Abstract

Carrier sense multiple access with collision avoidance (CSMA/CA) methods are considered to be attractive MAC protocols for wireless LANs. IEEE 802.11 distributed coordination function (DCF) is a random channel access scheme based on CSMA/CA method and the binary slotted exponential backoff procedure to reduce the packet collision. In this paper, we propose a new analytical model for a nonsaturated IEEE 802.11 DCF network and evaluate its performance. We verify our model using simulations and show that our results agree with the simulations.

1. Introduction

In recent years, a rapid evolution in wireless local area networks (WLANs) has been witnessed. IEEE 802.11-based medium access control (MAC) protocols have been widely used for WLANs. The IEEE 802.11 MAC defines the contention-based distributed coordination function (DCF) [1, 2]. In order to prevent the interference and confirm a successful transmission, the DCF includes two access techniques: basic and request-to-send/clear-to-send (RTS/CTS) access mechanisms. The basic access mechanism is a two-way handshaking method where the transmitter transmits a data frame and the receiver replies with an acknowledgment (ACK) frame to confirm a successful transmission. In addition to the basic access method, the RTS/CTS mechanism reserves the medium before transmitting a data frame by transmitting an RTS frame and replying with a CTS frame.

Many works on the modeling of IEEE 802.11 DCF have been studied [311]. Bianchi [3] was the first to derive a model that incorporates the exponential backoff process inherent to IEEE 802.11 as a bidimensional Markov chain. The bidimensional Markov chain model has become a common method to study the performance of the IEEE 802.11 MAC protocol and its enhancements. In [57], the backoff time was assumed to be geometrically distributed with a parameter related to the contention status of the medium. Wu et al. [9] followed the same Markov chain model and considered packet retransmission limits to avoid overestimating the throughput of 802.11 as in [3]. However, in most of the analytical papers in the literature, analyses have been conducted under saturation environment, that is, each station has at least one packet to transmit at each time. There is some previous modeling work for nonsaturation environment. For nonsaturation analysis, Ziouva and Antonakopoulos [12] presented an extension of the saturated Bianchi model [4] for nonsaturation analysis. In the analysis, a station is assumed to be empty immediately after the station starts to transmit a packet. In [13], the authors extended [4] for the nonsaturation traffic condition with post-backoff. In the analysis, the MAC buffer is assumed to be always empty when a buffered packet enters a backoff procedure. This assumption is not realistic even when the traffic load is very low and not bursty. Furthermore, the fact that the distributed interframe space (DIFS) is not the integral multiples of an idle slot time was not taken into account. Tickoo and Sikdar [14] developed a simple model using parameters from the saturated model, but the results appear to exhibit poor accuracy. The model in [15] attempts to integrate Bianchi's model with a queueing model, and requires a solution of a fixed-point equation spanning parameters of both the Markov chain and the queueing model. Alizadeh-Shabdiz and Subramaniam [16] extended the Markov chain of [4] to obtain an M/G/1 queueing model for nonsaturation case. Liaw et al. [17] introduced an idle state, not present in Bianchi's model [4], accounting for the case in which the station buffer is empty after a successful completion of a packet transmission. The probability that there is at least a packet in the buffer after a successful transmission is assumed to be constant and independent of the access delay of the transmitted packet. Based on the Markovian state transition model proposed by Liaw et al. [17], Daneshgaran et al. [18] proposed a linear model of the throughput of the IEEE 802.11 DCF protocol under nonsaturation traffic conditions.

In this paper, we propose a new mathematical model to study nonsaturation performance of the DCF more accurately, and then we show the accuracy of our model via computer simulations. Even though the post-backoff procedure is not considered in our proposed analysis model, our approach can be justified by the mathematical tractability of the problem.

