Paper Menu >>
Journal Menu >>
![]() I. J. Communications, Network and System Sciences, 2008, 4, 285-385 Published Online November 2008 in SciRes (http://www.SciRP.org/journal/ijcns/). Copyright © 2008 SciRes. I. J. Communications, Network and System Sciences, 2008, 4, 285-385 Improving Throughput in Wireless Local Area Networks Imam AL-WAZEDI, Anjali AGARWAL, Ahmed K. ELHAKEEM Department of Electrical and Computer Engineering, Concordia University, Montreal, Quebec, Canada Email: i_alwaze@encs.concordia.ca, {aagarwal,ahmed}@ece.concordia.ca Received September 6, 2008; revised October 16, 2008; accepted October 21, 2008 Abstract The medium access control (MAC) technique of standard WLANs, called the distributed coordination function (DCF), is carrier sense multiple access based on collision avoidance (CSMA/CA) scheme with binary slotted exponential backoff. It has a two way handshaking technique for packet transmission and also defines an additional four way handshaking technique called RTS/CTS mechanism, which is used to reduce the hidden terminal problem. The RTS/CTS frames carry the information of the packet length to be transmitted which can be read by any listening stations, to update a network allocation vector (NAV) about the information of the period of time in which the channel is busy. In this paper a method is proposed called the table driven technique (which has two parts called table driven DCF and table driven RTS/CTS) which is similar to the standard DCF (IEEE802.11) and RTS/CTS (IEEE802.11) system without having the exponential backoff. In this technique users use the optimum transmission probability by estimating the number of stations from the traffic conditions in a sliding window fashion one period at a time, thereby increasing the throughput compared to the standard DCF (IEEE802.11) and RTS/CTS (IEEE802.11) mechanism while maintaining the same fairness and the delay performance. Keywords: Standard DCF (IEEE802.11), Standard RTS/CTS (IEEE802.11), Table Driven DCF, Table Driven RTS/CTS 1. Introduction Wireless local area networks (WLANs) have been widely deployed for the past decade. Their performance has been the subject of intensive research. In [1] an improvement of throughput and fairness is shown by optimizing the backoff without estimating the number of active nodes in the network. In [2], the authors proposed a MAC layer based WLAN technique in which they gave higher priority to access points so as to improve the throughput and the channel utilization. A technique is proposed where the backoff is tuned based on collision avoidance and fairness to improve the channel utilization [3]. In [5] a DCF model is proposed where the arrival and the service of the packets in the queue are controlled to improve the throughput and delay performance. Cali in [6] pointed out that depending on the network configuration, DCF may deliver a much lower throughput compared to the theoretical limit. Cali derived a distributed algorithm that enables the stations to tune its backoff at run time where a considerable improvement in the throughput is shown. In [7] a contention based MAC protocol named fast collision resolution is presented where the backoff is also utilized. A model named DCF+ in [8] is proposed which uses the backoff to improve the fairness. It is evident that the throughput, delay, fairness performances are improved by tuning the backoff in different scenarios considered by the authors in [1–8]. RTS/CTS mechanism with (NAV) is used solve the hidden terminal problem. In [9] Khurana proposed a concept of Hearing graph to model the hidden terminals in static environment and analyzed the performance. Also in [11] Fullmer, proposed a three way handshaking technique to solve the hidden terminal problems of single channel WLANs. However our paper does not concentrate on the hidden terminals but contributes on a modification of the standard DCF and standard RTS/CTS mechanisms. In this paper table driven DCF and table driven RTS/CTS systems are proposed, which are similar to IEEE 802.11 (Both DCF and RTS/CTS) standards without, ![]() 308 I. AL-WAZEDI ET AL. Copyright © 2008 SciRes. I. J. Communications, Network and System Sciences, 2008, 4, 285-385 the use of the exponential backoff. In table driven DCF and table driven RTS/CTS the users estimate the number of active stations and transmit with an optimum probability measured from the traffic conditions (by sensing the channel) in a sliding window fashion, which is described elaborately later on. Simulation results show that our systems out perform the standard in terms of throughput while maintaining same delay and fairness. 