• 沒有找到結果。

Novel Design and Analysis of Aggregated ARQ Protocols for IEEE 802.11n Networks

N/A
N/A
Protected

Academic year: 2021

Share "Novel Design and Analysis of Aggregated ARQ Protocols for IEEE 802.11n Networks"

Copied!
15
0
0

加載中.... (立即查看全文)

全文

(1)

Novel Design and Analysis of Aggregated

ARQ Protocols for IEEE 802.11n Networks

Jia-Shi Lin, Student Member, IEEE, Kai-Ten Feng, Member, IEEE,

Yu-Zhi Huang, and Li-Chun Wang, Fellow, IEEE

Abstract—The design of wireless local area networks (WLANs) with enhanced throughput performance have attracted significant amounts of attention in recent years. Based on the IEEE 802.11n standard, frame aggregation is considered one of the major factors to improve the system performance of WLANs from the medium access control (MAC) perspective. In order to fulfill the requirements of high throughput performance, feasible design of automatic repeat request (ARQ) mechanisms becomes important for providing reliable data transmission. In this paper, two MAC-defined ARQ protocols are proposed to consider the effect from frame aggregation for the enhancement of network throughput. An aggregated selective repeat ARQ (ASR-ARQ) scheme is proposed which incorporates the selective repeat ARQ scheme with the consideration of frame aggregation. On the other hand, for worse channel quality, the aggregated hybrid ARQ (AH-ARQ) mechanism is proposed to further enhance the throughput performance by adopting the Reed-Solomon (RS) block code as forward error correction (FEC) scheme. Novel analytical models for both the ASR-ARQ and AH-ARQ protocols are established with the consideration of interfering wireless stations. Simulations are conducted to validate and compare the proposed ARQ mechanisms based on the service time distribution and system throughput. Numerical evaluations show that the proposed AH-ARQ protocol can outperform the other schemes under worse channel condition; while the ASR-ARQ scheme is superior to the other mechanisms under better channel condition.

Index Terms—Wireless local area networks (WLAN), IEEE 802.11n standard, medium access control (MAC), automatic repeat request (ARQ), performance analysis

Ç

1

I

NTRODUCTION

I

N recent years, the techniques for wireless local area

networks (WLANs) have been prevailing exploited for both indoor and mobile communications. The applications for WLANs include wireless home gateways, hotspots for commercial usages, and ad hoc networking for intervehi-cular communications. Among different techniques, the IEEE 802.11 standard is considered the well-adopted suite due to its remarkable success in both design and deploy-ment. Various amendments are contained in the IEEE 802.11 standard suite, mainly including IEEE 802.11a/b/g [1], [2], [3] and IEEE 802.11e [4] for quality-of-service (QoS) support. With increasing demands to support multimedia appli-cations, the new amendment IEEE 802.11n [5], [6] has been proposed for achieving high throughput performance. The IEEE 802.11 task group N (TGn) enhances the PHY layer data rate up to 600 Mbps by adopting advanced commu-nication techniques, such as multi-input multioutput (MIMO) technology [7]. It is noted that the MIMO technique utilizes spatial diversity to improve both the range and spatial multiplexing for achieving higher data rate. However, it has been investigated in [8] that simply

improves the PHY data rate will not be sufficient for enhancing the system throughput from the medium access control (MAC) perspective. Accordingly, the IEEE 802.11 TGn further exploits frame aggregation and block acknowl-edgement (BA) techniques [6], [9] to moderate the draw-backs that are originated from the MAC/PHY overheads.

The benefits of adopting frame aggregation techniques have been studied from different perspectives [9], [10], [11], [12]. Without the consideration of retransmission mechanisms, simplified performance analysis considering frame aggregation has been conducted in [10] based on channel utilization. The dynamic frame aggregation scheme [11] adaptively changes the number of aggregated frames based on the channel conditions. Moreover, the multiuser polling controlled channel access (MCCA) protocol [12] performs both frame aggregation and multiuser polling in order to further enhance network utilization. Although the frame aggregation techniques can reduce both the transmission time of frame headers and the contention time induced by the random backoff period, the enlarged aggregated frames will cause other wireless stations (WSs) to wait for an elongated time period before their next opportunity for channel access. Furthermore, under the error-prone channels, corrupting an aggregated frame can result in the wastage of a longer channel access period which consequently leads to inferior throughput performance. Therefore, a feasible design of retransmission mechanisms becomes an important topic with the adoption of frame aggregation scheme.

The automatic repeat request (ARQ) [13], [14], [15] mechanisms have been extensively proposed in different wireless systems for reliable transmission. In order to reach . J.-S. Lin, K.-T. Feng, and L.-C. Wang are with the Department of Electrical

and Computer Engineering, National Chiao Tung University, Hsinchu 300, Taiwan, R.O.C. E-mail: uxoxox.cm96g@g2.nctu.edu.tw,

ktfeng@mail.nctu.edu.tw, lichun@cc.nctu.edu.tw.

. Y.-Z. Huang is with Holtek Semiconductor Incorporation, Hsinchu 300, Taiwan, R.O.C. E-mail: knight.cm95g@nctu.edu.tw.

Manuscript received 12 Dec. 2009; revised 31 Jan. 2011; accepted 13 Jan. 2012; published online 31 Jan. 2012.

For information on obtaining reprints of this article, please send e-mail to: tmc@computer.org, and reference IEEECS Log Number TMC-2009-12-0537. Digital Object Identifier no. 10.1109/TMC.2012.34.

(2)

more reliable transmissions within a shorter transmitting period, the hybrid ARQ (H-ARQ) schemes [16], [17], [18], [19], [20], which combine both the forward error correction (FEC) and retransmission mechanism, have been proposed for advanced multimedia applications. In general, the H-ARQ algorithms can be classified into three categories as follows: in the type-I H-ARQ scheme [18], as an error packet is detected via the cyclic redundancy check, the transmitter will retransmit the same packet either until the packet is successfully decoded at the receiver or a maximum retransmission limit is reached. Type-II of H-ARQ scheme is regarded as the full incremental redundancy (IR) technique [19], which decreases the coding rate in each retransmission by sending additional redun-dancy check digits. On the other hand, type-III of H-ARQ scheme [20], considered as a partial IR scheme, not only decrements the coding rate but also maintains the self-decoding capability in each retransmission. It is noted that the IR-based algorithms in general make use of either the rate compatible punctured convolutional (RCPC) codes [20], [21] or the rate compatible punctured turbo (RCPT) codes [22]. Furthermore, the transmission errors are corrected in two phases based on the design concept of concatenate code [23]. The inner decoder, which is im-plemented in the PHY layer, adopts sophisticated algo-rithms for error correction; while the outer decoder is served as the second stage fine-tuning error corrector that is implemented in the MAC layer protocols. As a conse-quence, the FEC schemes in both type-II and III of H-ARQ algorithms are regarded as the inner decoders; while that of type-I scheme is considered as the outer decoders.

However, most of the existing ARQ algorithms did not explicitly consider the effects from frame aggregation. Even though ARQ scheme is utilized for multiframe retransmis-sion such as in [11], its design concept is primarily based on a pure stop-and-wait ARQ (SW-ARQ) mechanism. It is required to provide an efficient retransmission scheme in order to enhance the system throughput for the IEEE 802.11n networks. In this paper, MAC-defined ARQ mechanisms are proposed to consider the effect from frame aggregation in order to improve the network throughput. An aggregated selective repeat ARQ (ASR-ARQ) algorithm is proposed which incorporates the conventional selective repeat ARQ scheme with the consideration of frame aggregation. On the other hand, an aggregated hybrid ARQ (AH-ARQ) mechanism is proposed to further enhance the throughput performance for the IEEE 802.11n networks under worse channel quality. The proposed AH-ARQ scheme can be categorized as type-I of H-ARQ algorithm, which is served as an outer code designed from the MAC layer perspective. The Reed-Solomon (RS) code [24], [25], which defines a finite codeword length, is adopted within the AH-ARQ scheme.

Furthermore, it will be beneficial to construct effective analytical models to evaluate the retransmission mechan-isms for the IEEE 802.11n networks. There are existing studies that propose analytical models for performance evaluation of the MAC channel access [26], [27], [28], [29] and frame aggregation techniques [30], [31], [32] in the IEEE 802.11-based networks. However, none of these models

explicitly considers efficient retransmission schemes that are especially feasible for high throughput requirements. The studies in [33] and [34] investigate the impact of adopting block acknowledgement for high-speed WLANs and propose the analytical model for acquiring the system throughput. Nevertheless, these works did not construct the analytical models for aggregated packet delay distribu-tion. Moreover, RS-based FEC mechanisms are adopted in [35], [36], and [37] for the purpose of reducing the frame error probability. Three error-control schemes are consid-ered in [35] to compare the performance and computation complexity; while the scheme in [36] combines the retransmission scheme with a newly defined PHY format for enhancing the network performance. However, these analytical models only consider a single WS in the network that exclude the effect of channel contention between multiple WSs. Moreover, most of the existing studies did not include multiple opportunities for data transmission in one transmission opportunity (TXOP) that is allowed by the IEEE 802.11n standard.

