Analysis of 802.11b MAC A QoS, Fairness, and Performance Perspective

更新时间:2023-04-27 00:58:01 阅读量: 实用文档 文档下载

说明:文章内容仅供预览,部分内容可能不全。下载后的文档,内容与下面显示的完全一致。下载之前请确认下面内容是否您想要的,是否完整无缺。

a r X i v :c s /0411017v 1 [c s .N I ] 8 N o v 2004Analysis of 802.11

b MAC:A QoS,Fairness,and Performance

Perspective

Srikant Sharma Department of Computer Science Stony Brook University Stony Brook,NY 11794-4400srikant@f0d6b5b369dc5022aaea002a Abstract Wireless LANs have achieved a tremendous amount of growth in recent years.Among various wire-less LAN technologies,the IEEE 802.11b based wireless LAN technology can be cited as the most prominent technology today.Despite being widely deployed,802.11b cannot be termed as a well ma-tured technology.Although 802.11b is adequate for basic connectivity and packet switching,It is evident that there is ample scope for its improvement in areas like quality of service,fairness,performance,se-curity,etc.In this survey report,we identify and argue that the Medium Access Controller for 802.11b networks is the prime area for these improvements.To enunciate our claims we highlight some of the quality of service,fairness,and performance issues related to 802.11b MAC.We also describe and an-alyze some of the current research aimed at addressing these issues.We then propose a novel scheme called the Intelligent Collision Avoidance ,seeking to enhance the MAC to address some of the perfor-mance issues in 802.11b and similar networks.1Introduction Although the concept of wireless LANs has existed since late 1970s,the WLAN technology started gaining its momentum only in late 1990s and today it has become a ubiquitous networking technology.The reason behind the recent explosive growth of this technology can be attributed to multiple factors,such as,techno-logical advances in error correcting codes,modulation techniques,processing power on network interfaces,

availability of unlicensed radio spectrum,and most importantly,the need for some kind of tetherless con-nectivity and mobility.

Today there exist multiple wireless LAN technologies,such as,Wi-Fi,Bluetooth,HiperLAN,HomeRF,etc.All of these technologies operate in the 2.4GHz ISM (Industrial,Scienti?c,and Medical)radio spec-trum.Each technology has its own niche depending on the deployment requirements of the wireless LANs.Bluetooth is mainly used as a cable replacement RF technology for short range communications.It is used to interconnect portable devices,such as,cellular phones,laptops,palmtops,etc.,without the need to carry interconnecting cables.It is capable of providing data rates upto 700Kbps and supports upto three voice channels at 64Kbps.HomeRF is used for wireless home networking for devices like,intelligent home appliances,laptops,smart pads etc.It has a range of upto 50meters which is adequate for short scale net-works.It supports data rates upto 1.6Mbps which is low by todays WLAN norms.HiperLAN is a family of four different wireless technologies classi?ed as types 1-4.HiperLAN-1operates in 5GHz radio spectrum

1

is capable of supporting upto23Mbps at a range of50meters.One of the prime features of HiperLAN is its support for Wireless ATM.WATM is the extension of ATM capabilities,such as QoS features,etc.,to wireless networks.Wi-Fi technology is based on IEEE802.11b[1]standard.It operates in the unlicensed 2.4GHz radio spectrum,uses direct-sequence spread-spectrum(DSSS)for modulation,supports variable data rates upto11Mbps,and has a range of about50meters.

Out of all these technologies,IEEE802.11b or Wi-Fi is the technology which has received the widest market acceptance.The popularity of this standard is aptly re?ected in portable computer vendors’decision to integrate802.11b wireless network adapters with notebook computers.A market forecast by the Gartner [2]group predicts that by the end of year2005almost95%of notebook computers will be equipped with 802.11b cards.Further,by the end of year2002the802.11b penetration in corporate LANs is expected to reach up to50%,from the current level of around20%.Almost all PDA vendors are starting to support the 802.11b technology in the newer-generation PDAs on the market.The widespread availability of802.11b on wireless devices coupled with continuous cost reduction is also a strong indication of exponential growth of the802.11b technology.

IEEE802.11b LANs can be deployed in either ad hoc con?guration or infrastructure con?guration. The ad hoc con?guration refers to the peer-to-peer setup where a bunch of devices with802.11b network interface cards(NICs)can establish a network and communicate with each other without any infrastructural support.The connectivity of the nodes in this network is limited to their peers.On the other hand,the infrastructure or the access-point setup uses a central access-point(base-station)to form a network.The access-point is usually connected to a wired network as a bridge for next hop connectivity.Every packet transmitted by a wireless node is destined for the access-point which takes care of further routing/switching.

Most of the corporate and large scale wireless networks are setup in the infrastructure mode of oper-ation.There are two different classes of infrastructure operation.These are basic service set(BSS)and extended services set(ESS).In BSS con?guration each wireless node is associated with an access-point and this association remains unchanged inde?nitely,whereas,in ESS a mobile node can roam around and dis-associate from current access-point and associate with a new access-point or re-associate with the previous access-points.The ESS is basically meant to provide roaming support.

IEEE802.11b technology has achieved a huge level of penetration in the wireless networking arena.It is being regarded as the de facto wireless standard for wireless LANs.Although the dependence on802.11b is growing,it cannot be termed as a very well matured wireless LAN technology.The technology,though adequate for basic connectivity and packet switching,falls short of expectations when it comes to issues like,quality of service,fairness,performance,security,etc.The wireless research community is persistently ?nding different ways to improve this technology and bridge the shortcomings.The channel access protocol (MAC)used by802.11b networks is known to have several performance related issues.The quality of service for applications using these networks is practically non existent.The protocol is known to exhibit unfairness for different streams in terms of channel allocation.The security aspect of these networks is known to have several problems.

This survey attempts to highlight the QoS,fairness,and performance issues in802.11b networks and various research related to MAC enhancements to address these issues.The report is organized as follows. In Section2,we give an overview of802.11b channel access protocol.In Section3,we brie?y look at the QoS efforts for802.11b networks.We examine the fairness problem of802.11b MAC in Section4. In Section5,we look at current performance related research for802.11b MAC.In Section6we propose and analyze enhancements to802.11b MAC protocol to improve throughput performance at the expense of power consumption.Finally,in Section7we present our conclusions and discuss the work that we are planning to pursue in future.

2

2IEEE802.11b MAC overview

IEEE802.11b is a standard for Medium Access Control(MAC)and Physical Layer(PHY)speci?cations for wireless LANs.The PHY speci?cations deal with modulations techniques,error correcting codes,radio characteristics,physical layer convergence,and other signaling related issues.

IEEE802.11b MAC protocol is based on the CSMA/CA[3]protocol which uses physical carrier sense as well as virtual carrier sense to avoid collisions and packet loss.Physical carrier sense is used to avoid collisions at the sender,whereas,virtual carrier sense is used to avoid collisions at the receiver and address the hidden node problem present in wireless networks.The virtual carrier sense uses regular Request To Send(RTS)and Clear To Send(CTS)channel reservation mechanism.802.11b MAC improves the link layer reliability by including explicit ACKs for each data frame.Upon failure to receive an ACK,the data frame is repeatedly retransmitted till an ACK is received.The maximum number of retransmissions is a con?gurable parameter for each individual node and is usually set to seven.Thus each successful transmission follows the so-called4-way handshake protocol of RTS-CTS-DATA-ACK.A node may choose to disable the virtual carrier sense to reduce its overhead when the probability of existence of hidden nodes is known to be small.

