You are on page 1of 6

Efficiency Analysis of Burst Transmissions with

Block ACK in Contention-Based 802.11e WLANs


Ilenia Tinnirello∗,+,1 Sunghyun Choi+,2
∗ +
University of Palermo, ITALY Seoul National University, KOREA
1 2
ilenia.tinnirello@tti.unipa.it,ilenia@mwnl.snu.ac.kr schoi@snu.ac.kr

Abstract— The channel utilization efficiency of the standard higher layers is treated by the MAC independently of all
802.11 networks is severely compromised when high data trans- others. The revolutionary idea introduced in 802.11e is the
mission rates are employed since physical layer headers and establishment of temporary channel-services for a burst of
control frames are transmitted at low rate, thus wasting more
channel time proportionally. The extensions defined in the emerg- frames addressed to the same destination. These frames can
ing 802.11e for quality-of-service (QoS) provisioning include some be sent in a single channel access with a common acknowl-
new mechanisms developed in order to improve the efficiency. edgment. In this paper, we deal with this new transmission
Those include data transmission bursting (referred to as TXOP service.
operation) and acknowledgment aggregation (referred to as block The rest of the paper is organized as follows: In Section
ACK). These two features allow to offer new data transmission
services, in which the data delivery and acknowledgment unit II, we describe the concept of data bursting and block ac-
is not a single frame, but a block of frames. In this paper, knowledgment. Then, we in Section III introduce a simple
we evaluate the performance of these operations for both basic analytical framework, which allows us to derive the system
and RTS/CTS access cases. We quantify how the data bursting performance for different access modes, data burst lengths, and
and block ACK mechanisms can affect the system efficiency acknowledgment policies. After we discuss some numerical
for different environments, and derive the maximum achievable
throughput. We also discuss the operating conditions at which the results in Section IV, we conclude the paper in Section V.
switch from a channel utilization method to another is desired.
II. C HANNEL ACCESS AND T RANSMISSION O PERATIONS
I. I NTRODUCTION In distributed WLAN environments, e.g., based on IEEE
Today’s 802.11 wireless LANs (WLANs) provide multiple 802.11 distributed coordination function (DCF), the mandatory
rates for data transmissions by employing different sets of MAC of the 802.11, a common radio resource (channel) is
modulation and channel coding schemes. For example, the shared among a given number of associated users, without
popular 802.11b physical (PHY) layer provides 1, 2, 5.5, and any centralized coordination. The management of the common
11 Mbps [7], while the emerging 802.11a and 802.11g provide medium is specified by two different aspects: (1) the multiple
6 to 54 Mbps. These multiple transmission rates can be used access resolution, i.e., the rules according to which a given
for frame transmissions in an adaptive manner depending on station acquires the right to use the channel, and (2) the chan-
the underlying channel conditions [9], [4]. Specifically, high nel transmission operations, i.e., the rules according to which
data rates can be exploited only by stations which perceive the station that wins the contention can perform transmissions
good channel conditions. Since different stations, in general, without losing the control of the channel. In this section, we
use different data rates, control frames are transmitted at a rate briefly describe the substantial innovations introduced by the
supported by all the stations, i.e., at one of the rates in the 802.11e extensions regarding the second aspect.
basic rate set, while the physical header transmission time is
fixed. This constraint affects the channel utilization efficiency A. Legacy DCF
of data transmissions, since the weights of PHY overheads and The 802.11 DCF works on the basis of the well-
control frames (required to access the channel) do not decrease known carrier-sense multiple access with collision avoidance
at the same factor as the payload transmission time reduction. (CSMA/CA) protocol. Whenever a given station has a frame
Therefore, the throughput is increasingly dominated by such to transmit, it waits until the channel becomes idle for a
overheads for high data rates. given amount of time (Distributed Interframe Space or DIFS
In order to improve the system efficiency, new operations, interval), and then accesses the channel following exponential
namely, data transmission bursting and aggregated acknowl- backoff rules. If a successful reception occurs, the destination
edgments, are being standardized as part of the emerging IEEE station responds, after a Short Interframe Space (SIFS) with an
802.11e medium access control (MAC) [8], which is widely acknowledgment (ACK) frame. Since SIFS < DIFS, no other
discussed in current literature. While several studies evaluate stations are able to access the channel between the data and
the new channel access features [2], [3], few results have been the ACK frames. These explicit acknowledgments are required
so far reported about these new transmission operations [10]. in order to identify transmission failures due to collisions or
The original MAC definition provides a connectionless inter- channel errors.
face to higher layers, i.e., each frame delivered down from Two different access modes, i.e., basic access and request-
to-send/clear-to-send (RTS/CTS) access, provide 2-way and 4-
This work is in part supported by grant number (R08-2004-000-10384-0)
from the basic research program of Korea Science and Engineering Foundation way handshaking, respectively. In the basic access case, after
(KOSEF) and by the italian FIRB research project PRIMO. the contention resolution, the station is allowed to immediately

