Professional Documents
Culture Documents
TWC Paper1
TWC Paper1
Client C5 Stream 1
their backoff counters) until they find the medium is idle for winner [2] before they start to compete for the concurrent transmission
an interval of distributed interframe space (DIFS). After that, opportunities. However, it will not affect the following derivation process of
our analytical model. Therefore, in this paper we assume that the contention
a new contention period starts. period starts when previous contention winner finishes transmitting its PHY
Unlike the standard 802.11 DCF access scheme, a header (i.e., PLCP preamble and PLCP header), as shown in Fig. 3.
3 Note that the rest clients will stop backoff when they detect a new
CSMA/CA-based MU-MIMO WLAN allows multiple clients
preamble. Since preamble detection can be done within a slot time, they will
to transmit concurrently to the AP. For ease of description, not reduce their backoff counters once a client wins the channel and starts to
let us consider a simple network with one three-antenna AP transmit.
WU et al.: PERFORMANCE STUDY ON A CSMA/CA-BASED MAC PROTOCOL FOR MULTI-USER MIMO WIRELESS LANS 3
Client C3 wins the third contention and becomes the fourth b(t)
Drawn from [0, CW]
concurrent transmitter. For successful decoding, the AP needs with equal probability
to estimate each transmitter’s channel parameters using their Client C2 wins
the contention
preambles4. Since the two frames of Client C4 and Client C5
overlap together, it is hard for the AP to nullify the interference Virtual Time Slot
of the two overlapped frames to extract Client C3 ’s frame. Client C1 wins
the contention
Besides, because the AP fails to decode the two overlapped
frames, it cannot perform successive interference cancellation
to extract the first contention winner’s (i.e., Client C1 ’s) frame. Slot PHY Transmission Time of Client C1
t
In sum, the AP encounters a decoding failure when a collision Time Header
happens [2]. In the case of decoding failure, no ACK message
Fig. 4. Example of the stochastic process of Client C1 ’s backoff counter.
is sent to the concurrent transmitters, as shown in Fig. 7.
Besides, each of the concurrent clients will select a random (1-p)/(CWmin+1)
backoff time interval to prevent future collisions. Here we
1 1
apply the binary exponential backoff mechanism which is (CWmin, 0) (CWmin, 1) (CWmin, CWmin)
Stage 1: Decode & Stage 3: Decode & ... M stages, as shown in Fig. 6. In the k-th stage, the AP
subtract Stream M subtract Stream M-2
M
decorrelates and decodes the (M + 1 − k)-th stream, and then
M-1
... M-2 subtracts off the decoded stream from the received vector so
...
...
...
2 2 2
that in the (k+1)-th stage, there are M −k remaining streams.
1 1 1 1 According to this decoding procedure, when the AP decodes
M concurrent Stage 2: Decode & Stage M: the k-th stream, only the interfering streams that join before
streams subtract Stream M-1 Decode Stream 1 the k-th stream need to be considered, since streams that join
after it have already been removed. This property allows the
Fig. 6. The decoding procedure of ZF-SIC. k-th concurrent client to transmit at a rate that is determined
by the channels of itself and the previous k − 1 contention
winners.
Recall that our aim is to compute the uplink throughput To illustrate how ZF-SIC works, let us consider a network
when every client has data to send all the time. Under this with n-antenna AP. After decoding and removing M − k
saturation condition, each client will have an equal probability streams, the remaining received vector at the AP for a symbol
to join a successful round. Consequently, the probability that time can be written as
Client Ci is among the M concurrent clients of a successful
k
round is equal to the probability that i is among the M clients X
that are randomly picked from N clients, i.e., y= hi xi + w, (12)
1
N −1
M−1 M where y, hi , and w are n × 1 vectors. The i-th contention
P (Client Ci transmits in r|r ∈ Rs ) = N = . (7)
M
N winner transmits a data symbol xi through a channel hi . The
To compute P (Client Ci does not transmit in round r), additive white noise vector is denoted by w, which follows a
note that if Client Ci is sure to be silent in a round, then circular symmetric distribution CN (0, N0 In ). We assume that
the whole network will act as if Client Ci were not there, i.e., the data streams, the channel vectors, and the noise vectors
there were N − 1 clients. Therefore, we have are all independent. To decorrelate xk , the AP projects the
received y onto the null space of the matrix [h1 h2 . . . hk−1 ]T ,
P (r ∈ Rs |Client Ci does not transmit in r) = Ps (M ′ , N −1), where [·]T is the transpose operator. Under the assumption of
(8) independent channel vectors, the dimension of this null space
where M ′ is defined as the maximum number of allowed is
concurrent transmissions in a network with the same AP but dk = n − k + 1. (13)
with N − 1 single-antenna clients, i.e.,
We can construct a dk × n matrix Qk , with its rows represent-
M ′ = min{M, N − 1}. (9)
ing an orthogonal basis of this null space. Then the projection
Based on Bayes’ Theorem, we get operation can be expressed as multiplying Qk and y, which
yields
P (Client Ci does not transmit in round r)
Qk y = Qk hk xk + Qk w. (14)
P (Client Ci does not transmit in r|r ∈ Rs )P (r ∈ Rs )
=
P (r ∈ Rs |Client Ci does not transmit in round r) Accordingly, the k-th stream can be decoded and then removed
M
(1 − N )Ps (M, N ) from Eq. (12). The AP will continue to decode the (k − 1)-th
= . (10) stream following a similar procedure.