802.11b MAC includes two coordination functions for channel access,namely,Distributed Coordination Function(DCF)and Point Coordination Function(PCF).The DCF speci?es channel contention mechanism for normal mode of operation,whereas,PCF speci?es a mechanism for channel access in a contention free fashion.PCF requires the presence of a point coordinator(PC)and can be used only in infrastructure mode of operation.We will be describing the details of DCF in the following part of this section.We will be looking at the details of PCF in Section3.

2.1Distributed Coordination Function(DCF)

In the normal mode of operation,the IEEE802.11b MAC uses a Distributed Coordination Function(DCF) for media access.DCF is an implementation of CSMA/CA protocol which follows the4-way handshaking protocol for data transmissions.In DCF,whenever a node is ready to transmit data,it senses the channel to be idle for a period of Distributed Inter Frame Spacing(DIFS).Following this,it generates a random backoff timer chosen uniformly from the a[0,ω-1]whereωis the contention window.Initially the con-tention window is set to CW min(16for802.11b).After the backoff timer expires,the node sends a short Request To Send(RTS)message to the intended receiver of data.If this message is received properly by the receiver and if it is able to receive any transmission,it responds back with a short Clear To Send(CTS) message.A node may not be able to receive any transmission if some other node in its vicinity has already reserved the channel for packet reception or transmission.Both RTS and CTS messages carry the duration information for which the channel is going to be occupied by the proposed data transmission.Upon hearing RTS and CTS,all other nodes in the vicinity of the sender and receiver update their Network Allocation Vectors(NA Vs)with the information about the duration for which the channel is going to be busy.NA V is essentially a channel reservation vector.Thus,all nodes in the vicinity of the sender and receiver defer their transmissions and receptions to avoid collisions.The CTS message is followed by the DATA transmission which is acknowledged by the receiver by sending an ACK message if the DATA is received successfully. The data is repeatedly retransmitted in the absence of ACKs till a threshold number of retransmissions are carried out.Once the retransmissions exceed the threshold,the transmission is assumed to be unsuccess-ful.After an unsuccessful transmission attempt,the sender follows a binary exponential backoff(BEB) and doubles its contention window size.This is done in order to reduce the channel contention between nodes.The contention window is not incremented further if it already equals CW max(256for802.11b).

3

SIFS SIFS

SRC DST T0T1T2T3T4T5

SRC?NBR DST?NBR

DIFS Figure 1:Message exchanges for DCF.Each DATA packet is preceded by RTS and CTS messages.On hearing RTS,the nodes in the vicinity of sender set their NA Vs to the duration mentioned in RTS.On hearing CTS,the nodes in the vicinity of receiver set their NA Vs to the duration mentioned in CTS.This causes in establishment of channel reservation till the time the ACK is sent back to the sender.

After every successful transmission,the contention window is reset back to CW min .RTS,CTS,DATA,and ACK are separated by a time spacing of Short Inter Frame Space (SIFS).A timeline for DCF message ex-changes is shown in Figure 1.The sense period of DIFS is always larger than SIFS.This ensures that no new transmission attempts interfere with the ongoing transmission.

DCF provides a mechanism for collision avoidance by performing a virtual carrier sense through RTS-CTS message exchanges.This is necessary to solve the hidden node problem .However,a node may chose to resort to a 2-way handshaking mechanism where data packets are transmitted without RTS-CTS message exchanges.The packet is acknowledged back by the receiver by responding with an ACK message.This mechanism can be used for small packets where the overhead of RTS/CTS message exchange can be traded off for small probability of collisions.

2.2Link Management

Apart from channel access mechanism,802.11b also provides additional facilities such as power save fea-tures,security etc.Moreover,802.11b MAC is a distributed entity where decisions regarding various activ-ities are taken independently at various nodes.To distribute MAC level information among the constituent nodes,802.11b de?nes several messages which are transmitted as link level frames.The frames that are exchanged between different nodes of an 802.11b network are classi?ed into three categories as follows:

?Management

–{association,re-association,probe }{request,response },and disassociation:These frames are used for af?liation activity of any node to a particular cell and access-point.

–authentication and de-authentication:These frames are used for security purposes.

–beacon:This frame is usually sent by an access-point in infrastructure mode.In ad hoc mode,the ?rst node to initiate an ad hoc network sends the beacon.This frame carries important

management information like time-stamp,supported rates,traf?c indication maps etc.

–ATIM:Announcement Traf?c Indication Message is a frame sent after every beacon frame.This is used by nodes utilizing the power save features of 802.11b to indicate their traf?c pattern.

4

Mobile hosts

Figure 2:IEEE 802.11b LANs are usually at the periphery of wired networks serving as the access networks.The servers are inside the wired domain and clients are in wireless domain exploiting the mobility advantage.

?Control

The frames like RTS,CTS,ACK,PS-Poll (power save poll)CF-Poll,CF-ACK,CF-END (Contention free channel information in PCF)are categorized as control frames.

?Data

The data frames can be piggybacked with frames like CF-ACK,CF-Poll etc.

IEEE 802.11b also speci?es a fragmentation mechanism using which an 802.11b node can divide data packets into smaller frames and transmit large packets when the frame error rates are high.The fragmen-tation threshold can be a con?gurable value or can be dynamically determined depending on the channel conditions.

To summarize,the 802.11b MAC layer provides,(1)Channel access mechanism,(2)Link management facility,(3)Rudimentary security,(4)Power management,and (5)Fragmentation.

3Quality of Service

IEEE 802.11b WLANs provide best effort service similar to their wired counterpart Ethernet networks.Best effort service essentially indicates that every data packet handed over to the 802.11b interfaces receives similar treatment as other packets in terms of delivery guarantees.Thus,from an application perspective,it receives no Quality of Service guarantees from the network in terms of available bandwidth,latency,jitters etc.Some applications like media streaming and conferencing are sensitive to packet latency and effective bandwidth characteristics of the underlying network.With the growing thrust on use of wireless networks for media streaming and conferencing,it becomes essential to provide a service that is not merely best effort service but a service that is deterministic at certain level.IEEE 802.11b WLANs are usually deployed as access networks to the wired infrastructures for mobile terminals as shown in Figure 2.In wireless LAN scenario,usually the media and conferencing servers reside in the faster and reliable wired domain,whereas,the clients reside in wireless domain exploiting the mobility features.Thus the importance of QoS is relatively higher in the infrastructure setup rather than the peer-to-peer setup.

On the wired network,IETF’s Integrated Services [4]and Differentiated Services [5,6]architectures are available to support guaranteed QoS and traf?c prioritization respectively above the link layer.IEEE’s 802.1p is a layer 2traf?c prioritization standard for switched Ethernet environments.However,there are very limited QoS solutions that exist for wireless LANs,particularly 802.11b networks.

5

PC

Figure3:A superframe in802.11b.Each superframe is divided into contention free and contention periods.PC polls nodes during CFP.If there is no response from a node,the PC polls next node after PIFS.The nodes respond to polls with either DATA+ACK frames or just ACK frames after SIFS interval.No nodes other than polled nodes can access the channel since it is never idle for DIFS period during CFP.The CFP ends when the PC sends CF-END frame.After this all nodes enter CP where DCF is used to access the channel.

