ArticlePDF Available

MAC Layer Service Time Distribution of a Fixed Priority Real Time Scheduler over 802.11

Authors:

Abstract and Figures

In this paper, we propose to support a fixed priority real time scheduler over 802.11 protocol called Deadline Monotonic (DM). We evaluate the performances of this policy for a simple scenario where two stations with different delay constraints contend for the channel. For this scenario a Markov chain based analytical model is proposed. From the mathematical model, we derive the probability distribution of the packet service time at MAC layer. Analytical results are validated by simulation using the ns-2 network simulator.
Content may be subject to copyright.
International Journal of Software Engineering and Its Applications
Vol. 2, No. 2, April, 2008
95
MAC Layer Service Time Distribution of a
Fixed Priority Real Time Scheduler over 802.11
Inès El Korbi
Ecole Nationale des Sciences de l’Informatique
Laboratoire Cristal
Université de la Manouba, 2010 Tunisia
ines.korbi@gmail.com
Leila Azouz Saidane
Ecole Nationale des Sciences de l’Informatique
Laboratoire Cristal
Université de la Manouba, 2010 Tunisia
leila.saidane@ensi.rnu.tn
Abstract
In this paper, we propose to support a fixed priority real time scheduler over 802.11
protocol called Deadline Monotonic (DM). We evaluate the performances of this policy for a
simple scenario where two stations with different delay constraints contend for the channel.
For this scenario a Markov chain based analytical model is proposed. From the
mathematical model, we derive the probability distribution of the packet service time at MAC
layer. Analytical results are validated by simulation using the ns-2 network simulator.
1. Introduction
The IEEE 802.11 wireless LANs [2] become more and more reliable to support
applications with Quality of Service (QoS) requirements. Indeed, the IEEE 802.11e standard
[3] was recently proposed to offer service differentiation over 802.11.
The IEEE 802.11e standard proposes the Enhanced Distributed Channel Access (EDCA)
as an extension for the 802.11 Distributed Coordination Function (DCF). With EDCA, each
station maintains four priorities called Access Categories (ACs). Each access category is
characterized by a minimum and a maximum contention window sizes and an Arbitration
Inter Frame Space (AIFS).
Even though the IEEE 802.11e protocol introduces service differentiation over 802.11, the
granularity of service offered by 802.11e (4 priorities at most) can not satisfy the real time
flows requirements (each flow is characterized by its own delay bound). Therefore, we
propose in this paper a new medium access mechanism based on the fixed priority Deadline
Monotonic (DM) policy [8] to schedule real time flows over 802.11.
To support the DM policy over 802.11, we use a distributed scheduling and introduce a
new medium access backoff policy. We then propose a Markov chain based analytical model
to evaluate the performances of DM for a simple scenario where two stations with different
deadline constraints contend for the channel. This configuration will reflect the behavior of
DM over 802.11 and the mathematical model can be extended for more complex scenarios.
International Journal of Software Engineering and Its Applications
Vol. 2, No. 2, April, 2008
96
For the considered configuration, we evaluate for each station the MAC layer service time
distribution. We can therefore derive the probability that the packet service time exceeds a
certain value. Analytical results will be validated and extended by simulation using the ns-2
network simulator [9].
The rest of this paper is organized as follows. In section 2, we review the works related to
our study. In section 3, we present the distributed scheduling and introduce the new medium
access backoff policy to support DM over 802.11. In section 4, we present the mathematical
model based on the Markov chains analysis. In section 5, we evaluate the service time
distribution and present analytical and simulation results. Finally, we conclude the paper in
section 6.
2. Related Works
In the absence of a coordination point, the IEEE 802.11 defines the Distributed
Coordination Function (DCF) based on the Carrier Sense Multiple Access with Collision
Avoidance (CSMA/CA) protocol. In the DCF protocol, a station shall ensure that the channel
is idle when it attempts to transmit. Then it selects a random backoff in the contention
window
[
]
1CW,0
, where CW is the current window size and takes its values between the
minimum and the maximum contention window sizes. If the channel is sensed busy, the
station suspends its backoff until the channel becomes idle for a Distributed Inter Frame
Space (DIFS) after a successful transmission or an Extended Inter Frame Space (EIFS) after a
collision. When the backoff reaches 0, the packet is transmitted. A packet is dropped if it
collides after maximum retransmission attempts.
Different works have been proposed to evaluate the performance of the 802.11 DCF.
Indeed, Bianchi [1] proposed a Markov chain based analytical model to evaluate the
saturation throughput of the 802.11 protocol. Probabilistic bounds on MAC layer service time
were derived in [10]. The IEEE 802.11e performs service differentiation over 802.11 and
aggregates the traffic into four access categories. In [4] and [5] Osterbo and Al. proposed to
evaluate the performance of EDCA under saturated and non saturated conditions.
Although the IEEE 802.11e EDCA classifies the traffic into four prioritized ACs, there is
still no guarantee of real time transmission service. This is due to the lack of a satisfactory
scheduling method for various delay-sensitive flows.
In this paper, we focus on delay sensitive flows and propose to support the fixed priority
Deadline Monotonic (DM) policy over 802.11 to schedule delay sensitive flows. For instance,
we use a priority broadcast mechanism similar to [6] and introduce a new medium access
backoff policy where the backoff value is inferred from the deadline information.
