Thesis_Report_S_Rajesh - AU

advertisement
MAC ENHANCEMENTS TO SUPPORT QUALITY OF
SERVICE IN WIRELESS NETWORKS
A THESIS
Submitted by
RAJESH S.
in fulfillment for the award of the degree
of
MASTER OF SCIENCE (BY RESEARCH)
DEPARTMENT OF ELECTRONICS ENGINEERING
FACULTY OF INFORMATION AND COMMUNICATION
ENGINEERING
ANNA UNIVERSITY
CHENNAI 600 025
MAY 2004
ii
BONAFIED CERTIFICATE
Certified that this thesis titled ‘MAC enhancements to support quality of
service in wireless networks’ is a bonafide work of Mr. S.Rajesh who carried
out the research under my supervision. Certified further, that to the best of my
knowledge, the work reported herein does not form part of any other thesis or
dissertation of the basis of which a degree or award was conferred on an
earlier occasion on this or any other candidate.
Date:
Place: MIT, Chennai.
Dr.S.Srikanth,
Member Research Staff,
AU-KBC Research Centre,
MIT Campus, Anna University,
Chromepet, Chennai,
TN – 600 044 – India.
Dr.C.N.Krishnan,
Director,
AU-KBC Research Centre,
MIT Campus, Anna University,
Chromepet, Chennai,
TN – 600 044 – India.
iii
ABSTRACT
High raw data rates at physical layer have become possible in
wireless communication. But for multimedia (voice, video, games) applications
to use these, it is necessary to design medium access control (MAC)
schemes that can support quality of service (QoS). In this thesis, we propose
MAC enhancements to improve the performance of wireless networks.
Specifically, we address the MAC issues in wireless ad hoc networks and
wireless local area networks (WLANs) to support traffic with QoS
requirements.
We have assumed the use of carrier sense multiple access
(CSMA) based schemes in this work. The wireless channel is a shared
medium and hence it is necessary to have efficient MAC schemes. In wireless
ad hoc networks, the MAC is usually distributed, whereas, in WLAN, the MAC
could be distributed or centralized based on topology and requirement.
Support for QoS involves catering to two types of traffic:

Traffic that has priority assigned per packet (based on type of data in the
packet or the link end-points involved). This requires the MAC to
differentiate (prioritize) and give the appropriate ratio of the available
bandwidth to the traffic.

Traffic streams that must be guaranteed certain bandwidth, delay and
other requirements (put together as QoS requirements) irrespective of
other traffic in the system.
Traffic streams with QoS guarantees are supported in the
centralized MAC scheme only.
iv
Contributions made in this thesis are:

Wireless ad hoc networks with directional antenna at nodes are
considered and we propose a MAC protocol that uses the directional
antennas used by the nodes. We show that there is improvement in
throughput and delay performance due to this.

We then consider WLANs with centralized MAC and propose an
enhanced MAC to improve the delay and throughput performance of
the system so that the QoS requirements can be met.
v
ACKNOWLDEGEMENT
This thesis is the outcome of the direction, encouragement and
invaluable guidance from my supervisor Dr.S.Srikanth and co-supervisor
Dr.V.Vaidehi. My sincerest thanks to them for helping me move ahead with
the research work at every stage and motivating me to do the best.
I am greatly indebted to Dr.C.N.Krishnan, the Director of Anna
University - K.B.Chandrasekhar (AU-KBC) Research Centre for the
extraordinary effort and ideology behind the whole research programme. A life
shall not suffice to return what I have gained out from him and the Research
Centre.
My sincere thanks to Dr.S.Anand and Dr.R.Jayaparvathy for their
invaluable suggestions and many interesting discussions which threw light on
a number of subtle points in the study. Thanks to all staff for every course I
had undergone has helped me in this work. Dr.S.Shanmugavel’s suggestions
came in at the right time to add the missing glitter to the work.
My heart felt thanks to all friends including Bhat, Gopi, Kadal,
Khan, Masood, Nandhan, Rajesh, Sangeeta, Vijayalakshmi and Vinosh
for having helped me in more than one way throughout the course and
research work.
All my success in working towards this degree is due to the love
and immense moral support my parents and sister have given me. And of
course, to God my thanks have no bounds but are too less still.
vi
TABLE OF CONTENTS
ABSTRACT
III
LIST OF TABLES
VIII
LIST OF FIGURES
IX
LIST OF ABBREVIATIONS, SYMBOLS AND NOMENCLATURE
X
CHAPTER 1
1
INTRODUCTION
1
1.1 Overview
1
1.1.1
Literature Review
2
1.2 Problem Definition
3
1.3 Assumptions
3
1.3.1
Scope
4
1.4 Contribution in this Thesis
4
1.5 Thesis Organization
4
CHAPTER 2
6
MAC ENHANCEMENTS IN AD HOC NETWORKS
6
2.1 Overview
2.1.1
Ad Hoc Networks
2.2 The IEEE 802.11 Standard
6
6
7
2.2.1
Distributed Coordination Function
7
2.2.2
QoS Enhancement
9
2.2.3
EDCF Mode of IEEE 802.11e MAC
10
2.3 Proposed Scheme
10
2.4 System Model
11
2.4.1
MAC Enhancements with Directional Nodes
12
2.4.2
QoS Enhanced MAC with Directional Nodes
14
2.5 Performance Study
14
vii
2.6 Results and Discussion
15
CHAPTER 3
18
QOS IMPLEMENTATION ON WLAN
18
3.1 Overview
18
3.2 Existing Technology
18
3.2.1
PCF Mode of IEEE 802.11 MAC
19
3.2.2
HCF Mode of IEEE 802.11e MAC
20
3.3 System Model
21
3.3.1
MAC Scheduler Enhancements
21
3.3.2
Design of Scheduler
22
3.3.3
Enhanced Scheduling Algorithm
24
3.4 Performance Study
3.4.1
Simulation
3.5 Results and Discussion
28
29
31
CHAPTER 4
38
CONCLUSION AND FUTURE SCOPE
38
4.1 Conclusion Summary
38
4.1.1
Applications
39
4.1.2
Future Scope
39
APPENDIX 1
Assignment of Type of Service
40
40
Case 1
40
REFERENCES
43
PUBLICATIONS OUT OF THIS WORK
46
viii
LIST OF TABLES
Table 1. TSPEC based Admission Control .................................................... 23
Table 2. Twin Token - Bucket Parameters .................................................... 27
Table 3. AC association - Simple case (Case 1) .......................................... 41
Table 4. AC Assignment – Complex Case (Case 2) ..................................... 42
ix
LIST OF FIGURES
Figure 1. DCF mode of operation
8
Figure 2. State Diagram of the Protocol
13
Figure 3. Delay Performance with increasing Network Density
15
Figure 4. Performance of ad hoc MAC schemes
16
Figure 5. Effect of Power-backoff
17
Figure 6. CFP, CP and Super-frame
19
Figure 7. System - Block Diagram
22
Figure 8. Twin Token Bucket Implementation
24
Figure 9. Alternating CFP and CP
25
Figure 10. EMDR (Estimated Mean Data Rate) Curve
26
Figure 11. TXOP generated by Scheduler in HCF compared with basic PCF28
Figure 12. Parameters for generation of traffic of 4 ACs
30
Figure 13. Variation in effective goodput with traffic
31
Figure 14. Behavior of EDCF and HCF
32
Figure 15. Traffic Streams supported for different peak data rate deviation on
a non-ideal channel
33
Figure 16. Traffic Streams supported and EDCF Throughput for a network
when scheduler in HCF handles TXOPs of both contention free and
contention based traffic.
34
Figure 17. Goodput v/s delay for various schemes.
35
Figure 18. Co-efficient of variation versus delay plot.
36
x
LIST OF ABBREVIATIONS, SYMBOLS AND
NOMENCLATURE
s