3.1Point Coordination Function

IEEE802.11b standard provides a very rudimentary support for quality of service in its infrastructure mode of operation.This support is provided by the MAC layer in terms of Point Coordinated Function(PCF). PCF is a MAC coordination facility that may exist on access-points to differentiate between the traf?c?ows from different nodes.PCF is an optional capability for access points and its implementation is not manda-tory.Very few commercially available access-points for802.11b networks actually provide this facility. Moreover,there are no clear mechanisms for individual nodes to participate in PCF and exploit the quality of service mechanism provided by it.

PCF provides a very rudimentary form of QoS by allowing nodes to transmit frames in a contention free manner.The access-point of a cell acts as a coordinator called the point coordinator(PC)for that cell.All nodes in802.11b network obey the medium access rules of the PCF,since these are based on DCF which is followed by all nodes.The PC grants a contention free channel access to individual nodes by polling them for transmissions.On being polled,a node transmits a single frame destined for any node in the network.All nodes which need some quality of service are termed as CF-Pollable nodes.A node becomes CF-Pollable by indicating its interest in being polled during its association with an AP(PC).This results in the node being included in a CF-Pollable list maintained by the PC.A node can withdraw itself from polling process by performing a re-association.

In infrastructure mode of802.11b,the time is divided into periodic superframes which start with the so-called beacon frames.A beacon frame in802.11b is a management frame sent by an access point to carry out time synchronization and deliver protocol related information to all nodes.Beacon frames are periodically sent by the access points regardless of PCF functionality.Each superframe is divided into two units,namely,Contention Free Period(CFP)and Contention Period(CP).CFP is the period when contention free channel access is provided by the PC to individual nodes.CP is the period when all nodes contend for the channel using DCF.If the PCF functionality is not provided by the access point then entire superframe is the contention period.The extent of division of a superframe into CFP and CP is determined by the PC which can be arbitrary,but it is mandatory to have a CP of a minimum duration that allows at least one node to transmit one frame under DCF.

6

Figure3shows the activity of a wireless network during a superframe.At the beginning of superframe the PC waits for a period PCF Inter Frame Space(PIFS)and then transmits the beacon frame.If the PC supports PCF and the list of nodes that are interested in being polled is not empty,the PC sends a CF-Poll (or DATA+CF-Poll)frame to one of the nodes after waiting for channel to be idle for SIFS.In response,the node can respond with a DATA+CF-ACK or just CF-ACK if no data is ready to be sent.The response is sent after sensing the channel to be idle for an SIFS period.If there is no response to CF-Poll frame,the PC sends CP-Poll to next node after waiting for an idle period of PIFS.At the end of CFP,the PC sends a CF-END frame to begin the contention period using DCF.Thus in CFP,each polled node transmits frames in a contention free manner.In CFP,RTS/CTS handshaking is not carried out.During the entire CFP the PC is in control because it accesses channel after sensing the channel to be idle for PIFS duration.PIFS is much smaller than DIFS which is the period for which every nodes in DCF should sense the channel to be idle.The shorter duration of PIFS compared to DIFS ensures that no node can contend for the channel except either the PC or the node that has been recently polled.

There are several problems with PCF that make it less attractive for QoS utilization.First and foremost, there is no guarantee of bandwidth or any other QoS parameters except a contention free transmission of a single frame.The channel share available to individual nodes cannot be speci?ed and it decreases with an increase in the number of pollable nodes in the network.Second,there is no de?nite bound on next poll being received by a node.The polls received from PC for a node may not be periodic.For?ows with tight delay bounds and periodic traf?c,this may be unacceptable.Third,there is no guarantee that the superframe itself is periodic.This is because the PC must sense the channel to be idle for PIFS duration before sending the next beacon.If the transmission of last frame from the previous superframe is prolonged then the beacon transmission may not be strictly periodic.Fourth,the size,rate and transmission time occupied by each frame is not constant.Some frames may be fragmented and may be arbitrarily long(upto2312bytes)and hence may take longer than usual transmission time.This will affect subsequent nodes.Some of the nodes may not be polled in a particular superframe.In short,there is no clear admission control and usage policy. Last,there is no clear way of interfacing an application with this mechanism.This makes PCF a facility with no use.

3.2Rether for IEEE802.11b

If one were to revamp PCF and come up with a scheme that is tailored to provides QoS to applications, following enhancement would be required.

Interface:There must be some interface through which an application can specify its bandwidth require-ments to the underlying QoS mechanism.

Admission Control:There must be some admission control criteria so that the available meager resources, once granted to certain applications,are not hijacked back.

Periodicity:The channel access must be provided in a fairly periodic fashion for delay sensitive and peri-odic traf?c.

Isolation:Once an application(or its?ow)is admitted,the service provided to it must not be affected by quirkiness of other applications and nodes.

Bandwidth Guarantee:The channel access granted should re?ect into an appropriate bandwidth guarantee over a long term duration.

Rether[7]is a QoS mechanism for802.11b networks which provides bandwidth guarantees to individual

7

Network Device Driver IP

UDP TCP

BSD Sockets

Application

Wireless Rether

Figure 4:Wireless Rether protocol layer.Wireless

Rether is implemented as a layer between the link-layer

hardware’s device driver and the IP protocol layer.With

this layering structure,Wireless Rether is able to exer-

cise QoS-related control over all outgoing network con-

f0d6b5b369dc5022aaea002awork Wired Edge Router Wireless Rether Server Access Point

Rether Clients Figure 5:Wireless Rether Architecture.Each edge network is augmented with a Wireless Rether Server (WRS),which acts as a bridge between the Layer-2ac-cess point and the Layer-3edge router.All wireless LAN hosts are equipped with Wireless Rether client software.

?ows.Rether borrows many salient features of PCF and is a software solution residing in the network stack of individual nodes.Rether addresses all of the above issues.In addition,it does not require any changes at the MAC layer and does not use the PCF capability which may not be available with every access point.

Like CFP and CP in PCF,Rether also has a notion of Real-Time (RT)and Non Real-Time (NRT)periods.Analogous to the superframe,Rether has a concept of a periodic cycle which corresponds to one set of RT and NRT period.Rether strives to guarantee a contention free channel access to all nodes during both RT and NRT period.During RT period,the channel access is granted to nodes with bandwidth reservations,and the NRT period is used to grant channel access to all nodes in the wireless network.Similar to the mandatory requirement of CP in PCF,Rether also has a notion of RT limit of bandwidth reservation beyond which no new ?ows are granted bandwidth guarantees.This is done to avoid the starvation of ?ows with no bandwidth reservations.Rether grants channel access to individual nodes by sending so-called tokens .The individual nodes signify their end of transmission by sending and explicit acknowledgment .Rether grants contention free channel access even in NRT period by circulating the token in a round robin fashion among the nodes without any bandwidth reservation.In order to avoid fairness issues,the round robin nature is persistent across consecutive NRT periods.

As depicted in Figure 4,Rether is implemented as a software module which resides between the IP layer and the device driver for the wireless interface.It intercepts all the packets that are handed over to the device driver and exercises control over their transmission which follows established QoS policies.Rether follows a client-server architecture.In an infrastructure wireless LAN,the Wireless Rether Server (WRS)is co-located with the access point.All nodes in the network understand the Rether protocol and are termed as Wireless Rether Clients (WRC).The WRS is primarily responsible for admission control and channel coordination.

