Contention Window Optimization for IEEE 802.11 DCF Access Control D. J. Deng, C. H. Ke, H. H. Chen,...
-
Upload
frederica-tucker -
Category
Documents
-
view
219 -
download
0
Transcript of Contention Window Optimization for IEEE 802.11 DCF Access Control D. J. Deng, C. H. Ke, H. H. Chen,...
![Page 1: Contention Window Optimization for IEEE 802.11 DCF Access Control D. J. Deng, C. H. Ke, H. H. Chen, and Y. M. Huang IEEE Transaction on Wireless Communication.](https://reader035.fdocuments.in/reader035/viewer/2022062714/56649d1a5503460f949ef1f9/html5/thumbnails/1.jpg)
Contention Window Optimization Contention Window Optimization for IEEE 802.11 DCF Access for IEEE 802.11 DCF Access
Control Control
D. J. Deng, C. H. Ke, H. H. Chen, and Y. M. Huang
IEEE Transaction on Wireless Communication
Speaker: Der-Jiunn DengDepartment of Computer Science and Information Engineering
National Changhua University of Education
![Page 2: Contention Window Optimization for IEEE 802.11 DCF Access Control D. J. Deng, C. H. Ke, H. H. Chen, and Y. M. Huang IEEE Transaction on Wireless Communication.](https://reader035.fdocuments.in/reader035/viewer/2022062714/56649d1a5503460f949ef1f9/html5/thumbnails/2.jpg)
Generic Mobile computing System Arch.Generic Mobile computing System Arch.
This talk will cover:applicationtransportnetwork
linkphysical
applicationtransportnetwork
linkphysical
networklink
physical
data
data
Application & Services
OS & Middleware
Network
Data Link
Radio
PartitioningSource Coding & DSPContext Adaptation
Mobility ManagementResource ManagementQoS ManagementReroutingImpact on TCPLocation Tracking
Multiple AccessChannel AllocationLink Error Control
Modulation SchemesChannel CodingRF Circuit
![Page 3: Contention Window Optimization for IEEE 802.11 DCF Access Control D. J. Deng, C. H. Ke, H. H. Chen, and Y. M. Huang IEEE Transaction on Wireless Communication.](https://reader035.fdocuments.in/reader035/viewer/2022062714/56649d1a5503460f949ef1f9/html5/thumbnails/3.jpg)
DestinationDestination
DataData
ACKACK
Basic Access Method (CSMA/CA)Basic Access Method (CSMA/CA)
SourceSource
OtherOther
DIFS
Busy Medium DIFS
Free access when medium is free longer than DIFS
CW
SIFSDIFS
Busy Medium
DIFS
Busy Medium CWDIFS
NAV
DIFS
Busy Medium
DIFS
Busy Medium
DIFS
Busy Medium
Defer access
Select a CW size and decrement backoff as long as medium is idle
![Page 4: Contention Window Optimization for IEEE 802.11 DCF Access Control D. J. Deng, C. H. Ke, H. H. Chen, and Y. M. Huang IEEE Transaction on Wireless Communication.](https://reader035.fdocuments.in/reader035/viewer/2022062714/56649d1a5503460f949ef1f9/html5/thumbnails/4.jpg)
RTSRTS
DestinationDestination
DataData
ACKACK
RTS/CTS MechanismRTS/CTS Mechanism
SourceSource
OtherOther
DIFS
Busy Medium DIFS
Free access when medium is free longer than DIFS
CW
SIFSDIFS
Busy Medium
DIFS
Busy Medium CWDIFS
NAV
DIFS
Busy Medium
DIFS
Busy Medium
DIFS
Busy Medium
Defer access
Select a CW size and decrement backoff as long as medium is idle
CTSCTS
SIFS
SIFS
![Page 5: Contention Window Optimization for IEEE 802.11 DCF Access Control D. J. Deng, C. H. Ke, H. H. Chen, and Y. M. Huang IEEE Transaction on Wireless Communication.](https://reader035.fdocuments.in/reader035/viewer/2022062714/56649d1a5503460f949ef1f9/html5/thumbnails/5.jpg)
Throughput EfficiencyThroughput Efficiency
single-rate, 1 Mbps single-rate, 11 Mbps
D. J. Deng, L. Bin, L. F. Huang, C. H. Ke, and Y. M. Huang, "Saturation Throughput Analysis of Multi-rate IEEE 802.11 Wireless Networks," accept for publications in Wireless Communications and Mobile Computing.