AC
ACK
Ad Hoc Network
AIFS
AP
Atomic Sequence
BC
BEB
BER
Beacon
BSS
CAP
CBR
CCA
CFP
CP
CSMA
Micro Seconds (1s = 10-6 Second)
tou – stands for traffic density – Traffic to be
transmitted to or received from a particular
source or sector of a network region (direction)
Access Category
Acknowledgement
An infrastructure-less, topology-free wireless
network.
Arbitration IFS
Access Point
A transmission of the following sequence
 RTS (from Source)
 CTS (from Destination)
 Data (or MPDU from Source)
 ACK (from the Destination)
Broad-cast
All that can hear are the intended recipients.
Binary Exponential Backoff
Bit Error Rate
A management frame (that has to be
transmitted periodically) carrying the network
parameters and timing information.
Basic Service Set
Controlled Access Phase
Constant Bit Rate
The type of traffic that is encoded using a
constant bit rate encoding like a 64kbps for a
voice frame.
Clear Channel Assessment
Contention Free Period
Contention Period
Carrier Sense Multiple Access
xi
CSMA/CA
CSMA/CD
CTS
CW
DCF
DACK
DCTS
DData
DIFS
Directional Antenna
DRTS
EDCF
EIFS
EMDR
FCFS
Goodput
HC
HCF
IBSS
IFS
LAN
MAC
MANET
maxMSDULifetime
MDR
MPDU
MSDU
Multicast
Network Density
CSMA/Collision Avoidance
CSMA/Collision Detection
Clear To Send
Contention Window
Distributed Coordination Function
Directional ACK
Directional CTS
Directional Data
DCF IFS
An antenna that radiates only a few degrees
(much less than 360) on the horizontal as well
as vertical planes.
Directional RTS
Enhanced DCF
Extended IFS
Estimated MDR
First Come First Serve
We define goodput as the total number of bits
of data transmitted successfully by the MAC
layer per unit time. Maximum goodput of a
particular topology corresponds to the traffic
condition that results in maximum bits transfer
in MAC.
Hybrid Coordinator
Hybrid Coordination Function
Independent BSS
Inter-frame Spacing
Local Area Network
Medium Access Control
Mobile Ad hoc Network
A constant set in every station which tells how
long to hold a MSDU in queue before dropping
it in case it doesn’t get a chance to get
transmitted.
Mean Data Rate
MAC PDU
MAC Service Data Unit
A regulated broadcast which is meant for a
selected set of recipients.
It is the density of the network mentioned in
xii
OCTS
Omni-directional
antenna
ORTS
PC
PCF
PDA
PDF
PDU
PER
PIFS
QoS
QAP
QBSS
QSTA
RED
RTS
SIFS
SME
STA
Super frame
TBTT
TC
TS
TSPEC
terms of the average number of neighboring
nodes per node.
Omni-directional CTS
An antenna that radiates 360 degrees solid
angle. (In practice omni directional antennas
radiate 360 on the horizontal plane but only a
few degrees, (less than 10,) on the vertical
plane).
Omni-directional RTS
Point Coordinator
Point Coordination Function
Personal Digital Assistant (A hand-held
computing device)
Probability Density Function
Protocol Data Unit
Packet Error Rate
PCF IFS
Quality of Service
QoS enabled AP
QoS enabled BSS
QoS enabled STA
Random Error Detect
Request To Send
Short IFS
Station Management Entity
Station
Duration combining a CFP and a CP as
scheduled by the hybrid coordinator. Usually
the super frame size is the same as the TBTT.
Target Beacon Transmission Time
The time duration information in every beacon
telling other nodes about the time after which
an attempt to transmit the next beacon frame
will be done.
Traffic Category
Traffic Stream
A higher layer end to end traffic which has link
level QoS requirements (delay, minimum
bandwidth etc)
Traffic Specification
xiii
TXOP
VBR
VLAN
Wi-Fi
WLAN
WSTA
Transmission Opportunity
This is the fixed duration informed by the QAP
in the poll within which the polled station must
finish an atomic sequence of transmission.
Variable Bit Rate
The type of traffic that is encoded using
varying coding rate based on the information
content of the frame. Typically used for coding
video frames.
Virtual LAN
Wireless-Fidelity (A certification that ensures
interoperability of wireless devices with the
same certification.)
Wireless LAN
Wireless STA
Used in the QoS enhanced Station context
only.
1
CHAPTER 1
INTRODUCTION
1.1 OVERVIEW
This thesis presents medium access control (MAC) schemes to
handle traffic with QoS requirements in wireless networks. In particular, ad
hoc networks and wireless local area networks (WLANs) have been
considered. A thorough study of the literature in this has been carried out
and various mechanisms for QoS enhancements have been proposed.
Enhanced distributed access mechanism with directionality aware MAC has
been proposed for ad hoc networks.
Centrally coordinated WLANs have been considered for carrying
traffic with QoS requirements. Admission control, traffic shaping and policing
and scheduler mechanisms have been proposed for QoS support in these
networks.
These cases have been analyzed wherever appropriate and
extensive simulations have been carried out at every step. Results of these
have been dissected, compared and discussed.
2
1.1.1 Literature Review
Ad hoc networks have been studied for long and Mobile ad hoc
networks (MANET) in particular were proposed by Macker and Corson
(2001). The CSMA/CA based MAC scheme was proposed for ad hoc
networks and WLAN by the IEEE 802.11 standard (1999). The performance
of ad hoc networks with distributed coordination function (DCF) mode
specified in this standard was studied by Kamerman and Aben (2000). Most
MAC protocols proposed for ad hoc networks assumed omni directional
antennas at all the nodes. Sanchez et al (2001) studied the performance of
the IEEE 802.11 DCF in a network of nodes with directional antennas.
However, the MAC protocol and the scheduling mechanism did not exploit
the directional antennas at the nodes in the network. Work by Matthias and
Tse (2001) showed that in the absence of delay constraints, mobility of the
nodes enhances the throughput of ad hoc networks. However, in ad hoc
networks with QoS support, it is necessary to satisfy the delay requirements
of users. Thansis et al (2003) consider MAC protocol specifically designed
for directional ad hoc networks but this too does not deal with inherent QoS
issues. Some of the handshake techniques in their papers have been reused
here but with a difference in scheduling.
The IEEE 802.11a standard (2001) and the IEEE 802.11g draft
(2003) define how high data rates up to 54Mbps can be achieved at the
physical layer in WLAN. To exploit the availability of high raw data rate at the
physical layer, enhanced MAC layer protocol is required to support
applications with delay and throughput guarantee requirements. The IEEE
802.11e (2002) supplement was drafted to enhance the MAC of the IEEE
802.11 standard to support QoS in WLAN. This supplement formulates the
guidelines for QoS support and leaves a lot of space for the implementers to
add implementation specific functionality. Guidelines for scheduler design
and queue handling have been taken from this.
3
1.2 PROBLEM DEFINITION
High raw data rates (up to 54Mbps as per standards and twice
that in proprietary ways) at physical layer have become possible in wireless
communication. But for multimedia (voice, video and game) applications to
use these, it is necessary to design medium access control (MAC) schemes
that can support quality of service (QoS). In this thesis, we propose MAC
enhancements
to
improve
the
performance
of
wireless
networks.
Specifically, we address the MAC issues in wireless ad hoc networks and
wireless local area networks (WLANs) to support traffic with QoS
requirements.
1.3 ASSUMPTIONS
The following assumptions have been made regarding the
problem in hand while arriving at the solution. These assumptions define the
scope or the boundaries of the solution formulated.
Carrier sense multiple access schemes have been used
throughout. Near symmetry in uplink and downlink has also been assumed.
In case of directional antennas, the implication due to the direction-switching
mechanism has been considered only to the extent of a delay factor. For
obtaining positional information, the exact scheme has not been studied but
one specified in literature by Rahul et al (1999) can be used in lieu of a full
fledged geo positioning system. The MAC schemes also assume low mobility
of the individual nodes in the network.
4
1.3.1 Scope
The standard MAC guidelines used and assumptions presented
above make the solution suitable only for ad hoc networks with less number
of hops and for wireless local area networks with central coordination. In
either case, these schemes are not suitable for networks with highly mobile
nodes. Positional information is required which must be either provided
through a higher layer tunnel or an immediate routing protocol.
1.4 CONTRIBUTION IN THIS THESIS
Contributions made in this thesis can be split into two categories
viz., Ad Hoc networks and WLANs:

Wireless ad hoc networks with directional antenna at nodes are
considered and we propose a MAC protocol that uses the directional
antennas used by the nodes. We show that there is improvement in
throughput and delay performance due to this.

We then consider WLANs with centralized MAC and propose an
enhanced MAC to improve the delay and throughput performance of
the system so that the QoS requirements can be met.
1.5 THESIS ORGANIZATION
Chapter 2 deals with MAC enhancements for ad hoc networks.
We discuss how stationary nodes if at appropriate locations can contribute to
the enhancement in network performance. We also show how directional
antennas at nodes can be used to enhance throughput and delay
performance in ad hoc networks with suitably enhanced distributed MAC
scheme. The pre-final chapter deals with the specific problem of handling
QoS traffic in case of wireless local area networks (WLANs) where a central
coordinator is present. In each chapter the analysis and/or simulation results
5
have been discussed appropriately. The last chapter summarizes the
conclusions drawn from the work and, also shows the applications and future
scope of the same.
6
CHAPTER 2
MAC ENHANCEMENTS IN AD HOC NETWORKS
2.1 OVERVIEW
Ad hoc networks are topology-free infrastructure-less wireless
networks. The nodes might have asymmetric capabilities. This chapter
describes how directional antennas at nodes can be used to enhance
throughput and delay performance in ad hoc networks with enhanced
distributed MAC scheme.
2.1.1 Ad Hoc Networks
Though ad hoc networks are simply characterized by their
topology-free and infrastructure-less nature; all nodes in the network are
usually capable of routing. Each node participates in forwarding the packets
and thus the network is not dependent on any single node for its existence.
These nodes might be asymmetric in other aspects like power consumption,
antenna power, antenna type, buffer size, sensitivity and complexity of the
digital processing circuitry. These networks typically find applications in
military during war, rescue operations, sensor networking, component
tagging etc. Recently these are finding normal applications like connecting
Wireless-Fidelity (Wi-Fi) or Bluetooth certified mobile devices (laptops, cell
phones, PDAs, etc) without wire.
7
2.2 THE IEEE 802.11 STANDARD
The IEEE 802.11 standard (1999) specifies MAC protocols for
operation in ad hoc mode and centrally coordinated mode. The distributed
coordination function (DCF) is used for operation in the ad hoc mode.
2.2.1 Distributed Coordination Function
The DCF is based on carrier sense multiple access with collision
avoidance (CSMA/CA). The standard defines the common duration for
carrier sensing by the Clear Channel Assessment (CCA) function or DCF
Inter Frame Space (DIFS) at every node and also the contention window
ranges (CWmin, CWmax). The time gap between two packets in the
handshake sequence or an atomic operation, defined as Short Inter Frame
Space (SIFS), is less than DIFS. This prevents other nodes from capturing
the channel when one transmission (in the same area) is already going on.
All nodes that can hear each other and agree to join and form an
Independent Basic Service Set (IBSS). These nodes remain in synchrony
with a special management frame called the ‘Beacon frame’. This frame is
periodically generated by one of the nodes in the IBSS. Once a node
captures the channel, it can send data packet of at most one MAC Service
Data Unit (MSDU) which might be broken into fragments or MAC Protocol
Data Units (MPDUs) as specified by the variable Fragmentation Threshold. A
four-way handshake is optionally used.
A typical sequence (depicted in Figure 1) would be:

The node willing to transmit (source node, S1 in Figure 1) performs
carrier sensing.
ACK 2
FREE
MPDU
(2)
ACK 1
MPDU
(1)
CTS
BUSY
Backoff
RTS
8
time
S1
time
S2
time
S3
SIFS
SIFS
SIFS
SIFS
SIFS
DIFS
-------NAV------ ----NAV---
Figure 1. DCF mode of operation

If it finds the channel free for a DIFS duration, it may transmit.

To avoid collision situation, it back’s off in random multiples of a
constant time (Slot-time) chosen from the contention window (CW min
and CW max).

After the backoff countdown, a request to send (RTS) frame is sent by
the source node.

If the destination node (S2 in Figure 1) is ready to receive then it
initiates a clear to send (CTS) frame within a SIFS duration.

The source node initiates the sending of the Data frame (MPDU or
fragment) within a SIFS duration.

If the destination node properly receives the MPDU it responds with
an acknowledgement (ACK) packet.
In case of failure the source node backs-off again with a random number
chosen from a doubled contention window. Absence of ACK is treated as
9
collision in which case, the node has to carrier sense for an extended IFS
(EIFS).
The duration for which the transmission would go on is
continuously updated through the network allocation vector (NAV) field in the
handshake frames. The NAV information is used by other nodes (like S3 in
Figure 1) in the network to stay away from transmitting. When one
transmission is going on the same area, another transmission will lead to
collision. This combined with the handshake helps overcome the hidden
node problem to a good extent but creates more number of exposed nodes.
MSDUs in MAC queue for duration longer than a (configurable) constant
'maxMSDULifetime' are dropped from the queue. In addition to this a
retransmit limit can also be fixed.
For handling data packets a simple First Come First Serve (FCFS)
queue is used by all the nodes. This protocol allows fair-channel access on
the long-run, given the traffic generation characteristics and channel
condition due to environmental changes are even across all nodes in the
network. This doesn't differentiate nodes or traffic in anyway and hence it is
suitable for best-effort type of traffic only.
2.2.2 QoS Enhancement
The QoS enhanced MAC has the requirement that the protocol
data units (PDUs) that reach the MAC layer, from the higher layers, be
associated with certain traffic categories (TC), which is typically 8. Each TC
is mapped to one of four access categories (ACs) and the available resource
is distributed to these ACs based on the preset priorities for the ACs.
Prioritizing is achieved by assigning different values for various parameters
like the backoff window size and the inter-frame spacing in the basic
CSMA/CA based MAC.
10
2.2.3 EDCF Mode of IEEE 802.11e MAC
Though ad hoc networks do not support traffic streams with
guaranteed service, the available bandwidth can be distributed based on the
Traffic Category (TC); each TC having a different priority. The IEEE 802.11e
standard provides enhanced mechanism to handle TCs that are mapped to
one of the 4 Access Categories (AC). Each AC has different priority of
channel access. Multiple instances of the DCF (i.e., one for each AC) exist in
every node. Once a node captures the channel, it can transmit for a duration
termed as Transmission Opportunity (TXOP). Prioritization amongst ACs is
achieved by having different: values for:

Clear channel assessment (CCA) duration or arbitration inter frame
spacing (AIFS) per AC,

contention window ranges or CW min and CWmax per AC and

Transmission Opportunity (TXOP) per AC.
2.3 PROPOSED SCHEME
In this thesis, we propose a MAC for ad hoc networks that takes
into account, the directionality of the antennas at the nodes. We also study
the effect of having stationary or immobile nodes placed at strategic
locations. We consider a network in which the transmission ranges of the
nodes are comparable to the geographical area of the network.
Nodes with directional antennas can be used in ad hoc networks
to increase concurrent transmissions due to decreased interference. We also
consider power back off at the antennas. Power back off is defined as the
reduction in the transmission power in any specified direction. We consider
the usage of both fixed beam-width antenna arrays as well as variable beamwidth antenna arrays.
11
Mobility in ad hoc networks was shown to have resulted in an
enhanced throughput in the absence of delay constraints (Matthias 2001).
However, in ad hoc networks with QoS support, it is necessary to satisfy the
delay requirements of users. Therefore, it is of interest to selectively
immobilize nodes in an ad hoc network and study the delay performance.
The locations of the immobile nodes are fixed taking the following into
consideration:

The transmission ranges of all the immobile nodes are proper subsets
of the geographical area of the network.

For networks with a given probability distribution of node positions in a
given area, the immobile nodes must be placed following the same
distribution.

As a corollary, when nodes are distributed uniformly in the network
area, the immobile nodes must also be placed in a uniformly
distributed manner.
We show that an improvement of 50% in the delay performance and 5% in
the throughput performance can be achieved by combining the above
techniques, i.e., selectively immobilizing nodes in an ad hoc network and
exploiting the directionality of the antennas at the nodes. We also show that
the proposed enhancements to the MAC result in improved network
connectivity.
2.4 SYSTEM MODEL
We consider a flat circular geographical network area of radius 'R'.
Let fd(x,y) be the probability density function (pdf) of the position of the
nodes. The objective is to propose a MAC scheme and scheduling
mechanism
1. that takes into account the directionality of the antennas at the nodes,
and
2. by immobilizing a selected subset of nodes.
12
We make the following assumptions to carry out the required study.

There are N nodes in the network

Each node can transmit only to nodes which are at a distance lesser
than a specified distance limit, d0.

The contention mechanism is same as DCF for traffic without QoS
requirements, and the EDCF for traffic with QoS requirements.

As described by Rahul et al (2000), the nodes are assumed to know
their individual positions.

The RTS frames contain the MSDU expiry time i.e., the time relative
from the recent most Beacon frame, when the corresponding MSDU
would be dropped from the MAC queue if it does not receive service.
This is calculated considering the current time and the IEEE 802.11
parameter, MSDU lifetime. (Not part of the existing standard).
2.4.1 MAC Enhancements with Directional Nodes
We propose the following enhancements in the MAC for a network with
directional antennas at the nodes (depicted as state diagram in Figure 2):

Before the basic atomic sequence, (RTS/CTS/Data/ACK), every
source node with at least one MSDU in its queue contends to send an
omni directional RTS (ORTS) at maximum power. The ORTS contains
the position of the source node.

The destination node responds with a omni directional CTS (OCTS) at
maximum power. The OCTS also contains the position of the
destination node.

If the source does not receive an OCTS after ORTS,
o it may send another ORTS to the same node after a time
period corresponding to an extended inter frame space (EIFS)1,
or
1
As per the standard, after every erroneous transmission, the channel access should be
deferred for an EIFS period.
13
o the can send an ORTS corresponding to a different destination
node as indicated by another MSDU in its queue.
ORTS
1
OCTS
2
ORTS
4
3
Timeout
Timeout
OCTS
DRTS
Timeout
DACK
DCTS
5
DData
6
7
Figure 2. State Diagram of the Protocol

On successful reception of the OCTS, the source node uses the
information on the position of the destination and computes the
direction of the destination node. Similarly, the destination node
computes the direction of the source node from the ORTS.

Depending on the residual life time of the MSDU (i.e., the difference
between the maximum MSDU lifetime (maxMSDULifetime) and the
delay already experienced by the MSDU), the source node chooses
either to continue sending ORTS to other nodes or initiate
transmission of directional DATA (DData) to the destination

The scheduler at the directional nodes can decide to switch to
directional mode in any particular direction and initiate reception using
Directional Request To Receive (DRTR) after which directional atomic
sequence (DRTS/DCTS/DData/DACK) can go on. It shall select to
orient to the direction from where maximum traffic is coming in terms
of sum of requests.
As illustrated by the simplified state diagram, when in state 3, the
scheduler decides whether to send another ORTS or a DRTS based on the
queue status and residual lifetime of the packets for which DCTS has been
14
received. Without moving to a state greater than or equal to state 5, the node
can not hold the channel for more than a MSDU transmission time.
2.4.2 QoS Enhanced MAC with Directional Nodes
In a network with QoS parameter specifications for the traffic, we
consider 8 traffic categories (TCs), which, in turn, are mapped to 4 access
categories (ACs). Weights are assigned to the ACs depending on the QoS
requirements. The only additional change in the protocol is that, the
scheduler selects to orient to the direction in which maximum weighted traffic
is expected to be transmitted. The maximum weighted traffic is computed
from the weights assigned to the ACs.
2.5 PERFORMANCE STUDY
We study the throughput and delay performance of the proposed
MAC in ad hoc networks for the following scenarios:

Omni-directional nodes with basic CSMA/CA based MAC

Directional nodes with enhanced scheduler based MAC

Directional nodes with EDCF for QoS traffic handling

Directional nodes with enhanced scheduler based MAC for QoS traffic
handling
The performance of the network with omni directional antennas at the nodes
are provided for comparison.
We study the goodput defined as ‘the total number of bits of data transmitted
successfully by the MAC layer per unit time’. Maximum goodput of a
particular topology corresponds to the traffic condition that results in
maximum bits transfer in MAC.
15
2.6 RESULTS AND DISCUSSION
Simulations were carried out with the specified parameters for an
ad hoc network with increasing number of nodes within a 1000m* 1000m
area. We define ‘goodput’ as the total number of bits of data transmitted
successfully by the MAC layer per unit time. Maximum goodput of a
particular topology corresponds to the traffic condition that results in
maximum bits transfer in MAC. As shown in the graph (Figure 3), we
observer that as we increase the network density (number of nodes per unit
area; where the unit are is the area of coverage of one omni-directional
node), the delay performance improves.
Delay corresponding to Maximum goodput (msec)
Effect of immobility and directionality on delay
600
All mobile nodes
10% immobile nodes
All directional nodes
All directional and 10% immobile nodes
500
400
300
200
100
0
2
3
4
5
6
7
8
9
Network density: Average number of neighboring nodes per node
10
Figure 3. Delay Performance with increasing Network Density
The curve corresponding to all mobile nodes indicates the base
performance when all nodes are mobile and omni-directional (using basic
16
IEEE 802.11 protocol). Though at less network density the variation in delay
is not prominently visible, we observed up to 50% drop in delay when the
network has all directional nodes with 10% of them immobilized. This directly
gives better support for traffic with delay based QoS requirements.
Figure 4. Performance of ad hoc MAC schemes
In graph (Figure 4) we see that the maximum goodput is high for
less density of the network and is sustained even at higher network densities
with the enhanced scheduler with QoS handling capabilities. We also
observe that it 16% to 40% better throughput at various network densities.
One of the major causes for the increase in the overall throughput
of the network is due to the possibility of frequency reuse across the network.
Frequency reuse ensures concurrent transmissions at different regions of the
network. The graph (Figure 5) shows the maximum number of neighbors per
node (averaged in time) that fall in the directional beam of that node’s
antenna. This is directly related to more frequency reuse in the network when
less neighbors are affected per beam. We observe that power backoff helps
17
keep the number of affected nodes (called as exposed nodes) to the
minimum even for high network density.
Figure 5. Effect of Power-backoff
Thus we conclude that for an ad hoc network with low mobility,
use of directional antennas with the enhanced MAC with QoS capabilities,
the QoS requirements for typical voice/video traffic can be met.
18
CHAPTER 3
QOS IMPLEMENTATION ON WLAN
3.1 OVERVIEW
This chapter deals with the specific problem of handling QoS
traffic in case of wireless local area networks (WLANs) where a central
coordinator is present. Wireless local area networks (WLANs) are network of
computers or other devices that can communicate with other nodes either
using a central coordinator or distributed coordinator. The distributed
coordination is the same as ad hoc mode detailed in the previous sections. In
central coordination, there is a special node termed as access point (AP).
3.2 EXISTING TECHNOLOGY
In WLANs the MAC deployed is typically based on the IEEE
802.11 standard (1999). Nodes can operate in a distributed manner using
the DCF or in a centralized manner using the point coordination function
(PCF). In the PCF mode, the point coordinator that resides in the AP does
the central coordination. The enhanced version of PCF namely hybrid
coordination function (HCF) in the IEEE 802.11e draft (2002) defines MAC
extensions to support QoS traffic on the standard IEEE 802.11 based
networks.
19
3.2.1 PCF Mode of IEEE 802.11 MAC
In PCF mode, the access point AP is given preferential access to
the medium. This is achieved by sensing the carrier to be free for duration of
PCF inter-frame space (PIFS), which is shorter than DIFS but longer than
SIFS.
BUSY
Contention Free
Repetition interval
Contention
Contention
Contention Free
Free
time
PIFS
PIFS
AP
Super Frame
Figure 6. CFP, CP and Super-frame
The AP may hold the channel in the contention free mode for a
contention free period (CFP) maximum duration after which contention based
transmission takes place (as shown in Figure 6). It can gain access again at
the end of target beacon transmission time (TBTT) or contention free
repetition interval. Thus a contention free period (CFP) and contention period
(CP) alternate. In the CFP, the point coordinator (PC) in the AP forwards any
multi-cast packet and polls the associated wireless stations for transmission
and reception in a round-robin fashion.
20
3.2.2 HCF Mode of IEEE 802.11e MAC
The QoS mechanisms in IEEE 802.11e draft (2002) specified for
the centralized mode of operation is called as the hybrid co-ordination
function (HCF), which provides a mechanism for QoS enhanced STAs
(QSTAs) associated with a QoS enhanced AP (QAP). A QSTA obtains
transmission opportunities (TXOPs) for any of these mechanisms. Within one
TXOP duration, a wireless station (WSTA) may transmit as many MPDUs as
might fit in.

HCF Controlled Channel Access: This mechanism involves a point
coordinator called the hybrid coordinator (HC). It gains channel
access with better preference using PIFS sense duration because
SIFS < PIFS < DIFS or AIFS of any AC. Traffic streams (TSs) may be
created on the wireless link. QSTA may negotiate regarding the traffic
specifications (TSPECs) the QAP must try to provide for the TS with
the HC. The HC schedules traffic during CFP and CP to meet the
requirements of TCs and all accepted TSs.

Admission Control: Resource allocation requests for new TS for
which proper schedule can not be created due to lack of resources as
computed from the link conditions and TXOP budget by the scheduler
are rejected.

Buffer Management: Random Early Detect (RED) algorithm (Braden
et al 1998) can be used for EDCF based traffic. This maintains small
queue size and is suitable for low latency applications.

Traffic Shaping and Policing: Since the input traffic is highly bursty
in nature, it must be shaped and policed before scheduling. Traffic not
belonging to any TS may be rate-limited by using a simple leaky
bucket. However for TSs the aggregate throughput and delay
characteristics of all the admitted TSs should be used as a for traffic
shaping.
This
can
be
achieved
by
the
twin-token
bucket
21
implementation. The decision of token-bucket parameters is based on
scheduler explained in next section.
3.3 SYSTEM MODEL
In this section, we describe the algorithmic implementation of a
system conforming to the IEEE 802.11e draft (2002) which can be ported
either as hardware or software along with other layer two services. The
scheduler must be able to adapt to the channel variations and provide
optimal performance. It must interact properly with the other parts of the
system in establishing queues of shaped and policed stream of packets to be
scheduled.
3.3.1 MAC Scheduler Enhancements
The interaction between different blocks in the system at the QAP
is shown in Figure 7. It shows the flow of packets as it enters the QAP. Only
the downlink (QAP to WSTAs) situation has been depicted. A similar set of
blocks exists for uplink (WSTAs to QAP) Packets entering the down link
buffer are first of all classified based on whether or not a TS has been
created.
The ones for which, TS has been created are sent to the Twintoken bucket based traffic shaper, the others are sent to a Random Early
Drop (RED) based queue. The shaped up traffic is fed to the TS buffers while
the other is classified based on AC and is fed to the 4 AC buffers. The HCF,
common to uplink, downlink and crosslink (WSTA to WSTA direct link in
contention free mode) has two schedulers.
The TS scheduler generates polled TXOPs for the admitted TSs.
Under EDCF, scheduling within every AC is First In First Out (FIFO, except
22
for timeout based packet drops). At any given time instance, only one of the
TSs or ACs (of/for any WSTA) that has obtained a TXOP either by
contention or by poll, occupies the channel. The function of the individual
blocks, related to the TS scheduler is explained, wherever required. The
scheduler closely interacts with the admission controller and, traffic policer
and shaper to optimize the performance.
Traffic Streams
(variable
number)
Rate,
size control
Input
Queue
Admission
control
HCF
TS
Scheduler
EDCF
Channel
Twin Token
Bucket
FIFO per AC
Drop Rate
Cont rol
RED Queue
EDCF
Parameters
Access
Categories (4)
AC=0,1,2,3
Packet Path
Control Information Path
Figure 7. System - Block Diagram
3.3.2 Design of Scheduler
The scheduler must allocate resources such that under controlled
operating conditions, all WSTAs with admitted TS are offered TXOPs that
satisfy the service schedule. The corresponding admission control is based
on the parameters (per traffic stream) as shown in the table (Table 1).
The input for the scheduler to generate a service schedule is the
TSPEC (mentioning Mean Data Rate, Peak Data Rate, Delay Bound, etc.) of
each TS to be admitted. The scheduler must try to generate TXOPs at
23
definite intervals for finite duration computed from the requirements
mentioned and generate corresponding polls. The remaining resource can
be shared by the WSTAs through EDCF mechanism.
Table 1. TSPEC based Admission Control
TSPEC
parameter
Continuous CBR Traffic Bursty traffic Unspecified
time QoS
or non-QoS
traffic
traffic
Nominal MSDU Specified
Specified
Unspecified
Don’t Care
Size
Minimum
Specified Nominal MSDU Mean Data
Don’t care
Service
size / Mean Rate / Nominal
Interval
Data rate
MSDU size
Maximum
Specified
Delay bound / Delay bound /
Don’t Care
Service
Number of
Number of
Interval
Retries
Retries
Inactivity
MUST BE SPECIFIED
interval
Minimum Data
Must be
Same as Mean Unspecified
Don’t care
Rate
specified if
Data Rate
peak data rate
is specified
Mean Data
Specified
Specified
Don’t care
Don’t care
Rate
Maximum
Unspecified
Unspecified
Specified
Don’t care
Burst Size
Minimum PHY
Must be
Equal to mean
Don’t care
Don’t care
Rate
specified if
Data Rate
minimum data
rate is
specified
Delay Bound
Specified
Specified
Don’t care
Unspecified
Surplus
Must be specified if delay and jitter bounds are Don’t care
Bandwidth
present
Allowance
Scheduler was designed such that QAP generates schedules and
admits Traffic Streams based on effective bandwidth (Effective Mean Data
Rate or EMDR) estimation calculated from Packet Error information. For
ease of design and analysis, it is assumed that transmission is always at the
24
same data rate (54Mbps) and that only one QBSS is present. Set rate of
token filling in Twin Token bucket is varied accordingly (Figure 8).
r1 tokens/s
r2 tokens/s
Overflow
Overflow
s1
s2
Token
Addition
Received
traffic
Dropped
packets
Token
Addition
Peak-rate
limited
Shaped
traffic
Dropped
packets
Figure 8. Twin Token Bucket Implementation
Any 802.11 implementation offers more than one data rate. The
mechanism for rate adaptation based on channel characteristics is not
mentioned. Many use schemes based on Received Signal Strength
measurement (Javier et al 2002). If the scheduler mentioned in the section
above is used, it will only get a rough estimate of EMDR. To accommodate
rate adaptation information, obtained from Station Management Entity,
(SME), we modify the algorithm mentioned in previous section.
3.3.3 Enhanced Scheduling Algorithm
The scheduler must try to generate Service Schedule for each TS
such that the requirements mentioned are met. That is, the scheduler must
allocate TXOPs at some definite intervals for definite duration and generate
corresponding polls in the CFP (. The remaining resource can be shared by
the WSTAs through EDCF mechanism.
25
BUSY
Contention Free
Repetition interval
Contention
Contention
Contention
Free
Free
time
PIFS
PIFS
AP
Super Frame
Figure 9. Alternating CFP and CP
Scheduler can be designed such that QAP generates schedules and admits
Traffic Streams based on effective bandwidth (Effective Mean Data Rate or
EMDR) estimation based on Packet Error.
Step 0: EMDR is initialized to maximum data rate supported by the physical
layer and control parameter,  to zero.
EMDR = 54 Mbps
(3.1)
0 = 0
(3.2)
Step 1: For every packet transmitted control factor, n (which is the value of
 updated with transmission of nth packet) is calculated as shown:
n = n-1 + x
(3.3)
where, x n = 1 if successful, -1 if unsuccessful
Success or failure is known from the reception of ACK. The protocol
assumes no usage of Group ACK. With Group ACK delayed updation will
only be possible. (This condition has not be considered for simulation studies
also).
Step 2: Over a large time scale, EMDR is given by (equation 3.4),
26
1
(3.4)
EMDR = 54 *
1+ e-n
or as shown in Figure 10.
EMDR (Mbps)
54--------
27--------n
-infinity
+infinity
0
Figure 10. EMDR (Estimated Mean Data Rate) Curve
In implementation

