Sei sulla pagina 1di 15

66 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 15, NO.

1, JANUARY 2004

Runtime Optimization of IEEE 802.11


Wireless LANs Performance
Luciano Bononi, Marco Conti, and Enrico Gregori

AbstractIEEE 802.11 is the standard for Wireless Local Area Networks (WLANs) promoted by the Institute of Electrical and
Electronics Engineers. Wireless technologies in the LAN environment are becoming increasingly important and the IEEE 802.11 is the
most mature technology to date. Previous works have pointed out that the standard protocol can be very inefficient and that an
appropriate tuning of its congestion control mechanism (i.e., the backoff algorithm) can drive the IEEE 802.11 protocol close to its
optimal behavior. To perform this tuning, a station must have exact knowledge of the network contention level; unfortunately, in a real
case, a station cannot have exact knowledge of the network contention level (i.e., number of active stations and length of the message
transmitted on the channel), but it, at most, can estimate it. This paper presents and evaluates a distributed mechanism for contention
control in IEEE 802.11 Wireless LANs. Our mechanism, named Asymptotically Optimal Backoff (AOB), dynamically adapts the backoff
window size to the current network contention level and guarantees that an IEEE 802.11 WLAN asymptotically achieves its optimal
channel utilization. The AOB mechanism measures the network contention level by using two simple estimates: the slot utilization and
the average size of transmitted frames. These estimates are simple and can be obtained by exploiting information that is already
available in the standard protocol. AOB can be used to extend the standard 802.11 access mechanism without requiring any additional
hardware. The performance of the IEEE 802.11 protocol, with and without the AOB mechanism, is investigated in the paper through
simulation. Simulation results indicate that our mechanism is very effective, robust, and has traffic differentiation potentialities.

Index TermsWireless LAN (WLAN), IEEE 802.11, multiple access protocol (MAC), protocol capacity, performance analysis.

1 INTRODUCTION

F OR decades, Ethernet has been the predominant network


technology for supporting distributed computing. In
recent years, the proliferation of portable and laptop
occur inside the network. For this reason, in this paper, we
focus on the efficiency of the IEEE 802.11 MAC protocol and
we propose a solution for increasing both protocol
computers has led to the development of the wireless efficiency and protocols ability to react to congestion
LAN (WLAN) technology ([28], [43]). The success of conditions.
WLANs is connected to the development of networking The IEEE 802.11 access scheme incorporates two access
products that can provide wireless network access at a methods: Distributed Coordination Function (DCF) for
competitive price. A major factor in achieving this goal is asynchronous, contention-based, distributed access to the
the availability of appropriate networking standards. IEEE channel and Point Coordination Function (PCF) for centra-
Standard 802.11 defines a Medium Access Control (MAC) lized, contention-free access ([42], [50]). PCF is intended to
and Physical Layer (PHY) specification for a wireless local support real-time services (by using a centralized polling
area network to provide wireless connectivity for fixed, mechanism), but is not generally supported by current cards.
portable, and moving stations within a local area [42]. Hereafter, we will concentrate our study on DCF only.
Two different approaches can be followed in the The DCF is based on a Carrier Sensing Multiple Access
implementation of a WLAN: an infrastructure-based ap- protocol with Collision Avoidance, CSMA/CA, see, for
proach or an ad hoc networking one ([18], [25], [50]). example, ([19], [38], [53]). The CSMA/CA protocol is typically
Infrastructure-based 802.11 WLANs are currently widely adopted in a wireless environment due to its reliability,
used, while the use of IEEE 802.11-based ad hoc networks is flexibility, and robustness. However, the performance of a
an open research issue ([3], [21]). WLAN based on the CSMA/CA protocol may be degraded
Since the wireless links will continue to have signifi- by the presence of hidden terminals [54]. A pair of stations is
cantly lower capacity than wired links, the WLAN conges- referred to as being hidden from each other if a station cannot
tion is more problematic than in wired networks. In hear the transmission from the other station. This event
WLANs, the medium access control (MAC) protocol is the makes the carrier sensing unreliable as a station wrongly
main element that manages congestion situations that may senses that the wireless medium has been idle while the other
(hidden) station is transmitting. To avoid the hidden terminal
. L. Bononi is with the Department of Computer Science, University of
problem, the CSMA/CA protocols are extended with a
Bologna, Mura Anteo Zamboni, 7, 40127 Bologna, Italy. virtual carrier sensing mechanism, named Request To Send
E-mail: bononi@cs.unibo.it. (RTS)/Clear To Send (CTS). This mechanism has been studied
. M. Conti and E. Gregori are with the National Research Council (CNR), extensively; several variations and analyses of the RTS/CTS
IIT Institute, Via G. Moruzzi, 1, 56124 Pisa, Italy.
scheme can be found in the literature, see, for example, ([4],
E-mail: {marco.conti, enrico.gregori}@iit.cnr.it.
[31], [29], [32]). IEEE 802.11 includes an optional RTS/CTS
Manuscript received 14 Mar. 2001; revised 5 Aug. 2002; accepted 29 May
2003.
mechanism. In this work, we do not explicitly consider the
For information on obtaining reprints of this article, please send e-mail to: RTS/CTS mechanism. The results presented hereafter always
tpds@computer.org, and reference IEEECS Log Number 113793. refer to the data transmission using the basic access only. A
1045-9219/04/$17.00 2004 IEEE Published by the IEEE Computer Society
BONONI ET AL.: RUNTIME OPTIMIZATION OF IEEE 802.11 WIRELESS LANS PERFORMANCE 67

methodology for analyzing the optimal tuning of the backoff the system. Unfortunately, in a real case, a station does not
algorithm when a portion of the traffic is transmitted using have an exact knowledge of the network and load
the RTS/CTS mechanism can be found, for example, in ([6], configurations, but, at most, can estimate them. The most
[13]). In addition, recent simulation and experimental results promising direction for improving backoff protocols is to
indicate that phenomena occurring at the physical layer make obtain information of the network status through channel
the effectiveness of the RTS/CTS mechanism arguable since observation ([34], [37], [45]). A great amount of work has
the hidden station phenomenon rarely occurs ([56], [11], [23]). been done on studying the information that can be obtained
The relevance of the IEEE 802.11 standard has generated by observing the systems parameters ([33], [48], [55]). Our
extensive literature on its MAC protocol. A complete work follows the same direction of feedback-based proto-
survey of the IEEE 802.11 literature is out of the scope of cols, but provides original contributions as it is based on an
this paper. Below, we will show the main research areas analytical characterization of the optimal channel utilization
together with some related references. Simulation studies of and uses a very simple feedback signal: slot utilization.
the IEEE 802.11 protocol performance are presented in ([62] Several authors have investigated the enhancement of
[2]). IEEE 802.11 analytical models are proposed and the IEEE 802.11 backoff protocol to increase its performance.
evaluated in ([5], [6], [16], [17], [20], [59], [60]). The use of In [61], given the Binary Exponential Backoff scheme
the PCF access method for supporting real-time applica- adopted by the Standard, heuristic solutions have been
tions is investigated in ([26], [57]). The optimization of the proposed for a better time spread of the transmission
DCF mechanism from the power-saving standpoint is attempts. In ([5], [6], [15], [16], [17]), feedback-based
investigated in ([7], [44]). Recently, considerable research mechanisms have been proposed for adapting the station
activity has concentrated on supporting service differentia- backoff to the network congestion and maximizing channel
tion on the IEEE 802.11 DCF access method (e.g., [49], [58], utilization. Recently, these mechanisms have been general-
[1], [47]), and on the use of IEEE 802.11 for constructing ized to achieve both optimal channel utilization and
multihop ad hoc networks ([63], [64]). weighted fairness in an IEEE 802.11 network with traffic
In this paper, we propose and evaluate a mechanism, streams belonging to different classes [47]. All the feedback-
Asymptotically Optimal Backoff (AOB), for improving the based mechanisms cited above are based on analytic
efficiency of the IEEE 802.11 standard protocol. In the models of an IEEE 802.11 network. These models provide
literature, it is extensively recognized that the backoff the optimal setting of the backoff parameters for achieving
algorithm plays a crucial role in achieving a high the maximum channel utilization. Unfortunately, these
aggregated throughput and a fair allocation of the channel methods require an estimation of the number of users in
to the stations, see [4]. To meet this target, the backoff value the system that could prove expensive, difficult to obtain,
should reflect the actual level of contention for the media. and subject to significant error, especially in high contention
The IEEE 802.11 adopts a binary exponential backoff situations [17]. The AOB mechanism proposed in this paper
protocol ([42], [36], [38]) which does not always adequately goes a step further:
guarantee the best time-spreading of the users access for
the current congestion level. Each station, to transmit a 1. By exploiting the analytical characterization of the
frame, accesses the channel within a random self-defined optimal IEEE 802.11 channel utilization presented in
amount of time whose average length depends on the [16], we show that the optimal value is almost
number of collisions previously experienced by the station independent of the network configuration (number
for that frame. When the network is congested, for each of active stations) and, hence, the maximum channel
transmitted frame, a station must experience several utilization can be obtained without any knowledge
collisions to increase the backoff window size, thus of the number of active stations.
achieving a time spreading of the transmission attempts 2. The AOB mechanism tunes the backoff parameters to
that is adequate for the current congestion level. No the network contention level by using two simple and
experience from the previous transmitted frame is low-cost load estimates (obtained by the information
exploited. On the other hand, our AOB mechanism extends provided by the carrier sensing mechanism): slot
the binary exponential backoff algorithm of IEEE 802.11 to utilization and average size of transmitted frames.
guarantee that the backoff interval always reflects the 3. AOB extends the standard 802.11 access mechanism
current congestion level of the system (in the standard without requiring any additional hardware.
backoff, any new transmission assumes a low congestion Specifically, AOB schedules the frames transmission accord-
level in the system). Our mechanism forces the network ing to the IEEE 802.11 backoff algorithm, but adds an
stations to adopt a backoff window size that maximizes the additional level of control before a transmission is enabled.
channel utilization1 for the current network condition. A transmission already enabled by the standard backoff
There are two main factors that reduce the channel algorithm is postponed by AOB in a probabilistic way. The
utilization: collisions and idle periods (introduced by the probability of postponing a transmission depends on the
spreading of accesses). As these two factors are conflicting network congestion level and is equal to one if the channel
(i.e., reducing one causes an increase of the other), the utilization tends to exceed the optimal value. The postponed
optimal tuning of the backoff algorithm is approximately transmission is rescheduled as in the case of a collision, i.e.,
achieved by equating these two costs ([15], [16], [30]). Since the transmission is delayed by a further backoff interval.
these costs change dynamically (depending on the network In this paper, via simulation, we have extensively
load), the backoff should adapt to congestion variations in evaluated the performance of the IEEE 802.11 access
scheme, with and without the AOB mechanism. The IEEE
1. In the literature, the maximum channel utilization is called protocol
capacity; see [22]. For this reason, hereafter, maximum channel utilization 802.11 performance has been investigated both in steady-
and protocol capacity are used interchangeably. state and under transient conditions. Furthermore, we also
68 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 15, NO. 1, JANUARY 2004

