abstract

advertisement
Performance evaluation of different wireless network
topologies using the IEEE 802.11 MAC Protocol
CHRIS BASIOS*, PANAGIOTIS KOSTARAKIS* and EVANGELOS PALLIS+
* Physics Department - Electronics, Telecommunications and Applications
Laboratory
+
Institute of Informatics and Telecommunications - Telecommunications Laboratory
*University of Ioannina
+National Center for Scientific Research ‘Demokritos’
*Panepistimioupolis, 45110, Ioannina
+Ag. Paraskevi Attikis, 15310, Attiki
GREECE
Absract: WLANs are an emerging part of the current wireless communications providing
high bandwidth to users in a limited geographical area. The IEEE 802.11 Standard is a widely
used protocol for this kind of communication. In this paper, we estimated the performance of
the above protocol for 3 different wireless networks; an ad-hoc network, a network that makes
use of the LMDS technology and an infrastructure network. The performance evaluation was
based on throughput values coming out of various simulations. Our main interest focused on
the transfer of fixed data packets under a varying network load (depending on the number of
users, the length of the packets etc.).
Key-Words: 802.11, DCF, throughput, ad-hoc, LMDS, infrastructure
1. Introduction
The main concept in our
simulations was the throughput
estimation for the case where every
user that resides in the WLAN requests
and downloads – using either TCP or
UDP transport protocol - a fixed size
message from a remote server. In the
ad-hoc network both users and the
server use the DCF access method –
specified by the IEEE 802.11 Standard
– in order to gain access to the wireless
medium. In the LMDS model, both
users and the AP (Access Point) of the
wireless cell, which is connected via a
point-to-point link to a wired server,
use the DCF access method. Finally, in
the infrastructure network the users use
the DCF in order to request and
download a message from the server
that resides in a wired LAN. We have
modeled various scenarios in order to
investigate the network efficiency
under different conditions. Thus, we
have varied the offered load (by
altering the number of the users, the
arrival rate of the users’ requests to the
server, the message length and the
length of the MSDUs the message
splits to) and we have also investigated
the utilization of the fragmentation
mode provided by IEEE 802.11
Standard.
The design of the simulation
models and the analysis of their
efficiency have been made by using
the COMNET III simulation program.
With this simulation tool we had the
possibility to built our own network
topology by using and altering many
parameters of the main building blocks
of the program - such as nodes, links,
network devices etc. - that constructed
our designed models.
2. The DCF access method and
simulation basic parameters
In all simulations the access
method that was used by the wireless
users was the DCF (Distributed
Coordination Function). DCF is the
primary access method provided by the
IEEE 802.11 Standard and is based on
CSMA/CA algorithm. In the following
lines we will give an overview of this
algorithm.
Before a station initiates
transmission of a data frame, it needs
to sense the channel in order to
determine whether another station is
currently transmitting. The station can
proceed with its transmission if the
medium is determined to be idle for a
time interval of DIFS (DCF InterFrame Space). After a data frame is
successfully
received
at
the
destination, the receiver must send an
acknowledgment
frame
(ACK),
because the transmitter cannot
determine whether a frame has been
faithfully delivered to its destination by
simply listening to the channel; the
sender may not observe frame
collisions the receiver detects with
other senders not observable by the
first (this is the so-called “hidden
terminal problem”). To transmit the
ACK, the receiver waits for the
channel to be idle for another time
interval of SIFS (Short Inter-Frame
Space). If the transmitter does not
receive an ACK packet within a certain
period (ACK timeout), it presumes that
the data frame is lost and schedules a
re-transmission.
If the medium is busy upon
transmitting a data frame or an ACK,
the transmission must be deferred until
the end of the ongoing transmission. In
this case, a random backoff interval is
selected, as follows. A backoff timer is
set with a random backoff integer (BV)
drawn from a uniform distribution over
the interval [0,CW - 1], where CW
(Collision Window) is an integer
within the range of CWmin and
CWmax. BV is the number of idle
“slots” the station must wait until it is
allowed to transmit. The value is
decremented by one for each idle slot
detected. The backoff timer suspends
when the medium becomes busy
before BV reaches zero. The timer
resumes only after the medium has
been idle longer than the designated
inter-frame space interval. The station
starts transmitting the frame when the
backoff timer reaches zero. For each
successive retransmissions, the value
of CW increases exponentially (i.e.
