Performance analysis of a multiple access protocol for voice and data support in broadband wireless...

12
Wireless Netw (2008) 14: 17–28 DOI 10.1007/s11276-006-7522-1 Performance analysis of a multiple access protocol for voice and data support in multiuser broadband wireless LANs R. Fantacci · G. Vannuccini · G. Vestri Published online: 9 June 2006 C Springer Science + Business Media, LLC 2006 Abstract Wireless Local Area Networks (WLANs) is one of the most promising access technologies for the upcom- ing fourth-generation wireless communication systems. In the last few years, several research efforts have been de- voted to investigate possible multiple access schemes capa- ble of supporting real-time traffic as well as best-effort data transmissions. In particular, the use of suitable transmission schemes allows not only to achieve higher data-rates, but also to perform resource allocation in order to guarantee specific service requirements. In this paper we propose a medium access control (MAC) scheme for a WLAN supporting real- time (voice) and best-effort (data) services, based on Orthog- onal Frequency Division Multiplexing (OFDM) technique. A suitable analytical approach is proposed in order to derive the performance of the proposed MAC scheme. In particular, it is shown in the paper that a high overall network capac- ity in terms of simultaneously active users is achieved by effectively exploiting the multiuser capabilities offered by OFDM, together with a proper service differentiation. Keywords Wireless networks · Multiple access · OFDM 1. Introduction In the last few years, the use of more efficient transmission techniques has allowed to obtain higher data rates in Wireless Local Area Networks (WLANs), thus making their use more effective in broadband communication systems and more Work partially supported by MIUR within the WOMEN project. R. Fantacci · G. Vannuccini ( ) · G. Vestri Electronics and Telecommunications Department, University of Firenze Via di Santa Marta 3, 50139 Firenze, Italy e-mail: [email protected] competitive as to the Fast and Gigabit Ethernet wired-LAN technologies. Several standardization efforts were made on the optimal transmission and medium-access techniques for WLAN applications. The two main high data-rate WLAN standards, namely IEEE 802.11a [1, 2] and HIPERLAN type 2 [3], essentially introduce the same innovation in the phys- ical layer, i.e., Orthogonal Frequency Division Multiplexing (OFDM), both being based on the 5 GHz frequency band. Another recent standard, discussed in more detail in Sec- tion 3, which is going to be significantly widespread in the Wireless Metropolitan Area Network scenario is the IEEE 802.16 2004, that is also based on OFDM. The service offered by current WLAN systems is basically a best-effort type, which means that no guarantees are provided to the end user with what concerns the service performance. Significant QoS enhancements to the WLAN standards have been devel- oped within the HIPERLAN type 2, IEEE 802.11 Point Coor- dination Function, and the new IEEE 802.11e MAC standard [4]. The performance of such solutions have been previously analyzed in the literature [5, 6]. However, to our knowledge, none of these techniques is currently widely deployed on the market. As pointed out in [7, 8], the use of specific trans- mission techniques at the physical layer would allow a more efficient use of the available bandwidth, thus providing end users with a suitable QoS. In this work, we propose a MAC protocol which takes advantage of the sub-channel division operated by the OFDM technique. As we will show in the fol- lowing, the considered protocol adopts a Frequency Division Duplex (FDD) structure together with a packet reservation scheme, thus allocating a large number of voice users within a broadband WLAN endowed with the OFDM physical layer, while voice and data QoS requirements are properly satisfied. In Section 2 the considered OFDM signal processing scheme for the proposed access protocol is presented. In Section 3 the access scheme for both voice and data terminals is described, Springer

Transcript of Performance analysis of a multiple access protocol for voice and data support in broadband wireless...

Wireless Netw (2008) 14: 17–28

DOI 10.1007/s11276-006-7522-1

Performance analysis of a multiple access protocol for voiceand data support in multiuser broadband wireless LANsR. Fantacci · G. Vannuccini · G. Vestri

Published online: 9 June 2006C© Springer Science + Business Media, LLC 2006

Abstract Wireless Local Area Networks (WLANs) is one

of the most promising access technologies for the upcom-

ing fourth-generation wireless communication systems. In

the last few years, several research efforts have been de-

voted to investigate possible multiple access schemes capa-

ble of supporting real-time traffic as well as best-effort data

transmissions. In particular, the use of suitable transmission

schemes allows not only to achieve higher data-rates, but also

to perform resource allocation in order to guarantee specific

service requirements. In this paper we propose a medium

access control (MAC) scheme for a WLAN supporting real-

time (voice) and best-effort (data) services, based on Orthog-

onal Frequency Division Multiplexing (OFDM) technique.

A suitable analytical approach is proposed in order to derive

the performance of the proposed MAC scheme. In particular,

it is shown in the paper that a high overall network capac-

ity in terms of simultaneously active users is achieved by

effectively exploiting the multiuser capabilities offered by

OFDM, together with a proper service differentiation.

Keywords Wireless networks · Multiple access · OFDM

1. Introduction

In the last few years, the use of more efficient transmission

techniques has allowed to obtain higher data rates in Wireless

Local Area Networks (WLANs), thus making their use more

effective in broadband communication systems and more

Work partially supported by MIUR within the WOMEN project.

R. Fantacci · G. Vannuccini ( ) · G. VestriElectronics and Telecommunications Department, University ofFirenze Via di Santa Marta 3, 50139 Firenze, Italye-mail: [email protected]

competitive as to the Fast and Gigabit Ethernet wired-LAN

technologies. Several standardization efforts were made on

the optimal transmission and medium-access techniques for

WLAN applications. The two main high data-rate WLAN

standards, namely IEEE 802.11a [1, 2] and HIPERLAN type

2 [3], essentially introduce the same innovation in the phys-

ical layer, i.e., Orthogonal Frequency Division Multiplexing

(OFDM), both being based on the 5 GHz frequency band.

