• 沒有找到結果。

Maximum traffic scheduling and capacity analysis for IEEE 802.15.3 high data rate MAC protocol

N/A
N/A
Protected

Academic year: 2021

Share "Maximum traffic scheduling and capacity analysis for IEEE 802.15.3 high data rate MAC protocol"

Copied!
5
0
0

加載中.... (立即查看全文)

全文

(1)

Maximum Traffic Scheduling and Capacity Analysis

for IEEE 802.15.3 High Data Rate MAC Protocol

Yi-Hsien Tseng

, Eric Hsiao-kuang Wu

and Gen-Huey Chen

Department of Computer Science and Information Engineering, National Taiwan University, Taipei, Taiwan. Email: yhtseng@inrg.csie.ntu.edu.tw, ghchen@csie.ntu.edu.tw

Department of Computer Science and Information Engineering, National Central University, Taipei, Taiwan. Email: hsiao@csie.ncu.edu.tw

Abstract— IEEE 802.15.3 is designed to provide low

com-plexity, low cost, low power consumption and high data rate wireless connectivity among devices within wireless personal area networks (WPAN). A piconet is a basic topology of WPAN and is defined as a collection of one or more associated devices that share a single piconet coordinator (PNC). One functionality of a PNC is to schedule traffic of a piconet. But the scheduling method of a PNC is out of the scope of IEEE 802.15.3 draft standard. This paper proposes a scheduling method which is called Maximum Traffic (MT) scheduling for IEEE 802.15.3. MT scheduling guarantees that total transmission data is maximum at any point of time and the needed time slots for transmission is minimum. MT scheduling is designed and analyzed by the prop-erties of a graph coloring problem. Furthermore, the reasonable number of devices for a piconet and the durations of Contention Access Period (CAP) and Contention Free Period (CFP) are also investigated by this paper.

I. INTRODUCTION

IEEE 802.15.3 [1] draft standard defines the PHY and MAC specifications for high data rate wireless networks. The MAC protocol of IEEE 802.15.3 supports both isochronous and asynchronous data types and is designed to support additional physical layers such as UWB [4][8]. The 802.15.3 MAC mainly works within a piconet. A piconet is defined as a wireless ad hoc data communications system which allows a number of independent data devices (DEVs) to communicate with each other. The DEV is the basic component of a piconet. One DEV is required to be a piconet coordinator (PNC) of a piconet. The PNC provides the basic timing and additional information for a piconet via the beacon which is broadcasted at the beginning of a superframe period.

The PNC broadcasts the information of all of the DEVs periodically and updates information for the new DEV in the beacon when a new DEV joins a piconet. This allows other DEVs in the piconet to be aware of the new DEV and introduces the new DEV about the members of the piconet as well. The 802.15.3 MAC provides a hand over function for the transition of the old PNC to the new PNC. When a DEV associates with an existing piconet, the PNC checks the capabilities of the new DEV. If the new DEV is more capable, then the PNC has the option of handing over control of the piconet to the DEV that has just joined.

Timing for data transmission in the piconet is based on the superframe. A superframe consists of three parts:

1) The beacon: Set the timing allocations and communicate management information for the piconet.

2) The contention access period (CAP): Communicate commands and/or asynchronous data if it is present in the superframe. The CSMA/CA protocol is applied in this window.

3) The contention free period (CFP): Communicate com-mands, isochronous streams and asynchronous data. This window is TDMA based.

The length of CAP is dynamic and determined by the PNC. All data in the piconet is exchanged in a peer-to-peer manner. The DEVs communicate data either in CAP or CFP. If a DEV needs channel time from CFP, it makes a request from the PNC for channel time (i.e. CFP time slot). Then the PNC allocates time in a guaranteed time slot (GTS) for the DEV as the resources are available. In other words, all communicating data in CFP must be allocated by the PNC. Furthermore, the 802.15.3 MAC provides a functionality of controlling transmit power. The PNC is allowed to determine a maximum transmit power for CAP and beacon; meanwhile, all DEVs are allowed to calculate individual minimum transmit powers to reach the target DEVs.