CWnew = CWold . 2 - 1), until it
reaches and then stays at CWmax . CW
will be reset to CWmin after a
successful transmission. The backoff
method is used to minimize collisions
and maximize throughput at both low
and high network utilizations.
All the wireless users access
the wireless channel of each one of the
3 network topologies by using the
basic DCF method provided by the
802.11 Standard, while at the physical
layer they use the FHSS technique.
The bit rate of the wireless medium is
fixed to 2 Mbps.
The transport protocols we
used are TCP and UDP. The
congestion
control
algorithm
implemented in TCP was selected to
be the ‘Fast recovery’ algorithm. We
also modeled the establishment and
disconnection of a TCP connection
using 2 fixed size (40 bytes) packets
for every message (‘Open’, ‘Close’
packets), while the ACK packet
acknowledging every data packet is 40
bytes long.
The main 802.11 parameters
and their values used in the simulations
are summarized in the next table.
Table 1: Parameters used for the
simulation of the IEEE 802.11 MAC
protocol
802.11 Parameters
Values
Bandwidht
Frame max
ACK timeout
Frame TxLife Time
Slot time
SIFS
FH dwell time
CWmin
CWmax
2 Mbps
2304 bytes
0.2 ms
512 ms
0.05 ms
0.028 ms
128 ms
7
255
The main assumption that have
been made for the wireless networks is
that the ‘hidden-node’ problem is not
addressed in the simulation models,
while the wireless users are all in fixed
locations (no mobility).
3. Simulation
results
models
and
In this section, we present the 3
different simulation models and the
individual scenarios being used. We,
briefly, analyze the network topology
and we demonstrate the throughput
graphics coming out for each scenario.
Figure 1: Simulation model of the ‘adhoc’ network.
1st scenario
Every BSS STA (user) requests
(1000 bytes packet) for a single time a
2 MB file from the server located in
the same BSS. The requests take place
in the first 120 sec of the overall
simulation run time (3600 sec)
according to a uniform distribution.
Both users and server make use of TCP
and UDP protocols (TCP have a fixed
sized packet consisted of 1460 data
bytes and 40 overhead bytes, while
UDP packet is consisted of 1480 data
bytes and 20 overhead bytes). The
offered load in the network varies
according to the number of users that
join the ad-hoc network (the min.
number of users is 1 and the maximum
is 30).
3.1 Ad-hoc model





Packetize delay: 0.01 ms
Buffer port delay: 0.05 ms
Propagation delay: 1 μs
BER: 10-3
ACK BER: 0.112
throughput (Mbps)
In this model we simulated the
transfer of a fixed-size message from a
wireless server to a variable number of
wireless users with both users and the
server residing in the same IBSS.
Some simulations took place for 2
different environments; the first was an
error-free environment and in the
second we simulated the following
basic delays and error factors:
2
TCP (error free
env.)
1,5
UDP (error free
env.)
1
TCP (error env.)
0,5
UDP (error env.)
0
0
10
20
30
40
users
Figure 2: Effect of number of users for
different simulation environments.
2nd scenario
The requests’ arrival for every
user in the BSS follow a Poisson
distribution, making the interarrival
throughput (Mbps)
2
1,8
1,6
1,4
1,2
1
0,8
0,6
0,4
0,2
0
TCP, f-1000
UDP, f-1000
TCP, f-2000
UDP, f-2000
TCP, f-1460
UDP, f-1460
0
10
20
30
40
users
Figure 3: Effect of number of users for
different MSDU lengths.
3rd scenario
In this scenario the number of
users is fixed (equal to 10) and the
varying parameter of the system is the
length of the message being
downloaded by all 10 users. Each
request to the server is generated once
(by every user) according to a uniform
distribution. The request arrivals take
place in the first 120 sec of the overall
simulation run time (3600 sec). The
message size varies from 1MB to
5MB, while the size of each transport
protocol packet (TCP or UDP) remains
the same equal to 1500 bytes (plus the
overhead).
throughput (Mbps)
time between the request messages
follow an exponential distribution with
a mean value of 600 sec. In this
scenario - that was only modeled for
error-free
environment
we
demonstrate the effect of the MSDU
packet length in the user throughput.