investigate the mechanism robustness to errors and its the station doubles CW_Size until it reaches the maximum
potential for traffic differentiation. value fixed by the standard, i.e., CW_Size_MAX, as follows:
The work is organized as follows: In Section 2, we
present a brief explanation of the IEEE 802.11 standard, and CW SizeN A
 
we sketch the critical aspects connected to the contention min CS Size MAX; CW Size min  2N A1
:
level of the system. In Section 3, we present a simple
mechanism to extend the IEEE 802.11 standard and, in Positive acknowledgments are employed to ascertain a
Section 4, we discuss its tuning. In Sections 5, 6, and 7, the successful transmission. This is accomplished by the
AOB performance is deeply investigated through simula- receiver (immediately following the reception of the data
tion. Section 8 discusses an AOB potential for traffic frame), which initiates the transmission of an acknowl-
differentiation. Conclusions and future research are out- edgment frame (ACK) after a time interval Short InterFrame
lined in Section 9. Space (SIFS), which is less than DIFS. If the transmission
generates a collision,2 the CW_Size parameter is doubled for
the new scheduling of the retransmission attempt, thus
2 IEEE 802.11 further reducing contention.
The increase of the CW_Size parameter value after a
In this section, we only sketch the portions of the IEEE 802.11
collision is the reaction that the IEEE 802.11 standard DCF
standard that are relevant for this paper. A detailed
provides to make the access mechanism adaptive to channel
description can be found in ([42], [13], [27]). conditions. In [8], by analyzing the behavior of the IEEE
The IEEE 802.11 standard defines a MAC layer and a 802.11 DCF mechanism, it was shown that the channel
Physical Layer for WLANs. The basic access method in the utilization is negatively affected by the increase of the
IEEE 802.11 MAC protocol is the Distributed Coordination contention level. This occurs because 1) the increase in the
Function (DCF), which is a Carrier Sense Multiple Access with CW_Size is obtained at the cost of a collision, and 2) after a
Collision Avoidance (CSMA/CA) MAC protocol. Besides the successful transmission, no memory of the actual contention
DCF, the IEEE 802.11 also incorporates an alternative access level is maintained.
method known as the Point Coordination Function (PCF)an
access method that is similar to a polling system and uses a
point coordinator to determine which station has the right 3 LOW-COST DYNAMIC TUNING OF THE
to transmit. BACKOFF WINDOW SIZE
The DCF requires that every station, before transmitting, The drawbacks of the IEEE 802.11 backoff algorithm,
perform a carrier sensing activity to determine the state of the explained in the previous section, indicate a direction for
channel (idle or busy). If the medium is found to be idle for an improving the performance of a random access scheme by
interval exceeding the Distributed InterFrame Space (DIFS), the exploiting the information on the current network conges-
station continues with its transmission. If the medium is busy, tion level that is already available at the MAC level.
the transmission is deferred until the ongoing transmission Specifically, the utilization rate of the slots (Slot Utilization)
concludes. When the channel becomes idle, a Collision observed on the channel by each station is used as a simple
Avoidance mechanism is adopted. The IEEE 802.11 Collision and effective estimate of the channel congestion level. The
Avoidance mechanism is a Binary Exponential Backoff scheme estimated Slot Utilization must be frequently updated. For
([42], [36], [38], [39]). According to this mechanism, a station this reason, in [9], it was proposed that an estimate be
selects a random interval, called a backoff interval, that is used updated by each station in every Backoff interval, i.e., the
to initialize a backoff counter. When the channel is idle, the defer phase that precedes a transmission attempt.
length of the time is measured in constant units (Slot_Time) A simple and intuitive definition of the slot utilization
indicated as slots in the following. The backoff interval is an S U is then given by:
integer number of slots and its value is uniformly chosen in
Num Busy Slots
the interval (0, CW_Size-1), where CW_Size, in each station is a S U ;
local parameter defining the current station Contention Num Available Slots
Window size. Specifically, the backoff value is defined by where:
the following expression [42]:
. Num_Busy_Slots, hereafter referred to as busy slots, is
Backoff Counter INT Rnd  CW Size; the number of slots in the backoff interval in which
one or more stations start a transmission attempt. A
where Rnd() is a function that returns pseudorandom transmission attempt can be either a successful
numbers uniformly distributed in [0, 1). transmission or a collision; and
The backoff counter is decreased as long as the channel is . Num_Available_Slots is the total number of slots
sensed to be idle, stopped when a transmission is detected on available for transmission in the backoff interval, i.e.,
the channel, and reactivated when the channel is sensed to be the sum of idle and busy slots.
idle again for more than a DIFS. A station transmits when its In the IEEE 802.11 standard mechanism, every station
backoff counter reaches zero. The Binary Exponential Backoff performs a Carrier Sensing activity and, thus, the proposed
is characterized by the expression giving the dependency of S_U estimate is simple to obtain. The information required
the CW_Size parameter by the number of unsuccessful to estimate S_U is already available to an IEEE 802.11
transmission attempts (N_A) already performed for a given station and no additional hardware is required.
frame. In [42], it is defined that the first transmission attempt The current S_U estimate can be used by each station
for a given frame is performed adopting CW_Size equal to the (before trying a blind transmission) to evaluate the
minimum value CW_Size_min (assuming low contention).
After each unsuccessful (re)transmission of the same frame, 2. A collision is assumed whenever the ACK from the receiver is missing.
BONONI ET AL.: RUNTIME OPTIMIZATION OF IEEE 802.11 WIRELESS LANS PERFORMANCE 69

Fig. 2. Generalized probability of transmission.