Since IEEE 802.15.3 is designed to support new generation physical layers such as UWB which offers the precise position location, this paper assumes that a PNC can calculate the relative positions [3][5] of all DEVs of a piconet. By this assumption, we propose a MT scheduling scheme which guarantees maximum traffic and minimum needed time slots. In addition, this paper gives the analysis for the duration of CAP and GTS (Guaranteed Time Slot). The main contributions are including: (1) the determination of the upper bound of required time slots for a traffic-saturated network and (2) the quantitative analysis which is adopted to determine the lengths of CAP.

II. MOTIVATIONS

Different scheduling methods carry distinct criterions. This paper proposes the Maximal Traffic (MT) scheduling scheme which is based on two criterions. First, the total transmission data is maximal at any point of time. The other one is that the number of time slots of a superframe is the least.

The main idea of the MT scheduling is illustrated in Figure 1. Suppose that there are four links to be scheduled, and three

(2)

Slot 1 Slot 2 Slot 3 Slot 4 Slot 1 Slot 2

Link 1 Link 2 Link 3 Link 4 Link 1

Link 4

: acquisition time + guard time

(A) (B)

Link 2 Link 3

Fig. 1. Benefits of MT scheduling: (A) general scheduling vs. (B) MT

scheduling.

of them are independent transmit-receive pairs (could transmit simultaneously without causing interference). Figure 1.(A) is a general scheduling, and we can see that the required number of time slots for transmission is four. Furthermore, the time for channel acquisition and TDMA guard time is 4 time units. The MT scheduling puts the independent transmit-receive pairs into the same time slot and could extend the transmission length according to the number of independent pairs which are in the same time slot (Figure 1.(B)). The time for channel acquisition and TDMA guard time will be reduced to two time units and the time slot length for three independent pairs is increased to three times of the original one.

CAP

beacon MTS 1 MTS 2 GTS 1 GTS 2GTS 3 ... GTS n

16 micro-sec -- 65535 mico-sec superframe

CSMA/CA slotted aloha TDMA trade off

... ...

Fig. 2. The superframe of 802.15.3 MAC.

The superframe of IEEE 802.15.3 is illustrated as Figure 2. MTSs are used for control information exchanges between DEVs and the PNC. GTSs are utilized for traffic communi-cations between the DEVs. The access protocol for MTS is slotted aloha that provides more quick access than CSMA/CA. The more length of CAP or MTS is, the more DEVs can submit requirements for slots. However, it causes less time slots for transmitting. Therefor, analyzing the optimal lengths of CAP, MTS and GTS is critifcal for IEEE 802.15.3. The main purpose of MTS is designed to support quick registration and is out of the scope of this paper. Therefor we focus on giving probability models to analyze the length of CAP during which only channel request packets are allowed to be exchanged.

III. RELATEDWORK ANDANALYSISMODEL

This section describes and derives a probability model for CAP of IEEE 802.15.3. First, a previous work [2] for CSMA/CA of IEEE 802.11 is introduced. And we extend the results of the previous work for the framework of our model. Second, the backoff procedure of CAP is described. This backoff procedure of CAP is similar to CSMA/CA of IEEE 802.11. Furthermore, the more detailed parameters of CAP are shown as well. And we derive the probability model of CAP finally. Although the mechanism of CAP is the same as CSMA/CA of IEEE 802.11. But the duration of CAP is limited and is different from CSMA/CA of IEEE 802.11.

A. IEEE 802.11 Capacity Analysis

The distributed coordination function (DCF) which is a CSMA/CA MAC protocol is a basic access method of IEEE 802.11. The paper [2] proposes a conscientious and careful probability model for maximizing the capacity of DCF. This subsection introduces some basic models [2] in order to derive our model.

...

Virtual transmission time

DIFS DIFS Idle Idle collision collision Idle successful transmission

Fig. 3. IEEE 802.11 channel view of a station transmit a packet successfully.