As a consequence, with the consideration of multiple WSs, the service time distribution model with multiple transmission opportunities in one TXOP are constructed in order to observe the behaviors of both the ASR-ARQ and AH-ARQ algorithms. A novel approach based on the state diagram is utilized for the construction of analytical models for both schemes with the consideration of interfering WSs. Simulations are performed to both validate and compare the proposed ARQ schemes with conventional mechanism. It will be shown in the numerical results that the proposed AH-ARQ protocol can outperform the other mechanisms under worse channel condition; while the proposed ASR-ARQ scheme is superior to the other protocols under better channel condition.

The remainder of this paper is organized as follows: Section 2 describes the frame aggregation mechanism of IEEE 802.11n standard and the proposed ARQ algorithms. The system modeling and performance analysis of pro-posed ARQ schemes are addressed in Section 3. Section 4 provides the performance evaluation; while the conclusions are drawn in Section 5.

2

P

ROPOSED

MAC-D

EFINED

A

GGREGATED

ARQ

S

CHEMES

In this section, the frame aggregation structure defined in the IEEE 802.11n MAC protocol is reviewed in Section 2.1. The proposed ASR-ARQ and AH-ARQ protocols are explained in Sections B and C, respectively.

2.1 Frame Aggregation/Deaggregation of IEEE

802.11n MAC Protocol

The IEEE 802.11n standard mandates the implementation of frame aggregation scheme for the sake of promoting transmission efficiency. It is noted that the transmission efficiency is defined as the time for delivering the information payload over the time duration for transmit-ting the entire aggregated frame associated with the required control frames and contention periods. With the frame format as shown in Fig. 1a, multiple MAC protocol data units (MPDUs) are combined into an aggregated

(3)

MPDU (A-MPDU), which is consequently transported into a single PHY service data unit (PSDU). Intuitively, the transmission efficiency can be improved with the utilization of A-MPDU since more MPDUs are transmitted with a communion of control overhead.

Each MPDU is padded with an MPDU delimiter for the purpose of extracting the corresponding MPDU from the aggregated frame. The extracting delimiter is composed of four bytes as shown in Fig. 1a, including the reserved, MPDU length, cyclic redundancy check (CRC), and unique pattern (UP) fields. It is noted that the UP field, which is set to the ASCII value of character “N,” is employed to detect the location of an MPDU delimiter while scanning within the aggregated frame. Moreover, each MPDU is padded to become a multiple of four octets as shown in Fig. 1a. The deaggregation procedure at the receiver side described in the standard is shown in Fig. 2. The receiver verifies the validity of MPDU delimiter based on the 8-bits CRC and the observation of UP field, i.e., to exam the correctness of character “N.” An MPDU can be successfully extracted from the A-MPDU if the corresponding MPDU delimiter is found to be valid. Otherwise, the de-aggregation process will continue to move forward with four bytes, i.e., via the offset parameter in Fig. 2, and to verify if the next multiple of four octets contains a valid delimiter.

2.2 Proposed Aggregated Selective Repeat (ASR)

ARQ Scheme

The design of retransmission mechanisms is an open topic from the standpoint of IEEE 802.11n standard. In this paper, the proposed ASR-ARQ scheme is enhanced from conven-tional selective repeat ARQ mechanism to consider frame aggregation within the design of retransmission algorithm. Contributing from the availability of BA scheme within the IEEE 802.11n standard, the ASR-ARQ algorithm can be effectively designed to provide transmission efficiency. Instead of sending individual acknowledgement (ACK) frame, the receiver replies with a BA frame for acknowl-edging the entire A-MPDU that is initiated from the transmitter. Since compressed BA is employed for this paper, the BA frame will consist of 32 octets that contain an 8-octets bitmap field. Each bit within the bitmap field identifies whether the corresponding MPDU from the aggregated frame has been correctly received. As shown in Fig. 2, the receiver will set the bitmap of BA after completing all the MPDU deaggregations and validations from an A-MPDU. Intuitively, a single BA frame can reduce the control overheads that are required by conventional design, which replies multiple ACK frames in response to an aggregated data frame.

In the proposed ASR-ARQ scheme, each MPDU within an A-MPDU is identified via a unique sequence number as the aggregated frame is transmitted. In the case that some of the MPDUs within an A-MPDU are missing during the transmission, the ASR-ARQ algorithm will continue to retransmit those unsuccessfully transmitted MPDUs until all the MPDUs have either been positively acknowledged by the BA frame or reached the retry limitation. For instance, there are 10 MPDUs contained within an A-MPDU that are identified by the sequence numbers from 1 to 10. If the MPDUs with sequence numbers 3 and 5 are corrupted and are identified via the CRC check, the receiver will reply with the BA frame which denotes two zero flags at the corresponding third and fifth bits within the bitmap field. A new A-MPDU, which includes only the third and fifth MPDUs, will be delivered by the transmitter at the next transmission opportunity. The retransmission procedure Fig. 1. (a) A-MPDU farmat for proposed ASR-ARQ scheme. (b) A-Encoded_MPDU farmat for proposed AH-ARQ scheme.

Fig. 2. The flow diagram of MPDUs deaggregation procedure for proposed ASR-ARQ scheme.

(4)

terminates until either all the MPDUs with sequence numbers from 1 to 10 are correctly accepted by the receiver or the maximum number of retransmission trials (i.e., identified by the Retry_Limit parameter) has achieved.

2.3 Proposed Aggregated Hybrid (AH) ARQ Scheme

In order to further enhance the transmission efficiency, the AH-ARQ scheme is proposed in this paper to integrate both the RS-based FEC construction and deaggregated retransmission mechanism, which are described in the next two sections.

2.3.1 RS-Based FEC Construction

With the compliance to existing IEEE 802.11n MAC frame structure, the proposed FEC mechanism is constructed according to the RS code [24], [25] that is well-adopted in the design of outer decoders. The coefficients of generator polynomial GðxÞ are elements in a finite field GF ð2nbÞ,

where nb¼ 8 is chosen according to the byte-oriented

system. For a RS ðnc; niÞ code with nc¼ 2nb 1 ¼ 255 as

the codeword length, ni as the size of original information

symbols, and  ¼ ðnc niÞ=2 as the error correction

cap-ability, the set of roots ¼ f; 2; . . . ; 2g of GðxÞ is selected

from GF ð28Þ where  is a primitive element of the finite

field. As a result, the generator polynomial GðxÞ can be represented as GðxÞ ¼Q2i¼1ðx þ iÞ ¼ x2þP21

i¼0 gixi with

gi representing the coefficients for all i 2 f0; . . . ; 2  1g.

Based on the cyclic property of RS code, the set of codewords can be formed with the multiplication of both GðxÞ and the information symbol polynomial IðxÞ. Moreover, the RS code will have the minimum codeword distance dmin 2 þ 1 in

the case that all the coefficients gi are not equal to zero.

Therefore, the corresponding RS code possesses the correct-ing capability of  error symbols associated with the codeword length of nc octets and ni information octets.

There are total of nc ni¼ 2 parity check octets, which are

served as the remainder RðxÞ while dividing x2IðxÞ by the

generator polynomial GðxÞ.

2.3.2 Deaggregation and Retransmission Mechanism A newly defined Aggregated-Encoded_MPDU (A-Enco-ded_MPDU) structure for the proposed AH-ARQ scheme is illustrated in Fig. 1b. The original MPDU, including MAC header, MSDUs, and FCS, is divided as several segments

each with ðni 4Þ bytes, and the CRC-32 value can be

calculated as the FCS and is attached after each segment to verify its correction. Moreover, the FEC value is computed according to both the segment and FCS in order to implement forward error correction. Note that the total size for a RS block, including segment, FCS, and FEC, will be ðni 4Þ þ 4 þ 2 ¼ 255 bytes. Furthermore, a series of

zeros will be padded after the original MPDU such that its size will become the multiple of ðni 4Þ bytes. The receiver

can acquire the original size of the MPDU according to the Length field of the delimiter. In order to extract the A-Encoded_MPDUs that adopt the FEC mechanism, a modified deaggregation procedure is performed as shown in Fig. 3. At the beginning, the scanning process will start to search for the UP field. After the UP has been identified, a predefined symbol will be traversed in order to verify the

usage of FEC scheme. In other words, a valid delimiter will be identified if both the reserved field within the delimiter matches the “1111,” i.e., “0xF,” and the CRC-8 value is determined correct. The receiver can start to execute the deaggregation procedure if all the verifications are valid. The number of RS blocks for the jth Encoded_MPDU can be calculated as Kj¼ MP DU Lengthj ni 4   ; ð1Þ

where the MP DU Lengthj is obtained from the Length

field of jth delimiter. Therefore, the receiver will be aware of the size of jth Encoded_MPDU, i.e., equal to Kj 255,

and also the location of the next delimiter. The next step is to execute the CRC-32 validation for each RS block in the Encoded_MPDU. If the result is valid, the receiver can store the RS block directly. Otherwise, the RS decoding procedure will be performed for this RS block. Note that the Berlekamp’s iterative algorithm [38] is adopted to implement the decoding procedure. After completing the decoding process, the receiver will execute the CRC-32 check to verify if the decoded RS block can pass the verification. If not, this RS block will be dropped.