since we cannot go for n ranging to infinity,

since n should itself adapt based on channel condition,
n is upper limited to a constant (+/- 127) and EMDR is made a function of ’
which is a function of deviation factor n, (initialized to 127), updated
periodically with every packet transmission.
’n (n) = 127* n/n
(3.5)
Where, n is given by
n =
n-1 - 1
if x n = x n-1
127
if x n = x n-1
(3.6)
n is reset to 127 and n to 127 every time n reaches zero.
Therefore, EMDR is given by, (equation 3.7)
1
(3.7)
EMDR = 54 *
1+ e-n’(n)
Step 3: Aggregate the mean and peak data rate requirements mentioned
through TSPEC for each admitted Traffic Stream.
27
Step 4: Set rate of token filling in second bucket in Twin Token bucket (r2) to
estimated EMDR (Table 2).
Table 2. Twin Token - Bucket Parameters
Token filling rate
(Constant)
Bucket Size
Token extraction
rate
Major purpose
Bucket 1
r1 = Peak Data
Rate
s1 = 1 token (mimic
leaky bucket)
Rate limiting
Bucket 2
r2 = Mean Data
Rate
s2 = Maximum
Burst Size tokens
At most Peak Data
Rate
Burst size limiting
Step 5: Admit Traffic Streams until aggregate mean data rate of existing
traffic streams does not exceed EMDR, reject otherwise.
Step 6: Update using step 1 to 4 unless an unhandled exception occurs. On
exception revert to step 0.
While admitting the traffic stream, the slice of time required for the
traffic stream is also calculated. This is now generated as TXOP (Figure 11)
within the CFP. TXOP gives predefined time to the WSTAs unlike the PCF
where the channel holding time of any station once the poll has been
accepted is not dictated by the access point (only a common upper limit
exists).
28
ACK
MPDU (1)
Of MSDU (2)
ACK
MPDU (2)
Of MSDU (1)
ACK
CF-Poll
MPDU (1)
Of MSDU (1)
One MSDU
time
11
TXOP
time
11e
(i)
TXOP
Time
SIFS
SIFS
SIFS
SIFS
SIFS
SIFS
11e
(ii)
Figure 11. TXOP generated by Scheduler in HCF compared with basic PCF
3.4 PERFORMANCE STUDY
Only the BSS (Basic Service Set) type of simulation topology has
been taken into consideration. Since we consider the enhancements
provided by IEEE 802.11e, we have a QBSS (QoS enabled BSS). A single
QAP connecting to many WSTAs has been taken up. The QAP is connected
to the Ethernet interface too.
29
3.4.1 Simulation
Simulations were carried out with nodes implementing the
standard HCF based coordinator with enhanced scheduling scheme. The
system simulated consists of one QoS enabled access point (QAP) with 8
nodes (QoS enhanced wireless stations). No ‘direct-links’ or ‘group/ bulk/
burst –acknowledgement’ have been considered though they are possible as
per the standard HCF protocol.
The table (Table 1. TSPEC based Admission Control) gives us the
details of the parameters taken for AC specific parameters. Simulation of this
with parameters for Best-Effort, Video Probe, Video and Voice as the 4
Access Categories was considered. The weights taken were 1:2:3:4. This is
the performance without explicit traffic stream creation by the management
layer. A QBSS with one QAP and 8 WSTAs was simulated. A 50% of the
total traffic was generated from the QAP and the remaining 50% from the
WSTAs. For EDCF traffic generation belonging to the 4 different ACs, the
parameters, (shown in chart (Figure 12)) were used. For ease of simulations,
accumulated bursty traffic of 512Kbps of AC=3 and 512Kbps of AC=1
requiring a combined Mean Data Rate of 1Mbps has been used per TS. To
alter the QoS parameters, (CW min[AC], CWmax[AC], TXOP[AC]), EDCF
parameters chosen are the same as specified in the standards as default.
Physical layer assumed is as mentioned in the IEEE 802.11a
standard (2000) Simulations were carried out for two different channel
conditions viz., ideal and high bit error rate (BER=10-4) resulting in varying
Packet Error Rate (PER).
30
Traffic Type
Access Category
Non QoS
QoS
Traffic
Traffic
Best Effort
Video Probe
Video
Audio
AC=0
Exponential
AC=1
Pareto with cutoff
(1.7, 1864bits, 12000bits)
AC=2
Pareto with cutoff
(1.1, 652bits, 12000bits)
AC=3
CBR
32 & 64 Kbps
Figure 12. Parameters for generation of traffic of 4 ACs
31
3.5 RESULTS AND DISCUSSION
In this section we discuss the results as found from the study.
Effective Goodput for 4 ACs in EDCF
Effective Goodput (Mbps)
12
10
8
6
4
AC=0 Best-effort
AC=1 Video-probe
AC=2 Video
AC=3 Voice
2
0
0
5
10
15
20
25
30
35
40
45
Input Traffic (Mbps)
Figure 13. Variation in effective goodput with traffic
The graph (Figure 13) illustrates the effective goodput of the
higher AC increasing linearly with incoming traffic at the cost of lower ACs.
In this graph (Figure 14), we study the effective goodput of the two
protocol schemes namely, HCF contention free access and EDCF deploying
the scheduler discussed earlier. We observe that the performance is better
when HCF contention free access is used over EDCF by about 5% at
maximum goodput.
32
Effective Goodput for HCF-Contention Free Channel
Access, EDCF
Effective Goodput (Mbps)
30
25
20
15
10
5
HCF-Contention Free Channel Access
EDCF
0
0
5
10
15
20
25
30
35
40
45
Input Traffic (Mbps)
Figure 14. Behavior of EDCF and HCF
The graph (Figure 15) illustrates the number of 1Mbps streams or
roughly the throughput in terms of Mbps achievable when a channel with
high bit error rate (10-4) is used. The graph includes the case when packet
error rate (PER) is estimated and also when rate adaptation information is
used.
We observe that the adaptive scheme is able to provide service
schedule of TXOPs for Traffic Streams and is able to support equivalent
number of Traffic Streams (TSs) even in bad channel condition. From graph
(Fig 8) it can be seen that throughput performance improves when rate
adaptation information is used for EMDR estimation by the scheduler in HCF.
The performance improvement is significant particularly when BER of the
channel is high. This can be attributed to the fact that the algorithm comes
into effect when estimation of packet error rate is done along with rate
adaptation. In both the cases, trials to admit more TSs than indicated in the
graphs resulted in rejection by the Admission Control procedure.
33
Figure 15 shows the average throughput performance of the
adaptive scheduler in generating service schedules for both