Fig. 1. DCC probability of transmission.


overhead introduced in low-load conditions. The differ-
ences in the users behavior as a function of their levels of
opportunity to either perform or defer the scheduled
privilege (related to the value of the N_A parameter) appear
transmission attempt. In other words, if a station knows
when the slot utilization grows. For example, assuming a
that the probability of a successful transmission is low, it
slot utilization close to 1, say 0.8, we observe that the
should defer its transmission attempt. This can be achieved
stations with the highest N_A value obtain a Probability of
in an IEEE 802.11 network by exploiting the DCC mechan-
Transmission close to 1, while stations at the first transmis-
ism proposed in [9]. According to DCC, each IEEE 802.11
sion attempt transmit with a probability equal to 0.2. It is
station performs an additional control (beyond carrier
worth noting a property of the DCC mechanism: The slot
sensing and backoff algorithm) before any transmission
utilization of the channel never reaches the value 1.
attempt. This control is based on a new parameter, named
Assuming S_U is close to or equal to 1, the DCC mechanism
Probability of Transmission P_T(. . . ), whose value depends
reduces the Probabilities of Transmission for all stations
on the current contention level of the channel, i.e., S_U. The
close to zero, thus reducing the network contention level.
heuristic formula proposed in [9] for P_T(. . . ) is:
This effect is due to the P_T definition and, in particular, to
P T S U; N A 1  S U N A ; the explicit presence of the upper bound 1 for the slot
utilization estimate. The DCC choice to use 1 as the
where, by definition, S U assumes values in the interval [0, 1], asymptotic limit for the S_U is heuristic and does not
and N_A is the number of attempts already performed by the guarantee the maximum channel utilization. To achieve the
station for the transmission of the current frame.3 maximum channel utilization, we need to know the optimal
The N_A parameter is used to partition the set of active congestion level, i.e., the optimal upper bound for the S_U
stations in such a way that each stations subset is value (opt_S_U). It is worth noting that, if opt_S_U is known,
associated with a different level of privilege to access the the P_T mechanism can be easily tuned to guarantee that
channel. Stations that have performed several unsuccessful maximum channel utilization is achieved. Intuitively, if the
attempts have the highest transmission privilege [9]. slot-utilization boundary value (i.e., the value one for DCC)
The P_T parameter allows filtering the transmission is replaced by the opt_S_U value, we reduce all the
attempts. When, according to the standard protocol, a probabilities of transmission to zero in correspondence
station is authorized to transmit (backoff counter is equal to with slot utilization values greater than or equal to the
zero and channel is idle) in the protocol extended with the opt_S_U. This can be achieved by generalizing the definition
Probability of Transmission, a station will perform a real for the Probability of Transmission:
transmission with probability P_T; otherwise (i.e., with
 N A
probability 1-P_T) the transmission is rescheduled as a S U
collision would have occurred, i.e., a new backoff interval is P T opt S U; S U; N A 1  min 1; : 1
opt S U
sampled.
To better understand the relationship between the P_T Specifically, by applying this definition of the transmission
definition and the network congestion level, we can observe probability, we obtain the P_T curves shown in Fig. 2. These
Fig. 1. curves were obtained by applying the generalized P_T
In Fig. 1, we show the P_T curves (for users with definition with opt_S_U = 0.80. As expected, the curves
different N_A) with respect to the estimated S_U values. indicate the effectiveness of the generalized P_T definition
Assuming S_U is close to zero, we can observe that each to limit S_U to the opt_S_U value. The generalized
station, independently of its number of performed attempts, Probability of Transmission provides an effective tool for
obtains a Probability of Transmission (P_T) close to 1. This controlling the congestion inside an IEEE 802.11 WLAN in
means that the proposed mechanism has no effect on the an optimal way, provided that the opt_S_U value is known.
system and each user performs its accesses as in the In the following, we will present a simple mechanism to set
standard access scheme, without any additional contention the opt_S_U value. Our mechanism is named Asymptoti-
control. This point is significant as it implies the absence of cally Optimal Backoff as it guarantees that the optimal
utilization is asymptotically achieved, i.e., for large M
3. At the first transmission attempt, N A is equal to 1. values.
70 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 15, NO. 1, JANUARY 2004

TABLE 1
Optimal p Values

4 ASYMPTOTICALLY OPTIMAL BACKOFF (AOB) By noting that f is a function of the protocol and traffic
MECHANISM parameters, it results that, for a fixed network and traffic
configuration (i.e., constant M and q), the maximum
The aim of the AOB mechanism is to dynamically tune the
backoff window size to achieve the theoretical capacity limit channel utilization corresponds to the p value, pmin , that
of the IEEE 802.11 protocol. The AOB mechanism is simpler, minimizes f .
more robust, and has lower costs and overhead introduced Due to the correspondence (from the capacity stand-
than the contention mechanisms proposed in [16], [17]. point) between the standard protocol and the p-persistent
Specifically, the AOB mechanism requires no estimate of one, the IEEE 802.11 maximum channel utilization is closely
the number M of active stations. An accurate M estimate approximated by adopting, in the standard protocol, a
may be very difficult to obtain because M may be highly contention window whose average size is identified by the
variable in WLANs. optimal p value, i.e., ECW  2=pmin  1.
In this section, we exploit the results obtained from the The previous analysis shows that the IEEE 802.11
analysis of the theoretical capacity limits of the IEEE 802.11 theoretical capacity is identified by pmin . Hereafter, we will
protocol to develop the AOB mechanism. For this reason, show the relationship between pmin and the opt_S_U value
below, we briefly summarize the results derived in [16]. In of the AOB mechanism. To this end, we will further
[16], to study the protocol capacity, a p-persistent IEEE
elaborate the capacity analysis presented in [16].
802.11 protocol was defined. This protocol differs from the
standard protocol only in the selection of the backoff 4.1 Theoretical Capacity Limits: An Invariant Figure
interval. Instead of the binary exponential backoff used in Results presented in this section (see Table 1) point out that
the standard, the backoff interval of the p-persistent IEEE
the increase in the number of active stations has an almost
802.11 protocol is sampled from a geometric distribution
negligible impact on the theoretical capacity bounds, while
with parameter p. Specifically, at the beginning of an empty
slot, a station transmits (in that slot) with a probability p, the average payload size (indicated as MFS in the
while it defers the transmission with a probability 1-p and following) greatly affects the optimal utilization level.
then repeats the procedure at the next empty slot.4 Hence, Results presented in Table 1 are numerically derived
in this protocol, the average backoff time is completely by computing the optimal p value, i.e., pmin , according to
identified by the p value. By setting p 1=EB 1 (where formulas presented in [16]. Specifically, in this table, we
EB is the average backoff time of the standard protocol5), report, for various network and traffic configurations
the p-persistent IEEE 802.11 model provides an accurate (defined by the (M, q) couples), the pmin values derived
approximation (at least from a capacity analysis standpoint) analytically as explained before. In this table, we also
of the IEEE 802.11 protocol behavior [16]. report for each configuration the value M  pmin . It is
The IEEE 802.11 p-persistent model is a useful and worth noting that, while pmin is highly affected by the M
simple tool for analytically estimating the protocol capacity value, given a q-value, the product M  pmin is almost
in a network with a finite number, M, of stations operating constant. Specifically, results indicate that, for a given
in asymptotic conditions. Furthermore, to simplify the
message length, the product M  pmin has an asymptotic
discussion, hereafter we assume that stations transmit
value with respect to M. Furthermore, when M  4, the
messages whose lengths are a geometrically distributed
(with parameter q) number of slots. By denoting with tslot M  pmin values are very close to the asymptotic value.
the length of a slot, the average message length, m  , is: This is the reason for calling M  pmin an invariant figure,
m tslot =1  q. i.e., for a given MFS, it is almost constant.
By exploiting the p-persistent model, in [16], a closed Hereafter, we will analytically investigate the rationale
analytical formula for the channel utilization, , is derived behind the M  pmin quasi-constant value (for a given MFS).
To perform this analysis, instead of the exact pmin derivation
m
 =fM; p; q: 2 presented in [16] (it is too complex for our purpose), we
approximate pmin with the p value that satisfies the
4. On the other hand, in the standard protocol, a station transmits in the following relationship:
empty slot selected uniformly inside the current contention window.
5. Note that EB ECW   1=2, where ECW  is the average EColl EIdle p  tslot ; 3
contention window.
BONONI ET AL.: RUNTIME OPTIMIZATION OF IEEE 802.11 WIRELESS LANS PERFORMANCE 71