Figure 3 shows a channel view of the required time (which is called virtual transmission time in [2]) that a station can transmit a packet successfully. And the average required time is denoted as the following:

tv = E[

Nc



i=1

(Idle pi+Colli+τ+DIF S)]+E[Idle pNc+1]+E[S]

(1) And can be rewritten as

tv = E[Nc]{E[Coll]+τ+DIF S}+E[Idlep]·(E[Nc]+1)+E[S]

(2) where

Nc: the number of collisions in a virtual time.

Idle pi: the length of the ith idle period.

Colli: the length of the ith collision time.

τ : the maximum propagation time.

S is the time required to complete a successful transmission

without any collision and backoff time. It follows that

S ≤ m + 2τ + SIF S + ACK + DIF S (3)

Furthermore, for calculating tv, the distribution functions of

Nc,Idle pi, andCollimust be known. Since we allow that the

channel request packet can be transmitted in CAP, the length of collision (i.e. Colli) of our model is constant. Therefor,

only distribution functions ofNc andIdle pi are listed as the following:

M : the number of stations.

p: the probability of a station can transmit in a slot.

•Nc:

P {Nc= i} = PColiisioni · PSuccess (4)

where

PCollision=P {transmitting stations ≥ 2 |

transmitting stations≥ 1}

= 1 − (1 − p)M − Mp(1 − p)M−1

(3)

PSuccess=P {transmitting stations = 1 | transmitting stations ≥ 1} = M p · (1 − p)M−1 1 − (1 − p)M−1 (6) Thus, E[Nc] = 1 − (1 − p) M M p(1 − p)M−1 − 1 (7) •Idle pi:

P{0 transmitting station in a slot}

= (1 − p)M (8)

P{at least 1 transmitting stations in a slot}

= 1 − (1 − p)M (9) Thus, E[Idlep] = tslot· [1 − (1 − p)M] ·  i=1 i[(1 − p)M]i (10)

B. Backoff Procedure of CAP

The carrier sense multiple access with collision avoidance (CSMA/CA) is the basic medium access mechanism during CAP. The types of packets which are allowed to transmit are determined by the PNC. And a DEV is allowed to transmit one frame at a time with a backoff applied. The DEV shall abort the transmission if there is not enough room for this entire frame exchange sequence.

The backoff algorithm of CAP is the same as basic CSMA/CA (i.e. without RTS/CTS) of IEEE 802.11. But there are several different parameter setups between them. The main information which is used by the backoff algorithm of CAP is shown as follows,

retry count: A retry count that takes on values in the range [0,3].

backoff window(retry count): A table which has values [7, 15, 31, 63].

bw random(retry count): A random integer which is se-lected from a uniform distribution over the interval [0,backoff window(retry count)].

Before initiating the backoff algorithm, the DEV first waits a RIFS duration. When the medium is determined to be idle during a RIFS duration, the DEV shall choose backoff count = bw random(retry count) to start backoff. The backoff counter shall be suspended whenever the channel is busy. A frame can be transmitted until the backoff counter is set to 0. The retry count shall be incremented but shall not be set to more than 3 when a directed frame is transmitted and the expected ACK is not correctly received by the DEV.

C. Probability Model of CAP

The capacity analysis of this paper focus on the relationship between the duration of CAP and the number of stations which are ready to transmit a channel request packet. This restriction is reasonable because PNC can determine it.

First, we denote a random variabletsto represent the time of a station transmitting a packet successfully. Immediately, the equation (1) is the mean of the ts while the RIFS is

applied instead of DIFS. Since only channel request packets are allowed to transmit, theColli and theS are both constant.

Now, we want to derive the probability (denoted byPM{ts=

j}) of a station of M stations to transmit a packet successfully

when the duration of CAP isj. Because the Colli and the S

are both constant, the duration of CAPj minus E[Nc] times

the length ofColliand aS is the time of E[Nc]+1 times the

length ofE[Idelp]. From (8) and (9), the distribution function

of Idlep follows that

P {Idlep= kslots} = ((1 − p)M)k· (1 − (1 − p)M) (11)

And from (5) and (6), the average number of collisions when the duration of CAP is j follows that

E[Nc j] = j  i=0 (1 − (1 − p)1 − (1 − p)M− Mp(1 − p)M−1 M−1)i· (M p · (1 − p)M−1 1 − (1 − p)M−1 ) (12) From the channel view of a virtual transmission time, we can assume that each idle time is uniform distribution over the sum of all idle times. It thus follows that

Idel T ime = j − (Lcollision+ τ + RIF S) · E[Nc j] − LS

E[Nc j] + 1

(13) where

Lcollision: the length of collision is a constant.