After all the Encoded_MPDUs have been extracted with all RS blocks been processed, the receiver starts to set the bits within the BA frame’s bitmap field that map to the corresponding RS blocks. Considering a common scenario that the number of RS blocks in each Encoded_MPDU is a fixed value, i.e., Kj¼ K, the bitmap field within the BA for

the proposed AH-ARQ protocol is extended to contain 256 bits in order to support J Encoded_MPDUs with K,

K 256=J, RS blocks in each Encoded_MPDU for a single

data transmission. If the RS blocks are either correctly received or with correctable errors, the receiver will enable the corresponding bits in the bitmap field of BA frame. Otherwise, these bits will be disabled. The receiver will reply a BA frame to the transmitter after finishing setting up the bitmap of BA. The transmitter can initiate a retransmission of failed RS blocks according to the received BA. Note that all the RS blocks in the Encoded_MPDU can Fig. 3. The flow diagram of Encoded_MPDUs deaggregation procedure for proposed AH-ARQ scheme.

(5)

be considered independently, except for the first RS block. It is required for the entire Encoded_MPDU to be retransmitted if the first RS block fails in transmission since it contains the MAC header information of the Encoded_MPDU. The receiver cannot recognize the re-maining RS blocks without the MAC header. Moreover, the first RS block is always needed in the Encoded_MPDU to provide important information, e.g., the receiver ad-dress, if there exists at least one other RS block in this Encoded_MPDU that should be retransmitted.

3

P

ERFORMANCE

A

NALYSIS OF

P

ROPOSED

ARQ

S

CHEMES WITH

E

XISTENCE OF

I

NTERFERING

S

TATIONS

In this section, novel analytical models based on the state diagram are exploited to analyze the performance of proposed ASR-ARQ and AH-ARQ mechanisms under saturated traffic. The service time distributions for both ARQ schemes are acquired with the consideration of interfering stations in the network. Distributed network topology is considered, where there are one access point (AP) and N WSs. The N WSs are contending for channel access in order to communicate with the AP for data transmission. Furthermore, the distributed coordination function (DCF) is employed as the medium access scheme for one access category between the transmitter and the receiver. The request-to-send/clear-to-send (RTS/CTS) me-chanism is used for channel reservation in order to enhance the basic access mechanism. The proposed analytical models can be applied to all the N WSs contending the channel access. Moreover, the proposed models are also suitable for both the N WSs and the AP since all of them adopt the same contention-based protocol, e.g., the RTS/ CTS handshaking and the backoff process. If the AP has data to be delivered to the WSs, the AP’s behavior can be obtained by replacing the number N with N þ 1 in the analytical models since the number of total stations that contend the channel will include N WSs and one AP. Subsection A described the service model for contention-based systems. Subsection B explains the modeling of service time distribution for the proposed ASR-ARQ scheme; while that of the AH-ARQ algorithm is presented in Section 3.3.

3.1 Service Model for Contention-Based Systems

There are existing research [26], [39], [40], [41], [42], [43] establishing the analytical models for the backoff process of DCF scheme under different considerations, e.g., fading channel [39], backoff suspension [42], or retry limit [43]. The 2D Markov chain model is adopted as the baseline model to analyze the channel contention behaviors for the proposed ARQ mechanisms. As shown in Fig. 4, Wi¼ 2iW is defined

as the backoff window size at the stage i where W denotes the minimum backoff window size. According to the DCF-based system, the steady state probability bi;kfor the WS can

be derived from the Markov chain model, where the subscript ði; kÞ indicates that the WS is at the ith backoff stage with its backoff counter equal to k. Therefore, the state probability bi;kcan be inferred as

Pðbi;kjbi;kþ1Þ ¼ 1; 0 k  Wi 2; 0  i  M; Pðb0;kjbi;0Þ ¼ 1 pi W0 ; 0 k  W0 1; 0  i  M  1; Pðb0;kjbM;0Þ ¼ 1 W0 ; 0 k  W0 1; Pðbi;kjbi1;0Þ ¼ pi1 Wi ; 0 k  Wi 1; 1  i  M; 8 > > > > > > > < > > > > > > > : ð2Þ

where M denotes the maximum number of backoff stage. Note that the retry limit is assumed equal to M in this paper. Moreover, the parameter pi represents the failed

transmis-sion probability at the ith stage. Each steady state probability can be expressed as a function of b0;0based on the equations

in (2). Since the sum of all the states will be equal to 1, namely

PM

i¼0

PWi1

k¼0 bi;k¼ 1, b0;0can be obtained as

b0;0¼ ( Wþ 1 2 1 p0þ X M1 i¼1 1 pi ð ÞY i1 j¼0 pj ! þ Y M1 i¼0 pi " # þX M i¼1 2iWþ 1 2 Yi1 j¼0 pj !)1 : ð3Þ

Let  be defined as the probability that a WS transmits an RTS packet in a randomly selected time slot. Based on the model in Fig. 4, a WS can transmit its RTS packets only if the backoff counter k reaches zero. Therefore, the parameter  can be acquired as ¼X M i¼0 bi;0¼ 1 þ XM i¼1 Yi1 j¼0 pj ! " # b0;0: ð4Þ

Let Pcrepresent the probability that the RTS packet issued

by one WS collides with those from the other WSs, which can be calculated as

Pc¼ 1  ð1  ÞN1: ð5Þ

Combining (3), (4), and (5), it is observed that Pc is a

function of pi for 0  i < M. In order to solve these

unknown parameters, it is required to provide another relationship between pi and Pc. It is assumed that each WS

possesses a saturated queue, and there exists J aggregated MPDUs in each transmission at the initial, i.e., the 0th, backoff stage. The WS will retransmit the failed MPDUs Fig. 4. Two-dimensional Markov chain model for the backoff process of contention-based systems.

(6)

within the A-MPDU until either all the MPDUs are successfully received or the backoff stage has achieved the retry limit. Therefore, the state diagram for transmitting the failed MPDUs in one TXOP period can be modeled

as shown in Fig. 5, where uj indicates the state of j

unsuccessful MPDUs and q0

j;k represents the transition

probability from state uj to uk. In other words, suppose

that there are j failed MPDUs at the beginning of the TXOP, the probability that there still exists k failed MPDUs at the end of the TXOP is equal to q0

j;k. Considering that there are L

opportunities for transmitting an A-MPDU in the TXOP, the transition probabilities q0 j;kcan be formulated as q0j;0 q0j;1 .. . q0j;j 0 B B B @ 1 C C C A¼ ð1  PcÞ  qj;0ð1Þ qj;1ð1Þ .. . qj;jð1Þ 0 B B B @ 1 C C C Aþ Pc 0 .. . 0 1 0 B B @ 1 C C A; ð6Þ where qj;0ðzÞ qj;1ðzÞ .. . qj;jðzÞ 0 B B B @ 1 C C C A¼ H L 0 .. . 0 1 0 B B @ 1 C C A; ð7Þ where H¼ 1 C01ð1  PeÞ  zTD;M . . . C0jð1  PeÞj zjTD;M 0 C1 1Pe zTD;M . . . C1jPeð1  PeÞj1 zjTD;M .. . .. . . . . .. . 0 0 . . . CjjPj e zjTD;M 0 B B B B @ 1 C C C C A: Note that Pc is obtained from (5), and TD;M represents the

required time for delivering both the delimiter and MPDU. The parameter Peis equal to PMP DUþ PDEL PMP DU PDEL,

where PMP DUand PDELrepresent the probability of MPDU

error and delimiter error, respectively. Note that qj;kðzÞ in (7)

stands for the transition probability along with its required time in the power of z from state uj to uk without the

consideration of RTS placket collisions. Moreover, it is noted that the WS is not able to transmit the MPDUs if its RTS packet collides with the other WSs in the network. At the ith backoff stage, let i;jbe denoted as the probability that there

still exists j failed MPDUs after either the WS successfully sends its RTS packet and the corresponding A-MPDU or the RTS packet is failed in transmission. Therefore, i;j can be

calculated based on the following ðJ þ 1Þ  ðJ þ 1Þ matrix operation as i;0 i;1 .. . i;J 0 B B B @ 1 C C C A¼ q00;0 q01;0 . . . q0J;0 0 q01;1 . . . q0J;1 .. . .. . . . . .. . 0 0 . . . q0 J;J 0 B B B @ 1 C C C A iþ1  0 .. . 0 1 0 B B @ 1 C C A: ð8Þ

Finally, the probability of unsuccessful transmission at the ith backoff stage, i.e., pi, can be formulated as

pi¼ 1 0;0; i¼ 0; 1 i;0 1 i1;0 ; 0 < i M: 8 < : ð9Þ

Combining (6), (8), and (9), the parameter pi can be

regarded as functions of Pc. Therefore, by iteratively solving

the nonlinear functions (4) and (5), the two parameters  and Pccan be obtained. Moreover, the parameters q0j;k, i;j,

and pi can also be calculated.

