Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
ABSTRACT
Real time applications are characterized by their delay bounds. To satisfy the
Quality of Service (QoS) requirements of such flows over wireless
communications, we enhance the 802.11 protocol to support the Deadline
Monotonic (DM) scheduling policy. Then, we propose to evaluate the performance
of DM in terms of throughput, average medium access delay and medium access
delay distrbution. To evaluate the performance of the DM policy, we develop a
Markov chain based analytical model and derive expressions of the throughput, the
average MAC layer service time and the service time distribution. Therefore, we
validate the mathematical model and extend analytial results to a multi-hop
network by simulation using the ns-2 network simulator.
2.3 Real time scheduling over 802.11 3.1 Distributed Scheduling over 802.11
To realize a distributed scheduling over 802.11,
A distributed solution for the support of real- we introduce a priority broadcast mechanism similar
time sources over IEEE 802.11, called Blackburst, is to [18]. Indeed each station maintains a local
discussed in [8]. This scheme modifies the MAC scheduling table with entries for HOL packets of all
protocol to send short transmissions in order to gain other stations. Each entry in the scheduling table of
priority for real-time service. It is shown that this
node S i comprises two fields S j , D j where S j is
approach is able to support bounded delays. The
main drawback of this scheme is that it requires the source node MAC address and D j is the
constant intervals for high priority traffic; otherwise deadline of the HOL packet of node S j . To
the performance degrades very much. broadcast HOL packets deadlines, we propose to use
the two way handshake DATA/ACK access mode.
In [18], the authors introduced a distributed
priority scheduling over 802.11 to support a class of
When a node S i transmits a DATA packet, it
dynamic priority schedulers such as Earliest
Deadline First (EDF) or Virtual Clock (VC). Indeed, piggybacks the deadline of its HOL packet. Nodes
the EDF policy is used to schedule real time flows hearing the DATA packet add an entry for S i in
according to their absolute deadlines, where the their local scheduling tables by filling the
absolute deadline is the node arrival time plus the corresponding fields. The receiver of the DATA
delay bound. packet copies the priority of the HOL packet in ACK
To realize a distributed scheduling over 802.11, before sending the ACK frame. All the stations that
the authors of [18] used a priority broadcast did not hear the DATA packet add an entry for S i
mechanism where each station maintains an entry for using the information in the ACK packet.
the highest priority packet of all other stations. Thus,
stations can adjust their backoff according to other 3.2 DM medium access backoff policy
stations priorities. Let’s consider two stations S 1 S2and
The overhead introduced by the broadcast transmitting two flows with the same deadline D1
priority mechanism is negligible. This is due to the ( D1 is expressed as a number of 802.11 slots). The
fact that priorities are exchanged using native DATA two stations having the same delay bound can access
and ACK packets. Nevertheless, authors of [18] the channel with the same priority using the native
proposed a generic backoff policy that can be used 802.11 DCF.
by a class of dynamic priority schedulers no matter if Now, we suppose that S 1 and S 2 transmit flows
this scheduler targets delay sensitive flows or rate
sensitive flows. with different delay bounds D1 and D2 such as
D1 D2 , and generate two packets at time instants
In this paper, we focus on delay sensitive flows t 1 and t 2 . If S 2 had the same delay bound as S 1 ,
and propose to support the fixed priority Deadline
Monotonic (DM) policy over 802.11 to schedule its packet would have been generated at time t '2 such
delay sensitive flows. For instance, we use a priority as t '2 t 2 D 21 , where D 21 D 2 D1 .
broadcast mechanism similar to [18] and introduce a
At that time, S 1 and S 2 would have the same
new medium access backoff policy where the
priority and transmit their packets according to the
and (7), we obtain a system of non linear equations Hence, the expression of the throughput of a
as follows: category C i station is given by:
Ts T PHY TMAC T p T D SIFS
(33)
TPHY T ACK T D DIFS
Tc TPHY TMAC T p TD EIFS (34)
11
Psuc : the probability that S 1 observes a
successful transmission on the channel,
while S 1 is in one of the states of 1 .
11
Psuc n1 1 11 1 11 n1 2 (36)
12
Psuc : the probability that S 1 observes a
successful transmission on the channel,
while S 1 is in one of the states of 1 .
Figure 5: Normalized throughput as a function of 12
Psuc n1 1 12 1 12 n1 2 1 22 n2
the number of contending stations (37)
n2 22 1 22 n2 1 1 12 n1 1
All the curves show that DM performs service
differentiation over 802.11 and offers better We evaluate H 1R ,i ,i j , D21 Z for each state
throughput for category C1 stations independently
of S 1 Markov chain as follows:
of the number of contending stations.
Ts
1 11 Te
6 SERVICE TIME ANALYSIS H 1~ C2 ,i ,i , D21 Z Psuc Z
W
In this section, we evaluate the average MAC
Tc
layer service time of category C1 and category C 2 min i D21 1,W 1
m c
T
Ĥ 1C2 ,i D21 ,i , D21 Z 0 Otherwise 1 p12 H 1C2 ,D21 ,0 , D21 Z Te
Z p11H 1~C ,0 ,0 , D Z
2 21
i 0
We also have:
p12 H 1C 2 ,D21 ,0 , D21 Z i
1 p11 Z D21 H 1~ C2 ,i ,i , D21 Z 6.1.2 Service time Z-transform of a category
H 1C2 ,i ,i D21 , D21 Z C2 station:
Ts Tc
All the curves drop gradually to 0 as the delay Analytical and simulation results show that
increases. Category C1 stations curves drop to 0 complementary service time curves drop faster
when the number of contending stations is small for
faster than category C 2 curves. Indeed, when both category C1 and category C 2 stations. This
D21 4 slots, the probability that S 1 service time means that all stations service time increases as the