9 research outputs found

    Performance modelling and enhancement of wireless communication protocols

    Get PDF
    In recent years, Wireless Local Area Networks(WLANs) play a key role in the data communications and networking areas, having witnessed significant research and development. WLANs are extremely popular being almost everywhere including business,office and home deployments.In order to deal with the modem Wireless connectivity needs,the Institute of Electrical and Electronics Engineers(IEEE) has developed the 802.11 standard family utilizing mainly radio transmission techniques, whereas the Infrared Data Association (IrDA) addressed the requirement for multipoint connectivity with the development of the Advanced Infrared(Alr) protocol stack. This work studies the collision avoidance procedures of the IEEE 802.11 Distributed Coordination Function (DCF) protocol and suggests certain protocol enhancements aiming at maximising performance. A new, elegant and accurate analysis based on Markov chain modelling is developed for the idealistic assumption of unlimited packet retransmissions as well as for the case of finite packet retry limits. Simple equations are derived for the through put efficiency, the average packet delay, the probability of a packet being discarded when it reaches the maximum retransmission limit, the average time to drop such a packet and the packet inter-arrival time for both basic access and RTS/CTS medium access schemes.The accuracy of the mathematical model is validated by comparing analytical with OPNET simulation results. An extensive and detailed study is carried out on the influence of performance of physical layer, data rate, packet payload size and several backoff parameters for both medium access mechanisms. The previous mathematical model is extended to take into account transmission errors that can occur either independently with fixed Bit Error Rate(BER) or in bursts. The dependency of the protocol performance on BER and other factors related to independent and burst transmission errors is explored. Furthermore, a simple-implement appropriate tuning of the back off algorithm for maximizing IEEE 802-11 protocol performance is proposed depending on the specific communication requirements. The effectiveness of the RTS/CTS scheme in reducing collision duration at high data rates is studied and an all-purpose expression for the optimal use of the RTS/CTS reservation scheme is derived. Moreover, an easy-to-implement backoff algorithm that significantly enhances performance is introduced and an alternative derivation is developed based on elementary conditional probability arguments rather than bi-dimensional Markov chains. Finally, an additional performance improvement scheme is proposed by employing packet bursting in order to reduce overhead costs such as contention time and RTS/CTSex changes. Fairness is explored in short-time and long-time scales for both the legacy DCF and packet bursting cases. AIr protocol employs the RTS/CTS medium reservation scheme to cope with hidden stations and CSMA/CA techniques with linear contention window (CW) adjustment for medium access. A 1-dimensional Markov chain model is constructed instead of the bi-dimensional model in order to obtain simple mathematical equations of the average packet delay.This new approach greatly simplifies previous analyses and can be applied to any CSMA/CA protocol.The derived mathematical model is validated by comparing analytical with simulation results and an extensive Alr packet delay evaluation is carried out by taking into account all the factors and parameters that affect protocol performance. Finally, suitable values for both backoff and protocol parameters are proposed that reduce average packet delay and, thus, maximize performance

    Game theoretic approach to medium access control in wireless networks

    Get PDF
    Wireless networking is fast becoming the primary method for people to connect to the Internet and with each other. The available wireless spectrum is increasingly congested, with users demanding higher performance and reliability from their wireless connections. This thesis proposes a game-theoretic random access model, compliant with the IEEE 802.11 standard, which can be integrated into the distributed coordination function (DCF). The objective is to design a game theoretic model that potentially optimizes throughput and fairness in each node independently and, therefore, minimise channel access delay. This dissertation presents a game-theoretic MAC layer implementation for single-cell networks and centralised DCF in the presence of hidden terminals to show how game theory can be applied to improve wireless performance. A utility function is proposed, such that it can decouple the protocol's dynamic adaptation to channel load from collision detection. It is demonstrated that the proposed model can reach a Nash equilibrium that results in a relatively stable contention window, provided that a node adapts its behaviour to the idle rate of the broadcast channel, coupled with observation of its own transmission activity. This dissertation shows that the proposed game-theoretic model is capable of achieving much higher throughput than the standard IEEE 802.11 DCF with better short-time fairness and significant improvements in the channel access delay

    Performance evaluation and enhancement of IEEE 802.11 WLANs: a distributed opportunistic media access control strategy.