Rether uses implicit bandwidth reservation mechanism based on port signaling.The advantage of this mechanism comes from compatibility with legacy applications which cannot be modi?ed to carry out explicit reservation requests.The reservation mapping is speci?ed in system policy ?les in terms of quintuples like :

{SrcAddr/Mask,DstAddr/Mask,SrcPrtRange,DstPrtRange,BW }

Rether module intercepts all outgoing packets on a node.Upon intercepting the ?rst packet correspond-ing to any ?ow,the WRC sends a reservation request to the WRS if a corresponding policy speci?cation exists.If the request is accepted all packets corresponding to the ?ow are maintained in a separate queue.The WRS circulates the token among all nodes who have established reservations.All WRCs dispatch pack-

8

ets from their queues according to the bandwidth requirements upon reception of tokens.The dispatching is limited to bandwidth share or allocated slice of the cycle which ever occurs?rst.This limitation helps in providing isolation between nodes with bad radio characteristics and normal nodes.Once all nodes with reservations are served,WRS switches to NRT mode and the clients without any reservation are provided with tokens in a round robin fashion.

With this architecture,Rether provides an effective bandwidth guarantee scheme which can be readily used by applications.The guarantees are provided by granting a contention free channel access to all nodes transmitting packets.Further,Rether is an all-software protocol which does not need any modi?cation to the underlying MAC layer.

3.3IEEE802.11e

The market thrust on wireless LAN technologies and the requirement of QoS support in these networks has led to the establishment of an IEEE standardization working group to enhance802.11to provide applications with QoS support.Upcoming standard802.11e tries to address the QoS problems faced by wireless LANs based on802.11speci?cations.

The QoS support in802.11e is provided in two forms.First,it supports a priority based best-effort service similar to diffserv.Second,it supports parameterized QoS for the bene?t of applications requiring QoS for different?ows.802.11e achieves this by enhancing the802.11DCF and PCF functionality,and by providing a signaling mechanism for parameterized QoS.

The enhanced MAC protocols in802.11e are EDCF and EPCF.Both EDCF and EPCF are commonly refered as the Hybrid Coordinated Functions(HCF).The priority based best effort service is provided by the EDCF.This is done by introducing so-called traf?c categories.Frames corresponding to different traf?c categories are now transmitted through different backoff instances.Each traf?c category has an associated independent backoff instance.The scheduling of frames for every traf?c category is done the same way as in DCF.The differentiation in the priority is achieved by setting different probabilities for different categories for winning the channel contention.The probability is changed by varying the so-called Arbitration Inter Frame Space(AIFS)which is the listen interval for channel contention.AIFS is analogous to the DIFS period in DCF.For each traf?c category,the value of AIFS determines the priority.With lower AIFS values,the listen interval required for channel contention is lower and hence the probability of winning the channel contention is higher.For compatibility with legacy DCF,AIFS should be at least equal to DIFS. The backoff procedure in case of collisions is similar to that in DCF.The main distinguishing factor is the method by which the contention window is expanded after collisions.In DCF,the contention window is always doubled.Whereas in EDCF,the contention window is expanded by a predetermined persistence factor(PF).For example,in DCF scenario the PF is always2since the contention window is always doubled.

A single node can have upto eight traf?c categories.These different categories are realized as eight different virtual nodes with varying parameters,such as,AIFS,CW,and PF.These parameters are responsi-ble for determining the priority of each traf?c category.If the backoff counters of multiple traf?c categories reach zero at the same time,there is a virtual collision within the same physical node but different traf?c cat-egories.This is resolved by a scheduler inside the node by allowing transmissions from the traf?c category with the higher priority.

Another enhancement in802.11e is the concept of a transmission opportunity(TxOP).TxOP is de?ned as the interval during which a node has the right to initiate transmissions.Thus,a node can initiate multiple transmissions as long as its TxOP has not expired.The value of EDCF-TxOP is unique throughout the network.

9

Destnation

Element ID

(6 bytes)(6 bytes)(2 bytes)(1 byte)(1 byte)(1 byte)

(1 byte)(2 bytes)

Data

Rate

(2 bytes)(2 bytes)(2 bytes)(1 byte)(1 byte)(1 byte)(1 byte)

Polling

Interval

Nominal

Size Minimum Mean

Data

Rate

Burst

Maximum

Size

Tx Rate Reserved Delay Jitter

Bound

Bound

Length Source

Address Address TAID TS Info

Interval Interval

Inactivity

MSDU

Retry 30

13

Figure6:TSPEC element in802.11e.This might be replaced with a new Queue State element.The?elds are mostly RSVP speci?c.

IEEE802.11e also facilitates parameterized QoS.This is provided by the enhanced version of PCF (EPCF).The HCF has a notion of Hybrid Coordinator(HC)similar to the PC in PCF.The HC can allocate TxOP to itself or any other node at any time but after sensing the channel to be idle for a duration of PIFS, which is shorter than DIFS.This ensures that the HC has the highest priority over all other nodes at any given time.The HC allocates TxOP to pollable nodes in contention free periods and sometimes even during contention periods.The main distinction between PCF and HCF is that in PCF a node can transmit only one frame after receiving CF-Poll frame.In HCF,a node can initiate the transmission of frames till the end of TxOP.The duration of TxOP is noti?ed to the node using the Poll frame sent by the HC.To provide TxOPs with appropriate duration and appropriate time,the HC needs to obtain the pertinent information from the individual nodes from time to time.For this purpose,the HC initiates the so-called controlled contention periods during which nodes send their resource requests to the HC without contending with other nodes which are sending only data traf?c.There can be eight more traf?c categories for parameterized traf?c in addition to the eight EDCF categories.The frames queued in these categories are transmitted after receiving poll frames from the HC.Thus,at most eight?ows on any node can be provided parameterized QoS.The ?ows are identi?ed by source and destination MAC addresses.

S.Mangold et al.[8]present a comprehensive overview of these features.They evaluate various QoS support features by means of simulations.The simulations were mostly for802.11a network(a higher speed version of802.11operating at5GHz band).They analyzed the behavior of EDCF for different categories (mainly high,medium,and low priorities)and the measured throughput performance against the offered load.The simulation results obtained were consistent with the expected results.For high priority traf?c the throughput increased linearly with the increase in offered load.Whereas,the low and medium priority traf?c observed knee points after certain level.The knee point of low priority traf?c appeared ahead of medium priority traf?c.They also evaluated the performance of HCF for parameterized QoS.The metric chosen was the service delay for frames.The results were consistent with expectations.The delay probability decreased for higher values.Almost all the time the delay was within?xed bounds.The evaluations showed that the enhanced MAC protocols indeed provide the expected QoS which is the main objective of802.11e.