3. Supporting Deadline Monotonic Policy over 802.11
The Deadline Monotonic policy (DM) [8] is a real time scheduling policy that assigns
static priorities to flows packets according to their deadlines; the packet with the small
deadline being assigned the highest priority. Indeed, when flows packets arrive to a station,
they are sorted by increasing order of their deadlines such as the Head of Line (HOL) packet
has the shortest delay bound. The problem that occurs with the DCF is that all the stations
share the same transmission medium and the HOL packets of all the stations will contend for
the channel with the same priority even if they have different deadlines.
International Journal of Software Engineering and Its Applications
Vol. 2, No. 2, April, 2008
97
The idea of introducing DM over 802.11 is to allow stations having packets with short
deadlines to access the channel with higher priority than those having packets with long
deadlines. Providing such a QoS requires a distributed scheduling and a new medium access
policy.
3.1. Distributed Scheduling
To realize a distributed scheduling over 802.11, we introduce a broadcast priority
mechanism similar to [6]. In each station, we focus on two packets:
The current packet: the packet being served.
The HOL packet: the packet at the head of the queue that will be transmitted after
the service completion of the current packet.
Each station maintains a local scheduling table with entries for HOL packets of all other
stations. Each entry in the scheduling table of node
i
S comprises two fields
(
)
kk
D,S where
k
S
is the source node MAC address (Address 2 field in DATA packet and RA field in the
ACK packet) and
k
D
is the deadline of station
k
S
HOL packet. To broadcast the HOL packet
deadlines, we propose to use the DATA/ACK access mode. The deadline information
requires two additional bytes to be encoded in DATA and ACK packets.
When a node
i
S
transmits a DATA packet, it piggybacks the deadline of its HOL packet.
The nodes hearing the DATA packet add an entry for
i
S
in their local scheduling tables by
filling the corresponding fields. The receiver of the DATA packet copies the priority of the
HOL packet in ACK before sending the ACK frame. All the stations that did not hear the
DATA packet add an entry for
i
S using the information in the ACK packet.
In the following, we propose a new medium access policy, where the backoff value is
inferred from the packet deadline.
3.2. DM medium access backoff policy
Let’s consider two stations
1
S and
2
S transmitting two flows with the same deadline
1
D
(
1
D is expressed as a number of 802.11 slots). The two stations having the same delay
bounds can access the channel with the same priority using the native 802.11 DCF. Now, we
suppose that
1
S and
2
S transmit flows with different delay bounds
1
D and
2
D such as
21
DD <
and generate two packets at time instants
1
t
and
2
t
. If
2
S
had the same delay bound
as
1
S
, its packet would have been generated at time
2
't
such as
2122
Dt't +=
, where
(
)
1221
DDD =
. At that time
1
S
and
2
S
would have the same priority and transmit their
packets according to the 802.11 protocol.
Hence, when
2
S
has a packet to transmit, it selects a 802.11 backoff, but suspends this
backoff during
21
D
idle slots. The
21
D
slots elapsed, 802.11 backoff can therefore be
decremented.
Thus to support DM over 802.11, each station uses a new backoff policy where the backoff
is given by:
The random backoff selected in
[
]
1CW,0
, according to 802.11 DCF, called
BAsic Backoff (BAB).
The DM Shifting Backoff (DMSB): corresponds to the additional backoff slots that
a station with low priority (transmitting a packet with a large deadline) adds to its
International Journal of Software Engineering and Its Applications
Vol. 2, No. 2, April, 2008
98
BAB to have the same priority as the station with the highest priority (transmitting
the packet with the shortest deadline).
Whenever a station
i
S sends an ACK or hears an ACK on the channel its DMSB is
reevaluated as follows:
(
)
(
)
(
)
(
)
iminii
SDTSHOLDeadlineSDMSB =
(1)
where
(
)
imin
SDT
is the minimum of the HOL packet deadlines present in
i
S
scheduling
table and
(
)
(
)
i
SHOLDeadline
is station
i
S
HOL packet deadline.
Hence, when
i
S has to transmit its HOL packet with a delay bound
i
D, it selects a BAB in
the contention window
[
]
1CW,0
min
and computes the Whole Backoff (WHB) value as
follows:
(
)
(
)
(
)
iii
SBABSDMSBSWHB += (2)
The station
i
S decrements its WHB when it senses an idle slot. Now, we suppose that
i
S
senses the channel busy. If a successful transmission is heard, then
i
S revaluates its DMSB
when a correct ACK is heard. Then,
i
S adds the new DMSB value to its current BAB as in
equation (2). Whereas, if a collision is heard,
i
S
reinitializes its DMSB and adds it to its
current BAB to allow colliding stations contending with the same priority as for their first
transmission attempt.
i
S
transmits when its WHB reaches 0.
4.
Mathematical Model of the DM policy over 802.11
In the hereby section, we propose a mathematical model to evaluate the performance of the
DM policy using Markov chains analysis [1]. We consider the following assumptions:
1) The system under study comprises two stations
1
S and
2
S, such as
i
S transmits a
flow
i
F having a deadline
i
D and
21
DD <. We define
(
)
1221
DDD = as the
difference between the two delay bounds.
2) We operate in saturation conditions: each station has immediately a packet
available for transmission after the service completion of the previous packet [1].
