Professional Documents
Culture Documents
Abstract— The channel utilization efficiency of the standard higher layers is treated by the MAC independently of all
802.11 networks is severely compromised when high data trans- others. The revolutionary idea introduced in 802.11e is the
mission rates are employed since physical layer headers and establishment of temporary channel-services for a burst of
control frames are transmitted at low rate, thus wasting more
channel time proportionally. The extensions defined in the emerg- frames addressed to the same destination. These frames can
ing 802.11e for quality-of-service (QoS) provisioning include some be sent in a single channel access with a common acknowl-
new mechanisms developed in order to improve the efficiency. edgment. In this paper, we deal with this new transmission
Those include data transmission bursting (referred to as TXOP service.
operation) and acknowledgment aggregation (referred to as block The rest of the paper is organized as follows: In Section
ACK). These two features allow to offer new data transmission
services, in which the data delivery and acknowledgment unit II, we describe the concept of data bursting and block ac-
is not a single frame, but a block of frames. In this paper, knowledgment. Then, we in Section III introduce a simple
we evaluate the performance of these operations for both basic analytical framework, which allows us to derive the system
and RTS/CTS access cases. We quantify how the data bursting performance for different access modes, data burst lengths, and
and block ACK mechanisms can affect the system efficiency acknowledgment policies. After we discuss some numerical
for different environments, and derive the maximum achievable
throughput. We also discuss the operating conditions at which the results in Section IV, we conclude the paper in Section V.
switch from a channel utilization method to another is desired.
II. C HANNEL ACCESS AND T RANSMISSION O PERATIONS
I. I NTRODUCTION In distributed WLAN environments, e.g., based on IEEE
Today’s 802.11 wireless LANs (WLANs) provide multiple 802.11 distributed coordination function (DCF), the mandatory
rates for data transmissions by employing different sets of MAC of the 802.11, a common radio resource (channel) is
modulation and channel coding schemes. For example, the shared among a given number of associated users, without
popular 802.11b physical (PHY) layer provides 1, 2, 5.5, and any centralized coordination. The management of the common
11 Mbps [7], while the emerging 802.11a and 802.11g provide medium is specified by two different aspects: (1) the multiple
6 to 54 Mbps. These multiple transmission rates can be used access resolution, i.e., the rules according to which a given
for frame transmissions in an adaptive manner depending on station acquires the right to use the channel, and (2) the chan-
the underlying channel conditions [9], [4]. Specifically, high nel transmission operations, i.e., the rules according to which
data rates can be exploited only by stations which perceive the station that wins the contention can perform transmissions
good channel conditions. Since different stations, in general, without losing the control of the channel. In this section, we
use different data rates, control frames are transmitted at a rate briefly describe the substantial innovations introduced by the
supported by all the stations, i.e., at one of the rates in the 802.11e extensions regarding the second aspect.
basic rate set, while the physical header transmission time is
fixed. This constraint affects the channel utilization efficiency A. Legacy DCF
of data transmissions, since the weights of PHY overheads and The 802.11 DCF works on the basis of the well-
control frames (required to access the channel) do not decrease known carrier-sense multiple access with collision avoidance
at the same factor as the payload transmission time reduction. (CSMA/CA) protocol. Whenever a given station has a frame
Therefore, the throughput is increasingly dominated by such to transmit, it waits until the channel becomes idle for a
overheads for high data rates. given amount of time (Distributed Interframe Space or DIFS
In order to improve the system efficiency, new operations, interval), and then accesses the channel following exponential
namely, data transmission bursting and aggregated acknowl- backoff rules. If a successful reception occurs, the destination
edgments, are being standardized as part of the emerging IEEE station responds, after a Short Interframe Space (SIFS) with an
802.11e medium access control (MAC) [8], which is widely acknowledgment (ACK) frame. Since SIFS < DIFS, no other
discussed in current literature. While several studies evaluate stations are able to access the channel between the data and
the new channel access features [2], [3], few results have been the ACK frames. These explicit acknowledgments are required
so far reported about these new transmission operations [10]. in order to identify transmission failures due to collisions or
The original MAC definition provides a connectionless inter- channel errors.
