Professional Documents
Culture Documents
Omar A. Elprince
oelprince@ccse.kfupm.edu.sa
Table of Contents
PERFORMANCE EVALUATION STUDY FOR HIPERLAN WLAN PROTOCOL...........................1 1. INTRODUCTION......................................................................................................................................4 2. HIPERLAN OVERVIEW..........................................................................................................................5 2.1 HIPERLAN PROTOCOL ARCHITECTURE AND LAYOUT..........................................................................................5 2.2 HIPERLAN MAC PROTOCOL..................................................................................................................6 3. SYSTEM PERFORMANCE.....................................................................................................................7 4. THE CHANNEL ACCESS MECHANISM.............................................................................................7 4.1 HIPERLAN ACCESS MECHANISM EY-NPMA.............................................................................................7 4.2 ETSI RES10 PARAMETER SPECIFICATION....................................................................................................9 5. HIPERLAN POWER SAVING...............................................................................................................10 6. HIPERLAN SIMULATION....................................................................................................................11 6.1 SIMULATION GOALS AND ASSUMPTIONS......................................................................................................11 6.2 SIMULATION RESULTS...............................................................................................................................11 6.2.1 Influence on increasing number of mobile stations.....................................................................11 6.2.2 Influence on increasing packet size.............................................................................................12 7. HIDDEN TERMINAL PROBLEM........................................................................................................13 8. HIPERLAN2 VERSUS IEEE 802.11......................................................................................................14 9. REFERENCES.........................................................................................................................................15
Table of Figures
FIGURE 1. HIPERLAN BASIC MAC FRAME STRUCTURE EXAMPLES [1]...................................6 FIGURE 2. CHANNEL ACCESS CYCLE IN THE HIPERLAN-1 [8]....................................................7 FIGURE 3. THROUGHPUT FOR 2,8,25 STATIONS.............................................................................11 FIGURE 4. THROUGHPUT WITH DIFFERENT PACKET SIZES....................................................12 FIGURE 5. DELAY WITH DIFFERENT PACKET SIZES...................................................................13
Page 2 of 15
Abstract The paper project discusses the analysis and simulation of HIPERLAN MAC protocol, which is a standard protocol for wireless local area networks defined by the European Telecommunications Standards Institute (ETSI). Paper will introduce the HIPERLAN performance problems which affects in a direct and indirect way the system stability. Moreover, considering the HIPERLAN MAC protocol we will go deep in the structure of the MAC FRAM and selecting the variables that needs to be studied and analyzed thoroughly to form a simulation model and building a simulator in C++ customized framework that can simulate and analyze the system performance.
Page 3 of 15
1. Introduction
Hiperlan network typically has a topology. The Mobile Terminals (MT) communicate
with the Access Points (AP) over an air interface as defined by the HiperLAN standard. There is also a direct mode of communication between two MTs, which is still in its early phase of development. The user of the MT may move around freely in the HiperLAN network, which will ensure that the user and the MT get the best possible transmission performance. An MT, after association has been performed (can be viewed as a login), only communicates with one AP in each point in time. The APs see to that the radio network is automatically configured, taking into account changes in radio network topology. The general features of the HiperLAN technology can be summarized in the following list. High-speed transmission Connection-oriented Quality-of-Service (QoS) support Automatic frequency allocation Security support Mobility support Network & application independent Power save The aim of this paper report is to study the Hiperlan performance and specification in respect to access channel mechanism in the next section I will present the Hiperlan protocols layers, architecture and MAC protocol as an overview. After that I will go deep to the MAC layer protocol and access schemes. What is Qos? - QoS is a group of necessities for a certain service which is provided by a network to users. At the user level, the important parameter is the user application. The user-level QoS requirements are Criticality (according to QoS based on data transmission and application type) , Cost (either charging on the basis of the usage time of service or the amount of data) and Security(according to confidentiality, integrity, digital signature capability and authentication). On the technology and network level, the requirements are Bandwidth (refers to speed or data rate to a user), Timeliness (measured through delay time, response time, and delay variation), and Reliability (according to the measured time or frequency). For wireless, the QoS indicator is the mobility range (according to the size of the geographical area in which the user can receive the service when moving around, and the size of the area covered by a single base station)
Page 4 of 15
2. Hiperlan overview
2.1 Hiperlan Protocol architecture and layout
The protocol stack is divided into a control plane part and a user plane part following the semantics of ISDN functional partioning; i.e. user plane includes functions for transmission of traffic over established connections, and the control plane includes functions for the control of connection establishment, release, and supervision. The HIPERLAN protocol has three basic layers; Physical layer (PHY), Data Link Control layer (DLC), and the Convergence layer (CL). At the moment, there is only control plane functionality defined within DLC. The PHY, DLC, and the CL are further detailed in later deliverables. The physical layer of HIPERLAN-1 uses 200 MHZ at 5.15-5.35 GHz, in European Union it is divided into 5 channels and in the United States it is divided into 6 channel and additional 3 channels at 5.725-5.825 GHz bands.[8] The transmission power is as high as 1 W and the modulation is single carrier GMSK that includes a DFE that consumes electronic power which makes it challenging for the implementation of fallback data rates. The physical layer of the HIPERLAN-1 codes 416 bits into 496 bits and with maximum of 47 codewords per packet and 450 bit per packet. Hiperlan-1 was not considered a successful standard by the European Union, in contradiction Hiperlan2 project made a success start aiming at IP and ATM type services at high data rates for indoor and possibly outdoor applications. It supports both connection (integration with the voice-oriented network) and connectionless services unlike Hiperlan1 that support connectionless services only. The cost of supporting both services is the complexity of MAC layer.
