- •Introduction
- •Increasing Demand for Wireless QoS
- •Technical Approach
- •Outline
- •The Indoor Radio Channel
- •Time Variations of Channel Characteristics
- •Orthogonal Frequency Division Multiplexing
- •The 5 GHz Band
- •Interference Calculation
- •Error Probability Analysis
- •Results and Discussion
- •IEEE 802.11
- •IEEE 802.11 Reference Model
- •IEEE 802.11 Architecture and Services
- •Architecture
- •Services
- •802.11a Frame Format
- •Medium Access Control
- •Distributed Coordination Function
- •Collision Avoidance
- •Post-Backoff
- •Recovery Procedure and Retransmissions
- •Fragmentation
- •Hidden Stations and RTS/CTS
- •Synchronization and Beacons
- •Point Coordination Function
- •Contention Free Period and Superframes
- •QoS Support with PCF
- •The 802.11 Standards
- •IEEE 802.11
- •IEEE 802.11a
- •IEEE 802.11b
- •IEEE 802.11c
- •IEEE 802.11d
- •IEEE 802.11e
- •IEEE 802.11f
- •IEEE 802.11g
- •IEEE 802.11h
- •IEEE 802.11i
- •Overview and Introduction
- •Naming Conventions
- •Enhancements of the Legacy 802.11 MAC Protocol
- •Transmission Opportunity
- •Beacon Protection
- •Direct Link
- •Fragmentation
- •Traffic Differentiation, Access Categories, and Priorities
- •EDCF Parameter Sets per AC
- •Minimum Contention Window as Parameter per Access Category
- •Maximum TXOP Duration as Parameter per Access Category
- •Collisions of Frames
- •Other EDCF Parameters per AC that are not Part of 802.11e
- •Retry Counters as Parameter per Access Category
- •Persistence Factor as Parameter per Access Category
- •Traffic Streams
- •Default EDCF Parameter Set per Draft 4.0, Table 20.1
- •Hybrid Coordination Function, Controlled Channel Access
- •Controlled Access Period
- •Improved Efficiency
- •Throughput Improvement: Contention Free Bursts
- •Throughput Improvement: Block Acknowledgement
- •Delay Improvement: Controlled Contention
- •Maximum Achievable Throughput
- •System Saturation Throughput
- •Modifications of Bianchi’s Legacy 802.11 Model
- •Throughput Evaluation for Different EDCF Parameter Sets
- •Lower Priority AC Saturation Throughput
- •Higher Priority AC Saturation Throughput
- •Share of Capacity per Access Category
- •Calculation of Access Priorities from the EDCF Parameters
- •Markov Chain Analysis
- •The Priority Vector
- •Results and Discussion
- •QoS Support with EDCF Contending with Legacy DCF
- •1 EDCF Backoff Entity Against 1 DCF Station
- •Discussion
- •Summary
- •1 EDCF Backoff Entity Against 8 DCF Stations
- •Discussion
- •Summary
- •8 EDCF Backoff Entities Against 8 DCF Stations
- •Discussion
- •Summary
- •Contention Free Bursts
- •Contention Free Bursts and Link Adaptation
- •Simulation Scenario: two Overlapping QBSSs
- •Throughput Results with CFBs
- •Throughput Results with Static PHY mode 1
- •Delay Results with CFBs
- •Conclusion
- •Radio Resource Capture
- •Radio Resource Capture by Hidden Stations
- •Solution
- •Mutual Synchronization across QBSSs and Slotting
- •Evaluation
- •Simulation Results and Discussion
- •Conclusion
- •Prioritized Channel Access in Coexistence Scenarios
- •Saturation Throughput in Coexistence Scenarios
- •MSDU Delivery Delay in Coexistence Scenarios
- •Scenario
- •Simulation Results and Discussion
- •Conclusions about the HCF Controlled Channel Access
- •Summary and Conclusion
- •ETSI BRAN HiperLAN/2
- •Reference Model (Service Model)
- •System Architecture
- •Medium Access Control
- •Interworking Control of ETSI BRAN HiperLAN/2 and IEEE 802.11
- •CCHC Medium Access Control
- •CCHC Scenario
- •CCHC and Legacy 802.11
- •CCHC Working Principle
- •CCHC Frame Structure
- •Requirements for QoS Support
- •Coexistence Control of ETSI BRAN HiperLAN/2 and IEEE 802.11
- •Conventional Solutions to Support Coexistence of WLANs
- •Coexistence as a Game Problem
- •The Game Model
- •Overview
- •The Single Stage Game (SSG) Competition Model
- •The Superframe as SSG
- •Action, Action Space A, Requirements vs. Demands
- •Abstract Representation of QoS
- •Utility
- •Preference and Behavior
- •Payoff, Response and Equilibrium
