• Save
Ieee 802.11 distributed coordination function with exponential increase exponential decrease back
Upcoming SlideShare
Loading in...5
×

Like this? Share it with your network

Share
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
No Downloads

Views

Total Views
467
On Slideshare
467
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
0
Comments
0
Likes
1

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Enhancement of IEEE 802.11 Distributed Coordination Function with Exponential Increase Exponential Decrease Backoff Algorithm Nai-Oak Song, ByungJae Kwak, Jabin Song, Leonard E. Miller Advanced Network Technologies Division National Institute of Standards and Technology, MD, USA Emial:{nsong, bjkwak, jabin, Imiller} @antd.nist.gov Abstract- A new backoff algorithm is proposed to enhance the performance of the IEEE 802.11 Distributed Caordination Function (DCF) which employs Binary Exponential Backoff (BEB) algorithm. The proposed algorithm, called the Exponen- tial Increase Exponential Decrease (EIED) backoffalgorithm, is quite simple to implement while significantlyimproving the net- work performance over BEB. Another hackoff algorithm d e d Multiple Increase Linear Decrease (MILD) backoff algorithm is S:ruccerr Ciollirim considered for performance comparison. The simulation results show that ElED outperforms BEB and MILD in terms of both ~ i I. ~ Backoff mechanism of BEB: CW,;. . = 16. CW,, = 1024. throughput and delay. The performance gain of ElED comes m = 7. from successfully balancing the two extreme backoff policies of BEB and MILD. lnder Tcms- Wireless LAN, DCF, Binary Exponential Back- to the minimum after a successful transmission, or when the off, EIED, MILD. total number of transmission attempts for a packet reaches the limit m (m = 7 for basic access mechanism and 1. INTRODUCTION m = 4 for the Request-To-SeluVClear-To-Send (RTS/CTS) Combined with wireless communication technologies such exchange mechanism). However, the contention window as Wireless LAN (IEEE 802.1 I), Bluetooth, and HIPERLAN, resetting mechanism causes a very large variation of the powerful notebook computers and PDAs have created a new contention window size, and degrades the performance of mobile computing environment. Because of its already well a network when it is heavily loaded since each new packet established market acceptance, IEEE 802.1 I is the most suc- starts with the minimum contention window, which can he too cessful among the above mentioned wireless communication small for the heavy network load. Fig. I illustrates the backoff standards. The Distributed Coordination Function (DCF) is mechanism of BEB, where CW,,,j. = 16 and CW,, = 1024 the fundamental access mechanism in IEEE 802.1 I Medium (m = 7). To resolve the problem of BEB, 121 proposed a Access Control (MAC) while the Point Coordination Func- backoff algorithm known as MILD (Multiple Increase Linear tion (PCF) used optionally [I].In DCE Binary Exponential Decrease), where the contention window size is multiplied is Backoff (BEB)’ is employed as a stability strategy to share by 1.5 on a collision but decreased by 1 on a successful the medium. At the first transmission attempt of a packet, transmission as follows: BEB selects a random slot from the next CW = CW,i, CW = min[l.5. CW, CW,,,] on a collision, (2) slots with equal probability for transmission, where CWmin is the minimum contention,window size. Every time a node’s CW = max[CW - 1,CW,,i.] on a success. (3) packet is involved in a collision, the contention window size MILD performs well when the network load is steadily heavy. for that node is doubled up to its maximum CW,, that is, However, this extremely conservative transmission policy has CW = min[2 . CW, CW,,] (1) its shortcomings: MILD does not perform well when the network load is light because it takes quite long time to and the new contention window is used for the following recover from the backoff caused by occasional collisions. transmission attempt. A node resets its contention window Furthermore, when the number of active nodes changes ‘In IEEE 802.1 I. a tnincaled BEB is used. Many papen refer to this sharply from high to low, MILD cannot adjust its CW truncated version as BEB. We follow the convention in this paper. fast enough because its “linear decrease” mechanism. For0-7803-7757-51031$17.~OZW3 lF€E 2775