face to higher layers, i.e., each frame delivered down from Two different access modes, i.e., basic access and request-
to-send/clear-to-send (RTS/CTS) access, provide 2-way and 4-
This work is in part supported by grant number (R08-2004-000-10384-0)
from the basic research program of Korea Science and Engineering Foundation way handshaking, respectively. In the basic access case, after
(KOSEF) and by the italian FIRB research project PRIMO. the contention resolution, the station is allowed to immediately
3455
0-7803-8938-7/05/$20.00 (C) 2005 IEEE
transmit the pending data frame. On the other hand, in and it is transmitted after an explicit transmitter request. This
the RTS/CTS access case, the data transmission is preceded request is performed by a new control frame, called block
by the transmission of special short RTS and CTS control ACK request.2 Both the block ACK request and the block
frames. This operation allows to combat the hidden terminal ACK control frames are transmitted at the same rate used for
phenomenon and to reduce the collision times. the data frame transmissions. Before using the block ACK
Once the channel access is performed, the station acquires feature, the transmitter (originator) and the receiver (recipient)
the right to transmit on the channel an entire Mac Service have to exchange some special request/response frames. On
Data Unit (MSDU), received from the higher layer, i.e., the the other hahd, whenever the originator wants to terminate
802.2 logical link control (LLC). One or more MAC Protocol the block ACK agreement, a specific notification frame has
Data Units (MPDUs) can be generated from the MSDU to be sent to the recipient. After initialization, blocks of
and forwarded to the underlying PHY. When more than one MPDUs can be delivered with a single per-block ACK frame.
MPDUs are generated out of a single MSDU, it is referred to After each block ACK, the originator retries to transmit the
as a fragmentation. Fragments belonging to the same MSDU corrupted frames either in another burst or individually. The
are transmitted back-to-back without a new channel access maximum number of frames in the block is specified, in the
operation. That is, after a successful fragment transmission, setup phase, according to the recipient reordering buffer size
the subsequent fragment is transmitted after a SIFS interval up to the number of MPDUs that can generated by 64 MSDUs
from the end of the ACK corresponding to the previous (i.e., 16 · 64 = 1024). Note that the block size does not
fragment. This operation is referred to as fragment burst. If depend on the TXOP limit. In fact, the originator can split the
the RTS/CTS access mode is employed, the whole fragment MPDUs belonging to the same block across different TXOPs.
burst is preceded by RTS and CTS transmissions. Note that the Therefore, a data block can be composed of several data bursts.
transmission unit is represented by a single MSDU delivery, The block ACK request is finally transmitted in the same
irrespective of the time required to complete the transmission. TXOP which conclude the block, or in a subsequent TXOP. As
B. IEEE 802.11e EDCA a normal ACK, the block ACK reception is expected before the
expiration of the block ACK timeout. If there is no response,
The emerging 802.11e defines Enhanced Distributed Chan- the block ACK request is retransmitted until the maximum
nel Access (EDCA) in order to provide differentiated services retry limit is reached.
among contending stations [8]. Two main features of EDCA In order to quickly identify collisions and to reduce the
includes: (1) the probability to access the channel can be dif- probability of other stations transmitting during each TXOP,
ferentiated among stations (or traffic types, exactly speaking); the head-of-burst (HOB) frame of each new data burst requires
and (2) the transmission unit can be defined based on the to be protected with an immediate ACK. The data burst
channel access time. We here skip all the details of the multiple protection mechanism can also be based on the RTS/CTS
channel access functions, since this paper focuses on the the frame exchange. In fact, after the successful reception of the
innovative aspects of the transmission and acknowledgment CTS frame, no other station can try to access the channel
operations. In fact, once a station wins a contention and starts during the time interval specified in the RTS/CTS duration
its transmission, EDCA specifies new channel utilization rules fields.
based on the transmission opportunity (TXOP) concept and 3) Channel Utilization Examples: According to the em-
on the block ACK mechanism. ployed access mode and ACK policy, four different channel
1) Transmission Opportunity: Under EDCA, each channel utilization cases are possible. We denote each case with a
access does not result necessarily in a single MSDU transmis- short acronym as summarized in Table I. Fig 1 shows different
sion. The station which wins the contention gains a TXOP. examples of channel utilizations, for a given TXOP limit value.