One of the major issues with QoS provisioning is how to percolate the QoS related information to perti-nent layers.For example,the QoS requirements are mainly application speci?c requirements,whereas,the actual bandwidth provisioning has to be done at the MAC layer in the LAN.This issue calls for a coordi-nation between the MAC and higher layers so that the applications can request their QoS requirement in an appropriate manner.For this purpose,802.11e de?nes two entities;Station Management Entity(SME)and

10

MAC Layer Management Entity(MLME).SME is a logical entity in a node which is capable of communi-cating with all layers in the network stack,whereas,MLME deals with interacting with SME and managing MAC layer.The SME and MLME communicate with each other by means of intra-STA signaling.Differ-ent MLMEs in an infrastructure network communicate by means of inter-STA signaling.For example,the communication between HC and a node regarding TxOP duration etc.is part of the inter-STA signaling. The inter-STA signaling is used to setup,modify,and delete traf?c streams.This signaling carries a traf-?c speci?cation(TSPEC)element to characterize the QoS requirements of a node.As shown in Figure6, TSPEC carries various information like minimum data rate,burst size,etc.,which can be derived directly from higher layer requirements.Whereas,some?elds like polling interval,retry interval,etc.,are more MAC layer speci?c.Since SME is capable of interacting with all protocol layers,it is capable of obtaining QoS requirement for speci?c?ows.These requirements are then conveyed to the MLME which is respon-sible for establishment of?nal reservations.Sai Shankar et al.[9]describe the QoS signaling procedure for parameterized traf?c in the purview of RSVP.

As of beginning of year2003,the802.11e is still a draft and has not been standardized yet.The QoS mechanism seems to be geared more toward RSVP.(TSPEC is mostly RSVP speci?c).The draft is contin-uously being revised.For example,there are some documents which indicate that the TSPEC element is being replaced with a new Queue State element[10].

4Fairness

Wireless channel is a shared scarce resource.The MAC protocols used over wireless networks are distributed protocols which try to avoid collisions and provide the nodes in a network with an access to the channel in a fair manner.The ef?ciency of MAC protocols can be measured using two parameters:the probability of collision and fairness in the allocation of channel to competing nodes.The wireless LAN protocols,like any other randomized multiple access protocols,try to resolve the collision problem by following a binary exponential backoff(BEB).BEB is a very ef?cient mechanism in terms of reducing collision probability.It often reduces the collision probability to a fraction of transmissions,as low as1%.

Typically all variations of CSMA/CA protocol suffer from the fairness problem investigated?rst by Bhargavan et al.[11].A channel access protocol(MAC)is termed to be unfair if it fails to provide the channel access to individual nodes without giving preference to one node over others when there is no explicit differentiation.That is,when multiple nodes in a network are competing with each other for channel access,the probability of each node winning the contention should be equal.

Though the wired Ethernet protocol based on CSMA/CD is known to be fair,its wireless counterpart 802.11b based on CSMA/CA is proven to be unfair[12].The unfairness of wireless networks has roots in the fact that unlike wired networks,the collisions in wireless networks are asymmetric.It is not necessary in wireless networks that all nodes involved in collision suffer from packet loss.The collisions and hence the binary exponential backoff can occur primarily because of the following three reasons.

?Transmissions from two nodes interfere with each other and hence their transmissions do not get acknowledged.The absence of ACKs is then treated as collisions by both the senders.

?In the4-way handshaking mode,if a node does not receive CTS response for its RTS request,it treats this as a collision and hence doubles its backoff window.This is irrespective of the status of the destination node.A node may defer to send back CTS if any other node in its vicinity has reserved the channel by sending an RTS or CTS to some other node.

11

?If two nodes carry out simultaneous transmissions intended for the same destination,one of them may succeed because of higher power level.This is called the capture effect in wireless channels[13].

Out of these three collision scenarios only the?rst one is the real collision.The other two scenarios result in success for one node and failure for the other.In this case,only the failed one performs the binary exponential backoff.For subsequent channel contention,the node which succeeded recently has a higher probability of winning the contention because of its lower backoff window.This is essentially because of the dissimilar congestion view about the channel by different nodes.Nodes which are generally successful in accessing the media perceive it to be less congested compared to the nodes which encounter failures.This prompts the successful nodes to access the channel in a more aggressive manner(because of lower backoff window)than the failed nodes.This skewed notion of congestion leads to an unfair access of the channel.

The dissimilarity in wired and wireless networks arises because of the dissimilar nature of the media.In wired networks the media is indeed a shared media.If one node is accessing/using media all other nodes are aware of the media access.But the wireless media is a piecewise shared media.The reach of each node is limited by the transmission power and the local noise present in the region.This makes the media characteristics location dependent and hence a non-uniform nature of the media is perceived by constituent nodes.

The backoff procedure used in almost all wireless medium access protocols is essentially borrowed from the wired Ethernet where the non-uniform nature of media does not exist.So,the binary exponential backoff procedure which provides a fair media access in wired networks becomes the cause of unfairness in the wireless networks.

4.1Impact of Unfairness

The unfairness of MAC has a far reaching impact on the behavior of higher layer protocols and the appli-cations using the network.Application like audio/video streaming are sensitive to packet delays and jitters. When the underlying link behavior is unfair,some applications may be starved of bandwidth just because their share is unfairly distributed somewhere else.

Shugong Xu et al.[14]analyze the behavior of TCP protocol in f0d6b5b369dc5022aaea002aing simulations they show that TCP suffers from instability and unfairness problem in these networks.The instability causes the throughput of available wireless network to?uctuate because of interactions between different nodes carrying TCP-data and TCP-ACK traf?c.The unfairness problem leads to inde?nitely long timeouts causing multiple retransmissions and route breakups.

Koksal et al.[12]describe a scenario where TCP performance degrades because of short term unfairness exhibited by MAC protocols.Because of short term unfairness the TCP acknowledgments fail to reach the sender in a timely fashion.This results into a bursty traf?c.This bursty traf?c results into and ACK compression which aggravates the burstiness of the stream.The bursty traf?c has many disadvantages like packet loss in response to bursty traf?c and throughput loss because of idle links during two consecutive bursts.

4.2Achieving Fairness

Since the fairness problem is deep rooted in the MAC layer itself,it is reasonable to conclude that it can be solved by modifying the MAC in an appropriate way that achieves fairness.To this effect there have been several enhancements and modi?cations suggested to the MAC layer.Some of the examples are

12

Figure7:A single cell con?guration.All nodes are within range of each other.Nodes N1,N2,and N3contend for channel to send data to node B.If some node has very small backoff window than others,it may end up grabbing the channel and as a result other nodes may fail to get their fair

share.Figure8:Node B is sending data to node N1and N2. Node N3is sending data to B.If the fairness criteria is de-pendent on share per node rather than share per stream, then nodes like base stations are starved for bandwidth as these are the nodes which have maximum number of streams for downstream traf?c.

MACAW[11],Estimation based backoff[15],Distributed Wireless Ordering Protocol[16],and Distributed Fair Scheduling[17].

MACA W

Vaduvur Bhargavan et al.[11]observe that to allocate media fairly,congestion level estimation should be a collective effort.In other words,the propagation of congestion information should be explicit rather than each node learning it on its own.

MACAW tries to address the fairness issue in single cell scenarios as depicted in Figure7.In this setup there are3nodes N1,N2,and N3which are trying to transmit data to another node B(base station)in same cell.If the transmission queues of all the nodes are backlogged then most of the times all of them are contending for the channel access.If during the contention all but one pad have relatively high backoff counters then the one with low backoff counter will win the contention.This will result in that node resetting its contention window to the lowest possible window size.This will put the successful node at an advantage over the other nodes since it has now a more than fair chance of winning the contention at later time.This will result in increasing the contention windows of other even further.Note that,in this scenario the implicit assumption is that the other nodes do not perform carrier sense and do not freeze their backoff counters for the duration of transmission.