    Get PDF
    Chen, Darui.Thesis (M.Phil.)--Chinese University of Hong Kong, 2007.Includes bibliographical references (leaves 62-67).Abstracts in English and Chinese.Abstract --- p.iAcknowledgements --- p.ivTable of Contents --- p.vList of Figures --- p.viiList of Tables --- p.viiiChapter Chapter 1 --- Introduction --- p.1Chapter 1.1 --- Motivation --- p.1Chapter 1.2 --- Related Works --- p.2Chapter 1.3 --- Contributions --- p.6Chapter 1.4 --- Organization --- p.8Chapter Chapter 2 --- Preliminaries --- p.9Chapter 2.1 --- MAC Protocol in IEEE 802.11 WLANs --- p.9Chapter 2.1.1 --- IEEE 802.11 DCF --- p.9Chapter 2.1.2 --- Performance Anomaly of DCF --- p.11Chapter 2.2 --- Multi-Rate WLANs with Rate Adaptation --- p.12Chapter 2.2.1 --- PHY-Layer Rate Adaptation Model --- p.12Chapter 2.2.2 --- Two Typical WLANs with Rate Adaptation --- p.13Chapter Chapter 3 --- Performance Analysis and Evaluation of Multi-Rate IEEE802.11 WLANs --- p.15Chapter 3.1 --- Theoretical Analysis of Multi-Rate IEEE 802.11 WLANs --- p.15Chapter 3.1.1 --- Markov Chain Model for Backoff Process --- p.15Chapter 3.1.2 --- Saturation Throughput --- p.18Chapter 3.1.3 --- Theoretical Throughput Limit and Dynamic Backoff --- p.20Chapter 3.2 --- Performance Evaluation of Multi- Rate WLANs --- p.22Chapter 3.2.1 --- Model Validation --- p.22Chapter 3.2.2 --- Theoretical Throughput Limit --- p.24Chapter Chapter 4 --- Rate-aware DCF Protocol --- p.30Chapter 4.1 --- Proposed R-DCF Protocol --- p.30Chapter 4.2 --- Theoretical Analysis of R-DCF --- p.34Chapter 4.2.1 --- Markov Chain Model for Backoff Process --- p.34Chapter 4.2.2 --- Saturation Throughput --- p.36Chapter 4.2.3 --- Simplified Models --- p.39Chapter 4.3 --- Performance Evaluation --- p.41Chapter 4.3.1 --- Model Validation --- p.41Chapter 4.3.2 --- R-DCF with Homogeneous Users --- p.42Chapter 4.3.3 --- R-DCF in Fixed-Rate WLANs --- p.49Chapter Chapter 5 --- Performance Enhancement of the R-DCF Protocol --- p.52Chapter 5.1 --- Maximizing Throughput of R-DCF --- p.52Chapter 5.2 --- Offline Adaptive Backoff Methods --- p.55Chapter Chapter 6 --- Conclusions --- p.60Bibliography --- p.6