![Page 6: Contention Window Optimization for IEEE 802.11 DCF Access Control D. J. Deng, C. H. Ke, H. H. Chen, and Y. M. Huang IEEE Transaction on Wireless Communication.](https://reader035.fdocuments.in/reader035/viewer/2022062714/56649d1a5503460f949ef1f9/html5/thumbnails/6.jpg)
Throughput EfficiencyThroughput Efficiency
multi-rate, 1, 2, 5.5, 11 Mbps
D. J. Deng, L. Bin, L. F. Huang, C. H. Ke, and Y. M. Huang, "Saturation Throughput Analysis of Multi-rate IEEE 802.11 Wireless Networks," accept for publications in Wireless Communications and Mobile Computing.
multi-rate, 1, 2, 5.5, 11 Mbps
![Page 7: Contention Window Optimization for IEEE 802.11 DCF Access Control D. J. Deng, C. H. Ke, H. H. Chen, and Y. M. Huang IEEE Transaction on Wireless Communication.](https://reader035.fdocuments.in/reader035/viewer/2022062714/56649d1a5503460f949ef1f9/html5/thumbnails/7.jpg)
Exponential BackoffExponential Backoff
DataDataDIFS
Busy Medium DIFS
CWDIFS
Busy Medium SIFS
31
0
63
127
255
511
1023
initial attempt
first retransmission
second retransmission
third retransmission
forth retransmission
CW min CW max
ifunctionrandom 52()_ time slot
RTSRTS
![Page 8: Contention Window Optimization for IEEE 802.11 DCF Access Control D. J. Deng, C. H. Ke, H. H. Chen, and Y. M. Huang IEEE Transaction on Wireless Communication.](https://reader035.fdocuments.in/reader035/viewer/2022062714/56649d1a5503460f949ef1f9/html5/thumbnails/8.jpg)
The usage of backoff algorithm avoids long access delays when the load is light because it selects an initial (small) parameter value of contention window (CW) by assuming a low level of congestion in the system.
This strategy might allocate initial size of CW, only to find out later that it is not enough when the load increased, but each increase of the CW parameter value is obtained paying the cost of a collision (bandwidth wastage)
After a successful transmission, the size of CW is set again to the minimum value without maintaining any knowledge of the current channel status.
It incurs a high collision probability and channel utilization is degraded
in bursty arrival or congested scenarios
Congested ScenarioCongested Scenario
![Page 9: Contention Window Optimization for IEEE 802.11 DCF Access Control D. J. Deng, C. H. Ke, H. H. Chen, and Y. M. Huang IEEE Transaction on Wireless Communication.](https://reader035.fdocuments.in/reader035/viewer/2022062714/56649d1a5503460f949ef1f9/html5/thumbnails/9.jpg)
In DCF access method, immediate positive acknowledgement informs the sender of successful reception of each data frame
In case an acknowledgement is not received, the sender will presume that the data frame is lost due to collision, not by frame loss.
Unfortunately, wireless transmission links are noisy and highly unreliable, for example, for BER= , the probability of receiving a full data frame correctly is less than 30%.
410
0
0.2
0.4
0.6
0.8
1
1.2
1.00E-12 1.00E-11 1.00E-10 1.00E-09 1.00E-08 1.00E-07 1.00E-06 1.00E-05 1.00E-04 1.00E-03 0.01
BER
Th
rou
gh
pu
t
The proper approach to dealing with lost framesis to send them again, and as auickly as possible
Noisy EnvironmentNoisy Environment
![Page 10: Contention Window Optimization for IEEE 802.11 DCF Access Control D. J. Deng, C. H. Ke, H. H. Chen, and Y. M. Huang IEEE Transaction on Wireless Communication.](https://reader035.fdocuments.in/reader035/viewer/2022062714/56649d1a5503460f949ef1f9/html5/thumbnails/10.jpg)
Geometric DistributionGeometric Distribution
Consider a sequence of Bernoulli trails with the probability of success on being P. Let r.v. X denote the number of trials up to and including the first success
,)1()( 1 ppxf x x1
1
1)1()()(x
xppxxfxXE
1
)1(1 x
xpxp
p
pp
p
p
p 1
))1(1(
1
1 2
