6
Analysis of IEEE802.11 DCF Parameters on Achievable Throughput in Ad hoc Networks Ehsan Hamadani, Mostafa Mostafavi, Rahim Tafazolli Centre for Communication System Research University of Surrey Surrey, GU2 7XH, UK Emails: {e.hamadani, s.mostafavi,[email protected]} Veselin Rakocevic Information Engineering Research Centre City University London, EC1 0HB, UK Email: [email protected] Abstract—It is well-known that the values of IEEE 802.11 MAC parameters directly affect the utilization of the channel capacity and link layer throughput as well as higher layers performance. This paper first studies the throughput of ad hoc network under various 802.11 MAC parameters by developing a 3-dimensional Markov chain. Based on this model, it is mathematically proved that the current values of 802.11 parameters result in dramatic throughput degradation. Then, the optimum values of 802.11 parameters that lead to maximum 802.11 MAC throughput will be proposed. Index Terms—802.11 MAC, Contention Window, Markov Chain, Saturation Throughput I. I NTRODUCTION IEEE 802.11 [1] is the most widely used random medium access control in wireless ad hoc network which offers two different types of services: a contention-based service provided by the Distributed Coordination Function (DCF) and an optional contention-free service implemented by the Point Coordination Function (PCF). However, due to lack of infrastructure, DCF is the fundamental access method commonly used in ad hoc networks. As shown in previous studies, the performance of 802.11 DCF can largely affects the achievable throughput, delay, and scalability of the ad hoc network [2]–[4]. In addition, as shown in [5] and [6], the parameters of 802.11 can have a critical impact on upper layer performance such as TCP in ad hoc networks. Therefore, due to the complexity of ad hoc networks, it is extremely important to be able to understand and model the impact of such parameters across different layers. Since the introduction of the IEEE 802.11, there have been considerable work on the performance evaluation of the protocol in ad hoc networks and possible ways to enhance its performance especially from throughput point of view. In particular, one of the earliest analysis of the throughput of DCF was carried out in [7] using a simplified geometrically distributed backoff model. A more realistic model was proposed by Bianchi [8] where the evolution of the back-off stage at each node is described by a Markov process; The key importance of Bianchi model is to use a Markov chain to capture the effect of the contention window and binary slotted exponential back-off procedure used by DCF in 802.11. However, his model did not take into account the retry limits and the effect of timeout values in throughput calculation. Since then, many improvements to the initial Markov chain have been proposed to capture different aspects of the operation of 802.11 in ad hoc networks. For instance, the study in [9] further improved the model by considering the retry limit in Markov model. However, it still did not address the issue of multiple retry limits as specified in 802.11 standard. Finally, the work by [10] take into account the impact of hidden terminals in the analytical model. The main shortcoming of the previous studies is the lack of comprehensive and accurate analysis of the impact of different 802.11 MAC parameters (e.g. maximum short and long retry limits, and minimum contention window) on the achievable link layer throughput. In order to investigate the impact of different 802.11 parameters on the performance of 802.11 MAC, this paper extends the Bianchi two dimensional model into a three dimensional model. By using the extended model, we show that for a given number of contending stations, there exists an optimal value of parameters at which 802.11 achieves the highest throughput. However, the current version of 802.11 parameters do not operate around this optimum values and therefore causes serious throughput degradation. The rest of the paper is organized as follows. We first briefly explain the operation of 802.11 DCF in section II. Section III presents the details of the proposed model, including assumptions and model components. The analytical throughput of the 802.11 and the impact of different 802.11 parameters on link layer throughput is investigated in section IV. Section V then proposes the optimized values of 802.11 parameters for which throughput is maximum. Finally Section VI concludes the paper and sets future directions in this area. II. IEEE802.11 DCF SCHEME IEEE 802.11 Distributed Coordination Function (DCF) [1] provides the basic access method of the 802.11 MAC using the CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) scheme to access the channel. To transmit a packet in DCF, there are two techniques used; a two-way handshaking mechanism, also known as basic access method where a positive MAC acknowledgement(referred as MACK hereafter) is transmitted by the destination station to confirm the suc- cessful packet transmission. The other method is a four-way handshaking mechanism, which uses request-to-send/clear-to- send (RTS/CTS) technique to reserve the channel before data transmission. In both techniques, each station willing to send 978-1-4244-2515-0/09/$25.00 ©2009 IEEE

[IEEE 2009 IEEE Vehicular Technology Conference (VTC 2009-Fall) - Anchorage, AK, USA (2009.09.20-2009.09.23)] 2009 IEEE 70th Vehicular Technology Conference Fall - Analysis of IEEE802.11

  • Upload
    veselin

  • View
    212

  • Download
    0

Embed Size (px)

