KD Validity IEEE 802 11

14
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. IEEE/ACM TRANSACTIONS ON NETWORKING 1 On the Validity of IEEE 802.11 MAC Modeling Hypotheses Kaidi Huang, Ken R. Duffy, and David Malone Abstract—We identify common hypotheses on which a large number of distinct mathematical models of WLANs employing IEEE 802.11 are founded. Using data from an experimental test bed and packet-level ns-2 simulations, we investigate the veracity of these hypotheses. We demonstrate that several of these assumptions are inaccurate and/or inappropriate. We consider hypotheses used in the modeling of saturated and unsaturated 802.11 infrastructure mode networks, saturated 802.11e networks, and saturated and unsaturated 802.11s mesh networks. In infra- structure mode networks, we find that even for small numbers of stations, common hypotheses hold true for saturated stations and also for unsaturated stations with small buffers. However, despite their widespread adoption, common assumptions used to incor- porate station buffers are erroneous. This raises questions about the predictive power of all models based on these hypotheses. For saturated 802.11e models that treat differences in arbitration interframe space (AIFS), we find that the two fundamental hy- potheses are reasonable. For 802.11s mesh networks, we find that assumptions are appropriate only if stations are lightly loaded and are highly inappropriate if they are saturated. In identifying these flawed suppositions, this work identifies areas where mathematical models need to be revisited and revised if they are to be used with confidence by protocol designers and WLAN network planners. Index Terms—Carrier sensing multiple access/collision avoid- ance (CSMA/CA), hypothesis testng, IEEE 802.11, stochastic models. I. INTRODUCTION S INCE its introduction in 1997, IEEE 802.11 has become the de facto WLAN standard. Its widespread deployment has led to considerable research effort to gain understanding of its carrier sensing multiple access/collision avoidance (CSMA/CA) algorithm. This includes the use of simulation tools, experiments with hardware, and the building of mathe- matical models. In particular, analytical models have developed significantly in recent years, and due to the speed with which they can make predictions, they have been proposed as powerful tools to aid protocol designers and WLAN network planners. Despite the differences in the details of published models, most of them share common hypotheses. In this article, we iden- tify these common assumptions and investigate their validity. This is an important task as authors do not typically check the validity of these assumptions directly, but infer them from the Manuscript received October 02, 2008; revised December 10, 2009; accepted May 18, 2010; approved by IEEE/ACM TRANSACTIONS ON NETWORKING Ed- itor V. Misra. This work was supported by Science Foundation Ireland Grant RFP-07-ENEF530. A preliminary report on this work appeared in the Proceed- ings of IEEE PIMRC 2008 [1]. The authors are with the Hamilton Institute, National University of Ireland, Maynooth, Ireland (e-mail: [email protected]). Digital Object Identifier 10.1109/TNET.2010.2051335 accuracy of model predictions of coarse-grained quantities such as long-run throughput or average MAC delay. If these models are to be used with confidence for the prediction of quantities beyond those validated within published articles, it is necessary that their fundamental hypotheses be sound. In the present article, we identify the following assumptions that are adopted by numerous authors, often implicitly. For a single station, define if the th transmission attempt results in a collision, and if it results in a success. For a station in an 802.11 network employing DCF, irrespective of whether it is saturated (always having packets to send) or not, many authors (e.g., [2]–[10]) assume the following. (A1) The sequence of outcomes of attempted transmissions forms a stochastically independent sequence. (A2) The sequence consists of identically distributed random variables that, in particular, do not depend on station’s collision history. For models where stations have nonzero buffers, in addition define if there is at least one packet awaiting pro- cessing after the th successful transmission or packet discard, and if the buffer is empty. Then, the following are com- monly assumed (e.g., [11]–[14]). (A3) The sequence consists of independent random variables. (A4) The sequence consists of identically distributed random variables that, in particular, do not depend on backoff stage. Many authors consider networks employing the 802.11 EDCA in which stations have distinct arbitration interframe space (AIFS) parameters. For a network with two distinct AIFS values, let denote the sequence of the number of slots during which stations with a lower AIFS value can decrement their counters while stations with the higher AIFS observe the medium as being continuously busy for longer. The commonly adopted assumptions (e.g., [15]–[20]) are the following. (A5) The sequence consists of independent random variables. (A6) Each element of the sequence is identically dis- tributed, with a distribution that can be identified with one derived in Section VI. For 802.11s mesh networks, let denote the interdeparture times of packets from an element of the network. That is, is the difference between the time at which the th successful transmission and the th successful transmission occurs from a tagged station. If the station’s arrival process is Poisson, then one pair of hypotheses (e.g., [21]) used to enable a tractable mathematical model of 802.11s mesh networks is the following. 1063-6692/$26.00 © 2010 IEEE

Transcript of KD Validity IEEE 802 11

Page 1: KD Validity IEEE 802 11

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

IEEE/ACM TRANSACTIONS ON NETWORKING 1

On the Validity of IEEE 802.11 MAC ModelingHypotheses

Kaidi Huang, Ken R. Duffy, and David Malone

Abstract—We identify common hypotheses on which a largenumber of distinct mathematical models of WLANs employingIEEE 802.11 are founded. Using data from an experimentaltest bed and packet-level ns-2 simulations, we investigate theveracity of these hypotheses. We demonstrate that several of theseassumptions are inaccurate and/or inappropriate. We considerhypotheses used in the modeling of saturated and unsaturated802.11 infrastructure mode networks, saturated 802.11e networks,and saturated and unsaturated 802.11s mesh networks. In infra-structure mode networks, we find that even for small numbers ofstations, common hypotheses hold true for saturated stations andalso for unsaturated stations with small buffers. However, despitetheir widespread adoption, common assumptions used to incor-porate station buffers are erroneous. This raises questions aboutthe predictive power of all models based on these hypotheses.For saturated 802.11e models that treat differences in arbitrationinterframe space (AIFS), we find that the two fundamental hy-potheses are reasonable. For 802.11s mesh networks, we find thatassumptions are appropriate only if stations are lightly loaded andare highly inappropriate if they are saturated. In identifying theseflawed suppositions, this work identifies areas where mathematicalmodels need to be revisited and revised if they are to be used withconfidence by protocol designers and WLAN network planners.

Index Terms—Carrier sensing multiple access/collision avoid-ance (CSMA/CA), hypothesis testng, IEEE 802.11, stochasticmodels.

I. INTRODUCTION

S INCE its introduction in 1997, IEEE 802.11 has becomethe de facto WLAN standard. Its widespread deployment

has led to considerable research effort to gain understandingof its carrier sensing multiple access/collision avoidance(CSMA/CA) algorithm. This includes the use of simulationtools, experiments with hardware, and the building of mathe-matical models. In particular, analytical models have developedsignificantly in recent years, and due to the speed with whichthey can make predictions, they have been proposed as powerfultools to aid protocol designers and WLAN network planners.

Despite the differences in the details of published models,most of them share common hypotheses. In this article, we iden-tify these common assumptions and investigate their validity.This is an important task as authors do not typically check thevalidity of these assumptions directly, but infer them from the

Manuscript received October 02, 2008; revised December 10, 2009; acceptedMay 18, 2010; approved by IEEE/ACM TRANSACTIONS ON NETWORKING Ed-itor V. Misra. This work was supported by Science Foundation Ireland GrantRFP-07-ENEF530. A preliminary report on this work appeared in the Proceed-ings of IEEE PIMRC 2008 [1].

The authors are with the Hamilton Institute, National University of Ireland,Maynooth, Ireland (e-mail: [email protected]).

Digital Object Identifier 10.1109/TNET.2010.2051335

accuracy of model predictions of coarse-grained quantities suchas long-run throughput or average MAC delay. If these modelsare to be used with confidence for the prediction of quantitiesbeyond those validated within published articles, it is necessarythat their fundamental hypotheses be sound.

