteristics are exploited in our proposed configuration.
The proposed configuration controls the network behaviour
to achieve a set of specified throughput proportions amongst
the ACs. In addition, the control can be configured to maximize the combined total throughput of all ACs, while maintaining the required throughput proportions.
The next section discusses our proposed configuration used
to achieve these goals.
296
V. P ROPOSED C ONTROL S CHEME C ONFIGURATION
The EDCA mechanism allows the parameter set for each
AC to be modified. Numerous papers [3], [4], [5], [6], [7],
[8], [9], [10], [11], [12], [13], [14] have developed methods for
analytically estimating the throughput performance and MAC
delay characteristics for each AC. These are determined as a
function of the EDCA parameter set information for each AC,
the number of active stations transmitting and the transmitted
frame sizes. A fundamental assumption in most of the methods
is that the network is operating under saturation load with each
active station always attempting to transmit a frame.
Clearly, the network performance for an AC can be dynamically altered through clever selection of the EDCA parameters
[15]. Extending this idea, we can overlay specific constraints
for the throughput performance of an AC under saturation load
through appropriate EDCA parameter settings.
We demonstrate the strength of our approach by manipulating only the CWmin value in order to achieve a specified
throughput proportion for each AC. We assume the AIFS
value used for each AC is the same and the TXOP-Limit is
set only to allow single frame transmissions. In this paper,
purely for simplicity, we limit the system to a two AC
configuration, however the theory described can easily be
extended to encompass a full four AC configuration system.
We arbitrarily select AC3 and AC2 as the two access
categories used in the system. The AIFS value for both ACs is
a DIFS interval and the CW min value is set according to our
control scheme in each beacon frame broadcast. This value is
then manipulated by the exponential back-off procedure under
a collision scenario up to the default DCF value of CWmax
= 1023. In the case of the control scheme selecting a CWmin
> 1023, we set CW max = CW min .
We achieve the desired throughput proportion for AC3 and
AC2 by appealing to the relationship shown in equation (2).
This is analogous to applying weighted-round-robin (WRR)
across the access categories.
3
[ CWnmin3
]
2
[ CWnmin2
]
≈
T hrpt3
AC3access
≈
.
AC2access
T hrpt2
(2)
n3 : total number of stations transmitting AC3 traffic.
n2 : total number of stations transmitting AC2 traffic.
CWmin3 : AC3 access category value for CWmin .
CWmin2 : AC2 access category value for CWmin .
AC3access : transmission access probability for AC3.
AC2access : transmission access probability for AC2.
T hrpt3 : throughput for AC3 access category.
T hrpt2 : throughput for AC2 access category.
to determine the required relationship between CWmin3 and
CWmin2 , which should achieve the desired throughput proportions for given values for n3 and n2 .
This principle applies elegantly to a homogeneous traffic
profile for AC3 and AC2. For a heterogeneous traffic profile
with different frame sizes for AC3 and AC2, the proportional
transmission access theory is still valid. However, the equation
for the throughput proportions must include additional factors
and constraints related to the frame sizes for AC3 and AC2.
This modification is a relatively simple extension to equation
(2), but purely for simplicity in this paper, we assume a
homogeneous traffic profile for AC3 and AC2.
We verified that equation (2) is valid using the analytical
method described in [13]. This particular analytical method is
selected since it is one of the more recent methods describing
the behavior of the EDCA mechanism.
We observed through the verification procedure that the
relationship in equation (2), breaks down when the values of
CWmin3 and CWmin2 used are relatively small in comparison
to the values for n3 and n2 . The collision probability for an
AC is directly related to the number of stations transmitting
and the contention window size used. Therefore, small values
for CWmin3 and CWmin2 cause the collision probability to
be significant enough to cause a degradation in throughput
for AC3 and AC2, thus leading to different throughput
proportions being obtained. Therefore equation (2) holds when
we assume the values for CWmin3 and CWmin2 selected are
large enough to cause AC3access , AC2access << 1, for the
given n3 and n2 .