3.2 Modeling of Service Time Distribution for

Proposed ASR-ARQ Scheme

In this section, the derivation of service time distribution for the WS will be described based on the proposed ASR-ARQ scheme under the existence of contending stations. Let SiðzÞ

be defined as the probability generating function (PGF) of service time distribution on the condition that all the MPDUs are successfully received at the ith backoff stage. Furthermore, let Fi;jðzÞ represent the PGF of total required

time distribution on the condition that there are j (j 6¼ 0) failed MPDUs at the ith backoff stage. Note that both SiðzÞ

and Fi;jðzÞ do not include the backoff delay. Therefore, these

two distributions can be formulated as S0ðzÞ ¼ 1 Pc 0;0  qJ;0ðzÞ  zTA; SiðzÞ ¼ 1 Pc i;0 i1;0 XJ j¼1 i1;j Fi1;jðzÞ  qj;0ðzÞ !  zTA; 0 < i M; ð10Þ and F0;JðzÞ ¼ 1 0;J ð1  PcÞ  qJ;JðzÞ  zTAþ Pc zTout   ; F0;jðzÞ ¼ 1 Pc 0;j  qJ;j zTA; 0 < j < J; Fi;jðzÞ ¼ 1 Pc i;j " XJ r¼j i1;r Fi1;rðzÞ  qr;jðzÞ  zTA # ; þ Pc i;j

 i1;j Fi1;jðzÞ  zTout; 0 < i M; 0 < j < J;

ð11Þ where

TA¼ TDIF Sþ TRT Sþ TCT Sþ L  TP HY Header

þ L  TBAþ ð2L þ 1Þ  TSIF Sþ ð2L þ 2Þ  :

The parameter Tout¼ TDIF Sþ TRT Sþ TCT Sþ TSIF Sþ 2

de-notes the required timeout interval. Note that the para-meters TDIF S, TSIF S, TRT S, TCT S, TP HY Header, TBA, and  are

defined as the required time intervals for DIFS, SIFS, RTS packet transmission, CTS packet transmission, PHY header Fig. 5. State diagram for the proposed ASR-ARQ and AH-ARQ

(7)

transmission, and propagation delay, respectively. Note also that (10) and (11) are approximated forms since a total of L opportunities are assumed for A-MPDU transmissions in a TXOP. In reality, the WS will not utilize the rest of transmission opportunities if all its MPDUs have been successfully transmitted. Furthermore, considering that there exists a specific WS in the backoff process, three exclusive events may occur in a slot time as follows: 1) there does not exist any other WS that sends the RTS packet; 2) there only exists one other WS sending its RTS packet; and 3) there exists at least two other WSs that send out their RTS packets. Let Pidle, Psucc, and Pcol be denoted as the

probability for events (a), (b), and (c) to occur in a slot time, which can, respectively, be calculated as

Pidle¼ ð1  ÞN1; Psucc¼ ðN  1Þð1  ÞN2; Pcol¼ 1  ð1  ÞN1 ðN  1Þð1  ÞN2: 8 < : ð12Þ

On the condition that a specific WS is in the backoff process, Pcol denotes the probability that at least two of the other

ðN  1Þ WSs contend the channel unsuccessfully due to the RTS packet collisions. Note that Pcol is different from Pc in

(5) which indicates the collision probability on the condition that the RTS packet is delivered by this specific WS. It is noticed that the reason for calculating (12) is to formulate the PGF of slot time delay distribution HdðzÞ from the

backoff delay as illustrated in Fig. 6, where DðzÞ, XðzÞ, and CðzÞ are denoted as the PGF of required time distribution given the event (a), (b), and (c), respectively. Therefore, HdðzÞ can be derived as

HdðzÞ ¼ PidleDðzÞ þ PsuccXðzÞHdðzÞ þ PcolCðzÞHdðzÞ

) HdðzÞ ¼

Pidle DðzÞ

1 Psucc XðzÞ  Pcol CðzÞ

: ð13Þ

It is also noted that Fig. 6 can be considered as an extension of the original Markov chain model in Fig. 4 to further account for the delay time distribution. In other words, Fig. 4 is utilized to analytically compute the system throughput which can be simplified from Fig. 6 by setting Pidle¼ 1 in a slot time, i.e., only event (a) will occur in a

slot time such that the time delays costs from the PGFs DðzÞ, XðzÞ, and CðzÞ are not considered. On the other hand, it is considered computationally complex to calculate (13) owing to the complexity in the denominator, i.e., 1  Psucc XðzÞ  Pcol CðzÞ. In order to reduce the

complicated computation, events (b) and (c) are assumed

to occur at most once in a backoff time slot. Therefore, (13) can be approximated as

HdðzÞ  Pidle DðzÞ þ Psucc XðzÞDðzÞ þ Pcol CðzÞDðzÞ: ð14Þ

Moreover, the expressions of DðzÞ, XðzÞ, and CðzÞ can be obtained as DðzÞ ¼ z; XðzÞ ¼X M i¼0 bi;0  XJ j¼1 " PX;i;j Xj r¼0 qj;rðzÞ  zTA !# ; CðzÞ ¼ zTout; 8 > > > < > > > : ð15Þ where PX;i;j¼ 1; i¼ 0; j ¼ J; 0; i¼ 0; 0 < j < J; i1;j 1 i1;0 ; 0 < i M; 0 < j  J; 8 > < > : ð16Þ

and the parameter  represents a slot time. Consequently, the total backoff delay at the ith backoff stage, HiðzÞ, can be

derived as HiðzÞ ¼ 1 2iW X 2iW1 r¼0  HdðzÞ r ; 0 i  M: ð17Þ

Let succ;iindicates the probability that all the MPDUs have

been successfully received at the ith backoff stage, which can be calculated as succ;i¼ 0;0; i¼ 0; i;0 i1;0; 0 < i M;  ð18Þ As a result, the PGF of total service time distribution T ðzÞ can be obtained as TðzÞ ¼ X M i¼0 succ;i SiðzÞ  Yi r¼0 HrðzÞ ! þ X J j¼1 M;j FM;jðzÞ ! YM r¼0 HrðzÞ; ð19Þ

where the parameter M;j, which can be obtained in (8),

denotes the probability of j failed MPDUs that are dropped after reaching the retry limit.

3.3 Modeling of Service Time Distribution for

Proposed AH-ARQ Scheme

In this section, the performance analysis and modeling for the service time distribution of proposed AH-ARQ scheme is presented. Based on the RS code, the decoding errors occur while there are more than  corrupted symbols within a predefined block. Therefore, a decoding error probability Beof a block can be formulated as

Be¼

Xnc

r¼þ1

Cnc

r sreð1  seÞncr: ð20Þ

The parameter serepresents the error rate of an RS symbol

defined in GF ð2nbÞ with n

b bits, i.e., se¼ 1  ð1  BERÞnb

where BER denotes the bit error rate. It is noticed that Beas

defined in (20) is usually served as an upper bound of decoding errors for the RS code. Let He be denoted as the

Fig. 6. Schematic diagram for the PGF of slot time delay distribution HdðzÞ.

(8)

probability that either the delimiter or the first RS block in the Encoded_MPDU fails in transmission, which can be calculated as

He¼ Beþ PDEL Be PDEL: ð21Þ

Note again that the entire Encoded_MPDU should be retransmitted if either the delimiter or the first RS block fails in transmission. Within an A-Encoded_MPDU, it is assumed that there are J Encoded_MPDUs and each has K RS blocks. In order to distinguish the first RS block and

the remaining RS blocks, the parameter K0¼ K  1 is

utilized to indicate the number of remaining RS blocks in an Encoded_MPDU, and K0will start from two for identifying

each RS block. Refer to Fig. 5, letuekbe defined as the state of

k failed RS blocks in a specific Encoded_MPDU, and eq0 k;l

represents the transition probability from the state uek to

e

ul in a single A-Encoded_MPDU transmission. The

prob-ability eq0 k;lcan be formulated as e q0 k;l¼ Heþ ð1  HeÞBke; k¼ l; ð1  HeÞ  Bleð1  BeÞkl; k > l; 0; k < l; 8 < : ð22Þ

for 0  k; l  K0. Note that eq0

k;l is defined for a single

A-Encoded_MPDU transmission transmission given the suc-cessful transmission of the RTS packet. Hence, eqk;lðzÞ, the

transition probability along with required time in the power of z from state uek to uel in the L opportunities for

A-Encoded_MPDU transmissions, can be derived as eqk;0ðzÞ eqk;1ðzÞ .. . eqk;kðzÞ 0 B B B @ 1 C C C A¼ 1 qe0 1;0 zTRS . . . qe0k;0 zkTRS 0 qe0 1;1 zTRS . . . qe0k;1 zkTRS .. . .. . . . . .. . 0 0 . . . qe0 k;k zkTRS 0 B B B B @ 1 C C C C A L  0 .. . 0 1 0 B B @ 1 C C A; ð23Þ where the parameters TRS represents the transmission time

of one RS block. Moreover, let xjfor 0  xj K0be denoted

as the number of failed RS blocks except for the first one in the jth Encoded_MPDU, which are integrated into the vector x ¼ ½x1x2 . . . xj . . . xJ for 1  j  J. Furthermore,

at the ith backoff stage, letei;xbe denoted as the probability

that there are still xj failed RS blocks in the jth

Encoded_MPDU for 1  j  J after either the WS success-fully sends its RTS packet and the corresponding A-MPDU or the RTS packet is failed in transmission, which can be derived as e 0;x¼ Pcþ ð1  PcÞ  ðeqK0;K0ð1ÞÞJ; i¼ 0; x ¼ K0 1; e 0;x¼ ð1  PcÞ  YJ j¼1 eqK0;x jð1Þ " # ; i¼ 0; x 6¼ K0 1; e i;x¼ Pcei1;xþ ð1  PcÞ X r2Ux e i1;r YJ j¼1 eqrj;xjð1Þ " # ; 0 < i M ð24Þ

where K0 1 denotes a 1  J vector with all elements equal

to K0, r ¼ ½r

1r2 . . . rJ, and the set Ux¼ frjK0 r1 x1;

K0 r

2 x2; . . . ; K0 rJ  xJg. Letepirepresents the failed

transmission probability at the ith stage, which can be calculated as epi¼ 1e0;0; i¼ 0; 1ei;0 1ei1;0 ; 0 < i M; 8 < : ð25Þ

where 0 represents a 1  J vector with all elements equal to 0. By replacing pi in (3) with epi in (25), the parameters Pc

and  can be iteratively solved based on (3), (4), and (5). Moreover, eqk;lðzÞ, ei;x, and epi can also be obtained after

acquiring the parameter Pc.