LS: the length of transmitting a packet successfully without

any collision and idle is also a constant.

A DEV ofM DEVs can complete a transmission

success-fully if and only if the idle time of each idlep no more

than Idel T ime. Therefore, the probability of PM{ts = j}

can be derived by the product of the probability of each

Idlep≤ Idel T ime and follows that

PM{ts= j} = E[Nc j]+1 i=1 ( Idle T ime aSlotT ime  k=0 P {Idlep= kslots}) (14) With (14) we are now able to determine the duration of CAP.

TheM and p are two parameters which are used to compute

ts, and p depends on M . Thus, a PNC can setup the length

of CAP based on the number of DEVs (M ).

IV. MAXIMUMTRAFFIC(MT) SCHEDULING

All traffics that occur in a CFP window must be controlled by the PNC. Different scheduling methods carry the different criterions. This paper proposes the Maximal Traffic (MT) scheduling which is based on two criterions. First, the total transmission data is maximal at any point of time. And another one is that the number of time slots of a superframe is the least. As a DEV requests channel time to transmit, the DEV submits a request to the PNC. The request includes ids (identifications) of the sender and the receiver, required in-formation defined in IEEE 802.15.3 draft standard and the

(4)

0 10 20 30 40 50 60 70 80 90 100 0.02 0.04 0.06 0.08 0.1 0.12 0.14 0.16 0.18 0.2 0.22 number of DEVs

probability of transmitting in a slot

2 95 (a) 0 1 2 3 4 5 6 7 x 104 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 micro−seconds

probability of transmitting a packet

M=2 M=95 M=3 M: number of DEVs (b) 0 10 20 30 40 50 60 70 80 90 100 1 2 3 4 5 6 7x 10 4 number of DEVs

reqired time of CAP (micro−seconds)

2

95

(c)

Fig. 4. Numerical results of capacity analysis for CAP. (a) Probability of a DEV which can start to transmit successfully in a slot. (b) Transmission probability of a DEV when there are M DEVs in a piconet. (c) Required time of a DEV which can transmit a packet with probability near 1.

ids of all DEVs which are interfered by this transmit-receive pair especially. The information about interfered DEVs is calculated by the sender via the relative position information. The scheduling problem for the PNC is described formally in Problem 1.

Problem 1: Given some transmitting pairs, group these

pairs such that the pairs in the same transmitting group can transmit in the same time slot simultaneously and the number of groups is minimal.

For solving this problem, we model and reduce Problem 1 to the graph coloring problem. A k-coloring of a graph is

defined as an assignment of one of k distinct colors to each

vertex so that no two adjacent vertices are given the same color. And the chromatic number is the smallest k such that

the graph can bek-colored. First, we give the definition of our

graph.

Definition 1: Consider a graph G = (V, E)

1) Re-denote by V the set of transmit-receive pairs.

2) Denote that there is an edge e ∈ E between vi andvj

(vi, vj ∈ V ) iff either vi’s receiver is withinvj’s

trans-mitting range orvj’s receiver is withinvi’s transmitting

range.

The Problem 1 can be solved through finding chromatic number from the graph of Definition 1. There are some algorithms for finding chromatic number in [6]. The properties of chromatic number guarantee that the number of needed time slots is minimum. The vertices (transmit-receive pairs) with same color can be put into the same group (time slot) and can be allowed to transmit simultaneously.

V. SIMULATION ANDNUMERICALRESULTS

As mentioned in section III, the probability model (14) can be adopted to determine the length of CAP according to the number of DEVs in a piconet. The numerical relationship between the length of CAP and the number of DEVs is given in subsection A. As well as MT scheduling is analyzed in

subsection B by combination of simulation and mathematical analysis.