3) A station selects a BAB in a contention window
[
]
1W,0 . We consider that each
station selects a 802.11 backoff in the same contention window of size W
independently of the transmission attempt. This is a simplifying assumption to
limit the complexity of the mathematical model.
4) We suppose that we are in stationary conditions, i.e. the two stations have already
sent one packet to each other. Thus, the two stations have the same scheduling
table.
Each station
i
S will be modeled by a Markov chain representing the whole backoff
(WHB) process.
International Journal of Software Engineering and Its Applications
Vol. 2, No. 2, April, 2008
99
4.1 Markov chain modeling station S
1
Figure 1 represents the Markov chain modeling station
1
S.
Figure 1:
Figure 1:Figure 1:
Figure 1: Markov chain modeling station
Markov chain modeling station Markov chain modeling station
Markov chain modeling station
1
S
The states of this Markov chain are described by the following quadruplet
(
)
21
D,ji,i,R
where:
R
: takes two values
2
S~
and
2
S
. When
2
S~R =
, station
2
S
is decrementing its
shifting backoff (DMSB) during
21
D slots and wouldn’t contend for the channel.
When
2
SR =, the
21
D slots were elapsed and
2
S will contend for the channel at
the same time as
1
S.
i
: the value of the BAB selected by
1
S in
[
]
1W,0 .
(
)
ji
: corresponds to the remaining backoff slots before reaching 0.
21
D
: corresponds to
(
)
12
DD
. We choose the negative notation
21
D
for
1
S
to express the fact that
2
S
has a positive ∆ΜΣΒ equals to
21
D
and
(
)
0SDMSB
1
=
.
Initially
1
S
selects a random BAB and is in one of the states
(
)
212
D,i,i,S~
,
1W..0i
=
.
During
(
)
1D
21
slots,
1
S
decrements its backoff with the probability 1 and moves to one of
the states
(
)
212
D,ji,i,S~
,
1W..0i
=
,
(
)
(
)
1D,1i,0maxminj
21
=
. Indeed during
these slots,
2
S
is decrementing its DMSB and wouldn’t contend for the channel. When
1
S
decrements its
th
21
D slot it knows that henceforth,
2
S
can contend for the channel (the
21
D
slots were elapsed). Hence,
1
S moves to one of the states
(
)
21212
D,Di,i,S ,
1W..Di
21
= . If the BAB initially selected by
1
S is smaller than
21
D, then
1
S transmits
when its backoff reaches 0. If
2
S transmits before
1
S backoff reaches 0, the next packet of
2
S will decrement another DMSB and
1
S will see the channel free again for
21
D slots.
International Journal of Software Engineering and Its Applications
Vol. 2, No. 2, April, 2008
100
4.2 Markov chain modeling station S
2
Figure 2 represents the Markov chain modeling station
2
S.
Figure 2:
Figure 2:Figure 2:
Figure 2: Markov chain modeling station
Markov chain modeling station Markov chain modeling station
Markov chain modeling station
2
S
Each state of
2
S Markov chain is represented by the quadruplet
(
)
2121
D,jD,k,i where:
i
: refers to the BAB value selected by
2
S in
[
]
1W,0 .
k : refers to the current BAB value.
jD
21
: refers to the current DMSB of
2
S
,
j
in
[
]
21
D,0
.
21
D : corresponds to
(
)
12
DD .
When
2
S selects a BAB, its DMSB equals
21
D and is in one of states
(
)
2121
D,D,i,i ,
1W..0i
=
. If
2
S observes the channel idle during
21
D slots, it moves to one of the states
(
)
21
D,0,i,i , 1W..0i
=
, where it ends its shifting backoff. At that time,
2
Sbegins
decrementing its basic backoff. If
1
S transmits from the state
(
)
21
D,0,i,i ,
2
S reinitializes its
shifting backoff and moves again to one of the states
(
)
2121
D,D,i,i
,
1W..1i
=
.
4.3. Blocking probabilities in the Markov chains
We notice from figure 1 that when
1
S
is in one of the states
(
)
212
D,ji,i,S~
,
1W..0i
=
,
(
)
(
)
1D,1i,0maxminj
21
=
, it decrements its backoff with the probability
1.
That means that when
1
S
is in one of these states
(
)
212
D,ji,i,S~
, it knows that
2
S
is
decrementing its DMSB and is in one of the states
(
)
2121
D,jD,i,i
,
1W..0i
=
,
(
)
1D..0j
21
= .
However, when
1
S
is in one of the states
(
)
21212
D,Di,i,S
,
(
)
1W..Di
21
=
,
2
S
has
already decremented its DMSB and can now contend for the channel by decrementing its
basic backoff. In this case,
2
S will be in one of the states
(
)
(
)
1W..2i
21
1W..0i
21
D,0,1i,iD,0,i,i
==
.
From the explanations above, each station Markov chain states can be divided in two
groups:
International Journal of Software Engineering and Its Applications
Vol. 2, No. 2, April, 2008
101
1
ξ
: the set of states of
1
S
for which
2
S
will not contend (blue states in figure 1).
(
)
{
(
)
(
)
}
1D,1i,0maxmin..0j,1W..0i,D,ji,i,S~
212121
===
ξ
1
γ
: the set of states of station
1
S
for which
2
S
can con contend and decrements
its
BAB
(pink states in figure 1).
(
)
{
}
1W..Di,D,Di,i,S
21212121
==
γ
2
ξ
: the set of states of
2
S
where
2
S
does not contend for the channel (blue states
in figure 2).
