• 沒有找到結果。

On Throughput Performance of Channel Inequality in IEEE 802.11 WLANs

N/A
N/A
Protected

Academic year: 2021

Share "On Throughput Performance of Channel Inequality in IEEE 802.11 WLANs"

Copied!
7
0
0

加載中.... (立即查看全文)

全文

(1)

Transactions Letters

On Throughput Performance of Channel Inequality in

IEEE 802.11 WLANs

Chiapin Wang, Member, IEEE, Tsungnan Lin, Senior Member, IEEE, and Kuang-Wei Chang

Abstract—In this paper we investigate the throughput

perfor-mance of IEEE 802.11 Distributed Coordination Function (DCF) in the presence of physical-layer (PHY) inequality, i.e. varied channel conditions and/or unequal data rates determined by the Link Adaptation (LA) scheme. We present a theoretical model for DCF protocol with the LA scheme of AutoRate Fallback (ARF). The analysis results show that the system throughput of DCF-based WLANs is determined by the lowest data rate used with stations; throughput sharing among stations depends on the variation of link qualities rather than the difference of data rates. The simulation results validate the accuracy of our analytical model.

Index Terms—IEEE 802.11 WLAN, DCF, performance

analy-sis.

I. INTRODUCTION

I

EEE 802.11 Wireless Local Area Networks (WLANs) become increasingly popular in the recent years with the wide deployment of infrastructure and the prevalence of mobile/handheld devices. The IEEE 802.11 standards [1] on the physical layer (PHY) support multiple transmission rates with different Modulation and Coding Schemes (MCS). According to the experienced channel condition, one data rate will be selected from multiple rates available to achieve both a reliable link quality and the highest throughput as possible. In such a varying-channel and multi-rate WLAN environment, the throughput performance essentially depends on not only the Medium Access Control (MAC) protocol, but also the PHY inequality among 802.11 stations, i.e. different channel conditions and/or unequal data rates determined by the Link Adaptation (LA) scheme. The authors in [2] [3] conducted experiments and simulations to study throughput of the 802.11 MAC protocol, Distributed Coordination Function (DCF) in the presence of PHY inequality. However, they Manuscript received June 7, 2007; revised November 16, 2007; accepted February 12, 2008. The associate editor coordinating the review of this paper and approving it for publication was G. Mandyam. This work was supported in part by the National Science Council under Grant 96-2221-E-002-091 and Grant 96-2219-E-002-006, and by Excellent Research Projects of National Taiwan University, 97R0062-06.

C. Wang was with the Graduate Institute of Communication Engineering, National Taiwan University. He is now with the Institute of Applied Electronic Technology, National Taiwan Normal University, Taipei, 106, Taiwan.

T. Lin and K-W. Chang are with the Department of Electrical Engineering and Graduate Institute of Communication Engineering, National Taiwan University, Taipei, 106, Taiwan (e-mail: tsungnan@ntu.edu.tw).

Digital Object Identifier 10.1109/T-WC.2008.070655

did not offer complete theoretical analyses which can be the most important base for understanding the impact of PHY inequality on the performance of DCF. In [4] [5] the authors presented theoretical analyses for DCF protocol in error-prone fading channels. Nevertheless, they consider only identical non-perfect channel conditions and equal data rates for all stations, which may be insufficient for thoroughly investigate the performance of DCF with PHY inequality.

In this paper we study the throughput performance of DCF protocol when 802.11 stations can be with unequal data rates and/or in different channel conditions. The analysis should be more practical to realistic WLAN environments since the sender stations can adopt unequal data rates with a LA mechanism, and also can experience different link qualities in transmission at most of the time due to limited MCSs available. We develop an analytical model for DCF protocol with the LA scheme of AutoRate Fallback (ARF) [6] which has been adopted by most commercial 802.11 WLAN products. The numerical results show that: the throughput performance of DCF-based WLANs is greatly affected by both the experienced channel conditions and used data rates of 802.11 stations, while system throughput is determined by the lowest used data rate, and individual-station throughput depends on the variation of link qualities among stations rather than the difference of data rates. We validate our analytical model via simulations and the results demonstrate its accuracy.

II. ANALYTICALMODEL FOR802.11 DCFWITHPHY INEQUALITY

In this section we present the theoretical model for DCF protocol with the LA scheme of ARF. Our DCF model is developed based on previous work [7], while we further take into account the finite retransmission limit, the probability that the backoff counter is frozen when the channel is sensed busy, error-prone channels and multiple data rates.