Achieving the service goal described in Section IV is
relatively straightforward. The set of CWmin3 and CWmin2
that achieve the target throughput proportions for a given n3
and n2 according to equation (2) are analyzed more deeply
using the analytical method [13]. The appropriate CWmin3
and CWmin2 value can now be selected to also achieve the
secondary goal of maximizing the combined total throughput
for AC3 and AC2.
An important detail omitted in the above discussions, is
the restriction imposed on the allowable range and values for
CWmin and CWmax for each AC. Beacon frames transmit
the parameters defined as ECWmin and ECWmax which are
used to calculate the values for CWmin and CWmax [2] by
CWmin = 2ECWmin − 1,
(3)
CWmax = 2ECWmax − 1.
(4)
Note that ECWmin , ECWmax {0, 1, ...., 15}.
The simple intuition behind the relationship is that the
selected values for CWmin3 and CWmin2 , should distribute
the proportion of access to the transmission channel according
to the required throughput proportion, given n3 and n2 .
Effectively, the proportional access to the transmission channel
leads to a similar proportional throughput performance for
AC3 and AC2. As a result, equation (2) can be rearranged
To keep within the standard framework, we firstly determine
the required CWmin3 and CWmin2 independent of the restriction mentioned above. Once the values have been calculated,
we simply choose the best combination of the nearest allowable exponentially encoded CWmin3 and CWmin2 values.
The entire scheme relies on knowing a priori the correct
values for n3 and n2 , so how can we accurately observe the
values of n3 and n2 from the WLAN?
297
TABLE II
MAC AND PHY PARAMETERS FOR IEEE 802.11 B
The AP in a WLAN acts as a relay device for all frame
transmissions performed by client stations and we utilize this
useful property in our proposed control scheme to determine
the value for n3 and n2 . The control scheme monitors all
successfully relayed frame transmissions within a beacon
frame period. For each successfully relayed frame, the control
scheme catalogues the size of the frame, the AC label used
(either AC3 or AC2) and which client station invoked the
transmission. Thus the control scheme can easily identify the
number of transmitting stations in each AC per beacon frame
period.
We extend this process further by using a sliding window
approach over two consecutive beacon frame periods. The
control scheme then determines the number of transmitting
stations, which successfully transmitted data frames of type
AC3 or AC2 over the two beacon frame periods. This is used
as an estimate for the value of n3 and n2 in the WLAN. Using
the estimated value of n3 and n2 , the control scheme computes
the CWmin3 and CWmin2 that achieves the required service
goals. The next beacon frame following the observation period,
is updated by the control scheme with the computed CWmin3
and CWmin2 values and is broadcast to all the client stations.
To implement this control scheme into the EDCA mechanism is quite simple. We can make use of the existing ability
within the AP to observe transmissions and broadcast beacon
frames to update the CWmin and CWmax values. The control
scheme remains within the framework defined by the standard
and no changes are needed in the client stations. The next
section discusses the simulation results obtained using our
proposed control scheme configuration.
VI. P ERFORMANCE E VALUATION OF S IMULATION
R ESULTS
Parameter
SIFS
DIFS
SlotTime
AIFSN3
AIFSN2
PHY header
MAC header
ACK frame
FCS (frame checksum)
Data Rate
Control Rate
Standard EDCA Settings
CWmax3 proposed settings
CWmax2 proposed settings
Retry Limit
TXOP-Limit
Beacon frame Period
RT S/CT S Mode
Value
10 μs
50 μs
20 μs
2
2
192 bits
256 bits
112 bits
32 bits
11 Mbps
1 Mbps
CWmin3 = 7, CWmax3 = 15
CWmin2 = 15, CWmax2 = 31
max {1023, CWmin3 }
max {1023, CWmin2 }
7
0 (single frame transmissions only)
100 ms
OFF
TABLE III
N UMBER OF ACTIVE STATIONS OVER T IME
n3
2
5
3
7
10
6
1
6
1
1
n2
8
6
1
7
4
9
1
7
4
5
Time Duration (sec)
25 - 35
35 - 45
45 - 55
55 - 65
65 - 75
75 - 85
85 - 95
95 - 105
105 - 115
115 - 125
A. Test 1 - Standard EDCA Configuration
In this section, we investigate the simulation results obtained from our proposed control scheme. The simulation
tool used is N S-2 (version 2.29) [16], combined with the
EDCA implementation in N S-2 developed by the TKN group
in Technical University of Berlin [17]. We have modified
the EDCA implementation to include our proposed control
scheme. The MAC and Physical layer parameters used are
shown in Table II. The actual number of active stations n3 and
n2 are changed according to Table III within the simulation
period.