Page 5 of 15
MAC
Figure 1. Hiperlan Basic MAC frame Structure Examples [1]
The air interface is based on time-division duplex (TDD) and dynamic time-division multiple access (TDMA). I.e. the time-slotted structure of the medium allows for simultaneous communication in both downlink and uplink within the same time frame, called MAC frame in HiperLAN. Time slots for downlink and uplink communication are allocated dynamically depending on the need for transmission resources. The basic MAC frame structure on the air interface has a fixed duration of 2 ms and comprises transport channels for broadcast control, frame control, access control, downlink (DL) and uplink (UL) data transmission and random access. All data from both AP and the MTs is transmitted in dedicated time slots, except for the random access channel where contention for the same time slot is allowed. The duration of broadcast control is fixed whereas the duration of other fields is dynamically adapted to the current traffic situation. The MAC frame and the transport channels form the interface between DLC and the physical layer.
Page 6 of 15
3. System Performance
The main problems of the HIPERLAN performance analysis of HIPERLAN MAC protocol is the analytical models have a high degree of complexity. There for, building a simulator that can evaluate the performance and analyze the performance result and trying to verify the simulation results is the best approach. The expected performance results from the Hiperlan MAC simulation is the throughput versus the load percentage in the network with respect to the number of stations; Moreover, the average delay versus the percentage load with respect to the packet size.
A channel access cycle with synchronization begins, it consists of three phases: The prioritization phase, the contention phase, the transmission phase. The objective of the
Performance Analysis of Hiperlan WLAN Protocol Page 7 of 15
prioritization phase is to allow only nodes with the highest channel access priority, among the contending ones, to participate in the next phase. There are five priority slots, each 256 bit-periods long from 0 to 4 and 0 represent the highest priority level. Each node that has a frame with priority level h senses the channel for the first h prioritization slots (priority detection). If the channel is idle during this interval. Then the node transmits a burst in the h+1 slot (priority Assertion) and it is admitted to contention phase, other wire it stops contending and waits for the next channel access cycle. The contention phase starts immediately after the transmission of the prioritization burst, and it further consists of two phases: the elimination phase and the yield phase. The elimination phase consists of at most n elimination slots, each 256 bit-periods long, followed by a 256 bit-periods long elimination survival verification slot. Starting from the first elimination slot, each node transmits a burst for a number B, 0 B n, of subsequent elimination slots, according to the following truncated geometric probability distribution.[3] Pr{B=b}= (1-q) qb qn
0b<n b=n
After the end of the burst transmission, each node senses the channel for the duration of the elimination survival verification slot if the channel is sensed idle the node is admitted to the yield phase, otherwise it drops itself from contention and waits for the next channel access cycle. The yield phase starts immediately after the end of the elimination survival verification interval and consists of at most m=14 yield slot, each 64 bit periods long. Each node listens to the channel for a number D, 0 D m, or yield slots before (if allowed) beginning transmission. D is a r.v with truncated geometric distribution as follows [3]: Pr{D=d}=
(1-p) pd p
n
0d<m d=m
If the channel is sensed idle during the yield listening interval, the node is allowed to begin the transmission phase. Other wise the node loses contention and waits for the next channel access cycle. Real time traffic transmission is supported in HYPERLAN by dynamically varying the channel access mechanism priority depending upon the user priority and the packet residual lifetime.[3][8][6] Important features of the EY-NPMA [5] No preemption by frames with higher priority after the priority resolution possible. Hierarchical independence of performance. Fair contention resolution of frames with the same priority. Note: refer to table 1 for parameters.
