搜索
您的当前位置:首页正文

Design and Performance Evaluation of an Asymptotically Optimal Backoff Algorithm for IEEE 8

来源:二三娱乐
Proceedings of the 33rd Hawaii International Conference on System Sciences - 2000

Design and Performance Evaluation of an Asymptotically Optimal Backoff

Algorithm for IEEE 802.11 Wireless LANs

L. Bononi*, M. Conti**, E. Gregori**

*Department of Computer Science

University of Bologna

Mura Anteo Zamboni, 7, 40127 Bologna - Italy

e-mail: bononi@cs.unibo.it

Abstract

This paper presents and evaluates a distributed mechanism for

the contention control in IEEE 802.11 Wireless LANs.Specifically, our mechanism named Asymptotically OptimalBackoff (AOB), dynamically adapts the backoff window size tothe current load. AOB guarantees that an IEEE 802.11 WLANasymptotically (i.e. for a large number of active stations)achieves its optimal channel utilization. The proposedmechanism merges the ideas on adaptive backoff presented in[2] with some properties derived from the IEEE 802.11 capacityanalysis (see [3]). AOB can be used on top of the standard802.11 access mechanism without requiring any modification tothe standard or additional hardware. The AOB mechanismadapts the backoff to the network contention level by using twosimple load estimates: the slot utilization and the average sizeof transmitted frames. These estimates are simple and can beobtained with no additional costs or overheads. Theperformance of the IEEE 802.11 protocol with or without theAOB mechanism is investigated in the paper via simulation.Simulative results indicate that our mechanism is very effectiveand brings the utilization of the system close to the optimal levelfor a wide range of load and network configurations.

**Istituto CNUCE

National Research Council (CNR)Via S.Maria, 36, 56100 Pisa - Italye-mail: {M.Conti, E.Gregori}@cnuce.cnr.it

the access protocol should balance these two conflictingcosts [3,9]. Since these costs change dynamically,depending on the network load, the access protocolshould be adaptive to congestion variations in the system.Such an adaptive behavior is currently obtained in theIEEE 802.11 protocol by adopting a binary exponentialbackoff protocol [8, 11, 12]. Specifically, each user is notassumed to have any kind of knowledge about either thetransmission result (success or collision), or the numberof users in the system. Each station, to transmit a frame,accesses the channel within a random self-defined amountof time, whose mean size depends on the number ofcollisions previously experienced by the station for thatframe. This policy has to pay the cost of collisions toincrease the backoff time when the network is congested.Several authors have investigated the enhancement ofthe IEEE 802.11 DCF MAC protocol to increase itsperformance when it is utilized in WLANs. In [5, 7], via aperformance analysis, it is studied the tuning of thestandard parameters. In [21], given the BinaryExponential Backoff scheme adopted by the Standard,solutions have been proposed for a better uniformdistribution of accesses.

Trying to extend backoff protocols, a great amount ofwork has been done to study the information that can beobtained by observing the system’s parameters [10, 14,20]. Some studies try to approximate the knowledgeabout the number of users involved in the accesses byexploiting the history of the system. Example of suchworks (for the IEEE 802.11 DCF MAC protocol) relatesto the attempt to make the reduction of contentionadaptive and optimal by investigating the number of usersin the system [1,3]. It is worth observing how thisinvestigation could result expensive, difficult to obtainand subject to significant errors, especially in highcontention situations.

In this paper we propose and evaluate a mechanism,Asymptotically Optimal Backoff (AOB), for improvingthe efficiency of the IEEE 802.11 standard protocol. Thismechanism does not require any modification to thestandard or additional hardware. The AOB mechanismadapts the backoff to the network contention level by

1. Introduction

In WLANs, the medium access control (MAC) protocol isthe main element that determines the efficiency in sharingthe limited communication bandwidth of the wirelesschannel. In this paper we focus on the efficiency of theIEEE 802.11 standard for wireless LANs.

The IEEE 802.11 access scheme incorporates twoaccess methods: Distributed Coordination Function(DCF) for asynchronous, contention-based, distributedaccess to the channel, and Point Coordination Function(PCF) for centralized, contention-free accesses [8, 17].We will concentrate our study on DCF. The DCF methodadopts an access scheme belonging to the class of theCSMA/CA MAC protocols [4, 8, 12, 19]. The distributedcongestion reaction adopted in the 802.11 DCF isobtained with a variable time-spreading of the users’accesses. A channel utilization wastage is caused both bycollisions and by the idle periods introduced by thespreading of accesses. To optimize the channel utilization

0-7695-0493-0/00 $10.00 (c) 2000 IEEE1

Proceedings of the 33rd Hawaii International Conference on System Sciences - 2000

using two simple and low-cost load estimates: the slotutilization and the average size of transmitted frames.AOB is based on the results derived by exploiting theanalytical model of the IEEE 802.11 protocol presentedin [1]. These results show that, given the average lengthof the transmitted frames, it exists a value for the channelutilization that maximizes the protocol capacity [6], thisvalue is indicated as optimal value in the following. Inaddition, the optimal value is almost independent on thenetwork configuration (number of active stations). AOB,by exploiting a rough and low cost estimate of theaverage size of transmitted frames, guarantees that thechannel utilization tends to the optimal value when thenetwork is congested. To achieve this goal, AOBschedules the frames’ transmission according to the IEEE802.11 backoff algorithm but adds an additional level ofcontrol before a transmission is enabled. Specifically,when the channel utilization tends to exceed the optimalvalue, AOB forces a station to postpone the transmissionalready enabled by the standard backoff algorithm. Thepostponed transmission is rescheduled as in the case of acollision (i.e., the transmission is delayed of a furtherbackoff interval). The proposed mechanism is applicable,in a transparent way, on top of the IEEE 802.11 DCFaccess mechanism. In this paper, via simulation, the AOBperformance are deeply investigated and compared withthe performance of the standard IEEE 802.11 DCF accessscheme. This performance analysis indicates that: i) underlight traffic conditions (i.e. few active stations), the AOBhas almost no impact on the protocol performance; ii)under heavy traffic conditions, by adopting the AOBmechanism, the channel utilization is close to the(analytically defined) optimal level.