Ps (M ′ , N − 1)
To characterize the resulting rates, note that in Eq. (14),
Substituting Eqs. (7) and (10) into Eq. (4) gives Qk w is still white noise, distributed as CN (0, N0 Idk ). Let
M P = E[||x||2 ] be the transmission power of each client, and
N Ps (M, N )
p=1− , (11) B be the channel bandwidth, then the maximum data rate
(1− M )Ps (M,N )
1 − Ps N(M ′ ,N −1) achieved by the k-th concurrent client is
where Ps (M, N ) is calculated by Eq. (6). Now we have two Rk = B log2 (1 + P ||Qk hk ||2 /N0 ), k = 1, . . . , M. (15)
non-linear equations of p and τ , i.e., Eqs. (1) and (11). The
value of τ can be determined by solving these equations. We consider a time-varying i.i.d. Rayleigh fading channel
model, with coherence time as a transmission round, which
C. Transmission Rates means that each client’s channel remains unchanged during
a round, but is independently variable between successive
The transmission rates of concurrently transmitting clients
transmission rounds. Let hi ∼ CN (0, In ), we can now
depend on their channels and how they interact in the
calculate the average data rates of concurrent date streams.
decoding procedure. For the CSMA/CA-based MU-MIMO
According to [1], the distribution of Qk hk is CN (0, Idk )
WLAN, the AP uses zero-forcing with successive interfer-
and ||Qk hk ||2 is distributed as χ22dk , i.e., it is Chi-squared
ence cancellation (ZF-SIC)8 to decode the M independent
distributed with 2dk degrees of freedom. This result also holds
data streams [1] [2] [4]. The decoding procedure contains
true for the first contention winner, because when k = 1,
8 The zero-forcing operation is also known as decorrelator or interference ||h1 ||2 follows the distribution χ22n . Accordingly, the average
nulling. transmission rate of the k-th concurrent data stream can be
6 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, ACCEPTED FOR PUBLICATION
T1
1st, 2nd, 3rd N3 time slots T2
period, there are N clients competing for the transmission
contention T3 opportunity, and each client transmits in a time slot with
Client C3 N2 time slots
periods
Client C4 N1 (Nidle) Client C2 SIFS probability τ . Thus N1 follows a geometric distribution with
Client C5 time slots Client C4
ACK the parameter (1 − τ )N , i.e.,
DIFS
...
Client C1 Client C3 P (N1 = k) = ((1 − τ )N )k (1 − (1 − τ )N ). (21)
A failed round, tfail A successful round, tsuccess
Accordingly, we have
Number of failed rounds, Nfail
Virtual transmission time (1 − τ )N
E[Nidle ] = E[N1 ] = . (22)
1 − (1 − τ )N
Fig. 7. Illustration of the transmission structure in a CSMA/CA-based MU-
MIMO WLAN. During the j-th contention period, where j ≥ 2, there are
N −j+1 clients competing for the jth concurrent transmission
opportunity. However, all the contending clients must have
computed as nonzero backoff counters, for otherwise they would have been
Z +∞ involved in the ongoing transmission and can no longer join
E[Rk ] = B log2 (1 + P x/N0 )fχ22d (x)dx, (16) the j-th contention. In other words, no client is able to win the
0 k
j-th concurrent transmission opportunity in the first time slot
where fχ22d (·) denotes the PDF for χ22dk distribution with of the contention period, i.e., Nj ≥ 1 for j ≥ 2. Therefore,
k
k = 1, 2, . . . , M . the distribution of Nj is
P (Nj = k) = ((1 − τ )N −j+1 )k−1 (1 − (1 − τ )N −j+1 ), (23)
D. Saturation Throughput
where k ≥ 1 and 2 ≤ j ≤ M . Then its expectation becomes
Saturation throughput refers to the network throughput
when clients always have data to transmit. To formulate it, we 1
E[Nj ] = . (24)
first introduce a concept called virtual transmission time, as 1 − (1 − τ )N −j+1
defined in [8]. It represents the time elapse between two con-
Assuming that E[T1 ] is known, we can then use Eqs. (20) and
secutive successful rounds (see Fig. 7). Let Nfail be the number
(24) to compute the expectation of other Tj s in a recursive
of failed transmission rounds during the virtual transmission
manner, i.e.,
time and Nidle be the number of idle time slots between two
consecutive rounds. Let Tj denote the transmission time of the 1
E[Tj+1 ] = E[Tj ] − tPHY − tslot . (25)
j-th concurrent client in a round, where j ∈ {1, 2, . . . , M }. 1 − (1 − τ )N −j
Then Nfail , Nidle , and Tj are all random variables. Together Although each time different clients are engaged in a
with the transmission rates in Section III-C, we can express transmission round, how long a round lasts depends only on
the saturation throughput as the data time of the first client (Fig. 7). Therefore9,
PM
j=1 E[Rj ]E[Tj ] tsuccess = tPHY + E[T1 ] + SIFS + ACK + DIFS, (26)
ρ= , (17)
E[Nfail ]tfail + tsuccess + (E[Nfail ] + 1)E[Nidle ]tslot
tfail = tPHY + E[T1 ] + DIFS. (27)
where tfail , tsuccess , and tslot are the time elapse of a failed
round, a successful round and an idle time slot, respectively. Substituting Eqs. (6), (16), (19), (22), and (25)–(27) into
According to the definition, Nfail follows a geometric distri- Eq. (17), with values of N , M , B, P/N0 , E[T1 ] as well as the
bution with parameter 1 − Ps (M, N ), which is the probability value of τ calculated in the last subsection, we are now able
that a randomly chosen round fails, i.e., to compute the saturation throughput ρ of the uplink channel
in a CSMA/CA-based MU-MIMO WLAN.