Furthermore, let eSiðzÞ be defined as the PGF of

A-Encoded_MPDU’s service time distribution on the con-dition that all the Encoded_MPDUs are successfully received at the ith backoff stage, and let eFi;xðzÞ represent

the PGF of total required time distribution on the condition that there are xj failed RS blocks except for the first one in

the jth Encode_MPDU for 1  j  J at the ith backoff stage. Without the consideration of backoff delay, these two distributions can be, respectively, formulated as

e S0ðzÞ ¼ 1 Pc e 0;0 eq K0;0ðzÞ  zLTH  J zTA; e SiðzÞ ¼ 1 Pc e i;0ei1;0 X x2U0 ðx6¼0Þ e i1;x eFi1;xðzÞ 2 6 4 YJ j¼1 eqxj;0ðzÞ  z LTH !#  zTA; 0 < i M; ð26Þ and e F0;xðzÞ ¼ 1 Pc e 0;x eqK 0;K0ðzÞ  zLTH  J zTAþ Pc e 0;x  zTout; i¼ 0; x ¼ K0 1 e F0;xðzÞ ¼ 1 Pc e 0;x YJ j¼1 eqK0;x jðzÞ  z LTH    zTA; i¼ 0; x 6¼ K0 1 e Fi;xðzÞ ¼ 1 Pc e i;x " X r2Ux e i1;r eFi1;rðzÞ YJ j¼1 eqrj;xjðzÞ  z LTH  #  zTA þ Pc e i;x

ei1;x eFi1;xðzÞ  zTout; i6¼ 0;

ð27Þ

where TH indicates the required time for sending one

delimiter and the first RS block in an Encoded_MPDU. Note that the approximated formulations in (26) and (27) is obtained based on the condition that all the delimiters and the first RS blocks in the Encoded_MPDUs will be transmitted until the entire service finishes.

Furthermore, the three exclusive events that occur in a slot time with the existence of a specific WS in the backoff process will be the same as presented in (12). The corresponding time costs will also be identical to those in (15) except for the PGF XðzÞ that represents event (b). Let

(9)

e

XðzÞ be defined as the PGF of required time distribution given the occurrence of event (b) for the proposed AH-ARQ algorithm, which can be acquired as

e XðzÞ ¼ XM i¼0 bi;0  X x2U0 ðx6¼0Þ e PX;i;x YJ j¼1 Xxj r¼0 eqxj;rðzÞ  z LTH !  zTA 2 6 4 3 7 5 8 > < > : 9 > = > ;; ð28Þ where e PX;i;x¼ 1; i¼ 0; x ¼ K0 1; 0; i¼ 0; x 6¼ K0 1; e i1;x 1ei1;0 ; 0 < i M: 8 > > < > > : ð29Þ

Moreover, the approximated PGF of slot time delay

distribution eHdðzÞ for the AH-ARQ scheme can also

be obtained by replacing XðzÞ in (14) with eXðzÞ. The total backoff delay eHiðzÞ at the ith backoff stage for the AH-ARQ

scheme will be of the same form as in (17). Let esucc;i

indicates the probability that all the Encoded_MPDUs have been successfully rec-eived at the ith backoff stage, which can be computed as e succ;i¼ e 0;0; i¼ 0; e i;0 i1;0; 0 < i M:  ð30Þ Finally, the PGF of total service time distribution, i.e., eTðzÞ, for the proposed AH-ARQ algorithm can be obtained as

e TðzÞ ¼ X M i¼0 e succ;i eSiðzÞ  Yi r¼0 HrðzÞ ! þ X x2U0 ðx6¼0Þ e M;x eFM;xðzÞ 0 B @ 1 C A Y M r¼0 HrðzÞ: ð31Þ

4

P

ERFORMANCE

E

VALUATION

In this section, the performance of proposed ASR-ARQ and AH-ARQ schemes will be validated and compared via

simulations. Additive white Gaussian noise is assumed for performance comparison under error-prone channels. Modulation and coding schemes (MCSs) are employed for the purpose of adapting channel quality which is evaluated by the received signal-to-noise ratio (SNR). Moreover, the effective BERs for MCSs can be precomputed by MATLAB tools in order to accelerate the simulation runs. Note that the notation “MCSðmod; RÞ” represents the modulation type mod and convolutional code with coding rate R that are applied for MCS. Note also that the reference data rate with MCS(16QAM, 1/2) is set to 60 Mbps, and the data rates with other MCSs can therefore be computed. A system C/C++ network simulation model is constructed by considering the AP based single-hop communications. As shown in Table 1, the MAC-defined parameters that are described in the IEEE 802.11n standard is adopted in both the analytical models and the simulations.

As illustrated from Figs. 7, 8, 9, 10, 11, and 12, the proposed analytical models for both the ASR-ARQ and AH-ARQ schemes are validated with simulation results. Note that three WSs, i.e., N ¼ 3, are concurrently accessing the channel to communicate with the AP within the network. Fig. 7 shows the model validation for ASR-ARQ scheme via the CDF of service time by performing inverse z-transform of T ðzÞ in (19) under SNR ¼ 10 dB, MCS(16QAM, 1/2), and the number of opportunities for A-MPDU transmissions L ¼ 2. Each A-MPDU consists of 848-bytes information payload. Four different numbers of aggregated MPDUs within an A-MPDU are considered for model validation, i.e., J ¼ 5, 10, 15, and 20. The results obtained from the analytical model are denoted as “ana”; while that from the simulations are represented as “sim.” Intuitively, it is shown in the figure that the service time is increased as the number of aggregated MPDUs J is augmented. Fig. 8 illustrates the performance validation for the ASR-ARQ scheme for the number of aggregated MPDU J ¼ 5, MCS(QPSK, 3/4), and L ¼ 2 under different SNR values. It can be observed that the CDF of service time is decreased as the SNR value is increased. Fig. 9 displays

TABLE 1 System Parameters

Fig. 7. Performance validation for ASR-ARQ scheme: CDF of service time distribution, i.e., inverse z-transform of TðzÞ, under SNR ¼ 10 dB, MCS(16QAM, 1/2), and L¼ 2.

(10)

the performance validation condition on the number of aggregated MPDU J ¼ 5, SNR ¼ 8:8 dB and MCS(16QAM, 1/2) under different numbers of opportunities for A-MPDU transmissions L. It can be observed that there exists crossing effect between the curves, which denotes that larger value of L does not necessarily result in shorter service time. The reason is that both WS in concern and the other WSs possess the same opportunities to transmit their MPDUs, which may not result in shorter packet service time with larger value of L. For those WSs with shorter service time can benefit from larger L, which becomes a drawback for those WSs with longer service time. Moreover, as shown in all three figures, the results from the simulations and the analytical model are consistent with each other under different conditions.

On the other hand, considering that two Encoded_MP-DUs are aggregated in an A-Encoded_MPDU, Fig. 10 illustrates the CDF of service time by conducting the

inverse z-transform of eTðzÞ in (31) for the proposed AH-ARQ algorithm with SNR ¼ 4:5 dB, MCS(QPSK, uncoded), and L ¼ 2 under different values of K; while Fig. 11 displays the performance validation for the scenario of

K¼ 4, MCS(16QAM, 1/2), and L ¼ 2 under different SNR

values. Moreover, the performance validation under differ-ent L values are considered in Fig. 12 with K ¼ 4, SNR ¼ 4:4 dB, and MCS(QPSK, uncoded). Note that K ¼ 4 corresponds to K0¼ 3. The RSð255; 223Þ code over GF ð28Þ is

constructed for the proposed AH-ARQ scheme via the primitive polynomial 1 þ x2þ x3þ x4þ x8. Each 848-bytes

information payload contained in an original MPDU is partitioned into four RS blocks. The first RS block contains 191-bytes information octets and 28-bytes MAC header, and each of the remaining three RS block consists of 219-bytes information octets. Note that the remaining 4 bytes are occupied by the FCS for validation purpose. Similar to Figs. 7 and 8, longer service time will be incurred with

Fig. 9. Performance validation for ASR-ARQ scheme: CDF of service time distribution, i.e., inverse z-transform of TðzÞ, under J ¼ 5, SNR ¼ 8:8 dB, and MCS(16QAM, 1/2).

Fig. 10. Performance validation for AH-ARQ scheme: CDF of service time distribution, i.e., inverse z-transform of eTðzÞ, under SNR ¼ 4:5 dB, MCS(QPSK, uncoded), and L¼ 2.

Fig. 11. Performance validation for AH-ARQ scheme: CDF of service time distribution, i.e., inverse z-transform of eTðzÞ, under the number of RS blocks K¼ 4, MCS(16QAM, 1/2) and L ¼ 2.