The observation to be made here is that the backoff counter(or the contention window)of a node does not re?ect the ambient congestion level that exists in the entire network.MACAW advocates sharing of this information by all the nodes in the network.This can be done by including the value of current contention window in every packet that gets transmitted.All other nodes can now update their contention values depending on the latest noti?ed value.Thus,in a network where all nodes are within the reach of each other, after every transmission all nodes have same contention window.

This scheme solves the problem of information sharing but introduces a new problem of oscillating con-tention windows.After every successful transmission,the contention window gets reset to the minimum possible value.If the number of nodes in a network is very high,all nodes would spend a lot of time adjust-ing their contention window to reach an optimal level which would be immediately reset after a successful transmission by any of the nodes.MACAW deals with this oscillation problem by introducing a multiplica-tive increase linear decrease(MILD)backoff algorithm.In this algorithm the backoff window is increased by a multiplicative factor after collision and is decreased by1after success.The multiplicative increase yields a prompt convergence to the backoff window when the contention is high and avoids oscillations by

13

not resetting it to the minimum possible value.

MACAW does not assume that the nodes use carrier sense to avoid collisions.In a single cell network,the fairness problem does not exist if nodes perform carrier sense and freeze their backoff counters for the duration of transmission by other nodes.

MACAW also tries to address the issue of proper de?nition of fairness.If the fairness criteria is de?ned as,“equal channel share for every node,”then there are certain nodes like base stations in infrastructure networks which are at a disadvantage.Consider the setup shown in Figure 8.Here the base station B needs handle streams to nodes N1and N2.Node N3needs to send data to the base station.In this scenarios there are only two nodes which need to access the channel.If the channel access is granted equally to N3and base station then the channel share is not fair from the perspective of streams.MACAW suggests that this problem can be solved by running multiple instances of backoff algorithm each corresponding to a stream.As a matter of fact,this scheme is the basis of traf?c categories in 802.11e.

Estimation based backoff

Zuyuan Fang et al.[15]propose a novel measurement and estimation based scheme to solve the fairness problem in 802.11b networks.The proposal is based on estimating the throughput of all nodes and then computing a fairness index based on this estimation.This fairness index can then be used to adjust the contention window.

The fairness index between any two nodes i and j is computed using the following equation:

fairness index =max {?i,j,min i,j (W i

φj )/max i,j (W i

φj )}(1)

where φi is the prede?ned fair share that a station i should receive and W i is the throughput achieved by node i .The constraints on φi and W i are such that for a total throughput of W :?i φi =1and ?i W i =W

The fairness goal now becomes maximizing the value of fairness index locally.When the fairness index equals 1all nodes obtain the throughput proportional to their share.There are two issues with this approach.First,how to prede?ne the fair share of each node.Second,how to measure the total usage by all nodes.Note that the algorithm should take into account the hidden nodes and node mobility as well.Thus,there cannot be any signaling traf?c between the nodes.

The solution to the ?rst problem is achieved by dividing the nodes into two partitions.In this approach,each node regards all of its neighbors as a single entity with a notion of myself and the others .Now the fair share assumed by each node is φi =0.5.All other nodes also get the remaining share of 0.5.The assumption here is that when all nodes use the same approach,all of them will compete with same fair share.Thus due to the local contention and collisions the long term throughput will achieve fairness.If one wants to provide a stream based fairness,a node can increase its fair share by the proportional amount.That is,if a node has two streams then it treats streams of all other nodes as a single stream and computes its fair share as φi =0.67.

The second problem is solved by snooping on the traf?c in the network.A node can always measure its own traf?c.The traf?c from hidden nodes is deduced by snooping on the CTS and ACK packets sent to those nodes.

Once a node has an estimate of its own traf?c W ei and the traf?c by others W eo it computes the fairness index using the above mentioned equation.After computation of the fairness index it doubles it contention window if it has obtained more than its fair share and halves it if it has not received its fair share.

14

The effectiveness of this approach essentially depends on the approximation of the fair shareφi.if the value ofφi is higher than what it ought to be,the node acts in a greedy fashion and the short term fairness of the channel allocation is affected.For a network with n competing nodes,the share should be1/n.The farther the assumed value(0.5)from1/n,the greedier is the algorithm.This greediness of algorithm,though ensures the long term fairness,affects the short term fairness severely.Moreover,the IEEE802.11b MAC is known to be fair in long term and it is the short term fairness one needs to address.This can be possibly done by estimating the number of nodes in the network.If the estimation of number of nodes is close to the actual number of nodes,the algorithm can work very ef?ciently.

Distributed Fair Scheduling

Nitin Vaidya et al.[17]extend the notion of fairness to include the weight of a?ow for considering its share of the channel.This is in contrast with the prevalent notion of equal share to all nodes or equal share to all?ows.They propose an extension to802.11b DCF to achieve this Distributed Fair Scheduling(DFS) with weighted proportions.The DFS was designed in an attempt to emulate the Self-Clocked Fair Queueing (SCFQ)[18].The DFS is speci?cally tailored for distributed systems like802.11b LANs.

SCFQ is a centralized algorithm for packet scheduling on a link shared by multiple?ows as shown in Figure9.The central coordinator maintains a virtual clock.At any given time t,v(t)indicates the virtual time.Assume that:P k i denotes the k th packet arriving on i th?ow,A k i is the real time of arrival for packet P k i,and L k i represents the size of the packet P k i.For each packet P k i,a start tag S k i and a?nish tag F k i are assigned.The assignment algorithm is as follows:

1.?i F0i=0.

2.Every packet P k i is stamped with start tag S k i using following equation:

S k i=max{v(A k i),F k?1

}.

i

3.A?nish tag for each packet P k i is calculated as:

F k i=S k i+L k i

Figure9:The SCFQ algorithm is used for scheduling packets from multiple input?ows to one output link.The DFS uses this as the basic

model.Figure10:The DFS maps the link in SCFQ to the shared medium and the input?ows to the traf?c from wireless nodes.DFS is thus a distributed version of SCFQ

is mapped to the shared wireless medium and the input?ows are mapped to the?ows from each individual node.

SCFQ is a centralized algorithm.Because of this centralized nature,there is no issue in determining the shortest of the?nish tags of the packets from each queue.But in DFS all queues are distributed.Thus,the selection of next eligible packet for transmission has to be done in a distributed manner.DFS circumvents this problem by choosing the backoff interval proportional to the?nish tag of the packet that is at the front of the?ow.Further,each transmitted packet carries the virtual?nish time of the packet each transmitted packet carries its virtual?nish time with it.This virtual?nish time is used by other nodes to synchronize their virtual clocks.

DFS is implemented as follows:

?Whenever a packet advances to the front of the?ow,its start tag is updated depending on the virtual time at that instance.

?The virtual?nish time for every packet is calculated similar to SCFQ but with a scaling factor for choosing a suitable scale for virtual time.Note that S k i=v(f k i)and from equation(2):

F k i=v(f k i)+scaling factor?

L k i

φi

?(4)?This backoff window B i is further randomized by multiplying it with a random variable with mean1.