    Performance modelling and enhancement of wireless communication protocols

    Get PDF
    In recent years, Wireless Local Area Networks(WLANs) play a key role in the data communications and networking areas, having witnessed significant research and development. WLANs are extremely popular being almost everywhere including business,office and home deployments.In order to deal with the modem Wireless connectivity needs,the Institute of Electrical and Electronics Engineers(IEEE) has developed the 802.11 standard family utilizing mainly radio transmission techniques, whereas the Infrared Data Association (IrDA) addressed the requirement for multipoint connectivity with the development of the Advanced Infrared(Alr) protocol stack. This work studies the collision avoidance procedures of the IEEE 802.11 Distributed Coordination Function (DCF) protocol and suggests certain protocol enhancements aiming at maximising performance. A new, elegant and accurate analysis based on Markov chain modelling is developed for the idealistic assumption of unlimited packet retransmissions as well as for the case of finite packet retry limits. Simple equations are derived for the through put efficiency, the average packet delay, the probability of a packet being discarded when it reaches the maximum retransmission limit, the average time to drop such a packet and the packet inter-arrival time for both basic access and RTS/CTS medium access schemes.The accuracy of the mathematical model is validated by comparing analytical with OPNET simulation results. An extensive and detailed study is carried out on the influence of performance of physical layer, data rate, packet payload size and several backoff parameters for both medium access mechanisms. The previous mathematical model is extended to take into account transmission errors that can occur either independently with fixed Bit Error Rate(BER) or in bursts. The dependency of the protocol performance on BER and other factors related to independent and burst transmission errors is explored. Furthermore, a simple-implement appropriate tuning of the back off algorithm for maximizing IEEE 802-11 protocol performance is proposed depending on the specific communication requirements. The effectiveness of the RTS/CTS scheme in reducing collision duration at high data rates is studied and an all-purpose expression for the optimal use of the RTS/CTS reservation scheme is derived. Moreover, an easy-to-implement backoff algorithm that significantly enhances performance is introduced and an alternative derivation is developed based on elementary conditional probability arguments rather than bi-dimensional Markov chains. Finally, an additional performance improvement scheme is proposed by employing packet bursting in order to reduce overhead costs such as contention time and RTS/CTSex changes. Fairness is explored in short-time and long-time scales for both the legacy DCF and packet bursting cases. AIr protocol employs the RTS/CTS medium reservation scheme to cope with hidden stations and CSMA/CA techniques with linear contention window (CW) adjustment for medium access. A 1-dimensional Markov chain model is constructed instead of the bi-dimensional model in order to obtain simple mathematical equations of the average packet delay.This new approach greatly simplifies previous analyses and can be applied to any CSMA/CA protocol.The derived mathematical model is validated by comparing analytical with simulation results and an extensive Alr packet delay evaluation is carried out by taking into account all the factors and parameters that affect protocol performance. Finally, suitable values for both backoff and protocol parameters are proposed that reduce average packet delay and, thus, maximize performance.EThOS - Electronic Theses Online ServiceGBUnited Kingdo

    On a Joint Physical Layer and Medium Access Control Sublayer Design for Efficient Wireless Sensor Networks and Applications