Consider K IEEE 802.11 stations in error-prone channel conditions with multiple data rates. The non-perfect 802.11 channels is modeled with the Gilbert-Elliott two-state discrete Markov chain which is commonly adopted for modeling fading channels such as the Rayleigh channel [8]. From the model, we can obtain the level of Received Signal Strength (RSS) and Signal to Noise Ratio (SNR) associated with each transmitted packet in a given time period. Assume each station 1536-1276/08$25.00 c 2008 IEEE

(2)

0,0 0,1 0,2

Lretry,0 Lretry,1 Lretry,2

j+1,0 j+1,1 j+1,2 j+1,CWj+1-2 j+1,CWj+1-1 pi,f/CWj+2 j,0 j,1 j,2 j,CWj-2 j,CWj-1 pi,f/CWj+1 0,CWmin-2 0,CWmin-1 pi,f/CW1

1/CWmin, if it comes from the state (Lretry,0); Otherwise (1-pi,f)/CWmin 1-pi,c

1-pi,c

1-pi,c

1-pi,c 1-pi,c

1-pi,c 1-pi,c 1-pi,c

1-pi,c

pi,c 1-pi,c

1-pi,c 1-pi,c 1-pi,c 1-pi,c

1-pi,c

1-pi,c 1-pi,c 1-pi,c 1-pi,c 1-pi,c

pi,c pi,c

pi,c pi,c

pi,c pi,c pi,c pi,c

pi,c pi,c pi,c pi,c

pi,c pi,c pi,c

1-pi,f 1-pi,f 1-pi,f 1 retry L i,f CW p 1 CW , Lretry Lretry− 2 CW , Lretry Lretry−

Fig. 1. The state transition diagram of stationi.

always has a packet to send (i.e. operating in a saturated traffic condition). To stationi (i = 0 ∼ K − 1), let pi,c denote the

probability of a transmitting packet collided with other ones. That is:

pi,c= 1 − K−1

h=0,h=i

(1 − τh) (1)

whereτh is the probability for stationh (h = i) transmitting

a packet in a given slotted time. It is noted that even in the presence of packet collisions, the packet with the strongest RSS has an opportunity to be correctly decoded at the receiver. This is referred as the capture effect [9]. Here we use a simplified capture model: when multiple packets collide at the receiver, only the packet can be successfully received if its RSS is larger than anyone of others by at least a threshold. Thus to station i the probability of transmission error due to packet collisions with the capture effect, pi,cap, can be

expressed as:

pi,cap= 1 − K−1

h=0,h=i

(1 − τh· capi,h) (2)

wherecapi,hrepresents the capture effect on stationi

associ-ated with stationh: capi,h=



0, if10log(RSSi/RSSh) ≥ z0

1,else (3)

whereRSSxis RSS associated with stationx; z0is the relative

RSS threshold with a typical value of 10 dB adopted in ns2 simulator [10].

To station i, let pi,e denote the probability of a packet

transmission corrupted in non-perfect channels due to fading or noise. pi,e basically depends on the frame size, the used

MCS, and SNR at the receiver site. Consider that the error can occur in both the transmissions of data packets and Acknowl-edgement (ACK) frames and assume error-free transmissions of Request-To-Send / Clear-To-Send (RTS/CTS) packets for the four-way handshaking scheme. Assume that the channels between the sender and the receiver are symmetric (i.e. SNR

of data packet observed at the receiver is very similar to that of ACK packet received at the sender). Assume that SNR is unchanged inside the duration of a packet transmission and consider uncoded modulations like what are adopted from 802.11b standards. Thus the transmission-error probability, pi,e can be derived as shown in (4), whereP HYi is the used

PHY mode and Γiis the experienced SNR of stationi; F Siis

the frame size in bytes;P HYbasicis the PHY mode for ACK

frame;ACKS is the ACK frame size in bytes; BER(P HYi,

Γi) is the BER of modeP HYi with SNR Γi, which can be

provided empirically with experiments or theoretically with analyses.

As a result, a failure of transmission can be caused by the packet collision with other stations, and/or packet corruption in error-prone channels. Since the two events are independent, the probability of transmission failure for station i, pi,f can be expressed as:

pi,f = pi,cap+ (1 − pi,cap) · pi,e (5)

According to 802.11 standards, a station needs to wait for a random backoff time before the next transmission to avoid a collision with other stations. The random backoff timer is uniformly chosen in the interval (0, CW -1), where CW is the contention window size. After each retransmission due to collision or corruption,CW will be doubled until the number of retries comes to a certain limit,Lretry. LetCWmindenote

the initialCW , and CWj denote theCW in the jthbackoff

stage. Once CW reaches a maximum value CWmax, it will

remain at the value until it is reset. Therefore, the relationships amongCWj,CWmin,CWmax, andLretry can be as shown

in (6).