Fig. 8. Performance validation for ASR-ARQ scheme: CDF of service time distribution, i.e., inverse z-transform of TðzÞ, under J ¼ 5, MCS(QPSK, 3/4), and L¼ 2.

(11)

either larger K or lower SNR value in Figs. 10 and 11, respectively. In Fig. 12, the crossing effect between different Lcurves is observed, which can also be explained similar to Fig. 9 for the ASR-ARQ scheme. It can be seen from all three figures that in most cases the proposed analytical model can match with the simulation results under different K, SNR, and L values.

Figs. 13, 14, 15, 16, 17, and 18 illustrate performance comparisons for proposed schemes under different para-meter settings. If not further specified, the following parameters are set as the default values for performance comparison: number of WSs N ¼ 10, number of transmis-sion opportunities for A-MPDU/A-Encoded_MPDU L ¼ 2, MCS(16QAM,1/2), aggregated MPDUs J ¼ 10, number of RS blocks K ¼ 4, and RSð255; 223Þ code. Fig. 13 shows the performance comparison for both the system throughput and mean service time under different SNR values with the number of aggregated MPDUs J ¼ 10 and 20. The SW-ARQ scheme is also implemented in the simulations for

comparison purpose. The SW-ARQ approach denotes that only a single MPDU is delivered for data transmission, which can be regarded as a special case of the ASR-SRQ scheme by setting J ¼ 1. It can be observed that the proposed AH-ARQ algorithm outperforms the other two schemes under lower SNR values, i.e., for SNR < 10 dB. The reason is that there is higher probability for the AH-ARQ scheme to correct packet errors compared to the other mechanisms without RS codes since packet transmis-sion tends to fail under lower SNR environments. More-over, the system throughput of the AH-ARQ approach can maintain at the same level under different SNR values; while the performances of the other two schemes signifi-cantly drop with decreased SNR values. On the other hand, the proposed AH-ARQ algorithm is inferior to the ASR-ARQ scheme under higher SNR values, i.e., SNR > 10 dB. The redundant FEC field in the proposed AH-ARQ scheme will become communication overheads under better chan-nel conditions. It can also be observed that both the proposed aggregation-based algorithms, i.e., the AH-ARQ Fig. 12. Performance validation for AH-ARQ scheme: CDF of service

time distribution, i.e., inverse z-transform of eTðzÞ, under the number of RS block K¼ 4, SNR ¼ 4:4 dB, and MCS(QPSK, uncoded).

Fig. 13. Performance comparison: system throughput and mean service time versus SNR values under different numbers of MPDUs (J).

Fig. 14. Performance comparison: system throughput and mean service time versus SNR values under different RS code rates.

Fig. 15. Performance comparison: system throughput and mean service time versus SNR values under different MPDU/Encoded_MPDU sizes with a roughly fixed A-MPDU/A-Encoded_MPDU length.

(12)

and ASR-ARQ schemes, can provide better performance compared to the SW-ARQ scheme since MPDU aggregation can effectively improve channel utilization. Moreover, under the same scheme, system throughput can be enhanced with larger number of aggregated MPDUs J due to the increased channel utilization. However, elon-gated mean service time is required under larger J since each WS will spend more time both on its own data transmission and waiting for other WS’s data delivery.

Fig. 14 displays the performance comparison for both the system throughput and mean service time with different RS coding rates. For fair comparison, the sizes of both MPDU and Encoded_MPDU are fixed as 1,020 by-tes. Therefore, the payloads for ASR-ARQ/SW-ARQ mechanisms are 1020  28 ¼ 992 bytes; while the payloads for AH-ARQ scheme with RS(255,223), RS(255,239), and RS(255,247) will be 848, 912, 944 bytes, respectively. Note that the 848-bytes MPDU is computed from 219 (payload per RS block)  ðK ¼ 4Þ  28 (MAC header) ¼ 848, where the number of RS blocks is chosen as K ¼ 4. It can be seen

from both figures that the AH-ARQ scheme with lower RS coding rate outperforms the other algorithms under lower SNR channel since the scheme with lower RS coding rate can protect more information bytes. For instance, the throughput of AH-ARQ scheme with RS(255,223) can still be maintained at around 32 Mbps even if the SNR value approaches 7 dB; while that from the other schemes drops quickly under low SNR values. On the other hand, the ASR-ARQ scheme will provide higher system throughput under high SNR values due to the required FEC overhead from the AH-ARQ approach. Moreover, under higher SNR channel, the AH-ARQ scheme with higher RS coding rate will provide larger system throughput than that with lower RS coding rate since low RS coding rate will incur reduced number of successfully received information bytes.

As shown in Figs. 13 and 14, the performance of SW-ARQ scheme is inferior to the proposed ASR-SW-ARQ and AH-ARQ schemes under most cases. Therefore, the SW-AH-ARQ scheme will be omitted in the following plots to provide better performance comparisons between the ASR-ARQ and AH-ARQ algorithms. Fig. 15 displays the performance comparison for both the system throughput and mean service time under different MPDU/Encoded_MPDU sizes with a roughly fixed A-MPDU/A-Encoded_MPDU length. For fair comparison, both the MPDU and Encoded_MPDU payload sizes for curve K are computed as 219  K  28 that follows the computation for the RS block, even though it is not adopted in MDPU for the ASR-ARQ scheme. In order to approximately fix the length of A-MPDU/A-Encoded_MPDU, the number of aggregated MPDUs/ Encoded_MPDUs J in an A-MPDU/A-Encoded_MPDU is calculated by 40=K. It can be observed that larger MPDU size can lead to higher system throughput for the ASR-ARQ scheme under higher SNR values, which is mainly caused by higher channel utilization. However, larger payload size results in worse performance under lower SNR values due to higher failure rate for transmitting larger MPDUs. On the other hand, the AH-ARQ scheme with larger Encoded_MP-DU size outperforms that with smaller payload size under Fig. 17. Performance comparison: system throughput and mean service

time versus SNR values under different MCSs.

Fig. 18. Performance comparison: mean service time and MPDUs/ Encoded_MPDUs dropped probability versus SNR values under different retry limits (M) and number of WSs (N).

Fig. 16. Performance comparison: system throughput and mean service time versus SNR values under different numbers of MPDUs (J) with a roughly fixed TXOP duration.

(13)

different SNR values due to the reason that each En-coded_MPDU is divided into several self-correcting RS blocks. On the other hand, the number of aggregated MPDUs/Encoded_MPDUs J can provide complementary effect as the MPDU/Encoded_MPDU size to the system performance. For the AH-ARQ scheme, adding J value will cause augmentation of the MAC header overhead which slightly decreases the throughput performance for the case

K¼ 2 compared to the curve K ¼ 20. Moreover, for

ASR-ARQ scheme, larger J value (e.g., K ¼ 2 case) can conquer the worse channel condition with its MAC header protec-tion, which lead to higher system throughput. In addiprotec-tion, it can still be observed from both system throughput and mean service time that the proposed AH-ARQ algorithm can outperform the ASR-ARQ scheme under worse channel condition; while the ASR-ARQ protocol is slightly superior to the AH-ARQ scheme under better channel condition.

Fig. 16 shows the performance comparison for both the system throughput and mean service time considering the tradeoff between the number of MPDUs in an A-MPDU (i.e., J) and the number of A-MPDUs (L) in a fixed TXOP duration. The maximum transmission opportunities L for A-MPDU/A-Encoded_MPDU transmissions can be com-puted as 20=J such that the TXOP duration can be approximately fixed. In other words, smaller transmission opportunities L will be acquired if the number of MPDU/ Encoded_MPDU J is enlarged. It can be seen from the figure that larger J value leads to higher system through-put for both the ASR-ARQ and AH-ARQ schemes since large J value can effectively enhance channel utilization. Therefore, the throughput performance is almost domi-nated by the J value rather than L due to the reason that adding L may furthermore cause extra communication overheads, e.g., ACK frame and SIFS interval. Moreover, it is not required for the WS to completely utilize all L opportunities if its packets have all been successfully transmitted. Hence, it can be seen that the throughput performance can be effectively enhanced by increasing J compared to the augmentation of L.

Fig. 17 shows the performance comparison for both the system throughput and mean service time for different MCSs. Note that the data rates of MCS(QPSK, 1/2), MCS(QPSK, 3/4), MCS(16QAM, 1/2), and MCS(16QAM, 3/4) are respectively 30 Mbps, 45 Mbps, 60 Mbps, and 90 Mbps. For fair comparison, the corresponding number of aggregated MPDUs J are, respectively, chosen as 6, 9, 12, and 18 in order to result in an identical TXOP period. It can be observed from the perspectives of both system through-put and mean service time that MCS with lower data rate can provide better performance than that with higher data rate under lower SNR values. The reason is that adopting MCS with lower data rate can decrease BER compared to that with higher data rate under the same SNR value. On the other hand, adopting MCS with higher date rate can lead to better performance compared to that with lower data rate under higher SNR values since more MPDUs can be accommodated within a single TXOP duration. From Fig. 17, it can be seen that the proposed AH-ARQ scheme provides better performance compared to the ASR-ARQ method under worse channel conditions.

