Presentation is loading. Please wait.

Presentation is loading. Please wait.

802.11e EDCA WLN 2005 Sydney, Nov. 15 2005 Paal E. Engelstad (presenter) UniK / Telenor R&D Olav N. Østerbø Telenor R&D

Similar presentations


Presentation on theme: "802.11e EDCA WLN 2005 Sydney, Nov. 15 2005 Paal E. Engelstad (presenter) UniK / Telenor R&D Olav N. Østerbø Telenor R&D"— Presentation transcript:

1 802.11e EDCA WLN 2005 Sydney, Nov. 15 2005 Paal E. Engelstad (presenter) UniK / Telenor R&D Olav N. Østerbø Telenor R&D http://www.unik.no/~paalee/research.htm

2 Agenda 1.”Delay and Throughput Analysis of IEEE 802.11e EDCA with Starvation Prediction” –Non-saturation analysis –AIFS differentiation and Starvation prediction –Z-tranform of the delay –Virtual collision handling 2.”Differentiation of Downlink 802.11e Traffic in the Virtual Collision Handler” –Downlink UDP scenario –Virtual collision handling (demonstration) –Closed-form solution to this scenario Follow-up work –The queueing delay(WONS 2006 - Accepted) –The full delay distribution (IPCCC 2006 - Pending)

3 Recap EDCA: 4 Access Categories (AC) –AC[0] (AC_BK) –AC[1] (AC_BE) –AC[2] (AC_VI) –AC[3] (AC_VO) 4 queues on each station... and Virtual Collision Handling (VCH) between the queues

4 EDCA channel Access Differentiation parameters: –Contention Windows: –Arbitration IFS (AIFS): –(TXOP lengths)

5 Markov Chain The utilization factor ρ balances between saturation and non- saturation Collision prob.: p Other parameters: –p*, q and q* Drop probability: Transmission in (i,j,0) states, with distribution:

6 ... some calculations... The transmission probablity From chain regularities...... and after normalization:

7 The transmission probability Before solving the equations, we first need to determine the remaining parameters –ρ, p, p*, q and q* Non-Saturation part

8 The collision probability The probability of a busy slot: The collision probability of AC[i]: –(Here: Without Virtual Collisions) The probability of blocking of the countdown, p*, is distinguished from the collision probablity, p. –Gives much flexibility p* = 0 (similar to the original Bianchi model) p* = p (similar to the model of Xiao / Ziouva) –In this paper, we propose to incorporate AIFS differentiation into p*...

9 AIFS Differentiation We “scale down” the collision probability during countdown, depending on the AIFS setting: Starvation is thus predicted to occur when: where:

10 Determining the remaining parameters: The pdf of the length of a slot: Thus, assuming Poisson traffic: And from the general result regarding the utilization factor, ρ:

11 Throughput We have shown that this expression is valid also under non-saturation

12 Preliminary Throughput Validations: Setup I 802.11b with long preamble and without RTS/CTS Poisson distributed traffic – 1024B packets

13 Preliminary Throughput Validations: Setup II We use the recommended (default) parameter settings of 802.11e EDCA: Simulations: –ns-2 –with TKN implementation of 802.11e from TUB Numerical computations: –Mathematica AC[3]AC[2]AC[1]AC[0] AIFSN2237 CWmin3715 CWmax15311023 Retry Limit (long/short) 7/4

14 Preliminary Throughput Validation: The non-saturation analysis

15 Preliminary Throughput Validation: The starvation predictions

16 Fixed number of nodes (n=5)

17 The delay analysis The major contribution of this paper is probably that the Medium Access Delay (”MAC delay”) is expressed in terms of the z-transform...

18 z-tranform of the MAC delay s=1 s=0

19 z-transform of the medium access delay (cntd.) The mean medium access delay is found by derivation of the z-transform and by letting z=1 Obtain a delay expression that can easily be verified directly...

20 Mean Medium Access Delay I

21 Mean Medium Access Delay II... and the mean medium access delay is finally found as:

22 Validation of Mean delay (n=5)

23 Conclusion - 1 An analytical model is found that also describes non- saturation conditions –We propose a new model, leading to a relatively simple set of equations AIFS differentiation is incorporated into the model –We propose a new approach –Starvation prediction follows Virtual collision handling is incorporated –Demonstrated in our downlink work (next paper) Most importantly: The z-transform of the medium access delay was found Our analytical findings seem to be supported by simulation results

24 The z-transform is an important contribution......because it encompasses a full description of the delay in the system: 1.The medium access delay –Given by the first order moment –Demonstrated in the presented paper 2.The queuing delay –Given by the second order moment 3.Variation of the queuing delay –Given by the third order moment 4.The full delay distribution –The transform can be inverted numerically 5.All desirable delay percentiles follow... and so forth....