For stationi, let s(i, t) and c(i, t) be the stochastic process representing the backoff stage and backoff time counter at time t respectively. The two-dimensional processs(i, t), c(i, t) can be modeled with the discrete-time Markov chain shown in Fig. 1. We adopt the following notation:

Pi{j1, l1|j0, l0}

= Pr {s(i, t + 1) = j1, c(i, t + 1) = l1|s(i, t) = j0, c(i, t) = l0} . Thus from the two-dimensional Markov chain we can obtain the following equations shown in (7). The first equation in (7) represents the fact that the backoff counter is decremented when the channel is sensed idle with the probability of (1-pi,c) or frozen otherwise. It is noticed that pi,c, the

colli-sion probability defined in Equation (1), can also represent the frozen probability here since both the counter-frozen and packet-collided events are caused by one more other stations transmitting packets in a given slotted time. The second equation accounts for that a successful packet transmission with the probability of (1- pi,f) will returns to

backoff stage 0 and the counter is uniformly chosen in the interval (0,CWmin-1). The third equation considers the case

of unsuccessful packet transmission that a retransmission due to collision or corruption will enter into the next backoff stage. Finally the forth equation accounts for that if the number of retries reaches the maximum value Lretry, the backoff stage

will be reset to 0 no matter the consequent transmission is successful or failed.

(3)

pi,e = 1 − (1 − BER(P HYi, Γi))F Si∗8∗ (1 − BER(P HYbasic, Γi))ACKS∗8 (4) CWj = ⎧ ⎨ ⎩ 2jCW

min, for j = 0, 1,....,m−1, ifLretry> m

2mCW

min= CWmax, for j = m,....,Lretry, ifLretry > m

2jCW

min, for j = 0, 1,....,Lretry, ifLretry≤ m

where m = log2(CWmax/CWmin)

(6) ⎧ ⎪ ⎪ ⎨ ⎪ ⎪ ⎩ Pi{j, l|j, l + 1} = 1 − pi,c,l ∈ (0, CWj− 2), j ∈ (0, Lretry)

Pi{0, l|j, 0} = (1 − pi,f)/CWmin,l ∈ (0, CWmin− 1), j ∈ (0, Lretry− 1)

Pi{j, l|j − 1, 0} = pi,f/CWj,l ∈ (0, CWj− 1), j ∈ (1, Lretry)

Pi{0, l|Lretry, 0} = 1/CWmin,l ∈ (0, CWmin− 1)

(7)

Let bi,j,l = lim

t→∞Pr{s(i, t) = j, c(i, t) = l}, j ∈

(0, Lretry), l ∈ (0, CWj − 1) be the stationary state

proba-bilities of the Markov chain. From the chain regularity and by means of a simple computation,bi,0,0 is given by Equation

(8):

bi,0,0 =

 2(1−2p

i,f)(1−pi,f)(1−pi,c)

A+B ,Lretry≤ m

2(1−2·pi,f)(1−pi,f)(1−pi,c)

C−D+E+F ,Lretry> m

, where

A = CWmin(1 − (2pi,f)Lretry+1)(1 − pi,f);

B = (1 − pLretry+1

i,f )(1 − 2pi,c− 2pi,f+ 4pi,cpi,f);

C = CWmin(1 − (2pi,f)m+1)(1 − pi,f);

D = (1 − 2pi,f)(1 − pmi,f+1); E = (1 − 2pi,f)(2mCWmin− 1)(1 − p Lretry−m i,f ); F = 2(1 − 2pi,f)(1 − p Lretry+1 i,f )(1 − pi,c). (8)

Since a given station transmits when its backoff timer reaches 0, the probability that stationi transmits a packet in a randomly chosen slotted time,τi, can be derived as:

τi= L retry j=0 bi,j,0= L retry j=0 pj i,f· bi,0,0 = bi,0,0· 1 − pLretry+1 i,f 1 − pi,f . (9) From Equation (9) we can see thatτi depends on the

prob-ability of transmission failurepi,f, which is determined with

the corruption probabilitypi,eand the error probability due to

packet collision with the capture effect,pi,cap. From Equation

(1) to (9), we can solve unknown parameters τi and pi,f

numerically with a given set of RSSs (RSS1, ...RSSK),

SNRs (Γ1, ...ΓK), PHY modes (P HY1, ...P HYK), and

frame sizes (F S1, ...F SK) associated with the K stations.

