Professional Documents
Culture Documents
1 Introduction
The users’ desire for better Quality of Service (QoS) drives development of
new QoS-aware protocols. In wireless technologies, special attention is paid to
channel access mechanisms which to a considerable degree influence the abil-
ity to provide QoS. A very good example is the Wi-Fi technology where the
IEEE 802.11e amendment, which was the first one to introduce QoS support
into Wi-Fi, defined two QoS-aware channel access mechanisms: Enhanced Dis-
tributed Channel Access (EDCA) and Hybrid coordination function Controlled
Channel Access (HCCA). The former is a random (contention-based) channel
The research was done in IITP RAS and supported by the Russian Science Founda-
tion (agreement No 16-19-10687).
c Springer International Publishing AG 2016
O. Galinina et al. (Eds.): NEW2AN/ruSMART 2016, LNCS 9870, pp. 193–204, 2016.
DOI: 10.1007/978-3-319-46301-8 16
194 A. Ivanov et al.
period period
time
duration duration duration
2 Related Papers
A number of papers study how to share resources between random and deter-
ministic access methods in Wi-Fi networks. For example, [12] investigates how to
share time between EDCA and HCCA to achieve the maximum overall through-
put. [7] considers coexistence of EDCA and MCCA in Wi-Fi Mesh networks
196 A. Ivanov et al.
and shows how EDCA throughput depends on the percentage of time reserved
by MCCA. As for the heterogeneous access, a few existing studies like [8] and
[10] mainly consider a heterogeneous access method defined in the Wi-Fi stan-
dard. In [8], the authors consider streaming of saturated data and show that
the more data is transmitted with HCCA, the higher is ratio of successful
transmissions. The authors of [10] propose to use a Markov decision process
to coordinate simultaneous usage of HCCA and EDCA to achieve maximum
channel utilization. However, none of the mentioned papers consider streaming
of data with QoS requirements other than throughput. The usage of heteroge-
neous access for transmitting data with QoS requirements is considered in [11]
where a good description/analysis of EDCA, HCCA as well as the heterogeneous
access method is presented. [11] proposes an enhanced admission control algo-
rithm which can be used to improve performance of almost any HCCA scheduler
as shown by simulation. However, so far no papers have studied how to transmit
unsaturated data with QoS requirements by means of a heterogeneous access
method, i.e., how to choose its transmission parameters to satisfy QoS. In this
paper, we fill this gap by developing a mathematical model of a VBR flow trans-
mission in the presence of noise with such an access method. We exploit the
mathematical approach from [6], which considers transmission of a VBR flow
with QoS requirements (delivery delay and packet loss ratio) inside periodic
time intervals.
3 Problem Statement
An exponential
variable with
mean 1/λ
time
Ddet Dran Dran Dran Ddet
Tres
needed to get an access to the channel between two consecutive reserved time
intervals, i.e. in a contention-based interval, is an exponential random variable
with mean 1/λ. The duration of the contention-based interval equals Tres −Ddet ,
while the time needed to transmit a packet with the random access equals Dran
(see Fig. 2).
In the described transmission process, we need to choose such Tres and R
that guarantee that the QoS requirements are satisfied while keeping the amount
of the used channel time as low as possible. To solve this problem, we develop
a mathematical model of the considered process which can be used to find PLR
as a function of Tres and R.
4 Mathematical Model
tin · τ
ξ tres · τ τ
time
t t+1 t+2 t+3 t+4
– m(t) = 1 and r(t) > 1. If the only packet of the HoL batch is transmitted
successfully (with probability 1 − qdet ), then the HoL batch leaves the queue.
The next batch, which size is j with probability pin j , is tin slots younger, what
makes the process eventually transit to state (h(t)−tin +tres , j, R) with proba-
bility (1−qdet )pin
j . Otherwise, if the HoL packet is not transmitted successfully
(with probability qdet ), the process transits to state (h(t)+tres , m(t), r(t)−1).
– m(t) = 1 and r(t) = 1. In this case, the only packet of the HoL batch
anyway leaves the queue because of the retry limit. So, the process transits
to state (h(t) − tin + tres , j, R) with probability pin
j .
Mathematical Model of QoS-Aware Streaming 199
– m(t) > 1 and r(t) > 1. The process transits to state (h(t), m(t)−1, R) with
probability 1 − qdet and to state (h(t), m(t), r(t) − 1) with probability qdet .
– m(t) > 1 and r(t) = 1. Since the HoL packet anyway leaves the queue
because of the retry limit, the process transits to state (h(t)+tres , m(t)−1, R)
with probability 1.
d − tres < h ≤ d. In this case, the HoL batch becomes outdated by the next
reserved time interval and leaves the queue by the beginning of the next interval.