TABLE 2
Approximate Optimal p Values

h i
where EColl is the average time the channel is busy due to lq  1  1  pM Mp  1  pM1 1  pM : 6
a collision given that a transmission attempt occurs6 and
EIdle p is the average number of consecutive idle slots By applying the Taylor formula, we have
observed on the channel. h i M  M  1  p2
Equation (3) expresses the following condition: pmin is the 1  1  pM Mp  1  pM1  ;
2 7
p value that guarantees that the average time the channel is
idle equals the average time the channel is busy due to the and 1  pM  1  Mp:
collisions. By substituting (7) in (6), and after simple algebraic
Equation (3) was proposed in [30] for approximating the manipulations, we obtain that the optimal p value is the
optimal operating point of CSMA protocols. In [17], this solution of the following equation:
approximation was applied to IEEE 802.11. Recently, in [24],
it was analytically shown that (3) provides a very accurate lq  M  M  1  p2 2  Mp  2 0: 8
approximation of pmin .
For large M values, M  M  1  M 2 and (8) can be
By denoting with pcollision the probability that a collision rewritten as
occurs given a transmission attempt, (3) can be written as:
lq  Mp2 2  Mp  2 0: 9
EColljcollision  pcollision EIdle p  tslot ; 4
Finally, by solving (9), we find that the maximum channel
where pcollision (i.e., the probability that two or more stations utilization is achieved if the following condition holds:
start transmitting at the same instant of time given that a
p
transmission occurs) is given by 1 1 2  lq
Mpmin q : 10
lq
1  1  pM  Mp  1  pM1
pcollision : Equation (10) explains the behavior that we have observed
1  1  pM
by analyzing the numerical results of Table 1. Specifically,
Closed expressions for EColljcollision and E Idle p are these results indicate that, for a given message length, the
defined [16]. However, the E Colljcollision expression is product M  pmin has an asymptotic value with respect to M.
quite involved and, hence, we introduce the following Equation (10) has been derived under some simplifying
approximation: assumptions. Hereafter, we study how approximate M 
pmin q values obtained from (10) differ from the exact values
  
E Colljcollision  E max Lx ; Ly ; 5 reported in Table 1. To this end, we need to derive lq:

where Lx and Ly denote the length of two messages. To


1 X
X 1
lq maxfi1 ; i2 g  qi1 1 1  q  qi2 1 1  q:
explain the above approximation, let us remember that, by i1 1 i2 1
denoting with Ntr the number of stations transmitting in the
same slot, E Colljcollision E maxfL1 ; L2 ; . . . ; LNtr gjNtr > 1. After some algebraic manipulations, lq can be written as:
However, simulation results presented in [16] have shown
1 2q
that if the stations use p values close to the optimal one, it is lq : 11
1  q2
highly probable that a collision is caused by only two
stations. It is also worth noting that (5) is exact if we have Finally, by substituting (11) into (10), we obtain the results
constant-length messages. reported in Table 2.
According to the approximation defined by (5), the Two main observations can be derived by comparing
average collision  is afunction of the q-value, hence
 length results in Tables 1 and 2.
we can write E max Lx ; Ly lq  tslot , where lq is the
average length (in slots) of a collision generated by two 1. The accuracy of the asymptotic estimation of M 
overlapping transmissions. Hence, if p 6 0, (4) can be pmin q provided by (10) increases with the increase
written as: of the message length. This can be expected since the
main approximation in the estimate provided by (10)
6. Coll is equal to zero if the transmission attempt is successful; is related to the average collision length. As the
otherwise, it is equal to the collision length. message length increases, the collision cost becomes
72 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 15, NO. 1, JANUARY 2004

increasingly critical and, to balance it with the idle- 4.2 The AOB Mechanism
period length, the optimal p-value decreases and Results presented in Table 1 indicate that, for each q-value,
this, in turn, reduces the probability of having more the M  pmin product results quasi-constant for M greater
than two colliding stations. than 2 and, hence, it is possible to define a single quasi-
2. Equation (10) is derived to provide an asymptotic optimal value for the M  pmin . To sum up, for each IEEE
(with respect to M) estimate of the optimal p-value. 802.11 physical layer parameters setting [42], it is possible to
This means that pmin is derived by assuming a high-
define a function of q, named Asymptotic Contention Limit,
contention level. On the other hand, when there are
ACL(q), such that ACLq M  pmin q. This function
few active stations, (10) may provide a very con-
servative estimate of pmin . For example, with two represents the optimal slot-utilization level the system
active stations and messages with average length should obtain to guarantee its optimal behavior from the
equal to 100 slots, the pmin obtained from (10) is channel utilization viewpoint. The ACL(q) function can be
27 percent lower than the exact optimal p-value computed offline using the analytical model presented in
reported in Table 1. These errors are expected because, [16]. It is worth noting that ACL(q) identifies the optimal
for a low M value, the approximation M  M  1  contention level without requiring any knowledge of the
M 2 is very rough. The underestimation of the optimal number of active stations in the system. This is important
p-value that may occur by adopting the asymptotic because it is the basis for implementing an optimal
estimate of M  pmin q can introduce an underutiliza- window-tuning mechanism that does not require estimat-
tion of the system when only a few stations are active. ing the number of active stations in the system. The basic
This does not seem to be a critical point because, when idea, as anticipated in Section 3, is 1) to estimate S_U and 2)
there are few active stations, the network bandwidth to disable the stations transmissions when S U > ACLq.
is not a critical resource. To this end, in the AOB, we use the generalized P_T
We now investigate the relationship between M  pmin q mechanism (see (1)) and we set opt_S_U(q) equal to ACL(q).
and the optimal S U. As said before, M  pmin q is derived Hence, in the AOB, the P_T formula is:
assuming M active stations scheduling their transmission  N A
attempts in a slot selected according to a geometric S U
P T ACLq; S U; N A 1  min 1; : 12
distribution with parameter p. Furthermore, for each ACLq
configuration, an optimal value of parameter p, pmin , exists Fixed a given ACL(q) value, the P_T values fluctuate among
that guarantees a balance on the channel idle periods and 0 and 1. We named Asymptotically Optimal Backoff (AOB) a
collisions. Furthermore, in Section 3, we introduce the slot mechanism that, by using the P_T defined by (12),
utilization S U parameter to estimate the network conten- guarantees an S U value below the given ACL(q) value.
tion level. Let us now investigate the relationship between The optimal slot utilization value (associated to ACL) can be
S U and M  pmin . only asymptotically achieved; for this reason, the mechan-
To this end, let us consider a p-persistent IEEE 802.11 ism is named Asymptotically Optimal Backoff.
protocol in which each station uses the optimal value pmin . To be effective, the AOB mechanism requires the knowl-
We denote with Ntr the number of stations that make a edge of the q value to identify the ACL(q). The ACL(q) value
transmission attempt in a slot. Hence, P fNtr ig is the together with the current S_U estimate determines the
probability that exactly i stations transmit in a slot, and transmission probability. The q value depends on the
P fNtr 0g is the probability that a slot remains empty. Let characteristics of the traffic that is transmitted in the network.
Two approaches exist to compute its value: static versus
us now observe that M  pmin is the average number of
dynamic approach. In the static approach, the q value is
stations that transmit in a slot (assuming the optimal computed by taking into consideration the characteristics of
stations behavior): the Internet traffic [52]: On a byte count basis, 90 percent of the
X
M X
M traffic is made up of maximum size packets (i.e., 512 bytes of
M  pmin i  P fNtr ig  P fNtr ig user data), while the remaining 10 percent consists of very
i1 i1 short packets (i.e., 10 bytes of user data). This approach is very
1  P fNtr 0g S U; simple, but can introduce severe approximations on the real
traffic that is transmitted in the network. Therefore, in this
hence, M  pmin is an upper bound on the probability to paper, we prefer to adopt a dynamic approach: the q value is
observe a busy slot, i.e., M  pmin  S U. estimated by each station by observing the status of the
Furthermore, by noting that channel through its carrier sensing mechanism. A dynamic
approach, based on the channel status monitoring, is also
S U 1  P fNtr 0g 1  1  pM used to obtain the current S_U estimate. The q and S_U
XM   estimation algorithms used hereafter to derive numerical
M M  M  1p2
 pk  Mp  results are reported in [10]. In that report, we also discuss the
k1
k 2 ACL(q) computation.
It is worth noting that, from a logical standpoint, the
and by observing the optimal M  pmin values reported in
AOB can be seen as a simple extension of the IEEE 802.11
Table 2, we can conclude that M  pmin is a tight upper mechanism (see [10]): each IEEE 802.11 transmission is
bound of S U. The accuracy of this approximation increases deferred in a probabilistic way. However, this does not
with the increase of the network congestion, i.e., the number imply that AOB can be implemented on top of the standard
of active stations and/or message length. protocol; indeed, the mechanism is embedded within the
BONONI ET AL.: RUNTIME OPTIMIZATION OF IEEE 802.11 WIRELESS LANS PERFORMANCE 73

TABLE 3
Systems Physical Parameters

7
We used a maximum number of 200 active stations because the number of stations expected in the future could arrive at hundreds [19]. For
example, a WLAN in a conference room in which the participants use mobile devices with a wireless interface.