(
)
{
(
)
}
1D..0j,1W..0i,D,jD,i,i
2121212
===
ξ
2
γ
: the set of states of
2
S
, where
2
S
contends for the channel (pink states in figure
2).
(
)
{
(
)
}
1W..2i,D,0,1i,i1W..0i,D,0,i,i
21212
===
γ
Thus when
1
S
is in one of the states of
1
ξ
,
2
S
is obligatory in of the states of
2
ξ
.
Similarly, when
1
S
is in one of the states of
1
γ
,
2
S
is obligatory in of the states of
2
γ
.
When the station
2
S
is in one states of
2
ξ
,
2
S
is blocked with the probability
11
τ
, this
probability corresponds to the probability that
1
S
transmits given that it is in one of the states
of
1
ξ
. Thus:
[ ]
(
)
( )
( )( )
=
=
==
1W
0i
1D,1i,0maxmin
0j
D,ji,i,S~
1
D,0,0,S~
1
1111
21
212
212
transmits SPr
π
π
ξτ
(3)
Where
(
)
21
D,ji,i,R
1
π
is the probability that
1
S
is in the state
(
)
,D,ji,i,R
21
in the
stationary conditions and
(
)
{
}
21
D,ji,i,R
1
1
=
πΠ
is the probability vector of
1
S
. We also
define
12
τ
, the probability that
2
S
is blocked given that station
1
S
is in one of the states
of
1
γ
. Hence:
[ ]
(
)
( )
=
==
1W
Di
D,Di,i,S
1
D,0,D,S
1
1112
21
21212
21212
transmits SPr
π
π
γτ
(4)
In the same way, when
2
S
is in one of the states of
2
ξ
,
1
S
will decrement its backoff with
the probability 1. Indeed, no one of the
2
ξ
states corresponds to a transmission state (those
states describe the shifting backoff decremented by
2
S). However, when
2
S is in one of the
states of
2
γ
, it contends for the channel and
1
S is blocked with the probability
22
τ
, such as:
[ ]
(
)
( ) ( )
=
=
+
==
1W
2i
D,0,1i,i
2
1W
0i
D,0,i,i
2
D,0,0,0
2
2222
2121
21
transmits SPr
ππ
π
γτ
(5)
where
(
)
2121
D,jD,k,i
2
π
is defined as the probability of the state
(
)
,D,jD,k,i
2121
in the
stationary condition.
(
)
{
}
2121
D,jD,k,i
2
2
=
πΠ
is the probability vector of
2
S.
International Journal of Software Engineering and Its Applications
Vol. 2, No. 2, April, 2008
102
The blocking probabilities described above allow deducing the transition state probabilities
and having the transition probability matrix
i
P, for each station
i
S. Therefore, we can
evaluate the state probabilities by solving the following system [7]:
=
=
j
j
i
iii
1
P
π
ΠΠ
(6)
4.4. Transition probability matrix of S
1
Let
1
P
be the transition probability matrix of
1
S
and
{
}
j,iP
1
is the probability to transit
from state
i
to state
j
. The transitions probabilities of station
1
S
are:
(
)
(
)
(
)
{
}
( )
2D,2imin..0j
,1W..2i,1D,1ji,i,S~,D,ji,i,S~P
21
2122121
=
=
=
+
(7)
(
)
(
)
{
}
( )
1W..Di
,1D,Di,i,S,D,1Di,i,S~P
21
21212212121
=
=
+
(8)
(
)
(
)
{
}
(
)
1D,1W..1i,1D,0,0,S~,D,1,i,S~P
212122121
==
(9)
(
)
(
)
(
)
(
)
{
}
( )
1W..1Di
,1D,D1i,1i,S,D,Di,i,SP
21
2221212212121
+=
=
(10)
(
)
(
)
(
)
(
)
{
}
( )
1W..1Di
,D,Di,Di,S~,D,Di,i,SP
21
222121212212121
+=
=
(11)
( ) ( ){ }
1W..0i,
W
1
D,i,i,S~,D,0,0,S~P
2122121
==
(12)
If
(
)
WD
21
< then:
( ) ( ){ }
1W..0i,
W
1
D,i,i,S~,D,0,D ,SP
212212121
==
(13)
By replacing
1
P
and
1
Π
in (6) and solving the resulting system, we can express
(
)
21
D,ji,i,R
1
π
as a function of
22
τ
, where
22
τ
is given by (5).