P (Nfail = k) = (1 − Ps (M, N ))k Ps (N, M ), (18)
where k = 0, 1, 2, . . ., then the average number of failed E. Access Delay
rounds in a virtual transmission time is In this subsection the mean access delay is determined
1 − Ps (M, N ) for each client. The access delay is defined as the time
E[Nfail ] = . (19)
Ps (M, N ) experienced by a packet, from it first becoming the head of
In a successful transmission round, because the transmitting the queue to the time it is transmitted successfully. Under the
clients are forced to end simultaneously, the time they spent saturation condition, all the clients have the same mean access
on data transmission can be calculated recursively as delay. Let d denote the mean access delay of a given client,
say, Client C1 . Then d refers to the average time between
Tj+1 = Tj − tPHY − Nj+1 tslot , (20) Client C1 ’s consecutively transmitted packets. According to
Eq. (7), we know that Client C1 needs to wait an average
where tPHY is the time needed to transmit a PHY header,
of 1/P (Client C1 transmits in r|r ∈ Rs ) successful rounds
and Nj (j ∈ {1, 2, . . . , M }) is the number of idle time slots
to join a successful round. Based on the concept of virtual
elapsing in the j-th contention period (see Fig. 7). Since Nidle
is the number of idle time slots between two consecutive 9 The propagation delay is normally too small compared with the total frame
rounds, it actually equals to N1 . During the first contention transmission time, so it is omitted here.
WU et al.: PERFORMANCE STUDY ON A CSMA/CA-BASED MAC PROTOCOL FOR MULTI-USER MIMO WIRELESS LANS 7
transmission time, we can then calculate the mean access delay Data rate R2 Antenna 2
N2 time slots
as h1
E[Virtual transmission time]
d= . (28) h2 h2
P (Client C1 transmits in r|r ∈ Rs )
h1 θ
According to Eqs. (7) and (17), we can get
Data rate R1 T Antenna 1
E[Nfail ]tfail + tsuccess + (E[Nfail ] + 1)E[Nidle ]tslot Q2
d= . (29)
M/N Fig. 8. A geometric interpretation of h1 , h2 , and QT
2.
Note that Client C1 ’s packets are of varying sizes, which
depend on the dimension Client C1 occupies in each successful
round. Therefore, d corresponds to the transmission of a packet the value of ||Q2 h2 ||2 by assuming that itself is the second
with an average size ( M
P
j=1 E[Rj ]E[Tj ])/M . contention winner. Only the clients satisfying
TABLE I
can now calculate the probability of a successful round as the N ETWORK PARAMETERS USED TO OBTAIN NUMERICAL VALUES .
following expectation
Parameter Value
N τ (1 − τ )N −1 Njoin τ (1 − τ )Njoin −1
tslot 9 µs
Ps (2, N ) = E , (36) tPHY 20 µs
1 − (1 − τ )N 1 − (1 − τ )Njoin
SIFS 16 µs
where N > 2 and Njoin = 0, 1, 2..., N − 1. In the case DIFS 34 µs
ACK 39 µs
of Njoin = 0, when a successful round contains only one ACK timeout 70 µs
stream, Ps (M, N ) reduces to the probability that only one E[T1 ] 2000 µs
client wins the first contention. Note that in Eq. (33), when B 20 MHz
P/N0 10 dB
pjoin approaches 1, i.e., when less restriction is given on who CWmin 127
can join the second contention, the value of Njoin would be CWmax 1023
approaching N − 1, and the above equation becomes the same
as the one defined in Eq. (6).
Eq. (8) still hold true here because it is formulated without Accordingly, the average transmission time of the second
considering the detailed MAC protocol. Eq. (7) calculates the contention winner, i.e., Eq. (25), becomes
probability that Client Ci shows up in a randomly chosen suc-
1
cessful round. Under the opportunistic transmission scheme, E[T2 ] = E[T1 ] − tPHY − E tslot . (43)
in each round the number of clients that can join the second 1 − (1 − τ )Njoin
contention is limited. However, since the clients’ channels are Using the above results and following the same procedure
assumed to be independent for different rounds, in the long in the previous subsections of Section III, we are now able to
run, each client has an equal probability to join a successful calculate the saturation throughput and mean access delay of
round and is able to transmit concurrently with any other the opportunistic transmission scheme.
clients. Considering the special case of Njoin = 0, we denote
p0 the probability that in a randomly chosen successful round, IV. M ODEL VALIDATION
no client contends for the second concurrent transmission
In this section comparisons between the analytical and
opportunity, i.e.,
simulation results are presented to validate our previous anal-
p0 = P (Njoin = 0|r ∈ Rs ). (37) ysis. It includes three subsections. In the first and second
subsections examples are shown that our analytical model
Then Eq. (7) is changed to can closely predict the uplink throughput and mean access
2 1 delay of a wireless LAN. Two MAC protocols are simulated:
P (Client Ci transmits in r|r ∈ Rs ) =(1 − p0 ) + p0 .
N N a CSMA/CA-based MU-MIMO MAC and its opportunistic
(38) variation. In the third subsection we discuss about the main
Using Eqs. (33) and (36), p0 can be calculated as limitations of our analytical model.