A. Capacity of CAP

Before being able to calculate the probability (14), the value

p must be known. The iterative algorithm which is proposed in

[2] can be used to compute p. The main factor of computing p is contention window (CW) size. The CW size of IEEE

802.15.3 has been described in the previous section and be taken into the iterative algorithm. The values p of variance

number of DEVs are shown as Fig. 4(a). The maximal number of DEVs in Fig. 4(a) is 95 since the maximal capacity of CAP is 95 (DEVs) and will be illustrated later.

TABLE I

IEEE 802.15.3 PARAMETERS

a backoff slot time 5.8µsec

τ 1µsec

RIFS 15.8µsec

ACK 532.7µsec

channel time request packet (CTR) 1420.5-7013.5µsec

PHY preamble 887.8µsec

PHY header 88.8µsec

Now, it is ready to compute the probability of a DEV which can transmit a packet successfully when there are M

DEVs in a piconet. Table I are the required parameters of IEEE 802.15.3 that are needed for computing (14). The results are shown in Fig. 4(b). From these results we can see that the maximal number of DEVs is 95 because the maximal duration of superframe is 65535 µsec. It means that DEVs

have very low probability (near 0) that anyone of these DEVs can transmit a packet when the number of DEVs is over 95.

Furthermore, we want to get the required time that a DEVs can transmit a channel request packet successfully when the number of DEVs in a piconet is M . The required time is

derived by taking the timet satisfies that it is the first t such

(5)

value and is 2.2204e − 016. According to the above method, the required time can be computed and be drawn in Fig. 4(c). The results in Fig. 4(c) can help to determine the length of CAP of superframe by calculating the sum of required time based on number of DEVs.

B. Analysis of MT scheduling for CFP

Via reviewing the Definition 1, it is clear that the less edges are in the graph, the less chromatic number is needed. First, we analyze the worst case of interference by simulation. There are two types of acknowledgement types in the simulation; acknowledgement (ACK) and no acknowledgement (no-ACK). The ACK type causes more interference than the no-ACK type. All DEVs are generated randomly on a 10m×10m area and the position of the PNC is also set randomly. For transmission, Each DEV randomly chooses one of any other DEVs to communicate. Thus, this is the most congested scenario for a piconet. Then we model these topologies to the corresponding graph by Definition (1) and calculate the ratio of exact interference (edges) caused by exact links to the edges of complete graph. The results are showed in Figure 5.

0.7 0.75 0.8 0.85 0.9 0.95 1 4 5 6 7 8 910 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 number of DEVs interference ratio 802.15.3, NO ACK 802.15.3, ACK

Fig. 5. Interference ratio

Furthermore, we analyze the least time slots that can be decreased according to the results of the interference ratio. If the minimum chromatic number of an n-vertices graph

is m and m <= n, then the edges of the graph are C2m

at least[7]. Therefore, by this concept, obtaining the most chromatic number (the most number of time slots) from the results of interference ratio is easy. For example, the chromatic number for a graph with 9 edges is at most 4 because C24=

6 < 9 < 10 = C5

2. The results are shown in Figure 6.

3 4 5 5 6 7 8 9 10 111212 13 14 1516 17 18 191920 21 22 2324 25 26 3 4 5 5 6 7 8 9 10 1112 13 14 1516 1717 18 1920 21 22 2324 25 26 27 3 4 5 6 7 8 9 10 1112 13 14 1516 17 18 1920 21 22 2324 25 26 2728 29 0 5 10 15 20 25 30 35 4 5 6 7 8 9 101112131415161718192021222324252627282930 number of DEVs

number of slots (chromatic number)