LetPtr be the probability that at least one station transmits

in the considered slotted time: Ptr= 1 −

K−1

h=0

(1 − τh) (10)

LetPi,singledenote the probability that only stationi transmits

and the remainingK-1 stations are idle on condition that at least one station transmits. Thus it is expressed as:

Pi,single = τi· K−1 h=0,h=i (1 − τh)/(1 − K−1 h=0 (1 − τh)) (11)

Considering a given slot, the channel idle probability is (1-Ptr). The channel busy probability is Ptr, which

con-sists of the following parts: the probability of a successful transmission of station i, Ptr · Pi,single · (1 − pi,e); the

probability of a successful transmission of station h (h = i), Ptr ·

K−1 h=0,h=i

Ph,single· (1 − ph,e); the probability of a

failed transmission due to non-perfect channel conditions, Ptr·

K−1 x=0

Px,single· px,e; and the probability of a failed

trans-mission due to collision,Ptr· (1 − K−1

x=0P

x,single). Hence the

saturated throughput of station i, thri can be expressed as

Equation (12):

thri = P

tr· Pi,sin gle· (1 − pi,e) · 8(F Si− H)

W + X + Y + Z , where W = (1 − Ptr) · Tslot; X = Ptr· K −1 x=0

(Px,sin gle· (1 − px,e) · T sx);

Y = Ptr·

K −1

x=0

(Px,sin gle· px,e·T ex);

Z = Ptr· (1 −

K −1

x=0

Px,sin gle) · T c. (12)

H is the total length of PHY and MAC headers in bytes; Tslot is the slotted time; T sx, T ex are the time of station

x (x = 0 ∼ K − 1) processing a successful transmission and experiencing a failed transmission due to a corruption respectively; T c is the period of a collision; The values of

T sx,T ex and T c depend on the channel access mechanism

and the used data rate rx of station x. For the basic Carrier

Sense Multiple Access / Collision Avoidance (CSMA/CA) scheme and RTS/CTS scheme respectively, they can be expressed as: Basic : ⎧ ⎨ ⎩ T sbas x = DIF S + Theader+ (F Sx− H) · 8/rx+ γ +SIF S + ACK + γ T cbas= DIF S + T header+ ((F Sz− H) · 8/rz)∗+ γ RT S/CT S : ⎧ ⎪ ⎨ ⎪ ⎩ T sRT S x = DIF S + RT S + γ + SIF S + CT S + γ +SIF S + Theader+ (F Sx− H) · 8/rx +γ + SIF S + ACK + γ T cRT S= DIF S + RT S + γ + SIF S + CT S + γ T ex is equal to T sx in both of the basic and RTS/CTS

(4)

time, SIFS time, the time to transmit the header, the time to transmit an ACK and the time of propagation delay, respectively;((F Sz− H) · 8/rz) is the longest transmission

time associated with stationz in a collision.

The throughputthri in (12) is derived with given channel

conditions and data rates. The expected value of thri given

SNRγ with LA scheme x, Ex(thri|Γi = γ), can be

formu-lated as (13): Ex(thri|Γi= γ) = L y=1 (thri|P HYi= y,Γi= γ)Px(P HYi= y|Γi= γ) (13) where L is the number of PHY modes available;

thri|P HYi= y,Γi= γ is the throughput of station i using

PHY modey with SNR γ in (12), which is determined by DCF protocol.Px(P HYi= y|Γi= γ) is the conditional probability

of selecting modey given SNR γ, which is determined by the LA schemex. By linearly combining the two values as shown in (13), we can thus obtain the expected value ofthri given

SNR γ with LA scheme x, Ex(thri|Γi = γ). Given a SNR

distribution with the probability density functionpγ(γ), the

average throughput of stationi with LA scheme x, Ex(thri)

can be derived as: Ex(thri) = γEx(thri|Γi= γ)pγ(γ)dγ = γ L y=1 (thri|P HYi= y,Γi= γ)Px(P HYi= y|Γi= γ)pγ(γ)dγ. (14) Finally the system throughput,S can be obtained by summing upEx(thri) of theK stations: System throughput S = K i=1 E(thri). (15)

