7 research outputs found

    Control-theoretic adaptive mechanisms for performance optimization of IEEE 802.11 WLANs: design, implementation and experimental evaluation

    Get PDF
    The media access control (MAC) layer of the IEEE 802.11 standard specifies a set of parameters that regulate the behavior of the wireless stations when accessing the channel. Although the standard defines a set of recommended values for these parameters, they are statically set and do not take into account the current conditions in the wireless local area network (WLAN) in terms of, e.g., number of contending stations and the traffic they generate, which results in suboptimal performance. In this thesis we propose two novel control theoretic approaches to optimally configure the WLAN parameters based on the dynamically observed network conditions: a Centralized Adaptive Control (CAC) algorithm, whereby the access point (AP) computes the con guration that maximizes performance and signals it to the active stations, and a Distributed Adaptive Control (DAC) algorithm, which is independently employed by each station with the same goal. In contrast to previous proposals, which are mostly based on heuristics, our approaches build upon (i) analytical models of the WLAN performance, used to derive the optimal point of operation of the IEEE 802.11 protocol, and (ii) mathematical foundations from single- and multi-variable control theory, used to design the mechanisms that drive the WLAN to this point of operation. Another key advantage of the proposed algorithms over existing approaches is that they are compliant with the IEEE 802.11 standard and can be implemented with current wireless cards without introducing any modifications into their hardware and/or firmware. We show by means of an exhaustive performance evaluation study that our algorithms maximize the WLAN performance in terms of throughput and delay under a wide set of network conditions, substantially outperforming the standard recommended configuration as well as previous adaptive proposals. Finally, we present our experiences with implementing the proposed adaptive algorithms in a real IEEE 802.11 testbed and discuss the implementation details of the building blocks that comprise these mechanisms. We evaluate their performance by conducting extensive measurements, considering different network conditions in terms of number of nodes, transmission power employed and tra c generated. Based on the obtained results, we provide valuable insights on the performance of the distributed and centralized algorithms and discuss the suitability of these schemes for real deployments. ------------------------------------------------------------------------------------------------------------------------------------------------------------------------El nivel MAC (Media Access Control) del estándar IEEE 802.11 especifica una serie de parámetros que definen el comportamiento de las estaciones inalámbricas cuando acceden al canal. En dicho estándar se define un conjunto de valores recomendados para estos parámetros, si bien estos valores, constantes, no tienen en cuenta las condiciones de la red inalámbrica -en términos de, por ejemplo, número de estaciones o tráfico cursado- por lo que resultan en un rendimiento subóptimo. En esta tesis se proponen dos nuevos algoritmos para configurar de forma óptima estos parámetros partiendo de las condiciones observadas de la red. Dichos algoritmos, construidos sobre la base de la teoría de control, son los siguientes: CAC (Centralized Adaptive Control), que se ejecuta en el punto de acceso, el cual distribuye la configuración a usar al resto de estaciones; y DAC (Distributed Adaptive Control), ejecutado por cada estación de la red inalámbrica de forma independiente. A diferencia de las propuestas anteriores, casi todas ellas basada en heurísticos, los algoritmos se basan en (i) un modelo analítico del rendimiento de la red inalámbrica, necesario para obtener el punto de operación óptimo de la red; y (ii) fundamentos matemáticos de la teoría de control mono y multivariable, aplicados para diseñar el mecanismo que lleva la red a dicho punto de operación. Otra ventaja de los esquemas propuestos frente al trabajo previo es que son compatibles con el estándar IEEE 802.11, y pueden ser implementados sobre las tarjetas existentes sin necesidad de cambiar el hardware o el firmware. Mediante una extensa evaluación de rendimiento bajo diversas condiciones, se comprueba que los algoritmos maximizan las prestaciones de la red tanto en ancho de banda como en retardo, mejorando notablemente los resultados proporcionados por la configuración recomendada en el estándar así como por propuestas dinámicas anteriores. Por último, se presentan las experiencias del prototipado de dichos algoritmos sobre dispositivos IEEE 802.11, discutiendo los detalles de implementación de sus diferentes bloques. Se evalúan las prestaciones de los mismos mediante una extensa serie de experimentos, incluyendo diferentes escenarios en términos del número de nodos, potencia de transmisión usada y tráfico generado. Los resultados obtenidos permiten extraer valiosas conclusiones sobre el rendimiento de los esquemas adaptativos centralizados y distribuidos, así como la viabilidad de su despliegue en escenarios reales