25 Agenda 1.”Delay and Throughput Analysis of IEEE 802.11e EDCA with Starvation Prediction” –Non-saturation analysis –AIFS differentiation and Starvation prediction –Z-tranform of the delay –Virtual collision handling 2.”Differentiation of Downlink 802.11e Traffic in the Virtual Collision Handler” –Downlink UDP scenario –Virtual collision handling (demonstration) –Closed-form solution to this scenario Follow-up work –The queueing delay(WONS 2006 - Accepted) –The full delay distribution (IPCCC 2006 - Pending) A small side-step:

26 Queueing Delay Assuming a M/G/1 system the queueing delay is expressed as: The second order of the delay is found by double derivation of the z-transform and by letting z=1:

27 Double derivation of the z-transform

28 Example of queueing delay results

29 The full delay distribution The z-transform of the delay For the tail probabilities then: and can be expressed by the Cauchy contour integral:

30 Approximation: Trapezodial Rule The Cauchy contour integral can be approximated using the trapezodial rule with stepsize Hence: It can be shown that the accuracy is bounded by:

31 Same method to find distribution of the queueing delay Pollaczek-Khinchin formula (discrete time): Thus, the tail probability of the –Queueing Delay: –Total Delay:

32 Distribution of Medium Access Delay

33 Distribution of Queueing Delay

34 Conclusion - 2 The z-transform of the delay was found –Derived the mean medium access delay (as before) It is so important because, it can be used to find: –the mean medium access delay, its variation, etc... –the mean queueing delay, its variation and so forth –the full delay distribution –all desirable delay percentiles Our analytical findings seem to be supported by simulation results

35 Agenda 1.”Delay and Throughput Analysis of IEEE 802.11e EDCA with Starvation Prediction” –Non-saturation analysis –AIFS differentiation and Starvation prediction –Z-tranform of the delay –Virtual collision handling 2.”Differentiation of Downlink 802.11e Traffic in the Virtual Collision Handler” –Downlink UDP scenario –Virtual collision handling (demonstration) –Closed-form solution to this scenario Follow-up work –The queueing delay(WONS 2006 - Accepted) –The full delay distribution (IPCCC 2006 - Pending)

36 Background: Downlink Analysis Unlike most related work, we also put focus on the downlink scenario

37 Assumption All traffic are downlink! –E.g. downlink video streaming over UDP The AP has full control over the wireless medium Collision primarily happens in the virtual collision handler

38 Core idea of Downlink Analysis Treat the Virtual Collision Handler as a ”virtual channel” and disregard the wireless medium as a channel Re-use the Markov model –Introduce Virtual Collision Handling into the model –Set the number of nodes to 1

39 Virtual Collision Handling – 1 node The probability of a busy slot: The collision probability of AC[i]: –Without Virtual Collisions: –With Virtual Collisions:

40 Throughput – 1 node Generally: But for 1 node: Using the above, we have – quite interestingly - proved by induction that: Hence, the throughput becomes:

41 Validations

42 Conclusion - 3 We have shown that the Bianchi model can be extended to also cover downlink traffic –All collisions in the virtual collision handler of the AP. It is treated as a virtual channel. –Need a model that incoporates virtual collision handling. –Set n=1 The approach was validated, and numerical results matched well with simulations.

43 Closed-form solution under saturation conditions We show that the downlink model can be expressed ON CLOSED FORM......under saturation conditions:

44 Recursive solution method Start with the highest priority ACs: For lower priority ACs –etc.... Use,, or (starvation)

45 Example of solution for the second highest priority AC Note that it is expressed in terms of the transmission probability of the highest priority AC, AC[3]. –This is why a ”recursive” solution method is required.

46 Closed form delay expression Using these expressions, the delay can be found on closed form, e.g. for AC[3]:

47 Validation Scenarios

48 Throughput validations of closed form solution (Scenario 1)

49 Throughput validations of closed form solution (Scenario 2)

50 Validations with other scenarios

51 Conclusion - 4 We have also derived a closed form solution for the downlink scenario Analytical results were validated and matched well with simulation results

52 Backup slides...

53 The effect of AIFS differentiation during countdown Packet Slots that AC[3] can use for countdown Packet Slots that AC[0] can use for countdown A higher AIFS value translates into a lower average countdown rate AC[3]’s perspective: AC[0]’s perspective:

54 Medium Access Starvation Packet Slots that AC[3] can use for countdown Packet No slots for AC[0]’s countdown AIFS differentiation leads to starvation at high traffic loads AC[3]’s perspective: AC[0]’s perspective: Packet

55 How to incorporate this effect into the analytical model? AIFSN[0] Packet A i = AIFSN[i] - AIFSN[0] (i.e. defined such that always A 0 = 0) Packet A i blocked slots unblocked empty slots one busy slot


Download ppt "802.11e EDCA WLN 2005 Sydney, Nov. 15 2005 Paal E. Engelstad (presenter) UniK / Telenor R&D Olav N. Østerbø Telenor R&D"

Similar presentations


Ads by Google