Finally, Fig. 18 shows the performance comparison for both mean service time and MPDUs/Encoded_MPDUs dropped probability under different retry limits M and numbers of WSs N. Note that system throughput is not considered in this figure since mean service time and MPDUs/Encoded_MPDUs dropped probability are ob-served to be more sensitive to the variations of parameters

M and N. It can be seen from the upper plot that longer

service time will be acquired in both algorithms under larger M and N values, i.e., the case with M ¼ 7 and N ¼ 30. On the other hand, it is intuitive that lower MPDUs/ Encoded_MPDUs dropped probability can be achieved with larger value of retry limit M, i.e., the cases with M ¼ 7 in the lower plot. Furthermore, it can still be observed that the proposed AH-ARQ scheme is superior to the ASR-ARQ protocol under different SNR, M, and N values.

5

C

ONCLUSION

In this paper, two automatic repeat request mechanisms are proposed with the consideration of frame aggregation under the IEEE 802.11n networks. The aggregated selective repeat ARQ protocol is proposed by incorporating the conventional stop-and-wait ARQ scheme; while the aggre-gated hybrid ARQ algorithm further enhances throughput performance by adopting the Reed-Solomon block code for error correction under worse channel quality. Analytical models are constructed to evaluate the performance of proposed ASR-ARQ and AH-ARQ algorithms with the consideration of interfering stations. Simulations are also conducted to validate and compare the effectiveness of proposed ARQ mechanisms via both the mean service time and throughput performance. Numerical results show that the proposed AH-ARQ protocol can outperform the other schemes under worse channel condition; while the pro-posed ASR-ARQ protocol is superior to the other mechan-isms under better channel condition.

A

CKNOWLEDGMENTS

This work was in part funded by the Aiming for the Top University and Elite Research Center Development Plan, NSC 99-2628-E-009-005, the MediaTek research center at National Chiao Tung University, and the Telecommunication Laboratories at Chunghwa Telecom Co. Ltd, Taiwan.

R

EFERENCES

[1] IEEE 802.11 WG, IEEE Std 802.11a-1999 (R2003): Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: High-Speed Physical Layer in the 5 GHz Band, IEEE, 2003.

[2] IEEE 802.11 WG, IEEE Std 802.11b-1999 (R2003): Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Higher-Speed Physical Layer Extension in the 2.4 GHz Band, IEEE, 2003.

[3] IEEE 802.11 WG, IEEE Std 802.11g-2003: Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifica-tions: Amendment 4: Further Higher Data Rate Extension in the 2.4 GHz Band, IEEE, 2003.

[4] IEEE 802.11 WG, IEEE Std 802.11e-2005: Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifica-tions: Amendment 8: Medium Access Control (MAC) Quality of Service Enhancements, IEEE, 2005.

(14)

[5] IEEE 802.11 WG, IEEE P802.11n-2009: Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifica-tions: Amendment 5: Enhancements for Higher Throughput, IEEE, Oct. 2009.

[6] S. Abraham, A. Meylan, and S. Nanda, “802.11n MAC Design and System Performance,” Proc. IEEE Int’l Conf. Comm. (ICC), vol. 5, May 2005.

[7] Y. Li, S.W. Kim, J.K. Chung, and H.G. Ryu, “SFBC-Based MIMO OFDM and MIMO CI-OFDM Systems in the Nonlinear and NBI Channel,” Proc. IEEE Int’l Conf. Comm., Circuits and Systems (ICCCAS), vol. 2, pp. 898-901, June 2006.

[8] Y. Li, X. Wang, and S.A. Mujtaba, “Impact of Physical Layer Parameters on the MAC Throughput of IEEE 802.11 Wireless LANs,” Proc. Record of the 38th Asilomar Conf. Signals, Systems and Computers Conf. (ACSSC), vol. 2, pp. 1468-1472, Nov. 2004. [9] D. Skordoulis, Q. Ni, H.H. Chen, A.P. Stephens, C. Liu, and A.

Jamalipour, “IEEE 802.11n MAC Frame Aggregation Mechanisms for Next-Generation High-Throughput WLANs,” IEEE Wireless Comm., vol. 15, no. 1, pp. 40-47, Feb. 2008.

[10] B. Ginzburg and A. Kesselman, “Performance Analysis of A-MPDU and A-MSDU Aggregation in IEEE 802.11n,” Proc. IEEE Sarnoff Symp., May 2007.

[11] S. Parthasarathy and Q. Zeng, “A Novel Adaptive Scheme to Improve the Performance of the IEEE 802.11n WLANs,” Proc. IEEE 21st Int’l Conf. Advanced Information Networking and Applica-tions Workshops (AINAW), vol. 2, May 2007.

[12] S. Kim, S. Choi, Y. Kim, and K. Jang, “MCCA: A High-Throughput MAC Strategy for Next-Generation WLANs,” IEEE Wireless Comm., vol. 15, no. 1, pp. 32-39, Feb. 2008.

[13] D.L. Lu and J.F. Chang, “Analysis of ARQ Protocols via Signal Flow Graphs,” IEEE Trans. Comm., vol. 37, no. 3, pp. 245-251, Mar. 1989.

[14] Y. Hua and Z. Niu, “An Analytical Model for IEEE 802.11 WLANs with NAK-Based ARQ Mechanism,” Proc. Asia-Pacific Conf. Comm. (APCC), pp. 277-280, Oct. 2007.

[15] J.B. Seo, N.H. Park, H.W. Lee, and C.H. Cho, “Impact of an ARQ Scheme in the MAC/LLC Layer on Upper-Layer Packet Trans-missions over a Markovian Channel,” Proc. IEEE 63rd Vehicular Technology Conf. (VTC-Spring), vol. 4, May 2006.

[16] K.C. Beh, A. Doufexi, and S. Armour, “Performance Evaluation of Hybrid ARQ Schemes of 3GPP LTE OFDMA System,” Proc. IEEE 18th Int’l Symp. Indoor and Mobile Radio Comm. (PIMRC), pp. 1-5, Sept. 2007.

[17] E. Malkamaki, D. Mathew, and S. Hamalainen, “Performance of Hybrid ARQ Techniques for WCDMA High Data Rates,” Proc. IEEE 53rd Vehicular Technology Conf. (VTC-Spring), vol. 4, pp. 2720-2724, May 2001.

[18] T.F. Wong, L. Gao, and T.M. Lok, “A Type-I Hybrid ARQ Protocol over Optimal-Sequence CDMA Link,” Proc. IEEE 21st Century Military Comm. Conf. (MILCOM), vol. 1, pp. 559-563, Oct. 2001. [19] J.F. Cheng, Y.P.E. Wang, and S. Parkvall, “Adaptive Incremental

Redundancy [WCDMA Systems],” Proc. IEEE 58th Vehicular Technology Conf. (VTC-Fall), vol. 2, Oct. 2003.

[20] Q. Chen and P. Fan, “On The Performance of Type-III Hybrid ARQ with RCPC Codes,” Proc. IEEE 14th Int’l Symp. Indoor and Mobile Radio Comm. (PIMRC), vol. 2, pp. 1297-1301, Sept. 2003. [21] R. Guo and J.L. Liu, “BER Performance Analysis of RCPC

Encoded MIMO-OFDM in Nakagami-m Channels,” Proc. IEEE Int’l Conf. Information Acquisition (ICIA), pp. 1416-1420, Aug. 2006. [22] D.N. Rowitch and L.B. Milstein, “On the Performance of Hybrid FEC/ARQ Systems Using RCPT Codes,” IEEE Trans. Comm., vol. 48, no. 6, pp. 269-281, June 2000.

[23] J.G. Proakis, Digital Communication, fourth ed. McGraw-Hill, 2001. [24] U. Cheng, “On the Continued Fraction and Berlekamp’s Algo-rithm,” IEEE Trans. Information Theory, vol. 30, no. 3, pp. 541-544, May 1984.

[25] M.A. Khan, S. Afzal, and R. Manzoor, “Hardware Implementation of Shortened (48,38) Reed Solomon Forward Error Correcting Code,” Proc. Seventh Int’l Multi Topic Conf. (INMIC 03), pp. 90-95, Dec. 2003.

[26] G. Bianchi, “Performance Analysis of the IEEE 802.11 Distributed Coordination Function,” IEEE J. Selected Areas in Comm., vol. 18, no. 3, pp. 535-547, Mar. 2000.

[27] O. Tickoo and B. Sikdar, “Queueing Analysis and Delay Mitigation in IEEE 802.11 Random Access MAC Based Wireless Networks,” Proc. IEEE INFOCOM, vol. 2, pp. 1404-1413, Mar. 2004.

[28] Y. Zheng, K. Lu, D. Wu, and Y. Fang, “Performance Analysis of IEEE 802.11 DCF in Binary Symmetric Channels,” Proc. IEEE GLOBECOM, vol. 5, pp. 3144-3148, Nov. 2005.

[29] Q. Ni, T. Li, T. Turletti, and Y. Xiao, “Saturation Throughput Analysis of Error-Prone 802.11 Wireless Networks,” J. Wireless Comm. and Mobile Computing, vol. 5, no. 8, pp. 945-956, Dec. 2005. [30] Y. Lin and V.W.S. Wong, “Frame Aggregation and Optimal Frame Size Adaptation for IEEE 802.11n WLANs,” Proc. IEEE GLOBE-COM, vol. 5, pp. 1-6, Nov. 2006.