In the present article, we identify the following assumptionsthat are adopted by numerous authors, often implicitly. For asingle station, define if the th transmission attemptresults in a collision, and if it results in a success. Fora station in an 802.11 network employing DCF, irrespective ofwhether it is saturated (always having packets to send) or not,many authors (e.g., [2]–[10]) assume the following.(A1) The sequence of outcomes of attempted transmissions

forms a stochastically independent sequence.(A2) The sequence consists of identically distributed

random variables that, in particular, do not depend onstation’s collision history.

For models where stations have nonzero buffers, in additiondefine if there is at least one packet awaiting pro-cessing after the th successful transmission or packet discard,and if the buffer is empty. Then, the following are com-monly assumed (e.g., [11]–[14]).(A3) The sequence consists of independent random

variables.(A4) The sequence consists of identically distributed

random variables that, in particular, do not depend onbackoff stage.

Many authors consider networks employing the 802.11 EDCAin which stations have distinct arbitration interframe space(AIFS) parameters. For a network with two distinct AIFSvalues, let denote the sequence of the number of slotsduring which stations with a lower AIFS value can decrementtheir counters while stations with the higher AIFS observe themedium as being continuously busy for longer. The commonlyadopted assumptions (e.g., [15]–[20]) are the following.(A5) The sequence consists of independent random

variables.(A6) Each element of the sequence is identically dis-

tributed, with a distribution that can be identified withone derived in Section VI.

For 802.11s mesh networks, let denote the interdeparturetimes of packets from an element of the network. That is,is the difference between the time at which the th successfultransmission and the th successful transmission occursfrom a tagged station. If the station’s arrival process is Poisson,then one pair of hypotheses (e.g., [21]) used to enable a tractablemathematical model of 802.11s mesh networks is the following.

1063-6692/$26.00 © 2010 IEEE

Page 2: KD Validity IEEE 802 11

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

2 IEEE/ACM TRANSACTIONS ON NETWORKING

TABLE ISUMMARY OF FINDINGS: �� � COLLISION SEQUENCE;

�� � QUEUE-OCCUPIED SEQUENCE; �� � HOLD SEQUENCE; �� � INTERDEPARTURE TIME SEQUENCE

(A7) The sequence consists of independent randomvariables.

(A8) The elements of are exponentially distributed.By performing statistical analysis on large volumes of

data collected from an experimental test bed, as describedin Section III, we investigate the veracity of the assumptions(A1)–(A4), (A7), and (A8). Due to instrumentation difficulties,we use data from ns-2 packet-level simulations to check (A5)and (A6). Our findings are summarized in Table I.

Autocovariance, Runs Tests, maximum likelihood estimators,and goodness-of-fit statistics lead us to deduce that (A1) and(A2) are reasonable hypotheses for saturated stations and unsat-urated stations with small buffers, but are not accurate for unsat-urated stations with large buffers. Of greater concern for unsatu-rated stations with large buffers is that we find (A4) is a dubiousand inaccurate assumption. In particular, the queue-busy prob-ability is clearly shown to be a function of backoff stage. For802.11e models that treat differences in AIFS, we find that (A5)and (A6) are reasonable (albeit not perfect). For 802.11s meshnetworks, we find that (A7) and (A8) are appropriate for lightlyloaded unsaturated stations, but (A8) fails as stations becomeheavily loaded. This is particularly true when stations are satu-rated as interdeparture times coincide with MAC service times.Although these are independent, which validates (A7), they arenot distributed exponentially, which contradicts (A8).

Clearly, these findings give rise to serious concerns about theappropriateness of many commonly adopted modeling assump-tions. As these hypotheses are inaccurate or inappropriate, it ishard to have confidence in the predictions of models based onthem beyond their original validation. Our aim in this article isto draw attention to these deficits and guide the 802.11 mod-eling community in its ongoing research effort. This is crucialif these models are to be used by network designers.

The rest of this paper is organized as follows. In Section II,we introduce two of the popular 802.11 modeling approaches:p-persistent and mean-field Markov. In Section III, the instru-mented test bed used to collect experimental data is introduced.In Section IV, we treat the fundamental decoupling hypotheses,(A1) and (A2), for saturated stations as well as unsaturated sta-tions with both small and large buffers. In Section V, we con-sider the additional queue decoupling assumptions, (A3) and(A4), that are adopted when treating stations with buffers. InSection VI, the assumptions (A5) and (A6) that lie behind thetreatment of different AIFS values in 802.11e are considered. InSection VII, the mesh assumptions (A7) and (A8) that Poisson

input gives rise to Poisson output are treated. In Section VIII,we discuss our findings.

II. POPULAR ANALYTIC APPROACHES TO 802.11 DCF AND

EDCA

At its heart, the 802.11 CSMA/CA algorithm employs binaryexponential backoff (BEB) to share the medium between sta-tions competing for access1. As this BEB algorithm couplesstations service processes through their shared collisions, itsperformance cannot be analytically investigated without judi-ciously approximating its behavior. There are two popular mod-eling paradigms: the p-persistent approach and the mean-fieldMarkov model approach. The former has a long history in mod-eling random access protocols, such as Ethernet and Aloha [22],and the latter has its foundations in Bianchi’s seminal papers [2],[3]. While these approaches differ in their ideology and details,we shall see that they share basic decoupling hypotheses. Irre-spective of the paradigm that is adopted, most authors validatemodel predictions, but do not directly investigate the veracity ofthe underlying assumptions.

All of the models we shall consider are based on the assump-tion of idealized channel conditions where errors occur onlyas a consequence of collisions. With this environmental condi-tioning, the key decoupling approximation that enables predic-tive models in all p-persistent and mean-field analytic models ofthe IEEE 802.11 random access MAC is that given a station isattempting transmission, there is a fixed probability of collisionthat is independent of the past.

In p-persistent models, this arises as each station is assumedto have a fixed probability of attempted transmission per idleslot that is independent of the history of the station and indepen-dent of all other stations. In a network of identical stations,the likelihood a station does not experience a collision given it isattempting transmission is the likelihood that no other sta-tion is attempting transmission in that slot: .Thus, the sequence of collisions or successes is an indepen-dent and identically distributed sequence. In the p-persistent ap-proach, the attempt probability is chosen in such a way thatthe average time to successful transmission matches that in thereal system, which is an input to the model. If this average isknown, this methodology has been demonstrated to make accu-rate throughput and average delay predictions [4], [5].

1A brief overview of the DCF and EDCA algorithms is given in Appendix I.

Page 3: KD Validity IEEE 802 11

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

HUANG et al.: VALIDITY OF IEEE 802.11 MAC MODELING HYPOTHESES 3

In the mean-field approach, the fundamental idea is similar,but the calculation of , and thus , does not require external in-puts. One starts by assuming that is given and each station al-ways has a packet awaiting transmission (the saturated assump-tion). Then, the backoff counter within the station becomes anembedded semi-Markov process whose stationary distributioncan be determined [2], [3]. In particular, the stationary proba-bility that the station is attempting transmission, , can beevaluated as an explicit function of and other MAC parame-ters ([3, Eq. (7)]). In a network of stations, as is known,the fixed-point equation can be solved todetermine the “real” for the network and “real” attempt prob-ability . Once these are known, network performance metrics,such as long-run network throughput, can be deduced.

Primarily through comparison with simulations, modelsbased on these assumptions have been shown to make accuratethroughput and delay predictions, even for small number ofstations. This is, perhaps, surprising as one would expect thatthe decoupling assumptions would only be accurate in networkswith a large number of stations. The p-persistent paradigm hasbeen developed to encompass, for example, saturated 802.11networks where every station always has a packet to send[4] and saturated 802.11e networks [8]. However, due to itsintuitive appeal, its self-contained ability to make predictions,and its predictive accuracy, Bianchi’s basic paradigm has beenwidely adopted for models that expand on its original range ofapplicability. A selection of these extensions includes: [6], [7],[9], [10], which consider the impact of unsaturated stations inthe absence of station buffers and enable predictions in the pres-ence of load asymmetries; [11]–[14], which treat unsaturatedstations in the presence of stations with buffers; [15]–[17],which investigate the impact of the variable parameters of802.11e, including AIFS, on saturated networks; [18]–[20],which treat unsaturated 802.11e networks; [21], which extendsthe paradigm from single-hop networks to multiple-radio802.11s mesh networks. Note that the work cited here is asmall, selective subcollection within a vast body of literature.To appreciate just how large this literature is, as of November2009, the p-persistent modeling paper [4] has been cited over400 times according to ISI Knowledge and over 800 timesaccording to Google Scholar, while the mean-field modelingpaper [3] has been cited over 1300 times according to ISIKnowledge and over 3200 times according to Google Scholar.