3455
0-7803-8938-7/05/$20.00 (C) 2005 IEEE
transmit the pending data frame. On the other hand, in and it is transmitted after an explicit transmitter request. This
the RTS/CTS access case, the data transmission is preceded request is performed by a new control frame, called block
by the transmission of special short RTS and CTS control ACK request.2 Both the block ACK request and the block
frames. This operation allows to combat the hidden terminal ACK control frames are transmitted at the same rate used for
phenomenon and to reduce the collision times. the data frame transmissions. Before using the block ACK
Once the channel access is performed, the station acquires feature, the transmitter (originator) and the receiver (recipient)
the right to transmit on the channel an entire Mac Service have to exchange some special request/response frames. On
Data Unit (MSDU), received from the higher layer, i.e., the the other hahd, whenever the originator wants to terminate
802.2 logical link control (LLC). One or more MAC Protocol the block ACK agreement, a specific notification frame has
Data Units (MPDUs) can be generated from the MSDU to be sent to the recipient. After initialization, blocks of
and forwarded to the underlying PHY. When more than one MPDUs can be delivered with a single per-block ACK frame.
MPDUs are generated out of a single MSDU, it is referred to After each block ACK, the originator retries to transmit the
as a fragmentation. Fragments belonging to the same MSDU corrupted frames either in another burst or individually. The
are transmitted back-to-back without a new channel access maximum number of frames in the block is specified, in the
operation. That is, after a successful fragment transmission, setup phase, according to the recipient reordering buffer size
the subsequent fragment is transmitted after a SIFS interval up to the number of MPDUs that can generated by 64 MSDUs
from the end of the ACK corresponding to the previous (i.e., 16 · 64 = 1024). Note that the block size does not
fragment. This operation is referred to as fragment burst. If depend on the TXOP limit. In fact, the originator can split the
the RTS/CTS access mode is employed, the whole fragment MPDUs belonging to the same block across different TXOPs.
burst is preceded by RTS and CTS transmissions. Note that the Therefore, a data block can be composed of several data bursts.
transmission unit is represented by a single MSDU delivery, The block ACK request is finally transmitted in the same
irrespective of the time required to complete the transmission. TXOP which conclude the block, or in a subsequent TXOP. As
B. IEEE 802.11e EDCA a normal ACK, the block ACK reception is expected before the
expiration of the block ACK timeout. If there is no response,
The emerging 802.11e defines Enhanced Distributed Chan- the block ACK request is retransmitted until the maximum
nel Access (EDCA) in order to provide differentiated services retry limit is reached.
among contending stations [8]. Two main features of EDCA In order to quickly identify collisions and to reduce the
includes: (1) the probability to access the channel can be dif- probability of other stations transmitting during each TXOP,
ferentiated among stations (or traffic types, exactly speaking); the head-of-burst (HOB) frame of each new data burst requires
and (2) the transmission unit can be defined based on the to be protected with an immediate ACK. The data burst
channel access time. We here skip all the details of the multiple protection mechanism can also be based on the RTS/CTS
channel access functions, since this paper focuses on the the frame exchange. In fact, after the successful reception of the
innovative aspects of the transmission and acknowledgment CTS frame, no other station can try to access the channel
operations. In fact, once a station wins a contention and starts during the time interval specified in the RTS/CTS duration
its transmission, EDCA specifies new channel utilization rules fields.
based on the transmission opportunity (TXOP) concept and 3) Channel Utilization Examples: According to the em-
on the block ACK mechanism. ployed access mode and ACK policy, four different channel
1) Transmission Opportunity: Under EDCA, each channel utilization cases are possible. We denote each case with a
access does not result necessarily in a single MSDU transmis- short acronym as summarized in Table I. Fig 1 shows different
sion. The station which wins the contention gains a TXOP. examples of channel utilizations, for a given TXOP limit value.
During a TXOP, one or more MPDUs (eventually belonging In each burst, we can identify a channel access overhead (null
to different MSDUs) can be transmitted in a burst, separated by for the BI case), due to the time wasted for the transmission
SIFS. TXOP is defined by the starting time and the maximum of the control frames required to begin the data transmission
duration. The starting time is represented by the time when burst. We include in this definition both RTS/CTS frame
the medium is determined to be available under the EDCA exchange and the HOB acknowledgment of the BB case. Once
access rules; the maximum duration is limited by a threshold, the data burst is successfully activated, a sequence of identical
called TXOP limit, 1 Fragmentation is mandatory whenever transmission units (i.e., single data frame or data frame and
the MSDU transmission duration exceeds the TXOP limit. relative ACK) is repeated on the channel. Finally, in the case
2) Block ACK Mechanism: With the 802.11e, a new ac- of block ACK, some further overheads are required for the
knowledgment scheme is also defined in order to reduce overall data bursts before the channel release.
the channel wastes due to the ACK transmissions. Basically,
the block ACK mechanism allows a block of MPDUs to III. A NALYTICAL F RAMEWORK
be transmitted, each separated by a SIFS period, and to
In the following, we consider an infrastructure Basic Service
be acknowledged by a final aggregated ACK frame, called
Set (BSS), composed of N stations employing uniform data
block ACK. The block ACK contains information about the
reception of the whole block through a corresponding bitmap, 2 Actually, there are two types of block ACK mechanisms: immediate and
delayed. In the delayed case, the block ACK request is answered with a
1 The TXOP limit is expressed in a 11-bit field in the unit of 32µs, and the normal ACK and the block ACK is sent by the receiver with the highest
maximum TXOP limit is defined to be 65536µs. possible priority in a subsequent TXOP of the receiver.