standard protocol since it requires information that is m 20:401 slots. These results confirm the results we
available inside the IEEE 802.11 network interface (backoff obtained with the single-message-length traffic: 1) The
counter value, carrier sensing information, etc.). Hence, its standard protocol becomes increasingly inefficient by in-
implementation is a simple extension of the IEEE 802.11 creasing the network congestion (number of active stations)
protocol implemented in existing products. and 2) the AOB mechanism always maintains the IEEE 802.11
protocol close to its optimal behavior.
5 EFFECTIVENESS OF THE MECHANISM:
5.1 Performance Analysis with On-Off Stations
STEADY-STATE ANALYSIS
The previous scenario analyzes the behavior of the AOB
In the remaining part of the paper, by means of the discrete mechanism in an extreme situation in which all stations are
event simulation, we extensively investigate the perfor- always active. However, one may argue that, in a more
mance of the IEEE 802.11 protocol enhanced with the realistic situation, each station alternates between active
proposed AOB mechanism. Specifically, in this section, we and idle periods and, hence,
analyze the AOB behavior when the network operates
under steady-state conditions. The protocol analysis in 1. the number of active stations changes in a contin-
transient conditions and the protocol robustness are studied uous way;
in the subsequent sections. The physical characteristics and 2. when idle, a station may not listen (e.g., for power-
parameter values of the investigated system are reported in saving reason) and, therefore, when it reactivates, it
Table 3. will not have a valid S U estimate.
In [8], the capacity of the AOB mechanism was analyzed by To analyze the AOB behavior in a more realistic scenario, we
assuming that the length of messages is sampled from a modeled an IEEE 802.11 network in which each station
geometric distribution with parameter q. However, studies of
alternates between idle and busy periods. Specifically, results
TCP traffic [52] show that, on a byte count basis, 90 percent of
presented in this section have been obtained by assuming that
the traffic is made up of maximum size packets, while the
idle and busy periods have the same average length. A station
remaining 10 percent consists of very short packets. Hence, in
consecutively transmits K frames (where K is geometrically
a more realistic environment, the message length distribution
should be bimodal. For this reason, we evaluate the behavior distributed) and then enters an idle period during which it
of our protocol when the message length has a bimodal loses its memory of the previous estimations of the Slot
distribution. Specifically, we assume that long messages Utilization and average message length.8 Results obtained
have an average length of 100 slots, while short messages with this on-off model are presented in Fig. 4. The experiments
have an average length of 2.5 slots, and a slot corresponds to were performed by assuming on-off periods with an average
100 bits. The length of both classes of messages is geome- length, EK, equal to 10 or 20 frames. As no significant
trically distributed and the percentage of long messages is difference was observed for the two sets of experiments, in the
denoted by . Hereafter, we refer to this type of bimodal figure, we report only one curve tagged On/Off. In the figure,
traffic as mixed traffic. we have two sets of curves corresponding to short messages
Fig. 3 reports the protocol capacity of the IEEE 802.11 (average 2.5 slots) and long messages (average 100 slots),
protocol with and without the AOB mechanism, when the respectively. For each set of curves we plot:
message length has a bimodal distribution. To compare these
1. the theoretical optimal value (Optimum utilization),
results with theoretical bounds, the average length of a
2. the channel utilization with AOB and always on
message, m, must be computed: m = 100   +
stations,
2:5  1  . Specifically, the analytical bounds are computed
by assuming a single-class-message system in which the 8. The length of the idle period is sampled from a geometric distribution
message length is geometrically distributed with average whose average is equal to the length o the previous busy period.
74 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 15, NO. 1, JANUARY 2004

Fig. 3. Channel utilization of the IEEE 802.11 protocol with and without Fig. 4. Channel utilization with on-off sources.
the AOB mechanism versus optimal valuemixed traffic conditions.
6.1 Change in the Number of Active Stations
3. the channel utilization with AOB and on-off stations In this section, we analyze a network operating in steady-
(On/Off), and state conditions with 10 (100) active stations. After 256 block
4. channel utilization with the standard protocol and units9 (highlighted by the vertical bar burst arrival time),
On-Off sources (Standard 802.11 On/Off). an additional 10 (100) stations become active. All stations
Numerical results reported in the figure indicate that with transmit mixed traffic. Figs. 5 and 6 show the effectiveness
20 (or more) stations in the network, the channel utilization of the AOB mechanism. In the AOB case, the sharp increase
with AOB is quasi-optimal. On the other hand, with few in the number of active stations produces a negligible effect,
active stations, we observe a small degradation in AOB both in the slot utilization and in the channel utilization. On
efficiency. This is caused by two main reasons: the contrary, the standard is negatively affected by this
change: The slot utilization increases sharply (i.e., the
1. The AOB mechanism is tuned to asymptotically network congestion level increases) and, as a consequence,
converge (i.e., M large) to the optimal value. the channel utilization decreases.
Numerical results presented in the previous sections
have indicated that, with few (continuously) active 6.2 Change in the Number of Active Stations
stations, a deviation from the optimal is expected. and in the Network Traffic
With on-off sources, on average, only half of the In this section, we investigate the AOB mechanisms ability
stations are active. to react to sharp changes, both in the M value and in the
2. When a station reactivates after an off period, it may traffic characteristics. Specifically, we start from a system
have no estimate of the current slot utilization. In operating in steady-state conditions with M 100 (or
AOB, we have adopted a conservative assumption: M 10). The stations are homogeneous from the traffic
The station, when it reactivates, assumes a slot standpoint: All stations transmit long (short) messages.
utilization equal to the ACL(q) value, where q
Message length is sampled from a geometric distribution
corresponds to the length of the frame it has to
with an average of 2.5 and 100 slots for short and long
transmit. This assumption helps to preserve the
systems stability under highly congested condi- messages, respectively.
tions, but causes some possible bandwidth wastage In the following, we use this notation: STND and AOB
with few active intermittent stations. denote the standard protocol without and with the AOB
To summarize, the above results indicate that AOB is also mechanism, respectively. In addition, N Long-tx (Short-tx)
effective with on-off sources. Slight deviations from the indicates that there are N stations that transmit only long
(short) messages. For example, the legend AOB: 100 Long-
optimal channel utilization are possible when the network
tx burst over 100 Short-tx means that: 1) The AOB
is not congested (i.e., few active stations). The channel
mechanism is used, 2) the system is initially in a steady-
utilization provides information about the efficiency of a state condition, with 100 active stations all transmitting
MAC protocol in sharing the channel among several short messages, and 3) after 256 block units (highlighted by
stations. However, from the user standpoint, the delay the vertical bar burst arrival time), 100 additional stations
performance figures are relevant too. For space reason, are put in activity and all the newly active stations are
here, we omit this study. A delay analysis can be found transmitting long messages. Note that, if we omit the type
in [8], [11]. of messages transmitted by the active stations, this means
that results do not depend on message length.
Fig. 7 shows how a change in the number of active
6 AOB BEHAVIOR IN TRANSIENT SITUATIONS stations affects the slot utilization. In the period before the
In this section, we analyze the protocol promptness to burst arrival time, the protocol with the AOB mechanism is
retune when the state of the network sharply changes.
9. A block unit corresponds to 512 slots. The block unit is introduced to
Specifically, we investigate the AOB behavior when there is smooth the trace. The smoothing was introduced to reduce the fluctuations,
an upsurge in the number of active stations. thus increasing the figures readability.
BONONI ET AL.: RUNTIME OPTIMIZATION OF IEEE 802.11 WIRELESS LANS PERFORMANCE 75

Fig. 5. A burst of 10 new stations is activated when the network is operating in steady-state conditions with 10 active stations.

Fig. 6. A burst of 100 new stations is activated when the network is operating in steady-state conditions with 100 active stations.

operating with a slot utilization value that depends on already active long stations; in this way, the short stations
average message length and, in both cases, it is very close to have a priority in accessing the channel. The use of a high
the boundary theoretical value (see Table 1). Without AOB, ACL value by short stations also explains why, in Fig. 7, the
the network slot utilization is much higher and this means a S_U after the short-station arrival starts to increase. During
highly congested network. Furthermore, without AOB, the initial transient phase (up to 1,200 block units, in Fig. 8),
immediately after the burst arrival, the slot utilization only short messages are transmitted and the channel
increases further. When AOB is used, the behavior is very utilization is close to the optimal value for this class of
different. Specifically, the slot utilization remains much
traffic. After this initial phase, long messages start to be
lower with respect to the standard protocol and, after a
transmitted again and the channel utilization increases
transient period in both analyzed scenarios, the same
steady-state condition is reached; the new steady-state is
close to the ideal slot utilization value for a system with
mixed traffic. Hence, the AOB curves show the effectiveness
of this mechanism in controlling the slot utilization, thus
limiting network congestion. The apparently strange
behavior, during the transient period, of the curve tagged
AOB: 100 Short-tx burst over 100 Long-tx can be
explained by looking at Fig. 8. Specifically, the curves in
Fig. 8 indicate that the arrival of the burst sharply reduces
the channel utilization. The reduced channel utilization is
below that of the standard protocol. During this phase,
when AOB is used, only short messages are transmitted.
This is due to the q estimation algorithm in the newly active
stations (see [10]). These stations do not have enough
estimates of the network status and, hence, they assume
that the network traffic is homogeneous with their own, i.e.,
short traffic. As a consequence, the newly active short Fig. 7. S_U evolution when the network traffic sharply changes
stations adopt an ACL value that is higher than that of the (M changes from 100 to 200).
76 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 15, NO. 1, JANUARY 2004

Fig. 10. S U evolution when the network traffic sharply changes


Fig. 8. Sharp traffic change: 100 short stations over 100 long stations.
(M changes from 10 to 20).

toward the optimal value for the mixed traffic conditions.