On close observation,it becomes apparent that there is no need to maintain a virtual clock as the virtual ?nish time is never used in calculating the backoff interval.After every packet transmission on LAN,all nodes calculate the backoff interval based on the fairness share of each node and the packet size.DFS deals with collisions the same way as802.11b,i.e.,the binary exponential backoff.Thus only?rst backoff interval is chosen depending on the fairness share of the node and is a linear function of packet size and

16

fairness share.If the fairness shareφi is very small,there might be long duration of idle time because of this linear nature of backoff interval.If the number of nodes in the network is high,this might lead to dropped throughput of the network because of excessively long backoff intervals.This problem is circumvented by compressing larger backoff intervals into smaller exponential range.It is not clear how the channel shares φi is assigned to each node.

5Performance

Throughput performance of communication links is measured in terms of observed data rates.Looking from the link layer perspective,the performance is the effective data rate available for the raw bits exchanged be-tween nodes.Whereas,looking from the network layer perspective,it is the rate at which the network layer data is exchanged.This precludes the management data exchanged at the link layer.As one moves higher up the protocol stack,the performance of a link progressively reduces.The reason for this progressive perfor-mance reduction is almost always associated with lower level protocol overheads.Further,for shared media like wireless channels,where multiple nodes contend for the same channel,additional channel bandwidth is used up to resolve the contention and some bandwidth may even be lost when collisions arise.

5.1Performance Loss

For wireless networks like802.11b,it is never possible to achieve the theoretical available bandwidth at the application level.Since a wireless channel can never be devoid of noise,the?rst loss is at the physical radio link itself.Shannon’s equation gives the relation between available data rate R for a channel with bandwidth B with a Signal to Noise Ratio(SNR)as:

R=B log2(1+SNR)

This is the theoretical limit and there can be additional loss because of multipath fading,Doppler shifts, and bit errors[19].

The second rung of reduction in throughput occurs at the Physical layer.An802.11b frame is shown in Figure11.Each frame comprises of24bytes of Physical Convergence Protocol Layer(PLCP)preamble and header.This PLCP preamble is then augmented with rest of the MAC Protocol Data Unit(MPDU). The header is always transmitted at a slower rate of1Mbps and rest of the MAC Protocol Data Unit is transmitted at a variable rate.This slow rate transmission is necessary for compatibility and reachability with all nodes in the network.Thus,a signi?cant portion of transmission occurs at the lower data rates causing a reduced throughput.

IEEE802.11b uses CSMA/CA[3]protocol for media access.In this protocol each data packet transmis-sion is preceded by a channel reservation request(RTS)and a channel reservation response(CTS)between sender and receiver.The data packet is then followed by an acknowledgment from the receiver(ACK). The ACK is required for the reliability of link level transmissions.The transmission follows the so called 4-way handshake protocol of RTS–CTS–DATA–ACK in order to solve the hidden node problem.The ad-ditional bandwidth consumed by these RTS/CTS/ACK and several other management frames add up to the reductions in performance throughput.

The observed data rate for802.11b networks by network layer is around7Mbps in typical indoor environments and the bandwidth of802.11b networks is11Mbps.The next level of performance loss is because of complex interactions between protocol layers and other overheads.We will be examining some of the protocol performance issues.

17

Sync Start Frame Delimiter

Signal Service CRC Length MPDU variable length

128/56 bits 16 bits 8 bits 8 bits 16 bits 16 bits Figure 11:IEEE 802.11b frame format.Initial 24byte header is always transmitted at 1Mbps.Rest of the MAC Protocol Data Unit (MPDU)is transmitted at either 2Mbps or 5.5Mbps or 11Mbps.

5.2Performance of TCP

Performance of TCP/IP over wireless networks is a widely researched topic.TCP behavior is studied under various ?avors of wireless environments.The primary thrust of this research is on the behavior of TCP in response to the error conditions in wireless networks.TCP,which is known to be a very stable and robust protocol on wired networks does not perform as well on wireless networks.Some of the serious issues with TCP are that of performance degradation over wireless links.The primary reason for performance degradation is the assumption by TCP that all losses in the network are due to congestion [20].In almost all wireless networks,the transmissions are highly prone to frame errors which increase with packet size.For example,in 802.11networks,the Frame Error Rate (FER)doubles for every 300byte incre-ment in frame size [21].Thus,at higher packet sizes,the frame errors are higher and hence the packet loss is higher.This packet loss is wrongly treated as congestion by TCP and its congestion control mechanism is triggered.As a result,TCP reduces the congestion window size.The TCP congestion window size is the number of packet that can be sent with outstanding acknowledgments.Congestion window is the measure of minimum number of packets required to keep the link occupied increasing the channel utilization.This congestion control causes lower channel utilization even though in reality there is no congestion in link.

One of the ?rst proposed solutions for TCP performance degradation on wireless links is Indirect-TCP (I-TCP)by A.Bakre et al.[22].I-TCP works by splitting the transport connection at the wired-wireless boundary,usually on base stations.I-TCP maintains two separate TCP segments,one is over the wired network between the base station and the wired end of TCP connection,the other is over the wireless between the base station and the wireless host.This way,the losses occurring on wireless network are hidden from the wired nodes.To cover up for the losses on wireless segment the base station carries out retransmissions.Though an ef?cient solution,this approach violates the end-to-end semantics of TCP.For example,in this approach even if the sender receives an acknowledgment,it does not mean that the receiver has indeed received the packet.This violation of end-to-end semantics can have serious impact on applications.It may so happen that the wireless host may crash before it receives the packet that has been acknowledged by the base station.This is against TCP semantics and may not be acceptable to certain applications.

Hari Balakrishnan et al.[23]try to address this problem by proposing a snoop module that resides in the routing protocol stack of the base station.This snoop module snoops on all the packets that are sent to the mobile hosts and the acknowledgments that are transmitted by the mobile nodes.It also caches the packets that are transmitted over the wireless network.This enables the base station to detect packet losses in the wireless network and to retransmit the lost packets,thus avoiding the triggering of TCP’s congestion control

18

Data Rate Modulation Bits/Symbol

11(Barker Sequence)1MSps

2Mbps QPSK2

8CCK 1.375MSps

11Mbps QPSK8

Table1:Different possible data rates for802.11b networks.

and avoidance mechanisms.

The802.11b provides a fragmentation oriented solution for this at the MAC layer.Since the frame error rate increases with frame size,the reliability of transmissions can be increased by reducing the frame size.Al most all802.11b network interface cards support an option of enabling the fragmentation.In the event of bad channel conditions and increased frame errors,the MAC unilaterally fragments the larger frames into smaller frames of optimal size.This is done in a manner transparent to the higher layers.The receiving node then defragments the frames to obtain a complete data packet which can be handed over to the higher protocol layer.Since the fragmentation occurs at the frame level,there is no higher protocol overhead associated with the fragments.There is a small overhead of additional MAC f0d6b5b369dc5022aaea002apared to the alternative of loosing the frame and reducing the overall throughput,a small overhead is a fair trade off.

Another problem with TCP in wireless LANs is that of Self Collision.George Xylomenos et al.[24] describe a scenario where the TCP data packets contend for the channel with the ACKs for the previous packets.This contention results in self collision for the TCP connection causing overall performance to degrade.This self collision is caused because of the half duplex nature of wireless networks.Haitao Wu et al.[25]propose a modi?cation(described in section5.3)to the Distributed Coordination Function(DCF), which is the MAC protocol for802.11b,to alleviate this self collision problem.

