Contention Window Optimization for IEEE 802.11 DCF Access Control D. J. Deng, C. H. Ke, H. H. Chen, and Y. M. Huang IEEE Transaction on Wireless Communication.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Doc.: IEEE /080r1 Submission January 2001 Jie Liang, Texas InstrumentsSlide 1 Jie Liang Texas Instruments Incorporated TI Blvd. Dallas,
Medium Access Issues David Holmer
Contents IEEE MAC layer operation Basic CSMA/CA operation
Lecture 5: IEEE Wireless LANs (Cont.). Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN a.
Achieving Quality of Service in Wireless Networks A simulation comparison of MAC layer protocols. CS444N Presentation By: Priyank Garg Rushabh Doshi.
1 «Performance Analysis for a New Medium Access Control Protocol in Wireless LANs» By YOUNGGOO KWON and YUGUANG FANG Presentation by Ampatzis Efthimios.
– Wireless PHY and MAC Stallings Types of Infrared FHSS (frequency hopping spread spectrum) DSSS (direct sequence.
1 A Novel Topology-blind Fair Medium Access Control for Wireless LAN and Ad Hoc Networks Z. Y. Fang and B. Bensaou Computer Science Department Hong Kong.
© Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS591 – Wireless & Network Security.
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
Presented by Scott Kristjanson CMPT-820 Multimedia Systems Instructor: Dr. Mohamed Hefeeda 1 Cross-Layer Wireless Multimedia.
Jesús Alonso-Zárate, Elli Kartsakli, Luis Alonso, and Christos Verikoukis May 2010, Cape Town, South Africa, ICC 2010 Coexistence of a Novel MAC Protocol.
Module C- Part 1 WLAN Performance Aspects
Dynamic Tuning of the IEEE Protocol to Achieve a Theoretical Throughput Limit Frederico Calì, Marco Conti, and Enrico Gregori IEEE/ACM TRANSACTIONS.
Coexistence Mechanism Using Dynamic Fragmentation for Interference Mitigation between Wi-Fi and Bluetooth David S. L. Wei Joint Work with Alex Chia-Chun.
Network Technology CSE Network Technology CSE3020 Week 9.
Slow Start Backoff Algorithm for Wireless Ad Hoc Networks Der-Jiunn Deng Department of Computer Science and Information Engineering National Changhua University.
Distributed Priority Scheduling and Medium Access in Ad Hoc Networks Distributed Priority Scheduling and Medium Access in Ad Hoc Networks Vikram Kanodia.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
IEEE Wireless LAN: Capacity Analysis and Protocol Enhancement F. Cali, M. Conti, E. Gregori IEEE Wireless LAN: Capacity Analysis and Protocol.
MAC Reliable Broadcast in Ad Hoc Networks Ken Tang, Mario Gerla University of California, Los Angeles (ktang,
Medium Access Control Protocols Using Directional Antennas in Ad Hoc Networks CIS 888 Prof. Anish Arora The Ohio State University.
Wireless LAN Simulation - IEEE MAC Protocol
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray, Jeffrey B. Carruthers, and David Starobinski Department of Electrical and Computer Engineering.
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
Opersating Mode DCF: distributed coordination function
PLANETE group, INRIA Sophia-Antipolis July 1, 2003 Adaptive Channel allocation for QoS Enhancement in IEEE Wireless LANs Presented by: Mohammad.
MAC layer Taekyoung Kwon. Media access in wireless - start with IEEE In wired link, –Carrier Sense Multiple Access with Collision Detection –send.
A Virtual Collision Mechanism for IEEE DCF
2014 YU-ANTL Lab Seminar Performance Analysis of the IEEE Distributed Coordination Function Giuseppe Bianchi April 12, 2014 Yashashree.
IEEE Project started by IEEE for setting standard for LAN. This project started in (1980, February), Name given to project is year and month.