- •The Multi Stage Game (MSG) Competition Model
- •Estimating the Demands of the Opponent Player
- •Description of the Estimation Method
- •Evaluation
- •Application and Improvements
- •Concluding Remark
- •The Superframe as Single Stage Game
- •The Markov Chain P
- •Illustration and Transition Probabilities
- •Definition of Corresponding States and Transitions
- •Solution of P
- •Collisions of Resource Allocation Attempts
- •Transition Probabilities Expressed with the QoS Demands
- •Average State Durations Expressed with the QoS Demands
- •Result
- •Evaluation
- •Conclusion
- •Definition and Objective of the Nash Equilibrium
- •Bargaining Domain
- •Core Behaviors
- •Available Behaviors
- •Strategies in MSGs
- •Payoff Calculation in the MSGs, Discounting and Patience
- •Static Strategies
- •Definition of Static Resource Allocation Strategies
- •Experimental Results
- •Scenario
- •Discussion
- •Persistent Behavior
- •Rational Behavior
- •Cooperative Behavior
- •Conclusion
- •Dynamic Strategies
- •Cooperation and Punishment
- •Condition for Cooperation
- •Experimental Results
- •Conclusion
- •Conclusions
- •Problem and Selected Method
- •Summary of Results
- •Contributions of this Thesis
- •Further Development and Motivation
- •IEEE 802.11a/e Simulation Tool “WARP2”
- •Model of Offered Traffic and Requirements
- •Table of Symbols
- •List of Figures
- •List of Tables
- •Abbreviations
- •Bibliography
5.1 HCF Contention-based Channel Access |
65 |
alistically high modulation values. The results in this section are obtained through analytical calculations and stochastic simulation, without taking the capacity loss through regular beacon transmissions into account. The small variations of the throughput curves in Figure 5.2 are the results of the bit padding into OFDM symbols. A perfect radio channel is assumed.
5.1.2System Saturation Throughput
The system saturation throughput Thrpsat is defined as expected sum of all MSDU throughputs of contending backoff entities that are saturated with traffic load so that all entities have always MSDUs to deliver, queues are never empty.
In Appendix D, an approximate analysis is presented based on a Markov model to calculate the saturation throughput of a number of contending backoff entities. The approximation is based on Bianchi (1998a, 1998b, 2000) and in this thesis referred to as Bianchi’s legacy 802.11 model. Hettich (2001) uses Bianchi’s legacy 802.11 model and extends it for the analysis of not only the throughput, but also the backoff delay. To evaluate the concepts of the EDCF contention window, Bianchi’s legacy 802.11 model is modified in the following. The focus of the discussion is the throughput approximation.
5.1.2.1Modifications of Bianchi’s Legacy 802.11 Model
To model the saturation throughput of an EDCF backoff entity instead of a legacy station, some modifications of Bianchi’s legacy 802.11 model are required.
|
50 |
highest pr. |
|
w/o address 4, w/o WEP, |
||
(Mbit/s) |
|
legacy pr. |
|
w/o RTS/CTS |
||
|
lower pr. |
|
||||
|
|
|
|
|
||
40 |
|
|
|
|
|
|
|
|
|
|
|
|
|
thrp. |
|
|
|
|
|
64QAM3/4 |
30 |
|
|
|
|
|
|
achievable |
|
|
|
|
|
|
20 |
|
|
|
|
16QAM1/2 |
|
|
|
|
|
|
|
|
max. |
10 |
|
|
|
|
|
|
|
|
|
|
BPSK1/2 |
|
|
|
|
|
|
|
|
|
0 |
500 |
1000 |
1514 |
2000 |
2304 |
|
100 |
frame body size (bytes)
|
50 |
highest pr. |
|
w/o address 4, w/o WEP, |
||
thrp. (Mbit/s) |
|
legacy pr. |
|
with RTS/CTS |
||
|
lower pr. |
|
||||
|
|
|
|
|
||
40 |
|
|
|
|
|
|
30 |
|
|
|
|
64QAM3/4 |
|
achievable |
|
|
|
|
||
20 |
|
|
|
|
16QAM1/2 |
|
|
|
|
|
|
||
|
|
|
|
|
|
|
max. |
10 |
|
|
|
|
|
|
|
|
|
|
BPSK1/2 |
|
|
|
|
|
|
|
|
|
0 |
500 |
1000 |
1514 |
2000 |
2304 |
|
100 |
frame body size (bytes)
lines: analytics, markers: WARP2 simulation results
Figure 5.2: Maximum achievable throughput for three PHY modes, and three EDCF parameter settings. Left: most optimistic situation. Right: realistic situation with RTS/CTS, WEP encryption and use of optional address 4. Analytical and simulation results.