4.5. Transition probability matrix of S
2
Let
2
P be the transition probability matrix of
2
S. The transitions probabilities of
2
S are:
(
)
(
)
(
)
{
}
( )
1D..0j,1W..0i
,1D,1jD,i,i,D,jD,i,iP
21
11212121212
==
(14)
(
)
(
)
{
}
(
)
1D..0j,1W..0i,D,D,i,i,D,jD,i,iP
2111212121212
(15)
(
)
(
)
{
}
1W..2i,1D,0,1i,i,D,0,i,iP
1221212
(16)
(
)
(
)
{
}
1221212
1D,0,0,0,D,0,1,1P
(17)
(
)
(
)
{
}
1W..1i,D,D,i,i,D,0,i,iP
122121212
(18)
(
)
(
)
{
}
1W..2i,D,D,1i,1i,D,0,1i,iP
122121212
(19)
International Journal of Software Engineering and Its Applications
Vol. 2, No. 2, April, 2008
103
(
)
(
)
{
}
1W..3i,1D,0,2i,1i,D,0,1i,iP
1221212
(20)
( ) ( ){ }
1W..0i,
W
1
D,D,i,i,D,0,0,0P
2121212
==
(21)
By replacing
2
Pand
2
Π
in (6) and solving the resulting system, we can express
(
)
2121
D,jD,k,i
2
π
as a function of
11
τ
,
12
τ
given respectively by equations (3), (4). Moreover, by
replacing
(
)
21
D,ji,i,R
1
π
and
(
)
2121
D,jD,k,i
2
π
by their values, in equations (3), (4) and (5), we
obtain a system of non linear equations as follows:
(
)
( )
( )
<<<>>>
=
=
=
1,1,1,0,0,0
constraint the under
,f
f
f
221211221211
121122
2212
2211
ττττττ
τττ
ττ
ττ
(22)
Solving the above system (22), allows deducing the expressions of
11
τ
,
12
τ
and
22
τ
, and
deriving the state probabilities of
1
S and
2
S Markov chains.
5. Service Time Analysis
In this section, we evaluate the MAC layer service time distribution of
1
S
and
2
S
, using
the DM policy. The MAC layer service time is the time interval from the time instant that a
packet becomes at the head of the queue and starts to contend for channel to the time instant
that either the packet is acknowledged for a successful transmission or dropped. We propose
to evaluate the Z-Transform of the MAC layer service time [10] to derive expressions of the
service time distributions. The service time depends on the duration of an idle slot
e
T
, the
duration of a successful transmission
s
T
and the duration of a collision
c
T
[4], [10].
We have:
(
)
(
)
DIFSTTTSIFSTTTTT
DACKPHYDpMACPHYs
++++++++=
(23)
(
)
EIFSTTTTT
DpMACPHYc
++++=
(24)
where
PHY
T,
MAC
T and
ACK
T are the durations of the PHY header, the MAC header and the
ACK packet.
D
T is the time required to transmit the two bytes deadline information and
p
T is
the time required to transmit the data payload. Stations hearing a collision wait during EIFS
before resuming their packets.
As
e
T
is the smallest duration event, the duration of all events will be given by
e
event
T
T
.
5.1. Z-transform of station S
1
service time
To evaluate the Z-transform of station
1
S
service time
(
)
ZTS
1
, we define:
( )
(
)
Z1H
21
D,ji,i,R
: The Z-transform of the time already elapsed from the instant
1
S
selects
a basic backoff in
[
]
1W,0
(i.e. being in one of the states
(
)
212
D,i,i,S~
) to the time it is
found in the state
(
)
21
D,ji,i,R
.
International Journal of Software Engineering and Its Applications
Vol. 2, No. 2, April, 2008
104
We evaluate
( )
(
)
Z1H
21
D,ji,i,R
for each state of
1
S Markov chain as follows:
( )
( )
21
j
D,j1W,1W,S~
D..0j,Z
W
1
Z1H
212
==
(25)
( )
( ) ( )
2..W..Di,Z
W
1
Z1H
21D,i,i,S~
212
==
(26)
( )
( )
( )
( )
( )( )
21
D,i,Di,S~
T
T
22D,i,i,S~
D1W,0max..1i
W
1
Z1HZZ1H
21212
e
s
212
=
+=
+
τ
(27)
( )
(
)
( )
(
)
( )
1D,1imin..1j
,1W..1i,Z1HZZ1H
21
D,i,i,S~
j
D,ji,i,S~
212212
=
==
(28)
( )
(
)
( )
(
)
( )
( )
( ) ( )
2W..Di,Z1HZ1
Z1HZZ1H
21D,D1i,1i,S22
D,i,i,S~
D
D,Di,i,S
21212
212
21
21212
=+
=
++
τ
(29)
( )
( )
( )
( )
(
)
=
+=
1D,1Wmin
1i
D,1,i,S~D,0,0,S~
21
212212
Z1H
W
1
Z1H
(30)
If the station
1
S transmission state is
(
)
212
D,0,0,S~ , the transmission will be
successful since
2
S was decrementing its shifting backoff. Whereas when the station
1
S transmission state is
(
)
21212
D,0,D,S , the transmission occurs successfull y only if
2
S doesn’t transmit with the probability
(
)
22
1
τ
. Otherwise
1
S selects another backoff
and tries another transmission. After m retransmissions, if the packet is not
acknowledged, it will be dropped.
( )
( )
( )
(
( )
( )
( )
)
( )
( )
( )
( )
1m
D,0,D,S22
T
T
m
0i
D,0,D,C22
T
T
D,0,D,S22D,0,0,S~
T
T
1
Z1HZ
Z1HZZ1H1Z1HZZTS
21212
e
c
21212
e
c
21212212
e
s
+
=
+
+=
τ
ττ
(31)
5.2. Z-transform of station S
2
service time
In t he same way, we define
(
)
ZTS
2
, the Z-transform of station
2
S
service time. We
have:
( )
(
)
Z2H
2121
D,jD,k,i
: The Z-transform of the time already elapsed from the instant
2
S
selects a basic backoff in
[
]
1W,0
(i.e. being in one of the states
(
)
2121
D,D,i,i
) to the
time it is found in the state
(
)
2121
D,jD,k,i
.