We used 3 different TCP-UDP packets
by changing the data bytes of every
packet (1000 bytes, 1460 bytes and
2000 bytes) that contract the whole
2MB message. Thus, the MSDUs
coming out from the server will take 3
different values, with none of them
exceeding the maximum allowable
MSDU length (2304 bytes).
1,6
1,4
1,2
1
0,8
0,6
0,4
0,2
0
TCP (error free
env.)
UDP (error free
env.)
TCP (error env.)
UDP (error env.)
0
2
4
6
message size (MB)
Figure 4: Effect of message size for
different simulation environments.
3.2 LMDS model
The idea of the LMDS model
was the investigation of the efficiency
for a network topology where the users
of a single wireless cell request and
download a fixed size message from a
service provider that resides in a
remote wired LAN. The connection
between the AP of the cell and the
router that routes the packets up and
down the server is implemented via an
RF point-to-point link (2Mbps
bandwidth). The service provider
resides in a wired LAN, which uses the
802.3 10BASET technology, while the
access method in the cell is carried out
using the CSMA/CA algorithm for
both uplink and downlink; that means
that both the users and the AP make
use of the 802.11 protocol. Some
simulations took place for 2 different
environments (error-free and errormodeling).
The parameters and their values
used for the simulation of the IEEE
802.3 MAC protocol are according to
the 802.3 Standard, while these of the
802.11 MAC protocol are the same
with what was referred in the ad-hoc
model.
In
the
error
simulation
environment we have modeled the
same errors and delays with the
previous model plus the BER of the
wired medium - which was set to 10-5 and the processing packet delay in both
router and AP (Processing/packet:
0.0067 ms).
Figure 5: Simulation model of the
LMDS network.
fragmentation mode. Firstly, we must
mention that the arrivals of the users
requests are modeled with exponential
interarrival times with a mean value of
600 sec. The transport layer that was
used in order to simulate the behavior
of the fragmentation mode was UDP
with a fixed size packet of 1500 bytes
(1480 data bytes + 20 OH bytes). The
fragmentation threshold was set in 712
bytes. In addition, we simulated the
use of TCP in order to compare the
efficiency of the 2 protocols when the
load of the network increases (due to
the increment of the wireless users).
1st scenario
throughput (Mbps)
2
TCP (non error
env.)
1,5
UDP (non error
env.)
1
TCP (error env.)
0,5
UDP (error env.)
0
0
10
20
30
40
users
Figure 6: Effect of number of users for
different simulation environments.
2nd scenario
have
In this second scenario, we
modeled
the
802.11
throughput (Mbps)
2
Every BSS STA (user) requests
(using a 1000 bytes packet) and
downloads a 2MB from the wired
server. Every user that joins the
wireless cell generates only one
packet-request. The requests take place
in the first 120 sec of the overall
simulation run time (3600 sec)
according to a uniform distribution.
Both users and server make use of TCP
and UDP protocols (TCP have a fixed
sized packet consisted of 1460 data
bytes and 40 overhead bytes, while
UDP packet is consisted of 1480 data
bytes and 20 overhead bytes).
1,5
TCP (without
frg)
1
UDP (without
frg)
UDP (with frg)
0,5
0
0
10
20
30
40
users
Figure 7: The effect of fragmentation
technique.
3rd scenario
In this scenario we investigate
the effect of the message size in the
users throughout under the 2 different
simulation environments. The number
of the users is fixed (equal to 10) and
each request to the server is generated
once (by every user) according to a
uniform distribution in the first 120 sec
of the overall simulation run time. The
message size varies from 1 MB to 5
MB, while the size of each transport
protocol packet (TCP or UDP) remains
the same equal to 1500 bytes (plus the
overhead).
2
1,8
throughput ( Mbps)
1,6
1,4
TCP (non error env.)
1,2
UDP (non error env.)
1
TCP (error env.)
0,8
UDP (error env.)