Another recent standard, discussed in more detail in Sec-

tion 3, which is going to be significantly widespread in the

Wireless Metropolitan Area Network scenario is the IEEE

802.16 − 2004, that is also based on OFDM. The service

offered by current WLAN systems is basically a best-effort

type, which means that no guarantees are provided to the end

user with what concerns the service performance. Significant

QoS enhancements to the WLAN standards have been devel-

oped within the HIPERLAN type 2, IEEE 802.11 Point Coor-

dination Function, and the new IEEE 802.11e MAC standard

[4]. The performance of such solutions have been previously

analyzed in the literature [5, 6]. However, to our knowledge,

none of these techniques is currently widely deployed on the

market. As pointed out in [7, 8], the use of specific trans-

mission techniques at the physical layer would allow a more

efficient use of the available bandwidth, thus providing end

users with a suitable QoS. In this work, we propose a MAC

protocol which takes advantage of the sub-channel division

operated by the OFDM technique. As we will show in the fol-

lowing, the considered protocol adopts a Frequency Division

Duplex (FDD) structure together with a packet reservation

scheme, thus allocating a large number of voice users within

a broadband WLAN endowed with the OFDM physical layer,

while voice and data QoS requirements are properly satisfied.

In Section 2 the considered OFDM signal processing scheme

for the proposed access protocol is presented. In Section 3 the

access scheme for both voice and data terminals is described,

Springer

18 Wireless Netw (2008) 14: 17–28

and its analytical model is derived in Section 4. Finally, in

Section 5 numerical results are shown for the considered sys-

tem, while comparing analytical predictions with computer

simulation results.

2. OFDM signal processing for the proposedaccess scheme

OFDM is a well-known transmission technique that allows

a single signal to be transmitted over different parallel sub-

carriers. It is more resistant to frequency selective fading than

single carrier systems, due to the segmentation of the chan-

nel into narrowband flat fading sub-channels. It also avoids

Inter Symbol Interference (ISI) through the use of a cyclic

prefix. Among the main drawbacks of OFDM, there are time

and frequency synchronization requirements, due to a strong

performance variation with frequency and time offsets. Such

issues can be partially mitigated by effectively employing

frequency, time and power control techniques, that bring to

the possibility to assign different sub-carriers to different

users [7, 8]. For the system under consideration we assume

an FDD frequency structure, where 20 MHz-wide uplink and

downlink bandwidth are divided into Nch = 4 sub-channels

of Nc = 16 comb-spread sub-carriers each. The total number

of available sub-carriers is then 64 for both the uplink and the

downlink. A comb-spread allocation scheme can be assumed

to cope with selective fading of the radio channel in an effi-

cient way [7–9]. The system proposed is modelled with an

infrastructure-WLAN with an Access Point (AP), Nd data

terminals (DTs) and Nv terminals (VTs). In the proposed

access scheme, available resources for uplink or downlink

transmissions can be depicted as a time-channel (T-C) ma-

trix. The rows of the T-C matrix are the 4 available frequency

sub-channels, each sub-channel containing 16 comb-spread

carriers. Columns of the T-C matrix are the time slots. In par-

ticular, 50 slots form a frame, whose duration T f is 20 ms.

Each element of the T-C matrix corresponds to a voice or data

packet allocated to a specific uplink or downlink sub-channel

(i.e., a specific group of carriers), via the reservation-based

process that will be discussed in the following. Every VT

can transmit its traffic on a group of Nc carriers which the

AP has allocated for it. A DT can transmit on one or more

sub-channels not reserved by VTs.

A time slot contains 100 minislots. Each minislot corre-

sponds to an OFDM symbol time of 4 μs. An OFDM symbol

time is composed of an useful interval Tu(3.2 μs) and a guard

interval Tg(0.8 μs) to cope with multipath fading.

Each voice or data message is finally fragmented into a

164 byte-long packet, which composes the payload of a MAC

frame, as shown in Fig. 1. After the channel encoding (with

rate 1/2), such a payload is mapped into 82 minislots, i.e.,

82 OFDM symbols. The remaining 18 OFDM symbols that

Fig. 1 MAC and PHY packet format

compose a time slot are used, as shown in Fig. 1, for MAC

signalling, physical layer synchronization and channel esti-

mation. The overall MAC protocol efficiency ratio for the

considered system is therefore 82%.

In particular, 4 OFDM symbols are used at the MAC layer

for addressing, signalling of the available subchannels to

DTs and VTs, and generic control signalling for the WLAN

management.

Then, as shown in Fig. 1, 14 OFDM symbols at the physi-

cal layer are assumed to be sufficient to achieve symbol syn-

chronization among stations and channel estimation. Such

a synchronization at the OFDM symbol, coupled with a

proper WLAN-wide clock broadcasting system, may allow

to develop an FDD time-frequency division multiple access

scheme such as the one proposed in this paper.

The QPSK modulation scheme was assumed in transmis-

sion for its simplicity and robustness, despite it is certainly not

always the optimum solution for such a broadband wireless

system. However, more efficient solutions as those based on

link adaptation algorithms, that adapt the modulation scheme

used in transmission to the channel conditions, are beyond

the scope of this paper.

In general, a terminal could avoid transmitting on some

of the carriers by zeroing some of the inputs of the IFFT and

using only the remaining inputs, corresponding to the carriers

allocated to it by the AP, to transmit its information. The AP

is able to separate the uplink information flows of different

users thanks to the linearity of IFFT processing, and to the

assumption of mini-slot synchronization among users. The

centralized structure of the proposed protocol allows the AP

to know at each time to which user a certain sub-channel is

assigned.

The receiver basically performs the reverse operations of

the transmitter. Once the received signal has been trans-

lated into the base band, cyclic prefix is extracted and the

useful samples are serial to parallel converted. These data

are then processed by a FFT block. As it will be shown in

Springer

Wireless Netw (2008) 14: 17–28 19

the next sections, every receiver knows which sub-channels

are used for packets addressed to it. By properly tuning on

these sub-channels, QPSK demodulators recover the infor-

mation out of the OFDM symbols.