The work is organized as follows: in Section 2 wepresent a brief explanation of the IEEE 802.11 standard,and we sketch the critical aspects connected to thecontention level of the system. In Section 3 the DCCmechanism proposed in [2] is summarized, while inSection 4 we sketch the capacity analysis presented in [3].In Section 5 the AOB mechanism is defined. In Section 6AOB performance are investigated via simulation.Conclusions and future researches are outlined in Section8.

IEEE 802.11 standard we address interested readers to[8,15].

The DCF access method is based on a CSMA/CAMAC protocol that requires every station to perform aCarrier Sensing activity to determine the current state ofthe channel (idle or busy). If the medium is found to bebusy, the station defers its transmission. Whenever thechannel becomes idle for at least a Distributed InterframeSpace time interval (DIFS), the station (re)starts its BasicAccess mechanism. To avoid collisions, as soon as an idleDIFS is sensed on the channel, a Collision Avoidancemechanism is needed. The Collision Avoidancemechanism adopted in the IEEE 802.11 standard is basedon a Binary Exponential Backoff scheme [8,11,12,13].When the channel is idle, time is measured in constantlength units (Slot_Time) indicated as slots in thefollowing.

The Binary Exponential Backoff scheme isimplemented by each station by means of a parameter,named Backoff Counter, which maintains the number ofempty slots the tagged station must observe on thechannel before performing its own transmission attempt.At the time a tagged station needs to schedule a newtransmission, it selects a particular slot among those of itsContention Window, whose size is maintained in the localparameter CW_Size. Specifically, the backoff value isdefined by the following expression [8]:

Backoff_Counter󰀁INT󰀁Rnd󰀁󰀂󰀂CW_Size󰀂 ,where Rnd() is a function which returns pseudo-randomnumbers uniformly distributed in [0..1].

The Backoff_Counter is decreased as long as a slottime is sensed as idle, it is frozen when a transmission isdetected, and reactivated after the channel is sensed asidle for at least a further DIFS. As soon as the BackoffCounter reaches the value Zero the station transmits itsown frame. Positive acknowledgements are employed toascertain a successful transmission. This is accomplishedby the receiver (immediately following the reception ofthe data frame) which initiates the transmission of anacknowledgement frame (ACK) after a time intervalShort Inter Frame Space (SIFS), which is less than DIFS.If the transmission generates a collision1, theCW_Size parameter is doubled for the new scheduling ofthe retransmission attempt thus obtaining a furtherreduction of contention. The Binary Exponential Backoffis then characterized by the expression that gives thedependency of the CW_Size parameter by the number ofunsuccessful transmission attempts (N_A) alreadyperformed for a given frame. In [8] it is defined that thefirst transmission attempt for a given frame is to beperformed with CW_Size equal to the minimum valueCW_Size_min (assuming low contention). After eachunsuccessful (re)transmission of the same frame, the

2. IEEE 802.11 DCF Utilization

The basic access method in the IEEE 802.11 MACprotocol is the Distributed Coordination Function (DCF)which is a Carrier Sense Multiple Access with CollisionAvoidance (CSMA/CA) MAC protocol. In addition to theDCF, the IEEE 802.11 also incorporates an alternativeaccess method known as the Point Coordination Function(PCF) - an access method that is similar to a pollingsystem and uses a point coordinator to determine whichstation has the right to transmit. In this section we onlypresent the aspects of the DCF access method relevant forthe scope of this paper. For the detailed explanation of the

1A collision is assumed whenever the ACK from the

receiver is missing

0-7695-0493-0/00 $10.00 (c) 2000 IEEE2

Proceedings of the 33rd Hawaii International Conference on System Sciences - 2000

station doubles CW_Size until it reaches the maximalvalue fixed by the standard, i.e. CW_Size_MAX, asfollows:

CW_Size󰀁N_A󰀂󰀁

󰀂N_A󰀁1󰀃

minCW_Size_MAX,CW_Size_min󰀂2

󰀁󰀂

The increase of the CW_Size parameter value after a collision isthe reaction that the 802.11 standard DCF provides to make theaccess mechanism adaptive to channel conditions.

2.1 IEEE 802.11 congestion reaction

Figure 1 shows simulation data regarding the channelutilization of a standard 802.11 system running in DCFmode, with respect to the contention level, i.e. the numberof active stations with continuous transmissionrequirements.

The parameters adopted in the simulation, presented inTable 1, refer to the Frequency Hopping Spread Spectrumimplementation [8].

Table 1: System’s physical parameters

parameter

Number of Stations (M)

CW_Size_minCW_Size_MAXChannel bit ratePayload size

Acknowledgement size

Header sizeSlotTimeSIFSDIFS

Propagation time

value

variable from 2 to 200

1610242 Mb/s

Geometric distribution200 󰀁sec (50 Bytes)136󰀁sec (34 Bytes)

50󰀁sec28󰀁sec128󰀁sec< 1 󰀁sec

These results can be explained as, in the IEEE 802.11backoff algorithm, a station selects the initial size of theContention Window by assuming a low level ofcongestion in the system. This choice avoids long accessdelays when the load is light. Unfortunately, this choicecauses efficiency problems in bursty arrival scenarios,and in congested systems, because it concentrates theaccesses in a reduced time window, and hence it maycause a high collision probability. In high-congestionconditions each station reacts to the contention on thebasis of the collisions so far experienced whiletransmitting a frame. Every station performs its attemptsblindly, with a late collision reaction performed(increasing CW_Size). Each increase of the CW_Size isobtained paying the cost of a collision. Furthermore, aftera successful transmission the CW_Size is set again to theminimum value without maintaining any knowledge ofthe current contention level. To summarize the IEEE802.11 backoff mechanism has two main drawbacks: i)the increase of the CW_Size is obtained paying the costof a collision, and ii) after a successful transmission nostate information indicating the actual contention level ismaintained.