[31] S. Kuppa and G.R. Dattatreya, “Modeling and Analysis of Frame Aggregation in Unsaturated WLANs with Finite Buffer Stations,” Proc. IEEE Int’l Conf. Comm. (ICC), pp. 967-972, June 2006. [32] C.W. Liu and A.P. Stephens, “An Analytic Model for

Infrastruc-ture WLAN Capacity with Bidirectional Frame Aggregation,” Proc. IEEE Wireless Comm. and Networking Conf. (WCNC), vol. 1, pp. 113-119, Mar. 2005.

[33] T. Li, Q. Ni, and Y. Xiao, “Investigation of the Block ACK Scheme in Wireless Ad-Hoc Networks,” J. Wireless Comm. and Mobile Computing, vol. 6, no. 6, pp. 877-888, Sept. 2006.

[34] T. Li, Q. Ni, D. Malone, D. Leith, Y. Xiao, and T. Turletti, “Aggregation with Fragmentation Retransmission for Very High-Speed Wireless LANs,” IEEE/ACM Trans. Networking, vol. 17, no. 2, pp. 591-604, Apr. 2009.

[35] S. Choi and K.G. Shin, “A Class of Adaptive Hybrid ARQ Scheme for Wireless Links,” IEEE Trans. Vehicular Technology, vol. 50, no. 3, pp. 777-790, May 2001.

[36] S. Choi, Y. Choi, and I. Lee, “IEEE 802.11 MAC-Level FEC with Retransmission Combining,” IEEE Trans. Wireless Comm., vol. 5, no. 1, pp. 203-211, Jan. 2006.

[37] Y. Choi and S. Choi, “Above-MAC FEC Scheme in IEEE 802.11 WLAN,” Proc. IEEE Asia Pacific Wireless Comm. Symp. (APWCS), Aug. 2005.

[38] E. Berlekamp, Algebraic Coding Theory. McGraw-Hill, 1968. [39] H.V. Zoran and S. Boris, “Saturation Throughput - Delay Analysis

of IEEE 802.11 DCF in Fading Channel,” Proc. IEEE Int’l Conf. Comm. (ICC), vol. 1, pp. 121-126, May 2003.

[40] Z. Eustathia and A. Theodore, “CSMA/CA Performance under High Traffic Conditions: Throughput and Delay Analysis,” Computer Comm., vol. 25, no. 3, pp. 313-321, Feb. 2002.

[41] S. Ci, H. Sharif, and P. Mahasukhon, “Evaluating Saturation Throughput Performance of the IEEE 802.11 MAC under Fading Channels,” Proc. IEEE Second Int’l Conf. Broadband Networks (BROADNETS), vol. 1, pp. 676-681, Oct. 2005.

[42] J.S. Vardakas, M.K. Sidiropoulos, and M.D. Logothetis, “Perfor-mance Behaviour of IEEE 802.11 Distributed Coordination Function,” IET Circuits, Devices and Systems, vol. 2, no. 1, pp. 50-59, 2008.

[43] H. Wu, Y. Peng, K. Long, S. Cheng, and J. Ma, “Performance of Reliable Transport Protocol over IEEE 802.11 Wireless LAN: Analysis and Enhancement,” Proc. IEEE INFOCOM, vol. 2, pp. 599-607, Jun. 2002.

Jia-Shi Lin received the BS degree from National Tsing Hua University, Hsinchu, Taiwan, in 2007. Since 2007, he has been working toward the PhD degree in the Department of Electrical Engineering, National Chiao Tung University, Hsinchu, Taiwan. His current re-search interests include game theory, MAC protocol design, wireless local area networks, and cognitive radio networks. He is a student member of the IEEE.

(15)

Kai-Ten Feng received the BS degree from National Taiwan University, Taipei, in 1992, the MS degree from the University of Michigan, Ann Arbor, in 1996, and the PhD degree from the University of California, Berkeley, in 2000. Between 2000 and 2003, he was an in-vehicle development manager/senior technologist with OnStar Corporation, a subsidiary of General Motors Corporation, where he worked on the design of future telematics platforms and in-vehicle networks. Since August 2011, he has been a full professor with the Department of Electrical and Computer Engineering, National Chiao Tung University (NCTU), Hsinchu, Taiwan, where he was an associate professor and assistant professor from August 2007 to July 2011 and from February 2003 to July 2007, respectively. From July 2009 to March 2010, he was a visiting scholar with the Department of Electrical and Computer Engineering, University of California at Davis. He has also been the convener of the NCTU Leadership Development Program since August 2011. Since October 2011, he has been serving as the director of the Digital Content Production Center at the same university. His current research interests include broadband wireless networks, cooperative and cognitive networks, smart phone and embedded system designs, wireless location technologies, and intelligent trans-portation systems. He received the Best Paper Award from the Spring 2006 IEEE Vehicular Technology Conference, which ranked his paper first among the 615 accepted papers. He also received the Outstanding Youth Electrical Engineer Award in 2007 from the Chinese Institute of Electrical Engineering and the Distinguished Researcher Award from NCTU in 2008, 2010, and 2011. He has served on the technical program committees in various international conferences. He is a member of the IEEE and the IEEE Computer Society.

Yu-Zhi Huang received the BS degree in electrical engineering from National Tsing Hua University, Taiwan, in 2006, and the MS degree in the Department of Communication Engineer-ing at National Chiao Tung University, Taiwan, in 2008. Currently, he is working for Holtek Semiconductor Inc. in Taipei, Taiwan. His research interests include MAC protocol design in WLAN systems, cross layer optimization, error control techniques, and the implementation of multicast routing protocols.

Li-Chun Wang received the BS degree from National Chiao Tung University, Taiwan, R.O.C. in 1986, the MS degree from National Taiwan University in 1988, and the MSc and PhD degrees from the Georgia Institute of Technol-ogy, Atlanta, in 1995, and 1996, respectively, all in electrical engineering. From 1990 to 1992, he was with the Telecommunications Laboratories of the Ministry of Transportations and Commu-nications in Taiwan (currently the Telecom Labs of Chunghwa Telecom Co.). In 1995, he was affiliated with Bell Northern Research of Northern Telecom, Inc., Richardson, Texas. From 1996 to 2000, he was with AT&T Laboratories, where he was a senior technical staff member in the Wireless Communications Research Department. In August 2000, he joined the Department of Electrical and Computer Engineering of National Chiao Tung University in Taiwan and is the current chairman of that department. His current research interests include the areas of radio resource management and cross-layer optimization techniques for wireless systems, heterogeneous wireless network design, and cloud computing for mobile applications. He was a corecipient (with Gordon L. Stu¨ber and Chin-Tau Lea) of the 1997 IEEE Jack Neubauer Best Paper Award for his paper “Architecture Design, Frequency Planning, and Performance Analysis for a Microcell/Macro-cell Overlaying System,” IEEE Transactions on Vehicular Technology, vol. 46, no. 4, pp. 836-848, 1997. He has published more than 150 journal and international conference papers. He served as an associate editor for the IEEE Transactions on Wireless Communications from 2001 to 2005, as a guest editor of the special issue on “mobile computing and networking” for the IEEE Journal on Selected Areas in Communications in 2005, and on “radio resource management and protocol engineering in future IEEE broadband networks” for IEEE Wireless Communications Magazine in 2006. He holds nine US patents. He was elected as an IEEE fellow in 2011 for his contributions to cellular architectures and radio resource management in wireless networks.

. For more information on this or any other computing topic, please visit our Digital Library at www.computer.org/publications/dlib.

數據

Fig. 2. The flow diagram of MPDUs deaggregation procedure for proposed ASR-ARQ scheme.
Fig. 6. Schematic diagram for the PGF of slot time delay distribution H d ðzÞ.
Fig. 7. Performance validation for ASR-ARQ scheme: CDF of service time distribution, i.e., inverse z-transform of TðzÞ, under SNR ¼ 10 dB, MCS(16QAM, 1/2), and L ¼ 2.
Fig. 9. Performance validation for ASR-ARQ scheme: CDF of service time distribution, i.e., inverse z-transform of T ðzÞ, under J ¼ 5, SNR ¼ 8:8 dB, and MCS(16QAM, 1/2).
+3

參考文獻

相關文件

The notation T n (x) is used to represent the nth partial sum of this series and we can call it as it the nth-degree Taylor polynomial of f at a... In general, it can be shown

We show that the exible time-driven distance-constrained model using the pinwheel scheduling algorithms can achieve both predictability and schedulability for many real-time

In this paper, we provide new decidability and undecidability results for classes of linear hybrid systems, and we show that some algorithms for the analysis of timed automata can

In view of the large quantity of information that can be obtained on the Internet and from the social media, while teachers need to develop skills in selecting suitable

In addition that the training quality is enhanced with the improvement of course materials, the practice program can be strengthened by hiring better instructors and adding

 “More Joel on Software : Further Thoughts on Diverse and Occasionally Related Matters That Will Prove of Interest to Software Developers, Designers, and Managers, and to Those

In this thesis, we have proposed a new and simple feedforward sampling time offset (STO) estimation scheme for an OFDM-based IEEE 802.11a WLAN that uses an interpolator to recover

Results indicate that the proposed scheme reduces the development cost, numbers of design change, and project schedule of the products, and consequently improve the efficiency of