2. The IEEE 802.11 MAC Protocol Figure 1 shows one of many transmission scenarios possible with the IEEE 802.11 DCF mode. In this mode a node with a packet to transmit initializes a backoff timer with a random value selected uniformly from the range [0, CW-1], where CW is the contention window in terms of time slots. After a node senses that the channel is idle for an interval called DIFS (DCF interframe space), it begins to decrease the backoff timer by one for each idle time slot observed on the channel. When the channel becomes busy due to other nodes transmission ativity the node freezes its backoff timer until the channel is sensed idle for another DIFS. When the backoff timer reaches zero, the node begins to transmit. If the transmission is successful, the receiver sends back an acknowledgement (ACK) an interval called the SIFS. Then, the transmitter resets its CW to CW min . In case of collisions the transmitter fails to receive the ACK from its intended receiver within the specified period, it doubles its CW subject to maximum value CW max , chooses a new backoff timer, and starts the above processes again. In 802.11, DCF also provides a more efficient way of transmitting data frames that involves transmission of special Figure 1. IEEE 802.11 MAC mechanism. Figure 2. Standard RTS/CTS access mechanism in IEEE 802.11. short RTS and CTS frames prior to the transmission of actual data frame. As shown in Figure 2, an RTS frame is transmitted by a node, which needs to transmit a packet. When the destination receives the RTS frame, it will transmit a CTS frame after SIFS interval immediately following the reception of the RTS frame. The source station is allowed to transmit its packet only if it receives the CTS correctly. Note that all the other stations are capable of updating their knowledge about other nodes transmission duration by receiving a certain field in RTS, CTS, ACK, and packets transmission called network allocation vector (NAV). This helps to combat the hidden terminal problem. In fact, a node that is able to receive the CTS frames correctly, can avoid collisions even when it is unable to sense the data transmissions directly from the source station. If a collision occurs with two or more RTS frames, much less bandwidth is wasted when compared with the situations where larger data frames in collision, thus justifying the case for RTS, CTS mode of operation [4]. 3. Analysis of Table Driven DCF and Table Driven RTS/CTS Let p be the transmission probability of each node and M be the number of active stations. Assuming each user tries to transmit randomly in each slot following the DIFS period. According to table driven DCF (Figure 3) the probability of successful transmission, is thus given by Equation (1). 1 )1( − −= M s pMpP (1) The probability of an idle slot in table driven DCF is M o pP )1( −= (2) and the probability of unsuccessful transmission for table driven DCF is osc PPP −−=1 (3) Let i be the number of idle periods (cycles) before a successful transmission as shown in Figure 3 and j be the number of idle slots in each idle period lengths (W 1 ,W 2 ,…). The throughput ( 1 η ) is given by Equation (7) for table driven DCF. It is easily seen that the average length of each idle period except the last one before packet success in table driven DCF is given by ( ) ∑ ∞ = − ==== 1 121 )(...... jc j oL PPjjEWWW ( ) 2 1 o co P PP − = slots (4) which means Equation (4) determines the number of idle slots before a collision. The last idle period before a