  • 2. example. when CW,i, = 16 and CW,, = 1024 (IEEE802.1 I using Frequency-Hopping spread spectrum (FHSS)physical layer (PHY)). it takes a maximum of 1008successfultransmissions for MILD to reach CW,i,. Another extreme isBEB, which takes only one successful transmission to reachCWmi,. There are also other contention resolution mechanisms Ccollirioo S.(UCCC~Sproposed to improve the network performance of IEEE802.1 I DCF. However, most of them require exchange of Fig. 2. Backoff mechanism of EIED: CW.,jn = 16. C W ,, = 1024.information between nodes and complicated computation [3], I = 2. T D = A. ,[4], [ 5 ] . Those algorithms are not considered and we consideronly acknowledgment based backoff algorithms [6]. In thispaper, an exponential increase exponential decrease (EIED) InterFrame Space (EIFS). Since the number of transmissionbackoff algorithm is proposed to enhance the the performance retries is bounded by m, a packet must be dropped after mof the IEEE 802.1 I DCF. EIED is as simple as BEB to transmission retries, that is, after experiencing m times ofimplement while significantly improving the performance of packet collision.IEEE 802. I I DCF, This paper is organized as follows. First, we briefly de- 111. EIED, THE PROPOSED ALGORITHMscribe the DCF of the IEEE 802.1 l MAC in Section 11. The As explained in Section 11, the IEEE 802.1 I DCF employsproposed backoff algorithm. EIED, is presented in Section BEB as a stability strategy to share the medium. But its111. Then, in Section IV the performance of EIED is evaluated contention window resetting mechanism degrades the perfor-through simulation and compared with BEB and MILD. mance of a network. In this section, we propose EIED backoffFinally, we conclude this paper in Section V. algorithm, where the contention window size is increased and decreased exponentially on collision and successful transmis- 11. IEEE 802.1 I DCF sion, respectively, to enhance the performance of the IEEE DCF is the fundamental access mechanism in the IEEE 802.11 DCE802.1 I MAC. In this section we will briefly describe the In EIED, whenever a packet transmitted from a node isbasic access mechanism of DCF. involved in a collision, the contention window size for the When a node (station) receives a packet to transmit, if node is increased by backoff factor rr. and the contentionthe node senses the medium has been idle for a period window for the node is decreased by backoff factor PD ifof time longer than or equal to a Distributed InterFrame the node transmits a packet successfully. The EIED backoffSpace (DIFS), the packet transmission may begin at the algorithm can be represented as follows.beginning of the immediately following slot. Otherwise, thenode should defer the packet transmission as follows. The CW = min[rr .CW,CW,,] on a collision,node waits until the medium is idle for a DIFS and then CW = max[CW/rD,CW,i,] on a success.sets its backoff timer. The backoff timer is set to a valuewhich is randomly selected fmm 0,1,. .- ,CW - 1 with As shown in the simulation results below, the performanceequal probability, where CW represents contention window of EIED is affected by the choice of the values of and T D . In this paper, we fully exploit the degrees of freedomsize. Initially, contention window size is set to its minimum of EIED to obtain a better performance. Fig. 2 illustrates theCW,i. for the first transmission attempt of a packet. Everytime the packet is involved in a collision, contention window backoff mechanism of EIED with rr = 2 and r D = d. Asize is doubled for the next transmission attempt. However, special case of our proposed scheme with rr = rD = 2 wasthe contention window size cannot exceed its maximum presented in (71,where the throughput was compared withCW,,. The backoff timer is decreased by I evety slot time BEB in IEEE 802.1I DCF under saturation condition. Note that it takes maximum 12 successful transmission for EIED(50 psec for FHSS PHY) after the medium has been idle fora DIFS, but is frozen when the medium becomes busy, When with T r = 2 and T D = fi to reach CW,,. in the abovethe backoff timer becomes zero, the station transmits the example.packet. If the destination node receives the packet correctly, itsends a positive acknowledgment (ACK) packet after a Shori IV. SIMULATIONInterFrame Space (SIFS). When the source node does not The Wireless LAN model of the network simulator OP-receive an ACK, it assumes the packet has experienced a col- NET 8.1.A was used for the performance comparison oflision and updates the contention window size CW according BEB, MILD, and EIED. The normalized throughput withto BEB algorithm as described above, then sets its backoff respect to the channel capacity, and delay defined as thetimer to a newly selected backoff values after a Extended time from the moment a packet is placed in a queue until 2776