All of the extensions that we cite are based on the idealizedchannel assumption as well as the decoupling approximation.Some of these extensions require further additional hypotheses.The purpose of the present article is to dissect these funda-mental assumptions to determine the range of the applicabilityof models based on them.

III. EXPERIMENTAL APPARATUS

The experimental apparatus is set up in infrastructure mode.It employs a PC acting as an access point (AP), another PC, andnine PC-based Soekris Engineering net4801 embedded Linuxboxes acting as client stations. For every transmitted packet, theclient PC records the transmitting timestamp (the time when it

receives an ACK), the number of retry attempts experienced,and the absence or presence of another packet in station’s buffer,but otherwise behaves as an ordinary client station. All stationsare equipped with an Atheros AR5215 802.11b/g PCI card withan external antenna. All stations, including the AP, use a versionof the MADWiFi wireless driver modified to allow packet trans-missions at a fixed 11-Mb/s rate with RTS/CTS disabled and aspecified queue size. The 11-Mb/s rate was selected as in theabsence of noise-based losses the MAC’s operation is rate-in-dependent, and more observations of transmission can be madeat higher rates for an experiment of given real-time duration.The channel on which experiments were conducted was con-firmed to be noise-free by use of a spectrum analyzer and byconducting experiments with single transmitter–receiver pairs.

All stations are equipped with a 100-Mb/s wired Ethernet portthat is solely used for control of the test bed from a distinct PC.In the experiments, UDP traffic is generated by the Naval Re-search Laboratory’s MGEN in Poisson mode. All UDP packetshave a 1000-byte payload and are generated in client stationsbefore being transmitted to the AP. At the AP, tcpdump is usedto record traffic details.

Hoeffding’s concentration inequality (described inSection IV) was used to determine how many observations werenecessary to ensure statistical confidence in estimated quanti-ties. Consequently, saturated and large buffer experiments wererun for 2 h while small buffer experiments were run for 4 h.

Care must be exercised when performing experiments withIEEE 802.11 devices. Bianchi et al. [23] and Giustiniano etal. [24] report on extensive validation experiments that clearlydemonstrate that cards from many vendors fail to implement theprotocol correctly. The precision of our experimental apparatuswas established using the methodology described in [23] withadditional statistical tests.

For example, to check if the backoff counters are uniformlydistributed, the sequence of transmission times of a single satu-rated station with fixed packet sizes were recorded. The backoffcounter values were inferred from this sequence by evaluatingthe intertransmission times less the time taken for a packet trans-mission and then dividing thisquantity by the idle slot length. When the contention window is32 or 64, Fig. 1 reports on a comparison of the protocol’s backoffdistribution with empirical distributions based on sample sizesof 8 706 941 and 7 461 686, respectively. With a null hypothesisthat the distributions are uniform, Pearson’s -test (describedin Appendix II) gives p-values of 0.7437 and 0.2036 so that thenull hypothesis would not be rejected.

There is one place where our 802.11 cards do not implementthe standard correctly, but it does not impact on our deductions;both ACKTimeout and EIFS are shorter than suggested in thestandard. While this must be taken into account when, for ex-ample, predicting throughput, it has no impact on the aspects ofthe MAC’s operation that are of interest to us.

For added confirmation, all of the results that are reportedhere based on experimental data were shadowed in parallelby ns-2-based simulations that gave agreement in every case.2

Thus, we are satisfied that none of the observations reported

2Data from these simulations are not shown due to space constraints.

Page 4: KD Validity IEEE 802 11

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

4 IEEE/ACM TRANSACTIONS ON NETWORKING

Fig. 1. Comparison of protocol’s uniform backoff distribution and empiricaldistribution for contention windows of size 32 and 64 based on sample sizes of8 706 941 and 7 461 686, respectively. Pearson’s � does not reject the hypoth-esis that the distributions are uniform. Experimental data.

in this article are a consequence of peculiarities of the cards,drivers, or experimental environment.

IV. ASSUMPTIONS (A1) AND (A2)

For a single station, define if the th transmission at-tempt results in a collision, and if it results in a success.The two key assumptions in [2]–[5] are effectively these: (A1)the sequence consists of independent random variables;and (A2) the sequence consists of identically distributedrandom variables. That is, there exists a fixed collision proba-bility conditioned on attempted transmission, ,that is assumed to be the same for all backoff stages and inde-pendent of past collisions or successes.

The assumptions (A1) and (A2) are common across allmodels developed from the p-persistent and mean-fieldparadigms. Here, we investigate these for saturated stations,for unsaturated stations with small buffers, and for unsaturatedstations with big buffers. All network parameters correspond tostandard 11-Mb/s IEEE 802.11b [25].

We begin by investigating (A1), the hypothesized indepen-dence of the outcomes (success or collision) in the sequence

Fig. 2. Saturated collision sequence normalized autocovariances. Experi-mental data.

TABLE IINUMBER OF ATTEMPTED TRANSMISSIONS � . EXPERIMENTAL DATA

of transmission attempts. We draw deductions regardingpair-wise independence from the normalized autocovarianceof the sequence obtained experimentally,where is the number of attempted transmissions that asingle tagged station makes during the experiment. For eachexperiment, is recorded in Table II. Assuming iswide-sense stationary, the normalized autocovariance, whichis a measure of the dependence in the sequence, is always 1at lag 0, and if the sequence consisted of independentrandom variables, as hypothesized by (A1), then for a suffi-ciently large sample it would take the value 0 at all positivelags. Nonzero values correspond to apparent dependencies inthe data.

Experiments were run for a saturated network with ,5, and 10. As the number of stations is increased, the number ofattempts by the tagged station decreases due to the backing-offeffects of the MAC. Fig. 2 reports the normalized autocovari-ances for these sequences at short lags. The plot quickly con-verges to zero, indicating little dependence in the success perattempt sequence, even for .

The (A1) and (A2) assumptions are also adopted in unsat-urated models with small buffers [6], [7], [9], [10] and bigbuffers [11]–[14]. From experimental data for unsaturatednetworks large station buffers, Fig. 3 plots the normalizedautocovariances of the attempted transmissions for , 5,and 10 with both small and large buffers. As in all unsaturatedmodels that we are aware of, packets arrive at each station as aPoisson process with rate packets per second. In the big bufferexperiments, the overall network load is kept constant at 500packets per second, equally distributed amongst the stations,corresponding to a network-wide offered load of 4.25 Mb/s. In

UltraPablo
Resaltado
Page 5: KD Validity IEEE 802 11

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

HUANG et al.: VALIDITY OF IEEE 802.11 MAC MODELING HYPOTHESES 5

Fig. 3. Unsaturated small and big buffer collision sequence normalized auto-covariances. Note the short y-range. Experimental data.

the small buffer experiments network load is kept constant at800 packets per second. Again, we only show short lags as theautocovariance quickly drops to zero, indicating little pair-wisedependency in the sequence and supporting the(A1) hypothesis.

We have seen graphs similar to Figs. 2 and 3 for a range ofoffered loads, which are not shown due to space constraints.These support the (A1) hypothesis that the sequence of collisionor success at each attempted transmission is close to being apair-wise independent one.