Nτ (1−τ )N −1
P (r ∈ Rs and Njoin = 0) 1−(1−τ )N
(1 − pjoin )N−1
p0 = = .
P (r ∈ Rs ) Ps (2, N ) A. CSMA/CA-based MU-MIMO WLANs
(39)
The average transmission rate of the first contention winner We use MATLAB to simulate the uplink channel of a
is the same as that of the original MAC protocol, i.e., CSMA/CA-based MU-MIMO WLAN. Our event-driven sim-
Z +∞ ulation program contains all major components of the MAC
E[R1 ] = B log2 (1 + P x/N0 )fχ24 (x)dx, (40) protocol, e.g., contention, PHY header, ACK, ACK timeout
0 and the interframe spaces. The program also simulates the
where fχ24 (·) denotes the PDF of a Chi-squared distribution PHY layer as described in Section III-C. Every client is
with 4 degrees of freedom. To compute the the second assigned an n × 1 channel vector, where n is the number
stream’s average rate, note that according to the opportunistic of antennas at the AP. Each component of the channel vector
transmission scheme, the value of ||Q2 h2 ||2 falls in the range is an i.i.d. CN (0, 1) random variable. The channel vectors are
of [T, ∞). Since ||Q2 h2 ||2 ∼ χ22 , we have generated at the beginning of every transmission round and
R∞ remain unchanged during a round time. The channel vectors
B log2 (1 + P x/N0 )fχ22 (x)dx of a client for different rounds are independent.
E[R2 ] = T R∞ , (41)
T
fχ22 (x)dx The network parameters used to obtain numerical values for
both analytical model and simulation program are outlined
where fχ22 (·) denotes the PDF of a Chi-squared distribution in Table I, where the upper half values are defined by
with 2 degrees of freedom. 802.11 standards for OFDM PHY layer with 20 MHz channel
To compute the saturation throughput, note that since the spacing, and the lower half values are either calculated or
number of clients competing for the second transmission selected according to the standards [7]. Note that our analytical
opportunity is reduced to Njoin , which is a random variable model is derived using the mean frame transmission time of
with distribution given by Eq. (33), we can then change the first transmitter in a round, i.e., E[T1 ], with no restrictions
Eq. (24) to on the probability distribution of T1 . For simplicity, we only
1 consider the case of constant T1 in the simulation program.
E[N2 ] = E . (42)
1 − (1 − τ )Njoin Besides, we set ACK timeout to be 70 µs in the simulation
WU et al.: PERFORMANCE STUDY ON A CSMA/CA-BASED MAC PROTOCOL FOR MULTI-USER MIMO WIRELESS LANS 9
B. Opportunistic Transmission Scheme Fig. 10. Saturation throughput and mean access delay of the opportunistic
transmission scheme: simulation (symbols) versus analysis (lines).
We modify the simulation program of the previous sub-
section to characterize the opportunistic transmission scheme 6
of Section III-F. A network with a 2-antenna AP is con- (a)
5.5
sidered. Every client has a 2 × 1 channel vector, with each (b)
component being an i.i.d. CN (0, 1) random variable. The Error Percentage (%) 5
(c)
channel vectors remain unchanged for a round time and 4.5
are independent between successive rounds. When a client 4
wins the first contention, every other client calculates its
3.5
concurrent transmission rate and check whether its concurrent
rate is less than the threshold B log2 (1 + P T/N0 ). If so, the 3
corresponding client stops decreasing its backoff counter, i.e., 2.5
defers its access to the channel, until the current round ends. 2
The saturation throughput and mean access delay are plotted 10 20 30
in Fig. 10. Simulation (symbols) and analytical (lines) results Number of Clients
are compared for networks with sizes varying from 5 to
50. The threshold T is set as 0.5 and 1.5. Note that the Fig. 11. Error that occurs when the analytical model is used to estimate
y-axis for saturation throughput ranges from 120 to 160 the saturation throughput in different scenarios: (a) M = 6 and E[T1 ] =
2000 µs; (b) M = 6 and E[T1 ] = 4000 µs; (c) M = 4 and E[T1 ] =
Mbps. Although differences exist between the simulation and 2000 µs.
analytical saturation throughput, the error percentage is less
than 4%. Fig. 10 indicates that our analytical model can
closely estimate the network performance of the opportunistic derivation of the analytical model (e.g., Eq. (6)), we simply
transmission scheme. assume that in every round, there are M (or more than M if
collision happens) concurrent transmissions. This assumption
C. Limitations and Discussions holds true with a high probability when the frame transmission
time is long, the number of antennas at the AP is small, and
In this subsection we would discuss the limitations of our
the number of total clients is large, which explains why the
analytical model. Reasons are provided to explain why the
accuracy of our model is high under these situations.
accuracy of our model varies with different parameters.
To make the above explanation more convincing, we change
As shown in Fig. 11, the accuracy of our saturation through-
tslot from 9 µs to 1 µs and simulate the CSMA/CA-based
put model varies with respect to three parameters: frame
MU-MIMO WLANs11 . The contention window sizes are set
transmission time, the number of antennas at the AP, and
as CWmin = 511 and CWmax = 1023. All other network
the number of total clients. The error percentage between
parameters are the same as those in Table I. Comparisons
simulation and analytical result is calculated as |ρsimulation −
between the simulation (symbols) and analytical (lines) results
ρanalytical |/ρsimulation . Comparing scenarios (a) and (b), scenarios
are presented in Fig. 12, with M ranges from 7 to 20. This
(a) and (c) would reveal that our model is more accurate in the
figure indicates that our model is extremely accurate even
case of long frame transmission time, and small AP’s antennas.
when the AP has a large number of antennas. In this case
Besides, the error percentage decreases as the number of
a successful round is ensured to have M concurrent clients. If
clients grows. This fluctuation of accuracy can be explained as
there is a successful round with only M −1 concurrent clients,
follows. Our analytical model does not consider the situation
then all the other clients must have a backoff time longer than
that there may be less than M concurrent transmissions in a
round, which happens when none of contending clients win 11 Please note that this change is only for illustrative purpose; it does not
the channel before the ongoing transmission ends. During the imply the existence of such an implementation in standard wireless networks.