    Get PDF
    Wireless sensor networks (WSNs) are distributed networks comprising small sensing devices equipped with a processor, memory, power source, and often with the capability for short range wireless communication. These networks are used in various applications, and have created interest in WSN research and commercial uses, including industrial, scientific, household, military, medical and environmental domains. These initiatives have also been stimulated by the finalisation of the IEEE 802.15.4 standard, which defines the medium access control (MAC) and physical layer (PHY) for low-rate wireless personal area networks (LR-WPAN). Future applications may require large WSNs consisting of huge numbers of inexpensive wireless sensor nodes with limited resources (energy, bandwidth), operating in harsh environmental conditions. WSNs must perform reliably despite novel resource constraints including limited bandwidth, channel errors, and nodes that have limited operating energy. Improving resource utilisation and quality-of-service (QoS), in terms of reliable connectivity and energy efficiency, are major challenges in WSNs. Hence, the development of new WSN applications with severe resource constraints will require innovative solutions to overcome the above issues as well as improving the robustness of network components, and developing sustainable and cost effective implementation models. The main purpose of this research is to investigate methods for improving the performance of WSNs to maintain reliable network connectivity, scalability and energy efficiency. The study focuses on the IEEE 802.15.4 MAC/PHY layers and the carrier sense multiple access with collision avoidance (CSMA/CA) based networks. First, transmission power control (TPC) is investigated in multi and single-hop WSNs using typical hardware platform parameters via simulation and numerical analysis. A novel approach to testing TPC at the physical layer is developed, and results show that contrary to what has been reported from previous studies, in multi-hop networks TPC does not save energy. Next, the network initialization/self-configuration phase is addressed through investigation of the 802.15.4 MAC beacon interval setting and the number of associating nodes, in terms of association delay with the coordinator. The results raise doubt whether that the association energy consumption will outweigh the benefit of duty cycle power management for larger beacon intervals as the number of associating nodes increases. The third main contribution of this thesis is a new cross layer (PHY-MAC) design to improve network energy efficiency, reliability and scalability by minimising packet collisions due to hidden nodes. This is undertaken in response to findings in this thesis on the IEEE 802.15.4 MAC performance in the presence of hidden nodes. Specifically, simulation results show that it is the random backoff exponent that is of paramount importance for resolving collisions and not the number of times the channel is sensed before transmitting. However, the random backoff is ineffective in the presence of hidden nodes. The proposed design uses a new algorithm to increase the sensing coverage area, and therefore greatly reduces the chance of packet collisions due to hidden nodes. Moreover, the design uses a new dynamic transmission power control (TPC) to further reduce energy consumption and interference. The above proposed changes can smoothly coexist with the legacy 802.15.4 CSMA/CA. Finally, an improved two dimensional discrete time Markov chain model is proposed to capture the performance of the slotted 802.15.4 CSMA/CA. This model rectifies minor issues apparent in previous studies. The relationship derived for the successful transmission probability, throughput and average energy consumption, will provide better performance predictions. It will also offer greater insight into the strengths and weaknesses of the MAC operation, and possible enhancement opportunities. Overall, the work presented in this thesis provides several significant insights into WSN performance improvements with both existing protocols and newly designed protocols. Finally, some of the numerous challenges for future research are described

    Modélisation et évaluation des délais de bout-en-bout dans les réseaux de capteurs

    Get PDF
    In this thesis, we propose an approach that combines both measurements and analytical approaches for infering a Markov chain model from the MAC protocol execution traces in order to be able to estimate the end to end delay in multi-hop transmission scenarios. This approach allows capturing the main features of WSN. Hence, a suitable Markov chain for modellingthe WSN is infered. By means of an approach based on frequency domain analysis, end to end delay distribution for multi-hop scenarios is found.This is an important contribution of our approach with regard to existing analytical approaches where the extension of these models for considering multi-hop scenarios is not possible due to the fact that the arrival distribution to intermediate nodes is not known. Since local delay distribution for each node is obtained by analysing the MAC protocol execution traces for a given traffic scenario, the obtained model (and therefore, the whole end to end delay distribution) is traffic-dependant. In order to overcome this problem, we have proposed an approach based on non-linear regression techniques for generalising our approach in terms of the traffic rate. Results were validated for different MAC protocols (X-MAC, ContikiMAC, IEEE 802.15.4) as well as a well-known routing protocol (RPL) over real test-beds (IOT-LAB).Dans cette thèse, nous proposons une novelle approche pour modéliser et estimer les délais de bout-en-bout dans les réseaux de capteurs sans-fil (WSN). Notre approche combine les approches analytiqueet expérimentale pour inférer un modèle Markovien modélisant le comportement d'un protocole de contrôle d'accès au médium (MAC) exécuté sur les noeuds d'un réseau de capteurs.A partir de ce modèle Markovien, le délai de bout en bout est ensuite obtenu par une approche analytique basée sur une analyse dans le domaine fréquentiel pour calculer la probabilité de distribution de délais pour un taux d'arrivée spécifique. Afin d’obtenir une estimation du délai de bout en bout, indépendamment du trafic en entrée, la technique de régression non-linéaire est utilisée à un ensembled’échantillons limités. Cette approche nous a permis de contourner deux problèmes: 1) la difficulté d'obtenir un modèle Markovien du comportement d’un protocole MAC en tenant compte son implémentation réelle, 2) l'estimation du délai de bout-en-bout d’un WSN multi-sauts. L'approche a été validée sur un testbed réel (IOT-LAB) et pour plusieurs protocoles (X-MAC, ContikiMAC, IEEE 802.15.4) ainsi que pour un protocole de routage (RPL)