Thus, the process transits to state (h(t) − tin + tres , j, R) with probability pin
j .
Having described all possible transitions, we are able to build the transition
matrix and find the steady-state distribution π(h, m, r) of the process states.
Given the average number of packets Iin arriving into the queue during one tran-
sition and the average number of packets Idis discarded during one transition,
we can find PLR as follows:
Idis
P LR = . (1)
Iin
Iin can be easily found as
Tres jpin
j
Iin = . (2)
Tin
The calculation of Idis is more complicated and presented below.
Packets can be discarded only during transitions from the following two types
of states: (a) states with r = 1 and 0 ≤ h ≤ d − tres and (b) states with
h > d−tres . Let Ndis (h, m, r) be the average number of packets discarded during
transition from state (h, m, r). If the state does not belong to the mentioned
types, then Ndis (h, m, r) = 0. If the state belongs to type (a), then only the HoL
packet can be discarded because of the retry limit if not transmitted successfully,
thus, Ndis (h, m, r) = qdet . In case (b), the entire HoL batch becomes outdated
before the next reserved interval. It occurs DQoS −h·τ s after the beginning of the
current one. Outdating packets are transmitted with the random access method
with all transmissions performed within DQoS − h · τ − Ddet + Dran s following
the end of the current interval (see Fig. 4). This time, which we denote as T (h),
cannot be higher than Tres − Ddet , thus, T (h) can be accurately calculated as
follows:
T (h) = min{DQoS − h · τ − Ddet + Dran , Tres − Ddet }. (3)
To find Ndis (h, m, r), we need to find the probability distribution of the
number of transmission attempts, which can be performed in an interval of
duration T (h). Let Λ(w; T ) be the probability of exactly w transmission attempts
being possible inside a contention-based interval of duration T . The number of
transmission in an interval of duration T cannot exceed W(T ) = T /Dran + 1.
Thus, if w > W(T ), then Λ(w, T ) = 0. Otherwise, let twait i be the duration
of a time interval between the end of transmission i − 1 and the beginning of
200 A. Ivanov et al.
where
w
+∞ i i
λX λi X i
w−1
−λX −λX
P( twait
i ≤ X) = e = 1 − e .
i=1 i=w
i! i=0
i!
Now, we are able to calculate Ndis (h, m, r) for transition from state with h >
d − tres . With probability 1− qdet the HoL packet is successfully transmitted and
m − 1 remaining packets of the HoL batch are transmitted during the contention
interval. Since none of these packets has been transmitted before even once,
all of them have R transmission attempts. Otherwise, with probability qdet all
the m packets are transmitted with the random access where the remaining
number of transmission attempts of the first packet equals r − 1 ≥ 0, while other
packets have R transmission attempts. Let the maximum number of transmission
attempts in the contention interval be equal to w (with probability Λ(w; T (h))).
We consider transmission of n ≥ 0 packets in a transmission window of size 0 ≤
w ≤ W(T (h)). Let U (r, n, w) be the average number of packets not transmitted
successfully in this window, where r ≥ 0 is the remaining number of transmission
attempts of the first packet. If n = 0, then U (r, n, w) = 0. For n ≥ 1, the values
of U (r, n, w) can be found recurrently:
min{w,r}
U (r, n,w) = t−1
qran (1 − qran )U (R, n − 1, w − t)+
t=1
min{w,r}
qran (1 + U (R, n − 1, w − min{w, r})). (5)
Combining (3), (4) and (5) we can calculate Ndis (h, m, r) for h > d − tres :
W(T (h))
Ndis (h, m, r) = Λ(w; T (h)) (qdet U (r − 1, m, w) + (1 − qdet )U (R, m − 1, w)) .
w=0
Mathematical Model of QoS-Aware Streaming 201
min{r,w}
V (r,n, w) = t−1
qran (1 − qran )(t + V (R, n − 1, w − t))+
t=1
min{r,w}
qran (min{r, w} + V (R, n − 1, w − min{r, w})).
5 Numerical Results
Let us show how to use the model to find appropriate parameters in case of
a video flow transmission over a Wi-Fi network with IEEE 802.11a PHY. We
202 A. Ivanov et al.
consider a VBR flow which batches arrive each Tin = 40 ms and have the size
distribution shown in Fig. 5. The delay bound DQoS equals 150 ms. The sender
transmits data packets of size 1500 bytes at the rate of 54 Mbps and ACKs are
transmitted at the rate of 6 Mbps, so that Ddet = 312 μs and Dran = 346 μs.