  • 3. (b) DelayFig. 3. Simulation results: normalized throughput and delay with respect to padel mival rate [packetslssec]. N = 5,10,40,60. 2777
  • 4. the beginning of its successful transmission were used as the V. CONCLUSIONperformance we the performance when In this paper, we proposed a new backoff algorithm (EIED)the basic access mechanism with FHSS PHY was used, where enhance the performmce of IEEE 802.11 DCF, TheCW,i, = 16, CW,, = 1024. m = 7. Fig. 3 shows the performance of EIED was compared with BEB and MILDsimulation results for number of nodes N = 5, 10.40, and 60 using O ~ N E Tnetwork simu~ator, ne simulation resultsfor various system wide packet arrival rates from 10 to 160 show that EIED outperforms BEB and MILD in terms of bothpacketdsec. Thus the number of nodes combined with the throughput and delay. The performance gain of comespacket arrival rate is defined as the offered load. w e assumed from successfully balancing the two extreme backoff policiesthat packets =e 1024 bytes long and the arrival process of BEB and MILD. BEB does not use the collision historyis Poisson. BEB and MILD are compared with four different of the previous packe& and reduces cw too fast making itcases of EIED: not suitable for network under heavy load (large N ) . On the (1) rr = 2, T D = z/* other hand, MILDS linear decrease policy is too conservative (2) = 2, TD = zil4 especially when N is small. EIED is highly customizable by (3) T I = T D = 2 f i parameters TI and TD. Simulation results show that EIED (4) T I = T D = 2 with relatively smaller value of T~ compared to the value of " has higher performance gain The figure shows that when the packet arrival rate is low(approximately < 80 packetdsec), all three backoff mecha-nisms have almost the same throughput which is proportional REFERENCESto the arrival rate, regardless of the number of nodes. The [ I ] IEEE 802 P a n 11: Wirrlvsr U N M e d i u r n Access Conlml (MAC) m dfour cases of EIED always give higher throughput than BEB. Phyriral Lover (PHYj sprci/iratiom. IEEE Std.. 1999. [21 v, Bhargha"an, A. Demen, s. she*r. and L, Zhang. "MAC-w:When the number of nodes is small, the performance of BEB A ACCO~~ pmtaoI for Wireless LANs: in ~ m c ACM SIG- .is almost as good as that of EIED, but as the number of COMM94. London. England, 1 9 . pp. 212-225. 94nodes increases the performance differences also increase, 131 G. Bianchi. L. Fratta. and M. Oliveri. "Pelfomance Evaluation and Enhancement of the CSMNCA MAC Pmtaol for 8M.11 WirelessAs a result, the throughput of BEB iS Only about 213 Of that LAN~: in pmr. piMRC96. Taipei. ~ a i w a n Oct. 19%. pp. 392-3%. .of the first two cases of EIED for N = 60. The throughput 141 F. Cali. M. Conti. and E. Fregori. "Dynamic Tuning ofthe IEEE 802.11of MILD is very low when the network load is light ( N = 5 ) Frolaol to Achieve a Theoretical Throughput Limil," IEEWACM T h s . Nerworking. vol. 8. no. 6. pp. 785-799. Dec. 2000.as expected. However. it becomes higher as the number of [SI D. Qiao and K. G.Shin. "UMAV: A Simple Enhancement to the EEEnodes increases and its performance is on a par with EIED 802.11 DCF." in PNC Ihr 36lh Hawaii lnamnrio,ml CoBferencr onwith " = 2 T D = 211a for = 40 For even higher (HICSS-36). Hawaii. Jan. 2003. Sy.mm S c i m c ~ s 161 F. P. Kelly and I. M. McPhee. T h e Number of Packets Transmillednumber of nodes ( N = 60). MILD yields only slightly higher by Collision Detect Random A C C ~ S SSchemes," Annals of Pmbabiliry.throughput than Elm. vol. IS. pp. 1557-1568. 1987. As in the case of throughput, for all N , all EIEDs have 171 H. WU. s. Chew. y Pen& K. L O W and J . Ma. K E E 802.11 . Dist6baed Cwrdination Function (DCF): Analysis and Enhancement:smaller delays than BEB for a[[arrival rates, and outperforms in pmC. I C C Z ~N~~ yo*. 2 ~ pp, .605409, ~ .MILD for most of the arrival rates. The delay performanceof MILD is especially poor when the number of nodes issmall. The poor delay performances of BEB and MILD occurfor different reasons. The delay performance of BEB suffersfrom packet collisions which cause more retransmissions.Thus, the delay performance of BEB is worse when there aremore contending nodes (more collisions). On the other hand,the delay performance of MILD suffers from the excessivebackoff, and thus the performance of MILD is worse whenthere are smaller number of nodes where even occasionalcollisions could c a w unnecessarily large backoff. 2778