( )
( )
1Wi and 0i,
W
1
Z2H
2121
D,D,i,i
=== (32)
International Journal of Software Engineering and Its Applications
Vol. 2, No. 2, April, 2008
105
( )
( )
( )
( )
2W..1i,Z2HZ
W
1
Z2H
21
e
s
2121
D,0,i,1i
T
T
12D,D,i,i
=+=
+
τ
(33)
To compute
( )
(
)
Z2H
2121
D,jD,i,i
, we define
(
)
ZT
j
dec
such as:
(
)
1ZT
0
dec
=
(34)
( )
(
)
( )
21
1j
dec
T
T
11
11
j
dec
D..1j,
ZTZ1
Z1
ZT
e
s
=
=
τ
(35)
So:
( )
(
)
( )
(
)
(
)
( ) ( )
2121
j
dec
D,1jD,i,iD,jD,i,i
D,0j,i,D..1j
,1W..0i,ZTZ2HZ2H
21212121
=
==
+
(36)
And:
( )
(
)
(
)
( )
(
)
( )
( )
( )
( )
2W..2i,
ZTZ1
Z2ZH1
Z2ZH1Z2H
21
e
s
21
2121
D
dec
T
T
12
D,0,i,i12
D,0,i,1i12D,0,1i,i
=
+=
+
τ
τ
τ
(37)
( )
( )
(
)
( )
(
)
( )
2W..2i,
ZTZ1
Z2ZH1
Z2H
21
e
s
21
21
D
dec
T
T
12
D,0,1W,1W12
D,0,2W,1W
=
=
τ
(38)
( )
(
)
(
)
( )
(
)
(
)
( )
( )
( )
( )
ZTZ1
Z2ZH1
ZTZ2ZH1Z2H
21
e
s
21
21
2121
D
dec
T
T
12
D,0,1,112
D
dec
D,0,1,011D,0,0,0
+
=
τ
τ
τ
(39)
Therefore, we can derive an expression of
2
S
Z-transform service time as follows:
( )
( )
( ) ( )
( )
( )
( )
( )
=
+
+
=
m
0i
i
D,0,0,0
T
T
12D,0,0,0
T
T
12
1m
D,0,0,0
T
T
122
Z2HZZ2HZ1Z2HZZTS
21
e
c
21
e
s
21
e
c
τττ
(40)
5.3. Service Time Distribution
Service time distribution is obtained by inverting the service time Z transforms given
by equations (31) and (40). But we are most interested in tail behaviour in terms of
service time bounds, i.e. the probabilit y that the service time exceeds a certain value.
Probabilistic bounds on service time can be derived by inverting the complementary
service time Z transform [4] given by:
International Journal of Software Engineering and Its Applications
Vol. 2, No. 2, April, 2008
106
( )
(
)
Z
1
ZTS1
ZX
~
i
i
=
(41)
In figures 3(a) to 3(d), we depict analytical and simulation values of the Complementary
service time distribution of both stations
1
S
and
2
S
. The curves are obtained for different
values of the contention window size W and for different values of
21
D
(
21
D
is given in
slots). The stations transmit 512 bytes data payload packets and we use the 802.11.b
parameters (given in table 1) to determine the values of
e
T,
s
T and
c
T. Simulation results are
obtained with ns-2 network simulator [9].
Table 1
Table 1Table 1
Table 1: 802.11 b parameters.
: 802.11 b parameters.: 802.11 b parameters.
: 802.11 b parameters.
All the curves drop gradually to 0 as the delay increases. Station
1
S
curves drop to 0 faster
than station
2
S
curves. Indeed, when
32W
=
and
4D
21
=
, the probability that
1
S
service
time exceeds 0.005s equals 0.28%. Whereas, station
2
S
service time exceeds 0.005s with the
probability of 5.67%. Thus, DM offers better service time guarantees for the flow with the
highest priority.
(a) W=16 (b) W=32
Data Rate 11 Mb/s
Slot 20 µs
SIFS 10 µs
DIFS 50 µs
PHY Header 192 µs
MAC Header 272 µs
ACK 112 µs
Short Retry Limit 7
International Journal of Software Engineering and Its Applications
Vol. 2, No. 2, April, 2008
107
(c) W=64 (d) W=128
Figure 3:
Figure 3:Figure 3:
Figure 3: Complementary Service Time Distribution
Complementary Service Time Distribution Complementary Service Time Distribution
Complementary Service Time Distribution
Moreover, we notice that each time W doubles its size,
1
S and
2
S service time curves
become closer. Indeed, when W becomes large, the basic backoff values selected by
1
S
and
2
S
increase. Hence, the shifting backoff slots (DMSB) added by DM become
negligible compared to the basic backoff. The whole backoff values (WHB) of the two
stations become near and their service time accordingly.
5.4. Extended Simulation Results
In the above section, we considered a two station scenario where each station transmits a
real time flow with a given delay bound. We showed that DM performs service differentiation
over 802.11 and offers better service time bounds for the flow with the short deadline.
In this section, we consider a five station scenario where each station transmits a real time
flow with a characterized delay bound. For this scenario, we consider the default 802.11b
minimum and maximum windows sizes ( 32CW
min
=,1024CW
max
=). Simulation results
show that the delay bounds on service time decrease with the deadline bounds.
Moreover, as the difference between flows deadlines increases, the difference between
their delay bounds increases.