3. Low-cost dynamic tuning of the backoffwindow size

The drawbacks of the IEEE 802.11 backoff algorithm,explained in the previous section, indicate the directionfor improving the performance of a random accessscheme, by exploiting early and meaningful information’sconcerning the actual state of congestion of the channel.The idea involves an estimate of the channel's congestionlevel, given by the utilization rate of the slots (SlotUtilization) observed on the channel by each station. Theestimate of the Slot Utilization must be frequentlyupdated. For this reason in [2] it was proposed anestimate that has to be updated by each station in everyBackoff interval, i.e., the defer phase that precedes atransmission attempt. For the use we considered to makewith, the Slot Utilization estimate has to satisfy only twoconditions:

°values included in [0..1]: the Zero value should

indicate that no slots observed in the backoff intervalresulted as busy, while the value One should indicatethat every slot available for transmission resulted asbusy;

°intermediate values should be distributed in the [0..1]

interval, proportionally to the contention level (e.g.the rate of busy slots compared to the total number ofobserved slots available for transmission).

A simple and intuitive definition of the slot utilizationestimate is then given by:

Num_Busy_Slots

Slot_Utilization󰀁 ,

Num_Available_Slots

Figure 1 plots the channel utilization versus the number ofactive stations obtained in asymptotic conditions, i.e. assumingthat all the stations have always a frame to transmit. Byanalyzing the behavior of the 802.11 DCF mechanism someproblems could be identified. Specifically, the results presentedin the figure show that the channel utilization is negativelyaffected by the increase in the contention level.

0.90.80.7Average Payload = 2.5 Slot timesAverage Payload = 50 Slot timesAverage Payload = 100 Slot timesChannel Utilization of the Standard 802.11 DCFChannel Utilization0.60.50.40.30.20.10220406080100120140160180200Number of active stationsFigure 1: Channel utilization of the IEEE 802.11 DCFaccess scheme

0-7695-0493-0/00 $10.00 (c) 2000 IEEE3

Proceedings of the 33rd Hawaii International Conference on System Sciences - 2000

where Num_Busy_Slots is the number of transmissionattempts2 in the backoff interval, andNum_Available_Slots is the total number of slotsavailable for transmission in the backoff interval.

In the 802.11 standard mechanism every stationperforms a Carrier Sensing activity and thus the proposedslot utilization (S_U) estimate is simple to obtain, withzero costs and overheads. The information required toestimate S_U are already available to an IEEE 802.11station, with no additional hardware required.

It is interesting to observe how the slot utilizationprovides a lower bound for the actual contention level ofthe channel. In fact, as some stations may transmit in thesame slot, it provides a lower bound to the effectivenumber of stations trying to access the channel during thelast observed backoff interval. If the value of the slotutilization is high (i.e. near to One), this implies that thelast observed backoff interval was affected by a high levelof contention on the channel.3.1 The DCC mechanism

We have seen that the slot utilization estimate provides toeach station an indication of the network contention level.This information can be utilized by each station toevaluate (before trying a “blind” transmission) theopportunity to perform or to defer its scheduledtransmission attempt. In few words, the only reasonablebehavior of a station that knows there are few possibilitiesfor a successful transmission, is to defer its transmissionattempt. Such a behavior can be achieved in an IEEE802.11 network by exploiting the DCC mechanismproposed in [2]. According to DCC, each station controlsits transmission attempts via a new parameter namedProbability of Transmission P_T(...) which constitutes thecore of the proposed mechanism.

The P_T parameter allows to realize a filtering of theaccesses between the standard access scheme adopted bythe system, and the physical layer. The value of thisparameter is dependent on the contention level of thechannel. Each station, first estimates the slot utilization,then computes the Probability of Transmission value. P_Tis used to evaluate the opportunity to perform atransmission on the shared channel. If the station decidesto defer the transmission, it reschedules a new attempt, asin the case of a collision occurred. We now present theheuristic expression to evaluate the Probability ofTransmission (P_T) adopted in the proposed DCCmechanism [2]:

P_T󰀁S_U󰀂󰀁1󰀃S_U ,where, by definition, S_U assumes values in theinterval [0..1].

The slot utilization is interpreted in DCC as aninhibition mechanism of the accesses, depending on thecontention level it represents. However, we can observe

how such a flat definition would conduct the system tofluctuate between two states, with slot utilization zero andone, i.e. no channel utilization and maximum contention,respectively. In fact, if the slot utilization is high, thenevery user would obtain a low P_T value, inducing a lowslot utilization in the next future. This will cause everyuser to obtain a high P_T value, and a future high slotutilization. To avoid this harmful fluctuating behavior, theP_T definition has been extended by introducing a furtherlocal parameter. The idea is to partition the set of activestations in such a way that each stations’ subset isassociated with a different level of privilege to access thechannel. This is achieved by including into the P_Tdefinition the number of attempts already performed forthe current frame (N_A). The N_A parameter is used as anindicator of the dynamic level of privilege achieved by astation:

N_A

P_T󰀁S_U, N_A󰀂󰀁1󰀃S_UThe lowest privilege is given to stations performing, for agiven frame, the first transmission attempt, while theprivilege level linearly increases with the number ofcollisions experienced. To better understand what weobtain, we can observe the Figure 2.

Probability of Transmission (Slot_Utilization, N_A)1Probability of Transmission0.80.60.40.2N_A = 1N_A = 2N_A = 4N_A = 8N_A = 16000.20.40.6Slot_Utilization0.81Figure 2: Probability of Transmission

In this figure we show the Probability of Transmissioncurves for users with different numbers of attemptsperformed, and with respect to the S_U values estimated.Assuming a slot utilization near to zero, we can observehow each station, independently by its number ofperformed attempts, obtains a Probability of Transmissionnear to one. This means that the proposed mechanism hasno effect on the system, and each user performs itsaccesses just like in the standard access scheme, withoutany additional contention control. This point is significantas it implies the absence of overhead introduced in low-load conditions. The differences in the user’s behavior asa function of their levels of privilege (related to the valueof the N_A parameter) appear when the slot utilizationgrows. For example, assuming a slot utilization near toone, say 0.8, we observe that the stations with the highestN_A value obtains a Probability of Transmission close to

2It is worth noting that Num_Busy_Slots includes both

successful transmissions and collisions.