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
1 Dynamic Adaption of DCF and PCF mode of IEEE WLAN Abhishek Goliya Guided By: Prof. Sridhar Iyer Dr. Leena-Chandran Wadia MTech Dissertation.
Ethernet. Problem In an Ethernet, suppose there are three stations very close to each other, A, B and C. Suppose at time 0, all of them have a frame to.
Lecture 4 Wireless Medium Access Control
Computer and Data Communications Semester Mohd Nazri Mahmud Session 4a-12 March 2012.
IEEE Wireless LAN Standard. Medium Access Control-CSMA/CA IEEE defines two MAC sublayers Distributed coordination function (DCF) Point coordination.
Effects of Multi-Rate in Ad Hoc Wireless Networks
Quality of Service Support in Wireless Networks
Reliable MAC Layer Multicast in IEEE Wireless Networks Min-Te Sun, Lifei Huang, Anish Arora, Ten-Hwang Lai Department of Computer and Information.
Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel.
IEEE EDCF: a QoS Solution for WLAN Javier del Prado 1, Sunghyun Choi 2 and Sai Shankar 1 1 Philips Research USA - Briarcliff Manor, NY 2 Seoul National.
جلسه یازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
Chapter 6 Multiple Radio Access
Copyright © 2003 OPNET Technologies, Inc. Confidential, not for distribution to third parties. Quality of Service(QoS) in IEEE Wireless LANs: Evaluation.
Performance Analysis of IEEE Distributed Coordination Function (DCF) Author : Giuseppe Bianchi Presented by: 李政修 December 23, 2003.
Hangguan Shan, Member, IEEE, Ho Ting Cheng, Student Member, IEEE, and Weihua Zhuang, Fellow, IEEE Cross-Layer Cooperative MAC Protocol in Distributed Wireless.
An Energy Efficient MAC Protocol for Wireless LANs, E.-S. Jung and N.H. Vaidya, INFOCOM 2002, June 2002 吳豐州.
Wi-Fi. Basic structure: – Stations plus an access point – Stations talk to the access point, then to outside – Access point talks to stations – Stations.
Universität Karlsruhe Institut für Telematik ECE 591
6 November 2002 MAC protocol 1 Optimization of the Efficiency of MAC Protocols for WLANs Raffaele Bruno MobileMAN kickoff meeting.
MAC Sublayer MAC layer tasks: – Control medium access – Roaming, authentication, power conservation Traffic services – DCF (Distributed Coordination.
Medium Access Control in Wireless networks
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
CSMA/CA Simulation  Course Name: Networking Level(UG/PG): UG  Author(s) : Amitendu Panja, Veedhi Desai  Mentor: Aruna Adil *The contents in this ppt.
Distributed-Queue Access for Wireless Ad Hoc Networks Authors: V. Baiamonte, C. Casetti, C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di.
COE-541 LAN / MAN Simulation & Performance Evaluation of CSMA/CA
Copyright © 2003 OPNET Technologies, Inc. Confidential, not for distribution to third parties. Wireless LANs Session
Wireless LAN Requirements (1) Same as any LAN – High capacity, short distances, full connectivity, broadcast capability Throughput: – efficient use wireless.
Performance Enhancement of Multirate IEEE WLANs with Geographically Scattered Stations 1 Duck-Yong Yang, 2 Tae-Jin Lee, 3 Kyunghun Jang, 3 Jin-Bong.
MAC Protocols for Sensor Networks
Balancing Uplink and Downlink Delay of VoIP Traffic in WLANs
David S. L. Wei Joint Work with Alex Chia-Chun Hsu and C.-C. Jay Kuo
Topics in Distributed Wireless Medium Access Control
Performance Evaluation of an Integrated-service IEEE Network
Wireless LAN Simulation IEEE MAC Protocol
The System Issues of Rate Adaptation
Chapter 6 Multiple Radio Access.
Presentation transcript:

Contention Window Optimization for IEEE DCF Access Control D. J. Deng, C. H. Ke, H. H. Chen, and Y. M. Huang IEEE Transaction on Wireless Communication Speaker: Der-Jiunn Deng Department of Computer Science and Information Engineering National Changhua University of Education

Generic Mobile computing System Arch. This talk will cover: application transport network link physical application transport network link physical network link physical data Application & Services OS & Middleware Network Data Link Radio Partitioning Source Coding & DSP Context Adaptation Mobility Management Resource Management QoS Management Rerouting Impact on TCP Location Tracking Multiple Access Channel Allocation Link Error Control Modulation Schemes Channel Coding RF Circuit

Destination Data ACK Basic Access Method (CSMA/CA) Basic Access Method (CSMA/CA) Source Other DIFS Busy Medium DIFS Free access when medium is free longer than DIFS CW SIFSDIFS Busy Medium DIFS Busy Medium CW DIFS NAV DIFS Busy Medium DIFS Busy Medium DIFS Busy Medium Defer access Select a CW size and decrement backoff as long as medium is idle

RTS Destination Data ACK RTS/CTS Mechanism Source Other DIFS Busy Medium DIFS Free access when medium is free longer than DIFS CW SIFSDIFS Busy Medium DIFS Busy Medium CW DIFS NAV DIFS Busy Medium DIFS Busy Medium DIFS Busy Medium Defer access Select a CW size and decrement backoff as long as medium is idle CTS SIFS

Throughput Efficiency single-rate, 1 Mbpssingle-rate, 11 Mbps D. J. Deng, L. Bin, L. F. Huang, C. H. Ke, and Y. M. Huang, "Saturation Throughput Analysis of Multi-rate IEEE Wireless Networks," accept for publications in Wireless Communications and Mobile Computing.

Throughput Efficiency multi-rate, 1, 2, 5.5, 11 Mbps D. J. Deng, L. Bin, L. F. Huang, C. H. Ke, and Y. M. Huang, "Saturation Throughput Analysis of Multi-rate IEEE Wireless Networks," accept for publications in Wireless Communications and Mobile Computing. multi-rate, 1, 2, 5.5, 11 Mbps

Exponential Backoff Data DIFS Busy Medium DIFS CW DIFS Busy Medium SIFS initial attempt first retransmission second retransmission third retransmission forth retransmission CW minCW max time slot RTS

r The usage of backoff algorithm avoids long access delays when the load is light because it selects an initial (small) parameter value of contention window (CW) by assuming a low level of congestion in the system. r This strategy might allocate initial size of CW, only to find out later that it is not enough when the load increased, but each increase of the CW parameter value is obtained paying the cost of a collision (bandwidth wastage) r After a successful transmission, the size of CW is set again to the minimum value without maintaining any knowledge of the current channel status. It incurs a high collision probability and channel utilization is degraded in bursty arrival or congested scenarios Congested Scenario

r In DCF access method, immediate positive acknowledgement informs the sender of successful reception of each data frame r In case an acknowledgement is not received, the sender will presume that the data frame is lost due to collision, not by frame loss. r Unfortunately, wireless transmission links are noisy and highly unreliable, for example, for BER=, the probability of receiving a full data frame correctly is less than 30%. The proper approach to dealing with lost frames is to send them again, and as auickly as possible Noisy Environment

Geometric Distribution Consider a sequence of Bernoulli trails with the probability of success on being P. Let r.v. X denote the number of trials up to and including the first success

ACK P-Persistent CSMA/CA Data DIFS Busy Medium DIFS CW DIFS Busy Medium SIFS Data defer accessdecrement backoff as long as medium is idle

Runtime Estimate Channel Status

Average CW size

No. of Active Stations Estimation

BER Estimating PSK ModeCCK Mode BER vs. SNR for Intersil HFA3861B chipset

CW Optimization

Using Block-Code

Priority Enforcement

Theoretical Limit (Basic Access Method)

Theoretical Limit (RTS/CTS Mechanism)

Simulation – Default Values

Achievable throughput versus channel BER with different network sizes Blocking rate versus channel BER with different network sizes Simulation - Congested Scenario

Simulation - Noisy Environment Achievable throughput versus number of stations under different channel BER Blocking rate versus number of stations under different channel BER

Simulation – Basic Access Method The performance of basic access method

Simulation – RTS/CTS Mechanism The performance of RTS/CTS mechanism

Simulation – Proposed Scheme The performance of proposed scheme

Simulation – Coexisted Environments The proposed scheme and legacy DCF access method coexist in a same BSS

Conclusions r The backoff parameters in IEEE DCF access method are far from the optimal setting in heavy-load and error-prone WLANs environment r In this paper, we attempt to identify the relationship between backoff parameters and channel BER and put forth a pragmatic problem-solving solution r The proposed scheme is performed at each station in a distributed manner, and it can be implemented in the present IEEE standard with relatively minor modifications r There’s no such thing as a free lunch We believe that it is almost impossible to increase the probability of success of transmitting a frame excepting frames fragmentation or FEC (Forward Error Control) in an extremely noisy wireless environment.