Performance Analysis of Hiperlan WLAN Protocol Page 8 of 15
NMRL < 10 msec 10 msec NMRL < 20 msec 20 msec NMRL < 40 msec 40 msec NMRL < 80 msec 80 msec NMRL
Where NMRL (Normalized MPDU Residual Life Time) is the normalization of the number of hops the packet has to travel to reach its final destination. The user priority is assigned to each packet according to the type of traffic carried to each packet (e.g. voice, data, multimedia stream ... etc) and from this it determines the maximum channel access priority value. How ever, a residual packet lifetime is the time interval within which the transmission of packet must occur before the packet has to be discarded [3] and thats why multi hop routing is supported within in the Hiperlan standard protocol.
Page 9 of 15
Page 10 of 15
6. Hiperlan Simulation
6.1 Simulation Goals and Assumptions
The simulation objective is to measure the performance of the Hiperlan access control protocol on an ad-hoc mode environment. Based on the simulative study and results, I will analyze the performance characteristics and discuss the problems of the protocol that has been shown in the simulation results. For this simulation, I used CSIM18 software [7] libraries under Linux 7 operating system as object oriented simulation tool C++. I build an object class called packet that has all the information necessary for sending and receiving the packets through the mobile nodes. A mobile node is chosen randomly to send a packet and receive a packet, also the packets inter-arrival times used in exponentially distribution in order to be able to differ load conditions [5].
%Network Throughput
%Load
94
59
74
Page 11 of 15
The above chart is a three independent simulation results done for 2, 8 and 25 stations accessing the MAC channel with increasing load. We can see that the overall network throughput decreases with the increasing number of sending stations. Note that the packet sizes for the 3 simulation results was the same and the stations was scattered randomly within the network area and the stations was in random movement while transmission or receiving.
% throughput
% load
As we can see it is clear from figure 4 that the performance of the MAC protocol will degrade when the packet size decreases and that is because the cost of accessing with the MAC random access scheme is independent of the size of the payload, there fore the relative overhead increases with the smaller payload.[5]
Page 12 of 15
Average Delay
% load
On the other hand it is shown clearly in figure 5 a severe increase for the access delay of large packets with the increase of the load. We can conclude that it is not fare to use types of applications that generate different packet sizes though it will be most effective to use applications that generate similar packet sizes.
Page 13 of 15
Frequancy DSSS -hopping or DSSS No No 40-bit RC4 40-bit RC4 No3 Ethernet 802.11 MIB No No3 Ethernet 802.11 MIB No
1. Two different modes supported, multicast via a dedicated MAC-ID (same as for 802.11) and N*unicast for improved quality. 2. Point Control Function, a concept defined in 802.11 to allow certain time slots being allocated for realtime-critical traffic. 3. Requires signalling over the fixed network, which is still proprietary. 4. Requires signalling over the fixed network, to be specified by H2GF. 5. Ethernet supported in first release.
Page 14 of 15
9. References
[1] http://www.hiperlan2.com [2] K.Haider and H. S. Al-Raweshidy, HiperLAN/2 performance effect under different channel environments and variable resource allocation. [3] G. Anastasi, L. Lenzini, and E. Mingozzi , Stability and Performance Analysis of HIPERLAN [4] Ronny Krashinsky , Maintaining Performance while Saving Energy on Wireless LANs Computer Networks , 12-17-2001 [5] Jost Weinmiller , Morten Schlager, Andreas Festag, Adam Wolisz , Performance Study of Access Control in wireless LANs IEEE 802.11 DFWMAC and ETSI RES 10 HIPERLAN . [6] ETSI, DE-RES-10-01 Report, HyperLan Type 1: Functional Specification, ETSI Technical Report, ETS 300 652. [7] http://www.mesquite.com website for the CSIM18 simulation software. [8] K. Pahlavan, P. Krishnamurthy Principle of wireless Networks A Unified Approach, Prentice Hall 2002. [9] H. Woesner, J. Ebert, M. Schlager, A. Wolisz* Power Saving Mechanisms in Emerging Standards for Wireless LANs: The MAC Level Perspective 2001
Page 15 of 15