Before investigating the (A2) hypothesis on its own, we usethe Runs Test (described in Appendix III) to jointly test (A1)and (A2). Given a binary-valued sequence, , thistest’s null hypothesis is that it was generated by a Bernoullisequence of random variables. The test is nonparametric anddoes not depend on . The Runs Test statistics foreach of our nine collision sequences range from 11.6617 forthe saturated two-station sequence to 68.5831 for the unsatu-rated big-buffer two-station sequence. The likelihood that the

data was generated by a Bernoulli sequence is a decreasing func-tion of the test value, and if this value is 2.58, there is less than1% chance that it was generated by a Bernoulli sequence. Eventhe lower end of the range gives a p-value of 0, leading to rejec-tion of the hypothesis that the collision sequences are i.i.d. Thereason for this failure will become apparent when we demon-strate that depends heavily on an auxiliary variable

, the backoff stage at which attempt was made, and that,as is clear from the DCF algorithm, cannot form an i.i.d.sequence.

To investigate the (A2) hypothesis on its own, we reusethe same collision sequence data withsome additional information. For each attempted transmission

, we record the backoff stage at whichit was made. Assume that there is a fixed probability thatthe tagged station experiences a collision given it is attemptingtransmission at backoff stage . A consequence of Assumption(A2) is that for all backoff stages . The maximumlikelihood estimator for is given by

(1)

where if , and 0 otherwise. The numer-ator in (1) records the number of collisions at backoff stage ,while the denominator records the total number of attempts atbackoff stage . As is a sequence of bounded random vari-ables that appear to be nearly independent (although not i.i.d.),we apply Hoeffding’s inequality [26] to determine how manysamples we need to ensure we have confidence in the estimate

Using this concentration inequality, to have at least 95% confi-

dence that requiresattempted transmissions at backoff stage . If we have less than185 observations at backoff stage , we do not have confidencein the estimate’s accuracy, so it is not plotted.

Starting with the saturated networks, Fig. 4 plots the estimatesfor the tagged station as well as the predicted value from [2],

[3]. For , we only report backoff stages 0 to 3 due to lackof observations. It can be seen that the are similar for all . Toquantify this, with for

for , and for . Note thatwhile the estimated values are not identical to those predictedby Bianchi’s model, they are close. These observations supportthe (A2) assumption for saturated stations, even for .

For unsaturated WLANs, we do not include theoretical pre-dictions for comparison as, unlike the saturated setting, there

Page 6: KD Validity IEEE 802 11

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

6 IEEE/ACM TRANSACTIONS ON NETWORKING

Fig. 4. Saturated collision probabilities. Experimental data.

Fig. 5. Unsaturated, small buffer collision probabilities. Experimental data.

are a large range of distinct models to choose from. Plotting thepredictions from any single model would not be particularly in-formative and could reasonably be considered unfair. The sig-nificant thing to note is that all of the models we cite assume that

for all backoff stages , so that if varies as a functionof , none can provide a perfect match.

Fig. 5 is a plot of the estimates for each backoff stagefor the tagged station in the unsaturated three-packet buffer casewith 5, and 10, with a network arrival rate of 800 packetsper second, equally distributed among the stations, corre-sponding to an offered load of 6.8 Mb/s. In comparison to thesaturated setting, the absolute variability estimates are similarwith as has been defined, giving for

for , and for . Thissuggests that (A2) is reasonably appropriate. There is, however,clear structure in the graphs. For each , the collision proba-bility appears to be dependent on the backoff stage. The colli-sion probability at the first backoff stage is higher than at the

Fig. 6. Unsaturated big-buffer collision probabilities. Experimental data.

zeroth stage. For stations that are unsaturated, we conjecturethat this occurs as many transmissions happen at backoff stage0 when no other station has a packet to send, so collisions areunlikely and is small. Conditioning on the first backoff stageis closely related to conditioning that at least one other stationhas a packet awaiting transmission, giving rise to a higher con-ditional collision probability at stage 1, so that .

Fig. 6 is analogous to Fig. 5, but for stations with 100-packetstation buffers. The networks are unsaturated with the queuesat each station repeatedly emptying. As with the small buffercase, we again have that and conjecture that this occursfor the same reasons. In comparison to the values reported inFigs. 4 and 5, the absolute variability is similar withfor for , and for ,but with being the average of , relative variability ofthe estimates in Fig. 6 is consistently higher than the saturatedcase: versus 0.17 for versus 0.23 for

, and versus 0.22 for . This suggest that (A2)is not as good an approximation in the presence of big stationbuffers.

In this section, we have investigated the veracity of the as-sumptions of independence and identical distribution of the out-comes of the collision attempt sequence. The findings are sum-marized in Table I. In the next section, we consider the addi-tional hypotheses introduced to model buffering.

V. ASSUMPTIONS (A3) AND (A4)

To model stations with buffers serving Poisson traffic, thecommon idea across various authors, e.g., [11]–[14], is to treateach station as a queueing system where the service time dis-tribution is identified with the MAC delay distribution basedon a Bianchi-like model. The assumptions (A1) and (A2) areadopted, so that given conditional collision probability , eachstation can be studied on its own, and a standard queueing theorymodel is used to determine the probability of attempted trans-mission , which is now also a function of the offered load.

Page 7: KD Validity IEEE 802 11

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

HUANG et al.: VALIDITY OF IEEE 802.11 MAC MODELING HYPOTHESES 7

Fig. 7. Unsaturated, big-buffer, queue-non-empty sequence normalized auto-covariances. Experimental data.

For symmetrically loaded stations with identical MAC parame-ters, the same network coupling equation as used in the saturatedsystem, , identifies the “real” operationalconditional collision probability .

Each time the MAC successfully transmits a packet, it checksto see if there is another packet in the buffer awaiting processing.Define if there is at least one packet awaiting pro-cessing after the th successful transmission or discard, and

if the buffer is empty. As it is technically challengingto fully model these queueing dynamics while still obtainingtractable equations that can be solved more quickly than a sim-ulation can be run, authors typically employ a second queueing-based decoupling assumption that can be distilled into the fol-lowing two hypotheses: (A3) the sequence consists of in-dependent random variables; and (A4) the sequence con-sists of identically distributed random variables, with

. The value of is identified with the steady-state proba-bility that an associated M/G/1 or M/G/1/B queueing system hasa nonempty buffer after a successful transmission (e.g., [27]).

Clearly, (A3) and (A4) are more speculative than (A1)and (A2), as both disregard obvious dependencies in the real

sequence, where is the number of suc-cessful transmissions from the tagged station. These occuras if there are two or more packets awaiting processing aftera successful transmission, there will still be another packetawaiting transmission after the next successful transmission,and in the presence of station buffers, the longer a packet hasbeen awaiting transmission, the more likely it is to have anotherwaiting in its buffer.

To investigate (A3), we evaluate the normalized autocovari-ance of the empirical sequences for5, and 10 with , and

, respectively. These autocovariances arereported in Fig. 7, where it can be seen that there is a smallamount of correlation structure, but that by lag 5 this is lessthan 0.2, and so we do not regard it as significant. As one wouldexpect, this is a function of the load. As stations become more

Fig. 8. Unsaturated, big-buffer, queue-non-empty probabilities. Note the largey-range. Experimental data.

heavily loaded, we have seen this correlation structure becomemore prevalent, until stations are saturated, whereupon thecorrelation disappears as for all .

To jointly test (A3) and (A4), again we use the Runs Teststatistic described in Appendix III. In comparison to the colli-sion sequences, the test statistics are even more extreme with397.46 for , 171.39 for , and 130.23 for .Thus, this test leads to p-values of 0 in all cases and the rejec-tion of an i.i.d. queue-busy sequence. As with the collision se-quences, it will be clear that this happens as dependson the backoff stage of the th successful transmission.

To investigate (A4), let denote the backoff stage at the thsuccessful transmission. With denoting the probability thereis another packet awaiting transmission after a successful trans-mission at backoff stage , its maximum likelihood estimator is

(2)

Although (A3) does not appear to hold at short lags, we canagain use Hoeffding’s bound to heuristically suggest we needat least 185 observations at a given backoff stage in order to beconfident in its accuracy.