10 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, ACCEPTED FOR PUBLICATION
140
450 Number of AP’s Antennas:
Number of AP’s Antennas:
1, 2, 3, 4, 5, 6 120 1, 2, 3, 4, 5, 6
400
Saturation Throughput (Mbps)
300 80
250
60
200
40
150
20
100
50 0
0 10 20 30 40 50 0 10 20 30 40 50
Number of Clients Number of Clients
(a) (b)
Fig. 9. Saturation throughput and mean access delay for different network configurations: simulation (symbols) versus analysis (lines).
2000 25
Number of AP’s Antennas:
1800 Number of AP’s Antennas:
7, 11, 15, 20
7, 11, 15, 20
Saturation Throughput (Mbps)
1000
800 10
600
400 5
200
0
0 10 20 30 40 50 0 10 20 30 40 50
Number of Clients Number of Clients
(a) (b)
Fig. 12. Comparisons between the simulation (symbols) and analytical (lines) results by setting tslot = 1 µs. Saturation throughput is shown in (a) while
the mean access delay is shown in (b).
E[T1 ]−(M −2)tPHY . For E[T1 ] = 2000 µs, tPHY = 20 µs, and CSMA/CA-based MU-MIMO WLAN is investigated in the
M = 20, this value is equal to 1640 µs. However, a client’s first three subsections while performance of the opportunistic
backoff time is always less than CWmax tslot = 1023 µs. Since transmission scheme is analyzed in the last subsection.
1023 µs is smaller than 1640 µs, it is impossible for a round As discussed in Section IV-C, our analytical model can
to have less than M concurrent transmissions. accurately characterize the network performance when the
As demonstrated by Fig. 12, our model can accurately number of concurrent streams in a successful round equals
characterize a CSMA/CA-based MU-MIMO WLAN when the number of antennas at the AP, i.e., when all the AP’s
there are always M concurrent clients in a successful round. dimensions are occupied. Therefore, performance analysis
This corresponds to the situation when all the dimensions using our model can reveal the full influence of varying
at the AP are utilized by the concurrent streams. When the AP’s antennas. To maintain a high accuracy when using the
number of concurrent streams are less than the maximum proposed model, in this section we will focus on networks
number allowed, i.e., when the AP’s antennas are underuti- with no more than 6 antennas at the AP.
lized, the saturation throughput would reduce. In other words,
our analytical model is able to characterize the maximum A. Transmission Probability
saturation throughput that can be achieved by the current AP In Section III-D the analytical throughput ρ is derived as a
in a CSMA/CA-based MU-MIMO WLAN. function of the transmission probability τ , and so is the mean
access delay d in Section III-E. To highlight their dependence
V. N UMERICAL E VALUATION on τ , in this subsection we express ρ as ρ(τ ) and d as d(τ ).
In this section the developed model is used to analyze the In Fig. 13, we plot ρ(τ ) and d(τ ) for M = 1, 2, 3, 4, 5,
network performance with respect to different parameters. The N = 15, and τ from 0 to 0.03. As shown in the figure,
WU et al.: PERFORMANCE STUDY ON A CSMA/CA-BASED MAC PROTOCOL FOR MULTI-USER MIMO WIRELESS LANS 11
140
400 Number of AP’s antennas:
1, 2, 3, 4, 5 120
Saturation Throughput (Mbps)
350
200 60
150
40
100
20
50
0
−4 −3 −2
0 0.005 0.01 0.015 0.02 0.025 0.03 10 10 10
Transmission Probability τ Transmission Probability τ
(a) (b)
Fig. 13. Saturation throughput and mean access delay versus τ for different numbers of antennas at the AP, with N = 15 and E[T1 ] = 2000 µs.
TABLE II
T HE MAXIMUM SATURATION THROUGHPUT AND MINIMUM MEAN ACCESS As shown in Fig. 9(b), d(M ) decreases as M increases
DELAY ACHIEVED IN F IG . 13. from 1 to 6. This is mainly because with more concurrent
transmission opportunities, a client would have a larger chance
M ρmax (Mbps) Wρ dmin (ms) Wd
1 65.07 [312, 327] 34.46 [302, 338] to access the channel. However, since a transmission round of
2 142.3 [338, 384] 17.82 [407, 487] M concurrent clients fails when any one of the M clients
3 219.9 [350, 384] 12.16 540 encounters a collision, the failure probability of a round
4 293.7 [356, 364] 9.296 605
5 361.5 [344, 363] 7.552 [666, 689] increases as M grows. Therefore, d(M ) decreases slowly and
would finally increase at a large M .