![Page 11: Contention Window Optimization for IEEE 802.11 DCF Access Control D. J. Deng, C. H. Ke, H. H. Chen, and Y. M. Huang IEEE Transaction on Wireless Communication.](https://reader035.fdocuments.in/reader035/viewer/2022062714/56649d1a5503460f949ef1f9/html5/thumbnails/11.jpg)
ACKACK
PP-Persistent CSMA/CA-Persistent CSMA/CA
p
W 1
2
1
1
2p
W
DataDataDIFS
Busy Medium DIFS
CWDIFS
Busy Medium SIFS
DataData
W
defer access decrement backoff as long as medium is idle
![Page 12: Contention Window Optimization for IEEE 802.11 DCF Access Control D. J. Deng, C. H. Ke, H. H. Chen, and Y. M. Huang IEEE Transaction on Wireless Communication.](https://reader035.fdocuments.in/reader035/viewer/2022062714/56649d1a5503460f949ef1f9/html5/thumbnails/12.jpg)
Runtime Estimate Channel Runtime Estimate Channel StatusStatus
attemptsion transmissofNumber
failuresion transmissofNumber fp
![Page 13: Contention Window Optimization for IEEE 802.11 DCF Access Control D. J. Deng, C. H. Ke, H. H. Chen, and Y. M. Huang IEEE Transaction on Wireless Communication.](https://reader035.fdocuments.in/reader035/viewer/2022062714/56649d1a5503460f949ef1f9/html5/thumbnails/13.jpg)
Average CW sizeAverage CW size
![Page 14: Contention Window Optimization for IEEE 802.11 DCF Access Control D. J. Deng, C. H. Ke, H. H. Chen, and Y. M. Huang IEEE Transaction on Wireless Communication.](https://reader035.fdocuments.in/reader035/viewer/2022062714/56649d1a5503460f949ef1f9/html5/thumbnails/14.jpg)
No. of Active Stations EstimationNo. of Active Stations Estimation
![Page 15: Contention Window Optimization for IEEE 802.11 DCF Access Control D. J. Deng, C. H. Ke, H. H. Chen, and Y. M. Huang IEEE Transaction on Wireless Communication.](https://reader035.fdocuments.in/reader035/viewer/2022062714/56649d1a5503460f949ef1f9/html5/thumbnails/15.jpg)
BER EstimatingBER Estimating
PSK Mode CCK Mode
BER vs. SNR for Intersil HFA3861B chipset
![Page 16: Contention Window Optimization for IEEE 802.11 DCF Access Control D. J. Deng, C. H. Ke, H. H. Chen, and Y. M. Huang IEEE Transaction on Wireless Communication.](https://reader035.fdocuments.in/reader035/viewer/2022062714/56649d1a5503460f949ef1f9/html5/thumbnails/16.jpg)
CW OptimizationCW Optimization
CMpiMpiMpipM
M
i
M
iopt
1}0{1}{}{
11
![Page 17: Contention Window Optimization for IEEE 802.11 DCF Access Control D. J. Deng, C. H. Ke, H. H. Chen, and Y. M. Huang IEEE Transaction on Wireless Communication.](https://reader035.fdocuments.in/reader035/viewer/2022062714/56649d1a5503460f949ef1f9/html5/thumbnails/17.jpg)
Using Block-CodeUsing Block-Code
![Page 18: Contention Window Optimization for IEEE 802.11 DCF Access Control D. J. Deng, C. H. Ke, H. H. Chen, and Y. M. Huang IEEE Transaction on Wireless Communication.](https://reader035.fdocuments.in/reader035/viewer/2022062714/56649d1a5503460f949ef1f9/html5/thumbnails/18.jpg)
Priority EnforcementPriority Enforcement
![Page 19: Contention Window Optimization for IEEE 802.11 DCF Access Control D. J. Deng, C. H. Ke, H. H. Chen, and Y. M. Huang IEEE Transaction on Wireless Communication.](https://reader035.fdocuments.in/reader035/viewer/2022062714/56649d1a5503460f949ef1f9/html5/thumbnails/19.jpg)
Theoretical Limit Theoretical Limit (Basic Access Method)(Basic Access Method)
slotSIFSDATA
ACKDATADIFSHp
LLDATA
TW
TR
LLTTT
BERL ACKDATA
2222
)1( )(
![Page 20: Contention Window Optimization for IEEE 802.11 DCF Access Control D. J. Deng, C. H. Ke, H. H. Chen, and Y. M. Huang IEEE Transaction on Wireless Communication.](https://reader035.fdocuments.in/reader035/viewer/2022062714/56649d1a5503460f949ef1f9/html5/thumbnails/20.jpg)
Theoretical Limit Theoretical Limit (RTS/CTS Mechanism)(RTS/CTS Mechanism)
slotSIFSDATA
ACKDATACTSRTSDIFSHp
LLLLDATA
TW
TR
LLLLTTT
BERL ACKDATACTSRTS
23444
)1( )(