3456
Immediate ACK Block ACK RTS CTS ACK BREQ BACK DATA HP HY
Basic BI BB 160/r∗ 112/r∗ 112/r∗ 192/r 1216/r (224+P)/r 192
RTS/CTS RI RB TABLE II
TABLE I PHY PAYLOAD AND HEADER TRANSMISSION TIMES ( IN µS )
F OUR COMBINATIONS OF ACCESS MODES AND ACK POLICIES
OA OR U
BI 0 0 DATA+2SIFS+ACK
BB ACK+SIFS BREQ+2SIFS+BACK DATA + SIFS
RI RTS+2SIFS+CTS 0 DATA+2SIFS+ACK
RB RTS+2SIFS+CTS BREQ+2SIFS+BACK DATA+SIFS
TABLE III
D ECOMPOSITION OF SUCCESSFUL CHANNEL OCCUPANCY TIMES

E[Ts ], and E[Tc ] depend on the employed access mode and


ACK policy. We deal with the computation of these latter
parameters, while the former ones (Ps and E[bk]) are derived
based on the well-known results given in [1].3

A. Channel occupancy times and payloads


Fig. 1. Data burst illustration with different access modes and ACK policies: In the 802.11b WLANs, different modulation schemes with
(a) BI, (b) BB, (c), RI, and (d) RB
corresponding different data rates (namely, 1, 2, 5.5, and 11
Mbps) are available. Let r be the employed data rate, r∗
rates. Since we are not concerned about the differentiated the corresponding control frame rate (i.e., the maximum BSS
channel access of the 802.11e in this work, we assume that basic rate equal to or lower than the data rate), and rP HY
all the stations generate the traffic of the same priority, and the physical header rate in Mbps. We denote the channel
hence have the same probability to win the contention. We occupancy time of RTS/CTS exchange, standard ACK, block
also consider that all the traffic is generated toward a fixed ACK request, block ACK, and data frames, respectively with
destination (thus neglecting the block ACK setup phase over- RT S, CT S, ACK, BREQ, BACK, and DAT A. Let P
head) and that the stations work in saturation conditions, i.e., be the data frame payload. Each frame includes a common
data bursts are always available in the transmission queues. physical header HP HY , whose transmission time has to be
It is easy to understand that the network performance is added to the PHY payload time. All the time durations (in µs)
affected by two different figures: (1) the probability to have are summarized in Table II. We assume that frame corruptions
a successful channel access, and (2) the channel utilization are only due to collisions, thus avoiding any channel error
efficiency. The first figure depends on the number of compet- impairment. Therefore, with the assumption of a uniform data
ing stations. Remind that we assume the number of competing rate among the stations, PT , Ts , and Tc become constant.
stations is constant and equal to N . The second figure depends Although the block ACK mechanism is very flexible, as we
on the overhead, in terms of headers, control frames, and described in the previous section, in this section we do not
collision times, required for the data transmissions, and it is consider any block split among multiple TXOPs. Accordingly,
a function of the access mode (i.e., basic or RTS/CTS) and whenever the new ACK mechanism is employed, each TXOP
on the acknowledge policy (i.e., immediate or block ACK). is always concluded with a block ACK request and a block
Given the probability Ps to have a successful channel access, ACK transmission, and hence a data block corresponds to a
the average per-access utilization time E[slot], and payload single data burst.
bits E[PT ], the system throughput S can be easily expressed In the case of a successful access, the station which wins the
as: contention can hold the channel up to the TXOP limit time,
Ps E[PT ] and can perform multiple MPDU transmissions. We divide
S= (1)
E[slot] the channel occupancy time into three different components,
where one or two components can be zero for certain cases:
Note that E[slot] is given by the sum of two components:
(1) the channel access overhead OA , (2) the data transmission
the channel inactivity time due to backoff countdown, and the
burst, and (3) the channel release overhead OR . The data
channel occupancy time due to successful transmissions or
transmission burst is, in turns, composed of a given number
collisions, i.e.,
of unit times U , corresponding to the time required for the
E[slot] = σE[bk] + Ps E[Ts ] + (1 − Ps )E[Tc ] transmission of a single data frame. Table III specifies the
values of these components for the four different access mode
where σ is the backoff slot duration, E[bk] is the average and ACK policy combinations (see Fig. 1). Given the TXOP
number of inter-transmission backoff slots, E[Ts ] is the av- limit, the number d of data units transfered in a single channel
erage successful channel occupancy time, and E[Tc ] is the
average collision time, respectively. Note that Ps and E[bk] are 3 We use the same notation given in [1] in the case of P , while E[bk] is a
s
functions of the number of competing stations, while E[PT ], function of the Ptr parameter defined in [1] and corresponds to (1−Ptr )/Ptr .

3457
access can be expressed as: 8.5
 
T XOP − OA − OR 8 Block ACK
d= (2) 7.5
U Unprotected block ACK
7
The successful transmission time and the overall payload are

Throughput [Mbps]
6.5
given by: Immediate ACK
6

E[Ts ] = OA + d · U + OR − SIF S + DIF S (3) 5.5

E[PT ] = d·P 5

4.5 BI
Whenever a collision occurs, the channel is wasted until BB
UB
4
an idle DIFS time occurs. With the assumption of no hidden RI
RB
3.5
terminal, only the head of burst (HOB) frame can be involved 10
in the collision. In fact, after the first successful transmission, TXOP Limit [ms]

all the following control/data frames are separated by a SIFS Fig. 2. Channel utilization comparison for N = 5 and r = 11 Mbps
(< DIFS) time interval, and no other station can access the
channel. Instead, if the first frame collides, the transmitting 8.5

stations lose the channel control. Therefore, the average col- 8

lision time is: 7.5


Block ACK
E[Tc ] = H + DIF S (4) 7

Throughput [Mbps]
where H time is the time required for the HOB transmission, 6.5
Immediate ACK
which is equal to RT S in the case of 4-way handshaking and 6