0-7695-0493-0/00 $10.00 (c) 2000 IEEE4

Proceedings of the 33rd Hawaii International Conference on System Sciences - 2000

one while stations at the first transmission attempttransmit with a probability equal to 0.2.

It is worth noting a property of the DCC mechanism:the slot utilization of the channel never reaches the valueOne. Assuming S_U near or equal to One, the DCCmechanism would perform asymptotically (see Figure 2)by reducing the Probabilities of Transmission for everystation. This effect was due to the P_T definition, and inparticular to the explicit presence of the upper bound Onefor the slot utilization estimate. We will exploit thischaracteristic of the P_T definition to construct the AOBmechanism.

of a successful transmission. The protocol capacity is thus[14]:

(1)󰀂max󰀁tfttvwhere tft is the average Frame Transmission time, and tvis the average temporal distance between two consecutive

successful transmissions, also referred to as the averagevirtual transmission time. Specifically,the average virtual

transmission time includes (see Figure 3):

i)the average time required for a successful

tst, i.e. the average time intervaltransmission,

including the successful transmission and theoverheads induced by the MAC protocol definition.By denoting with 󰀁 the maximum propagation delay,and with SIFS, ACK, DIFS the corresponding timesconnected to the protocol implementation (see Table1), it results [3]:

tst󰀄tft󰀅2󰀂󰀃󰀅SIFS󰀅ACK󰀅DIFS;ii)the idle periods. An idle period is made up of a

number of consecutive slots in which thetransmission medium remains idle due to the backoffalgorithm;

iii) the collisions which occur between two consecutive

successful transmissions.4. IEEE 802.11 DCF Capacity Analysisresults

Since a WLAN relies on a common transmission medium,the MAC protocol coordinates the network stations inaccessing the channel by means of control informationthat is carried explicitly by control messages travellingalong the medium (e.g. ACK messages), or can beprovided implicitly by the medium itself by the channelbeing either active or idle (i.e. carrier sensing). Controlmessages, or message retransmission due to collision,remove channel bandwidth from that available forsuccessful message transmission. Therefore, the fractionof channel bandwidth used by successfully transmittedmessages gives a good indication of the overheadrequired by the MAC protocol to perform its coordinationtask among stations. This fraction is known as channelutilization, and the maximum value it can attain is knownas the capacity of the MAC protocol [6].

In this section we briefly present the main results ofthe IEEE 802.11 capacity analysis developed in [3]. TheIEEE 802.11 capacity analysis is performed by assumingan IEEE 802.11 system with M stations working inasymptotic conditions, i.e., each station has always aframe to transmit. The stations transmit frames whosesizes are i.i.d. sampled from a geometric distribution withparameter q. Specifically, the size of a frame is an integermultiple of the slot Size (ts), and hence the Mean Frame

####empty slotsVirtual transmission time= collision= DIFS

= successful transmission

Figure 3: Structure of a virtual transmission timeTaking into consideration i)-iii), it follows that [3]

Size (MFS) isMFS󰀁ts󰀁1󰀃q󰀂.

To simplify the analysis, in [3], it is assumed ageometrically distributed backoff instead of the uniformsampled backoff of the IEEE 802.11. At the beginning ofan empty slot a station starts the transmission of a framewith probability p, and defers the transmission withprobability 1-p. Hence, the IEEE 802.11 protocol with thenew backoff algorithm is similar to a p-persistent protocol[12].

From the geometric backoff assumption all theprocesses which define the occupancy pattern of thechannel (i.e. empty slots, collisions, successfultransmissions) are regenerative with respect to thesequence of time instants corresponding to the completion

󰀄󰀅N󰀈󰀅

_󰀅󰀅󰀃󰀅󰀅󰀁󰀂tv󰀁E󰀇󰀅IdlepCollDIFS󰀊󰀅󰀃ii

󰀆󰀅i󰀄1󰀉󰀅 (2)

c

󰀅EIdle_pN

whereIdle_pi and Colli are the lengths of the i-th idle

period and collision in a virtual time, respectively; andNc is the number of collisions in a virtual time.

The length of a collision is equal to the maximumlength of colliding frames (depending on the frame sizedistribution), and depends on the Backoff Algorithm. Thelatter determines the number of colliding stations.

As we stated before, we assume that a station for eachtransmission attempt uses a backoff interval sampled froma geometric distribution with parameter p. This means

󰀋

c

󰀅1

󰀌󰀅E󰀋t󰀌

st

0-7695-0493-0/00 $10.00 (c) 2000 IEEE5

Proceedings of the 33rd Hawaii International Conference on System Sciences - 2000

that the average Contention Window size is given by:E󰀋CW_Size󰀌󰀁1󰀃2p.

The assumption that the backoff interval is sampledfrom a geometric distribution with parameter p impliesthat the future behavior of a station does not depend onthe past. Hence, in a virtual transmission time, i) the idleperiod times 󰀍Idle_pi󰀎 are i.i.d. sampled from ageometric distribution with an average E󰀋Idle_p󰀌; andii) the collision lengths 󰀍Colli󰀎 are i.i.d with averageE󰀋Coll󰀌. Thus Equation (2) can be rewritten as

󰀍E󰀋Coll󰀌󰀄󰀁󰀄DIFS󰀎󰀄tv󰀃E󰀋Nc󰀌

󰀄E󰀋Idle_p󰀌󰀅󰀁E󰀋Nc󰀌󰀄1󰀂󰀄E󰀋S󰀌

.(3)