3. Description of the access scheme

3.1. VT and DT access scheme

Voice signals are known to have a two-state ON/OFF be-

havior, where talkspurts (ON state) are followed by silence

periods (OFF state) [10]. The ITU-T G.711 speech codec

[11] has been selected to model good-quality voice calls,

with a 64 kbit/s bit rate, 160 byte-long packets generated ev-

ery 20 ms during a talkspurt, and no packets generated in

the silence periods. The RTP/UDP/IP header overhead was

considered, but as the packet length is very limited, a header

compression was assumed, which allows to compress the 40

bytes of the RTP/UDP/IP header into 4 bytes [12]. The talk-

spurt and silence duration times are exponentially distributed

with a mean value of 1 s and 1.35 s, respectively [10]. It is

assumed here that the maximum tolerable delay for a voice

packet is equal to a frame time T f , which is also the vocoder

inter-packet generation time. If a voice request packet cannot

be sent to the AP within this delay, it is dropped. Before the

end of each slot, the available OFDM sub-channels which

can be used for both contention and data transmission in

the following slot are broadcasted by the AP in downlink

to all terminals via a specific field of the MAC packet. In

particular, the AP exploits the 8-bit-long subcarrier alloca-

tion signalling field in the downlink in order to broadcast

which sub-channels are free and which are busy, in this case

also the terminals using them. This is done by exploiting the

information in the time-channel allocation matrix which is

managed by the AP. In particular, the AP will send on the i-th

downlink channel the address of the station which will use

the corresponding i-th uplink channel, on which the station

required to transmit by sending its transmission request.

Each VT or DT waits for the AP to acknowledge the suc-

cessful transmission of the channel request, via a grant mes-

sage on the required downlink channel. Whenever a talkspurt

begins at a particular VT, the access phase to the shared chan-

nel resources is started, by sending a preemption symbol to

the AP at the beginning of the next slot. The AP will then

preempt possible active DT transmissions in favor of the VT

transmissions. In the following slot, if any free channels are

available, the VT transmits its request packet with permis-

sion probability pv over one of the free channels, chosen

with uniform probability Fig. 2. Otherwise, the VT sends

another preemption symbol at the beginning of the current

slot. If the request packet is successfully received by the AP,

as shown in Fig. 2, the AP will then assign to the specific

VT that sub-channel every frame time for the transmission

of voice packets. If the request packet collides with other re-

quest packets, the terminals that caused the collision, having

not received any grant from the AP, will try to transmit their

request packets again in the following slots. The DT on ser-

vice, whose transmission suffered preemption, is enabled to

transmit on the first slot following the slot in which collisions

and preemption requests are absent, as shown in Fig. 2.

Once the VT has gained the required resources for a spe-

cific talkspurt, the channel access is guaranteed to that VT,

which will be able to send its packets avoiding collisions as

in Fig. 2. When a VT talkspurt ends, the VT will set a flag in

its last voice packet. As a consequence, the allocated channel

resources are released by the AP.

Every DT has a FIFO-served messages buffer. Data mes-

sages are segmented into fixed length (164 byte) packets be-

fore being forwarded. In order to transmit a message, a DT

has to send a data request packet to the AP, following the

same scheme as outlined for VTs. This contains the sender

address, the receiver address, and the first part of the infor-

mation message.

A data request will be valid for all messages generated

by the DT since the arrival of the first message to the instant of

the complete depletion of the data buffer (exhaustive policy).

The AP contains a FIFO-served Request Queue (APRQ). If

a data request is successfully received, it will be put at the

end of the APRQ (FIFO policy). When a DT request reaches

the head of the APRQ, that DT will begin to be served, i.e.,

it will be able to send its data packets in the sub-channels not

reserved by VTs (up to Nch per slot). Before the end of each

slot, the available sub-channels for the next slot are broadcast

by the AP. In the above scheme, it is possible that a DT

request collides with other DT requests and/or VT requests.

Preemption is also adopted for DTs over the currently active

DT, in order to avoid starvation for data requests.