The simulation tests we perform are the following:
Figure 1 shows the simulation results when using the
standard EDCA configuration. The results show the value
obtained for the AC3 throughput proportion fluctuates as the
number of n3 and n2 change over the simulation period. When
the number of stations n2 is greater than n3 , the throughput
of the system begins to favor AC2 over AC3. As result the
standard EDCA configuration is unable to maintain a specific
level of throughput proportion for AC3 and AC2, as the
number of stations n3 and n2 change.
Test 1: Employ the standard EDCA configuration parameters for AC3 and AC2.
Test 2: Optimize the network to maximize the throughput
of AC3 and AC2, while maintaining the AC3 throughput
proportion at 80%, 67% and 50% respectively.
The overall throughput performance of the standard EDCA
configuration also varies when the number of stations n3 and
n2 change. In particular the overall throughput performance
reduces when the value for n3 and n2 are relatively large.
This is attributed to the small fixed values of CWmin and
CWmax used for AC3 and AC2, thus causing an increase in
the probability of collisions occurring.
We simulate the traffic for AC3 and AC2 using a UDP flow
with packets of size 1000 bytes. The throughputs (for AC3
and AC2) and the proportion of throughput that is from AC3
are measured over one and ten second intervals respectively.
Therefore the standard EDCA configuration is unable to
maintain a consistent overall throughput performance with
varying n3 and n2 and does not provide any means of controlling the throughput proportions achieved in the network.
•
•
298
B. Test 2 - Controlled Proportion under Maximizing Throughput Constraint
Figures 2 to 4, show the simulation results coincide relatively well with the target throughput proportions. The results
fit quite well to the analytic throughput values calculated from
[13].
However, at certain points in the simulation results, noticeable changes in the achieved throughput proportion occur. This
is attributed to the restriction placed on the allowable CWmin
values that can used. The required throughput proportions
can not be perfectly achieved due to the restrictions on the
allowable CWmin values.
Another observation for all the results is, at certain points
in the simulation period, there are noticeable spikes in the
throughput plots. The spikes coincide with events when a
change in the value for n3 and n2 is initiated.
The control scheme requires a period of time to estimate
the new set of values for n3 and n2 . Therefore, during this
period, the corresponding parameters calculated for the previous estimates of n3 and n2 are used. By applying equation
(2), the values for CWmin3 and CWmin2 remain unchanged
during this period, while the value of n3 and n2 has changed.
This causes the obtained throughput proportions to change
and leads to the visible spikes in the throughput plots. The
more prominent spikes occur when a significant change in the
values of n3 and n2 occurs from the previous interval. After
the control scheme determines the new estimate for n3 and
n2 , the network begins to operate again at the required level.
VII. C ONCLUSION
In this paper, we proposed a control scheme capable of providing flexible, throughput management. The control scheme
is described in detail and the implementation is studied and
verified through simulation. The results have demonstrated the
flexibility and effectiveness of the control scheme. In addition,
we have further enhanced the control to be able to limit the
total throughput to a target level, while maintaining the target
throughput proportions. We could not present this work in this
paper due to the space limitations.
