Professional Documents
Culture Documents
11
Drabu, Yasir
Department of Computer Science, Kent State University
Contents
1. Abstract
2. Introduction
3. Background
3.1. 802.11 Mac Sub layer
3.2. Distributed Coordination Function (DCF)
3.3. Virtual Carrier Sense
3.4. Point Coordination Function
3.5. Fragmentation
4. QoS Techniques in 802.11
4.1. Introduction
4.2. Classification of service differentiation techniques
4.2.1. Differentiated services based on DCF
4.2.1.1. Backoff Increase Function or Distributed Fair Scheduling
4.2.1.2. Varying DIFS
4.2.1.3. Maximum Frame Length
4.2.1.4. Extended DCF
4.2.1.5. Blackburst
4.2.2. Differentiated services based on PCF
4.2.2.1. Hybrid Coordination Function
4.2.2.2. Distributed TDM
5. Conclusion
6. Future Work
7. References
1. ABSTRACT
Currently lot of work is being done to provide service differentiation in the Internet.
However, in wireless environments where bandwidth is scarce and channel conditions
are variable, IP differentiated services are sub-optimal without lower layers’ support. This
paper discusses the 802.11 MAC layer and provides a survey of the different techniques
used for differentiation of service.
2. INTRODUCTION
The most important functions of the MAC layer for a wireless network include controlling
channel access, maintaining Quality of Service (QoS),and providing security. Wireless
links have characteristics that differ from those of fixed links, such as high packet loss
rate, bursts of packet loss, packet re-ordering, and large packet delay and packet delay
variation. Furthermore, the wireless link characteristics are not constant and may vary in
time and place. The mobility of users poses additional requirements, as the end-to-end
path may be changed when users change their point of attachment. Users expect to
receive the same QoS after they have changed their point of attachment. This implies
that the new end-to-end path should also support the existing QoS (i.e., a reservation on
the new path may be required),and problems arise when the new path cannot support
the required.
In section 3 we discuss the 802.11 protocol and how it transports data under different
scenarios. In section 4 we will survey the different service differentiation techniques that
have been considered to work with 802.11.
Carrier sensing can be performed on both physical and MAC layers. On the physical
layer, physical carrier sensing is done by sensing any channel activity caused by other
sources. On the MAC sub-layer, virtual carrier sensing can be done by updating a local
NAV with the value of other terminals’ transmission duration. This duration is declared in
data, RTS and CTS frames. Using the NAV, a STA’s MAC knows when the current
transmission ends. NAV is updated upon hearing an RTS from the sender and/or a CTS
from the receiver, so the hidden node problem is avoided. The collision avoidance part
of CSMA/CA consists of avoiding packet transmission right after the channel is sensed
idle for DIFS time, so it does not collide with other “waiting” packets. Instead, a WT with
a packet ready to be transmitted waits the channel to become idle for DIFS time, then it
waits for an additional random time, backoff time, after which the packet is transmitted,
as shown in Figure. 2 and 3. Collision avoidance is applied on data packets in the basic
scheme, and on RTS packets in the RTS/CTS scheme. The backoff time of each STA is
where Slot_time is a function of the physical layer and rand() is a random function with a
uniform distribution in [0,1].
When a terminal's turn in the poll comes, the PC sends a data packet to it (if any such
data is buffered) piggybacked by a poll token or simply a poll token. The receiver sends
back an ACK after SIFS seconds or any buffered data piggibacked with an ACK. Note
that all packets are separated by SIFS seconds, this is why piggibacking is very useful in
this transmission scenario. Priority polling mechanisms can be used if different QOS
levels are requested by different polled users.
3.5 Fragmentation
The MAC also
supports a concept
called fragmentation
that provides for
flexibility in
transmitter/receiver
design, and can be
useful in environments
with RF interference.
An 802.11 transmitter
can optionally break
messages into smaller
fragments for
sequential Figure 5: Frame Fragmentation in 802.11
transmission. A
receiver can more
reliably receive the shorter date bursts because the shorter duration of each fragment
transmission reduces the chance for errors due to signal fading or noise. Moreover, the
smaller fragments have a better chance of escaping burst interference such as that from
a microwave source. The 802.11 standard mandates that all receivers support
fragmentation but leaves such support optional on transmitters.
Fig. 5 shows how a STA would send a fragmented packet We can see there are no
RTSs between packet fragments, so a given WT keeps sending its packet fragments as
long as it is receiving the corresponding ACKs. Meanwhile, all other STAs are “quiet.”
This leads us to almost the same data rate shares as if there were no fragmentation,
unless there is fragment loss (thus a new RTS), due to a noisy channel for example. In
the case of no fragment loss, both above cases can then be described by the former
one, i.e. limiting packet lengths to a given value.
This technique limits the risk to have to retransmit a package and thus improves overall
the performances of the network without wire. The MAC layer is responsible for the
reconstitution of the received fragments, the processing being thus transparent for the
protocols of higher level.