The proposed algorithm was initially conceived while

an important standardization activity was carried out within

the IEEE Working Group 802.16, which brought to the 2004

IEEE 802.16–2004 MAC and PHY specifications [13]. The

IEEE 802.16 specification was first thought for point-to-

multipoint broadband wireless networks, in a metropolitan

scenario [14]. The IEEE 802.16 standard specifies both PHY

and MAC layer, even if scheduling and resource management

details are intentionally left to different vendor implementa-

tions. The scheme considered in this paper is intended to

propose a scheduling technique for the allocation of network

resources with regards to QoS demands of voice and data

services. The proposed scheme is also analyzed by means

of computer simulations and a theoretical model of both the

protocol and the voice and data sources. The algorithm pre-

sented in this paper offers several interesting similarities with

the IEEE 802.16 standard. In particular, we deal with a time-

slotted/FDD multiple access protocol, based on the OFDM

Springer

20 Wireless Netw (2008) 14: 17–28

uplink

downlink

frequency

timeFrame time: 20ms

Slot time: 400 s

WSTA5 voice req+ first voicepacket

WSTA 3 datarequest

WSTA 4 secondvoice packet

WSTA 2 and 3:Grant notreceived

WSTA 2 Voicereq+ first voicepacket+

WSTA 3 data req

WSTA2 voicereq+ first voicepacket

WSTA 1 Voicereq + first voicepacket

WSTA5 voice req+ first voicepacket

WSTA 3 datarequest

WSTA 4 secondvoice packet

WSTA 2 and 3:Grant notreceived

WSTA 2 Voicereq+ first voicepacket+

WSTA 3 data req

WSTA2 voicereq+ first voicepacket

WSTA 1 Voicereq + first voicepacket

Grant to WSTA 3Channel3

Grant to WSTA 2Channel1

Grant to WSTA 5channel4

Grant to WSTA 1Channel1

Grant to WSTA 3Channel3

Grant to WSTA 2Channel1

Grant to WSTA 5channel4

Grant to WSTA 1Channel1

WSTA 5 Secondvoice packet

WSTA 4 Thirdvoice packet

WSTA 1

SecondVoicepacket

WSTA3 datapacket

WSTA2 secondvoice packet

WSTA 5 Secondvoice packet

WSTA 4 Thirdvoice packet

WSTA 1

SecondVoicepacket

WSTA3 datapacket

WSTA2 secondvoice packet

Fig. 2 Uplink and Downlink access scheme for the considered system

capabilities of allocating different channels to different ser-

vices and users. This is a similar scheme to the one included

in the Wireless MAN-OFDMA option of the IEEE 802.16–

2004 standard [13]. However, although the basic concepts

are similar, the algorithm presented in this paper is consid-

erably simpler than the IEEE 802.16 MAC and PHY spec-

ifications, having here focused more on the implementation

of a computer simulation and analytical approach to the per-

formance evaluation of a proposed OFDM-based multiple

access scheme for broadband wireless networks. Therefore,

the Uplink and Downlink MAP, used in the IEEE 802.16

PHY to allow the Base Station (BS) and the Service Stations

(SSs) to select the proper physical transmission parameters

(e.g., FEC and modulation), is much simpler in this paper,

where a lookup-table processed by the AP is conceived to

optimize and manage the channels allocation to the different

terminals. The transmitted data burst-size profile, which is

dynamically negotiated in the IEEE 802.16 specifications,

is here reduced to a simpler allocation scheme, where the

AP decides to allocate more channels to DT services thus

obtaining a parallel transmission of more data units, which

can still be thought of as a dynamic burst. Like the IEEE

802.16 MAC, the MAC scheme under consideration is basi-

cally connection-oriented, since each service is mapped on

a connection, which is granted with specific QoS charac-

teristics, depending on the considered service. Again, this

connection-oriented resource management is implemented

in a complex and efficient way in the IEEE 802.16 standard,

by using the Connection Identifier (CID) field in the MAC

header, which is used to address each connection between the

BS and the SS in the IEEE 802.16 WMAN. This addressing

is extremely simplified in the proposed algorithm, where a

MAC field (the subcarrier allocation signalling field) is used

for the same aim of addressing and communicating with ter-

minals allowed to transmit. The IEEE 802.16 MAC header

is endowed with a Bandwidth request field, which again is

simplified in the considered protocol in a proper request mes-

sage encoded within the signalling field. Several similarities

can also be found in the concept of resource allocation ser-

vices of the IEEE 802.16 MAC. In particular, the considered

algorithm allocation scheme could be compared to the Real-

Time Polling Service of the IEEE standard, where an SS can

send an explicit request-to-transmit to the BS. As pointed out

in [14], when compared to the other allocation service pro-

posed in the IEEE 802.16, i.e., the Unsolicited Grant Service,

where no explicit request is allowed to SSs, the Real-Time

Polling Service can increase the latency and protocol over-

head, but it allows the AP to allocate as much bandwidth

as required by terminals, thus optimizing resource allocation

in the network. For what concerns the grant mechanism, the

considered algorithm is similar to the Grant per Connection

(GPC) scheme of the IEEE 802.16 MAC, since each channel

allocation sent by the AP is granted to a specific DT or VT

transmission, which can be thought of as a connection as

Springer

Wireless Netw (2008) 14: 17–28 21

meant by the IEEE 802.16 standard, since we assume that

each VT or DT is represented by a single service.

4. Voice and data analytical model

In deriving the performance of the proposed scheme, a the-

oretical model was developed for the overall system. We

focused on the uplink channel, since it is the most critical

channel due to the possibility of collisions among terminals

accessing the shared resources. The principal aim of this pa-

per was to analyze the performance of the MAC protocol,

and, hence, the effects of the radio channel were neglected

as a first approximation. This may be further justified by

assuming such effects to be partially mitigated by using suit-

able coding, interleaving, windowing and comb spreading

techniques [7, 9].

The system parameters considered in this paper are given

in Table 1.

The voice subsystem, shown in Fig. 3, was modelled as in

[10]. Voice packet dropping probability, Pdrop, was consid-

ered as the target QoS parameter for voice services.

Each VT can be in one of Ns + 2 states. All transitions

are assumed to occur at the end of a slot. A VT remains

in the silent state SIL unless it has no speech packets to be

transmitted on the channel. This happens during the silent

time of the voice model. As soon as the talkspurt period

begins, and the first packet is generated within this talkspurt,

the VT leaves the SIL state and moves to the contending

state CON. After that a VT has successfully transmitted its

request packet, it can be in one of the Ns reservation states

RESi (i = 0, . . . , Ns − 1).RESi denotes the state occupied by

a VT which has to wait i slots before transmitting a voice

packet on its reserved sub-channel.

From state RESi , i �= 0, a VT always moves to state

RESi−1. From state RES0, it returns to state RESNs−1 if it

continues to generate voice packets, otherwise it goes to state

SIL. We assume that no transitions from state CON to SILstate can occur, i.e., a talkspurt never ends before a reserva-

tion attempt becomes successful.

For the DT subsystem, a finite-state chain model was

adopted [15] Fig. 3. The data message delay, Tmes, is the

QoS parameter to be evaluated. A DT can be in one of the

following states:� SIL: a DT has no data messages to transmit in its buffer,

this implies that the DT remains in the silent state SIL;� CON j : a DT stays in this state if it is in the contention

phase and its buffer contains j messages;� WAIT j : a DT remains in this state if its address is stored

in the APRQ and its buffer contains j messages.

From state SIL, a DT moves to state CON1 if, in a specific

slot, a message is generated. From state CONi , a DT passes

Table 1 System parameters

Default

Symbol Definition value

System parametersNch number of sub-channels per slot 4

Nc number of carriers per sub-channel 16

Ns number of slots per frame 50

TOFDM OFDM symbol time 4 μs

Ts slot time 400 μs

T f frame time 20 ms

sv mean # of VTs in Silence at eq.

cv mean # of VTs in Contention at eq.

rv,i mean # of VTs in Res - i at eq.

sd mean # of DTs in Silence at eq.

cd mean # of DTs in Contention at eq.

wd mean # of DTs in Wait at eq.

Voice terminal parametersσv prob. that talksp. starts in a slot, expon. distr.

γv prob. that talksp. ends in a slot, expon. distr.

γ fv prob. that talksp. ends in a frame, expon. distr.

voice packet time-out 20 ms

Nv number of active VTs

pv permission probability for VT

Data terminal parametersλd mean message interarrival time, exp. distr.

Ld mean message length, mod. geom. distr.

σd prob. that message starts in a slot, exp.

distr.

γd prob. that message ends in a slot, exp. distr.