Citation preview

Page 1: [IEEE 2009 IEEE Vehicular Technology Conference (VTC 2009-Fall) - Anchorage, AK, USA (2009.09.20-2009.09.23)] 2009 IEEE 70th Vehicular Technology Conference Fall - Analysis of IEEE802.11

Analysis of IEEE802.11 DCF Parameters onAchievable Throughput in Ad hoc Networks

Ehsan Hamadani, Mostafa Mostafavi, Rahim TafazolliCentre for Communication System ResearchUniversity of Surrey Surrey, GU2 7XH, UK

Emails: {e.hamadani, s.mostafavi,[email protected]}

Veselin RakocevicInformation Engineering Research CentreCity University London, EC1 0HB, UK

Email: [email protected]

Abstract—It is well-known that the values of IEEE 802.11 MACparameters directly affect the utilization of the channel capacityand link layer throughput as well as higher layers performance.This paper first studies the throughput of ad hoc network undervarious 802.11 MAC parameters by developing a 3-dimensionalMarkov chain. Based on this model, it is mathematically provedthat the current values of 802.11 parameters result in dramaticthroughput degradation. Then, the optimum values of 802.11parameters that lead to maximum 802.11 MAC throughput willbe proposed.

Index Terms—802.11 MAC, Contention Window, MarkovChain, Saturation Throughput

I. INTRODUCTION

IEEE 802.11 [1] is the most widely used random mediumaccess control in wireless ad hoc network which offerstwo different types of services: a contention-based serviceprovided by the Distributed Coordination Function (DCF)and an optional contention-free service implemented by thePoint Coordination Function (PCF). However, due to lackof infrastructure, DCF is the fundamental access methodcommonly used in ad hoc networks. As shown in previousstudies, the performance of 802.11 DCF can largely affectsthe achievable throughput, delay, and scalability of the adhoc network [2]–[4]. In addition, as shown in [5] and [6],the parameters of 802.11 can have a critical impact on upperlayer performance such as TCP in ad hoc networks. Therefore,due to the complexity of ad hoc networks, it is extremelyimportant to be able to understand and model the impact ofsuch parameters across different layers. Since the introductionof the IEEE 802.11, there have been considerable work on theperformance evaluation of the protocol in ad hoc networksand possible ways to enhance its performance especially fromthroughput point of view. In particular, one of the earliestanalysis of the throughput of DCF was carried out in [7]using a simplified geometrically distributed backoff model. Amore realistic model was proposed by Bianchi [8] where theevolution of the back-off stage at each node is described by aMarkov process; The key importance of Bianchi model is touse a Markov chain to capture the effect of the contentionwindow and binary slotted exponential back-off procedureused by DCF in 802.11. However, his model did not takeinto account the retry limits and the effect of timeout valuesin throughput calculation. Since then, many improvements

to the initial Markov chain have been proposed to capturedifferent aspects of the operation of 802.11 in ad hoc networks.For instance, the study in [9] further improved the modelby considering the retry limit in Markov model. However,it still did not address the issue of multiple retry limits asspecified in 802.11 standard. Finally, the work by [10] take intoaccount the impact of hidden terminals in the analytical model.The main shortcoming of the previous studies is the lack ofcomprehensive and accurate analysis of the impact of different802.11 MAC parameters (e.g. maximum short and long retrylimits, and minimum contention window) on the achievablelink layer throughput. In order to investigate the impact ofdifferent 802.11 parameters on the performance of 802.11MAC, this paper extends the Bianchi two dimensional modelinto a three dimensional model. By using the extended model,we show that for a given number of contending stations, thereexists an optimal value of parameters at which 802.11 achievesthe highest throughput. However, the current version of 802.11parameters do not operate around this optimum values andtherefore causes serious throughput degradation.The rest of the paper is organized as follows. We first brieflyexplain the operation of 802.11 DCF in section II. SectionIII presents the details of the proposed model, includingassumptions and model components. The analytical throughputof the 802.11 and the impact of different 802.11 parameters onlink layer throughput is investigated in section IV. Section Vthen proposes the optimized values of 802.11 parameters forwhich throughput is maximum. Finally Section VI concludesthe paper and sets future directions in this area.