Typically most of the solutions for the issues faced by higher protocols like TCP are localized solutions. The problems are tackled within a protocol layer and no effort is made to make other protocol layers aware of the changing situation.While this transparent approach is good from modularity and simplicity of design point of view,it severely impacts the performance.It is evident that in order to optimize the network performance,all layers in the protocol stack should adapt to the variations in the wireless link appropriately. Further,this should be done while considering the adaptive strategies at other layers[19].

5.3Performance Improvements

The performance improvement research for IEEE802.11b can be broadly categorized into three classes based on the locality of the optimizations involved.These categories are mainly:MAC performance opti-mization,Network or Transport layer enhancements,and Infrastructural arrangements.

5.3.1MAC Performance Optimization

Recent performance optimization research in802.11b MAC aims at improving or enhancing the perfor-mance by modifying the MAC while retaining backward compatibility with existing speci?cation.We give an overview of some schemes seeking to modify the DCF channel access protocol to bring in performance enhancements.

19

Multi-Rate802.11b

IEEE802.11b supports data transmission facility at multiple rates.These multiple data rates are possible because of different modulation techniques which are optimized for different channel conditions.Tech-niques like Quadrature Phase Shift Keying(QPSK),with8bit Complementary Code Keying(CCK)error correction codes,provide a bandwidth of11Mbps but need very high Signal to Noise Ratio(SNR)in chan-nel.Whereas,techniques like QPSK,with11bit Barker Sequence,provide2Mbps of bandwidth but are capable of operating in noisy environments.Table1describes various data rate speci?cations for IEEE 802.11b.

Network interface Cards supporting these multiple data rates are capable of switching between different modulation techniques after assessing the channel characteristics.A user can choose to clamp the network interface at one particular rate or can enable the option of letting the device choose an appropriate rate. In order to improve the performance,the network interface cards can adapt to varying channel conditions and dynamically switch between different modulation techniques.This adaptation primarily involves two tasks,(1)sensing the channel quality and(2)selecting the appropriate technique and hence the data rate. Channel quality can be estimated by using several metrics,such as,signal to noise ratio,bit error rate, signal power,etc.A history of these metrics can be maintained which can be used to predict the channel conditions in future.But given the volatile nature of wireless channels,it is not clear how accurate and reliable these estimates can f0d6b5b369dc5022aaea002aing these estimates,one can select an appropriate rate for the estimated channel condition and transmit the data at the selected rate.For example,if the channel condition is excellent then the sender can select the highest possible rate for transmissions.On the other hand,if the bit error rate is high,the sender can choose to select a stronger encoding technique while dropping the rate.For worse channel conditions,the sender may resort to the lowest possible rate just to get the data across.

Auto Rate Fallback Scheme(ARF)

The channel quality estimation is a proactive approach and may not be accurate.Instead,one can imple-ment a simple reactive channel quality sensing mechanism which gauges the changing channel conditions based on success or failure of previous transmissions.

In IEEE802.11b,link level reliability is provided by explicit link level ACKs.Retransmissions are carried out if positive acknowledgments are not received.Lucent corporation’s Orinoco cards provide a simple result based Auto Rate Fallback(ARF)[26]mechanism which uses ACKs(or their absence)to estimate the channel quality.The ARF mechanism is a timer driven mechanism which keeps track of missed acknowledgments and works as follows.When an ACK is missed for the?rst time,after earlier successful transmissions,the?rst retransmission is carried out at the same rate.After second failure,the transmission rate is downgraded to the next lower data rate and a recovery timer is started.The transmission rate is upgraded back to the next higher data rate if the timer expires or10consecutive transmissions are successful. After this recovery if the very next transmission meets a failure,the system immediately reenters the fallback condition and resumes the normal operation.

While the ARF mechanism is good for link quality estimation between a?xed pair of nodes,it overlooks the fact that it is the receiver whose channel conditions need to be estimated and not the sender.A direct disadvantage of ARF scheme can be seen when there are multiple nodes communicating with each other in a wireless network.If a node moves to a location with bad radio characteristics,other nodes communicating with this particular node would experience transmission failures and as a result the transmission rate would be dropped.Consequently,it would take10successful transmissions or a timeout of the recovery timer to increase the data rate to the next higher level.This can result in pulling down the throughput for the entire network at lower data rates.If more than10%of the nodes in a wireless network are in bad radio

20

characteristics zone and the communication traf?c between all nodes is more or less equal,the overall throughput of the network would always be clamped at the lower threshold.In addition,if some nodes are mobile and there are certain dark spots in the wireless network,the nodes moving in and out of dark spots would reduce the network throughput further.Thus,ARF would fail to perform ef?ciently in a network which comprises of zones with varying network characteristics.Which defeats the primary goal of ARF, that is to adapt to varying network conditions.

Receiver Based Auto Rate Scheme(RBAR)

Gavin Holland et al.[27]propose a rate adaptive scheme which uses feedback information from the re-ceiver to sense the channel condition rather than estimating it at the sender.They also observe that in cellular networks,most of the receiver based channel quality estimation techniques have following characteristics:?Channel quality information is estimated by the receiver and periodically fed back to the sender either on same channel or on a separate channel.

?The sender performs rate selection based on the feedback from the receiver.

?The estimation,feedback,and rate selection schemes often reside at the physical layer and are trans-parent to the higher layers(such as,even MAC).

It is dif?cult to apply same techniques to wireless LANs because conventional wireless LANs usually operate in half duplex mode?.This makes simultaneous feedback impossible.Moreover,wireless LANs use distributed contention based media access which need accurate time estimates for packet transmissions so that other nodes in the network can be informed about them.Dynamic encoding below MAC layer would hinder this operation and can impact ef?ciency.

Thus,one of the major problems in receiver based estimation schemes for wireless LANs like802.11b is the requirement of a mechanism to provide feedback information to the sender.Another desired feature about the feedback is that it should convey instantaneous information rather than history to be more effective.

Since,IEEE802.11b uses DCF for channel coordination,each DATA packet from sender is preceded by a short RTS packet.RBAR leverages on this RTS packet to estimate the channel quality and reception at the receiver f0d6b5b369dc5022aaea002aing this information the receiver selects an appropriate transmission rate.This rate information is then piggybacked on the CTS response to the sender.The sender then uses this information to carry out the actual transmission.

In802.11b DCF,RTS and CTS packets carry the duration information for which all nodes should set their NA V.RBAR proposes to replace this duration information with data rate and the size of the data packet. Other nodes overhearing RTS and CTS can calculate the duration from this information and still set their NA Vs to appropriate values.

The operation sequence and the4-way handshaking for RBAR is shown in Figure12.Whenever some node Src has some data to be sent to some node Dst,it performs the usual channel sensing for a period equal to DIFS.Once the channel is sensed to be idle for DIFS time it sends a short RTS message to DST. This RTS message carries the tentative transmission rate and the size f0d6b5b369dc5022aaea002aing this information, nodes in the vicinity of Src calculate the duration and set their NA Vs accordingly.The node Dst upon receiving RTS analyzes it for its signal quality,strength and other metrics and selects an appropriate rate for the transmission.This selected rate and the size of data is again encapsulated in the CTS response.

本文来源:https://www.bwwdw.com/article/t4rq.html

Top