Nd number of active DTs

pd permission probability for DT

into the waiting state WAITi if no messages are generated

and the data request is successfully forwarded. The DT may

also go from state CONi to state WAITi+1 if there is a new

message arrival and the DT request is successfully sent to

the AP. Finally, the DT can move from state CONi to state

CONi+1 if a new message is generated and the request is

not successfully sent. From state WAITi , a DT can move to

WAITi+1 if a new message is generated and the DT request

is not at the end of the APRQ, or if a new message arrives,

the DT request is at the end of the APRQ and the currently

served message transmission is not terminated. From state

WAITi+1, a DT can pass to state WAITi and from state WAIT1

it can pass to state SIL if no message is generated, the DT

request is at the end of the APRQ and the served message

transmission is completed. A DT remains in state WAITi if

one of the following cases applies: (a) its request is not at the

end of APRQ and no new messages are generated, (b) no new

messages are generated, the request is at the end of APRQ

and the served message transmission is not terminated, (c) a

new message arrives, the request is at the end of APRQ and

the served message transmission is completed.

Springer

22 Wireless Netw (2008) 14: 17–28

v

fv

Pcrv

1-Pcrv

SIL CON

RESN -1sRESN -2sRES0

fv

v

CON1 CON2

SIL

WAIT1 WAIT2

(1-Pod) d(1-Pod) d

(1-P )(1- )od d (1-P )(1- )od d

d odP

(1- ) Pd od

d

d1-

(1- ) Pd ow d

(1-P )(1- )+(1- ) P (1- Pow d d ow d)+ d ow d (1-P )(1- )+(1- ) P (1- Pow d d ow d)+ d ow d

(1-P ) + P (1-ow d d ow d)

(1- ) Pd ow d

(1- ) Pd od

(1- ) Pd ow d

(1-P ) + P (1-ow d d ow d)

(1-Pod) d

d odP

Fig. 3 Voice and data subsystem models

Springer

Wireless Netw (2008) 14: 17–28 23

4.1. system analysis

By using the Equilibrium Point Analysis (EPA) method

[16], it is possible to determine the equilibrium values

of voice and data subsystem state variables, described in

Table 1, respectively as {Sv, Cv, Rv,0, Rv,1, . . . , Rv,Ns−1} and

{Sd , Cd , Wd}. According to Table 1, the equilibrium values

of these variables are hereafter referred with the following

lowercase letters notation: {sv, cv, rv,0, rv,1, . . . , rv,Ns−1} and

{sd , cd , wd}.1The system considered in this paper is assumed to be un-

der non-heavy load traffic situation (stability region). At the

equilibrium, the expected rate at which terminals leave a

given state is equal to the expected rate at which terminals

enter this state. Let us now write the equations necessary to

determine the equilibrium values of state variables. First of

all we will concentrate on voice subsystem. The probability,

for a VT, to move from state CON to state RESNs−1, i.e, to

successfully forward its request packet is shown in 1 (see

table 4 for parameters description):

Pcrv(cv, cd , rv) =

⎧⎪⎪⎪⎪⎨⎪⎪⎪⎪⎩Nch∑j=1

pv

(1 − pv

j

)cv−1 (1 − pd

j

)cd(

Nch

j

) (rv

Nch

)(Nch− j) (1 − rv

Nch

) j

if cv ≥ 1

Nch∑j=1

pv

(1 − pd

j

)cd(

Nch

j

) (rv

Nch

)(Nch− j) (1 − rv

Nch

) j

if cv < 1

(1)

The parameters used are detailed in Table 4.

This is obtained by considering that:� each VT has a permission probability pv;� each DT has a permission probability pd ;� in general there may be j free sub-channels per slot, among

which a VT chooses only one with a uniform probability1j ;� if cv ≥ 1, a VT reservation will be successful if none of

the other (cv − 1) contending VTs and none of the other cd

contending DTs chooses the same sub-channel to transmit

its own request;� the probability that there are j free sub-channels in a certain

slot is binomial and equal to(Nch

j

) (rv

Nch

)(Nch− j) (1 − rv

Nch

) j

; (2)

� if cv < 1, a VT reservation will be successful if none of the

other cd contending DTs chooses the same sub-channel to

transmit its own request.

1 Note that, being mean values, the equilibrium state variables can alsotake values less than 1.

By equating the outflow and the inflow at states

RES0, RES1, . . . , RESNs−2, we have:

rv,0 = rv,1 = . . . = rv,Ns−1 = rv. (3)

Equilibrium equations at states RESNs−1 and SIL can thus

be written as follows:

rv(1 − γ fv ) + cv Pcrv = rv, (4)

rvγ fv = svσv (5)

Recalling that the total number of VTs in the network is

Nv , we have, at equilibrium

sv + cv + Nvrv = Nv. (6)

Let us now consider data subsystem. The term

Pod (cv, cd , rv), which denotes the probability for a DT to

successfully send a request packet, is formally identical to

(1), except that the terms pv and pd , and the terms cv and

cd in (1) are mutually exchanged. For state CONi , through

some calculations, we have

cdi = sd

1 − Pod

[σd (1 − Pod )

σd + Pod + σd Pod

]i

. (7)

Finally, we can write

cd =∞∑

i=1

cdi = σd · sd

Pod. (8)

Recalling that the total number of DTs in the network is

Nd , we have, at equilibrium,

sd + cd + wd = Nd (9)

where wd = bNd , with b indicating the probability for a DT

to have its request in the APRQ.

At equilibrium, the average number of packets arriving at

the DTs within a slot time is equal to the average number

of data packets sent within a slot time, given by the number

Springer

24 Wireless Netw (2008) 14: 17–28

of packets sent by the active DT not blocked by the VTs

preemption, plus the sum of the packets sent by the DTs being

in Contention state, cd Pod . The above statement is expressed

in the last equation of the following nonlinear system, which

is used to derive equilibrium values (cv, rv, sv, cd , sd , b) of

system state variables:

⎧⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎨⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎩

rv(1 − γ fv ) + cv Pcrv = rv

rvγ fv = svσv

sv + cv + Nsrv = Nv

cd = σd ·sdPod

cd + sd + bNd = Nd

λd Nd Ld Ts = [1 − (1 − b)Nd ][1 − PITD].Nch∑j=1

j

(Nch

j

) (1 − rv

Nch

) j (rv

Nch

)Nch− j

+ cd Pod .