International Journal of Software Engineering and Its Applications
Vol. 2, No. 2, April, 2008
108
(a) D51=4 (b) D51=8
(c) D51=12 (d) D51=16
Figure 4:
Figure 4:Figure 4:
Figure 4: Complementary Service Time Distribution (Extended Simulation Results)
Complementary Service Time Distribution (Extended Simulation Results) Complementary Service Time Distribution (Extended Simulation Results)
Complementary Service Time Distribution (Extended Simulation Results)
6. Conclusion
In this paper we proposed to support the DM policy over 802.11 protocol. Therefore,
we used a distributed scheduling algorithm and introduced a new medium access
backoff policy. Then we proposed a mathematical model to evaluate the performance of
the DM policy in terms of service time guarantees for a scenario where two stations
with different delay bounds contend for the channel. Analytical and simulation results
show that DM performs service differentiation over 802.11 and offers better service
time guarantees for the flow having the small deadline. Moreover, as the difference
between flows deadlines increases, the difference between their delay bounds increases.
7. References
[1] Bianchi, G., ”Performance Analysis of the IEEE 802.11 Distributed Coordination Function”, IEEE J-SAC Vol.
18 N. 3, Mar. 2000, pp. 535-547.
[2] IEEE 802.11 WG, ”Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY)
specification”, IEEE 1999.
International Journal of Software Engineering and Its Applications
Vol. 2, No. 2, April, 2008
109
[3] IEEE 802.11 WG, ”Draft Supplement to Part 11: Wireless Medium Access Control (MAC) and physical layer
(PHY) specifications: Medium Access Control (MAC) Enhancements for Quality of Service (QoS)”, IEEE
802.11e/D13.0, Jan. 2005.
[4] Engelstad, P.E. and Osterbo O.N., ”The Delay Distribution of IEEE 802.11e EDCA and 802.11 DCF”,
Proceedings of the International Performance Computing and Communications Conference, Arizona, Apr. 2006.
[5] Engelstad, P.E., Osterbo, O.N, “Delay and Throughput Analysis of IEEE 802.11e EDCA with Starvation
Prediction”, In proceedings of the The IEEE Conference on Local Computer Networks , LCN’05 (2005).
[6] Kanodia, V., Li, C., ”Distribted Priority Scheduling and Medium Access in Ad-hoc Networks”, ACM Wireless
Networks, Volume 8, Nov. 2002. [6] Kleinrock, L., “Queuing Systems,Vol. 1”, John Wiley, 1975.
[7] Kleinrock, L., “Queuing Systems,Vol. 1”, John Wiley, 1975.
[8] Leung, J. Y. T., Whitehead, J, “On the Complexity of Fixed-Priority Scheduling of Periodic, Real- Time
Tasks”, Performance Evaluation (Netherlands), pp. 237-250, Dec. 1982.
[9] McCanne, S., Floyd, S., The network simulator - ns-2, http://www.isi.ed u/nsn am/ns/.
[10] Zhai, H., Kwon, Y., Fang, Y., .Performance Analysis of IEEE 802.11 MAC protocol in wireless LANs.,
Wireless Computer and Mobile Computing, 2004.
Authors
Inès El Korbi received the engineering degree and the Master degree in computer science
in 2003 and 2005 respectively from l’Ecole Nationale des Sciences de l’Informatique (ENSI),
Université de la Manouba, Tunisia. Currently she’s applying for a PHD degree. From 2004
she operates as a student researcher in cooperation projects between l’ENSI (Tunisia) and
l’Institut National de Recherche en Informatique et en Automatique (INRIA) in France.
Leila Azouz Saidane is Professor at l’ENSI, Tunisia. Her research interests include
performance evaluation of QoS networks, wireless and sensor networks. From 2004, she
initiates many cooperation projects between l’ENSI and l’INRIA in France.
International Journal of Software Engineering and Its Applications
Vol. 2, No. 2, April, 2008
110
ResearchGate has not been able to resolve any citations for this publication.
Article
Full-text available
Providing quality of service in random access multi-hop wireless networks requires support from both medium access and packet scheduling algorithms. However, due to the distributed nature of ad hoc networks, nodes may not be able to determine the next packet that would be transmitted in a (hypothet-ical) centralized and ideal dynamic priority scheduler. In this paper, we develop two mechanisms for ¦ An earlier version of this paper appeared as [9].
Article
Full-text available
Providing Quality-of-Service in random access multi-hop wireless networks requires support from both medium access and packet scheduling algorithms. However, due to the distributed nature of ad hoc networks, nodes may not be able to determine the next packet that would be transmitted in a (hypothetical) centralized and ideal dynamic priority scheduler. In this paper, we develop two mechanisms for QoS communication in multi-hop wireless networks. First, we devise distributed priority scheduling, a technique that piggybacks the priority tag of a node’s head-of-line packet onto handshake and data packets; e.g., RTS/DATA packets in IEEE 802.11. By monitoring transmitted packets, each node maintains a scheduling table which is used to assess the node’s priority level relative to other nodes. We then incorporate this scheduling table into existing IEEE 802.11 priority backoff schemes to approximate the idealized schedule. Second, we observe that congestion, link errors, and the random nature of medium access prohibit an exact realization of the ideal schedule. Consequently, we devise a scheduling scheme termed multi-hop coordination so that downstream nodes can increase a packet’s relative priority to make up for excessive delays incurred upstream. We next develop a simple analytical model to quantitatively explore these two mechanisms. In the former case, we study the impact of the probability of overhearing another packet’s priority index on the scheme’s ability to achieve the ideal schedule. In the latter case, we explore the role of multi-hop coordination in increasing the probability that a packet satisfies its end-to-end QoS target. Finally, we perform a set of ns-2 simulations to study the scheme’s performance under more realistic conditions.