66 |
5. Evaluation of IEEE 802.11e with the IEEE 802.11a Physical Layer |
max. achievable thrp. (Mbit/s)
200 legacy pr.
w/o address 4, w/o WEP, |
|
|
|
||
w/o RTS/CTS |
|
|
|
oo−QAM |
|
111 |
|
|
|
|
|
100 |
|
|
|
|
|
50 |
|
|
|
|
1024QAM3/4 |
|
|
|
|
256QAM3/4 |
|
|
|
|
|
|
|
|
|
|
|
|
64QAM3/4 |
0 |
500 |
1000 |
1514 |
2000 |
2304 |
100 |
|
200 |
|
|
|
|
oo−QAM |
(Mbit/s) |
188 |
|
|
|
|
|
|
highest pr. |
|
|
|
||
|
|
|
|
|
|
|
thrp. |
w/o address 4, w/o WEP, |
|
|
|
||
w/o RTS/CTS |
|
|
|
|
||
achievable |
|
|
|
|
||
100 |
|
|
|
|
|
|
|
|
|
|
|
1024QAM3/4 |
|
50 |
|
|
|
|
256QAM3/4 |
|
max. |
|
|
|
|
||
|
|
|
|
|
64QAM3/4 |
|
|
|
|
|
|
|
|
|
0 |
500 |
1000 |
1514 |
2000 |
2304 |
|
100 |
frame body size (bytes) |
frame body size (bytes) |
lines: analytical results
Figure 5.3: Maximum achievable throughput and its upper limit for higher PHY modes, which are not part of the 802.11 standard. Left: DCF (legacy priority) configuration. Right: EDCF (highest pr.) configuration. The results are obtained with the analytical model only.
In Equation (D.1), the parameter i is the backoff stage, and m is the maximum value of the backoff stage. The contention window sizes Wi , i = 0…m and the maximum number of backoff stages m are dependent on the EDCF parameter set, individually defined per AC. Further, since the Persistence Factor (PF) can also be included in the modified model as well -although it is not part of 802.11ethis parameter has to be considered in the equation. The modifications are as follows. The size of the contention window in 802.11e is calculated by
W |
[AC ]= PF [AC ]min(i ,m[AC ]) W , i 0,1,…m [AC ]. |
(5.1) |
i |
0 |
|
The probability that transmission attempts of a single backoff entity at a particular slot are unsuccessful due to collision is denoted by p. As in the approach to model the legacy 802.11, it is in the following assumed that this probability is independent of the contention window size. ForWi ≥1 , the persistence factor is incorporated in Equation (D.4) by considering Equation (5.1):
|
|
|
m |
|
Wi −1 W −k |
|
|
|
|
|
|
|
|
|||||
1 = ∑ |
bi ,0 |
∑ |
|
i |
|
, Wi ≥1 |
0 ≤ i ≤ m, m ≥ 0 |
|
|
|||||||||
|
W |
|
|
|||||||||||||||
|
i =0 |
|
k=0 |
|
|
|
|
|
|
|
|
|
||||||
|
i |
|
|
|
|
|
|
|
|
|||||||||
|
|
1 |
|
m |
|
|
|
|
|
|
|
|
|
|
|
|
||
1 = |
|
|
∑bi ,0 (Wi |
+1) |
|
|
|
|
|
|
|
|
|
|||||
2 |
|
|
|
|
|
|
|
|
(5.2) |
|||||||||
|
|
i =0 |
|
|
|
|
|
|
|
|
|
|
|
|||||
|
|
|
b0,0 |
|
|
|
|
|
|
|
1 |
|
|
(PF [AC ] p) |
m |
|
||
= |
W0 m∑−1 |
(PF [AC ] p)i + |
|
+W0 |
|
|
, |
|||||||||||
|
|
−p |
1 −p |
|||||||||||||||
|
2 |
|
|
i =0 |
|
|
1 |
|
|
|
|
|||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
with m ≥ 0,W0 ≥1.