(10)

The term PITD represents the probability for the current active

DT to be preempted, and is given by:

PITD = 1 − (1 − σv)sv (1 − σd )sd Pcv

crv Pcdod . (11)

From the solution of the nonlinear system (10), equilib-

rium values of state variables are derived. These are taken as

average values of corresponding state variables and used to

build the system state probability �(Cv, Rv, Cd , Wd ).

By applying the chain rule several times [15], we have:

�(Cv, Cd , Wd , Rv)

=(

Nd − Wd

Cd

) (cd

Nd

)Cd(

1 − cd

Nd

)Nd−Wd−Cd

×(

M − Rv Ns

Cv

) (cv

Nv

)Cv(

1 − cv

Nv

)M−Rv Ns−Cv

×(

Nch

Rv

) (rv

Nch

)Rv(

1 − rv

Nch

)Nch−Rv

×(

Nd

Wd

)bWd (1 − b)Nd−Wd . (12)

where M = max(Nv, Nch Ns).

4.2. QoS parameters evaluation

Let v(Cv, Rv) be the probability for a VT to remain in the

CON state for a given slot time, when the number of con-

tending VTs Cv and voice-reserved sub-channels Rv are

fixed:

v(Cv, Rv) =

⎧⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎨⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎩

1−Nch∑j=1

pv

(1− pv

j

)Cv(

Nch

j

)·(

Rv

Nch

)Nch− j (1 − Rv

Nch

) j

if Cv ≥ 1,

1 − pv

[1 −

(Rv

Nch

)Nch]

if Cv < 1.

(13)

We have that vm , the average probability that a VT is not

able to successfully send a transmission request packet to the

AP within a slot time, results to be:

vm =Nch∑

Rv=0

M−Rv Ns∑Cv=0

v(Cv, Rv) · �(Cv, Rv). (14)

At the beginning of a talkspurt a VT waits j slots before

obtaining a reservation. This waiting probability conforms to

the geometric distribution:

PW ( j) = (1 − vm) v j−1m , j = 1, 2, . . . . (15)

Let us assume that a talkspurt is L packets long. No packets

are dropped if j ≤ Ns . After waiting Ns slots without a suc-

cessful request transmission, the VT drops the initial packet

of the talkspurt. The VT will drop the following packet if it

cannot be successfully forwarded within the next Ns slots. A

similar treatment is applied to the following packets of the

talkspurt. All the packets of the talkspurt will be dropped if

j ≥ L Ns + 1. The number of dropped packets as a function

of waiting time j can be expressed as follows:

ndrop( j) = 0 if 1 ≤ j ≤ Ns

ndrop( j) = k (0 < k < L) , if k Ns + 1

≤ j ≤ (k + 1)Nsndrop( j) = L if L Ns + 1 ≤ j

(16)

From (15) and (16) it is possible to derive the probability

that, in a talkspurt of L packets, k packets are dropped:

Pr (ndrop = 0|L) =Ns∑j=1

PW ( j) = 1 − vNsm

Pr (ndrop = k|L) =(k+1)Ns∑

j = k Ns+1

PW ( j) = vk Nsm − v(k+1)Ns

m

Pr (ndrop = L|L) =∞∑

j = L Ns+1

PW ( j) = vL Nsm

, if 1 ≤ k ≤ Ns − 1 (17)

Springer

Wireless Netw (2008) 14: 17–28 25

The mean number of dropped packets for a talkspurt of

length L is given by:

E[ndrop|L] =L∑

k = 0

k Pr (ndrop = k|L) = vNsm

1 − vNs Lm

1 − vNsm

. (18)

By assuming that the probability Pr(L) of a talkspurt

length is geometrically distributed:

Pr (L) = γ fv (1 − γ fv )L−1, (19)

we calculate the average number of dropped packets per

talkspurt:

E[ndrop] =∞∑

L=1

E[ndrop|L]Pr (L) = vNsm

1−(1−γ fv )vNsm

. (20)

Finally, Pdrop is obtained as the ratio of E[ndrop] over the

average number of packets per talkspurt, i.e., 1/γ fv :

Pdrop = γ fvvNs

m

1 − (1 − γ fv )vNsm

. (21)

As for data subsystem, the performance evaluation is car-

ried out by evaluating the total message transmission delay,

within the uplink from a DT to the AP. The data message

transmission delay is most probably higher in the uplink than

in the downlink, due to the negative effect of the contention

mechanism. The total message delay Tmes can be calculated

as the sum of four terms:� the time spent to successfully forward the data request

to the AP, which is nonzero only if a message arrives find-

ing the buffer empty;� the time Tch necessary to transmit a message over the chan-

nel;� the time TqueueAP needed for the request to reach the top of

the APRQ;� the time TqueueDT necessary for a message to arrive at the

top of DT messages buffer.

First of all we note that a message arrived at a DT finding

the buffer empty has a different service time statistic with

respect to messages arrived when the buffer is not empty.

In the former case the service time is given by the sum of

the contention time (i.e., the time spent to successfully send

the request packet) plus the time necessary to complete the

message transmission. In the latter case the service time is

equal to the time needed to transmit the message over the

channel. Hence, we can model each DT as an M/G/1 system

with different service time statistics [17]. The mean message

delay for the considered M/G/1 system is

Tmes � [2 ˙A(1) + ¨A(1) − A(1)] + A(1)

2λd [1 − A(1) + A(1)](22)

where A(z) and A(z) are the message arrivals generating

functions in the cases of, respectively, non-empty and empty

buffer. Under the assumption that a message is composed of

k packets, by means of standard queuing results, we have

A(z|k) =∞∑

i = 0

(λdkTseq)i 1

i!e−λd Tseq zi (23)

where Tseq = Tsν

is the equivalent slot time for a DT, which

is the real slot time perceived by the active DT which is

attempting to transmit its packets. The term v is the average

number of channels per slot available for data transmission:

ν =Nch∑

Rv=0

M−Rv Ns∑Cv=0

Nd∑Cd=0

Nd−Cd∑Wd=0

(Nch − Rv)(1 − σv)M−Cv−Rv Ns

× (1 − σd )Nd−Cd−Wd PCdcrv PCd

od �(Cv, Cd , Wd , Rv). (24)

If the message length is geometrically distributed with

mean Ld , then A(z) is obtained by averaging A(z|k) over k.

