Infocom 2004 Speaker : Bo-Chun Wang

Slides:



Advertisements
Similar presentations
Speaker Fu-Yuan Chuang Advisor Ho-Ting Wu Date
Advertisements

Achieving Quality of Service in Wireless Networks A simulation comparison of MAC layer protocols. CS444N Presentation By: Priyank Garg Rushabh Doshi.
1 A Novel Topology-blind Fair Medium Access Control for Wireless LAN and Ad Hoc Networks Z. Y. Fang and B. Bensaou Computer Science Department Hong Kong.
On Optimizing Backoff Counter Reservation and Classifying Stations for the IEEE Distributed Wireless LANs.
Submission Kai Kang, SHRCWC May 2013 A Mechanism to Provide QoS in IEEE e MAC Date: Authors: Slide 1.
Dynamic Bandwidth Scheduling for QoS Enhancement over IEEE WLAN Sangwook Kang, Sungkwan Kim, Mingan Wang, Sunshin An Korea University European Wireless.
Hamilton Institute TCP over e Doug Leith & Peter Clifford Hamilton Institute, Ireland.
Evaluate IEEE e EDCA Performance Tyler Ngo CMPE 257.
Ncue-csie1 A QoS Guaranteed Multipolling Scheme for Voice Traffic in IEEE Wireless LANs Der-Jiunn Deng 、 Chong-Shuo Fan 、 Chao-Yang Lin Speaker:
QoS in Reference : IEEE e: QoS Provisioning At The MAC Layer & A survey of quality of service in IEEE networks 通工所一 馮士銓.
1 QoS Schemes for IEEE Wireless LAN – An Evaluation by Anders Lindgren, Andreas Almquist and Olov Schelen Presented by Tony Sung, 10 th Feburary.
802.11g & e Presenter : Milk. Outline g  Overview of g  g & b co-exist QoS Limitations of e  Overview of.
QoS of Voice over with NS simulator Prepared by: Yoshpa Benny Shraer Alexander Vainer Albert Instructors: Prof. Reuven Cohen Mr. Itai Dabran.
PLANETE group, INRIA Sophia-Antipolis July 1, 2003 Adaptive Channel allocation for QoS Enhancement in IEEE Wireless LANs Presented by: Mohammad.
1 Dynamic Adaption of DCF and PCF mode of IEEE WLAN Abhishek Goliya Guided By: Prof. Sridhar Iyer Dr. Leena-Chandran Wadia MTech Dissertation.
Providing QoS in Ad Hoc Networks with Distributed Resource Reservation IEEE802.11e and extensions Ulf Körner and Ali Hamidian.
Univ. of Tehran Wireless Ad hoc NetworkingWireless Ad Hoc Networks1Univ. of Tehran1 Special Topics on Wireless Ad-hoc Networks University of Tehran Dept.
Distributed Call Admission Control for VoIP over WLANs based on Channel Load Estimation Paolo Dini, Nicola Baldo, Jaume Nin-Guerrero, Josep Mangues-Bafalluy,
More about channels In b/g, there are 11 channels, starting at 2.412GHz at a spacing of 5MHz. Each channel owns a bandwidth of 22MHz.
IEEE EDCF: a QoS Solution for WLAN Javier del Prado 1, Sunghyun Choi 2 and Sai Shankar 1 1 Philips Research USA - Briarcliff Manor, NY 2 Seoul National.
Performance Analysis of IEEE Distributed Coordination Function (DCF) Author : Giuseppe Bianchi Presented by: 李政修 December 23, 2003.
An Energy Efficient MAC Protocol for Wireless LANs, E.-S. Jung and N.H. Vaidya, INFOCOM 2002, June 2002 吳豐州.
Quality of Service Schemes for IEEE Wireless LANs-An Evaluation 主講人 : 黃政偉.
Design and Implementation of a Reservation-based MAC Protocol for Voice/Data over IEEE Ad-Hoc Wireless Networks Shiann-Tsong Sheu, Tzu-Fang Sheu.
COE-541 LAN / MAN Simulation & Performance Evaluation of CSMA/CA
doc.: IEEE /409r0 Submission March 2002 Mathilde BenvenisteSlide 1 Persistence Factors in EDCF Mathilde Benveniste
Mathilde Benveniste Avaya Labs
Month Year doc: IEEE /xxxxr0
EA C451 (Internetworking Technologies)
Balancing Uplink and Downlink Delay of VoIP Traffic in WLANs
IEEE e Performance Evaluation
Topics in Distributed Wireless Medium Access Control
HCF and EDCF Simulations
UL OFDMA Random Access Control
An Access Mechanism for Periodic Contention-Free Sessions
Wireless Mesh Networks
IEEE : Wireless LANs ALOHA, Slotted ALOHA
AP Service Load: Improved Definition
EDCF TXOP Bursting Simulation Results
A Scheduling Scheme for Level-2 Enhanced PCF MAC Service
CC/RR Performance Evaluation - Revisited
Provision of Multimedia Services in based Networks
MAC Throughput Enhancement by Dynamic dot11RTSThreshold
Speaker:Fu-Yuan Chuang Advisor:Ho-Ting Wu Date:
Simulation for EDCF Enhancement Comparison
Author: Giuseppe Bianchi
EDCA Backoff Rules Mathilde Benveniste
Performance Evaluation of an Integrated-service IEEE Network
QoS Provisioning for IEEE MAC Protocols
EDCF Issues and Suggestions
MDA comments categorization
Zafer Sahinoglu, Ghulam Bhatti, Anil Mehta
HCF Channel Access And Inter-BSS Channel Sharing
HCF medium access rules
MAC improvement using random AIFSN
MAC improvement using random AIFSN
Maximizing MAC Throughputs by Dynamic RTS-CTS Threshold
Neighborhood Capture and OBSS
of the IEEE Distributed Coordination Function
DL MU MIMO Error Handling and Simulation Results
Student : Min-Hua Yang Advisor : Ho-Ting Wu Date :
A Fair Scheduling Scheme for HCF
HCF medium access rules
Enhanced-DCF Wireless MAC Protocol: Some Simulation Results
MAC improvement using random AIFSN
MAC improvement using random AIFSN
Enhanced Backoff Scheme in CSMA/CA for IEEE
Chapter 6 Multiple Radio Access.
Coex Simulation and Analysis
Coex Simulation and Analysis
Presentation transcript:

Infocom 2004 Speaker : Bo-Chun Wang Protection and Guarantee for Voice and Video Traffic in IEEE 802.11e Wireless LANs Infocom 2004 Speaker : Bo-Chun Wang 2019/8/4

Outline Introduction 802.11e EDCF First-level protection and guarantee Second-level protection and guarantee Performance evaluation Conclusion 2019/8/4

Introduction The authors propose a two-level protection and guarantee mechanism for voice and video traffic. At the first-level protection, the existing voice and video flows are protected from the new voice and video flows. At the second-level protection the existing voice and video flows are protected from the best-effort data traffic. 2019/8/4

802.11e EDCF IEEE 802.11e provides a channel access function, called HCF to support applications with QoS requirements. centrally controlled channel access schemes. contention-based channel access schemes. ( Enhanced DCF ) A transmission opportunity (TXOP) is a time period when a station has the right to initiate transmissions onto the wireless medium. A station cannot transmit a frame that extends beyond a TXOP. 2019/8/4

802.11e EDCF (contd.) Differentiated ACs are achieved by differentiating the arbitration inter-frame space (AIFS), the initial window size, and the maximum window size. For 0 ≤ i < j ≤ 3 CWmin [ i ] ≥ CWmin [ j ] , CWmax [ i ] ≥ CWmax [ j ], AIFS [ i ] ≥ AIFS [ j ], and at least one of above inequalities must be “not equal to”. 2019/8/4

Procedure at QAP The QoS Parameter Set Element (QPSE) includes CWmin[i], CWmax[i], AIFS[i], for (i=0,…,3), TXOPBudget[i] and SurplusFactor[i], for (i=1,2,3). These are global variables in the sense that they are maintained by QAP and transmitted to QSTAs via beacons. TXOPBudget [ i ] = Max (ATL[ i ] -TxTime[ i ] x SurplusFactor[ i ] , 0) where ATL[i] is for the maximum amount of time that may be used for transmissions of AC i, per beacon interval. 2019/8/4

Procedure at QAP (contd.) QAP shall maintain a set of counters TxTime[i] shall be set to zero immediately following transmission of a beacon. For each data frame transmission (either uplink or downlink), the QAP shall add the time to the TxTime counter corresponding to the AC of that frame. the frame transmission time and all overhead involved such as SIFS and ACK 2019/8/4

Procedure at Each Station When the transmission budget for an AC is depleted, new QSTAs cannot gain transmission time, While existing QSTAs cannot increase the transmission time per beacon interval, which they are already utilizing. Accordingly, this mechanism protects existing flows. 2019/8/4

Procedure at Each Station (contd.) Each QSTA has to maintain the following local variables for each AC: TxUsed[i], TxSuccess[i], TxLimit[i], TxRemainder[i], and TxMemory[i]. TxUsed[i] counts the amount of time occupied on-air by transmissions TxSuccess[i] counts for the transmission time for successful transmissions. A station shall not transmit a data frame if doing so would result in the value in TxUsed[i] exceeding the value in TxLimit[i] 2019/8/4

Procedure at Each Station (contd.) If the QSTA is prevented from sending a frame for above reason TxRemainder[i] = TxLimit[i] – TxUsed[i]; Otherwise, TxRemainder[i] = 0. TxMemory[i] ‘memorizes’ the amount of resource that AC i of this station utilized during a beacon interval. 2019/8/4

Procedure at Each Station (contd.) At each target beacon transmission time, the TxMemory, TxLimit and TxSuccess variables are updated according to the following procedure: If TXOPBudget[i] = 0, Both TxMemory[i] and TxRemainder[i] shall be set to zero for new QSTAs which start transmission with this AC in the next beacon interval. All other QSTAs’ TxMemory[i] remains unchanged; 2019/8/4