7 PROTOCOL ROBUSTNESS
The short-station priority effect disappears and a new
steady-state condition is achieved when both classes of In this section, we discuss the robustness of the protocol by
investigating the impact on the protocol performance of
stations get the same view of the channel status (slot
different types of errors. Specifically, in Section 7.1, we
utilization, average message length, etc.). analyze the impact of the bit error rate of the channel, while,
The system behavior in the reverse case (in which a burst
in Section 7.2, we investigate the impact of the errors that
of long stations arrives when the system is in a steady-state may occur in the q and S U estimates.
with short stations only) is easier to explain; see Fig. 9. In
this case, long messages do not get priority with respect to 7.1 Sensitiveness to Errors on the Wireless Medium
short messages. Indeed, long stations slowly start to The protocol analysis presented so far assumes an ideal
transmit (and, hence, the channel utilization increases) wireless channel: no channel errors. This assumption is
unrealistic in wireless communications in which (due to
when their view of the channel status becomes appropriate.
fading, interference, etc.) the probability that a bit is
To summarize, the AOB mechanism provides a tempor-
corrupted is randomly high and produces correlated losses
ary priority to short-messages bursts. This seems to be a [18]. In this section, we evaluate the impact of channel
good feature since short messages are typically generated errors on our protocol. A Gilbert model (at the bit level)
by interactive (delay sensitive) applications. These applica- provides a simple and effective characterization of the
tions generate bursty traffic that rarely saturates the wireless medium [35]. This model has the advantage of
channel. analytical tractability and the ability to capture the bursti-
Previous results that were obtained by assuming 100 active ness in the bit error rate. Specifically, the Gilbert model
stations are also confirmed by results presented in Fig. 10, characterizes the channel status by a two-state (Good and
Bad) continuous time Markov chain. When the Markov
which were obtained by assuming a smaller set of active
chain is in the Good state, the Bit Error Rate (BER) is zero,
stations. Specifically, in Fig. 10, we plot the S_U figures when while the BER significantly increases in the Bad periods. In
the number of active stations changes from 10 to 20. Bad periods, if not explicitly specified, it is assumed
BER 10E  4. We denote with TB and TG the time spent
by the Markov chain in the Bad and Good state, respectively.
TB and TG are exponentially distributed random variables
with average tB and tG . All the results presented in this
section are obtained by assuming a constant value for tB =tG
equal to 0.1. In Fig. 11, we investigate the impact of the
errors burstiness on the channel utilization. The figure
clearly indicates a low sensitivity to channel errors.
Specifically, the figure shows that the standard protocol
and the AOB protocol have the same percentage degrada-
tion in channel utilization that is about 10 percent. This
figure can be easily explained because, in the Bad periods,
there is a high probability of packets being lost. This
explanation is also confirmed by results presented in Fig. 12
in which we compare the channel utilization achieved with
several BER values in the Bad periods (tB is assumed equal
to 5,000 slots). As indicated by the figure, BER values higher
Fig. 9. Sharp traffic change: 100 long stations over 100 short stations. than 10E-4 do not produce any further negative impact
BONONI ET AL.: RUNTIME OPTIMIZATION OF IEEE 802.11 WIRELESS LANS PERFORMANCE 77

Fig. 12. Impact of BER values.

Fig. 11. Impact of errors burstiness.


noting that, due to the way AOB is defined: 1) for large M,
(with respect to BER=10E-4) because, for BER values greater errors always have a negative impact (AOB is tuned to
than or equal to 10E-4, all packets are lost during the Bad optimize asymptotic performance) and 2) for few active
periods. On the other hand, the impact of errors on the stations, underestimation errors generate a channel utiliza-
protocol capacity becomes negligible when the BER tion that is higher than that obtained in the no-error case. The
decreases of one order of magnitude down to 10E-5. latter behavior was expected because the ACL value is too
conservative (i.e., it excessively limits the transmission rate)
7.2 Estimation Errors when there are few active stations (see Section 4.1). The
The AOB mechanism to tune the backoff algorithm requires a underestimation of parameters produces the opposite effect,
knowledge of the network status that is identified by two thus resulting in an increased channel utilization.
parameters: the average message length (or, equivalently, the
q-parameter) and the slot utilization. As the values of these
parameters are obtained through estimations, some errors
8 AOB POTENTIAL ADDITIONAL FEATURES
may occur. Hereafter, we discuss the sensitivity of AOB to The AOB mechanism can be extended to provide enhanced
these possible errors. Therefore, we compare the channel services to its users. These include power-saving features
utilization in the ideal case (no estimation errors) with the and supporting of differentiated services. AOB power-
channel utilization when an error is added/subtracted to the saving features are investigated in [7]. Hereafter, we briefly
correct q and S U estimate. Specifically, in the following discuss the ability of AOB to support traffic differentiation
figures, the curve tagged with +x% (-x%) error is obtained by by introducing priorities in the access to the channel.
multiplying by 1+x/100 (1-x/100), the real estimate of the Service differentiation in IEEE 802.11 is currently a hot
parameter. Results obtained are summarized in Figs. 13 research area. Several proposals exist aimed at modifying
(errors on q by assuming an average message length equal to the backoff algorithm for achieving differentiated quality of
100 slots, i.e., q=0.99) and 14 (errors on S U). These results service on top of the DCF access method. One of the main
indicate that the AOB channel utilization is scarcely affected directions for service differentiation is to adopt a backoff
by estimation errors. For example, assuming constant errors window size that depends on the traffic class. Specifically,
of 50 percent, the channel utilization fluctuates in a small in [58], [1], it was proposed to use different ranges of the
interval (2 to 3 percent) around the no-error value. It is worth backoff window size, depending on the traffic class, to

Fig. 13. Sensitivity to errors in the estimation of the average message length.
78 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 15, NO. 1, JANUARY 2004

Fig. 14. Sensitivity to errors in the estimation of the slot utilization.

provide small backoff intervals for the high quality traffic rescheduled following the same procedure adopted after a
classes. The decrease of the backoff interval corresponds to collision, i.e., a new backoff interval is sampled. In the
increasing a station priority. This effect can be easily paper, we analytically derive the setting of the P_T
obtained in AOB by extending it with a priority mechanism. parameter that leads to the optimal channel utilization level.
Specifically, AOB extension with priority can be obtained In this paper, by simulation, we have extensively
with a simple change in the probability of transmission evaluated the performance of the IEEE 802.11 access
definition (see Section 3). By adding a local parameter, scheme with and without the AOB mechanism. The
named Priority Level (Pr_Lev), each station selects the performance analysis was carried out both in steady-state
priority level for each frame it transmits: and under transient conditions. Results obtained show that
the dynamic tuning algorithm is very effective for the
P T opt S U; S U; N A; P r Lev network and traffic configurations analyzed. Furthermore,
 N AP r Lev
SU we have shown the robustness of the AOB mechanism to
1  min 1; : errors and its potential for traffic differentiation. In this
opt S U
work, we have only sketched the traffic differentiation
When the Priority Level parameter is greater than 1, the potential of AOB. Further investigation is needed on this
stations probability of transmission is higher than it would topic: 1) to analytically characterize the relationship
be with the pure AOB mechanism. between the Pr_Lev parameter value and the QoS achieved
Similarly to the mechanisms proposed in [58], [1], the by a class and 2) to use ACL(q) values that depend on the
AOB mechanism guarantees that the higher the priority of a priority class to obtain a stronger traffic differentiation, e.g.,
class, the smaller its window size. An advantage of AOB is low priority traffic is admitted only when the network is
the dynamic nature of the backoff tuning mechanism. This lightly loaded. In this work, we focused on single-hop
guarantees that, when only low priority traffic is present in WLAN. An ongoing research activity is the extension of the
the network, its performance is optimized. On the other AOB mechanism for the dynamic tuning of the backoff
hand, by adopting static window sizes (see, e.g., [58]), the
algorithm in multihop ad hoc network configurations. As
network performance cannot always achieve the optimal
also indicated in [4], we are currently investigating
values. The effectiveness of AOB priority mechanism is
solutions for explicitly sharing the congestion information
confirmed by the simulative analysis presented in [11].
among two to three hops neighbor nodes.