Conference Paper
Full-text available
A number of works have focused on the mean delay performance of IEEE 802.11. The main contribution of this paper is that it provides a method to obtain the full distribution of the delay, and not only mean values or higher order moments. Hence, any desirable delay percentiles can be found. The distribution is found by inverting the z-transform of the delay numerically. The trapezoidal rule is used with a configurable error bound (- in this paper set to 10<sup>-14</sup>). The z-transform was derived in our previous works from an analytical model that works in the whole range from a lightly loaded, non-saturated channel to a heavily congested, saturated medium. The model describes the priority schemes of the enhanced distributed channel access (EDCA) mechanism of the IEEE 802.11e standard. By setting the number of traffic classes (access categories) to one, and by using an appropriate parameter setting, the results presented are also applicable to the legacy 802.11 distributed coordination function (DCF)
Conference Paper
Full-text available
An analytical model is proposed to describe the priority schemes of the Enhanced Distributed Channel Access (EDCA) mechanism of the IEEE 802.11e standard. EDCA provides class-based differentiated Quality of Service (QoS) to IEEE 802.11 WLANs. The main contribution of this paper opposed to other works is that the model predicts the full delay distribution through its z-transform. Furthermore, the mean delay, throughput and frame dropping probabilities of the different traffic classes are found in the whole range from a lightly loaded, non-saturated channel to a heavily congested, saturated medium. Moreover, the model describes differentiation based on different Arbitration Inter-Frame Space (AIFS) values, in addition to the other adjustable parameters (i.e. window-sizes, retransmission limits, transmission opportunity (TXOP) lengths etc.) also encompassed by previous models. AIFS differentiation is described by a simple equation that enables access points to predict at which traffic loads starvation of a traffic class will occur. The model is calculated numerically and validated against simulation results. We observed a good match between the analytical model and simulations.
Article
We consider the complexity of determining whether a set of periodic, real-time tasks can be scheduled on m ⩾ 1 identical processors with respect to fixed-priority scheduling. It is shown that the problem is NP-hard in all but one special case. The complexity of optimal fixed-priority scheduling algorithm is also discussed.
Article
Summary IEEE 802.11 MAC protocol is the de facto standard for wireless local area networks (LANs), and has also been implemented in many network simulation packages for wireless multi-hop ad hoc networks. However, it is well known that, as the number of active stations increases, the performance of IEEE 802.11 MAC in terms of delay and throughput degrades dramatically, especially when each station's load approaches its saturation state. To explore the inherent problems in this protocol, it is important to characterize the probability distribution of the packet service time at the MAC layer. In this paper, by modeling the exponential backoff process as a Markov chain, we can use the signal transfer function of the generalized state transition diagram to derive an approximate probability distribution of the MAC layer service time. We then present the discrete probability distribution for MAC layer packet service time, which is shown to accurately match the simulation data from network simulations. Based on the probability model for the MAC layer service time, we can analyze a few performance metrics of the wireless LAN and give better explanation to the performance degradation in delay and throughput at various traffic loads. Furthermore, we demonstrate that the exponential distribution is a good approximation model for the MAC layer service time for the queueing analysis, and the presented queueing models can accurately match the simulation data obtained from ns-2 when the arrival process at MAC layer is Poissonian. Copyright # 2004 John Wiley & Sons, Ltd.
Article
The IEEE has standardized the 802.11 protocol for wireless local area networks. The primary medium access control (MAC) technique of 802.11 is called the distributed coordination function (DCF). The DCF is a carrier sense multiple access with collision avoidance (CSMA/CA) scheme with binary slotted exponential backoff. This paper provides a simple, but nevertheless extremely accurate, analytical model to compute the 802.11 DCF throughput, in the assumption of finite number of terminals and ideal channel conditions. The proposed analysis applies to both the packet transmission schemes employed by DCF, namely, the basic access and the RTS/CTS access mechanisms. In addition, it also applies to a combination of the two schemes, in which packets longer than a given threshold are transmitted according to the RTS/CTS mechanism. By means of the proposed model, we provide an extensive throughput performance evaluation of both access mechanisms of the 802.11 protocol
The network simulator -ns-2
  • S Mccanne
  • S Floyd
McCanne, S., Floyd, S., The network simulator -ns-2, http://www.isi.edu/nsnam/ns/.
Draft Supplement to Part 11: Wireless Medium Access Control (MAC) and physical layer (PHY) specifications: Medium Access Control (MAC) Enhancements for Quality of Service (QoS)
IEEE 802.11 WG, " Draft Supplement to Part 11: Wireless Medium Access Control (MAC) and physical layer (PHY) specifications: Medium Access Control (MAC) Enhancements for Quality of Service (QoS) ", IEEE 802.11e/D13.0, Jan. 2005.
  • L Kleinrock
Kleinrock, L., "Queuing Systems,Vol. 1", John Wiley, 1975.