equal to DAT A in the case of 2-way handshaking. 5.5


Unprotected block ACK
5
B. Block ACK mechanism variants
4.5 BI
BB
In this subsection, we describe how the previous framework 4 UB
RI
can be easily adapted to different block ACK operations. For RB
3.5
example, if no protection mechanism is adopted, i.e., if the 10
TXOP Limit [ms]
HOB frame is a data frame without a separate immediate ACK,
we have to account for two different issues: the reduction Fig. 3. Channel utilization comparison for N = 50 and r = 11 Mbps
of the channel access overhead, and the increment of the
channel waste due to a collision. Accordingly, OA = 0 and A. Maximum achievable throughput
E[Tc ] = d · U − SIF S + DIF S. Actually, this operation
(referred to as unprotected block ACK or simply UB in the Due to the low rate physical header and control frame
following) is not standard-compliant, but is considered for transmissions, the 802.11 system efficiency is severely com-
a comparative purpose. Moreover, the case of data block promised as the data rate increases. Both the TXOP and the
splitting in different channel accesses can be easily modeled block ACK mechanisms allow to improve such efficiency. On
by simply considering that the final channel release overhead one side, performing multiple transmissions in a single channel
has to be divided among all the data bursts belonging to the access reduces the weight of the time wastes due to collisions.
same block. If the data block length is B and it is split among On the other side, aggregating the acknowledgments reduces
M TXOPs, we have to assume that the release overhead is the control overheads. Fig. 2 shows the network throughput
reduced by a factor equal to M and that d = B/M . If in the case of N = 5 and r = 11 Mbps, as a function
the block ACK request is transmitted in a separate channel of the TXOP limit, for all the considered access mode and
access, HOB frame lengths are not fixed for the basic access ACK policy combinations. Note that the x-axis in the figure
case. This requires to compute collision times according to the is in a log scale. In the figure, the minimum TXOP value
expression given in [1] for a general HOB frame distribution. is 2 ms, which corresponds to a single MPDU transmission
The probability to have an HOB frame equal to the block (i.e., d = 1). As the TXOP limit increases, the throughput
ACK request or to the data frame is, respectively, 1/M and curves show a step increment whenever the number of data
(M − 1)/M . unit transmissions is increased by one unit. The standard
802.11 basic access mode (corresponding to the basic access
IV. N UMERICAL R ESULTS with TXOP limit = 2 ms and immediate ACK) gives an
overall throughput equal to 5.6 Mbps, which corresponds
In this section, we present some numerical results on the
to a normalized efficiency of almost 0.5 (= 5.6/11). From
efficiency of five combinations of access modes and ACK
the figure, we see that this throughput can be substantially
policies in different scenarios. The results have been obtained
increased with the use of the block ACK mechanism up to
from our analytical framework. We consider the 802.11b as
8.3 Mbps, with an efficiency of almost 0.75. However, the
the underlying PHY while the BSS basic rate set is assumed
block ACK is more effective than the immediate ACK, only
to include 1 and 2 Mbps. Unless specified otherwise, we use
if the block length goes beyond a given threshold (i.e., only if
a constant MSDU size of 1 KBytes.

3458
2304 2304
11 Mbps

50@11Mbps
2 Mbps
1000 1000
MPDU Size Threshold [byte]

MPDU Size Threshold [byte]


5.5 Mbps

500 1 Mbps
500
400 10@1Mbps 400
300 300

200 200

50@1Mbps

100 100
Basic Access
RTS/CTS
10 20 30 40 50 60 0 10 20 30 40 50 60
TXOP LImit [ms] TXOP LImit [ms]

Fig. 4. MPDU payload threshold over which the RTS/CTS access is better Fig. 6. MPDU payload threshold under which the block ACK mechanism
than the basic access (both with immediate ACK) vs. TXOP limit is better than the immediate ACK vs. TXOP limit

2304 2304
5@11Mbps
11 Mbps 5@5.5Mbps

1000 1000

MPDU Size Threshold [byte]


MPDU Size Threshold [byte]

11 Mbps
5.5 Mbps

500 500 5@2Mbps


400 5.5 Mbps 400 50@11Mbps
300 300
5@1Mbps
2 Mbps
200 200
50@5.5Mbps
1 Mbps
2 Mbps
100 100
Immediate ACK 1 Mbps
Block ACK
10 20 30 40 50 60 10 20 30 40 50 60
number of stations TXOP LImit [ms]

Fig. 5. MPDU payload threshold over which the RTS/CTS access is better Fig. 7. MPDU payload threshold under which the unprotected block ACK
than the basic access vs. the number of competing stations mechanism is better than the immediate ACK