9 CONCLUSIONS
ACKNOWLEDGMENTS
In this paper, we have proposed and evaluated the AOB
This work was partially funded by the Information Society
mechanism that can be applied to dynamically control the
Technologies program of the European Commision, Future
network contention level in an IEEE 802.11 network. The
and Emerging Technologies under the IST-2001-38113
network contention level is measured independently by
MobileMan project, and by the Italian Ministry for Educa-
each station by an index that is simple to estimate: the slot
tion and Scientific Research (MIUR) in the framework of the
utilization. The slot utilization estimate is used as a
FIRB Projects PERF and VICOM.
feedback signal to control the stations behavior. This
control is implemented through the computation in each
station of a probability of transmission, P_T, which creates a REFERENCES
filter in the transmission attempts. Specifically, when, [1] I. Aad and C. Castelluccia, Differentiation Mechanisms for IEEE
according to the standard protocol, a station is authorized 802.11, Proc. INFOCOM Conf., pp. 209-218, 2001.
to transmit, in the protocol extended with AOB, a station [2] G. Anastasi and L. Lenzini, QoS Provided by the IEEE 802.11
Wireless LAN to Advanced Data Applications: A Simulation
will perform a real transmission with probability P_T; Analysis, ACM Wireless Networks (WINET), vol. 6, no. 2, pp. 99-
otherwise (i.e., with probability 1-P_T), the transmission is 108, 2000.
BONONI ET AL.: RUNTIME OPTIMIZATION OF IEEE 802.11 WIRELESS LANS PERFORMANCE 79

[3] G. Anastasi, M. Conti, and E. Gregori, IEEE 802.11 Ad Hoc [26] C. Coutras, S. Gupta, and N.B. Shroff, Scheduling of Realtime
Networks: Protocols, Performance and Open Issues, Mobile Ad Traffic in IEEE 802.11 Wireless LANs, ACM Wireless Networks
Hoc Networking, S. Basagni, M. Conti, S. Giordano, and (WINET), vol. 6, no. 6, pp. 457-466, Dec. 2000.
I. Stojmenovic, eds., New York: IEEE Press & John Wiley and [27] B.P. Crow, I. Widjaja, J.G. Kim, and P.T. Sakai, IEEE 802.11
Sons, Inc., 2003. Wireless Local Area Networks, IEEE Comm. Magazine, pp. 116-
[4] V. Bharghavan, A.J. Demers, S. Shenker, and L. Zhang, MACAW: 126, Sept. 1997.
A Media Access Protocol for Wireless LANs, Proc. SIGCOMM [28] G.H. Forman and J. Zahorjan, The Challenges of Mobile
Conf., pp. 212-225, 1994. Computing, Computer, pp. 38-47, Apr. 1994.
[5] G. Bianchi, L. Fratta, and M. Olivieri, Performance Evaluation [29] C.L. Fullmer and J.J. Garcia-Luna-Aceves, Solutions to Hidden
and Enhancement of the CSMA/CA MAC Protocol for 802.11 Terminal Problems in Wireless Networks, Proc. ACM SIGCOMM
Wireless LANs, Proc. IEEE Symp. Personal, Indoor, and Mobile Conf., Sept. 1997.
Radio Comm., pp. 392-396, 1996. [30] R.G. Gallagher, A Perspective on Multiaccess Channels, IEEE
[6] G. Bianchi, Performance Analysis of the IEEE 802.11 Distributed Trans. Information Theory, vol. 31, no. 2, pp. 124-142, Mar. 1985.
Coordination Function, IEEE J. Selected Areas in Comm., vol. 18, [31] R. Garces and J.J. Garcia-Luna-Aceves, Floor Acquisition Multi-
no. 3, Mar. 2000. ple Access with Collision Resolution, Proc. MOBICOM Conf.,
[7] L. Bononi, M. Conti, and L. Donatiello, A Distributed Contention pp. 187-197, 1996.
Control Mechanism for Power Saving in Random-Access Ad Hoc [32] J.J. Garcia-Luna-Aceves and C.L. Fullmer, Floor Acquisition
Wireless Local Area Networks, Proc. Workshop Mobile Multimedia Multiple Access (FAMA) in Single-Channel Packet-Radio Net-
Comm., Nov. 1999. works, ACM Mobile Networks and Applications J., vol. 4, no. 3, 1999.
[8] L. Bononi, M. Conti, and E. Gregori, Design and Peformance [33] L. Georgiadis and P. Papantoni-Kazakos, Limited Feedback
Evaluation of an Asymptotically Optimal Backoff Algorithm for Sensing Algorithms for the Packet Broadcast Channel, IEEE
IEEE 802.11 Wireless LANs, Proc. Hawaii Intl Conf. System Trans. Information Theory, vol. 31, no. 2, pp. 280-294, Mar. 1985.
Sciences, 2000. [34] M. Gerla and L. Kleinrock, Closed Loop Stability Control for
[9] L. Bononi, M. Conti, and L. Donatiello, Design and Performance S-Aloha Satellite Communications, Proc. Fifth Data Comm.
Evaluation of a Distributed Contention Control (DCC) Mechanism Symp., pp. 210-219, Sept. 1977.
for IEEE 802.11 Wireless Local Area Networks, J. Parallel and [35] E.N. Gilbert, Capacity of a Burst-Noise Channel, Bell Systems
Distributed Computing, vol. 60, no. 4, Apr. 2000. Technology J., vol. 39, pp. 1253-1265, 1960.
[10] L. Bononi, M. Conti, and E. Gregori, Run-Time Optimization of [36] J. Goodman, A.G. Greenberg, N. Madras, and P. March, Stability
IEEE 802.11 Wireless LANs Performance: Part I, IIT internal of Binary Exponential Backoff, Proc. 17th Ann. ACM Symp. Theory
report, July 2002. of Computation, May 1985.
[11] L. Bononi, M. Conti, and E. Gregori, Run-Time Optimization of [37] B. Hajek and T. Van Loon, Decentralized Dynamic Control of a
IEEE 802.11 Wireless LANs Performance: Part II, internal report, Multiaccess Broadcast Channel, IEEE Trans Automation Control,
http://www.cs.unibo.it/~bononi/Publications/tr_bon03.pdf, vol. 27, pp. 559-569, 1982.
Feb. 2003. [38] J.L. Hammond and P.J.P. OReilly, Performance Analysis of Local
[12] R. Bruno, M. Conti, and E. Gregori, WLAN Technologies for Computer Networks. Addison-Wesley, 1988.
Mobile Ad Hoc Networks, Proc. Hawaii Intl Conf. System Sciences, [39] J. Hastad, T. Leighton, and B. Rogoff, Analysis of Backoff
Jan. 2001. Protocols for Multiple Access Channels, SIAM J. Computing,
vol. 25, no. 4, pp. 740-774, Aug. 1996.
[13] R. Bruno, M. Conti, and E. Gregori, Traffic Integration in
Personal, Local and Geograhical Wireless Networks, Handbook [40] D.P. Heyman and M.J. Sobel, Stochastic Models in Operations
of Wireless Networks and Mobile Computing, chapter 7, I. Stojme- Research, vol. 1. McGraw-Hill, 1982.
novic, ed., New York: John Wiley & Sons, 2002. [41] http://grouper.ieee.org/groups/802/11/main.html, 2003.
[42] IEEE Standard for Wireless LANMedium Access Control and
[14] R. Bruno, M. Conti, and E. Gregori, IEEE 802.11 Optimal
Physical Layer Specification, P802.11, Nov. 1997.
Performances: RTS/CTS Mechanism versus Basic Access, Proc.
IEEE Symp. Personal, Indoor, and Mobile Radio Comm., Sept. 2002. [43] T. Imielinsky and B.R. Badrinath, Mobile Computing: Solutions
and Challenges in Data Management, Comm. ACM, Oct. 1994.
[15] F. Cali, M. Conti, and E. Gregori, IEEE 802.11 Wireless LAN:
[44] E.-S. Jung and N. Vaidya, An Energy Efficient MAC Protocol for
Capacity Analysis and Protocol Enhancement, Proc. INFOCOM
Wireless LANs, Proc. IEEE INFOCOM Conf., June 2002.
Conf., pp. 142-149, Mar./Apr. 1998.
[45] F. Kelly, Stochastic Models of Computer Communications
[16] F. Cali, M. Conti, and E. Gregori, Dynamic Tuning of the IEEE
Systems, J. Royal Statistical Soc. B, vol. 47, pp. 379-395, 1985.
802.11 Protocol to Achieve a Theoretical Throughput Limit, IEEE/
[46] R. Kravets and P. Krishnan, Power Management Techniques for
ACM Trans. Networking, vol. 8, no. 6, pp. 785-799, Dec. 2000.
Mobile Communication, Proc. Fourth Ann. ACM/IEEE Intl Conf.
[17] F. Cali, M. Conti, and E. Gregori, Dynamic IEEE 802.11: Design, Mobile Computing and Networking, 1998.
Modeling and Performance Evaluation, IEEE J. Selected Areas in [47] D. Qiao and K.G. Shin, Achieving Efficient Channel Utilization
Comm., vol. 18, no. 9, pp. 1774-1786, Sept. 2000. and Weighted Fairness for Data Communications in IEEE 802.11
[18] A. Chandra, V. Gumalla, and J.O. Limb, Wireless Medium WLAN under the DCF, Proc. Intl Workshop Quality of Service,
Access Control Protocols, IEEE Comm. Surveys Second Quarter, May 2002.
2000. [48] R.L. Rivest, Network Control by Bayesian Broadcast, IEEE
[19] K.C. Chen, Medium Access Control of Wireless LANs for Mobile Trans. Information Theory, vol. 33, no. 3, pp. 323-328, May 1987.
Computing, IEEE Networks, 1994. [49] J.L. Sobrinho and A.S. Krishnakumar, Quality of Service in Ad
[20] H.S. Chhaya and S. Gupta, Performance Modeling of Asynchro- Hoc Carrier Sense Multiple Access Wireless Networks, IEEE
nous Data Transfer Methods in the IEEE 802.11 MAC Protocol, J. Selected Areas in Comm., pp. 1353-1368, Aug. 1999.
ACM/Balzer Wireless Networks, vol. 3, pp. 217-234, 1997. [50] W. Stallings, Local and Metropolitan Area Networks, fifth ed.
[21] I. Chlamtac, M. Conti, and J. Liu, Mobile Ad hoc Networking: Prentice Hall, 1996.
Imperatives and Challenges, Ad Hoc Networks J., vol. 1, no. 1, Jan.- [51] M. Stemm and R.H. Katz, Measuring and Reducing Energy
Mar. 2003. Consumption of Network Interfaces in Hand-Held Devices, Proc.
[22] M. Conti, E. Gregori, and L. Lenzini, Metropolitan Area Network. Intl Workshop Mobile Multimedia Comm., Sept. 1996.
London: Springer Verlag, 1997. [52] W.R. Stevens, TCP/IP Illustrated, The Protocols, vol. 1, Reading,
[23] M. Conti, Body, Personal, and Local Ad Hoc Wireless Net- Mass.: Addison-Wesley, 1994.
works, Handbook of Ad Hoc Wireless Networks, M. Ilyas, ed., [53] S. Tasaka, Performance Analysis of Multiple Access Protocols. MIT
chapter 1, CRC Press, 2003. Press, 1986.
[24] M. Conti and E. Gregori, Optimization of Bandwidth and Energy [54] F.A. Tobagi and L. Kleinrock, Packet Switching in Radio
Consumption in Wireless Local Area Networks, Performance Channels: Part II, IEEE Trans. Comm., vol. 23, pp. 1417-1433, 1975.
2002 tutorial paper, Lecture Notes on Computer ScienceTutorial [55] J.N. Tsitsiklis, Analysis on a Multiaccess Control Scheme, IEEE
Lectures, M. Calzarossa, ed., 2002. Trans. Automation Control, vol. 32, no. 11, pp. 1017-1020, Nov. 1987.
[25] M.S. Corson, J.P. Maker, and J.H. Cerincione, Internet-Based [56] V. Vanni, Misure di Prestazioni del Protocollo TCP in Reti Locali
Mobile Ad hoc Networking, Internet Computing, pp. 63-70, July- Ad Hoc, Computer Eng. Laurea Thesis, Pisa, Italy (in Italian),
Aug. 1999. Feb. 2002.
80 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 15, NO. 1, JANUARY 2004

