218 research outputs found

    Is Our Model for Contention Resolution Wrong?

    Full text link
    Randomized binary exponential backoff (BEB) is a popular algorithm for coordinating access to a shared channel. With an operational history exceeding four decades, BEB is currently an important component of several wireless standards. Despite this track record, prior theoretical results indicate that under bursty traffic (1) BEB yields poor makespan and (2) superior algorithms are possible. To date, the degree to which these findings manifest in practice has not been resolved. To address this issue, we examine one of the strongest cases against BEB: nn packets that simultaneously begin contending for the wireless channel. Using Network Simulator 3, we compare against more recent algorithms that are inspired by BEB, but whose makespan guarantees are superior. Surprisingly, we discover that these newer algorithms significantly underperform. Through further investigation, we identify as the culprit a flawed but common abstraction regarding the cost of collisions. Our experimental results are complemented by analytical arguments that the number of collisions -- and not solely makespan -- is an important metric to optimize. We believe that these findings have implications for the design of contention-resolution algorithms.Comment: Accepted to the 29th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA 2017

    Modelling the IEEE 802.11 wireless MAC layer under heterogeneous VoIP traffic to evaluate and dimension QoE

    Get PDF
    PhDAs computers become more popular in the home and workplace, sharing resources and Internet access locally is a necessity. The simplest method of choice is by deploying a Wireless Local Area Network; they are inexpensive, easy to configure and require minimal infrastructure. The wireless local area network of choice is the IEEE 802.11 standard; IEEE 802.11, however, is now being implemented on larger scales outside of the original scope of usage. The realistic usage spans from small scale home solutions to commercial ‘hot spots,’ providing access within medium size areas such as cafĂ©s, and more recently blanket coverage in metropolitan. Due to increasing Internet availability and faster network access, in both wireless and wired, the concept of using such networks for real-time services such as internet telephony is also becoming popular. IEEE 802.11 wireless access is shared with many clients on a single channel and there are three non-overlapping channels available. As more stations communicate on a single channel there is increased contention resulting in longer delays due to the backoff overhead of the IEEE 802.11 protocol and hence loss and delay variation; not desirable for time critical traffic. Simulation of such networks demands super-computing resource, particularly where there are over a dozen clients on a given. Fortunately, the author has access to the UK’s super computers and therefore a clear motivation to develop a state of the art analytical model with the required resources to validate. The goal was to develop an analytical model to deal with realistic IEEE 802.11 deployments and derive results without the need for super computers. A network analytical model is derived to model the characteristics of the IEEE 802.11 protocol from a given scenario, including the number of clients and the traffic load of each. The model is augmented from an existing published saturated case, where each client is assumed to always have traffic to transmit. The nature of the analytical model is to allow stations to have a variable load, which is achieved by modifying the existing models and then to allow stations to operate with different traffic profiles. The different traffic profiles, for each station, is achieved by using the augmented model state machine per station and distributing the probabilities to each station’s state machine accordingly. To address the gap between the analytical models medium access delay and standard network metrics which include the effects of buffering traffic, a queueing model is identified and augmented which transforms the medium access delay into standard network metrics; delay, loss and jitter. A Quality of Experience framework, for both computational and analytical results, is investigated to allow the results to be represented as user perception scores and the acceptable voice call carrying capacity found. To find the acceptable call carrying capacity, the ITU-T G.107 E-Model is employed which can be used to give each client a perception rating in terms of user satisfaction. PAGE 4 OF 162 QUEEN MARY, UNIVERSITY OF LONDON OLIVER SHEPHERD With the use of a novel framework, benchmarking results show that there is potential to maximise the number of calls carried by the network with an acceptable user perception rating. Dimensioning of the network is undertaken, again compared with simulation from the super computers, to highlight the usefulness of the analytical model and framework and provides recommendations for network configurations, particularly for the latest Wireless Multimedia extensions available in IEEE 802.11. Dimensioning shows an overall increase of acceptable capacity of 43%; from 7 to 10 bidirectional calls per Access Point by using a tuned transmission opportunity to allow each station to send 4 packets per transmission. It is found that, although the accuracy of the results from the analytical model is not precise, the model achieves a 1 in 13,000 speed up compared to simulation. Results show that the point of maximum calls comes close to simulation with the analytical model and framework and can be used as a guide to configure the network. Alternatively, for specific capacity figures, the model can be used to home-in on the optimal region for further experiments and therefore achievable with standard computational resource, i.e. desktop machines