Closed expressions for E󰀋Idle_p󰀌 and E󰀋Coll󰀌 are

derived in [3] together with E󰀋Nc󰀌:E󰀋Nc󰀌󰀁

1󰀃󰀁1󰀃p󰀂Mp󰀁1󰀃p󰀂

M

M󰀁1

󰀃1tslot

E󰀋Coll󰀌󰀁

1󰀃󰀁1󰀃p󰀂󰀅Mp󰀁1󰀃p󰀂

M

󰀋M󰀁1

󰀌󰀂

Mp󰀁1󰀃p󰀂1󰀃q

M󰀁1

󰀄󰀅󰀆

hMh󰀁1M

pqhpq1 󰀇󰀅1󰀃󰀃󰀂󰀃󰀁󰀂󰀁󰀂󰀃󰀆󰀅h󰀄1

󰀍󰀋󰀌󰀎󰀃

󰀈󰀅

󰀊󰀅󰀉󰀅

Hence, tv is a function of the system’s parameters (seeTable 1), the number of active stations M, the parameter pwhich defines the geometric-distribution used in thebackoff algorithm, and the parameter q that characterizesthe frame-size geometric distribution. Fixed the value forM and q, and the system-parameter values, tv is afunction of the p value only, tv󰀁p󰀂; therefore byexploiting (3) we can analytically investigate the value ofthe p parameter that minimizes tv, named the optimal pvalue (popt). Hence popt is the p value that maximizes theprotocol capacity, see Equation (1).

In [3], it is shown that popt is closely approximated bythe p value that guarantees a balance, in a virtualtransmission time, between collisions and idle periods, i.e.E󰀋Coll󰀌󰀂E󰀋Nc󰀌󰀁󰀁E󰀋Nc󰀌󰀅1󰀂󰀂E󰀋Idle_p󰀌󰀂tslot .(4)4.1 Theoretical limits vs. IEEE 802.11 and DCCprotocol capacities

In [2] the DCC mechanism effectively enhances thechannel utilization of the standard protocol. However, itscapacity is still far from the optimal capacity. It should benoted that the growth of the contention level (number ofactive stations) implies a reduction of the channelutilization in the IEEE 802.11 protocol (with or withoutthe DCC mechanism). This reduction is more marked

󰀁1󰀃p󰀂.E󰀋Idle_p󰀌󰀁M

1󰀃󰀁1󰀃p󰀂

M

when long messages are transmitted due to the highcollision cost.

To summarize, results presented in [2] show that thecontention reduction introduced by the DCC mechanismis effective. However, DCC operates in a heuristic way.Its aim is to utilize, when the network congestionincreases, larger windows respect to the standard sizes,but DCC does not have any “idea” of the optimal windowsize given a contention level. Other approaches have beenproposed in the literature to dynamically tune the backoffwindow size [1, 3]. The main limitation of theseapproaches is the need to estimate from the network theinformation on the contention level. On the other hand themain advantage of the DCC approach is its simplicity,low cost, adaptiveness to network congestion levels andtransparency with respect to the standard protocol.

In the next section we define a mechanism namedAOB (Asymptotically Optimal Backoff) that dynamicallytunes the backoff window size to the optimal values stillmaintaining the main advantages of the DCC mechanism.AOB exploits the following observations:

i) the increase in the number of active stations have an

almost negligible impact on the theoretical capacitybounds;

ii) the payload size highly affects the optimal utilization

level. Specifically, decreasing the payload sizeimplies a reduction of the optimal utilization level.This can be expected as reducing the payload sizeproduces a percentage increase of the transmissionoverheads.

5. The AOB mechanism

In this section we exploit the results obtained from theanalysis of the theoretical capacity limits of the IEEE802.11 protocol to develop the AOB mechanism. The aimof this mechanism is to dynamically tune the backoffwindow size to achieve the theoretical capacity limit ofthe IEEE 802.11 protocol.

The proposed AOB mechanism is simpler, morerobust and with lower costs and overheads introducedthan the contention mechanism proposed in [3].Specifically, the AOB mechanism does not require anyestimate of the number M of active stations. Moreover,the AOB mechanism can be used in an IEEE 802.11station without any modification to the standard protocol.5.1 Theoretical capacity limits: an invariant figureIn Section 4 we have pointed out that the increase in thenumber of active stations have an almost negligibleimpact on the theoretical capacity bounds, while thepayload size highly affects the optimal utilization level.Results presented in Table 2, derived from Formulas (3)and (4) explain these effects. In the table we report forvarious network (number M of active stations) and traffic(message length) configurations the analytical values ofthe optimal popt parameter, i.e., the p value minimizes

0-7695-0493-0/00 $10.00 (c) 2000 IEEE6

Proceedings of the 33rd Hawaii International Conference on System Sciences - 2000

the tv expression (3) given the M and q values. In thetable we also report for each configuration the valueM󰀏popt. It is worth noting that while popt is highlyaffected by the M value, given a q value, the productM󰀏popt is almost constant. This is the reason for namingit as an invariant figure. As we explain below, M󰀏poptis a measure of the network contention level when thenetwork utilises the optimal window size correspondingto the ongoing network and traffic configuration.

Table 2 : Analytical definition of optimality in function of M

and qMFSM = 2M = 10M = 50(Slots)M󰀂poptpM󰀂poptpM󰀂poptpoptoptoptand hence from (5) it results that M󰀂popt is a tight upper

bound of S_U in a system operating with the optimalchannel utilization level.

5.2 Considerations about the optimal slot utilizationlevel

In the previous section we show that, given the q value, inthe “ideal case” (i.e. the stations tune the window sizeaccording to the optimal p value) the slot utilization levelis bounded by M󰀂popt. Now, we compare the slotutilization level of the ideal case with that of the standardIEEE 802.11 with or without the DCC mechanism. Wedefine the optimal slot utilization values exploiting theprevious analyses and considerations. Specifically, wecharacterize the S_U in the ideal case by its upper boundM󰀂popt (see Table 2).