T XOP > 4 ms). Since the number of active stations is small, the following condition holds:
thus resulting in a small collision probability, the RTS/CTS ∆d/d1 > ∆E[slot]/E[slot1 ] (5)
access mode gives a worse performance than the basic access
mode in both immediate and block ACK cases. Finally, note where ∆d = d1 −d2 , and ∆E[slot] = E[slot1 ]−E[slot2 ] and
that the unprotected block ACK mechanism is also better than the subscripts 1 and 2 are used to refer, respectively, to first
the immediate ACK one for long block transmissions. Fig. 3 method and second method parameters. Given N , and hence
shows the network throughput in the case of a higher load Ps , this condition can be rearranged as a constraint on the
condition, i.e., N = 50. Again, the figure remarks how the MPDU length P , for each value of TXOP limit. Note that, in
multiple bursts and block ACK features improve the system general, since the definition of d involves the floor function, the
efficiency. However, two differences are observed from the solution cannot be expressed by a single threshold value. Note
previous case: (1) the RTS/CTS access mode in some cases that the inequality can be satisfied in multiple discontinuous
gives slightly better performance than the basic access one, P ranges.
and (2) the unprotected block ACK mechanism is always less 1) RTS/CTS vs. Basic Access: Fig. 4 shows the MPDU P
efficient than the immediate ACK. Both observations are due ranges in which the RTS/CTS 4-way handshaking is more
to the large collision probability experienced in the case of advantageous than the 2-way basic access, in the case of
high load conditions. immediate ACK, as the TXOP limit increases. The results
are obtained for different congestion states (i.e., N = 5
B. Efficiency thresholds and N = 50) and for different data rates (i.e., r = 1 and
As we observed in the previous subsection, given the r = 11 Mbps). Each curve represents the base threshold value
payload MPDU length P , the performance of different access over which the RTS/CTS access gives a better performance,
mode and ACK policy combinations depends on the number with the exception of the the shaded regions, in which the
of competing stations N and the TXOP limit value. By basic access mode is again better. For example, in the case
comparing two generic utilization mechanisms, which result of 10 stations at 1 Mbps and TXOP = 10 ms, we observe
in S1 and S2 , respectively, we can conclude that the first that the RTS/CTS access is generally better when P > 430
one outperforms the second one (i.e., S1 > S2 ) whenever Bytes. However, the RTS/CTS access works worse whenever