success, has an average of ( ) 2 1 o so L P PP W− =slots (5) RTS DIFS DATA SIFS Source Destination Other SIFS CTS SIFS ACK DIFS NAV (DATA) NAV (RTS) NAV (CTS) Defer Access CW Backoff Starts P ACKET T RANSMISSION SIFS ACK DIFS W IRELESS C HANNEL I DLE B ACKOFF S LOT I DLE B ACKOFF S LOT C OLLISION DIFS P ACKET T RANSMISSION … … . ![]() IMPROVING THROUGHPUT IN WIRELESS LOCAL AREA NETWORKS 309 Copyright © 2008 SciRes. I. J. Communications, Network and System Sciences, 2008, 4, 285-385 The average number of cycles (I) is given by, ∑ ∞ = = 1ii iPI ( ) 0 2 001 1 .......1. P P PPPPPcyclesofNoPwhere s sss − = +++== ( ) ( ) 2 0 0 2 0 0 0 0 2 1 ....... 111 2. P PP P P PP P P PP P P PcyclesofNoP sc s c s c s c − = − + − + − == () ( ) 3 0 2 2 1 3. P PP cyclesofNoP sc − == ( ) i s i c i P PP P 0 1 1− = − Therefore ( ) s o P P I− =1 (6) Let the number of collisions be C= I–1. This C and W L are calculated from different values of M and p which are stored in two different tables (not shown for space con- sideration). So for particular values of M and P there is a particular value of C and W L . The throughput for table driven DCF ( ) 1 η and table driven RTS/CTS ( ) 2 η are given in Equations (7) and (8) respectively based on the transmission activity on the wireless channel as shown in Figure 3. (a) (b) Figure 3. Transmission Activity on the Wireless Channel for (a) table driven DCF and (b) table driven RTS/CTS. (){ } SlotLPayloadSIFSACKDIFSDIFSSlotL Payload TWTTTTTITWWW T +++++−+++ = − )1(.. 121 1 η (7) () {} SlotLPayloadSIFSACKCTSRTSDIFSSIFSDIFSRTSSlotL Payload TWTTTTTTTTTITWWW T +++++++++−+++ = − 3)1(.. 121 2 η (8) (From DIFS start to end of packet success) Packet transmission SIFS ACK DIFS Idle Slots RTS Collision ............. ............. DIFS Idle Slots Packet transmission ....................... ... Current Transmission Period SIFS Previous Transmission Period Next T ransmission Period First Idle Period W 1 =3 RTS CTS Last Idle period before success W L Packet transmission SIFS ACK DIFS Idle Slots Collision ............. ............. DIFS Idle Slots Packet transmission ....................... ... Current Transmission Period SIFS P revious Transmission Period Next Transmission Period First Idle Period W 1 =3 Last Idle period before success W L ![]() 310 I. AL-WAZEDI ET AL. Copyright © 2008 SciRes. I. J. Communications, Network and System Sciences, 2008, 4, 285-385 The throughput 1 η (for table driven DCF) is calculated for different values of M and p as in Figure 4. Table 1 depicts the probabilities at which the maximum throughput occurs for different values of M. Similarly for the table driven RTS/CTS, to calculate the C and W L , Equations (1)–(6) are used. However the throughput is calculated from Equation (8) which includes the RTS/CTS frames (Figure 3). For the case of table driven RTS/CTS all cycles leading to no success (RTS heard but no CTS) will each have a cost of T RTS +T DIFS +T Slot seconds. 4. Operation of Table Driven Technique In the proposed protocol, if the nodes sense that the channel is idle for an interval called DIFS (DCF interframe space), they try to send a packet with a proba- bility p, which is dependent on the traffic condition i.e. the number and activities of the nodes, as follows. A user continuously monitors the channel in each idle slot following the DIFS idle period. If the previous slot is idle, it calls a uniform random generator (0,1). If the value 0.1 0.2 0.3 0.4 0.50.6 0.70.8 0.9 0.82 0.84 0.86 0.88 0.9 0.92 0.94 0.96 Probability of each transmitting station Throughput( η 1 ) M=1 M=2 M=3 M=4 M=5 M=6 M=7 M=8 M=9 M=10 Figure 4. Throughput for different probabilities and different number of stations for table driven DCF. Table 1. Optimum throughput for different probabilities and different number of stations for table driven DCF. No of Stations Probability Optimum throughput 1 0.9000 0.9532 2 0.3400 0.9458 3 0.2200 0.9444 4 0.1600 0.9437 5 0.1300 0.9434 6 0.1000 0.9431 7 0.1000 0.9428 8 0.1000 0.9420 9 0.1000 0.9410 10 0.1000 0.9397 of this generator is less than or equal to p, it tries to start its packet