Let us now evaluate A(z). The service time for a message

finding an empty buffer is given by the sum of the time spent

for the contention phase plus the time needed for the message

transmission over the channel. One slot is spent for sending

the preemption symbol. If i slots are necessary for success-

fully sending the request and if the message is composed of

n packets, we have:

A(z|i, n) = e−λd (i+1+ n−1ν

)T s(1−z). (25)

The probability for a DT to remain in the contending state

for i slots and the probability for a message to be n packets

long are geometric and equal to

Pcon(i) = Pod (1 − Pod )i−1 (26)

PL (n) = 1

Ld

(1 − 1

Ld

)n−1

(27)

The joint probability for a DT to remain in the contending

state for i slots and for a message to be n packets long is

given by the product of the two previous terms. Finally we

can calculate

Springer

26 Wireless Netw (2008) 14: 17–28

A(z) =∞∑

i=1

∞∑n=1

A(z|i, n)Pcon(i)PL (n). (28)

5. Numerical results

In order to make the performance evaluation for the proposed

scheme analytically and computationally feasible, a scaled

version of the whole system was considered in which Ts =2 ms, Ns = 10, T f = 20 ms, Nch = 4.

Figure 4 shows the behavior of the packet dropping prob-

ability (Pdrop) as a function of Nv , when no DTs are present,

for three different values of pv . If the total number of VTs

is comparable with the total number of channels per frame

time (Ns Nch = 40), then Pdrop minimization will be achieved

with higher pv (close to 1). On the contrary, if the VTs num-

ber is considerably larger than the number of voice channels

per frame time, then a smaller pv will achieve better per-

formance. This shows how smaller permission probabilities

allow us to allocate larger number of active terminals in the

network.

Figure 5 shows Pdrop as a function of pv , when Nv is

fixed. The dropping probability Pdrop shows now a minimum

within the pv interval [0,1]. The Pdrop dependence on pv can

be explained by considering that if permission probability

is too small, voice packets drop is most probable, because

their transmission is more difficult, due to the low pv , while

if it is too large, packets drop is caused most probably by

collisions. An intermediate value for pv of 0.7 has proven to

be the optimum value that minimizes Pdrop in this case. An

important consequence coming from the proposed protocol is

the independence of voice service quality from data traffic,

due to the DTs preemption in favor of VTs. Accordingly,

Fig. 6 shows the variation of Pdrop with Nv in the cases for

Nd = 0 and Nd = 10.

10 20 30 40 50 60 70 8010

–7

10–6

10–5

10–4

10–3

10–2

10–1

Nv

Pdro

p

simulation pv=0.3

theory pv=0.3

simulation pv=0.5

theory pv=0.5

simulation pv=0.7

theory pv=0.7

Fig. 4 Pdrop vs Nv with pv = 0.3, 0.5, 0.7

0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 110

–4

10–3

10–2

pv

Pdro

p

simulationtheory

Fig. 5 Pdrop vs pv with Nv = 60

10 15 20 25 30 35 40 45 50 55 6010

–5

10–4

10–3

Nv

Pdro

p

Nd=0

Nd=10

Fig. 6 Pdrop vs Nv with pv = pd = 0.5, Ld = 100, λd = 0.2 msg/s

Figure 7 shows the performance of the proposed sys-

tem, in terms of message delay for data packets, when

Nv = 40, λd = 0.2msg/s, Nd = 2 and pv = pd = 0.5. Two

DTs are able to share the network in the scaled version of the

proposed system with 40 VTs, while a good overall message

delay is achieved. A good approximation for the average bit

rate available for the active DT is Rb = Rb · νNch

, where ν is

the mean number of available channels per slot. The above

figure also shows the observed confidence interval of simu-

lation tests.

An accurate comparison of the proposed system results

with other existing works is made difficult by the fact that

performance are extremely influenced by several parameters,

like the adopted voice codec, the channel coding scheme, and

channel transmission capability. From our literature analy-

sis, a lack of systems capable of allocating large numbers of

voice services with quality guarantees is outlined. In [5] and

[18], where results are shown for the case of an ideal channel,

Springer

Wireless Netw (2008) 14: 17–28 27

50 100 150 200 250 300 350 4000.05

0.1

0.15

0.2

0.25

0.3

0.35

0.4

0.45

Tm

es

(s)

Ld

theoreticalsimulation

Fig. 7 Tmes vs Ld with λd = 0.2 msg/s, Nv = 40, Nd = 2, pv = pd =0.5

like in the present paper, a relatively smaller number of voice

terminals, with respect to available channel bandwidth, can

be supported in the network, even compared to the scaled ver-

sion of the system proposed in this paper. Moreover, Pdrop per-

formance are extremely influenced by the presence of other

traffic types [18]. Differently from [19], the proposed pro-

tocol allows only collisions among transmission requests,

and not among information messages. This lets the actual

throughput remain substantially close to the offered network

load. Moreover, when the system is sufficiently far from be-

ing congested, the data message delay is not heavily influ-

enced by the number of data terminals, since this parameter

is theoretically not affected by collisions.

6. Conclusions

In this paper we have discussed the performance evaluation

of a reservation-based MAC scheme, which effectively ex-

ploits the OFDM sub-channel structure and permits to meet

the service quality constraints of real-time applications such

as voice communications. A suitable analytical approach was

proposed and the obtained analytical predictions were com-

pared with simulation results. Even in case of a scaled-down

version of the system, it has been demonstrated that a large

number of voice terminals can be supported by the WLAN

under consideration, while data services still have good per-

formance in terms of delay message.

References

1. IEEE Std 802.11-1999 Information Technology-telecommuni-cations and Information Exchange between Systems-Local and

Metropolitan area Networks-specific Requirements-part 11: Wire-less Lan Medium Access Control (MAC) and Physical Layer (PHY)Specifications (1999).