Now we analyze the LA scheme of AutoRate Fallback (ARF) [6] and consider IEEE 802.11b PHY for example. IEEE 802.11b PHY employs 4 uncoded modulations to provide the rate of 1, 2, 5.5, and 11 Mbps respectively at the 2.4GHz band. [11] presented BER vs. SNR of the 4 802.11b PHY modes provided empirically with Intersil WLAN product called HFA3861B in the AWGN environment. These curves will be used for the following numerical analysis and exper-imental simulations in the next section. With ARF, the PHY mode to be used basically is determined by monitoring the number of received and missed ACK frames. Ifm successive ACK frames cannot be received correctly, the transmission rate is then degraded to the lower rate. If the sender successfully receivesn consecutive ACK frames, it will raise the current rate to the higher order for the subsequent transmissions. Fig. 2 shows the Markov chain model for ARF protocol with the typical values of m and n equal to 2 and 10 respectively. From this model we have the following equations:

(1 − pi,f(1, γ))10· PARF(P HYi= 1|Γi= γ)

= (pi,f(2, γ))2· PARF(P HYi= 2|Γi= γ) (16)

((1 − pi,f(2, γ))10+ (pi,f(2, γ))2) · PARF(P HYi= 2|Γi= γ)

= (1 − pi,f(1, γ))10· PARF(P HYi= 1|Γi= γ)

+ (pi,f(3, γ))2· PARF(P HYi= 3|Γi= γ) (17)

Fig. 2. The Markov chain model for the 4 IEEE 802.11b PHY modes with ARF protocol using parametersm = 2 and n = 10.

((1 − pi,f(3, γ))10+ (pi,f(3, γ))2) · PARF(P HYi= 3|Γi= γ)

= (1 − pi,f(2, γ))10· PARF(P HYi= 2|Γi= γ)

+ (pi,f(4, γ))2· PARF(P HYi= 4|Γi= γ) (18)

(pi,f(4, γ))2· PARF(P HYi= 4|Γi= γ)

= (1 − pi,f(3, γ))10· PARF(P HYi= 3|Γi= γ) (19)

wherepi,f(y, γ) is the probability of transmission failure for

stationi using PHY mode y (y is from 1 to 4 for 1 to 11 Mbps in order) with SNRγ in (5). With the following normalization condition imposed,

4

j=1

PARF(P HYi= j|Γi= γ) = 1 (20)

the conditional probability that PHY mode y is selected for station i given SNR γ with ARF, PARF(P HYi= y|Γi= γ)

can be derived numerically.

III. THERESULTS ANDDISCUSSION

In this section we provide numerical results to explore the impact of PHY channel inequality on the throughput performance of IEEE 802.11b WLANs. We consider an IEEE 802.11b infrastructure WLAN in which each station transmits a saturated traffic flow of a fixed payload size of 1500 bytes with the basic CSMA/CA scheme to AP. The system parameters are adopted from IEEE 802.11b standard [1]. The first two scenarios are conducted for distinctly showing the effects of different channel conditions and/or unequal data rates on the throughput performance of 802.11 DCF. The third scenario is set up to investigate the impact of ARF on the system throughput. For all the scenarios we also conduct corre-sponding simulations based on C++ programming language to validate the accuracy our analytical model. Each result comes from the simulation of 100000 transmissions of packets.

(5)

Throughput of a station 0 1 2 3 4 2 3 4 5 6 7 8 9 10 Number of stations Throughput (Mbps) Analytical: 1 Mbps - 11 Mbps Analytical: 2 Mbps - 11 Mbps Analytical: 5.5 Mbps - 11 Mbps Analytical: 11 Mbps - 11 Mbps Simulation: 1 Mbps - 11 Mbps Simulation: 2 Mbps - 11 Mbps Simulation: 5.5 Mbps - 11 Mbps Simulation: 11 Mbps - 11 Mbps

Fig. 3. In Scenario 1, the throughput of a station vs. the number of stations in case that one station transmits at a lower data rate (1, 2, 5.5, or 11 Mbps) whereas all the others transmit at the highest rate of 11 Mbps (all the stations are with the same BER of 1E-5).

A. Scenario 1: Stations with identical BER at unequal data rate

In this subsection we conduct the transmission scenario that all the stations are with equal BER however at different data rates. Assume that all the stations are with BER of 1E-5, while one station transmits at a lower data rate (1, 2, 5.5, or 11 Mbps) and all the others transmit at the highest rate of 11 Mbps. The throughput with the number of stations is derived from Equation (12) and shown in Fig. 3. It is observed that all the stations have equal throughputs regardless of their data rates. This phenomenon is so called ¨performance anomaly¨ [12] which means that when stations experience identical link qualities, i.e. the same BERs, the throughput of stations with high data rates will be limited within the lowest rate used among stations. For example let’s consider 2 stations. When they both transmit at the rate of 11 Mbps, the throughput of each one is about 3.63 Mbps as shown in Fig. 3. However, if one station changes to use the lowest rate of 1 Mbps, the throughput of another one remaining at 11 Mbps will greatly degrade to 0.82 Mbps. The overall throughput is therefore decreased by as large as 80% ((7.26 Mbps - 1.64 Mbps) / 7.26 Mbps = 77.4%).