transmission in the given next slot. If the value is larger than p, the user persist on listening and repeats trials as stated. However if the channel is sensed busy the user defers his transmission till the next DIFS idle period heard. The users measure the number of collisions C= I–1 and the length W L by monitoring the channel over a large enough window (which is explained latter on). With the help of these values the users can use the tables formulated in Section 3 to obtain the corresponding p and M. Users having a non-empty queue start by monitoring the channel for the first n transmission periods. This active user will average the length of the idle period preceding the correct packet transmission over n transmission periods, i.e. L W and C , the average number of collisions over the same period. Aided with these values the users obtain the operating values of p and M and uses p to control their activities for the head of line packet in their queue. Active users continuously monitor the channel and use a sliding window technique to estimate W L and I and hence obtain (M, p). For example the first sliding window averages W L and C of the first n transmission periods. The second window averages W L and C of the l=2,3,...,n+1 transmission periods. The sliding window averaging process reflects the changing traffic, so transmission activity of active users are dependent only on the current traffic and not on past history. It is possible that the tables relating (M, p) to (W L , I) yield more than one possibility for (M, p) for certain (W L , I) measurement values from the sliding window. In this case, the user averages the obtained values of M and use Table 1 to find the optimum p at this averaged value of M. This Table 1 is obtained from Figure 4 in an evident manner. The operation of this table driven technique is similar to the DCF standard (IEEE 802.11) [4] except for using this optimized transmission probability p. The active users just estimate (M, p) from the traffic conditions (by sensing the channel) in a sliding window fashion one period after another. We note that old and new users both measure the traffic and adapt to the same traffic conditions fairly and obtain the same p. However having same p does not mean all users will repeatedly collide in the same slot because of feeding a random number generator with p. The above procedure is followed for both table driven DCF and table driven RTS/CTS shown in Figure 3. 5. Simulation Results For numerical calculations the following parameters are taken from “Bianchi” in [4]. In the table driven DCF, as per the standards, following the observance of each DIFS, users try to transmit with probability p obtained from L W and C . If two or more stations try to transmit at the same time, collisions occur. If no stations transmit (Figure 3), the number of idle slots will increase. If one station is successful after certain ![]() IMPROVING THROUGHPUT IN WIRELESS LOCAL AREA NETWORKS 311 Copyright © 2008 SciRes. I. J. Communications, Network and System Sciences, 2008, 4, 285-385 T Payload 10msec PHYheader 128bits ACK 112bits+PHY header RTS 160bits+PHY header CTS 112bits+PHY header Channel bit rate 1 Mbits/s Slot time (T Slot ) 50 µs T SIFS 28 µs T DIFS 128 µs service rate 1 payload T µ = offered traffic λ packets/sec M λ µ ≤ No of stations M number of idle and collision periods, the transmission period ends. As a result the total time for one successful packet transmission include T DIFS , T SIFS T Idle , T Payload . The throughput is calculated at the end of the simulation at certain values of M, λ and p i.e. , ( ) n Payload Time simulationwholetheinPeriodsonTransmissiofNoT × = η where ( ) n Time is the total simulation time that depends on T DIFS , T SIFS , T Slot , T Payload . Initially ( ) DIFS n TTime = and is subsequently increased based on the user’s activity, e.g., ( ) ( ) ( )( ) ( )( ) packetsuccessfuleachfor TTTTimeTime collisioneachforTTimeTime periodslotidleeachforTTimeTime PayloadSIFSDIFS nn DIFS nn Slot nn ; ; ; +++= += += For the Table driven RTS/CTS the total