802.11 Wireless LAN performance estimation under varying network load CHRIS BASIOS and PANAGIOTIS KOSTARAKIS Physics Department - Electronics, Telecommunications and Applications Laboratory Institute of Informatics and Telecommunications - Telecommunications Laboratory University of Ioannina Panepistimioupolis, 45110, Ioannina GREECE Absract: WLANs are an emerging part of the current wireless communications providing high bandwidth to users in a limited geographical area. The IEEE 802.11 Standard is a widely used protocol for this kind of communication. In this paper, we have estimated the performance of the above protocol for the 2 main WLAN topologies provided by the IEEE 802.11 Standard; an ad-hoc network and an infrastructure network. The performance estimation was based on throughput values coming out of various different simulations. Our main interest focused on the transfer of fixed data packets under a varying network load (depending on the number of users, the message length, the message generation rate etc.). Key-Words: 802.11, DCF, throughput, ad-hoc, infrastructure, TCP, UDP 1. Introduction The main concept in our simulations was the throughput estimation for the case where every user that resides in the WLAN requests and downloads – using either TCP or UDP transport protocol - a fixed size message from a remote server. In the ad-hoc network both users and the server use the DCF access method – specified by the IEEE 802.11 Standard – in order to gain access to the wireless medium. As for the infrastructure network the users use the DCF in order to request and download a message from the server that resides in a wired LAN (that uses the access method specified by the IEEE 802.3 Standard). We have modeled various scenarios in order to investigate the network efficiency under many different conditions. Thus, we have varied the offered load (by altering the number of the users, the arrival rate of the users’ requests to the server, the message size that the users download from the server). The design of the simulation models and the analysis of their efficiency have been made by using the COMNET III simulation program. With this simulation tool we had the possibility to built our own network topology by using and altering many parameters of the main building blocks of the program - such as nodes, links, network devices etc. - that constructed our designed models. 2. The DCF access method and simulation basic parameters In all simulations the access method that was used by the wireless users was the DCF (Distributed Coordination Function). DCF is the primary access method provided by the IEEE 802.11 Standard and is based on CSMA/CA algorithm. In the following lines we will give an overview of this algorithm. Before a station initiates transmission of a data frame, it needs to sense the channel in order to determine whether another station is currently transmitting. The station can proceed with its transmission if the medium is determined to be idle for a time interval of DIFS (DCF InterFrame Space). After a data frame is successfully received at the destination, the receiver must send an acknowledgment frame (ACK), because the transmitter cannot determine whether a frame has been faithfully delivered to its destination by simply listening to the channel; the sender may not observe frame collisions the receiver detects with other senders not observable by the first (this is the so-called “hidden terminal problem”). To transmit the ACK, the receiver waits for the channel to be idle for another time interval of SIFS (Short Inter-Frame Space). If the transmitter does not receive an ACK packet within a certain period (ACK timeout), it presumes that the data frame is lost and schedules a re-transmission. If the medium is busy upon transmitting a data frame or an ACK, the transmission must be deferred until the end of the ongoing transmission. In this case, a random backoff interval is selected, as follows. A backoff timer is set with a random backoff integer (BV) drawn from a uniform distribution over the interval [0,CW - 1], where CW (Collision Window) is an integer within the range of CWmin and CWmax. BV is the number of idle “slots” the station must wait until it is allowed to transmit. The value is decremented by one for each idle slot detected. The backoff timer suspends when the medium becomes busy before BV reaches zero. The timer resumes only after the medium has been idle longer than the designated inter-frame space interval. The station starts transmitting the frame when the backoff timer reaches zero. For each successive retransmissions, the value of CW increases exponentially (i.e. CWnew = CWold . 