[57] M. Veeraraghavan, N. Cocker, and T. Moors, Support of Voice Marco Conti received the Laurea degree in
Services in IEEE 802.11 Wireless LANs, Proc. INFOCOM Conf., computer science from the University of Pisa,
vol. 1, pp. 488-497, 2001. Italy, in 1987. In 1987, he joined the Italian
[58] A. Veres, A.T. Campbell, M. Barry, and L.-H. Sun, Supporting National Research Council (CNR). He is cur-
Service Differentiation in Wireless Packet Networks Using rently a senior researcher at CNR-IIT. His
Distributed Control, IEEE J. Selected Areas in Comm., vol. 19, research interests include Internet architecture
no. 10, pp. 2094-2104, Oct. 2001. and protocols, wireless networks, ad hoc net-
[59] V.M. Vishnevsky and A.I. Lyakhov, 802.11 LANs: Saturation working, mobile computing, and quality of service
Throughput in the Presence of Noise, Proc. Second Intl IFIP TC6 in packet switching networks. He coauthored the
Networking Conf., May 2002. book Metropolitan Area Networks (Springer,
[60] V.M. Vishnevsky and A.I. Lyakhov, IEEE 802.11 Wireless LAN: London 1997), and he is coeditor of the book Mobile Ad Hoc Networking
Saturation Throughput Analysis with Seizing Effect Considera- (IEEE Press, 2003). He has published more than 100 research papers
tion, Cluster Computing, vol. 5, no. 2, pp. 133-144, Apr. 2002. related to design, modeling, and performance evaluation of computer-
[61] J. Weinmiller, H. Woesner, J.P. Ebert, and A. Wolisz, Analyzing network architectures and protocols in journals and conference proceed-
and Tuning the Distributed Coordination Function in the IEEE ings. He served as the technical program committee chair of the second
802.11 DFWMAC Draft Standard, Proc. Intl Symp. Modeling and IFIP-TC6 Networking Conference Networking 2002, and technical
Simulation of Computer and Telecommunication Systems, 1996. program committee cochair of ACM Workshop On Wireless Mobile
[62] J. Weinmiller, M. Schlager, A. Festag, and A. Wolisz, Perfor- Multimedia 2002. He is serving as technical program committee chair of
mance Study of Access Control in Wireless LANs-IEEE 802.11 the Eighth International Conference on Personal Wireless Communica-
DFWMAC and ETSI RES 10 HIPERLAN, Mobile Networks and tions (PWC2003). He served as guest editor for the Cluster Computing
Applications, vol. 2, pp. 55-67, 1997. Journal (special issue on Mobile Ad Hoc Networking), IEEE Transac-
[63] S. Xu and T. Saadawi, Does IEEE 802.11 MAC Protocol Work tions on Computers (special issue on Quality of Service Issues in
Well in Multi-Hop Wireless Ad Hoc Networks? IEEE Comm. Internet Web Services), and ACM/Kluwer Mobile Networks & Applica-
Magazine, June 2001. tions Journal (special issue on Mobile Ad Hoc Networks). He is a
[64] S. Xu and T. Saadawi, Revealing the Problems with 802.11 MAC member of IFIP WGs 6.2, 6.3, and 6.8.
Protocol in Multi-Hop Wireless Ad Hoc Networks, Computer
Networks, vol. 38, no. 4, Mar. 2002. Enrico Gregori received the Laurea degree in
electronic engineering from the University of
Luciano Bononi received the Laurea degree Pisa in 1980. He joined CNUCE, an institute of
(summa cum laude) in computer science in 1997, the Italian National Research Council (CNR), in
and the PhD degree in computer science in 2002, 1981. He is currently a CNR research director. In
both from the University of Bologna, Italy. 1986, he held a visiting position at the IBM
Currently, he is a researcher in the Department research center in Zurich, working on network
of Computer Science at the University of Bolog- software engineering and heterogeneous net-
na, Italy. His research activities include wireless working. He has contributed to several national
networks protocols, power saving, modeling and and international projects on computer network-
simulation of wireless systems, discrete-event ing. He has authored more than 100 papers in the area of computer
simulation, and distributed simulation. networks and has been published in international journals and
conference proceedings and is coauthor of the book Metropolitan Area
Networks (Springer, 1997). He was the general chair of the second IFIP-
TC6 Networking Conference Networking 2002. His current research
interests include: wireless access to Internet, wireless LANs, quality of
service in packet-switching networks, energy saving protocols, and
evolution of TCP/IP protocols. He is on the editorial board of the Cluster
Computing Journal.

. For more information on this or any other computing topic,


please visit our Digital Library at http://computer.org/publications/dlib.

Potrebbero piacerti anche