![Page 21: Contention Window Optimization for IEEE 802.11 DCF Access Control D. J. Deng, C. H. Ke, H. H. Chen, and Y. M. Huang IEEE Transaction on Wireless Communication.](https://reader035.fdocuments.in/reader035/viewer/2022062714/56649d1a5503460f949ef1f9/html5/thumbnails/21.jpg)
Simulation – Default ValuesSimulation – Default Values
![Page 22: Contention Window Optimization for IEEE 802.11 DCF Access Control D. J. Deng, C. H. Ke, H. H. Chen, and Y. M. Huang IEEE Transaction on Wireless Communication.](https://reader035.fdocuments.in/reader035/viewer/2022062714/56649d1a5503460f949ef1f9/html5/thumbnails/22.jpg)
Achievable throughput versus channel BER with different network sizes
Blocking rate versus channel BER with different network sizes
Simulation - Congested ScenarioSimulation - Congested Scenario
![Page 23: Contention Window Optimization for IEEE 802.11 DCF Access Control D. J. Deng, C. H. Ke, H. H. Chen, and Y. M. Huang IEEE Transaction on Wireless Communication.](https://reader035.fdocuments.in/reader035/viewer/2022062714/56649d1a5503460f949ef1f9/html5/thumbnails/23.jpg)
Simulation - Noisy EnvironmentSimulation - Noisy Environment
Achievable throughput versus number of stationsunder different channel BER
Blocking rate versus number of stationsunder different channel BER
![Page 24: Contention Window Optimization for IEEE 802.11 DCF Access Control D. J. Deng, C. H. Ke, H. H. Chen, and Y. M. Huang IEEE Transaction on Wireless Communication.](https://reader035.fdocuments.in/reader035/viewer/2022062714/56649d1a5503460f949ef1f9/html5/thumbnails/24.jpg)
Simulation – Basic Access Simulation – Basic Access MethodMethod
The performance of basic access method
![Page 25: Contention Window Optimization for IEEE 802.11 DCF Access Control D. J. Deng, C. H. Ke, H. H. Chen, and Y. M. Huang IEEE Transaction on Wireless Communication.](https://reader035.fdocuments.in/reader035/viewer/2022062714/56649d1a5503460f949ef1f9/html5/thumbnails/25.jpg)
Simulation – RTS/CTS Simulation – RTS/CTS MechanismMechanism
The performance of RTS/CTS mechanism
![Page 26: Contention Window Optimization for IEEE 802.11 DCF Access Control D. J. Deng, C. H. Ke, H. H. Chen, and Y. M. Huang IEEE Transaction on Wireless Communication.](https://reader035.fdocuments.in/reader035/viewer/2022062714/56649d1a5503460f949ef1f9/html5/thumbnails/26.jpg)
Simulation – Proposed SchemeSimulation – Proposed Scheme
The performance of proposed scheme
![Page 27: Contention Window Optimization for IEEE 802.11 DCF Access Control D. J. Deng, C. H. Ke, H. H. Chen, and Y. M. Huang IEEE Transaction on Wireless Communication.](https://reader035.fdocuments.in/reader035/viewer/2022062714/56649d1a5503460f949ef1f9/html5/thumbnails/27.jpg)
Simulation – Coexisted Simulation – Coexisted Environments Environments
The proposed scheme and legacy DCF access method coexist in a same BSS
![Page 28: Contention Window Optimization for IEEE 802.11 DCF Access Control D. J. Deng, C. H. Ke, H. H. Chen, and Y. M. Huang IEEE Transaction on Wireless Communication.](https://reader035.fdocuments.in/reader035/viewer/2022062714/56649d1a5503460f949ef1f9/html5/thumbnails/28.jpg)
ConclusionsConclusions The backoff parameters in IEEE 802.11 DCF access method are fa
r from the optimal setting in heavy-load and error-prone WLANs environment
In this paper, we attempt to identify the relationship between backoff parameters and channel BER and put forth a pragmatic problem-solving solution
The proposed scheme is performed at each station in a distributed manner, and it can be implemented in the present IEEE 802.11 standard with relatively minor modifications
There’s no such thing as a free lunch We believe that it is almost impossible to increase the probability of success of transmitting a frame excepting frames fragmentation or FEC (Forward Error Control) in an extremely noisy wireless environment.