Fig. 8 shows these estimates for all stations in each net-work. They show a strong increasing trend as a function ofbackoff stage. This is as one might expect, given that the longer apacket spends while awaiting successful transmission, the morelikely it is that there will be another packet awaiting processingwhen it is sent. Note that this dependency on backoff stage raisesquestions over all buffered models that adopt the assumption(A4). These findings are summarized in Table I.

VI. ASSUMPTIONS (A5) AND (A6)

The 802.11e standard, ratified in 2005, enables servicedifferentiation between traffic classes. Each station is equipped

Page 8: KD Validity IEEE 802 11

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

8 IEEE/ACM TRANSACTIONS ON NETWORKING

with up to four distinct queues, with each queue effectivelybeing treated as a distinct station. Each queue has its own MACparameters including minimum contention window ,retry limit, transmission opportunity (TXOP), and arbitrationinterframe space (AIFS). To model the first three of these,no additional modeling assumptions are necessary beyond(A1)–(A2) for saturated stations or for unsaturated stationswith small buffers (e.g., [10]). For unsaturated stations withlarge buffers, no additional assumptions are necessary beyond(A1)–(A4) (e.g., [14]). However, to capture the full power of802.11e’s service differentiation, one must model AIFS, andthis requires additional innovation and hypotheses [15]–[20].

Consider stations, each of which is serving oneof two traffic classes with distinct AIFS values: class onestations with and class 2 stations with

, where is the length of an idle slot and is apositive integer. After every attempted transmission, class-1 sta-tions decrement their backoff counters by a minimum of be-fore class-2 stations see the medium as being idle. If the backoffcounter of a class-1 station becomes 0 during these slots, itattempts transmission, and once it is complete, class-1 stationscan decrement their counters by at least another before class-2stations see the medium as being idle.

Consider a network of homogeneous saturated class-1 sta-tions and homogeneous class-2 stations. To model the impact ofdifferent AIFS values, using the terminology in [15], we havethe notion of hold states for class-2 stations. A class-2 stationis in a hold state if class-1 stations can decrement their coun-ters while it cannot. As all class-2 stations have the same AIFSvalue, they all experience the same class-1 preemption. Once ina hold state, they cannot begin to decrement their backoff coun-ters again (while class-1 stations continue to do so) unless allclass-1 stations are silent for consecutive slots.

Given class-2 stations have just entered a hold state, letrepresent the hold time: the number of slots that

pass before class-2 stations escape the hold states. Let de-note the sequence of observations of hold times. Implicitly, thecommonly adopted assumptions used to treat AIFS are: (A5)the sequence consists of independent random variables;and (A6) each element of the sequence is identically dis-tributed with the same distribution as defined in (3) and whichwe now derive.

Within the analytic modeling context, this escape from holdstates can be formalized mathematically. Let denote the sta-tionary probability a class-1 station attempts transmission. De-fine , which is the stationary probability that allclass-1 stations are silent (no class-1 station is attempting trans-mission). Let denote the sequence of hold states. Aftera transmission, whether successful or not, class-2 stations entera hold state, and this process starts in hold state . Ifthe medium is idle (no class-1 stations attempt transmission),which happens with probability , the station moves to holdstate , otherwise it is reset to , and so forth. Theprocess stops the first time that the hold state is reached,whereupon all class-2 stations see the medium as being idleand can decrement their counters. This system forms a Markovchain, portrayed in Fig. 9, with the transitionmatrix

Fig. 9. Markov chain for modeling a difference in AIFS of� slots.

......

......

......

......

...

With , we define to be thefirst time that the consecutive idle slots are observed. Usingthe form of the Markov chain, we have

(3)

Thus, is solely a function of and can be readilycalculated from in (3), albeit not in closed form unlessor .

Due to experimental instrumentation difficulties, the resultsin this section are based exclusively on ns-2 simulations. Inorder to determine how many slots the lower class stations havespent in hold states, it is necessary to know the start and finishtimes of every packet transmitted on the medium. In an exper-imental setup, no one station is in possession of this informa-tion, and due to the time-scales involved, accurate reconcilia-tion of the time-line from data recorded at each station is partic-ularly challenging. In simulation, however, this data is readilyaccessible.

For a saturated network, the methodology used to measureis as follows. For each station in the network, a timestamp

is recorded at the start and end of every transmission. Thesetimestamps are collected from all stations and combined intoa single ordered list: , where is the start timeof the th packet and is the end time. Define

for each . The hold times are determinedfrom this sequence by first identifying the indices at which thehold states are delineated: and

for each . The hold states are then the sum of thehold times between transmission, with the final term making acontribution of slots

where the empty sum is defined to be zero.

Page 9: KD Validity IEEE 802 11

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

HUANG et al.: VALIDITY OF IEEE 802.11 MAC MODELING HYPOTHESES 9

Fig. 10. Autocovariance for period of hold states for class-2 stations in a net-work of five class-1 and five class-2 saturated station with � � �, 12, 20, and32. ns-2 data.

To consider the independence assumption (A5), we assumethat the sequence of observed hold times arewide-sense stationary and plot this data’s autocovariance func-tion, thus investigating pair-wise dependence. For a network offive class-1 saturated stations and five class-2 saturated stationsthat are identical apart from , where

, 2, 4, 8, 12, 16, 20, and 32, these plots suggest thatthe sequences have little dependence at short lags. Fig. 10 isa representative graph shown for , 12, 20, and 32, with

, and, respectively. These values, particularly the

smaller ones, are typical of those proposed for traffic differenti-ation in the 802.11e standard [28]. As the autocovariance is lessthan 0.2 by lag 5, the independence assumption (A5) is not un-reasonable for differences in AIFS values that are proposed inthe standard.

To test the assumption (A6) that the probability density ofhold-state idle periods has the form given in (3), rather thanuse any specific model prediction for the distribution, as it is afunction of single parameter , we estimate based on thefollowing observation. Given , if the likelihood that all class-1stations do not transmit is i.i.d., then . Thissuggests using the following estimate of :

Note that, in using this estimate, we are ensuring thatcoincides with the empirical observation. However, unless

the model is accurate, for calculated from (3)need not coincide with the empirically observed value.

Figs. 11 and 12 show a sample of plots for a 10-station net-work, with five saturated stations in class 1 and five saturatedstations in class 2, for and

. Conditioned on having a good estimate of, the accuracy of the distribution-predicted (3) appears to be

remarkable. This apparent accuracy can be explored quantita-tively through a test statistic. We use the Kolmogorov–Smirnovtest (described in Appendix II), but do not give p-values, as our

Fig. 11. Empirical and predicted probability density for the length of a holdperiod for class-2 stations in a network of five class-1 and five class-2 saturatedstation with � � �. ns-2 data.

Fig. 12. Empirical and predicted probability density for the length of a holdperiod for class-2 stations in a network of five class-1 and five class-2 saturatedstation with � � ��. ns-2 data.

distribution is purely discrete. Fig. 13 plotsagainst for , 4, 8, and 12. It is clear from the graph thatthe discrepancies are small for moderate values of sample size.However, is not converging to 0 as be-comes large. This suggests that the predicted distribution of isaccurate for all practical purposes, even though the distributionis not a perfect fit. These findings are summarized in Table I.

VII. ASSUMPTIONS (A7) AND (A8)

The 802.11s standard is a draft amendment to enable wire-less mesh networks (WMNs). One approach to building a mul-tihop, multiradio mathematical model of a WMN that employs802.11 is to build on the mean-field Markov ideas, but with moreinvolved coupling that captures medium access dependenciesacross the mesh. In order to do so, it is necessary to make hy-potheses about the stochastic nature of the departures process

Page 10: KD Validity IEEE 802 11

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

10 IEEE/ACM TRANSACTIONS ON NETWORKING

Fig. 13. Largest discrepancy between empirical and predicted distributions,��� �� ��� � � ����, as a function of sample size �. � � �, 4, 8, and 12.ns-2 data.