Procedure at Each Station (contd.) Else if the TXOPBudget[i] > 0, For new QSTAs, an initial value for TxMemory[i] could be a number between 0 and TXOPBudget[i] / SurplusFactor[i]. All other QSTAs’ TxMemory[i] are updated according to the following procedure: TxMemory[i] = f x TxMemory[i] + (1-f) x (TxSuccess[i] x SurplusFactor[i] + TXOPBudget[i]); TxSuccess[i] = 0; TxLimit[i] = TxMemory[i] + TxRemainder[i]; 2019/8/4

Distributed Admission Control When the transmission budget for an AC becomes zero Its TxLimit[i] will become zero for new STAs, The existing QSTAs’ TxLimit[i] remains unchanged When transmission budget is larger than zero, both TxMemory[i] and TxLimit[i] need be adjusted periodically. TxMemory ‘memorizes’ the amount of time which a specific AC of the QSTA has been able to utilize per beacon interval. TxMemory[i] = f x TxMemory[i] + (1-f) x (TxSuccess[i] x SurplusFactor[i] + TXOPBudget[i] ); 2019/8/4

Enhancement 1-- ETD Enhancement with required Throughput and/or Delays (ETD) A tried-and-known method. Observe several beacon intervals to determine the information whether the currently-available capacity can accept a new flow Assume that the required Tmin and/or the Dmax, both per AC, are passed from the higher layer. 2019/8/4

Enhancement 1-- ETD (contd.) At each of the very first k beacon intervals for a newly-started flow, a new flow measures its Throughput[j] and Delay[j] of the j-th measurement. Then, the additional procedure works as follows: Where 0 < 1 <αand β >= 1, then this flow rejects itself. 2019/8/4

Enhancement 2 -- ENB Enhancement with a Non-zero Budget value (ENB) When the budget is below some threshold, new flows are not allowed to enter. For a new flow, let Required_Budget[i] denote the required budget for a new flow, and let φ (< 1) denote a fraction. 2019/8/4

Second-level protection and guarantee The goal is to control the collision probability independent of the number of active stations for data transmissions. The approach is to dynamically control data traffic’s parameters ( AIFS[0], CWmin[0], and CWmax[0]) based on data traffic load. 2019/8/4

Second-level protection and guarantee (contd.) Fast-backoff Let σ : window-increasing factor achieves a larger window size much quicker Dynamically adjusting parameters when fail when a fame reaches the retry limit and is dropped, 2019/8/4

Second-level protection and guarantee (contd.) Dynamically adjusting parameters when consecutive successful: when a station successfully transmits m consecutive frames, We refer to this approach as the Fast-Backoff (BF) plus Dynamic Adjustment when Fail or Successful (DAFS): BF+DAFS. 2019/8/4

Performance Evaluation Three traffic types : voice (AC 3), video (AC 2), and data (AC 0). AIFS[3] = 25µs; AIFS[2] =25µs; AIFS[0] = 34µs CWmin[3]=16; CWmin[2] = 32;CWmin[0] = 256 CWmax[3]= 256;CWmax[2]= 2048;CWmax[0]= 51200 beacon interval is 100ms; damping factor f is 0.9; for i = 2, 3, SurplusFactor[i] is 1.1, and the initial value of TxMemory[i] is 0.8 x TXOPBudget[i] / SurplusFactor[i]. 2019/8/4

Performance Evaluation (contd.) The queue size for each AC per station is set to 30 frames. Each voice flow is 0.0832Mbps Each video flow is 4.86Mbps Data traffic Exponential distribution with a mean inter-arrival time 12ms and a fixed payload size of 1500 bytes. adopt IEEE 802.11a 2019/8/4

Video traffic only with and without DAC ATL[2] is 0.7 x (beacon interval) Initially, there is only one video flow. For every 3s, a new video flow is added. 2019/8/4

Video traffic only with and without DAC(contd.) 2019/8/4

Video traffic only with and without DAC(contd.) 2019/8/4

Video traffic only with and without DAC(contd.) 2019/8/4

Voice and video traffic without data traffic DAC v.s DAC+ETD+ENB For every 10s, a new voice flow and a new video flow are added. In ETD, only consider required throughput α=80%. In ENB φ x Required_Budget[3] = 1500μs (voice) φ x Required_Budget[2] = 8500μs (video). 2019/8/4

Voice and video traffic without data traffic(contd.) 2019/8/4

Voice, video and data traffic Three schemes DAC DAC+ETD+ENB DAC+ETD+ENB+BF+DAFS θ = 1.5, ψ = 1, m = 1 , and For every 10 seconds, a new voice flow, anew video flow, and a new data station are added. 2019/8/4

Voice, video and data traffic(contd.) 2019/8/4

Voice, video and data traffic(contd.) 2019/8/4

Voice, video and data traffic(contd.) 2019/8/4

Voice, video and data traffic(contd.) 2019/8/4

Conclusion In this paper, the authors propose a two-level protection and guarantee mechanism for voice and video for EDCF of the IEEE 802.11e WLANs. Extensive simulations indicate that the proposed mechanisms are very effective in terms of protection and guarantee DAC+ETD+ENB+BF+DAFS is found to the best approach. 2019/8/4