As part of our current and future work, we plan to:
• investigate other techniques that can be used to improve
the estimate of the number of active client stations in
each AC.
• investigate how to allow an individual station to achieve
its own throughput requirements. This is of particular
importance since the base station is regarded as an
ordinary station in IEEE 802.11.
• include the use of additional modifiable parameters from
the EDCA parameter set.
•
investigate the possibility of providing client station based
guaranteed throughput using admission control.
ACKNOWLEDGMENT
The authors would like to thank the Australian Research
Council, and industry partner Tenix Australia, for funding this
research through Linkage Project LP0453508.
R EFERENCES
[1] IEEE, IEEE 802.11 Part 11: Wireless LAN Medium Access Control
(MAC) and Physical Layer (PHY) Specifications, 1999 (R2003).
[2] IEEE, IEEE 802.11 Part 11: Wireless LAN Medium Access Control
(MAC) and Physical Layer (PHY) Specifications, Amendment 8: Medium
Access Control (MAC) Quality of Service Enhancments, 2005.
[3] J. W. Robinson and T. S. Randhawa, “Saturation Throughput Analysis
of IEEE 802.11e Enhanced Distributed Coordination Function,” IEEE
J. Sel. Areas Commun., vol. 22, no. 5, pp. 917–928, Jun. 2004.
[4] Z. Kong, D. H. K. Tsang, and B. Bensaou, “Performance Analysis of
IEEE 802.11e Contention-Based Channel Access,” IEEE J. Sel. Areas
Commun., vol. 22, no. 10, pp. 2095–2106, Dec. 2004.
[5] J.-D. Kim and C.-K. Kim, “Performance analysis and evaluation of IEEE
802.11e EDCF,” Wirel. Commun. Mob. Comput., vol. 4, no. 1, pp. 55–
74, Feb. 2004.
[6] A. Banchs and L. Vollero, “A Delay Model for IEEE 802.11e EDCA,”
IEEE Commun. Letters., vol. 9, no. 6, pp. 508–510, Jun. 2005.
[7] Y. Xiao, “Performance Analysis of Priority Schemes for IEEE 802.11
and IEEE 802.11e Wireless LANs,” IEEE Trans. on Wirel. Commun.,
vol. 4, no. 4, pp. 1506–1515, Jul. 2005.
[8] P. E. Engelstad and O. N. Osterbo, “Delay and Throughput Analysis of
IEEE 802.11e EDCA with Starvation Prediction,” in Proc. IEEE Conf.
on Local Comp. Net., 2005, pp. 647–655.
[9] X. Chen, H. Zhai, and Y. Fang, “Enhancing the IEEE 802.11 in QoS
Support: Analysis and Mechanisms*,” in Proc. Qual. of Serv. in Hetro.
Wired/Wirel. Net., 2005, p. 23.
[10] H. Zhu and I. Chlamtac, “Performance Analysis for IEEE 802.11e EDCF
Service Differentiation,” IEEE Trans. on Wirel. Commun., vol. 4, no. 4,
pp. 1779–1788, Jul. 2005.
[11] J. Hui and M. Devetsikiotis, “A Unified Model for the Performance
Analysis of IEEE 802.11e EDCA,” IEEE Trans. on Commun., vol. 53,
no. 9, pp. 1498–1510, Sept. 2005.
[12] Z. Tao and S. Panwar, “Throughput and Delay Analysis for the IEEE
802.11e Enhanced Distributed Channel Access,” IEEE Trans. on Commun., vol. 54, no. 4, pp. 596–603, Apr. 2006.
[13] L. Xiong and G. Mao, “Saturated Throughput Analysis of IEEE 802.11e
Using Two-Dimensional Markov Chain Model,” in Proc. ACM int. conf.
on Qual. of Serv. in Hetro. Wired/Wirel. Net., vol. 191, no. 10, Aug. 2006.