2. IEEE Std 802.11a-1999 Supplement to IEEE standard for in-formation technology—telecommunications and information ex-change between systems—local and metropolitan area networks—specific requirements. Part 11: wireless LAN Medium Access Con-trol (MAC) and Physical Layer (PHY) (1999).

3. ETSI, TR 101 031, Broadband Radio Access Networks (BRAN);High Performance Radio Local Area Network (HIPERLAN) Type2; Requirements and architectures for wireless broadband access(1999).

4. IEEE Standard for Information Technology—Telecommunicationsand Information Exchange Between Systems–LAN/MAN SpecificRequirements—Part 11 Wireless Medium Access Control (MAC)and Physical Layer (PHY) specifications: Medium Access Control(MAC) Quality of Service (QoS) Enhancements (2005).

5. A. Banchs, X. Perez, M. Radimirsch and H.J. Stuttgen, “Servicedifferentiation extensions for elastic and real-time traffic in 802.11wireless LAN,” High Performance Switching and Routing, 2001IEEE Workshop on, 2001 (2001) pp. 245–249.

6. S. Mangold, S.Choi, P. May, O. Klein, G. Hiertz and L. Stibor,“IEEE 802.11e wireless LAN for quality of service,” Proc. ofEW2002, Florence, Italy (Feb. 2002) pp. 32–39.

7. B. Mc Farland, G. Chesson, C. Temme and T. Meng, “The 5-upprotocol for unified multiservice wireless networks,” IEEE Comm.Mag., Vol. 39, No. 11 (Nov. 2001) pp. 74–80.

8. E. Lawrey, “Multiuser OFDM,” Signal Processing and its Applica-tions, 1999 5th IEEE International Symposium on (Aug. 1999).

9. R. van Nee, “New high-rate wireless LAN standards,” IEEE Comm.Mag. (Dec. 1999) pp. 82–88.

10. H. Xie and D.J. Goodman, “Prma system performance with vari-able number of calls,” Technical Report, WINLAB-TR-36 (June1992).

11. ITU-T Recommendation G.711 (11/88): “Pulse code modulation(PCM) of voice frequencies.”

12. K. Svanbro, “Lower layer guidelines for robust RTP/UDP/IPheader compression,” draft-ietf-rohc-rtp-lower-layer-guidelines-03.txt (Dec. 2001).

13. IEEE Standard for Local and Metropolitan Area Networks. Part.16: Air Interface for Fixed Broadband Wireless Access Sytems—IEEE Std 802.16-2004 (2004).

14. C. Eklund, R.B. Marks, K.L. Stanwood and S. Wang, “Ieee standard802.16: a technical overview of the WirelessMAN air interfacefor broadband wireless access,” IEEE Comm. Mag. (June 2002)pp. 98–107.

15. R. Fantacci and F. Innocenti, “Performance evaluation of a modi-fied PRMA protocol for joint voice and data packet wireless net-works,” IEEE Trans. on Comm., Vol. 47, No. 12 (Dec. 1999)pp. 1837–1848.

16. S. Nanda, D.J. Goodman and U. Timor, “Performance of PRMA: apacket voice protocol for cellular systems,” IEEE Trans.on Comm.(Aug. 1991) pp. 584–598.

17. L. Kleinrock, Queuing Systems, Prentice Hall (1992).18. T. Suzuki and S. Tasaka, “Performance evaluation of priority-based

multimedia transmission with the PCF in an IEEE 802.11 standardwireless LAN,” Personal, Indoor and Mobile Radio Communica-tions, 2001 12th IEEE International Symposium on, Vol. 2 (Sept.2001) pp. 70–77.

19. M. Natkaniec and A.R. Pach, “An analysis of the backoff mecha-nism used in IEEE 802.11 networks,” Computers and Communi-cations, 2000. Proceedings. ISCC 2000. Fifth IEEE Symposium on(2000) pp. 444–449.

Springer

28 Wireless Netw (2008) 14: 17–28

Romano Fantacci, (M’87,SM’91, F’05) bornin Pistoia, Italy, graduated from the Engineer-ing School of the Università di Firenze, Flo-rence, Italy, with a degree in electronics in1982. He received his Ph.D. degree in telecom-munications in 1987. After joining the Dipar-timento di Elettronica e Telecomunicazioni asan assistant professor, he was appointed asso-ciate professor in 1991 and full professor in1999. His current research interests are digital

communications, computer communications, queuing theory, satellitecommunication systems, wireless broadband communication networks,ad-hoc and sensor networks. He has been involved in several Euro-pean Space Agency (ESA) and INTELSAT advanced research projects.He is the author of numerous articles published in prestigious com-munication science journals. He guest edited special issues in IEEEJournals and magazines and served as symposium chair of severalIEEE conferences, including VTC, ICC and Globecom. Professor Fan-tacci received the IEE IERE Benefactor premium in 1990 and IEEECOMSOC Award Distinguished Contributions to Satellite Communica-tions in 2002. He is currently serving as Editor for TelecommunicationSystems, IEEE Trans. Commun. and IEEE Transactions on WirelessCommunications.

Gianluca Vannuccini born in Florence, Italy,graduated in Electronics Engineering in 1999.He received his Ph.D. degree in Telematics andInformation Society in 2003 from the Elec-tronics and Telecommunications Departmentof the University of Florence. During 2002 hewas for six months in IBM Zurich ResearchLaboratory, Zurich, Switzerland, working ina research project on IEEE 802.11e perfor-mance evaluation. During the Ph.D. course,

he has published on several IEEE conferences and served as reviewerfor several journals on the telecommunications and telematics researcharea. He has been IEEE student member since 1999 and IEEE membersince 2004. He is now with the IT department of the Florence localgovernment organization, where he works as a program manager ondata quality and integration and e-government IT projects.

Gabriele Vestri was born in Florence (Italy)in November 1976. He received his degreein telecommunications from the Università diFirenze, Florence, Italy, in March 2002.He has been research scientist for CSO Oph-thalmic (Florence) since September 2002. Hiscurrent research interests include ophthalmicinstruments, contact lens design, image pro-cessing, the effects of optical aberrations andof retinal architecture of the eye on visual

performance.

Springer