2. Backoff Procedure in IEEE 802.11 DCF

The DCF is the fundamental access method of the IEEE 802.11. It is based on the CSMA/CA and a backoff procedure to reduce the collision probability between multiple stations accessing the channel. The CSMA/CA mechanism defines two channel states: idle and busy. If a station senses no transmission on the channel, it considers the channel state as idle; otherwise it considers the channel state as busy. In this section, we focus on the basic access mechanism of IEEE 802.11 DCF. Suppose that there are no pending packets in a station. When the station has first a packet to transmit, it starts its carrier sensing to determine the current state of the channel. If the channel is sensed as idle for a period of time equal to DIFS, the station transmits the first arrived packet immediately. If not, the station must wait until the channel becomes idle and subsequently remains idle for a DIFS period. After that the station has to wait a random backoff interval before it is permitted to transmit its packet. The remaining backoff interval is indicated by the backoff counter of the station. Initially, the backoff counter is uniformly chosen in a range , where is known as the minimum contention window size. Whenever the station senses channel as idle during a slot time, the backoff counter is decremented by one. If the channel is sensed as busy, the backoff counter is frozen. After the channel becomes idle again for a period of DIFS, the station resumes the decrement of the backoff counter. When the backoff counter reaches zero, the station transmits its packet and waits for reception of an ACK from the destination after a time interval called short interframe space (SIFS). When the station receives the ACK within the ACK timeout interval, it will immediately perform a backoff procedure, known as post-backoff, even though no additional packets are queued. If the transmission fails, the station doubles the contention window size up to a predefined maximum value and repeats the backoff procedure.

3. Markov Chain Model

We assume the following conditions: (1) a single hop WLAN in which all stations are in the transmission range of each other such that we do not have any hidden terminal, (2) no post-backoff procedure, and (3) ideal channel condition, that is, no capture effect. Since channel conditions are assumed to be ideal, transmission errors are a result of packet collision only. Also, we assume that all stations are identical with respect to their parameters and arrival rates, and that there is no retransmission limit.

To analyze the nonsaturation performance of DCF, we observe the state of a given tagged station at the following 3 types of embedded points (see Figure 1).

Type 1:the end of each time period during which the channel is busy due to packet transmissions, regardless of success or collision, if the tagged station is empty at that time.Type 2:DIFS after each time period during which the channel is busy due to packet transmission, regardless of success or collision.Type 3:every slot times after the embedded points of type 2 until the channel is sensed to be busy. We assume that the duration of DIFS is equal to [1], where denotes one slot time and denotes the duration of SIFS. For notational convenience, we denote SIFS and DIFS as the duration of SIFS and DIFS, respectively.

At each embedded point , we define a stochastic process as follows:Since we do not consider post-backoff procedure, the backoff counter of a station is inactivated when the station becomes empty, and reactivated DIFS after the time period during which the channel is sensed to be busy. Let indicate the following:

(1)when , ;(2) when ,where denotes the time period elapsed since the first packet arrived at the tagged station which was empty;(3)when , represents the value of the backoff counter at . Note that, when , the value indicates the time at which the first packet enters an empty station. An empty station waits until a packet enters its buffer. Upon the entrance of the packet, the station starts its carrier sensing to determine the current state of the channel. If the channel is idle for a period of time DIFS, the station transmits the packet without experiencing any further backoff procedure. Thus, the transmission epoch of the first packet is affected by the time the packet enters the station. For example, when and , the packet may be transmitted during the first period of the next slot; when and , the packet may be transmitted during the last period of the next slot, where ; when and or 3, the packet may be transmitted during the next slot after one; when and , the packet may be transmitted during the first period of the next slot after two (see Figure 2). The affection is deeper in light traffic conditions than in heavy traffic conditions.

At embedded point , the state of the tagged station is defined by . For example, the state represents that the tagged station does not have any packet to transmit immediately after the transmission of a packet at any station in the network. The state , , represents that the backoff procedure is not activated yet, where indicates when the first packet arrived after the state . For , the state denotes the backoff state, where the value is the backoff stage, the value , , is the possible backoff counter value at the backoff stage , and is the size of contention window at stage .

The stochastic process constitutes a 2-dimensional Markov chain, which models the tagged station. The state transition diagram of the Markov chain of the tagged station is presented in Figure 3, where we use the following notations.