In Fig. 14(a), we plot ρ(M ) for E[T1 ] = 2000 and 4000
ρ(τ ) is maximized at a certain transmission probability τρ . µs with N = 30. Saturation throughput achieved with fixed
Similarly, d(τ ) achieves its minimum when τ reaches a certain backoff parameters (CWmin = 127 and CWmax = 1023)
value τd . Note that τ is an indication of clients’ willingness in is depicted in solid lines, while the maximum saturation
transmitting during a slot time. When τ is small, few clients throughput achieved at the optimal backoff parameters is
tend to transmit in a time slot, so a large amount of time is shown in dashed lines. As shown in Fig. 14(a), ρ(M ) increases
wasted by idle time slots. When τ is large, the probability that as M increases from 1 to 6. Let ∆ρ(M ) denote the the amount
two or more clients transmit in the same time slot is high, so of increased throughput when one more antenna is added to
the collision probability is large. Both cases would lead to a the M -antenna AP. In Fig. 14(b) we plot ∆ρ(M ) under the
small saturation throughput and a large mean access delay. same scenarios as in Fig. 14(a).
Since τ is the solution of two nonlinear equations (i.e., Fig. 14 indicates two things. First, the throughput is high
Eqs. (1) and (11)), when M , N are given, τ is fully determined with a large E[T1 ], mainly because the data transmitted during
by the backoff parameters, i.e., CWmin and CWmax . There- virtual transmission time is large when the frame transmission
fore, based on τρ and τd , we can obtain the optimal backoff time is long. Second, the throughput gain of adding more
parameters, which corresponds to the maximum throughput antennas at the AP decreases as M grows large. The reasons
and minimum access delay. For simplicity, consider a special are threefold.
backoff strategy that employs constant window size, i.e., • The frame transmission time of the M -th concurrent
CWmin = CWmax . Eq. (1) then becomes: τ = 2/(W + 1), client (i.e., TM ) decreases as M increases. As shown
where W = CWmin + 1. Using this simple relation between in Fig. 3, transmission time is wasted by the contention
τ and W , optimal contention window sizes can be found. As periods in a round. The number of idle time slots during
shown in Table II, Wρ and Wd represent the optimal backoff the contention can be reduced by choosing suitable
window sizes12 corresponding to ρmax and dmin , respectively. backoff parameters. The resulting throughput increase is
indicated by the dashed lines in Fig. 14.
• The date rate achieved by the M -th stream (i.e., RM )
550 90
500 ρ at 2000 µs
ρmax at 2000 µs 80
Saturation Throughput (Mbps)
450
Fig. 14. (a) Saturation throughput versus the number of antennas at the AP for different E[T1 ]s, with N = 30. The solid lines denote the saturation
throughput when CWmin = 127 and CWmax = 1023. The dashed lines correspond to the optimal saturation throughput evaluated at the optimal backoff
parameters. (b) The throughput gain of adding one antenna to the current AP. The solid lines and dashed lines are calculated under the same scenarios as (a).
The network size refers to the total number of clients in the 160
network, which is previously denoted as N . In this subsection
we focus on ρ(N ) and d(N ). As shown in Fig. 9(a), ρ(N ) first 150
increases and then decreases as N grows large. The reason is
straightforward: when N is small, the number of concurrent 140
clients in a successful round is limited by N (see Eq. (2));
when N is large, the number of clients that contend for each 130 Number of clients:
concurrent transmission opportunity is large, resulting in a 5, 15, 20, 25
large collision probability. How d varies with respect to N 120
can be found in Fig. 9(b). Given the number of antennas at 0 0.5 1 1.5 2 2.5 3
Threshold T
the AP, the mean access delay d increases with N due to
increased collision probability. (b)
Fig. 15. Mean access delay (above) and saturation throughput (below) versus
threshold for the opportunistic transmission scheme in Section III-F.
D. Threshold
In this subsection we will analyze how the threshold T
affects the network performance in the opportunistic trans- cases. In Fig. 15(b) we plot ρ(T) for different network sizes.
mission scheme. In Section III-F, a network with a 2-antenna The saturation throughput ρ tends to first increase with T and
AP is considered. In every transmission round only clients then decrease after T reaches a certain value. This inverted
with concurrent rates larger than B log2 (1 + P T/N0 ) are al- U-shaped curve can be seen for N = 5 when T goes from 0
lowed to contend for the concurrent transmission opportunity. to 3. The relationship of d and ρ versus T can be explained
When T = 0, the opportunistic scheme is just the original by the following reasons.
CSMA/CA-based MU-MIMO transmission scheme. • As T increases, a network would obtain two benefits.
In Fig. 15(a) we plot d(T) when the number of clients The first benefit is an increased data rate of the second
are 5, 15, 20, and 25. As shown in the figure, d increases stream, as indicated in Eq. (41). The second benefit is
slowly with T for N = 5 while decreases slowly for other a reduced collision probability, since a large T results
WU et al.: PERFORMANCE STUDY ON A CSMA/CA-BASED MAC PROTOCOL FOR MULTI-USER MIMO WIRELESS LANS 13
in a smaller number of contending clients in the second time of each concurrent stream, the collision probability, and
contention period. The two benefits would drive the the concurrent transmission rates. Modeling and analyzing the
saturation throughput to increase with T. Besides, the network performance by overcoming the two difficulties is the
reduced collision probability leads to a reduced virtual main contribution of this paper.
