Author: Giuseppe Bianchi

Slides:



Advertisements
Similar presentations
Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
Advertisements

Contents IEEE MAC layer operation Basic CSMA/CA operation
Modeling and Throughput Analysis for SMAC Ou Yang
Explicit and Implicit Pipelining in Wireless MAC Nitin Vaidya University of Illinois at Urbana-Champaign Joint work with Xue Yang, UIUC.
1 «Performance Analysis for a New Medium Access Control Protocol in Wireless LANs» By YOUNGGOO KWON and YUGUANG FANG Presentation by Ampatzis Efthimios.
1 A Novel Topology-blind Fair Medium Access Control for Wireless LAN and Ad Hoc Networks Z. Y. Fang and B. Bensaou Computer Science Department Hong Kong.
On Optimizing Backoff Counter Reservation and Classifying Stations for the IEEE Distributed Wireless LANs.
Module C- Part 1 WLAN Performance Aspects
Dynamic Tuning of the IEEE Protocol to Achieve a Theoretical Throughput Limit Frederico Calì, Marco Conti, and Enrico Gregori IEEE/ACM TRANSACTIONS.
Network Technology CSE Network Technology CSE3020 Week 9.
Evaluate IEEE e EDCA Performance Tyler Ngo CMPE 257.
Distributed Priority Scheduling and Medium Access in Ad Hoc Networks Distributed Priority Scheduling and Medium Access in Ad Hoc Networks Vikram Kanodia.
Does the IEEE MAC Protocol Work Well in Multihop Wireless Ad Hoc Networks? Shugong Xu Tark Saadawi June, 2001 IEEE Communications Magazine (Adapted.
IEEE Wireless LAN: Capacity Analysis and Protocol Enhancement F. Cali, M. Conti, E. Gregori IEEE Wireless LAN: Capacity Analysis and Protocol.
On the Performance Behavior of IEEE Distributed Coordination Function M.K.Sidiropoulos, J.S.Vardakas and M.D.Logothetis Wire Communications Laboratory,
Delay Analysis of IEEE in Single-Hop Networks Marcel M. Carvalho, J.J.Garcia-Luna-Aceves.
A Multichain Backoff Mechanism for IEEE WLANs Alkesh Patel & Hemant Patel ECE 695 – Leading Discussion By : Shiang- Rung Ye and Yu-Chee Tseng.
Opersating Mode DCF: distributed coordination function
PLANETE group, INRIA Sophia-Antipolis July 1, 2003 Adaptive Channel allocation for QoS Enhancement in IEEE Wireless LANs Presented by: Mohammad.
A Virtual Collision Mechanism for IEEE DCF
2014 YU-ANTL Lab Seminar Performance Analysis of the IEEE Distributed Coordination Function Giuseppe Bianchi April 12, 2014 Yashashree.
IEEE Journal on Selected Areas in Communications
1 Dynamic Adaption of DCF and PCF mode of IEEE WLAN Abhishek Goliya Guided By: Prof. Sridhar Iyer Dr. Leena-Chandran Wadia MTech Dissertation.
Ethernet. Problem In an Ethernet, suppose there are three stations very close to each other, A, B and C. Suppose at time 0, all of them have a frame to.
Quality of Service Support in Wireless Networks
Chapter 6 Multiple Radio Access
Angular MAC: a framework for directional antennas in wireless mesh networks Erdem Ulukan and Özgür Gürbüz Faculty of Engineering and Natural Sciences,