Performance anomaly arises from the fact that IEEE 802.11 DCF protocol substantially provides equal transmission op-portunities for stations regardless of their transmission data rates, presenting throughput-based fairness. The analysis re-sults demonstrate that the system throughput of 802.11 DCF is significantly affected by the cross-layer impact of the lowest PHY rate used among stations.

B. Scenario 2: Stations in different channel conditions with equal or unequal data rates

In this subsection we show the results when stations are in different channel conditions with equal or unequal data rates. The kind of analysis can be sensible because even with a LA mechanism, 802.11 stations still can experience different link qualities at most of the time due to limited MCSs available. First we have the scenario all the stations are with an equal data rate to clearly show a skewed sharing of throughput

Throughput 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 2 4 6 8 10 Number of stations Throughput (Mbps)

Analytical: IC station or EC station when BER(EC) is 0 (all in ideal channels) Analytical:an IC station when BER(EC) is 2E-5

Analytical:an EC station when BER(EC) is 2E-5

Analytical:an IC station when BER(EC) is 4E-5

Analytical:an EC station when BER(EC) is 4E-5

Simulation: IC station or EC station when BER(EC) is 0 (all in ideal channels) Simulation:an IC station when BER(EC) is 2E-5

Simulation:an EC station when BER(EC) is 2E-5

Simulation:an IC station when BER(EC) is 4E-5

Simulation:an EC station when BER(EC) is 4E-5

Fig. 4. In Scenario 2, the saturated throughput of an IC and EC station vs. the number of stations varying with the BER level of EC station,BER(EC). For instance, in case ofBER(EC) equal to 2E-5, the simulation result of IC station is indexed as the circle mark, while that of EC station is indexed as the triangle mark.

among stations due to different channel qualities. Consider all the stations use the same data rate of 1 Mbps. Assume half of the stations, named ideal-channel (IC) stations, are in ideal channel conditions with BER = 0, whereas the others, named error-prone-channel (EC) stations, suffer from channel degradation due to mobility with BER ranging from 0 to 4E-5. Throughput of a station is derived from Equation (12) and presented in Fig. 4 with respect to the number of stations and BER of EC stations,BER(EC). It is shown that when IC and EC stations are in the same channel condition, i.e.BER(EC) = 0, their throughput performances are equal. When the difference of channel conditions increases, the performance variation is gradually enlarged. Now let’s consider 2 stations. If they are both in an ideal condition, throughput of each one is about 450 Kbps as shown in Fig. 4. When one station’s BER deteriorates to 2E-5, its throughput degrades to 281 Kbps, whereas the throughput of the other one with ideal conditions increases to 542 Kbps. The performance variation is as large as 58% ((542 Kbps -281 Kbps) / 450 Kbps = 57.96%).

The performance variation arises by the following facts. Due to its higher BER, EC station statistically experiences more retries to succeed a transmission than IC station does. When a retransmission is performed, according to CSMA/CA standards the backoff window will be increased exponentially until the retries come to a certain limit. Thus EC station would adopt a larger backoff timer on average and then has less chance to access the channel. Our analysis results show that the individual throughput performance (fairness of channel sharing among stations) of DCF is significantly affected by the cross-layer impact of PHY channel inequality.

Now we examine the scenario that stations are in different channel conditions with unequal data rates. The scenario is similar to that aforementioned except that EC stations use an unequal data rate of 11 Mbps. Fig. 5 presents the throughput of IC station with the rate of 1 Mbps and EC station with 11 Mbps. It is shown that when IC and EC stations are with the same channel condition, i.e.BER(EC) = 0, their throughput performances are equal, presenting ”performance anomaly” similar to what are shown in Fig. 3. When BER(EC) degrades to 2E-5 and 4E-5 successively, throughput of EC

(6)

Throughput 0 0.2 0.4 0.6 0.8 1 2 4 6 8 10 Number of stations Throughput(Mbps)

Analytical: IC station (1 M bps) or EC station (11 M bps) when BER(EC) is 0 (all in ideal channels) Analytical: IC station (1 M bps) when BER(EC) is 2E-5