    A control theoretic approach for throughput optimization in IEEE 802.11e EDCA WLANs

    Get PDF
    The MAC layer of the 802.11 standard, based on the CSMA/CA mechanism, specifies a set of parameters to control the aggressiveness of stations when trying to access the channel. However, these parameters are statically set independently of the conditions of the WLAN (e.g. the number of contending stations), leading to poor performance for most scenarios. To overcome this limitation previous work proposes to adapt the value of one of those parameters, namely the CW, based on an estimation of the conditions of the WLAN. However, these approaches suffer from two major drawbacks: i) they require extending the capabilities of standard devices or ii) are based on heuristics. In this paper we propose a control theoretic approach to adapt the CW to the conditions of the WLAN, based on an analytical model of its operation, that is fully compliant with the 802.11e standard. We use a Proportional Integrator controller in order to drive the WLAN to its optimal point of operation and perform a theoretic analysis to determine its configuration. We show by means of an exhaustive performance evaluation that our algorithm maximizes the total throughput of the WLAN and substantially outperforms previous standard-compliant proposals.European Community's Seventh Framework ProgramThe work described in this article has been partially supported by the European Community’s Seventh Framework Programme under the ICT FP7 Integrated Project CARMEN (INFSO-ICT-214994) and by the Spanish Government under the POSEIDON project (TSI2006-12507-C03).Publicad

    Optimal Configuration of 802.1e EDCA for Real-Time and Data Traffic

    Get PDF
    The enhanced distributed channel access (EDCA) mechanism of the IEEE 802.11e standard provides quality-of-service (QoS) support through service differentiation by using different medium-access-control (MAC) parameters for different stations. The configuration of these parameters, however, is still an open research challenge, as the standard provides only a set of fixed recommended values that do not take into account the current wireless local area network (WLAN) conditions and, therefore, lead to suboptimal performance. In this paper, we propose a novel algorithm for EDCA that, given the throughput and delay requirements of the stations that are present in the WLAN, computes the optimal configuration of the EDCA parameters. We first present a throughput and delay analysis that provides the mathematical foundation upon which our algorithm is based. This analysis is validated through simulations of different traffic sources (both data and real time) and EDCA configurations. We then propose a mechanism to derive the optimal configuration of the EDCA parameters, given a set of performance criteria for throughput and delay. We assess the effectiveness of the configuration provided by our algorithm by comparing it against 1) the recommended values by the standard, 2) the results from an exhaustive search over the parameter space, and 3) previous configuration proposals, which are both standard and nonstandard compliant. Results show that our configuration outperforms all other approaches.European Community's Seventh Framework ProgramThis work was supported in part by the European Community’s Seventh Framework Program (FP7/2007-2013) under Grant Agreement 214994.Publicad

    Performance assessment of open software platforms for 5G prototyping

    Get PDF
    Given the urgency of standardizing the fifth generation (5G) mobile systems to meet the ever more stringent demands of new applications, the importance of field trials and experimentation cannot be overstated. Practical experimentation with cellular networks has been historically reserved exclusively to operators, primarily due to equipment costs and licensing constraints. The state of play is changing with the advent of open source cellular stacks based on increasingly more affordable software defined radio (SDR) systems. However, comprehensive understanding of the performance, limitations, and interoperability of these tools is lacking. In this article we fill this gap by assessing, by means of controlled experiments, the performance of today's most popular open software eNB solutions in combination with different commodity UE and an SDR alternative, over a range of practical settings. Although these cannot underpin complete 5G systems yet, their development is progressing rapidly, and researchers have employed them for 5G-specific applications including LTE unlicensed and network slicing. We further shed light on the perils of open tools and give configuration guidelines that can be used to deploy these solutions effectively. Our results quantify the throughput attainable with each stack, their resource consumption footprint, and their reliability and bootstrap times in view of automating experimentation. Lastly, we qualitatively evaluate the extensibility of the solutions considered.The work of P. Serrano was partially supported by the European Commission in the framework of the H2020 5G-PPP 5G-MoNArch project (grant agreement no. 761445) and by the Madrid Regional Government through the TIGRE5-CM program (S2013/ICE-2919)