Performance Analysis of IEEE Distributed Coordination Function (DCF) Author : Giuseppe Bianchi Presented by: 李政修 December 23, 2003.
IEEE WLAN.
Access Delay Distribution Estimation in Networks Avideh Zakhor Joint work with: E. Haghani and M. Krishnan.
Department of Information Engineering University of Padova, ITALY Mathematical Analysis of IEEE Energy Efficiency. A note on the use of these ppt.
Wi-Fi. Basic structure: – Stations plus an access point – Stations talk to the access point, then to outside – Access point talks to stations – Stations.
WLAN. Networks: Wireless LANs2 Distribute Coordination Function (DCF) Distributed access protocol Contention-Based Uses CSMA/ CA – Uses both physical.
6 November 2002 MAC protocol 1 Optimization of the Efficiency of MAC Protocols for WLANs Raffaele Bruno MobileMAN kickoff meeting.
Explicit and Implicit Pipelining in Wireless MAC Nitin Vaidya University of Illinois at Urbana-Champaign Joint work with Xue Yang, UIUC.
Medium Access Control in Wireless networks
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
Distributed-Queue Access for Wireless Ad Hoc Networks Authors: V. Baiamonte, C. Casetti, C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di.
COE-541 LAN / MAN Simulation & Performance Evaluation of CSMA/CA
Tel Hai Academic College Department of Computer Science Prof. Reuven Aviv Markov Models for Access Control in Computer Networks Resource: Fayez Gebali,
IEEE MAC Ikjun Yeom. Computer Network Physical Layer: network card, wire/wireless Datalink Layer: data delivery in a link Network Layer: addressing,
IEEE Wireless Local Area Network (WLAN)
Wireless MAC.
Medium Access Control (MAC)
EA C451 (Internetworking Technologies)
David S. L. Wei Joint Work with Alex Chia-Chun Hsu and C.-C. Jay Kuo
Medium Access Control MAC protocols: design goals, challenges,
CSE 5345 – Fundamentals of Wireless Networks
Distributed Medium Access Control in Wireless Networks
Topics in Distributed Wireless Medium Access Control
Mobile and Ad hoc Networks
Idle sense.
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So and Nitin Vaidya Modified and Presented.
IEEE : Wireless LANs ALOHA, Slotted ALOHA
Using Dynamic PCF to improve the capacity of VoIP traffic in IEEE 802
Presented by Hoang Nguyen
He Xiaoben Further study of multi-hop communications - modeling the hidden terminal problem He Xiaoben
Performance Evaluation of an Integrated-service IEEE Network
QoS Provisioning for IEEE MAC Protocols
MAC continued.
Wireless LAN Simulation IEEE MAC Protocol
Zafer Sahinoglu, Ghulam Bhatti, Anil Mehta
Enhanced IEEE by Integrating Multiuser Dynamic OFDMA
of the IEEE Distributed Coordination Function
DL MU MIMO Error Handling and Simulation Results
The System Issues of Rate Adaptation
Enhanced Backoff Scheme in CSMA/CA for IEEE
Chapter 6 Multiple Radio Access.
Infocom 2004 Speaker : Bo-Chun Wang
Satellite Packet Communications A UNIT -V Satellite Packet Communications.
Presentation transcript:

Author: Giuseppe Bianchi EEL6935: Wireless Ad Hoc Networks Performance Analysis of IEEE802.11 Distributed Coordination Function (DCF) -- JSAC’2000 Author: Giuseppe Bianchi Presented by: Rongsheng Huang

Outline Overview of IEEE 802.11 DCF Mathematical model EEL6935: Wireless Ad Hoc Networks Outline Overview of IEEE 802.11 DCF Mathematical model Notations and the main idea One step transition probabilities Bi-dimensional Markov Chain Stationary distribution Maximum throughput Performance evaluation of DCF Concluding remarks

EEL6935: Wireless Ad Hoc Networks Overview of IEEE 802.11 MAC and PHY layers specifications for wireless LANs MAC Protocols Fundamental: Distributed Coordination Function (DCF) -- CSMA/CA based Binary Exponential Backoff rules Optional: Point Coordination Function (PCF)

Overview of IEEE 802.11 DCF Two access techniques EEL6935: Wireless Ad Hoc Networks Overview of IEEE 802.11 DCF Two access techniques Basic mechanism: 2 way handshaking RTS/CTS mechanism: 4 way handshaking RTS DATA CTS DESt Source Source Dest DATA ACK ACK

Example of RTS/CTS Access Scheme EEL6935: Wireless Ad Hoc Networks Example of RTS/CTS Access Scheme CSMA/CA based CSMA: listen at least DIFS before talk CA: defer transmission for random back-off time after DIFS SIFS BO=3 (set) BO=0 BO=5 (set) A BO=15 (set) DIFS RTS DATA DIFS RTS DIFS collision CTS ACK B BO=8 (set) BO=5(resume) BO=10 (set) BO=5 (suspend) BUSY DIFS NAV (RTS) DIFS RTS DIFS Others NAV(CTS)

Backoff procedure—BEB algorithm EEL6935: Wireless Ad Hoc Networks Overview of IEEE 802.11 DCF Backoff procedure—BEB algorithm CW Backoff counter: Initial: uni~[0,CW-1] Non zero: decremented for each idle slot Zero: transmit CWmax c c s s c c c CWmin c c C c s t

Analytical Model to Evaluate DCF EEL6935: Wireless Ad Hoc Networks Analytical Model to Evaluate DCF Goal: saturation throughput & Maximum achievable saturation throughput: Saturation throughput: given all the system parameters, assume each station always has packets to send, the stable throughput of the whole system Maximum throughput: if the system parameters can be modified, the theoretical maximum saturation throughput achievable. Basic assumptions Constant & independent collision probability for each transmitted packet p (suppose that the backoff mechanism can adjust the p to a constant value) Ideal channel condition (no hidden terminals and capture) Fixed number of stations n operated under overload (saturation condition)

Idea of Applying Markov Chain EEL6935: Wireless Ad Hoc Networks Idea of Applying Markov Chain Transmission probability and conditional collision probability p are needed. Normalized system throughput S with n stations can be derived. Markov chain’s property: state transition diagram -> probability of each state 2-dimensional Markovian chain

Bi-dimensional Markov Chain model EEL6935: Wireless Ad Hoc Networks Bi-dimensional Markov Chain model Behavior of a single station Notations b(t): backoff time counter at time t, stochastic process. s(t): backoff stage at time t, stochastic process. Time scale: Discrete and integer, t, beginning of a slot time, when backoff time counter decrements or regenerated [t, t+1], interval between 2 consecutive slot time, can be variable length Makovian State: B(t) ={s(t), b(t)} CW_i = 2^i*CW_min m: maximum backoff stage, CW_max = 2^m*CW_min p: prob.of each transmitted packet being collided n: number of stations

One step transition probabilities (1) EEL6935: Wireless Ad Hoc Networks One step transition probabilities (1) 1) P{i,k|i,k+1}=1, k : [0,Wi-2], i : [0,m] At beginning of t Backoff counter not reach zero, no transmission Channel sensed idle for 1 mini-slot till t+1 At beginning of t+1 Backoff counter decremented by 1 1 i , k i , k+1

One step transition probabilities (2) EEL6935: Wireless Ad Hoc Networks One step transition probabilities (2) P{0,k|i,0}=(1-p)/W_0, k : [0,W_0-1], i : [0,m] At beginning of t Backoff counter reaches zero, successful transmitted [t,t+1] At beginning of t+1 Contention window reset to CW_min (backoff stage = 0) Backoff counter chosen randomly in [0,W_0-1] P{i+1,k|i,0}= p/W_(i+1), k : [0,W_(i+1)-1], i : [1,m-1] Backoff counter reaches zero, transmit in [t,t+1], collision Contention window < CW_max contention window doubled Backoff counter chosen randomly in [0,W_(i+1)-1]

Illustration of the Backoff After Collison EEL6935: Wireless Ad Hoc Networks Illustration of the Backoff After Collison