Analytical: EC station (11 Mbps) when BER(EC) is 2E-5

Analytical: IC station (1 M bps) when BER(EC) is 4E-5

Analytical: EC station (11 Mbps) when BER(EC) is 4E-5

Simulation: IC station (1 M bps) or EC station (11 M bps) when BER(EC) is 0 (all in ideal channels) Simulation: IC station (1 M bps) when BER(EC) is 2E-5

Simulation: EC station (11 Mbps) when BER(EC) is 2E-5

Simulation: IC station (1 M bps) when BER(EC) is 4E-5

Simulation: EC station (11 Mbps) when BER(EC) is 4E-5

Fig. 5. In Scenario 2, the saturated throughput of an IC station with the data rate of 1 Mbps and an EC station with 11 Mbps vs. the number of stations varying with the BER level of EC station,BER(EC). For instance, in case ofBER(EC) equal to 2E-5, the simulation result of IC station is indexed as the circle mark, while that of EC station is indexed as the triangle mark.

station suffers from more and more starvation whereas that of IC station remaining in a good condition is progressively increased. For example, consider the number of stations is 2. When both the two stations are in an ideal condition, their throughputs are equal as about 813 Kbps. WhenBER(EC) degrades to 4E-5, throughput of EC station is extremely degraded to 212 Kbps whereas that of IC station is increased to 894 Kbps. The throughput variation between the two stations is as large as 84% ((894 Kbps -212 Kbps) / 813 Kbps = 83.89%). It is also shown that the throughput performance does not accord with the used data rates, i.e. throughput of EC station with the rate of 11 Mbps is even lower than that of IC station with 1 Mbps. The analysis results demonstrate that the skewed channel sharing is caused by different link qualities rather than unequal data rates; the presence of PHY channel inequality can cause significant throughput unfairness either at an equal rate or at different rates.

C. Scenario 3: Stations in unequal channel conditions with ARF

From the analysis results of Subsection 3.A and 3.B we show the impacts of different channel conditions and/or unequal data rates on the throughput performance of 802.11 DCF. In this subsection we analyze the effects of ARF on the system throughput. The typical values ofm =2 and n = 10 are used for numerical analyses and simulations. Assume that one station, indexed as EC station, experiences variable SNR ranging from 20 dB to 7 dB; all the other stations, indexed as IC stations, are with stationary and ideal SNR of 20 dB. By linear combinations ofPx(P HYi= y|Γi= γ) derived

in (20) and thri|P HYi= y,Γi = γ in (12), the individual

throughput of each station with SNRγ can be derived from Equation (13). Thus the system throughput with respect to the number of stations can be obtained from Equation (15) and the results are shown in Fig. 6. It is shown that even when there is only one station with low SNR (i.e. EC station with SNR equal to 11 dB or 7 dB) in the network, the system throughput can be significantly reduced (e.g., throughput with three stations when SNR of EC station is 20, 11, and 7 dB is 6.626, 5.638, and 3.949 Mbps respectively). The reason is that with ARF, a station with deteriorated SNR can be

System throughput of DCF with ARF

0 1 2 3 4 5 6 7 2 3 4 5 6 7 8 Number of stations System throughput (Mbps)

Analytical: SNR of EC station=20dB (all with SNR of 20dB)

Analytical: SNR of EC station=11dB (one station with SNR of 11dB, and all the others with 20dB) Analytical: SNR of EC station=7dB (one station with SNR of 7dB, and all the others with 20dB) Simulation: SNR of EC station=20dB (all with SNR of 20dB)

Simulation: SNR of EC station=11dB (one station with SNR of 11dB, and all the others with 20dB) Simulation: SNR of EC station=7dB (one station with SNR of 7dB, and all the others with 20dB)

Fig. 6. In Scenario 3, the system throughput of DCF with ARF vs. the number of stations varying with SNR of EC station.

likely to select low data rates, leading to degradation of system throughput due to performance anomaly [12]. It is also shown that the system throughput is degraded rather rapidly with the increase of stations (e.g., in case of EC station’s SNR equal to 20 dB, throughput degrades sharply from 6.543 to 2.894 Mbps when the number of stations increases from 2 to 8). One reason is the growing collision probability caused by heavier traffic contentions. Another, most importantly, is that when the collision probability increases, ARF tends to downgrade the data rates and consequently decreases throughput. The results demonstrate that ARF which adjusts data rates by monitoring the counts of received ACK frames may not be suitable to a WLAN environment with high-density traffic.

