218 research outputs found
Is Our Model for Contention Resolution Wrong?
Randomized binary exponential backoff (BEB) is a popular algorithm for
coordinating access to a shared channel. With an operational history exceeding
four decades, BEB is currently an important component of several wireless
standards. Despite this track record, prior theoretical results indicate that
under bursty traffic (1) BEB yields poor makespan and (2) superior algorithms
are possible. To date, the degree to which these findings manifest in practice
has not been resolved.
To address this issue, we examine one of the strongest cases against BEB:
packets that simultaneously begin contending for the wireless channel. Using
Network Simulator 3, we compare against more recent algorithms that are
inspired by BEB, but whose makespan guarantees are superior. Surprisingly, we
discover that these newer algorithms significantly underperform. Through
further investigation, we identify as the culprit a flawed but common
abstraction regarding the cost of collisions. Our experimental results are
complemented by analytical arguments that the number of collisions -- and not
solely makespan -- is an important metric to optimize. We believe that these
findings have implications for the design of contention-resolution algorithms.Comment: Accepted to the 29th ACM Symposium on Parallelism in Algorithms and
Architectures (SPAA 2017
Modelling the IEEE 802.11 wireless MAC layer under heterogeneous VoIP traffic to evaluate and dimension QoE
PhDAs computers become more popular in the home and workplace, sharing resources and
Internet access locally is a necessity. The simplest method of choice is by deploying a
Wireless Local Area Network; they are inexpensive, easy to configure and require
minimal infrastructure. The wireless local area network of choice is the IEEE 802.11
standard; IEEE 802.11, however, is now being implemented on larger scales outside of
the original scope of usage. The realistic usage spans from small scale home solutions to
commercial âhot spots,â providing access within medium size areas such as cafĂ©s, and
more recently blanket coverage in metropolitan. Due to increasing Internet availability
and faster network access, in both wireless and wired, the concept of using such
networks for real-time services such as internet telephony is also becoming popular.
IEEE 802.11 wireless access is shared with many clients on a single channel and there are
three non-overlapping channels available. As more stations communicate on a single
channel there is increased contention resulting in longer delays due to the backoff
overhead of the IEEE 802.11 protocol and hence loss and delay variation; not desirable
for time critical traffic.
Simulation of such networks demands super-computing resource, particularly where
there are over a dozen clients on a given. Fortunately, the author has access to the UKâs
super computers and therefore a clear motivation to develop a state of the art analytical
model with the required resources to validate. The goal was to develop an analytical
model to deal with realistic IEEE 802.11 deployments and derive results without the
need for super computers.
A network analytical model is derived to model the characteristics of the IEEE 802.11
protocol from a given scenario, including the number of clients and the traffic load of
each. The model is augmented from an existing published saturated case, where each
client is assumed to always have traffic to transmit. The nature of the analytical model is
to allow stations to have a variable load, which is achieved by modifying the existing
models and then to allow stations to operate with different traffic profiles. The different
traffic profiles, for each station, is achieved by using the augmented model state machine
per station and distributing the probabilities to each stationâs state machine accordingly.
To address the gap between the analytical models medium access delay and standard
network metrics which include the effects of buffering traffic, a queueing model is
identified and augmented which transforms the medium access delay into standard
network metrics; delay, loss and jitter. A Quality of Experience framework, for both
computational and analytical results, is investigated to allow the results to be represented
as user perception scores and the acceptable voice call carrying capacity found. To find
the acceptable call carrying capacity, the ITU-T G.107 E-Model is employed which can
be used to give each client a perception rating in terms of user satisfaction.
PAGE 4 OF 162
QUEEN MARY, UNIVERSITY OF LONDON OLIVER SHEPHERD
With the use of a novel framework, benchmarking results show that there is potential to
maximise the number of calls carried by the network with an acceptable user perception
rating. Dimensioning of the network is undertaken, again compared with simulation
from the super computers, to highlight the usefulness of the analytical model and
framework and provides recommendations for network configurations, particularly for
the latest Wireless Multimedia extensions available in IEEE 802.11.