During a TXOP, one or more MPDUs (eventually belonging In each burst, we can identify a channel access overhead (null
to different MSDUs) can be transmitted in a burst, separated by for the BI case), due to the time wasted for the transmission
SIFS. TXOP is defined by the starting time and the maximum of the control frames required to begin the data transmission
duration. The starting time is represented by the time when burst. We include in this definition both RTS/CTS frame
the medium is determined to be available under the EDCA exchange and the HOB acknowledgment of the BB case. Once
access rules; the maximum duration is limited by a threshold, the data burst is successfully activated, a sequence of identical
called TXOP limit, 1 Fragmentation is mandatory whenever transmission units (i.e., single data frame or data frame and
the MSDU transmission duration exceeds the TXOP limit. relative ACK) is repeated on the channel. Finally, in the case
2) Block ACK Mechanism: With the 802.11e, a new ac- of block ACK, some further overheads are required for the
knowledgment scheme is also defined in order to reduce overall data bursts before the channel release.
the channel wastes due to the ACK transmissions. Basically,
the block ACK mechanism allows a block of MPDUs to III. A NALYTICAL F RAMEWORK
be transmitted, each separated by a SIFS period, and to
In the following, we consider an infrastructure Basic Service
be acknowledged by a final aggregated ACK frame, called
Set (BSS), composed of N stations employing uniform data
block ACK. The block ACK contains information about the
reception of the whole block through a corresponding bitmap, 2 Actually, there are two types of block ACK mechanisms: immediate and
delayed. In the delayed case, the block ACK request is answered with a
1 The TXOP limit is expressed in a 11-bit field in the unit of 32µs, and the normal ACK and the block ACK is sent by the receiver with the highest
maximum TXOP limit is defined to be 65536µs. possible priority in a subsequent TXOP of the receiver.
3456
Immediate ACK Block ACK RTS CTS ACK BREQ BACK DATA HP HY
Basic BI BB 160/r∗ 112/r∗ 112/r∗ 192/r 1216/r (224+P)/r 192
RTS/CTS RI RB TABLE II
TABLE I PHY PAYLOAD AND HEADER TRANSMISSION TIMES ( IN µS )
F OUR COMBINATIONS OF ACCESS MODES AND ACK POLICIES
OA OR U
BI 0 0 DATA+2SIFS+ACK
BB ACK+SIFS BREQ+2SIFS+BACK DATA + SIFS
RI RTS+2SIFS+CTS 0 DATA+2SIFS+ACK
RB RTS+2SIFS+CTS BREQ+2SIFS+BACK DATA+SIFS
TABLE III
D ECOMPOSITION OF SUCCESSFUL CHANNEL OCCUPANCY TIMES
3457
access can be expressed as: 8.5
T XOP − OA − OR 8 Block ACK
d= (2) 7.5
U Unprotected block ACK
7
The successful transmission time and the overall payload are
Throughput [Mbps]
6.5
given by: Immediate ACK
6
E[PT ] = d·P 5
4.5 BI
Whenever a collision occurs, the channel is wasted until BB
UB
4
an idle DIFS time occurs. With the assumption of no hidden RI
RB
3.5
terminal, only the head of burst (HOB) frame can be involved 10
in the collision. In fact, after the first successful transmission, TXOP Limit [ms]
all the following control/data frames are separated by a SIFS Fig. 2. Channel utilization comparison for N = 5 and r = 11 Mbps
(< DIFS) time interval, and no other station can access the
channel. Instead, if the first frame collides, the transmitting 8.5
Throughput [Mbps]
where H time is the time required for the HOB transmission, 6.5
Immediate ACK
which is equal to RT S in the case of 4-way handshaking and 6
3458
2304 2304
11 Mbps
50@11Mbps
2 Mbps
1000 1000
MPDU Size Threshold [byte]
500 1 Mbps
500
400 10@1Mbps 400
300 300
200 200
50@1Mbps
100 100
Basic Access
RTS/CTS
10 20 30 40 50 60 0 10 20 30 40 50 60
TXOP LImit [ms] TXOP LImit [ms]
Fig. 4. MPDU payload threshold over which the RTS/CTS access is better Fig. 6. MPDU payload threshold under which the block ACK mechanism
than the basic access (both with immediate ACK) vs. TXOP limit is better than the immediate ACK vs. TXOP limit
2304 2304
5@11Mbps
11 Mbps 5@5.5Mbps
1000 1000
11 Mbps
5.5 Mbps
Fig. 5. MPDU payload threshold over which the RTS/CTS access is better Fig. 7. MPDU payload threshold under which the unprotected block ACK
than the basic access vs. the number of competing stations mechanism is better than the immediate ACK
T XOP > 4 ms). Since the number of active stations is small, the following condition holds:
thus resulting in a small collision probability, the RTS/CTS ∆d/d1 > ∆E[slot]/E[slot1 ] (5)
access mode gives a worse performance than the basic access
mode in both immediate and block ACK cases. Finally, note where ∆d = d1 −d2 , and ∆E[slot] = E[slot1 ]−E[slot2 ] and
that the unprotected block ACK mechanism is also better than the subscripts 1 and 2 are used to refer, respectively, to first
the immediate ACK one for long block transmissions. Fig. 3 method and second method parameters. Given N , and hence
shows the network throughput in the case of a higher load Ps , this condition can be rearranged as a constraint on the
condition, i.e., N = 50. Again, the figure remarks how the MPDU length P , for each value of TXOP limit. Note that, in
multiple bursts and block ACK features improve the system general, since the definition of d involves the floor function, the
efficiency. However, two differences are observed from the solution cannot be expressed by a single threshold value. Note
previous case: (1) the RTS/CTS access mode in some cases that the inequality can be satisfied in multiple discontinuous
gives slightly better performance than the basic access one, P ranges.