3459
P belongs to the range of [490, 530] bytes. From the figure, we Fig. 7 shows how the P ranges, in which the block ACK
see a very interesting result: given N and r, the base threshold is more advantageous, change when the HOB frame is not
mostly does not depend on the TXOP value, but stays constant. immediately acknowledged (i.e., unprotected block ACK or
In fact, when ∆d = 0 (this condition is satisfied in most cases, U B case). In this case, the number of contending stations is
since we compare the access modes for a given ACK policy a very important parameter. For high collision probability and
and then for the same transmission unit U ), Eq. (5) becomes low data rate (e.g., N = 50 and r < 5.5 Mbps), U B is not
∆E[slot] < 0. This means that the RTS/CTS method gives advantageous at all. Only for low collision probability cases,
the best performance if the collision time reduction due to it can be useful, although the P maximum size (which result
the shorter HOB frame is more significant than the additional almost independent on the TXOP value for long transmission
overhead introduced by the RTS/CTS frame exchange, i.e., burst) is strongly reduced in comparison with the previous
  case.
Ps
P + 224 > (O A1 − OA2 ) + RT S ·r V. C ONCLUSIONS
1 − Ps
In this paper, we analyze the performance of new channel
The threshold does not depend on the burst length, and hence
utilization mechanisms, based on data burst transmissions,
not on the TXOP value either. On the other hand, when
supported by the emerging IEEE 802.11e. We develop an
∆d = 0, the RTS/CTS access transmits fewer MPDUs than the
analytical framework to evaluate the impact of different access
basic one (actually by one, i.e., ∆d = 1), and it results that the
modes (i.e., 2-way/4-way handshaking) and acknowledgment
performance gets worse than the basic access one, irrespective
policies (i.e., immediate/block ACK) on the overall system
of ∆E[slot]. This condition is satisfied periodically in the
performance. Through the analytical modeling, we show that,
shaded ranges of Fig. 4. Due to the same reason, some
given a MPDU size and a TXOP limit, the access mode and
triangular pulses along the threshold curves are also observed.
the ACK policy have a great impact on the overall system
Fig. 5 plots the base P threshold value, in both immediate
throughput, and some optimizations are possible. For example,
ACK and block ACK cases, for different data rates, as a
we prove that the block ACK is generally not useful for low
function of the network load conditions. As the data rate
data rates and low TXOP values, while it is very attractive for
increases, the payload transmission time is shortened, and
high data rate transmissions. Another interesting conclusion
hence the threshold grows larger . This implies that only for
is that the optimal selection between immediate and block
highly loaded conditions the 4-way access gives advantage.
ACK does not depend on the number of contending stations.
For example, in the case of immediate ACK and r = 11
We quantify these comparisons by providing the efficiency
Mbps, only when the number of stations is larger than 23,
thresholds needed to select the best possible mechanism.
the RTS/CTS access mode can be beneficial. Note that the
Finally, we discuss the role of the block ACK protection
thresholds are lower whenever the block ACK is used, since
mechanisms, i.e., of the HOB immediate ACK. For the space