transmission time (Fig. 7), which is the cause for the Over the past years, many efforts have been made to
decreased mean access delay. improve the throughput of MU-MIMO networks by selecting
• A large T would degrade the network performance. When a subset of users to perform concurrent transmissions. Multi-
T is large, the average number of clients that can contend user selection algorithms are proposed for both the downlink
for the concurrent transmission (i.e., E[Njoin ]) is small. [15] and uplink MU-MIMO systems [16]. Joint user/antenna
According to Eq. (43), the average transmission time of selection algorithms are investigated in [17]. Most of the
the second stream (i.e., E[T2 ]) would then reduce. An proposed algorithms are centralized, in which a scheduler is
extreme case would be that no client contends for the assumed to have the clients’ channel information. In this paper
concurrent transmission, i.e., Njoin = 0. In that case, T2 is we consider a simple distributed opportunistic scheduling
equal to 0, which corresponds to the worst case since one scheme, where users contend for the concurrent transmis-
of AP’s degrees of freedom is wasted. The probability of sion opportunities only when their concurrent rates are large
no contending clients in the second contention period is enough. We model and analyze its throughput and delay by
high when the network size is small, which explains why considering both PHY and MAC layer influences.
the network performance loss is prominent when N = 5.
VII. C ONCLUSION
VI. R ELATED W ORK
Many studies have been performed to design and analyze In this paper we modeled and investigated the saturation
a wireless network that enables multiple concurrent transmis- throughput and mean access delay of a CSMA/CA-based MU-
sions in the uplink. In [9], Zheng et al. propose and analyze a MIMO WLAN, where clients are allowed to contend for the
RTS/CTS-based MAC protocol that supports multiple packet concurrent transmission opportunities. We also considered a
reception (MPR) in a WLAN. The proposed protocol is simple distributed opportunistic transmission scheme, where
extended in [10], where adaptive resource allocation and MPR clients are able to join the ongoing transmissions only when
are jointly considered through a cross-layer framework. In [11] their concurrent rates exceed a threshold. Analytical models
and [13], Jin et al. compare the network performance of single- were developed to characterize the network performance of the
user MIMO and MU-MIMO schemes in the uplink WLAN, transmission schemes. Comparisons between simulation and
where MU-MIMO transmission is enabled when multiple analytical results were conducted to demonstrate the validity
clients win the contention at the same time. Throughput of our analytical model. By means of the analytical model,
tradeoff between downlink and uplink in an MU-MIMO based the saturation throughput and the mean access delay were
WLAN is investigated in [12]. In [14], Yoon et al. develop and investigated with respect to four parameters. Specifically, we
implement a CSMA-based scheme that enables simultaneous optimized the network performance over the backoff window
concurrent transmissions in an ad hoc network. sizes, the network sizes, and the threshold of the opportunistic
Despite the many previous research efforts on the design transmission scheme. We found that the throughput gain from
and analysis of MU-MIMO schemes in the uplink, a key dif- adding one antenna at the AP reduces as the total number
ference exists between the MU-MIMO transmission schemes of antennas grows. Performance variations with respect to
that are analyzed in previous research and the one we have different parameters were analyzed thoroughly.
analyzed in this paper. In the previous schemes, concur- Our modeling and analysis provide insights into the
rent streams are transmitted at the same time by different CSMA/CA-based MU-MIMO transmission scheme. Besides,
clients, i.e., their transmissions start synchronously. However, the developed theoretical model offers a helpful tool for future
in the CSMA/CA-based MU-MIMO WLAN of Section II, study of the CSMA/CA-based MAC protocols that allow
clients are allowed to join the ongoing transmission one after concurrent transmissions. For the opportunistic transmission
another, resulting in asynchronous concurrent transmissions. scheme, future work includes developing an algorithm to
This asynchronous characteristic results in two difficulties in determine the optimal thresholds for the concurrent rates.
performance modeling and analysis. The first difficulty is an Another important research direction would be to build a more
increased complexity in performance modeling. Taking the general model by considering the situations when the number
conditional collision probability p as an example, if concurrent of concurrent transmissions is less than the maximum number.
transmissions are synchronous, then p is simply calculated as
the probability that the number of concurrent streams is larger R EFERENCES
than the maximum number allowed (see, e.g., Eq. (20) of [9], [1] D. Tse, P. Viswanath, Fundamentals of Wireless Communication, Cam-
Eq. (13) of [11], and Eq. (3) of [14]). However, in the case of bridge, UK: Cambridge University Press, 2005.
asynchronous concurrent transmissions, the derivation of p is [2] K. Tan, H. Liu, J. Fang, W. Wang, J. Zhang, M. Chen, and G. M. Voelker,
“SAM: enabling practical spatial multiple access in wireless LAN,” in
more complicated, as indicated in Section III-B. The second Proc. 2009 ACM MobiCom, pp. 49-60.
difficulty is an increased complexity in performance analysis. [3] K. C.-J. Lin, S. Gollakota, and D. Katabi, “Random access heterogeneous
As indicated in Section V, when discussing how different MIMO networks,” in Proc. 2011 ACM SIGCOMM, pp. 146-157.
[4] W. L. Shen, Y. C. Tung, K. C. Lee, K. C.-J. Lin, S. Gollakota, D. Katabi,
parameters influence the network performance, we have to and M. S. Chen, “Rate adaptation for 802.11 multiuser MIMO networks,”
jointly consider their impacts on the average transmission in Proc. 2012 ACM MobiCom, pp. 29-40.