0.90.80.7Slot Utilization obtained: Standard, DCC, optimal valuesSlot Utilization210255082100.2616.1826.1329.1005.0811.0743.5232.3652.2658.2010.1623.1486.0443.0294.0209.0155.0124.0114.4430.2944.2091.1559.1249.1140.0086.0057.0040.0030.0024.0021.4320.2851.2018.150.121.1096

0.60.50.40.30.20.10220406080100120140Number of active stations160180200Standard’s Slot UtilizationDCC’s Slot UtilizationOPT. value, avrg. payload = 2.5 SlotsOPT. value, avrg. payload = 50 SlotsOPT. value, avrg. payload = 100 SlotsIn the following we investigate the meaning of M󰀂popt.As defined in Section 4, we consider M active stationsscheduling their transmission attempts in a slot selectedaccording to a geometric distribution with parameter p.Furthermore, for each configuration it exists an optimalvalue of parameter p, popt, that guarantees the balancingon the channel between idle periods and collisions. Let usnow assume that each station uses the optimal value popt.In Section 3 we introduce the slot utilization 󰀁S_U󰀂parameter to estimate the network contention level. Let usnow investigate the relationship, in the tagged contentionwindow, between S_U and M󰀂popt.

We denote with Ntr the number of stations that makea transmission attempt in a slot. HenceP󰀍Ntr󰀁i󰀎 is theprobability that exactly i stations transmit in a slot, andP󰀍Ntr󰀁0󰀎 is the probability that a slot remains empty.Let us now observe that M󰀂popt is the average number ofstations which transmits in a slot:M󰀂popt󰀁

Figure 4: The steady-state slot utilization: DCC, standard802.11 and optimal values

In Figure 4, we compare the optimal S_U values withthe steady-state slot utilization level estimated (viasimulation) in an IEEE 802.11 network with or withoutthe DCC mechanism. It is worth noting that by adoptingthe IEEE 802.11 protocol the slot utilization level doesnot depend on the parameter q value, while it is connectedonly to the number of active stations, M.

Results reported in Figure 4 show that in the standardprotocol the S_U values are generally greater than theoptimal values. This overestimation of the optimal S_Uvalues is marked when the mean frame size is large(frame size greater than 50 slots in the figure). This canbe expected because the standard protocol produces a slotutilization level which does not depend on the frame size.On the other hand, in the optimal case, the increase of theframe size which means an increase in the collision-costthat is balanced by a decrease of the collision probability.Obviously, the decrease of the collision probability isachieved (in the optimal case) by decreasing the S_Uvalue. Even if the DCC mechanism correctly reduces,with respect to standard 802.11, the slot utilization (i.e.the contention level) under high-load conditions, theresults presented in Figure 4 indicate that DCC does notproduce the optimal channel utilization level.

󰀁i󰀎󰀆1󰀃P󰀍Ntr󰀁0󰀎󰀁S_U(5)

i󰀄1

hence M󰀂popt is an upper bound on the probability toobserve a busy slot, i.e., M󰀂popt󰀆S_U. Furthermore,results presented in [3] indicate that, if the stations utilizethe optimal p value, the collision probability is low (e.g.in average one collision occurs out of several virtualtimes). This means that

P󰀍Ntr󰀇1Ntr󰀇0󰀎󰀈󰀈P󰀍Ntr󰀁1Ntr󰀇0󰀎

tr

󰀃i󰀂P󰀍N

M

0-7695-0493-0/00 $10.00 (c) 2000 IEEE7

Proceedings of the 33rd Hawaii International Conference on System Sciences - 2000

Channel UtilizationFurthermore, these results indicate that an algorithmwhich wish to drive the system to the optimal channelutilization must take into consideration the value of the qparameter.

5.3 The AOB mechanism

Let us coming back to the results presented in Table 2.Specifically, by fixing a given value for the frame sizeparameter q, it can be observed that the M󰀂popt productresults quasi-constant for M greater than 2, and moreprecisely, it shows only a little decrease when M grows.This means that, fixed the system’s parameters of Table 1,it is possible to define a single quasi-optimal value for theM󰀂popt as a function of the single parameter q. To sumup, for each IEEE 802.11 physical layer parameterssetting (e.g. see Table 1), it is possible to define afunction of q, named Asymptotical Contention Limit,ACL(q), such that ACL󰀁q󰀂󰀉M󰀂popt, q󰀊󰀋12,1󰀌. Thisfunction would represent the optimal slot-utilization levelthe system should obtain to guarantee its optimal behaviorfrom the channel utilization viewpoint. The ACL(q)function can be computed off-line by exploiting theanalytical model presented in Section 4. It is worth notingthat ACL(q) identifies the optimal contention level

without requiring the knowledge of the number of active

stations in the system. This is important, because it is thebasis for implementing an optimal window-tuningmechanism which does not require to estimate the numberof active stations in the system. Specifically, in thefollowing we show how to limit the slot utilization byexploiting the Asymptotic Contention Limit. The basicidea is i) to utilize, as in the DCC mechanism, the slotutilization level to control the stations’ transmission, andii) to disable the stations’ transmissions when the slotutilization level is greater or equal to ACL(q).

As far as point i) is concerned it is worth rememberingthat in DCC the control on the station’s transmission viathe slot utilization is obtained by introducing a Probabilityof Transmission (P_T):

Fixed a given ACL(q) value, the P_T values obtainedfluctuates among 0 and 1. We named AsymptoticallyOptimal Backoff (AOB) a mechanism which, by using theP_T defined by Equation (6), guarantees a S_U valuebelow the given ACL(q) value. The optimal ACL valuefor the slot utilization could be only asymptoticallyapproximated, for this reason the mechanism is namedAsymptotically Optimal Backoff.

6. Simulation results

In this section, by means of the discrete event simulation,we investigate the performance of the IEEE 802.11protocol enhanced with the proposed AOB mechanism.Simulation is performed by exploiting the RESQsimulation tool [16].

The main target of this performance study is toinvestigate the relationship between the channelutilization level and the network contention.

To perform this study we run a set of simulativeexperiments in which we change the number M of activestations. Active stations are assumed to operate inasymptotic conditions (i.e., with continuous transmissionrequirements). We use a maximum number of 200 activestations because the number of stations expected in thefuture for such a system could raise the order of hundreds[4]. Using up to 200 active stations enable us toemphasize the system’s characteristics, adaptiveness andscalability. The physical characteristics and parametervalues of the investigated system are reported in Table 1.It is also interesting to note that other interestingperformance indices as the Throughput and the MeanAccess Delay are strongly correlated with the channelutilization level.