and (2) the unprotected block ACK mechanism is always less 1) RTS/CTS vs. Basic Access: Fig. 4 shows the MPDU P
efficient than the immediate ACK. Both observations are due ranges in which the RTS/CTS 4-way handshaking is more
to the large collision probability experienced in the case of advantageous than the 2-way basic access, in the case of
high load conditions. immediate ACK, as the TXOP limit increases. The results
are obtained for different congestion states (i.e., N = 5
B. Efficiency thresholds and N = 50) and for different data rates (i.e., r = 1 and
As we observed in the previous subsection, given the r = 11 Mbps). Each curve represents the base threshold value
payload MPDU length P , the performance of different access over which the RTS/CTS access gives a better performance,
mode and ACK policy combinations depends on the number with the exception of the the shaded regions, in which the
of competing stations N and the TXOP limit value. By basic access mode is again better. For example, in the case
comparing two generic utilization mechanisms, which result of 10 stations at 1 Mbps and TXOP = 10 ms, we observe
in S1 and S2 , respectively, we can conclude that the first that the RTS/CTS access is generally better when P > 430
one outperforms the second one (i.e., S1 > S2 ) whenever Bytes. However, the RTS/CTS access works worse whenever
3459
P belongs to the range of [490, 530] bytes. From the figure, we Fig. 7 shows how the P ranges, in which the block ACK
see a very interesting result: given N and r, the base threshold is more advantageous, change when the HOB frame is not
mostly does not depend on the TXOP value, but stays constant. immediately acknowledged (i.e., unprotected block ACK or
In fact, when ∆d = 0 (this condition is satisfied in most cases, U B case). In this case, the number of contending stations is
since we compare the access modes for a given ACK policy a very important parameter. For high collision probability and
and then for the same transmission unit U ), Eq. (5) becomes low data rate (e.g., N = 50 and r < 5.5 Mbps), U B is not
∆E[slot] < 0. This means that the RTS/CTS method gives advantageous at all. Only for low collision probability cases,
the best performance if the collision time reduction due to it can be useful, although the P maximum size (which result
the shorter HOB frame is more significant than the additional almost independent on the TXOP value for long transmission
overhead introduced by the RTS/CTS frame exchange, i.e., burst) is strongly reduced in comparison with the previous
case.
Ps
P + 224 > (O A1 − OA2 ) + RT S ·r V. C ONCLUSIONS
1 − Ps
In this paper, we analyze the performance of new channel
The threshold does not depend on the burst length, and hence
utilization mechanisms, based on data burst transmissions,
not on the TXOP value either. On the other hand, when
supported by the emerging IEEE 802.11e. We develop an
∆d = 0, the RTS/CTS access transmits fewer MPDUs than the
analytical framework to evaluate the impact of different access
basic one (actually by one, i.e., ∆d = 1), and it results that the
modes (i.e., 2-way/4-way handshaking) and acknowledgment
performance gets worse than the basic access one, irrespective
policies (i.e., immediate/block ACK) on the overall system
of ∆E[slot]. This condition is satisfied periodically in the
performance. Through the analytical modeling, we show that,
shaded ranges of Fig. 4. Due to the same reason, some
given a MPDU size and a TXOP limit, the access mode and
triangular pulses along the threshold curves are also observed.
the ACK policy have a great impact on the overall system
Fig. 5 plots the base P threshold value, in both immediate
throughput, and some optimizations are possible. For example,
ACK and block ACK cases, for different data rates, as a
we prove that the block ACK is generally not useful for low
function of the network load conditions. As the data rate
data rates and low TXOP values, while it is very attractive for
increases, the payload transmission time is shortened, and
high data rate transmissions. Another interesting conclusion
hence the threshold grows larger . This implies that only for
is that the optimal selection between immediate and block
highly loaded conditions the 4-way access gives advantage.