    Measurement-Adaptive Cellular Random Access Protocols

    Get PDF
    This work considers a single-cell random access channel (RACH) in cellular wireless networks. Communications over RACH take place when users try to connect to a base station during a handover or when establishing a new connection. Within the framework of Self-Organizing Networks (SONs), the system should self- adapt to dynamically changing environments (channel fading, mobility, etc.) without human intervention. For the performance improvement of the RACH procedure, we aim here at maximizing throughput or alternatively minimizing the user dropping rate. In the context of SON, we propose protocols which exploit information from measurements and user reports in order to estimate current values of the system unknowns and broadcast global action-related values to all users. The protocols suggest an optimal pair of user actions (transmission power and back-off probability) found by minimizing the drift of a certain function. Numerical results illustrate considerable benefits of the dropping rate, at a very low or even zero cost in power expenditure and delay, as well as the fast adaptability of the protocols to environment changes. Although the proposed protocol is designed to minimize primarily the amount of discarded users per cell, our framework allows for other variations (power or delay minimization) as well.Comment: 31 pages, 13 figures, 3 tables. Springer Wireless Networks 201

    A comparison of the HIPERLAN/2 and IEEE 802.11a wireless LAN standards

    Get PDF

    Quantifying Potential Energy Efficiency Gain in Green Cellular Wireless Networks

    Full text link
    Conventional cellular wireless networks were designed with the purpose of providing high throughput for the user and high capacity for the service provider, without any provisions of energy efficiency. As a result, these networks have an enormous Carbon footprint. In this paper, we describe the sources of the inefficiencies in such networks. First we present results of the studies on how much Carbon footprint such networks generate. We also discuss how much more mobile traffic is expected to increase so that this Carbon footprint will even increase tremendously more. We then discuss specific sources of inefficiency and potential sources of improvement at the physical layer as well as at higher layers of the communication protocol hierarchy. In particular, considering that most of the energy inefficiency in cellular wireless networks is at the base stations, we discuss multi-tier networks and point to the potential of exploiting mobility patterns in order to use base station energy judiciously. We then investigate potential methods to reduce this inefficiency and quantify their individual contributions. By a consideration of the combination of all potential gains, we conclude that an improvement in energy consumption in cellular wireless networks by two orders of magnitude, or even more, is possible.Comment: arXiv admin note: text overlap with arXiv:1210.843

    JTP: An Energy-conscious Transport Protocol for Wireless Ad Hoc Networks

    Full text link
    Within a recently developed low-power ad hoc network system, we present a transport protocol (JTP) whose goal is to reduce power consumption without trading off delivery requirements of applications. JTP has the following features: it is lightweight whereby end-nodes control in-network actions by encoding delivery requirements in packet headers; JTP enables applications to specify a range of reliability requirements, thus allocating the right energy budget to packets; JTP minimizes feedback control traffic from the destination by varying its frequency based on delivery requirements and stability of the network; JTP minimizes energy consumption by implementing in-network caching and increasing the chances that data retransmission requests from destinations "hit" these caches, thus avoiding costly source retransmissions; and JTP fairly allocates bandwidth among flows by backing off the sending rate of a source to account for in-network retransmissions on its behalf. Analysis and extensive simulations demonstrate the energy gains of JTP over one-size-fits-all transport protocols.Defense Advanced Research Projects Agency (AFRL FA8750-06-C-0199

    Medium Access Control Protocols for Ad-Hoc Wireless Networks: A Survey

    Get PDF
    Studies of ad hoc wireless networks are a relatively new field gaining more popularity for various new applications. In these networks, the Medium Access Control (MAC) protocols are responsible for coordinating the access from active nodes. These protocols are of significant importance since the wireless communication channel is inherently prone to errors and unique problems such as the hidden-terminal problem, the exposed-terminal problem, and signal fading effects. Although a lot of research has been conducted on MAC protocols, the various issues involved have mostly been presented in isolation of each other. We therefore make an attempt to present a comprehensive survey of major schemes, integrating various related issues and challenges with a view to providing a big-picture outlook to this vast area. We present a classification of MAC protocols and their brief description, based on their operating principles and underlying features. In conclusion, we present a brief summary of key ideas and a general direction for future work
    • 

    corecore