0.90.80.70.60.50.40.30.20.10220406080100120140160180200Number of active stationsChannel Utilization obtained: Standard vs. optimal valuesP_T󰀁S_U,N_A󰀂󰀁󰀁1󰀄S_U

N_A

󰀂 .

Standard, avrg. payload = 2.5 SlotsStandard, avrg. payload = 50 SlotsStandard, avrg. payload = 100 SlotsOPT. value, avrg. payload = 2.5 SlotsOPT. value, avrg. payload = 50 SlotsOPT. value, avrg. payload = 100 SlotsAs discussed in Section 3.1 the P_T defined aboveguarantees that the S_U asymptotically tends to 1. Theasymptotic effect is due to the P_T definition whichimplies that P_T tends to zero as the slot utilizationapproaches one. Intuitively, if the slot-utilizationboundary value (i.e. one for DCC) would be replaced bythe ACL(q) value, we reduce all the probabilities oftransmission to zero in correspondence of slot utilizationvalues greater or equal to the ACL(q). To this end in theAOB mechanism we introduce a new definition for theProbability of Transmission :

󰀐󰀅S_U󰀓󰀅N_A

󰀕󰀅 (6)P_T󰀁ACL,S_U,N_A󰀂󰀁1󰀃min󰀒󰀅1,

󰀑󰀅ACL󰀔󰀅

Figure 5a: IEEE 802.11 channel utilization vs. optimalvalue

7.1 Channel utilization level

The Figure 5.a shows the channel utilization level of thestandard 802.11 DCF with respect to the optimal valuescalculated by means of the analytical model defined inSection 4. For a given system configuration, the optimalchannel utilization value has been obtained by computingpopt as explained in Section 4. It is immediate to verify

0-7695-0493-0/00 $10.00 (c) 2000 IEEE8

Proceedings of the 33rd Hawaii International Conference on System Sciences - 2000

0.90.80.7Channel Utilization obtained: AOB vs. optimal values99-th p.ile of MAC access delay (SlotTime units)that the performance of the IEEE 802.11 standardprotocol are negatively (low channel utilization) affectedby high-contention situations. In fact, with the standardprotocol the channel utilization level decreases when thecontention grows; this implies that collisions andretransmissions reduce the amount of user data which ispossible to deliver. Note that this problem occurs for eachpossible value of the mean payload size considered.

The effectiveness of the proposed AOB mechanism isshown in Figure 5.b. This figure shows the channelutilization level achieved by adopting the AOB systemand compares this index with the analytically-definedoptimal utilization levels. The results show that the AOBmechanism leads an IEEE 802.11 network near to itsoptimal behavior at least from the channel utilizationviewpoint. Only a little overhead is introduced when onlyfew stations are active, as we can see in the directcomparison presented in Figure 5.c. Moreover, with theAOB mechanism, the channel utilization remains close toits optimal value even in high-contention situations. Insuch cases, AOB almost doubles the channel utilizationwith respect to the standard protocol.

mechanism, by exploiting the priority effect induced bythe N_A parameter used in the probability oftransmission, increases the stations’ P_T with the increaseof MAC delay. This behavior enhances the fairness andthe queue-emptying behavior of the system.

0.90.80.7Standard, avrg. payload = 2.5 SlotsStandard, avrg. payload = 50 SlotsStandard, avrg. payload = 100 SlotsAOB, avrg. payload = 2.5 SlotsAOB, avrg. payload = 50 SlotsAOB, avrg. payload = 100 SlotsChannel Utilization obtained: Standard vs. AOBChannel Utilization0.60.50.40.30.20.10220406080100120140160180200Number of active stationsFigure 5.c: IEEE 802.11 channel utilization with orwithout the AOB mechanism

600000500000400000300000200000100000099-th percentile of MAC access delay: Standard vs. AOBStandard, avrg. payload = 2.5 SlotsStandard, avrg. payload = 100 SlotsAOB, avrg. payload = 2.5 SlotsAOB, avrg. payload = 100 SlotsChannel Utilization0.60.50.40.30.20.10220AOB, avrg. payload = 2.5 SlotsAOB, avrg. payload = 50 SlotsAOB, avrg. payload = 100 SlotsOPT. value, avrg. payload = 2.5 SlotsOPT. value, avrg. payload = 50 SlotsOPT. value, avrg. payload = 100 Slots406080100120140160180200Number of active stations220406080100120140160180200Number of active stationsFigure 5.b: Channel utilization of the IEEE 802.11protocol with the AOB mechanism vs. optimal value7.2 The 99-th percentile of MAC access delay.

The channel utilization provides information about theefficiency of a MAC protocol in sharing the channelamong several stations. However, to measure the networkQoS from the users’ standpoint other performance indicesmust be used. The delay a user experience to transmit apacket is generally used to estimate the QoS a user canrely upon. In this section we utilize the MAC delay, i.e.the time interval between the first time a packet isscheduled for transmission and the instant at which itssuccessful transmission is completed.

In Figure 6 we report the 99-th percentile of the MACdelay vs. contention level (i.e. number of active stations)for various average sizes of the transmitted frames. Itresults that the AOB mechanism leads to a great reductionof the worst case MAC delay with respect to the standardaccess scheme alone. This gives also a good indication ofthe reduced risk of starvation for transmissions. The AOB

Figure 6: 99-th percentile of MAC delay

By a careful observations of Figures 5c and 6 it is clearthat the N_A priority mechanism is really effective inreducing the tail of the MAC Delay. For example, foraverage payload equal to 100 slots, the ratio between the99-th percentile of the MAC Delay with or without theAOB mechanism is about 6 while the ratio between theaverage MAC Delay is about 2. Note that the averageMAC Delay ratio is exactly the inverse of the channelutilization ratio (see Figure 5c).