(1), , , , and : probabilities that, after the state of a station becomes , the first packet arrives at the empty station between 0 and , between and , between and , between and , and between and DIFS, respectively. Note that, because the time period between an embedded point with state and the next embedded point is always DIFS, the elapsed time after the first packet arrivals is with probability , with probability , with probability , with probability , and with probability at the next embedded point, at which the state of the station becomes , , , , and , respectively (see Figure 2). For example, when packets arrive at the station according to a Poisson process with rate , we have(2) (resp., ): probability that, after the state of a station becomes , the first packet arrives at the empty station between 0 and (resp., and ). When packets arrive at the station according to a Poisson process with rate , we have(3): probability that there are no packet arrivals into a station for time period . When packets arrive at the station according to a Poisson process with rate , we haveFor analytical simplicity, the probability is approximated as in this section.(4): random variable representing the time period until the first packet arrives, given that at least one packet arrives at a station for time period . Let , , be the random variable representing the time period until the first packet arrives, given that there are arrivals for time period . When packets arrive at the station according to a Poisson process with rate , the random variable is the first-order statistic corresponding to a random sample of size from a uniform distribution over the interval , and its mean is [19]. Hence,(5): probability that, from the tagged station's point of view, at least one of the other stations transmits a packet at the beginning of a slot time.(6) (resp., ): conditional probability that one of the stations except the tagged station transmits a packet during the first period of a slot time, given that the tagged station has a packet (resp., no packets) available for transmission during the time period and no stations transmit a packet at the beginning of the slot time.(7) (resp., ): conditional probability that one of the stations except the tagged station transmits a packet during the last period of a slot time, given that the tagged station has a packet (resp., no packets) available for transmission during the time period and no stations transmit a packet at the beginning of the slot time and during the first period of the slot time.(8): probability that a station transmits a packet at the beginning of a slot time.(9): probability that a station has a packet available for transmission during the first period of a slot time, given that the station did not transmit a packet at the beginning of the slot time.(10): probability that a station has a packet available for transmission during the last period of a slot time, given that the station did not transmit a packet at the beginning of the slot time and during the first period of the slot time.(11): random variable representing the time period from the beginning of stage 0 at a station to the completion of a successful transmission from the station, given that the transmission occurs at stage .(12): probability that a station has only one packet when the backoff stage of the station becomes 0. Since the probability that there are no packet arrivals during the time interval between when a packet becomes the first packet in the buffer and when the packet's transmission is finished is zero under saturation traffic condition, that is, for , the states and of the Markov chain are transient states under saturation traffic condition. Thus, the steady-state probabilities of the Markov chain under saturation traffic condition are the same as those of Bianch's model [4]. Hence, this paper focuses on the stations under saturation traffic conditions.

We consider the number of contending stations as fixed, defined as . Let be the time period between when a station enters stage and when the backoff counter of the station becomes 0 at stage . Note that the backoff counter decreases by one for each idle time slot and is suspended when the channel is busy. We consider the mean time that elapses for one decrement for the backoff counter: the probability that at least one of the channels except the tagged station transmits a packet at the beginning of a slot time is , and the mean elapsed time for one decrement in this case is , where denotes the required time for the freezing time due to the busy channel. The time period is obtained aswhere denotes the required time for the successful transmission of a packet and is the wasting time due to the collision of a transmitted packet. The probability that one of the channels except the tagged station transmits a packet during the first period of a slot time is , and the mean elapsed time in this case is approximated as . The probability that one of the channels except the tagged station transmits a packet during the last period of a slot time is , and the mean elapsed time in this case is approximated as . Thus, the mean of can be obtained asUsing , the mean of can be obtained asfor ; assuming no retransmission limit, we obtain

4. Mathematical Analysis

Let be the stationary probability of the described Markov chain. The stationary probabilities satisfy the following balance equations:From state transition diagram, the expression for is given byThus,Hence, each of the stationary probabilities can be expressed in terms of , which can be obtained from the normalization condition

Each of , , and can be expressed as a function of the stationary probabilities. Since the probability that an embedded point is the beginning of a slot time is and the probability that a station transmits a packet at the embedded time is , the probability is given bySince is the probability that a station has a packet available for transmission during the first period of a slot time and that is given by , the probability is given bySince is the probability that a station has a packet available for transmission during the last period of a slot time and that is given by , the probability is given by