EEL6935: Wireless Ad Hoc Networks State transits upon backoff counter reach zero (Contention Window <CWmax) Tx Success 0 , 0 0 , 1 … 0 , W0-2 0, W0-1 . (1-p)/W0 i , 0 p/Wi+1 i+1, 0 i+1 , 1 i+1,Wi+1-2 i+1,Wi+1-1 . . . collision

One step transition probabilities (3) EEL6935: Wireless Ad Hoc Networks One step transition probabilities (3) P{m,k|i,0}= p/W_m, k : [0,W_m-1], i = m At beginning of t Backoff counter reaches zero, transmit in [t,t+1], collision Contention Window = CW_max At beginning of t+1 Contention Window remains at CW_max Backoff time counter chosen randomly in [0,W_m-1]

EEL6935: Wireless Ad Hoc Networks State transits upon backoff counter reach zero (Contention Window = CWmax) 0 , 0 0 , 1 … 0 , W0-2 0, W0-1 . (1-p)/W0 m , 0 m , 1 m , Wm-2 m , Wm-1 … p/Wm

Bi-dimensional Markov Chain model EEL6935: Wireless Ad Hoc Networks Bi-dimensional Markov Chain model

Bi-dimensional Markov Chain model EEL6935: Wireless Ad Hoc Networks Bi-dimensional Markov Chain model

Result from Markovian Chain Model (1) EEL6935: Wireless Ad Hoc Networks Result from Markovian Chain Model (1)

Result from Markovian Chain Model (2) EEL6935: Wireless Ad Hoc Networks Result from Markovian Chain Model (2)

Result from Markovian Chain Model (3) EEL6935: Wireless Ad Hoc Networks Result from Markovian Chain Model (3) and

Throughput Analysis Based on Model EEL6935: Wireless Ad Hoc Networks Throughput Analysis Based on Model S := Fraction of Time channel is used to successfully transmit payload bits As an outside observer, see a random slot and observe what is happening Probability, Exactly 1 TX Occurring on the channel is successful given someone transmits Hybrid Scheme also possible. Packet Length may vary and throughput may relate itself to packet size distribution mean Ts, Tc, s,P are constant for model verification constant, and determined by standard Maximizing throughput over probabilities which are in terms of t, we get S is max when Remember Slotted Aloha Stabilization ? tao depends on m and W and can be changed adaptively But m and W fixed because of Physical Layer Standard Result – S can be significantly lower than maximum

EEL6935: Wireless Ad Hoc Networks IMPORTANT RESULTS For Sufficiently Large n, Smax is practically independent of no. of stations in wireless network Maximum throughput achievable by BAS is very close to RTS/CTS mechanism RTS/CTS scheme throughput is less insensitive to transmission probability t RTS/CTS scheme is network size independent for W <= 64 values. Basic Mechanism throughput increases but significantly decreases with network size Key to these results – RTS/CTS mechanism reduces the time spent during a collision, and it becomes more effective than Basic Access when W and n increases the collision probability RTS/CTS even more effective when packet length are longer

EEL6935: Wireless Ad Hoc Networks Model Validation

Remarks Classic model for WLAN with good approximation EEL6935: Wireless Ad Hoc Networks Remarks Classic model for WLAN with good approximation Delay performance can be derived Only one-hop is considered. Only saturation is considered. A small mistake

EEL6935: Wireless Ad Hoc Networks A Small Mistake Found H. Wu, Y. Peng, K. Long, S. Cheng, and J. Ma, Performance of reliable transport protocol over IEEE 802.11 wireless LAN: analysis and enhancement,. in Proc. IEEE INFOCOM'02, New York, June 2002 Limit of retransmission m and maximum stage of backoff counter m’: [ m {5 or 7}, m’ {5} ]

EEL6935: Wireless Ad Hoc Networks Modified Model

Validation of the Modified Model EEL6935: Wireless Ad Hoc Networks Validation of the Modified Model

EEL6935: Wireless Ad Hoc Networks Thank you