[14] D. Xu, T. Sukurai, and H. L. Vu, “MAC access Delay in IEEE 802.11e
EDCA,” in Proc. IEEE Veh. Technol. Conf., Sept. 2006, pp. 1–5.
[15] S. Karim, N. Bean, D. Green, and M. Rumsewicz, “Adaptive Throughput
Management and Quality of Service Provisioning in IEEE 802.11e,” in
Proc. ITC Spec. Semin. on Teletraf. Eng. Chal. for Next Gen. Mob. Net.,
May. 2006.
[16] “The
Network
Simulator
ns-2.”
[Online].
Available:
http://www.isi.edu/nsnam/ns/
[17] S. Wietholter and C. Hoene, “An IEEE 802.11e EDCA
and CFB Simulation Model for ns-2.” [Online]. Available:
http://www.tkn.tu-berlin.de/research/802.11e_ns2/
Other avenues for further investigation include:
• investigate the impact of the control scheme in a WLAN
with unsaturated load.
• employ additional optimization constraints for MAC delay along with existing throughput constraints.
299
6
x 10
6
x 10
Simulated AC3 Throughput Proportion
Simulated AC3 Throughput Proportion
Required AC3 Throughput Proportion
80
100
80
60
Simulated AC3 Throughput
Simulated AC2 Throughput
Simulated Total Throughput
0
5
4
3
7
6
0
4
3
2
1
1
30
40
50
60
70
80
90
100
110
0
120
30
40
50
60
Fig. 1. Standard EDCA configuration. AC3 Throughput Proportion results
shown in the upper half of the graph using the right y − axis and common
x − axis. Throughput results shown in the lower half of the graph, using the
left y −axis and common x−axis. Legends for AC3 Throughput Proportion
and Simulated Throughput results shown in the upper-right and the center-left
position respectively. Simulated Throughput results shown from top to bottom
are Total Throughput, AC3 Throughput and AC2 Throughput.
110
120
80
60
60
20
0
4
3
40
6
0
4
3
1
1
60
70
80
90
100
110
20
5
2
50
Simulated AC3 Throughput
Simulated AC2 Throughput
Simulated Total Throughput
Model AC3 Throughput
Model AC2 Throughput
Model Total Throughput
7
2
40
100
80
40
5
Simulated AC3 Throughput Proportion
Required AC3 Throughput Proportion
Throughput (bits/sec)
Throughput (bits/sec)
100
x 10
100
AC3 Throughput Proportion (Percentage)
Simulated AC3 Throughput
Simulated AC2 Throughput
Simulated Total Throughput
Model AC3 Throughput
Model AC2 Throughput
Model Total Throughput
30
90
6
Simulated AC3 Throughput Proportion
Required AC3 Throughput Proportion
0
80
Fig. 3. Maximizing Throughput while maintaining an AC3 throughput proportion of 67%. Throughput results shown below are Simulated Throughput
overlapped against Model results. Graph to be interpreted as described in Fig.
1.
6
x 10
6
70
Time (seconds)
Time (seconds)
7
20
5
2
0
40
0
120
Time (seconds)
30
40
50
60
70
80
90
100
110
AC3 Throughput Proportion (Percentage)
6
Simulated AC3 Throughput
Simulated AC2 Throughput
Simulated Total Throughput
Model AC3 Throughput
Model AC2 Throughput
Model Total Throughput
AC3 Throughput Proportion (Percentage)
20
Throughput (bits/sec)
Throughput (bits/sec)
7
AC3 Throughput Proportion (Percentage)
60
40
120
Time (seconds)
Fig. 2. Maximizing Throughput while maintaining an AC3 throughput proportion of 80%. Throughput results shown below are Simulated Throughput
overlapped against Model results. Graph to be interpreted as described in Fig.
1.
Fig. 4. Maximizing Throughput while maintaining an AC3 throughput proportion of 50%. Throughput results shown below are Simulated Throughput
overlapped against Model results. Graph to be interpreted as described in Fig.
1.
300
Download