    Product and ratio of generalized fading variables and applications in the performance of communication systems

    Get PDF
    Orientador: Michel Daoud YacoubTese (doutorado) - Universidade Estadual de Campinas, Faculdade de Engenharia Eletrica e de ComputaçãoResumo: O resumo poderá ser visualizado no texto completo da tese digitalAbstract: The abstract is available with the full electronic documentDoutoradoTelecomunicações e TelemáticaDoutor em Engenharia Elétric

    Performance analysis of the carrier-sense multiple access protocol for future generation wireless networks

    Get PDF
    Ankara : The Department of Electrical and Electronics Engineering and the Graduate School of Engineering and Science of Bilkent University, 2013.Thesis (Ph. D.) -- Bilkent University, 2013.Includes bibliographical references leaves 115-127.Variants of the carrier-sense multiple access (CSMA) protocol has been employed in many communications protocols such as the IEEE 802.11 and Ethernet standards. CSMA based medium access control (MAC) mechanisms have been recently proposed for other communications scenarios such as sensor networks and acoustical underwater networks. Despite its widespread use, the performance of the CSMA protocol is not well-studied from the perspective of these newly encountered networking scenarios. We here investigate the performance of the CSMA protocol from the point of three different aspects: throughput in networks with large propagation delay, short-term fairness for delay sensitive applications in large networks and energy efficiency-throughput trade-off in networks with battery operated devices. Firstly, we investigate the performance of the CSMA protocol for channels with large propagation delay. Such channels are recently encountered in underwater acoustic networks and in terrestrial wireless networks covering larger areas. However, a mathematical model of CSMA performance in such networks is not known. We propose a semi-Markov model for a 2-node CSMA channel and then extend this model for arbitrary number of users. Using this model, we obtain the optimum symmetric probing rate that achieves the maximum network throughput as a function of the average propagation delay, ¯d, and the number of nodes sharing the channel, N. The proposed model predicts that the total capacity decreases with ¯d −1 as N goes to infinity when all nodes probe the channel at the optimum rate. The optimum probing rate for each node decreases with 1/N and the total optimum probing rate decreases faster than ¯d −1 as N goes to infinity. Secondly, we investigate whether the short-term fairness of a large CSMA network degrades with the network size and density. Our results suggest that (a) the throughput region that can be achieved within the acceptable limits of shortterm fairness reduces as the number of contending neighboring nodes increases for random regular conflict graphs, (b) short-term fair capacity weakly depends on the network size for a random regular conflict graph but a stronger dependence is observed for a grid topology. We also present related results from the statistical physics literature on long-range correlations in large systems and point out the relation between these results and short-term fairness of CSMA systems. Thirdly, we investigate the energy efficiency of a CSMA network proposing a model for the energy consumption of a node as a function of its throughput. We show that operating the CSMA network at a very high or at a very low throughput is energy inefficient because of increasing carrier-sensing and sleeping costs, respectively. Achieving a balance between these two opposite operating regimes, we derive the energy-optimum carrier-sensing rate and the energy-optimum throughput which maximize the number of transmitted bits for a given energy budget. For the single-hop case, we show that the energy-optimum total throughput increases as the number of nodes sharing the channel increases. For the multi-hop case, we show that the energy-optimum throughput decreases as the degree of the conflict graph of the network increases. For both cases, the energy-optimum throughput reduces as the power required for carrier-sensing increases. The energy-optimum throughput is also shown to be substantially lower than the maximum throughput and the gap increases as the degree of the conflict graph increases for multi-hop networks.Köseoğlu, MehmetPh.D
    corecore