ACK does not depend on the number of contending stations.
For example, in the case of immediate ACK and r = 11
We quantify these comparisons by providing the efficiency
Mbps, only when the number of stations is larger than 23,
thresholds needed to select the best possible mechanism.
the RTS/CTS access mode can be beneficial. Note that the
Finally, we discuss the role of the block ACK protection
thresholds are lower whenever the block ACK is used, since
mechanisms, i.e., of the HOB immediate ACK. For the space
in this case the 2-way/4-way overhead difference is reduced
limitations, we have omitted some results and generalizations,
(due to the ACK required in both cases for the HOB frame).
including the data block splitting among different TXOPs, in
2) Block ACK vs. Immediate ACK: Fig. 6 shows the MPDU
this paper.
P ranges, in which the block ACK is more advantageous
than the immediate ACK, as the TXOP limit value increases. R EFERENCES
The results are obtained for both basic and RTS/CTS access [1] G. Bianchi, “Performance Analysis of the IEEE 802.11 Distributed
Coordination Function,” IEEE Journal of Selected Areas in Commu-
modes. From the figure, we observe that, in this case, the P nications, vol. 18, no. 3, March 2000.
ranges can be simply represented by a limit curve. Specifically, [2] S. Choi et al., “Multiple Frame Exchanges during EDCF TXOP,” IEEE
the block ACK is more advantageous whenever the MPDU 802.11-01/566r3, Jan. 2002.
[3] S. Choi et al., “IEEE 802.11e Contention-Based Channel Access
size is smaller than the limit curve value. Another interesting (EDCF) Performance Evaluation,” in Proc. IEEE ICC’03, May 2003.
conclusion is that the limit curves do not depend on the number [4] J. del Prado Pavon and S. Choi, “Link Adaptation Strategy for IEEE
of contending stations. In fact, it can be easily shown that, the 802.11 WLAN via Received Signal Strength Measurement,” in Proc.
IEEE ICC’2003, vol. 2, May 2003.
limit condition is reached when the block ACK and immediate [5] J. del Prado Pavon and S. Shankar N, “Impact of Frame Size, Number of
ACK data bursts have the same length. In this condition, Stations and Mobility on the Throughput Performance of IEEE 802.11e,”
the variation of E[slot] does not depend on the number of in Proc. IEEE WCNC’2004, March 2004.
[6] IEEE 802.11-1999 (R2003), Part 11: Wireless LAN Medium Access
competing stations, since the collision times are constant for Control (MAC) and Physical Layer (PHY) specifications, 1999 Ed.
both methods. Whenever d1 results greater than d2 , since (Reaff. 2003), June 2003.
E[slot1 ] cannot be larger than E[slot2 ] + Ps U2 (otherwise, [7] IEEE 802.11b-1999, Supplement to Part 11: Wireless LAN Medium Ac-
cess Control (MAC) and Physical Layer (PHY) specifications: Higher-
another data unit transmission could be performed within the speed Physical Layer Extension in the 2.4 GHz Band, 1999.
TXOP limit for mechanism 2), it results S1 > S2 , irrespective [8] IEEE 802.11e/D8.0, Draft Supplement to Part 11: Wireless Medium
of a specific ∆E[slot] value. From the figure, we observe that, Access Control (MAC) and physical layer (PHY) specifications: Medium
Access Control (MAC) Enhancements for Quality of Service (QoS), Feb.
for high data rates, the block ACK is advantageous virtually 2004.
in all situations (e.g., for TXOP > 8 ms at 11 Mbps, it is the [9] D. Qiao, S. Choi, and K. G. Shin, “Goodput Analysis and Link
best policy for every frame size), while for low data rate, it Adaptation for IEEE 802.11a Wireless LANs,” IEEE Trans. on Mobile
Computing, vol. 1, no. 4, 2002, pp. 278–292.
can be effective only for small frame transmissions. The trend [10] S. Simoens, P. Pellati, J. Gosteau, and K. Gosse, “The Evolution of 5
does not depend on the access mode employed, although in GHz WLAN toward Higher Throughputs,” IEEE Wireless Communica-
the RTS/CTS case the threshold values are slightly larger. tions, vol. 10, no. 6, 2003.
3460