Dimensioning shows an overall increase of acceptable capacity of 43%; from 7 to 10 bidirectional
calls per Access Point by using a tuned transmission opportunity to allow
each station to send 4 packets per transmission. It is found that, although the accuracy
of the results from the analytical model is not precise, the model achieves a 1 in 13,000
speed up compared to simulation. Results show that the point of maximum calls comes
close to simulation with the analytical model and framework and can be used as a guide
to configure the network. Alternatively, for specific capacity figures, the model can be
used to home-in on the optimal region for further experiments and therefore achievable
with standard computational resource, i.e. desktop machines
Measurement-Adaptive Cellular Random Access Protocols
This work considers a single-cell random access channel (RACH) in cellular
wireless networks. Communications over RACH take place when users try to
connect to a base station during a handover or when establishing a new
connection. Within the framework of Self-Organizing Networks (SONs), the system
should self- adapt to dynamically changing environments (channel fading,
mobility, etc.) without human intervention. For the performance improvement of
the RACH procedure, we aim here at maximizing throughput or alternatively
minimizing the user dropping rate. In the context of SON, we propose protocols
which exploit information from measurements and user reports in order to
estimate current values of the system unknowns and broadcast global
action-related values to all users. The protocols suggest an optimal pair of
user actions (transmission power and back-off probability) found by minimizing
the drift of a certain function. Numerical results illustrate considerable
benefits of the dropping rate, at a very low or even zero cost in power
expenditure and delay, as well as the fast adaptability of the protocols to
environment changes. Although the proposed protocol is designed to minimize
primarily the amount of discarded users per cell, our framework allows for
other variations (power or delay minimization) as well.Comment: 31 pages, 13 figures, 3 tables. Springer Wireless Networks 201
Quantifying Potential Energy Efficiency Gain in Green Cellular Wireless Networks
Conventional cellular wireless networks were designed with the purpose of
providing high throughput for the user and high capacity for the service
provider, without any provisions of energy efficiency. As a result, these
networks have an enormous Carbon footprint. In this paper, we describe the
sources of the inefficiencies in such networks. First we present results of the
studies on how much Carbon footprint such networks generate. We also discuss
how much more mobile traffic is expected to increase so that this Carbon
footprint will even increase tremendously more. We then discuss specific
sources of inefficiency and potential sources of improvement at the physical
layer as well as at higher layers of the communication protocol hierarchy. In
particular, considering that most of the energy inefficiency in cellular
wireless networks is at the base stations, we discuss multi-tier networks and
point to the potential of exploiting mobility patterns in order to use base
station energy judiciously. We then investigate potential methods to reduce
this inefficiency and quantify their individual contributions. By a
consideration of the combination of all potential gains, we conclude that an
improvement in energy consumption in cellular wireless networks by two orders
of magnitude, or even more, is possible.Comment: arXiv admin note: text overlap with arXiv:1210.843
JTP: An Energy-conscious Transport Protocol for Wireless Ad Hoc Networks
Within a recently developed low-power ad hoc network system, we present a transport protocol (JTP) whose goal is to reduce power consumption without trading off delivery requirements of applications. JTP has the following features: it is lightweight whereby end-nodes control in-network actions by encoding delivery requirements in packet headers; JTP enables applications to specify a range of reliability requirements, thus allocating the right energy budget to packets; JTP minimizes feedback control traffic from the destination by varying its frequency based on delivery requirements and stability of the network; JTP minimizes energy consumption by implementing in-network caching and increasing the chances that data retransmission requests from destinations "hit" these caches, thus avoiding costly source retransmissions; and JTP fairly allocates bandwidth among flows by backing off the sending rate of a source to account for in-network retransmissions on its behalf. Analysis and extensive simulations demonstrate the energy gains of JTP over one-size-fits-all transport protocols.Defense Advanced Research Projects Agency (AFRL FA8750-06-C-0199
Medium Access Control Protocols for Ad-Hoc Wireless Networks: A Survey
Studies of ad hoc wireless networks are a relatively new field gaining more popularity for various new applications. In these networks, the Medium Access Control (MAC) protocols are responsible for coordinating the access from active nodes. These protocols are of significant importance since the wireless communication channel is inherently prone to errors and unique problems such as the hidden-terminal problem, the exposed-terminal problem, and signal fading effects. Although a lot of research has been conducted on MAC protocols, the various issues involved have mostly been presented in isolation of each other. We therefore make an attempt to present a comprehensive survey of major schemes, integrating various related issues and challenges with a view to providing a big-picture outlook to this vast area. We present a classification of MAC protocols and their brief description, based on their operating principles and underlying features. In conclusion, we present a brief summary of key ideas and a general direction for future work
- âŠ