Having obtained , , and , the probabilities , , , , and can be determined as follows:

Let denote the mean sojourn time at state . Then,

The probability can be determined based on the fact that, by PASTA theorem and Burke's theorem [20], the stationary distributions of the tagged station at an arbitrary time point and immediately after an arbitrary completion time point of successful transmission are identical. The probability that the tagged station is empty at an arbitrary time point is and the probability that the tagged station is empty immediately after an arbitrary completion time point of successful transmission at the tagged station isThus,whereFrom (4.1)–(4.12), the stationary probability can be found by a numerical method.

The system throughput , the fraction of time used for successful payload transmission, can be expressed aswithwhere the meaning of , , , and is as follows: is the probability that there is at least one transmission at the beginning of a slot time, with stations contending for the channel, each transmitting with probability . Thus,The probability is the conditional probability that a packet transmission occurring on the channel at the beginning of a slot time is successful. This event corresponds to the case in which exactly one station transmits at that time. Thus,The probability is the conditional probability that a packet transmission during the first period of a slot time is successful, given that there are no transmission at the beginning of the slot time. This event corresponds to the case in which at least one station is in state at the beginning of the slot time, given that all the stations are in state or state for at the beginning of the slot time. Thus,The probability is the conditional probability that a packet transmission during the last period of a slot time is successful, given that there are no transmission at the beginning of the slot time and during the first period of the slot time. This event corresponds to the case in which at least one station is in state at the beginning of the slot time, given that all the stations are in state for at the beginning of the slot time. Thus,

5. Numerical Examples

In this section, we evaluate the performance of IEEE 802.11 DCF under different maximum backoff stages and different length of packet payload conditions through simulation and analytical results. We have developed a C++ simulator modeling both the DCF protocol details in IEEE 802.11 and the backoff procedures of a specific number of independent transmitting stations. The simulation also takes into account real operations of each transmitting station. In our experiments, we use the parameter setting in Table 1 [4]. Since we assume that no hidden terminals exist, this section deals only with the basic access method without RTS/CTS. We let the packet arrivals to any station be a Poisson process with the same rate (packets/s).

Figure 4 shows the throughput of DCF with as the packet arrival rate varies. For given , the throughout linearly increases as increases until the network is saturated. It drastically decreases just before a saturation point, and then maintains constant even though increases. Since traffic intensity increases as increases, the saturation point decreases. In addition, the throughput for large more sharply increases than that for small . For all values of , the maximum throughput is shown to be higher than the saturation throughput. The difference between the maximum throughput and the saturation throughput increases as increases. For bits of packet payload and 10, 20, 30, 40, and 50, the normalized maximum throughputs are about 0.78, 0.73, 0.70, 0.68, and 0.67, respectively, and the normalized saturation throughputs are about 0.76, 0.70, 0.66, 0.63, and 0.61, respectively. In case of the payload of bits, the normalized maximum throughputs are about 0.463, 0.447, 0.434, 0.425, and 0.418, respectively, and the normalized saturation throughputs are about 0.455, 0.429, 0.411, 0.396, and 0.385 for 10, 20, 30, 40, and 50, respectively.

For , the throughputs of DCF for IEEE 802.11 with different lengths of packet payload are shown in Figure 5. The general trends of throughputs with are similar to the case with . In addition, the results show that the normalized maximum throughputs and the normalized saturation throughputs are nearly equal to those with , because the maximum contention window size is enough to effectively resolve collisions under given parameters.

6. Conclusions

We proposed a mathematical model to evaluate the performance of the IEEE 802.11 DCF protocol under unsaturation conditions. Even though the proposed model does not consider the post-backoff procedure, its results are shown to be very close to the simulation results. MAC throughput of DCF linearly increases as packet arrival rate increases until the network is saturated. When the network is saturated, MAC throughput becomes constant for various packet arrival rates.

Acknowledgment

This work was supported by the Ministry of Information and Communication (MIC), Korea, under the Information Technology Research Center (ITRC) support program supervised by the Institute of Information Technology Assessment (IITA).