Traffic Streams in Contention Free Period (CFP) and

the four Access Categories in Contention Period (CP)
We observe that the overall throughput is a bit better for contention free
traffic (TSs) due to less contention overheads.
Figure 15. Traffic Streams supported for different peak data rate deviation on
a non-ideal channel
We observe from (Figure 16) that presence of EDCF does not degrade the
performance of the scheduler for Traffic Streams as the HCF allocates only
the bandwidth remaining after TS allocation for EDCF. Such a centralized
scheduling scheme performs well when bandwidth is shared for EDCF
operation due to the higher access priority of HC in QAP (using PIFS). Thus
it can support applications with QoS guarantee requirements on the wireless
link. Optimization of scheduler for polling in CFP when reserved Traffic
Streams are not established has not been considered.
34
Figure 16. Traffic Streams supported and EDCF Throughput for a network
when scheduler in HCF handles TXOPs of both contention free and
contention based traffic.
Simulation was conducted to compare the enhanced scheduling
scheme results with the round robin based scheduling scheme. The same
topology and input traffic pattern (discussed in Simulation section) was used
for both the schemes. This graph (Figure 17) compares the goodput versus
delay for various schemes namely,

EDCF

HCF with basic scheduling based on Round Robin (RR)

HCF with enhanced scheduling scheme designed above (ES)
We observe that the delay performance for EDCF starts with a high delay of
43ms for a system goodput of 5Mbps and increases non-linearly with time to
132ms for 25Mbps. Though HCF with simple round-robin scheduling
performs similarly for low goodput, it performs relatively better for high
35
goodput. But in any case, HCF with the enhanced scheduling scheme gives
much lower throughput.
Figure 17. Goodput v/s delay for various schemes.
Compared to the round-robin scheme, enhanced scheduling
scheme provides 66% lower delay for low data-rates (goodput = 5Mbps) and
a 75% for high data-rates (goodput = 25Mbps).
The parameters shown in Table 1 describe distributional
properties of the amount of information generated per burst. Burstiness
defined as peak to mean bandwidth ratio is an important parameter of the
multimedia traffic. The co-efficient of variation (ρ) defined as,
ρ=
σ
(3.8)
μ
Where, σ is the standard deviation of the traffic from its mean μ.
36
Typical value of ρ for a VBR video frame (packet at application
layer) size is 0.23 and that of the VBR video burst size is 0.31. For CBR, the
standard deviation in the frame size is zero but the variation is contributed
due to the varying burst size. The following simulation was carried out with a
constant co-efficient of variation for the burst (set at 0.31, which is the typical
value for video applications) but with a varying frame co-efficient.
Figure 18. Co-efficient of variation versus delay plot.
We observe from the graph (Figure 18. Co-efficient of variation
versus delay plot.) that the delay for even minor increase in the variation of
the frame size results in drastically high delay for a weighted round-robin (RR
in the plot) based scheme. At typical value of ρ = 0.23 for frame in a video
VBR, the delay offered by the RR based scheme is above a 100ms but for
the enhanced scheduling algorithm (ES in the plot), the delay is below 25ms.
37
This directly gives support for QoS traffic in terms of handling bursty traffic
from VBR sources.
38
CHAPTER 4
CONCLUSION AND FUTURE SCOPE
4.1 CONCLUSION SUMMARY
From the study, we conclude that usage of directional antennas
with appropriate MAC protocol can help enhance performance of ad hoc
networks and can help offer better QoS guarantees. Though at less network
density the variation in delay is not prominently visible, we observed up to
50% drop in delay when the network has all directional nodes with 10% of
them immobilized. This directly gives better support for traffic with delay
based QoS requirements.
We also conclude that when a scheduler with rate estimation
coupled with incoming traffic stream shaping and admission control (adaptive
scheduler) are used, performance can be improved in the centralized
wireless networks. This when combined with IEEE 802.11e protocol is
deployed can help handle both traffic with differentiated QoS requirements
(multiple Access Categories) and integrated requirements (reserved Traffic
Streams). We can admit traffic streams summing up to 25Mbps when the
physical layer raw data-rate is 54Mbps. Compared to the round-robin
scheme, enhanced scheduling scheme provides 66% lower delay for low
data-rates (goodput = 5Mbps) and a 75% for high data-rates (goodput =
25Mbps). Also we have been able to show the better performance of the
39
enhanced scheduler in handling brusty traffic with high co-efficient of
variation in the frame size (typical to video VBR traffic).
4.1.1 Applications
Applications of the ad hoc case include hotspots, campus, office
and outdoor networks with user categorization or different access priorities.
The complete centrally coordinated QoS enhanced system is best suited for
any indoor application where an Access point can be set up. Especially for
offices with VLAN etc. This is the best suited for networks carrying
multimedia dependent applications like audio/video streaming, audio/video
conferencing, gaming, sensor monitoring, remote equipment controlling etc.
4.1.2 Future Scope
This work can be extended to integrate with other systems based
on different standards including Hiperlan/2, GSM/GPRS and UMTS. The
current scheme is not designed with high mobility applications or several hop
ad hoc networks in the design phase. The scheduler design can be extended
considering the distance variation and high mobility possibility.
40
APPENDIX 1
ASSIGNMENT OF TYPE OF SERVICE
In this section we take up case studies of particular networks with
bandwidth (QoS) requirements and see how the QoS categorization would
function with EDCF based QoS.
Case 1
Assume the total available bandwidth (in long run) on an average
to be 10Mbps.