4.1 Introduction
There is more than one way to characterize Quality of Service (QoS). Generally, QoS is
the ability of a network element (e.g. an application, a host or a router) to provide some
level of assurance for consistent network data delivery. Some applications are more
stringent about their QoS requirements than others, and for this reason (among others)
we have two basic types of QoS available:
Per Aggregate: An aggregate is simply two or more flows. Typically the flows will
have something in common (e.g. any one or more of the 5-tuple parameters, a
label or a priority number, or perhaps some authentication information).
In the next section we classify and discuss some of the techniques that can be
applied to obtain differentiated services in a 802.11 base network.
Backoff Increase Function Varying DIFS Hybrid Coordination Function Distributed TDM
Blackburst
Figure. 5 shows how a STA would send a fragmented packet. We can see there are no
RTSs between packet fragments, so a given WT keeps sending its packet fragments as
long as it is receiving the corresponding ACKs. Meanwhile, all other STAs are “quiet.”
This leads us to almost the same data rate shares as if there were no fragmentation,
unless there is fragment loss (thus a new RTS), due to a noisy channel for example. In
the case of no fragment loss, both above cases can then be described by the former
one, i.e. limiting packet lengths to a given value.
4.2.1.5 Blackburst
The main goal of Blackburst [2] is to minimize the delay for real-time traffic. Unlike the
other schemes it imposes certain requirements on the high priority stations. Blackburst
requires: 1) all high priority stations try to access the medium with equal, constant
intervals, tsch ; and 2) the ability to jam the medium for a period of time. When a high
priority station wants to send a frame, it senses the medium to see if it has been idle for
a PIFS and then sends its frame. If the medium is busy, the station waits for the medium
to be idle for a PIFS and then enters a black burst contention period. The station now
sends a so called black burst to jam the channel. The length of the black burst is
determined by the time the station has waited to access the medium, and is calculated
as a number of black slots. After transmitting the black burst, the station listens to the
medium for a short period of time (less than a black slot) to see if some other station is
sending a longer black burst which would imply that the other station has waited longer
and thus should access the medium first. If the medium is idle, the station will send its
frame, otherwise it will wait until the medium becomes idle again and enter another black
burst contention period. By using slotted time, and imposing a minimum frame size on
real time frames, it can be guaranteed that each black burst contention period will yield a
unique winner [4]. After the successful transmission of a frame, the station schedules the
next transmission attempt tsch seconds in the future. This has the nice effect that real-
time flows will synchronize, and share the medium in a TDM fashion [4]. This means that
unless some low priority traffic comes and disturbs the order, very little blackbursting will
have to be done once the stations have synchronized.
Low priority stations use the ordinary CSMA/CA access method of IEEE 802.11.
5. CONCLUSION
This survey presents some of the techniques that can be used to attain differentiated
services in wireless LANs based on the 802.11 protocol. Some of these techniques can
be achieved will little modification to the actual protocol, other are more elaborate to
implement. How well these techniques work with real data is yet to be evaluate.
These techniques are just part of the complete Diffserv architecture and a mapping has
to be established with the different classes of services used in Diffserv. Other issues like
admission control too need to be addressed.
The 802.11e standard is planning to introduce QoS into the 802.11 standard.
6. FUTURE WORK
Firstly these techniques need to be simulated and evaluated for different metrics like
throughput, bandwidth utilization and transmission delays under different load
conditions. Also simulation to evaluate TCP and UDP traffic can be done.
One thing that would be interesting to do in the future is an authentic evaluation of the
mechanisms in a real wireless LAN. Since evaluations based on simulations do not
consider node mobility and roaming between several base stations, these aspects need
to be investigated further.
Another aspect that needs to be studied is admission control. To be able to provide
service differentiation that gives certain guarantees to high priority traffic, it does not
suffice to just have a QoS aware access mechanism. If no admission control is used, it is
very likely that too many users will use the higher priority class. This results in an
overload that can't be handled, thus reducing the performance of high priority stations.
[1] IEEE 802.11: Wireless LAN medium access control (MAC) and physical layer (PHY)
specifications. IEEE.
[2] D-J. Deng and R-S. Chang. A priority scheme for IEEE 802.11 DCF access method.
IEICE Transactions on Communications, E82-B(1), January 1999.
[3] A. Wolisz F. H.P. Fitzek, "QoS support in wireless networks using Simultaneous MAC
packet transmission (SMPT)", in ATS, April 1999
[4]Imad Aad and Claude Castelluccia, "Differentiation mechanisms for IEEE 802.11",
IEEE Infocom 2001, April 22- 26, 2001
[5] G. Anastasi and L. Lenzini, "QoS provided by the IEEE 802.11 wireless LAN to
advanced data applications: a simulation analysis" Page 99-108, ACM, Wireless
Networks, Volume 6, Issue 2, 2000.
[6] H.S. Chhaya and S. Gupta, Performance of asynchronous data transfer methods of
IEEE 802.11 MAC protocol", IEEE Personal Communications 3(5) (October 1996).
[7] D-J. Deng and R-S. Chang. A priority scheme for IEEE 802.11 DCF access method.
IEICE Transactions on Communications, E82-B-(1), January 1999.
[8] Brian P. Crow, Indra Widjaja, Jeong Geun Kim and Prescott Sakai. IEEE 802.11
wireless local area networks. IEEE communication Magazine pages 1160126, Sept.
1997.