simulation time is calculated by the following equations, ( ) ( ) ( )( ) ( )( ) packetsuccessfuleachfor TTTTTTimeTime collisioneachforTTTimeTime periodslotidleeachforTTimeTime PayloadSIFSDIFSCTSRTS nn DIFSRTS nn Slot nn ;3 ; ; +++++= ++= += Figure 5 shows a comparison of the throughput between the table driven DCF and the standard DCF (IEEE 802.11) for 10 stations. The values of standard DCF are taken from [5] which uses the same parameters as in [4]. It is evident the table driven DCF performs better than the standard DCF (IEEE 802.11). Figure 6 shows a comparison of average delay between the table driven DCF and the standard DCF (IEEE 802.11). The values of standard DCF are again taken from [5]. It is noticeable that the delay performances are the same. Figure 7 shows the throughput curve for different offered loads for the table driven RTS/CTS technique. It shows that the throughput rises and becomes saturated at higher values of the load. The maximum throughput calculated by “Bianchi” in [4] for the standard RTS/CTS (IEEE 802.11) mechanism is 0.837281 when M=10. Figure 5. Throughput comparison between the table driven DCF and the standard DCF (IEEE 802.11). Figure 6. Average Delay Comparison between the table driven DCF and standard DCF (IEEE 802.11). Figure 7. Throughput corresponding to different offered traffic for table driven RTS/CTS. 1 2 34 5 67 8 9 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 Offered Traffic Packets/sec Standard DCF with M=10 table driven DCF with M=10 Throughput Offered Traffic Packets/sec 1 2 3 4 5 67 89 0 0.2 0.4 0.6 0.8 1 1.2 1.4 Standard DCF with M=10 table driven DCF with M=10 Offered Traffic Packets/sec Average Delay in Seconds 123 45678 9 0.8 0.82 0.84 0.86 0.88 0.9 0.92 table driven RTS/CTS Offered Traffic λ packets/sec Throughput ![]() 312 I. AL-WAZEDI ET AL. Copyright © 2008 SciRes. I. J. Communications, Network and System Sciences, 2008, 4, 285-385 5001000 1500 2000 2500 3000 3500 1 2 3 4 5 6 7 8 9 10 11 No of Transmission Periods Throughput and Traffic ( λ ) Input Traffic λ Throughput Figure 8. Throughput and input traffic corresponding to the number of transmission periods (table driven RTS/CTS). From the Figure 7 it is evident that table driven RTS/CTS performs better than the standard RTS/CTS in terms of throughput. The table driven RTS/CTS technique has an extra advantage as it is a load adaptive system. It means that it has the capability to adapt to the input traffic as quickly as possible. Figure 8 shows a case where the input traffic suddenly increases from 5 packets/sec to 10 packets/sec. In this case the throughput ( ) ( ) Input traffic rate η λ × is shown to follow the offered traffic λ . Fairness (FI) is another important issue considered in this paper. To express this, we take the fairness index defined in [10] and [2] to measure the fair packet capacity allocation. In [10] fairness index is represented as 1 1 1 1 r n i i nr i i x n x n = = ∑ ∑ . For example if m dollars are to be distributed among n people and we favor k people by giving them m/k dollars each and discriminate against n-k people, then the above function becomes 1 r k FI n − = . Favoring 10% would result in a fairness index of 1 0.1 r FI − =and discriminate index of 1 1 0.1 r − −. Therefore r should be equal to 2. That is, ( ) ( ) 2 1 2 1 n i i n i i x FI n x = = = ∑ ∑ , where FI is the fairness index, n is the number of stations, i x is the packets transmitted by the th i active station during the simulation time (current traffic in which the offered traffic λ is same for all stations). Figure 9 shows the comparison of the fairness index performance of table driven DCF, table driven RTS/CTS and standard DCF (IEEE 802.11). It can be observed that, for the three cases up to 15 active stations the performance is fair. Figure 9. Fairness index for different number of stations for table driven DCF, table driven RTS/CTS and standard DCF (IEEE 802.11). 