2 - 1), until it reaches and then stays at CWmax . CW will be reset to CWmin after a successful transmission. The backoff method is used to minimize collisions and maximize throughput at both low and high network utilizations. All the wireless users access the wireless channel of each one of the 2 network topologies by using the basic DCF method provided by the 802.11 Standard, while at the physical layer they use the FHSS technique. The bit rate of the wireless medium is fixed to 2 Mbps. The transport protocols we have used are TCP and UDP. The congestion control algorithm implemented in TCP was selected to be the ‘Fast recovery’ algorithm with a window size equal to 3. We have also modeled the establishment and disconnection of a TCP connection using 2 fixed size (40 bytes) packets for every message (‘Open’, ‘Close’ packets), while the ACK packet acknowledging every data packet is 40 bytes long. The main 802.11 parameters and their values used in the simulations are summarized in the next table. We must underline that the run simulation time was set to 3600 sec. for all simulations in order to represent a real network scenario, in which the users will have the opportunity to access more than one time the wireless medium. Table 1: Parameters used for the simulation of the IEEE 802.11 MAC protocol 802.11 Parameters Bandwidht Values 2 Mbps 2304 bytes 0.2 ms 512 ms 0.05 ms 0.028 ms 128 ms 7 255 The main assumption that have been made for the wireless networks is that the ‘hidden-node’ problem is not addressed in the simulation models, while the wireless users are all in fixed locations (no mobility). 3. Simulation results models and In this section, we present the 2 different simulation models and the individual scenarios being used. We, briefly, analyze the network topology and we demonstrate the throughput graphics coming out for each scenario. user follow a Poisson distribution, thus the request interarrivals are exponentially distributed. In order to vary the network load we have simulated 2 different environments where the mean value of the exponential distribution takes 2 different values (600 and 300). Both users and the server make use of TCP and UDP protocols (TCP have a fixed sized packet consisted of 1460 data bytes and 40 overhead bytes, while UDP packet is consisted of 1480 data bytes and 20 overhead bytes). The offered load in the network varies according to the number of users that join the ad-hoc network (the min. number of users is 1 and the maximum is 30). 2 througput (Mbps) Frame max ACK timeout Frame TxLife Time Slot time SIFS FH dwell time CWmin CWmax 1,5 TCP,exp(600) UDP,exp(600) 1 TCP,exp(300) UDP,exp(300) 0,5 0 0 10 20 30 40 users 3.1 Ad-hoc model In this model (figure 1) we have simulated the transfer of a fixedsize message from a wireless server to a variable number of wireless users with both users and the server residing in the same IBSS. Figure 1: Simulation model of the ‘adhoc’ network. 1st scenario Every BSS STA (user) requests (using a 1000 bytes packet) a fixed size (2 MB) file from the server located in the same BSS. The requests from each Figure 2: Effect of number of users on throughput for different request generation rate. 2nd scenario In this scenario the number of users is fixed (equal to 10 and 20 for the 2 different conditions simulated here) and the main varying parameter of the system is the length of the message being downloaded by all 10 users. The interarrival of each request (1000 bytes) to the server follows an exponential distribution with a mean value of 600 and 900. The message size varies from 0.01MB to 5MB (in particular 0.01, 0.1, 0.5, 1, 2, 3, 4, 5), while the packet size of the transport protocol being used (UDP) remains the same equal to 1500 bytes (plus the overhead). follow an exponential distribution with 2 different mean values (600 and 300). 2 1,5 10us,exp(600) 20us,exp(600) 1 10us,exp(900) 20us,exp(900) 0,5 0 throughput (Mbps) througput (Mbps) 2 1,5 TCP,exp(600) 1 UDP,exp(600) 0,5 5 4 3 2 1 0, 01 0, 1 0, 5 0 0 10 message size (MB) Figure 3: Effect of message size on throughput for different simulation cases. 20 30 40 users Figure 5: Effect of number of users on throughput for different transport protocols. 3.2 Infrastructure model 2nd scenario In this simulation model (figure 4) an 802.11 wireless BSS is interconnected via a wireless portal with an 802.3 wired LAN (10BASET technology). Every wireless user that resides in the BSS requests and downloads more than one fixed size files from the server (according to an exponential distribution with a mean value of 600), which is connected to the wired LAN that makes use of the IEEE 802.3 Protocol. As with the adhoc model, the transport protocols we have used are TCP and UDP. Both the above protocols have a fixed size packet of 1500 bytes including the overhead. Figure 4: Simulation model of the infrastructure network. 