MT scheduling, NO ACK MT scheduling, ACK General scheduling

Fig. 6. Upper bound of required time slots

VI. CONCLUSION

IEEE 802.15.3 is a new standard that specifies high-speed, short range and low energy consumption wireless communi-cation technology. IEEE 802.15.3 is a central architecture and needs a PNC to manage the traffic of a piconet. In this paper, we propose a schedule method and make a capacity analysis of CAP. Both of them are useful for practical implementation. First, a probability model of CAP is derived according to previous work [2]. This model is applied to decide the length of CAP based on the number of DEVs. From the results of capacity analysis for CAP, we can see that a piconet can allow at most 95 DEVs to join when the duration of CAP is maximal (near 65535 µsec which depends on the length of beacon

packet). Also, adopting the results contributes to determining the duration of CAP based on existing traffic requirements and the number of DEVs. Second, we model and reduce the scheduling problem to a graph problem (graph coloring problem). We design a MT scheduling method and analyze the performance of MT scheduling via applying the concept of the graph coloring. The analysis of MT scheduling shows that the required time slots of CFP can be reduced one or two slots at least when the traffic of piconet is most saturated. Furthermore, MT scheduling can be cooperated with any other scheduling methods in order to support QoS requirements.

The current analysis of this paper focuses on one piconet. Further research could be extended to more than one piconet. In addition, finding an optimal number of DEVs in a piconet and transmitting data over multi-piconets by adopting relative position information are also key issues for forming a large scale UWB ad hoc networks.

ACKNOWLEDGMENT

This work was supported in part by the MediaTek Inc. This work was also supported by the Communications Software Technology project of Institute for Information Industry and sponsored by MOEA, R.O.C.

REFERENCES

[1] IEEE Draft Std 802.15.3: Wireless Medium Access Control (MAC) and

Physical Layer (PHY) Specifications for High Rate Wireless Personal Area Networks, Inst. Elec. Electron. Eng., New York, USA, June, 2002.

[2] F. Cali, M. Conti and E. Gregori, ”Dynamic tuning of the IEEE 802.11 protocol to achieve a theoretical throughput limit,” in IEEE/ACM

transactions on networking, 2000, Vol. 8, pp. 785-799.

[3] S. Capkun, M. Hamdi and J. P. Hubaux, ”GPS-free positioning in mobile ad-hoc networks,” in proceeding of the 34th Annual Hawaii International

Conference, 2001, pp. 3481-3490.

[4] J. Foerster, E. Green, S. Somayazulu and D. Leeper, ”Ultra-wideband technology for short- or medium-range wireless communications,” in

Intel technology journal, 2nd quarter, 2001.

[5] R. J. Fontana and S. J. Gunderson, ”Ultra-wideband precision asset location system,” on Conf. Ultra Wideband Systems and Technologies, 2002, pp. 147-150.

[6] X. Y. Li and Y. Wang, ”Simple heuristics and PTASs for intersection graphs in wireless ad hoc networks,” in Proc. The 6th international

workshop on Discrete algorithms and methods for mobile computing and communications, September, 2002, pp. 62-71.

[7] D. B. West, Introduction to Graph Theory, Pretice Hall Inc., Upper Saddle River, NJ, 2001.

[8] M. Z. Win and R. A. Scholtz, ”Impulse radio: How it works,” IEEE

數據

Fig. 2. The superframe of 802.15.3 MAC.
Fig. 4. Numerical results of capacity analysis for CAP. (a) Probability of a DEV which can start to transmit successfully in a slot
Fig. 5. Interference ratio

參考文獻

相關文件

– at a premium (above its par value) when its coupon rate c is above the market interest rate r;. – at par (at its par value) when its coupon rate is equal to the market

The ProxyFactory class provides the addAdvice() method that you saw in Listing 5-3 for cases where you want advice to apply to the invocation of all methods in a class, not just

It’s easy to check that m is a maximal ideal, called the valuation ideal. We can show that R is a

The function f (m, n) is introduced as the minimum number of lolis required in a loli field problem. We also obtained a detailed specific result of some numbers and the upper bound of

Given a shift κ, if we want to compute the eigenvalue λ of A which is closest to κ, then we need to compute the eigenvalue δ of (11) such that |δ| is the smallest value of all of

Following the supply by the school of a copy of personal data in compliance with a data access request, the requestor is entitled to ask for correction of the personal data

For the data sets used in this thesis we find that F-score performs well when the number of features is large, and for small data the two methods using the gradient of the

/** Class invariant: A Person always has a date of birth, and if the Person has a date of death, then the date of death is equal to or later than the date of birth. To be