in this case the 2-way/4-way overhead difference is reduced
limitations, we have omitted some results and generalizations,
(due to the ACK required in both cases for the HOB frame).
including the data block splitting among different TXOPs, in
2) Block ACK vs. Immediate ACK: Fig. 6 shows the MPDU
this paper.
P ranges, in which the block ACK is more advantageous
than the immediate ACK, as the TXOP limit value increases. R EFERENCES
The results are obtained for both basic and RTS/CTS access [1] G. Bianchi, “Performance Analysis of the IEEE 802.11 Distributed
Coordination Function,” IEEE Journal of Selected Areas in Commu-
modes. From the figure, we observe that, in this case, the P nications, vol. 18, no. 3, March 2000.
ranges can be simply represented by a limit curve. Specifically, [2] S. Choi et al., “Multiple Frame Exchanges during EDCF TXOP,” IEEE
the block ACK is more advantageous whenever the MPDU 802.11-01/566r3, Jan. 2002.
[3] S. Choi et al., “IEEE 802.11e Contention-Based Channel Access
size is smaller than the limit curve value. Another interesting (EDCF) Performance Evaluation,” in Proc. IEEE ICC’03, May 2003.
conclusion is that the limit curves do not depend on the number [4] J. del Prado Pavon and S. Choi, “Link Adaptation Strategy for IEEE
of contending stations. In fact, it can be easily shown that, the 802.11 WLAN via Received Signal Strength Measurement,” in Proc.
IEEE ICC’2003, vol. 2, May 2003.
limit condition is reached when the block ACK and immediate [5] J. del Prado Pavon and S. Shankar N, “Impact of Frame Size, Number of
ACK data bursts have the same length. In this condition, Stations and Mobility on the Throughput Performance of IEEE 802.11e,”
the variation of E[slot] does not depend on the number of in Proc. IEEE WCNC’2004, March 2004.
[6] IEEE 802.11-1999 (R2003), Part 11: Wireless LAN Medium Access
competing stations, since the collision times are constant for Control (MAC) and Physical Layer (PHY) specifications, 1999 Ed.
both methods. Whenever d1 results greater than d2 , since (Reaff. 2003), June 2003.
E[slot1 ] cannot be larger than E[slot2 ] + Ps U2 (otherwise, [7] IEEE 802.11b-1999, Supplement to Part 11: Wireless LAN Medium Ac-
cess Control (MAC) and Physical Layer (PHY) specifications: Higher-
another data unit transmission could be performed within the speed Physical Layer Extension in the 2.4 GHz Band, 1999.
TXOP limit for mechanism 2), it results S1 > S2 , irrespective [8] IEEE 802.11e/D8.0, Draft Supplement to Part 11: Wireless Medium
of a specific ∆E[slot] value. From the figure, we observe that, Access Control (MAC) and physical layer (PHY) specifications: Medium
Access Control (MAC) Enhancements for Quality of Service (QoS), Feb.
for high data rates, the block ACK is advantageous virtually 2004.
in all situations (e.g., for TXOP > 8 ms at 11 Mbps, it is the [9] D. Qiao, S. Choi, and K. G. Shin, “Goodput Analysis and Link
best policy for every frame size), while for low data rate, it Adaptation for IEEE 802.11a Wireless LANs,” IEEE Trans. on Mobile
Computing, vol. 1, no. 4, 2002, pp. 278–292.
can be effective only for small frame transmissions. The trend [10] S. Simoens, P. Pellati, J. Gosteau, and K. Gosse, “The Evolution of 5
does not depend on the access mode employed, although in GHz WLAN toward Higher Throughputs,” IEEE Wireless Communica-
the RTS/CTS case the threshold values are slightly larger. tions, vol. 10, no. 6, 2003.

3460

You might also like