6. Conclusions and Future Work In this paper a new approach that is based on the table driven technique is proposed for DCF and RTS/CTS mechanism in WLANs. While maintaining the same delay the table driven DCF outperforms the standard DCF (IEEE 802.11) in terms of throughput. The table driven RTS/CTS also demonstrates that its throughput is more than the standard RTS/CTS mechanism. Moreover the table driven DCF and table driven RTS/CTS gives very good fairness performance. In the table driven technique (for both DCF and the RTS) a simple search mechanism is used to find the values of M and p from L W and C . However an efficient lookup mechanism is required for this purpose. The subnet technique presented in this paper is amenable to implementation with two hops or more from the SS (subscriber stations) of the IEEE802.16. This SS is typically aware of the number of the nodes of the subnet of the IEEE802.11 standard and will broadcast such number to the nodes of the IEEE802.11 subnet. The nodes may use this value as rule of thumb against the actual estimated value of M obtained by the new table driven technique. This current paper estimates p and M from the nodes activities on the channel. Further, the value of M from SS and its favorable consequences are for future research. Our table based technique shall hence improve the performance of such subnet. 7. References [1] X. J. Tian, X. Chen, T. Ideguchi, and Y. G. Fang, “Improving throughput and fairness in WLANs through dynamically optimizing backoff,” IEICE Transactions on Communications 2005 E88-B(11), pp. 4328–4338. [2] L. Zhang, Y. T. Shu, and O. Yang, “Performance improve- ment for 802.11 based wireless local area networks,” 567891011 1213 1415 0.8 0.85 0.9 0.95 1 1.05 Table driven DCF Table driven RTS Standard DCF Number of Mobile station Fairness Index ![]() IMPROVING THROUGHPUT IN WIRELESS LOCAL AREA NETWORKS 313 Copyright © 2008 SciRes. I. J. Communications, Network and System Sciences, 2008, 4, 285-385 IEICE Transactions on Communications, Vol. E90-B, No. 4, April 2007. [3] V. Bharghvan, “Performance evaluation of algorithms for wireless medium access,” IEEE International Computer Performance and Dependability Symposium IPDS’98, pp. 86–95, 1998. [4] G. Bianchi, “Performance analysis of the IEEE 802.11 distributed coordination function,” IEEE Journal of Selected Areas on Communications, Vol. 18, No. 3, pp. 535–547, March 2000. [5] S. Pasupuleti and D. Das, “Throughput and delay evaluation of a proposed-DCF MAC protocol for WLAN,” IEEE INDIA annual conference 2004, lndicon 2004. [6] F. Cali, M. Conti, and E. Gregori, “Dynamic tuning of the IEEE 802.11 protocol to achieve a theoretical throughput limit,” IEEE/ACM Transactions on Networking, Vol. 8, No. 6, pp. 785–799, December 2000. [7] Y. Kwon, Y. Fang, and H. Latchman, “A novel MAC protocol with fast collision resolution for wireless LANs,” IEEE INFOCOM’03, April 2003. [8] J. Weinmiller, H. Woesner. J. P. Ebert, and A. Wolisz, “Analyzing and tuning the distributed coordination function in the IEEE 802.11 DFWMAC draft standard,” Proceedings MASCOT, San Jose, CA, February 1996. [9] S. Khurana, A. Kahol, S. K. S. Gupta, and P. K. Srimani, “Performance evaluation of distributed co-ordination function for IEEE 802.11 wireless LAN protocol in presence of mobile and hidden terminals,” Modeling, Analysis and Simulation of Computer and Telecommunication Systems, 1999, Proceedings, 7th International Symposium, Digital Object Identifier 10.1109/MASCOT.1999.805038, pp. 40–47, October 24–28, 1999. [10] R. Jain, D. Chiu, and W. Hawe, “A quantitative measure of fairness and discrimination for resource allocation in shared computer systems,” Technical Report TR-301, DEC Research Report, 1984. [11] C. L. Fullmer and J. J. Garcia-Luna-Aceves, “Complete single-channel solutions to hidden terminal problems in wireless LANs,” Communications, 1997, ICC 97 Montreal, ‘Towards the Knowledge Millenniu’, 1997 IEEE International Conference, Vol. 2, Digital Object Identifier 10.1109/ICC.1997.609856, pp. 575–579, 8–12 June 1997. [12] H. S. Chhaya and S. Gupta, “Performance modeling of asynchronous data transfer methods of IEEE 802.11 MAC protocol,” ACM/Baltzer Wireless Networks, Vol. 3, pp. 217–234, 1997. |