Fig. 14. Saturated interdeparture-time-sequence normalized autocovariances.Experimental data.

from mesh points, as these form the arrivals processes to otherparts of the mesh.

Let denote the interdeparture times of packets from anelement of the network. That is, is the difference between thetime at which the th successful transmission and the thsuccessful transmission occurs from a tagged station. One hy-pothesis (e.g., [21]) is that if the arrivals process to the stationis Poisson, then the departure process is also Poisson. That is:(A7) is a stochastically independent sequence; and (A8)the elements of are exponentially distributed.

Having observed interdeparture times, ,we investigate these hypotheses. These times were recorded inthe same experiment as the collision data used in Section IV, so

where is reported in Table II. Figs. 14–16report the autocovariance for saturated arrivals, unsaturated ar-rivals with small buffers, and unsaturated arrivals with large sta-tion buffers for networks of , 5, and 10 stations, respec-

Fig. 15. Unsaturated, small-buffer, interdeparture-time-sequence normalizedautocovariances. Experimental data.

Fig. 16. Unsaturated, big-buffer, interdeparture-time-sequence normalized au-tocovariances. Experimental data.

tively. There is little dependency beyond short lags, suggestingthat the independence hypothesis (A7) is not inappropriate.

For hypothesis (A8) and unsaturated stations with largebuffers, due to space constraints, we only report the interde-parture time distributions for the network. These arerepresentative of our observations of other networks sizes.Fig. 17 plots the logarithm of one minus the empirical cumu-lative distribution function of the interdeparture times fromthe tagged station. Also plotted is the exponential distributioncorresponding to the empirical mean. It can be seen that theyoverlay each other nearly perfectly, suggesting that (A8) is agood hypothesis in this case. Note that this implies that in thelightly loaded, unsaturated big-buffer setting, the statistics ofa Poisson arrivals process is largely unaffected when passingthrough an 802.11 network element.

Fig. 18 reports the equivalent quantity for the small buffer ex-periment with , but here the network arrival rate of 800

Page 11: KD Validity IEEE 802 11

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

HUANG et al.: VALIDITY OF IEEE 802.11 MAC MODELING HYPOTHESES 11

Fig. 17. Unsaturated big-buffer interdeparture time distribution (log y-scale),� � �. Experimental data.

Fig. 18. Unsaturated small-buffer interdeparture time distribution (log y-scale),� � �. Experimental data.

packets per second is chosen to be in the regime near satura-tion. For , after the successful transmission of a packet,56% of the time there is another packet awaiting transmissionby the time the medium is sensed idle. The effective transitionbetween underloaded and saturated can be seen as short interde-parture times possess the features of MAC service times (convo-lutions of uniform distributions), whereas longer interdeparturetimes follow an exponential distribution. With a larger numberof stations and the same offered load shared evenly across sta-tions, this effect is less pronounced, and the interdeparture timeslook exponentially distributed. This effect is independent of thebuffering used and can also be observed within big buffer exper-iments when traffic loads are closer to saturation. Thus, again theevidence supports the assumption (A8) assumption if the net-work is away from saturation.

However, Fig. 19 reports the same plot for a saturated net-work. Clearly, the interdeparture times are not exponentially dis-tributed. This is unsurprising as when stations are saturated, the

Fig. 19. Saturated interdeparture time distribution (log y-scale), � � �. Ex-perimental data.

interdeparture times correspond to the MAC service times andBEB service times are not well approximated by an exponen-tial distribution. Qualitatively, the and net-works show the same features, where the (A8) assumption isappropriate for lightly loaded unsaturated networks, but inaccu-rate for saturated networks. This can be statistically substanti-ated through the use of a Kolmogorov–Smirnoff test. The nullhypothesis that the interdeparture times are exponentially dis-tributed is rejected unless one trims the data by conditioningsolely large interdeparture times or if the load is sufficientlylight.

VIII. DISCUSSION

Table I summarizes our conclusions. It seems appropriate atthis stage to discuss another fundamental assumption: (A0) allstations in the WLAN observe the same sequence of busy andidle slots on the medium. This assumption is a cornerstone ofall CSMA/CA models that allow idle slots to be of distinctreal-time length from collisions and successful transmissions,as is the case in 802.11 networks, and include collisions in theirconsiderations. Both p-persistent models and all of the mean-field models described here are based on this premise, which istrue in the absence of hidden nodes and interfering neighboringWLANs.

In order to model situations where (A0) is false, suchas relay topologies that do not have multiple radios and socannot mitigate interference at noncommunicating distances,new approximations are necessary (e.g., [29]–[32]). Someof these models also use mean-field ideas, usually inspiredby percolation theory, and typically assume away the BEBaspect of 802.11. This approach gives insight into scenariosthat are distinct from those that are amenable to analysis bythe models studied in the present paper, and, as suggestedto us by an anonymous referee, the appropriateness of thesemultihop mean-field approximations would be deserving of anexperimental investigation as they facilitate mathematical studyof situations that are otherwise analytically intractable. We donot pursue this in the present article due to space constraints.

Page 12: KD Validity IEEE 802 11

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

12 IEEE/ACM TRANSACTIONS ON NETWORKING

This validation of the standard decoupling assumptions, (A1)and (A2), for saturated networks helps to explain why the pre-dictions in [2]–[5] are so precise. Even though intuitively oneexpects the main model assumptions to be valid for large net-works, in fact they are accurate even for small networks. As theassumptions are reasonable, deductions from that model shouldbe able to make predictions regarding detailed quality-of-ser-vice metrics.

The (A1) assumption continues to hold for both the unsatu-rated setting with either small or big buffers, suggesting that theattempt sequences have little dependencies. With small buffers,the (A2) assumption that collision probabilities are independentof backoff stage appears to be valid for stations that are not sat-urated. There is, however, some structure with , but thisis not quantitatively significant. For larger buffers, this discrep-ancy is more apparent in both relative and absolute terms, sug-gesting that (A2) is an imprecise approximation in that setting.For large buffer models, this inaccuracy is less dramatic than thefailure of the additional queueing decoupling assumption (A3)and (A4).

Our investigations indicate that while (A3) is reasonable atlighter loads, neither (A3) or (A4) are appropriate in general. Inparticular, contradicting (A4), the probability that the queue isnonempty after a successful transmission is strongly dependenton backoff stage. Despite the apparent inappropriateness of theassumptions (A3) and (A4), models based on them continue tomake accurate predictions of goodput and average delay. Oneexplanation is that with an infinite buffer, unless the station issaturated, the goodput corresponds with the offered load. Thus,to have an accurate goodput model, it is only important that themodel be accurate when offered load leads a station to be nearlysaturated. Once saturated, (A4) is true as Bianchi’s model is re-covered. Thus, for goodput, the inaccuracy of the approximation(A4) is not significant if this phase transition is predicted by themodel. However, one would expect that for more subtle quan-tities the adoption of (A4) would lead to erroneous deductions.Clearly, caution must be taken when making deductions frombig buffer models that incorporate these hypotheses. Extrapola-tions of that kind from these models should be made with careby network designers.

The hold-state hypotheses that were introduced to incorporate802.11e AIFS differentiation in saturated networks are labeled(A5) and (A6). The independence hypothesis (A5) appears tobe appropriate. The distributional assumption (A6) appears tobe accurate for any difference in AIFS once one has a goodestimate of the probability that no higher class station attemptstransmission in a typical slot. This lends confidence to the useof these models for network design and detailed predictions.

The 802.11s mesh network assumptions (A7) and (A8) holdtrue for lightly loaded, unsaturated networks where stations canhave either large or small buffers. In particular, the output ofan unsaturated 802.11 station with Poisson arrivals again ap-pears to be nearly Poisson so long as saturation is not being ap-proached. If the station is saturated, however, the interdeparturetimes correspond to MAC delays, which are not similar to anexponential distribution. If stations are close to being saturated,short interdeparture times are similar to MAC delays, whereaslong interdeparture times correspond to long interarrival times

and are Poissonian. The impact of this non-Poisson traffic on theaccuracy of unsaturated model predictions must be investigatedbefore they can be used with confidence.