0,6
0,4
0,2
0
0
1
2
3
4
5
6
message size (MB)
Figure 8: Effect of message size for
different simulation environments.
wired and wireless users make a single
request for the message and the
number of both LANs’ users is
incremented with the same rate (e.g.
when in the WLAN reside 10 users,
the same number of users shall reside
in the wired LAN). The arrival of each
request-packet will take place in the
first 120 sec and will follow a uniform
distribution.
10
In this simulation model a
802.11 wireless BSS is interconnected
via a wireless portal with a 802.3 wired
LAN (10BASET technology). Both
wireless and wired LAN consist of a
varying number of users (1 up to 30).
Every one of the above users will
request and try to download a fixed
data message from a server that is
connected to the 802.3 LAN, using the
TCP and UDP transport protocols. The
main aim of this simulation model was
to investigate the way the wireless
users’ throughput is affected by the
presence of the wired users. All the
simulations took place for error-free
environments.
8
throughput (Mbps)
3.3 Infrastructure model
802.11, TCP
6
802.11, UDP
4
802.3, TCP
802.3, UDP
2
0
0
10
20
30
40
users
Figure 10: Effect of number of users
for different transport protocols.
2nd scenario
In this scenario we have
modeled and simulated 2 different
cases. In the first one we vary the
number of wired users for a fixed
number of wireless users, while on the
second one we vary the number of
wireless users for a fixed number of
wired users. The arrival of requests
from each station is modeled with
exponential interarrival times with a
mean value of 600 sec.
10
9
Figure 9: Simulation model of the
infrastructure network.
throughput ( Mbps)
8
7
6
wireless users
5
wired users
4
3
2
1st scenario
1
0
0
5
10
15
20
wired users
The message size that each user
will try to download from the wired
server is fixed and equal to 2 MB. Both
(a)
25
30
35
4. Conclusions
10
9
throughput (Mbps )
8
7
6
wireless users
5
wired users
4
3
2
1
0
0
5
10
15
20
25
30
35
wireless users
(b)
Figure 11: The effect of (a) increment
of the wired users-the number of
wireless users remains fixed and (b)
increment of the wireless users-the
number of wired users remains fixed.
3rd scenario
In this scenario we simulated
the transfer of a fixed data packet from
the wired server to 10 wireless users
without the presence of any wired user.
Both the users and the server make use
of UDP with the number of the packet
data bytes remaining fixed to 1480
bytes. The varying magnitude in this
scenario is the message size, which
varies from 0.01 MB to 5 MB. In order
to estimate the throughput variation in
association with the offered load, we
used 2 different rates for the Poisson
arrivals of every user request. Thus,
the interrarival time is following an
exponential distribution with 2
different values of 300 and 600 sec,
respectively.
throughput (Mbps)
2
1,5
exp(600)
1
exp(300)
0,5
0
0.01 0.1
0.5
1
2
3
4
5
message size (MB)
Figure 12: Effect of message size for
different interarrival times.
The main conclusion coming
out is the clearly better performance of
UDP over TCP, whether the simulation
environment used is error-free or not.
This result has to do with the ARQ
error mechanism provided by the
802.11 that makes the use of TCP
congestion
control
and
acknowledgement technique bouncy,
especially for the networks that do not
experience high load and collisions. As
it was expected, TCP enters greater
overhead than UDP because of the
extra use of the ‘Open’, ‘Close’ and
ACK packets. Another result for both
ad-hoc and infrastructure networks is
that the increase of the users turns to a
throughput decrease for any kind of
traffic; this means that downloading
such large messages (1-5 MB) has a
serious affection on the users’
throughput.
In particular, the use of larger
fixed data packets (that construct the
overall message) in the ad-hoc model
is, generally, more efficient than the
use of smaller ones. This is due to the
‘error-free’ simulation environment
and the fact that when the 2 MB
message splits in smaller MSDUs,
more packets will have to contend for
the wireless medium, thus increasing
the probability of collisions. This
explains and the decreasing of the
throughput when the message size
increases (from 1 to 5 MB).