The probabilities of unsuccessful transmissions are the following: qdet = 0.05
and qran = 0.2. The mean access time 1/λ equals 171 μs. This value is obtained
experimentally in a saturated Wi-Fi network with 10 stations all of which use
the EDCA random access mechanism and transmit best effort data at the rate
of 54 Mbps. Given all these parameters, we use the model to find PLR as a
function of R and Tres , which is shown in Fig. 6. The same function but obtained
by simulation negligibly differs from the analytical one, that is why it is not
explicitly shown in Fig. 6.
P LR(Tres, R)
10−1
10−2 R= 1
R= 2
R= 3
P LR
10−3 R= 4
R= 5
R= 6
10−4 R= 7
10−5
10−6
0 10 20 30 40 50
Tres, ms
Functions C̃(P LRQoS ) for the both considered methods are demonstrated in
Fig. 7. It shows that the heterogeneous access method outperforms the determin-
istic one for all relevant values of P LRQoS (10−5 . . . 10−2 ) by reducing channel
consumption by 25–35 %. Though achieving this gains requires adjustment of
the method parameters, this task can be successfully solved by means of the
developed mathematical model, what finally turns the proposed heterogeneous
method intro a more preferable choice for serving VBR flows.
0.060
C̃(P LRQoS )
0.055
1.3 times
0.050
0.045
0.040
0.035
0.030
10−5 10−4 10−3 10−2 10−1
P LRQoS
6 Conclusion
In the paper, we have considered transmission of a VBR flow with a hetero-
geneous channel access method being a combination of the random and deter-
ministic. With this method, packets of the flow are transmitted in preliminarily
reserved periodic time intervals as well as outside them, so that retransmissions
and data bursts can be handled by means of the random access, while a constant
component of the flow can be served in reserved interval. We have developed a
mathematical model of this transmission process which can be used to find such
parameters of the heterogeneous method, which guarantee that QoS require-
ments of the flow are satisfied at the minimal amount of the used channel time.
It is shown that the heterogeneous method generally occupies less channel time
to satisfy QoS requirements then the deterministic one. The future work includes
further improvement of the model to make it account for possibility of erroneous
estimation of the transmission failure probabilities.
References
1. RFC 3550. http://www.ietf.org/rfc/rfc3550.txt
2. Ansel, P., Ni, Q., Turletti, T.: FHCF: a fair scheduling scheme for 802.11e WLAN
(2003)
3. Cecchetti, G., Ruscelli, A.L.: Real-time support for HCCA function in IEEE
802.11e networks: a performance evaluation. Secur. Commun. Netw. 4(3), 299–
315 (2011)
4. Cowling, J., Selvakennedy, S.: A detailed investigation of the IEEE 802.11e HCF
reference scheduler for VBR traffic. In: 13th International Conference on Computer
Communications and Networks (ICCCN 2004). Citeseer (2004)
5. Grilo, A., Nunes, M.: Performance evaluation of IEEE 802.11e. In: The 13th IEEE
International Symposium on Personal, Indoor and Mobile Radio Communications
2002, vol. 1, pp. 511–517. IEEE (2002)
6. Ivanov, A., Khorov, E., Lyakhov, A.: QoS support for bursty traffic in noisy channel
via periodic reservations. In: Wireless Days (WD), 2014 IFIP, pp. 1–6. IEEE (2014)
7. Krasilov, A.N., Lyakhov, A.I., Moroz, Y.I.: Analytical model of interaction between
contention-based and deterministic channel access mechanisms in Wi-Fi Mesh net-
works. Autom. Remote Control 74(10), 1696–1709 (2013)
8. Kuan, C., Dimyati, K.: Utilization model for HCCA EDCA mixed mode in IEEE
802.11e. ETRI J. 29(6), 829–831 (2007)
9. Lai, W.K., Shien, C., Jiang, C.: Adaptation of HCCA/EDCA ratio in IEEE 802.11
for improved system performance. Int. J. Innov. Comput. Inf. Contr. 5(11), 4177–
4188 (2009)
10. Ng, B., Tan, Y.F., Roger, Y.: Improved utilization for joint HCCA-EDCA access
in IEEE 802.11e WLANs. Optim. Lett. 7(8), 1711–1724 (2012)
11. Ruscelli, A.L., Cecchetti, G., Alifano, A., Lipari, G.: Enhancement of QoS support
of HCCA schedulers using EDCA function in IEEE 802.11e networks. Ad Hoc
Netw. 10(2), 147–161 (2012)
12. Siris, V.A., Courcoubetis, C.: Resource control for the EDCA and HCCA mech-
anisms in IEEE 802.11e networks. In: 4th International Symposium on Modeling
and Optimization in Mobile, Ad Hoc and Wireless Networks 2006, pp. 1–6. IEEE
(2006)