Let there be 5 users, each with 100KBps (or 100*8=800Kbps)
bandwidth requirement.

Let there be 15 users, each with 25KBps (or 25*8=200Kbps)
bandwidth requirement.

Let there be 25 users, each with 10KBps (or 10*8=80Kbps) bandwidth
requirement.

Let there be 25 users, each with 5KBps (or 5*8=40Kbps) bandwidth
requirement.
The following table shows the bandwidth requirement per user
and the total requirement in the system.
41
Table 3. AC association - Simple case (Case 1)
User Type
(αβγδ)
Number
of
users
Alpha (α)
Beta (β)
Gamma
(γ)
Delta (δ)
5
15
25
Bandwidth
per user
(in KBps)
100
25
10
Bandwidth
per user
(in Kbps)
800
200
80
Total
bandwidth
for this
user type
(in Kbps)
4000
3000
2000
Total
bandwidth
for this
user type
(in Mbps)
4
3
2
25
5
40
1000
1
Total bandwidth requirement` in the system (in Mbps) 10
The total requirement of the user type decides the access
category the user belongs to. For instance, in the mentioned case, with users
of type α, β, γ and δ,

α maps to AC3, β to AC2, γ to AC1, δ to AC0 respectively

the bandwidth requirement ratio is AC0:AC1: AC2:AC3 = a:b:c:d =
1:2:3:4
The corresponding EDCF parameters are calculated for this ratio.
Case 2
To illustrate the fact that the higher AC is allotted for the user type
that has higher total bandwidth requirement than the individual requirement
the following case is studied.
Similar to the previous case, the following table shows the
bandwidth requirement per user and the total requirement in the system.
Here the overall requirement per user type is not in any particular order. It is
like in a typical real life scenario.
42
Table 4. AC Assignment – Complex Case (Case 2)
User Type
(αβγδ)
Number
of
users
Alpha (α)
Beta (β)
Gamma
(γ)
Delta (δ)
1
20
40
Bandwidth
per user
(in KBps)
100
25
10
Bandwidth
per user
(in Kbps)
800
200
80
Total
bandwidth
for this
user type
(in Kbps)
800
4000
3200
Total
bandwidth
for this
user type
(in Mbps)
0.8
4
3.2
50
5
40
2000
2
Total bandwidth requirement in the system (in Mbps) 10
The total requirement of the user type decides the access
category the user belongs to. For instance, in the mentioned case, with users
of type α, β, γ and δ,

α maps to AC0, β to AC3, γ to AC2, δ to AC1 respectively

the bandwidth requirement ratio is AC0:AC1: AC2:AC3 = a:b:c:d =
0.8:2:3.2:4
Though the α type users who are seemingly higher priority users
have been given less part of the channel, the total number of users being low
in that category justifies the loss. Thus every individual α user’s bandwidth
requirement is met. So is the case with the other users.
43
REFERENCES
1. Braden B., Clark D. et al (1998), 'Recommendations on Queue
Management and Congestion Avoidance in the Internet', IETF RFC 2306.
2. IEEE Standards Committee (1998), 'IEEE 802.1Q, Standards for Local
and Metropolitan Area Networks: Virtual Bridged Local Area Networks',
IEEE Standard.
3. IEEE Standards Committee (1999), 'IEEE 802.11, Part 11: Wireless LAN
Medium Access Control (MAC) and Physical Layer (PHY) Specification
on 2.4GHz band', IEEE Standard.
4. IEEE Standards Committee (1999), 'IEEE 802.11b, Supplement to
802.11-1999,Wireless LAN MAC and PHY specifications: Higher speed
Physical Layer (PHY) extension in the 2.4 GHz band', IEEE Standard.
5. IEEE Standards Committee (2000), 'IEEE 802.11a, Wireless LAN
Medium Access Control (MAC) and Physical Layer (PHY) Specification
on 5GHz band' IEEE Standard.
6. IEEE Standards Committee (2002), 'IEEE 802.11e, Part 11: Wireless
LAN Medium Access Control (MAC) and Physical Layer (PHY)
Specification: Medium Access Control (MAC) enhancements for Quality
of Service (QoS)', D3.3, IEEE Draft Supplement.
7. IEEE Standards Committee (2003), ‘IEEE 802.11g, Standard for Higher
Rate (20+ Mbps) Extensions in the 2.4GHz Band’, D8.2, IEEE Draft.
44
8. Javier del Prado and Sunghyun Choi (2002), 'Link Adaptation Strategy for
IEEE 802.11 WLAN via Received Signal Strength Measurement',
Infocom, TR.
9. Kamerman A. and Aben G. (September 2000), 'Throughput performance
of wireless LANs operating at 2.4 and 5 GHz', Proc. The 11th IEEE
International Symposium on Personal Indoor and Mobile Radio
Communications (PIMRC), Vol. 1, pp. 190-195.
10. Ko Y.B., Shankarkumar V. and Vidya N.H. (2000), 'Medium access
protocols using directional antennas in ad hoc networks', Proc. IEEE
Conference on Computer Communications, Vol. 1, pp. 13-21.
11. Macker J. and Corson S. (2001), 'Mobile Ad Hoc Networks (MANET)',
IETF WG Charter, http://www.ietf.org/html.charters/manet-charter.html.
12. Matthias Grossglauser and David Tse (2001), 'Mobility Increases the
Capacity of ad hoc Wireless Networks', Proc. IEEE Infocom.
13. Nasipuri A., Ye S., You J. and Hiromoto R.E. (2000), 'A MAC protocol for
mobile ad-hoc netowrks using directional antenna', Proc. IEEE Wireless
Communications and Networking Conference, Chicago, IL.
14. Rahul J., Anuj P. and Raja S. (1999), 'Geographical routing using partial
information for wireless ad hoc networks', Technical Report M99/69,
University of California, Berkeley, pp. 34-42.
15. Sanchez M., Giles T. and Zander J. (2001), 'CSMA/CA with Beam
Forming Antennas in Multi-hop Packet Radio', Proc. Swedish Workshop
on Wireless Ad hoc Networks.
16. Shenker S. and Wroclawski J. (1997), 'General Characterization
Parameters for Integrated Service Network Elements', IETF RFC 2215,
2215.
45
17. Swetha N., Vikas K., Sreenivas R.S. and Kumar P.R. (2002), 'Power
Control in Ad-Hoc Networks: Theory, Architecture, Algorithm and
Implementation
of
the
COMPOWProtocol',
European
Wireless
Conference.
18. Thanasis K., Gentian J. and Leandros T. (2003), 'A MAC protocol for full
exploitation of directional antennas in ad-hoc wireless networks',
International Conference on Mobile Computing and Networking, pp. 98107.
46
Publications out of this Work
1. Rajesh S., Vijayalakshmi K., Srikanth S. and Vaidehi V. (2003), 'Capacity
and Qos enhancement of ad hoc networks with intermittent smart
directional nodes', Proc. 9th NCC, India, pp. 35-39.
2. Rajesh S., Srikanth S. and Sethuraman M. (2003), 'QoS Algorithms for
IEEE 802.11e Implementation', The 9th APCC, Malaysia.
Download