We also make a comment regarding experimentation. It waschallenging to emulate the fundamental explicit hypothesis ofall the models that we investigated: that of idealized channelconditions where errors occur only as a consequence of colli-sions. As 802.11 operates in an unlicensed range of the spectrumand other devices are free to operate in this range, these deviceslead to interference. There are extensions to the WLAN mod-eling paradigms that include failed transmissions due to noise onthe medium, e.g., [33]. This approach assumes that packet lossesdue to noise are i.i.d. and independent of all other stochastic pro-cesses in the model. Whether this assumption is appropriate isdependent on the particular environment at hand and, clearly,cannot be subject to general validation.

Due to the failure of several of these fundamental hypotheses,clearly there is more work to be done on analytic modeling of802.11. In particular, models that incorporate buffers at stationsare based on flawed hypotheses, but are important for networkdesigners. We suggest that it is an important challenge for theanalytic modeling community to revisit and revise models basedon these inappropriate assumptions.

Based on the observations in this article, for example, a nat-ural alternative to (A3) and (A4) is to use the approximationthat: (A3 ) given is an independent sequence;and (A4 ) given . As a first step inthis direction, in [34], negative consequences of adopting theassumptions (A3) and (A4) are identified. A typical validationscenario employed by modelers is to consider a symmetricallyloaded network. While this is unlikely to occur in practice, math-ematically it leads to homogeneous fixed-point equations whosesolutions can be quickly identified by standard numerical tech-niques. For stations that are asymmetrically loaded, results in[34] demonstrate that a model based on these assumptions pro-vides inaccurate throughput predictions. That this is a conse-quence of (A3) and (A4) is established by considering the set-ting where all stations can buffer one packet beyond the MAC, asit is then possible to analyze a model based on (A3 ) and (A4 ).

Finally, we expect that other researchers will have alternatehypotheses that they wish to check. To facilitate this research,all the data used in the present study is available at: http://www.hamilton.ie/kaidi/.

APPENDIX IBRIEF OVERVIEW OF 802.11’S BEB ALGORITHM

On detecting the wireless medium to be idle for a periodDIFS, each station initializes a counter to a random number se-lected uniformly in the range . Time isslotted, and this counter is decremented once during each slotthat the medium is observed idle. The countdown halts whenthe medium becomes busy and resumes after the medium is idleagain for a period DIFS. Once the counter reaches zero, the sta-tion attempts transmission, and if a collision does not occur, itcan transmit for a duration up to a maximum period TXOP (de-fined to be one packet except in the Quality-of-Service MAC ex-

Page 13: KD Validity IEEE 802 11

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

HUANG et al.: VALIDITY OF IEEE 802.11 MAC MODELING HYPOTHESES 13

tension 802.11e). If two or more stations attempt to transmit si-multaneously, a collision occurs. Colliding stations double theircontention window (CW) (up to a maximum value), select a newbackoff counter uniformly, and the process repeats. If a packetexperiences more collisions than the retry limit (11 in 802.11b),the packet is discarded. After the successful transmission of apacket or after a packet discard, CW is reset to its minimal value

, and a new countdown starts regardless of the presenceof a packet at the MAC. If a packet arrives at the MAC afterthe countdown is completed, the station senses the medium.If the medium is idle, the station attempts transmission imme-diately; if it is busy, another backoff counter is chosen fromthe minimum interval. This bandwidth saving feature is calledpost-backoff. The revised 802.11e MAC enables the values ofDIFS (called AIFS in 802.11e), , and TXOP to be seton a per-class basis for each station. That is, traffic is directedto up to four different queues at each station, with each queueassigned different MAC parameter values.

APPENDIX IITESTING GOODNESS OF FIT

Given a sequence of observations of independent and identi-cally distributed random variables , we wish to testthe hypothesis that the have common distribution . Fordiscrete-valued random variables taking distinct values, weuse Pearson’s -test (e.g., [35]) Assume a null hypothesis that

has a distribution such that , where isa collection of parameters estimated from the data. For eachpossible outcome , define

and

For large sample sizes , the test statistic has a distribu-tion with between and degrees of freedom.We use the later, more stringent test to determine the p-value

.For real-valued random variables and unbounded random

variables with a discrete distribution, we evaluate the Kol-mogorov–Smirnov statistic (e.g., [35] and [36]). We can use theformer to determine a test for goodness of fit, but exact criticallevels are not possible to determine for the latter [37]. Let

denote the empirical distribution given observations. Thedistance is the greatest discrep-

ancy between the two distributions. It is used in the Kol-mogorov–Smirnov test based on the observation that if thenull hypothesis that are identically distributed were true,then is of order and, in particular,

. If is continuous, we also have thefollowing weak convergence result:

where is a Brownian bridge [38] from which a p-value canbe determined.

APPENDIX IIIRUNS TEST FOR BINARY VALUED RANDOM VARIABLES

If are binary-valued random variables, then the null hy-pothesis that the sequence is independent and identically dis-tributed can be efficiently tested using the Runs Test [39], [35].Given a sequence of observations , a run is definedto be a maximal nonempty segment of the sequence consistingof adjacent equal elements. Let be the number of runs in

, and define

Then, under the null hypothesis, is asymp-totically normally distributed. Thus, given the sequence of ob-servations , one evaluates , and the p-value for thenull hypothesis is ,where is a normally distributed random variable.

ACKNOWLEDGMENT

The authors thank the anonymous reviewers for their helpfulcomments and suggestions.

REFERENCES

[1] K. D. Huang, K. R. Duffy, D. Malone, and D. J. Leith, “Investigatingthe validity of IEEE 802.11 MAC modeling hypotheses,” in Proc. IEEEPIMRC, Cannes, France, 2008, pp. 1–6.

[2] G. Bianchi, “IEEE 802.11—Saturated throughput analysis,” IEEECommun. Lett., vol. 2, no. 12, pp. 318–320, Dec. 1998.

[3] G. Bianchi, “Performance analysis of IEEE 802.11 distributed coor-dination function,” IEEE J. Sel. Areas Commun., vol. 18, no. 3, pp.535–547, Mar. 2000.

[4] F. Cali, M. Conti, and E. Gregori, “Dynamic tuning of the IEEE 802.11protocol to achieve a theoretical throughput limit,” IEEE/ACM Trans.Netw., vol. 8, no. 6, pp. 785–799, Dec. 2000.

[5] F. Cali, M. Conti, and E. Gregori, “IEEE 802.11 protocol: Design andperformance evaluation of an adaptive backoff mechanism,” IEEE J.Sel. Areas Commun., vol. 18, no. 9, pp. 1774–1786, Sep. 2000.

[6] G.-S. Ahn, A. T. Campbell, A. Veres, and L.-H. Sun, “Supporting ser-vice differentiation for real-time and best-effort traffic in stateless wire-less ad hoc networks (SWAN),” IEEE Trans. Mobile Comput., vol. 1,no. 3, pp. 192–207, Jul.–Sep. 2002.

[7] M. Ergen and P. Varaiya, “Throughput analysis and admission controlin IEEE 802.11a,” Mobile Netw. Appl., vol. 10, no. 5, pp. 705–716,2005.

[8] J. Hui and M. Devetsikiotis, “A unified model for the performance anal-ysis of IEEE 802.11e EDCA,” IEEE Trans. Commun., vol. 53, no. 9,pp. 1498–1510, Sep. 2005.

[9] K. Duffy, D. Malone, and D. J. Leith, “Modeling the 802.11 distributedcoordination function in non-saturated conditions,” IEEE Commun.Lett., vol. 9, no. 8, pp. 715–717, Aug. 2005.