IV. CONCLUSION

The system performance of 802.11 DCF-based WLANs is significantly impacted by PHY inequality, i.e. varied channel conditions and/or unequal data rates determined by the link adaptation scheme. In this paper we present a theoretical model for DCF protocol with the link adaptation scheme of ARF to analyze the throughput performance in the presence of PHY inequality. From the analysis results it is shown that: (i) System throughput is determined by the lowest data rate used with stations. (ii) Throughput sharing among stations depends on the variation of link qualities rather than the difference of data rates. We validate our analytical model via simulations and the results demonstrate its accuracy.

ACKNOWLEDGMENT

The authors would like to thank Mr. Kuo-Chang Ting and Mr. Jung-Hung Chang for their supports of simulation programming for this work. The authors would also like to thank the anonymous reviewers for their thoughtful comments and suggestions which have advanced the quality of this paper.

REFERENCES

[1] IEEE 802.11a/b, WLAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE Std., 1999.

[2] S. Choi, K. Park, and C. Kim, “Performance impact of interlayer dependence in infrastructure WLANs,” IEEE Trans. Mobile Computing, vol. 5, no. 7, pp. 829–845, July 2006.

(7)

[3] Y. Yang, M. Marina, and R. Bagrodia, “Experimental evaluation of application performance with 802.11 PHY rate adapatation mechanisms in diverse environments,” in Proc. IEEE Wireless Communications and Networking Conference, WCNC, 2006, pp. 2273–2278.

[4] J. Yin, X. Wang, and D. P. Agrawal, “Optimal packet size in error-prone channel for IEEE 802.11 distributed coordination function,” in Proc. IEEE Wireless Communications and Networking Conference, WCNC, 2004, pp. 1654–1659.

[5] Z. Hadzi-Velkov and B. Spasenovski, “Saturation throughput–delay analysis of IEEE 802.11 DCF in fading channel,” in Proc. IEEE International Conference on Communications , ICC, 2003, pp. 121–126. [6] A. Kamerman and L. Monteban, “WaveLAN-II: a high-performance wireless LAN for the unlicensed band,” Bell Labs Technical J., pp. 118– 133, Summer 1997.

[7] G. Bianchi, “Performance analysis of the IEEE 802.11 distributed coordination function,” IEEE J. Select. Areas Commun., vol. 18, no. 3, pp. 535–547, Mar. 2000.

[8] E. Modiano, “An adaptive algorithm for optimizing the packet size used in wireless ARQ protocols,” Wireless Networks, vol. 5, no. 4, pp. 279– 286, July 1999.

[9] Z. Hadzi-Velkov and B. Spasenovski, “Capture effect in IEEE 802.11 basic service area under influence of rayleigh fading and near/far effect,” in Proc. IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, 2002, pp. 172–176.

[10] ns2. [Online]. Available: URL http://www.isi.edu/nsnam/ns/

[11] J. P. Pavon and S. Chio, “Link adaptation strategy for IEEE 802.11 WLAN via received signal strength measurement,” in Proc. IEEE International Conference on Communications , ICC, 2003, pp. 1108– 1113.

[12] M. Heusse, F. Rousseau, G. Berger-Sabbatel, and A. Duda, “Perfor-mance anomaly of 802.11b,” in Proc. IEEE INFOCOM, 2003, pp. 836– 843.

數據

Fig. 1. The state transition diagram of station i.
Fig. 2. The Markov chain model for the 4 IEEE 802.11b PHY modes with ARF protocol using parameters m = 2 and n = 10.
Fig. 4. In Scenario 2, the saturated throughput of an IC and EC station vs.
Fig. 6. In Scenario 3, the system throughput of DCF with ARF vs. the number of stations varying with SNR of EC station.

參考文獻

相關文件

incapable to extract any quantities from QCD, nor to tackle the most interesting physics, namely, the spontaneously chiral symmetry breaking and the color confinement.. 

The Model-Driven Simulation (MDS) derives performance information based on the application model by analyzing the data flow, working set, cache utilization, work- load, degree

Microphone and 600 ohm line conduits shall be mechanically and electrically connected to receptacle boxes and electrically grounded to the audio system ground point.. Lines in

• To achieve small expected risk, that is good generalization performance ⇒ both the empirical risk and the ratio between VC dimension and the number of data points have to be small..

The remaining positions contain //the rest of the original array elements //the rest of the original array elements.

CAST: Using neural networks to improve trading systems based on technical analysis by means of the RSI financial indicator. Performance of technical analysis in growth and small

CAST: Using neural networks to improve trading systems based on technical analysis by means of the RSI financial indicator. Performance of technical analysis in growth and small

Another point to financial performance indicators used to measure the performance of the industry's performance, to explore market in domestic container shipping industry