14 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, ACCEPTED FOR PUBLICATION
[5] G. Bianchi, “Performance analysis of the IEEE 802.11 distributed coordi- Shanshan Wu received the B.S. degree in Electrical
nation function,” IEEE J. Sel. Areas Commun., vol. 18, no. 3, pp.535-547, and Computer Engineering from Shanghai Jiao Tong
Mar. 2000. University (SJTU), Shanghai, China, in 2011 and
[6] G. Bianchi and I. Tinnirello, “Remarks on IEEE 802.11 DCF performance the M.S. degree in Electronics Science and Tech-
analysis,” IEEE Commun. Lett., vol. 9, no. 8, Aug. 2005. nology from SJTU in 2014. She was an exchange
[7] Local and Metropolitan Area Networks–Specific Requirements Part 11: student at the University of Hong Kong, China, in
Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) 2010. Her current research interests include rateless
Specifications, IEEE Std 802.11, 2012. coding schemes, multi-user MIMO systems, two-
[8] F. Calı̀, M. Conti, and E. Gregori, “Dynamic tuning of the IEEE 802.11 way relaying techniques, and their applications in
protocol to achieve a theoretical throughput limit,” IEEE/ACM Trans. wireless communications and networking.
Netw., vol. 8, no. 6, pp. 785-799, Dec. 2000.
[9] P. X. Zheng, Y. J. Zhang, and S. C. Liew, “Multipacket reception
in wireless local area networks,” in Proc. 2006 IEEE International Wenguang Mao received the B.S. degree in Electri-
Conference on Communications, pp. 3670-3675. cal and Computer Engineering from Shanghai Jiao
[10] W. L. Huang, K. B. Letaief, and Y. J. Zhang, “Cross-layer multi-packet Tong University (SJTU), Shanghai, China, in 2011
reception based medium access control and resource allocation for space- and the M.S. degree in Information and Communi-
time coded MIMO/OFDM,” IEEE Trans. Wireless Commun., vol. 7, no. 9, cation Engineering from SJTU in 2014. His current
pp. 3372-3384, 2008. research interests include random access MAC pro-
[11] H. Jin, B. C. Jung, H. Y. Hwang, and D. K. Sung, “Performance tocols, physical-layer cooperative coding schemes,
comparison of uplink WLANs with single-user and multi-user MIMO software-defined radios, as well as mobile applica-
schemes,” in Proc. 2008 IEEE Wireless Communications and Networking tions in smart phones and wearable computers.
Conference, pp. 1854-1859.
[12] H. Jin, B. C. Jung, H. Y. Hwang, and D. K. Sung, “A throughput
balancing problem between uplink and downlink in multi-user MIMO- Xudong Wang is currently with the UM-SJTU Joint
based WLAN systems,” in Proc. 2009 IEEE Wireless Communications Institute, Shanghai Jiao Tong University. He is a
and Networking Conference. distinguished professor (Shanghai Oriental Scholar)
[13] H. Jin, B. C. Jung, and D. K. Sung, “A tradeoff between single-user and and is the director of the Wireless and Network-
multi-user MIMO schemes in multi-rate uplink WLANs,” IEEE Trans. ing (WANG) Lab. He is also an affiliate faculty
member with the Electrical Engineering Department
Wireless Commun., vol. 10, no. 10, pp. 3332-3342, 2011.
[14] S. Yoon, I. Rhee, B. C. Jung, B. Daneshrad, and J. H. Kim, “Contrabass: at the University of Washington. Since he received
concurrent transmissions without coordination for ad hoc networks,” in the Ph.D. degree in Electrical and Computer En-
Proc. 2011 IEEE INFOCOM, pp. 1134-1142. gineering from Georgia Institute of Technology in
[15] Z. Shen, R. Chen, J. G. Andrews, R. W. Heath, and B. L. Evans, “Low August 2003, he has been working as a senior re-
complexity user selection algorithms for multiuser MIMO systems with search engineer, senior network architect, and R&D
block diagonalization,” IEEE Trans. Signal Process., vol. 54, no. 9, pp. manager in several companies. He has been actively involved in R&D,
technology transfer, and commercialization of various wireless networking
3658-3663, 2006.
[16] B. Fan, W. Wang, Y. Lin, L. Huang, and K. Zheng, “Spatial multi-user technologies. His research interests include wireless communication networks,
pairing for uplink virtual-MIMO systems with linear receiver,” in Proc. smart grid, and cyber physical systems. He holds several patents on wireless
2009 IEEE Wireless Communications and Networking Conference. networking technologies and most of his inventions have been successfully
transferred to products. Dr. Wang is an editor for IEEE T RANSACTIONS ON
[17] R. Chen, Z. Shen, J. G. Andrews, and R. W. Heath, “Multimode
transmission for multiuser MIMO systems with block diagonalization,” V EHICULAR T ECHNOLOGY, Elsevier Ad Hoc Networks, and ACM/Kluwer
IEEE Trans. Signal Process., vol. 56, no. 7, pp. 3294-3302, 2008. Wireless Networks. He was also a guest editor for several journals. He was
the demo co-chair of the ACM International Symposium on Mobile Ad Hoc
[18] S. Wu, W. Mao, and X. Wang, “Performance analysis of random
access multi-user MIMO wireless LANs,” in Proc. 2013 IEEE Global Networking and Computing (ACM MOBIHOC 2006), a technical program
Communications Conference. co-chair of Wireless Internet Conference (WICON) 2007, and a general co-
chair of WICON 2008. He has been a technical committee member of many
international conferences and a technical reviewer for numerous international
journals and conferences. Dr. Wang is a senior member of IEEE and was a
voting member of IEEE 802.11 and 802.15 Standard Committees.