[10] D. Malone, K. Duffy, and D. J. Leith, “Modeling the 802.11 distributedcoordination function in non-saturated heterogeneous conditions,”IEEE/ACM Trans. Netw., vol. 15, no. 1, pp. 159–172, Feb. 2007.

[11] H. Zhai, Y. Kwon, and Y. Fang, “Performance analysis of IEEE802.11 MAC protocols in wireless LANs,” Wireless Commun. MobileComput., vol. 4, no. 8, pp. 917–931, 2004.

Page 14: KD Validity IEEE 802 11

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

14 IEEE/ACM TRANSACTIONS ON NETWORKING

[12] G. R. Cantieni, Q. Ni, C. Barakat, and T. Turletti, “Performance anal-ysis under finite load and improvements for multirate 802.11,” Comput.Commun., vol. 28, no. 10, pp. 1095–1109, 2005.

[13] C. G. Park, D. H. Han, and S. J. Ahn, “Performance analysis of MAClayer protocols in the IEEE 802.11 wireless LAN,” Telecommun. Syst.,vol. 33, no. 1–3, pp. 233–253, 2006.

[14] K. Duffy and A. J. Ganesh, “Modeling the impact of buffering on 802.11,” IEEE Commun. Lett., vol. 11, no. 2, pp. 219–221, Feb. 2007.

[15] B. Li and R. Battiti, “Supporting service differentiation with enhance-ments of the IEEE 802.11 MAC protocol: Models and analysis,” Uni-versity of Trento, Trento, Italy, Tech. Rep. DIT-03-024, May 2003.

[16] J. W. Robinson and T. S. Randhawa, “Saturation throughput analysisof IEEE 802.11e enhanced distributed coordination function,” IEEE J.Sel. Areas Commun., vol. 22, no. 5, pp. 917–928, Jun. 2004.

[17] Z. Kong, D. H. K. Tsang, B. Bensaou, and D. Gao, “Performance anal-ysis of IEEE 802.11e contention-based channel access,” IEEE J. Sel.Areas Commun., vol. 22, no. 10, pp. 2095–2106, Dec. 2004.

[18] P. E. Engelstad and O. N. Østerbø, “Non-saturation and saturationanalysis of IEEE 802.11e EDCA with starvation prediction,” in Proc.MSWiM, 2005, pp. 224–233.

[19] P. Clifford, K. Duffy, J. Foy, D. J. Leith, and D. Malone, “Modeling802.11e for data traffic parameter design,” in Proc. RAWNET, 2006,pp. 1–10.

[20] X. Chen, H. Zhai, X. Tian, and Y. Fang, “Supporting QoS in IEEE802.11e wireless LANs,” IEEE Trans. Wireless Commun., vol. 5, no.8, pp. 2217–2227, Aug. 2006.

[21] K. Duffy, D. J. Leith, T. Li, and D. Malone, “Modeling 802.11 meshnetworks,” IEEE Commun. Lett., vol. 10, no. 8, pp. 635–637, Aug.2006.

[22] D. P. Bertsekas and R. G. Gallager, Data Networks, 2nd ed. UpperSaddle River, NJ: Prentice-Hall, 1991.

[23] G. Bianchi, A. Di Stefano, C. Gianconia, and L. Scalia, “Experimentalassessment of the backoff behavior of commercial IEEE 802.11 b net-work,” in Proc. IEEE INFOCOM, 2007, pp. 1181–1189.

[24] D. Giustiniano, G. Bianchi, L. Scalia, and I. Tinnirello, “An explana-tion for unexpected 802.11 outdoor link-level measurement results,” inProc. IEEE INFOCOM, 2008, pp. 2432–2440.

[25] IEEE. Wirless LAN Medium Access Control (MAC) and Physical Layer(PHY) Specifications, IEEE Std 802.11-1997, 1997.

[26] W. Hoeffding, “Probability inequalities for sums of bounded randomvariables,” J. Amer. Statist. Assoc., vol. 58, pp. 13–30, 1963.

[27] S. Asmussen, Applied Probability and Queues. New York: Springer-Verlag, 2003, vol. 51.

[28] IEEE. Wirless LAN Medium Access Control (MAC) and Physical Layer(PHY) Specifications: Medium Access Control (MAC) Enhancementsfor Quality of Service (QoS), IEEE Std 802.11e, 2005, edition.

[29] G. Hauksson and M. Alanyali, “Wireless medium access via adap-tive backoff: Delay and loss minimization,” in Proc. IEEE INFOCOM,2008, pp. 1777–1785.

[30] O. Dousse, M. Durvy, and P. Thiran, “Self-organization properties ofCSMA/CA systems and their consequences on fairness,” IEEE Trans.Inf. Theory, vol. 55, no. 3, pp. 931–943, Mar., 2009.

[31] O. Dousse, P. Thiran, and M. Durvy, “On the fairness of large CSMAnetworks,” IEEE J. Sel. Areas Commun., vol. 27, no. 7, pp. 1093–1104,Sep. 2009.

[32] C. Bordenave, S. Foss, and V. Shneer, “A random multiple access pro-tocol with spatial interactions,” J. Appl. Probab., vol. 46, pp. 844–865,2009.

[33] Q. Ni, T. Li, T. Turletti, and Y. Xiao, “Saturation throughput analysisof error-prone 802.11 wireless networks,” J. Wireless Commun. MobileComput., vol. 5, no. 8, pp. 945–957, 2005.

[34] K. D. Huang and K. R. Duffy, “On a buffering hypothesis in 802.11analytic models,” IEEE Commun. Lett., vol. 13, no. 5, pp. 312–314,May 2009.

[35] D. O. Wackerly, W. Mendenhall, and R. L. Scheaffer, MathematicalStatistics With Applications. Pacific Grove, CA: Duxbury, 2001, vol.6.

[36] A. N. Pettitt and M. A. Stephens, “The Kolmogorov–Smirnov good-ness-of-fit statistic with discrete and grouped data,” Metrika, vol. 19,no. 2, pp. 205–210, 1977.

[37] W. J. Conover, “A Kolmogorov goodness-of-fit test for discontinuousdistributions,” J. Amer. Statist. Assoc., vol. 67, pp. 591–596, 1972.

[38] P. Billingsley, Convergence of Probability Measures, ser. Probabilityand Statistics, 2nd ed. New York: Wiley, 1999.

[39] A. M. Mood, “The distribution theory of runs,” Ann. Math. Statist., vol.11, pp. 367–392, 1940.

Kaidi Huang received the B.E. degree in opticalcommunication and engineering and the B.A. degreein law science from the University of Electronic andScientific Technology of China, Chengdu, China, in2006, and the M.S. degree with distinction in signalprocessing and communications from the Universityof Edinburgh, Edinburgh, U.K., in 2007. He is cur-rently a Ph.D. student at Hamilton Institute, NationalUniversity of Ireland, Maynooth, Maynooth, Ireland.His research interests include both wireless andoptical communication systems.

Ken R. Duffy received the B.A. (mod) and Ph.D. de-grees in mathematical science from Trinity College,Dublin, Ireland, in 1996 and 2000, respectively.

Since 2006, he has been a member of facultywith the Hamilton Institute of the National Univer-sity of Ireland, Maynooth, Maynooth Ireland. Hiswide-ranging research interests encompass appliedprobability, mathematical statistics, theoreticalimmunology, and mathematical applications tostochastic models of communication networks andqueueing systems.

David Malone received the B.A. (mod), M.Sc.,and Ph.D. degrees in mathematics from TrinityCollege, Dublin, Ireland, in 1996, 1997, and 2000,respectively.

During his time as a post-graduate, he became amember of the FreeBSD development team. He isa Science Foundation Ireland Stokes Lecturer withHamilton Institute, National University of Ireland,Maynooth, Maynooth, Ireland. His interests includemathematics of networks, network measurement,IPv6, and systems administration. He is a coauthor

of IPv6 Network Administration (Sebastopol, CA: O’Reilly, 2005).