    Prospective observational cohort study on grading the severity of postoperative complications in global surgery research

    Get PDF
    Background The Clavien–Dindo classification is perhaps the most widely used approach for reporting postoperative complications in clinical trials. This system classifies complication severity by the treatment provided. However, it is unclear whether the Clavien–Dindo system can be used internationally in studies across differing healthcare systems in high- (HICs) and low- and middle-income countries (LMICs). Methods This was a secondary analysis of the International Surgical Outcomes Study (ISOS), a prospective observational cohort study of elective surgery in adults. Data collection occurred over a 7-day period. Severity of complications was graded using Clavien–Dindo and the simpler ISOS grading (mild, moderate or severe, based on guided investigator judgement). Severity grading was compared using the intraclass correlation coefficient (ICC). Data are presented as frequencies and ICC values (with 95 per cent c.i.). The analysis was stratified by income status of the country, comparing HICs with LMICs. Results A total of 44 814 patients were recruited from 474 hospitals in 27 countries (19 HICs and 8 LMICs). Some 7508 patients (16·8 per cent) experienced at least one postoperative complication, equivalent to 11 664 complications in total. Using the ISOS classification, 5504 of 11 664 complications (47·2 per cent) were graded as mild, 4244 (36·4 per cent) as moderate and 1916 (16·4 per cent) as severe. Using Clavien–Dindo, 6781 of 11 664 complications (58·1 per cent) were graded as I or II, 1740 (14·9 per cent) as III, 2408 (20·6 per cent) as IV and 735 (6·3 per cent) as V. Agreement between classification systems was poor overall (ICC 0·41, 95 per cent c.i. 0·20 to 0·55), and in LMICs (ICC 0·23, 0·05 to 0·38) and HICs (ICC 0·46, 0·25 to 0·59). Conclusion Caution is recommended when using a treatment approach to grade complications in global surgery studies, as this may introduce bias unintentionally

    The surgical safety checklist and patient outcomes after surgery: a prospective observational cohort study, systematic review and meta-analysis

    Get PDF
    © 2017 British Journal of Anaesthesia Background: The surgical safety checklist is widely used to improve the quality of perioperative care. However, clinicians continue to debate the clinical effectiveness of this tool. Methods: Prospective analysis of data from the International Surgical Outcomes Study (ISOS), an international observational study of elective in-patient surgery, accompanied by a systematic review and meta-analysis of published literature. The exposure was surgical safety checklist use. The primary outcome was in-hospital mortality and the secondary outcome was postoperative complications. In the ISOS cohort, a multivariable multi-level generalized linear model was used to test associations. To further contextualise these findings, we included the results from the ISOS cohort in a meta-analysis. Results are reported as odds ratios (OR) with 95% confidence intervals. Results: We included 44 814 patients from 497 hospitals in 27 countries in the ISOS analysis. There were 40 245 (89.8%) patients exposed to the checklist, whilst 7508 (16.8%) sustained ≥1 postoperative complications and 207 (0.5%) died before hospital discharge. Checklist exposure was associated with reduced mortality [odds ratio (OR) 0.49 (0.32–0.77); P\u3c0.01], but no difference in complication rates [OR 1.02 (0.88–1.19); P=0.75]. In a systematic review, we screened 3732 records and identified 11 eligible studies of 453 292 patients including the ISOS cohort. Checklist exposure was associated with both reduced postoperative mortality [OR 0.75 (0.62–0.92); P\u3c0.01; I2=87%] and reduced complication rates [OR 0.73 (0.61–0.88); P\u3c0.01; I2=89%). Conclusions: Patients exposed to a surgical safety checklist experience better postoperative outcomes, but this could simply reflect wider quality of care in hospitals where checklist use is routine

    Critical care admission following elective surgery was not associated with survival benefit: prospective analysis of data from 27 countries

    Get PDF
    This was an investigator initiated study funded by Nestle Health Sciences through an unrestricted research grant, and by a National Institute for Health Research (UK) Professorship held by RP. The study was sponsored by Queen Mary University of London
    corecore