1st scenario The message size that each user tries to download from the wired server is fixed and equal to 2 MB. The interarrivals of the request messages In this scenario we have simulated the transfer of a fixed data packet from the wired server to a fixed number of users that consist the wireless BSS. The main variable here is the number of the message that each wireless user requests and downloads from the wired server. The size of the message varies in a great range from 0.01MB to 5MB. In order to examine the performance of the certain network when the load is being doubled, we have simulated 2 different cases; in the first the number of the users of the BSS is equal to 10 while in the second case the number is equal to 20. In addition, in order to investigate the effect of the requests’ generation on the users’ throughput, we have altered the generation rate by increasing the mean value of the exponential distribution from 300 to 600, thus decreasing the overall generation of the requests. Both the users and the server make use of UDP with the number of the packet data bytes remaining fixed to 1480 bytes. througput (Mbps) 2 1,5 20us,exp(600) 10us,exp(600) 1 20us,exp(900) 10us,exp(900) 0,5 5 4 3 2 1 0, 01 0, 1 0, 5 0 message size (MB) Figure 6: Effect of message size on throughput for different simulation cases. 4. Conclusions One main conclusion coming out from the first scenarios of each model is the better performance of UDP over TCP. This result has to do with the ARQ error mechanism provided by the 802.11 that makes the use of TCP congestion control and acknowledgement technique bouncy, especially for the networks that do not experience high load and collisions. As it was expected, TCP enters greater overhead than UDP because of the extra use of the ‘Open’, ‘Close’ and ACK packets. Another result coming out of both ad-hoc and infrastructure networks is the fact that the increase of the users turns to a throughput decrease. This is due to our selection of a rather big message size (2MB) that appears to be a value far away from the size limit over which throughput stops increasing (figures 3 and 6). For the scenarios where the main variable is the message size, we have come out with some important remarks. Firstly, for both ad-hoc and infrastructure networks, we can clearly note the existence of 3 throughout levels; increment, saturation and decrement. This observation leads to a certain size limit of the best achievable throughput. This message size limit is equal to 0.1MB for both the ad-hoc and the infrastructure network. Secondly, we have come out with another limit over which both the users’ doubling and the increase in the request generation rate start to affect unfavorably the user throughput. This limit takes a value equal to 0.05MB, thus discouraging us to use greater messages, especially when the network loads come to higher values. References: 1. IEEE Std. 802.11 1999 Edition: IEEE Standard for Information Technology -Telecommunications and Information Exchange between Systems - Local and Metropolitan Area Networks - Specific Requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications 2. IEEE Std. 802.3 2002 Edition: IEEE Standard for Information Technology -Telecommunications and information Exchange between Systems - Local and Metropolitan Area Networks - Specific Requirements Part 3: Carrier Sense Multiple Access with Collision Detection (CSMA/CD) Access Method and Physical Layer Specifications 3. TCP/IP Tutorial and Technical Overview (IBM RedBooks) - Adolfo Rodriguez, John Gatrell, John Karas, Roland Peschke 4. TCP Performance in the Presence of Congestion and Corruption Losses Andrei Gurtov, MSc Thesis, Department of Computer Science – University of Helsinki, December 2000 5. A Performance Analysis of the Basic Access IEEE 802.11 Wireless LAN MAC Protocol (CSMA/CA) Shreyas Sadalgi, Department of Computer Science, Rutgers University, May 2000 6. Towards high performance modeling of the 802.11 wireless protocol – Jason Liu, David M. Nicol, L. Felipe Perrone, Michael Liljenstam, Proceedings of the 2001 Winter Simulation Conference. 7. Performance analysis of the IEEE 802.11 MAC Protocol – Chuan Heng Foh and Moshe Zukerman Proceedings of the European Wireless (EW) 2002 Conference, Italy. 8. IEEE 802.11 Wireless Local Area Networks – Brian P. Crow, Indra Widjaja, Jeong Geun Kim, Prescott T. Sakai – IEEE Communications Magazine, September 1997). 9. Simulation of the MAC Portion of IEEE 802.11 and Bursts of Errors for Wireless Data Networks, Farhood Moslehi, MSc Thesis, Virginia Polytechnic Institute, 1997 10. TCP and UDP Performance over a Wireless LAN - George Xylomenos and George C. Polyzos, Proceedings of the IEEE INFOCOM 99 Conference, 1999. 11. Performance analysis of interconnections of IEEE 802.11 networks with other networks - Marek Natkaniec ISWC’99 IEEE International Symposium on Wireless