In the LMDS model, the most
remarkable conclusion is the limit
estimation of the number of wireless
users that makes the use of
fragmentation either useful or not for
the entire network. When the users of
the wireless cell exceed the number of
15, the fragmentation mode leads to
higher values of throughput. Despite
the extra overhead bytes for every
fragment, fragmentation increases the
probability of successful transmission
of the MSDU (because of the use of
smaller frames) when the offered
network load comes to higher values.
The results of figure 2.3 show that for
the error-free simulation model the
offered load we applied in the network
(10 users, one message request per
user) leads in a slight throughput
decrement despite the message size
increment.
For
the
infrastructure
simulation model, the existence of 10
fixed wired users does not affect in any
way the throughput of the wireless
users
which
remains
fixed,
independently of their number residing
in the WLAN. The same wireless user
throughout is slightly affected when
the number of the wired users varies
from 1 to 30. By varying the request
generation rate and the length of the
message size (figure 3.3), we turned
out with 2 main goals. The first one
has to do with the existence of 3
throughout
levels;
increment,
saturation and decrement that lead to a
clear limit of the best achievable
throughput. The second one is the
estimation of the maximum allowable
message size value (1MB) over which
the arrival rate affects the user
throughput.
In order to overcome the
significant
TCP
overhead
in
infrastructure
networks,
many
optimization techniques have been
introduced. The main feature of most
of these techniques is splitting the TCP
end-to-end connection in individual
TCP connections for the wireless and
wired parts of the network. The
efficiency of such techniques is
included in our current interest
research fields.
References:
1. IEEE Std. 802.11 1999 Edition:
IEEE Standard for Information
Technology -Telecommunications and
Information
Exchange
between
Systems - Local and Metropolitan Area
Networks - Specific Requirements Part 11: Wireless LAN Medium
Access Control (MAC) and Physical
Layer (PHY) Specifications
2. IEEE Std. 802.3 2002 Edition:
IEEE Standard for Information
Technology -Telecommunications and
information
Exchange
between
Systems - Local and Metropolitan Area
Networks - Specific Requirements Part 3: Carrier Sense Multiple Access
with Collision Detection (CSMA/CD)
Access Method and Physical Layer
Specifications
3. TCP/IP Tutorial and Technical
Overview (IBM RedBooks) - Adolfo
Rodriguez, John Gatrell, John Karas,
Roland Peschke
4. TCP Performance in the Presence of
Congestion and Corruption Losses Andrei
Gurtov,
MSc
Thesis,
Department of Computer Science –
University of Helsinki, December 2000
5. A Performance Analysis of the
Basic Access IEEE 802.11 Wireless
LAN MAC Protocol (CSMA/CA) Shreyas Sadalgi, Department of
Computer Science, Rutgers University,
May 2000
6.
Towards
high
performance
modeling of the 802.11 wireless
protocol – Jason Liu, David M. Nicol,
L. Felipe Perrone, Michael Liljenstam,
Proceedings of the 2001 Winter
Simulation Conference.
7. Performance analysis of the IEEE
802.11 MAC Protocol – Chuan Heng
Foh and Moshe Zukerman Proceedings of the European Wireless
(EW) 2002 Conference, Italy.
8. IEEE 802.11 Wireless Local Area
Networks – Brian P. Crow, Indra
Widjaja, Jeong Geun Kim, Prescott T.
Sakai – IEEE Communications
Magazine, September 1997).
9. Simulation of the MAC Portion of
IEEE 802.11 and Bursts of Errors for
Wireless Data Networks, Farhood
Moslehi, MSc Thesis, Virginia
Polytechnic Institute, 1997
10. TCP and UDP Performance over a
Wireless LAN - George Xylomenos
and George C. Polyzos, Proceedings of
the IEEE INFOCOM 99 Conference,
1999.
11. Performance of an 802.11 based
network in an urban WLL environment
-Mattias Löfgren, MSc Thesis, KTH,
February 2001, Poland
12. Simulation Study of Local
Multipoint
Distribution
Service
(LMDS) - Abhijit Khobare, MSc
Thesis
in
Computer
Science,
Blacksburg, Virginia, 2000
13.
Performance
analysis
of
interconnections of IEEE 802.11
networks with other networks - Marek
Natkaniec
ISWC’99
IEEE
International Symposium on Wireless
Download