Conclusions and future research

In this paper we have proposed and evaluated the AOBmechanism which can be applied on top of an IEEE802.11 network to dynamically control the networkcontention level. This mechanism leads to the optimalchannel utilization level in a fully distributed way. Thenetwork contention level is measured independently byeach stations, by an index simple to estimate (the slot

0-7695-0493-0/00 $10.00 (c) 2000 IEEE9

Proceedings of the 33rd Hawaii International Conference on System Sciences - 2000

utilization), and it has a feedback effect on the stationbehavior. This effect is obtained through the definition ineach station of a probability of transmission which is afunction of the ratio between the measured slot utilizationlevel and an optimal utilization level (i.e., the utilizationlevel which guarantees the maximum channel capacity).The optimal utilization level has been analyticallyderived, and we have shown in the paper that, for a givensystem configuration, it is significantly affected only bythe average size of transmitted frames. Hence toimplement the AOB mechanism we need to estimate boththe slot utilization and the average frame size. Bothestimates can be done with low cost and with nooverheads or further hardware introduced with respect tothe standard protocol.

The AOB mechanism can be used on top of thestandard 802.11 DCF, allowing a quasi-optimal sizing ofthe contention window without paying (as it occurs withthe standard Binary Exponential Backoff mechanismalone) any collision cost. A great improvement in thechannel utilization is thus obtained, which results almostuninfluenced by the contention level in the system. AOBalways maintains the system near to its optimal behavior(from the channel utilization standpoint). From the userstandpoint, the age information introduced in AOB viathe N_A (Number of transmission attempts) parameter,leads to a significant reduction of the 99-th percentile ofthe Access Delay.

Traffic with different priorities’ levels can be alsoeasily introduced in an IEEE 802.11 network with theAOB mechanism. This aspect is currently underinvestigation. Two directions are investigated i) theextension of the probability of transmission with thePrior_Lev parameter, and ii) the use of different ACL(q)functions depending on the size of the frame to transmit.Future research involves the study of the use of theAOB mechanism to introduce power-saving policies(exploiting the reduction of collision cost obtainable withAOB), and the investigation of the AOB advantages inthe transmission of prioritized RTS/CTS messages.

References

[1] Bianchi G., Fratta L., Olivieri M., “Performance

Evaluation and Enhancement of the CSMA/CA MACprotocol for 802.11 Wireless LANs”, proceedings ofPIMRC 1996, 10/1996, Taipei, Taiwan, pp. 392-396.[2] Bononi L., Conti M., Donatiello L., “Design and

Performance Evaluation of a Distributed ContentionControl (DCC) Mechanism for IEEE 802.11 WirelessLocal Area Networks”, Proc. WorkshopWoWMoM’98, MOBICOM’98, Dallas, Texas,October 30 1998.

[3] Cali' F., Conti M., Gregori E., “IEEE 802.11 Wireless

LAN: Capacity Analysis and ProtocolEnhancement”, Proc. INFOCOM'98, San Francisco,CA, March 29 - April 2, 1998, pp. 142-149.

[4] Chen K.C., “Medium Access Control of Wireless

LANs for Mobile Computing”, IEEE Networks, 9-10/1994.

[5] Chhaya H.S., “Performance Evaluation of the IEEE

802.11 MAC Protocol for Wireless LANs”, MasterThesis, Graduate School of Illinois Institute ofTechnology, May 1996.

[6] Conti M., Gregori E., Lenzini L., “Metropolitan Area

Networks”, Springer Verlag Limited Series onTelecommunication Networks and ComputerSystems, November 1996

[7] Crow B.P., “Performance Evaluation of the IEEE

802.11 Wireless Local Area Network Protocol”,Master thesis. University of Arizona, 1996.

[8] IEEE standard for Wireless LAN- Medium Access

Control and Physical Layer Specification, P802.11,November 1997.

[9] Gallagher R.G., “A perspective on multiaccess

channels”, IEEE Trans. Information Theory, vol. IT-31, No.2, 3/1985, pp. 124-142.

[10] Georgiadis L., Papantoni-Kazakos P., “Limited

Feedback Sensing Algorithms for the PacketBroadcast channel”, IEEE Trans. on Info. Theory,Vol IT-31, No.2, 3/1985, pp. 280-294.

[11] Goodman J., Greenberg A.G., Madras N., March P.,

“Stability of Binary Exponential Backoff”, app. inthe Proc. of the 17-th Annual ACM Symp. on Theoryof Comp., Providence, May 1985.

[12] Hammond J.L., O'Reilly P.J.P., Performance

Analysis of Local Computer Networks, Addison-Wesley 1988.

[13] Hastad J., Leighton T., Rogoff B., “Analysis of

Backoff Protocols for Multiple Access Channels”,Siam J. Computing vol. 25, No. 4, 8/1996, pp. 740-774.

[14] D. P. Heyman, M. J. Sobel, \"Stochastic models in

operations research\" Vol. I, McGraw-Hill BookCompany, 1982.

[15] Rivest R.L., “Network Control by Bayesian

Broadcast”, IEEE Trans. on Info. Theory, Vol IT-33,No.3, 5/1987, pp. 323-328.

[16]Sauer C., MacNair E., \"Simulation of Computer

Communication Systems\[17] Stallings W., Local \\& Metropolitan Area Networks,

Fifth Edition, Prentice Hall 1996, pp. 356-383.

[18] W.R.Stevens. TCP/IP Illustrated, Volume 1: The

Protocols, Addison-Wesley, Reading, MA, 1994.[19] Tasaka S., Performance Analysis of Multiple Access

Protocols, MIT Press 1986.

[20] Tsitsiklis J.N., “Analysis on a multiaccess Control

Scheme”, IEEE Trans. on Auto. Contr., Vol AC-32,No. 11, 11/1987, pp. 1017-1020.

[21] Weinmiller J., Woesner H., Ebert J.P., Wolisz A.,

“Analyzing and tuning the Distributed CoordinationFunction in the IEEE 802.11 DFWMAC DraftStandard”, Proc. Int. Workshop on Modeling,MASCOT 96, San Jose, CA.

0-7695-0493-0/00 $10.00 (c) 2000 IEEE10

因篇幅问题不能全部显示,请点此查看更多更全内容

Top