II. IEEE802.11 DCF SCHEME

IEEE 802.11 Distributed Coordination Function (DCF) [1]provides the basic access method of the 802.11 MAC usingthe CSMA/CA (Carrier Sense Multiple Access with CollisionAvoidance) scheme to access the channel. To transmit a packetin DCF, there are two techniques used; a two-way handshakingmechanism, also known as basic access method where apositive MAC acknowledgement(referred as MACK hereafter)is transmitted by the destination station to confirm the suc-cessful packet transmission. The other method is a four-wayhandshaking mechanism, which uses request-to-send/clear-to-send (RTS/CTS) technique to reserve the channel before datatransmission. In both techniques, each station willing to send

978-1-4244-2515-0/09/$25.00 ©2009 IEEE

Page 2: [IEEE 2009 IEEE Vehicular Technology Conference (VTC 2009-Fall) - Anchorage, AK, USA (2009.09.20-2009.09.23)] 2009 IEEE 70th Vehicular Technology Conference Fall - Analysis of IEEE802.11

a packet, generates a random backoff period according toequation 1 as its deferral time before transmitting, unlessthe backoff timer already contains a nonzero value, in whichcase the selection of a random number is not needed and notperformed.

BackoffT ime = Random() ∗ SlotT ime (1)

Here Random() is a random integer number of time slotsdrawn from a uniform distribution over the interval [0,CW ]and CW (Contention Window) is an integer number withinthe range of CWmin and CWmax. After choosing a backofftimer, if no medium activity is indicated, the backoff timer isdecremented by one slot-time. If the medium is determinedto be busy at any time during the backoff process, then thebackoff timer is suspended. This process is repeated until thetime the backoff counter reaches zero where the packet wouldbe transmitted.

At the receiver side (next hop), if the packet is receivedwithout error, the receiver issues a MACK packet, confirmingthe receipt of the packet. If the MACK (or CTS when we havesent RTS) is not received at the sender within the ACKTimeout

(CTSTimeout), the frame is presumed to have been lost andthe emitter schedules a frame retransmission1. This processcontinues until the transmission is successful, or until the Max-Retry-Limit is reached, whichever occurs first. There are twoMax-Retry-Limit defined in 802.11:

• Short-Retry-Limit (S)• Long-Retry-Limit (L)

The short retry counter is incremented whenever a con-trol frame or a short packet frame (i.e. smaller than RTS-Threshold) is retransmitted. Similarly, long retry counter isincremented whenever a long packet frame (i.e. larger thanRTS-Threshold) is retransmitted. Retries for failed transmis-sion attempts will continue until the short retry counter isequal to S or until the long retry counter is equal to L. Wheneither of these limits is reached, the higher layer data packetis discarded from the sender MAC buffer and the CW will bereset to CWmin.

III. ANALYTICAL MODEL

A. Model Assumptions

In order to analyze the protocol, the following assumptionsare made:

• The network consists of finite number of n contendingstations where all stations can hear each other.

• Every station always has a packet to transmit after thecompletion of each successful transmission. In otherwords, the system works in throughput saturation thatdefined as the limit reached by the system throughput asthe offered load increases.

• The probability of a packet collision is constant andindependent of the number of retransmissions attemptson this frame.

1After each retransmission, the value of CW is doubled until it reachesCWmax

B. Model Components

To describe the behaviour of 802.11, let us first denote thestate space F as:

F = {(i, j, k) : 0 ≤ i ≤ L, 0 ≤ j ≤ B ≤ S, k ≥ 0} (2)

where i is the current number of long retries, j is the currentnumber of backoff stage, and k is the current backoff countervalue which can take any value from 0 to Wj , where

Wj ={

W0 ∗ 2j j ≤ BW0 ∗ 2B j > B (3)

Also, in our space, L is the maximum number of long retrylimits, S is the maximum number of short retry limits and Bis the maximum number of backoff stages in the IEEE 802.11protocol 2. Figure 1 depicts in more details the states of thefirst plane (i=0) in the proposed Markov chain.

Fig. 1. Markov chain showing the state of a node in plane i=0

It is important to note that one of the main features ofthe model presented in Figure 1 which has been mostlyignored previously, is the distinction made between packetsthat require RTS/CTS exchange prior to their transmissionand other packets (including 802.11 control packets) in statetransitions. We believe such distinction should be accommo-dated in the model since the probability of packet transmissionand collision for packets that do not use RTS/CTS is clearlydifferent from packets that perform channel reservation priorto their transmission. To this aim, in Figure 1 if a controlpacket or DATA packets smaller then RTS-Threshold collides,the new state is chosen from the next row of the current plane(i.e. a transition along y axis). However, if a DATA packet

2In default operation of 802.11, we have L=4, S=7, and B=5

Page 3: [IEEE 2009 IEEE Vehicular Technology Conference (VTC 2009-Fall) - Anchorage, AK, USA (2009.09.20-2009.09.23)] 2009 IEEE 70th Vehicular Technology Conference Fall - Analysis of IEEE802.11

larger than RTS-Threshold is dropped, the new state is chosenfrom the next row of the next plane (i.e. a transition along zaxis). In other words, if a collision results to an increase in thenumber of short retries, the new state is chosen in the sameplane. However, if the packet drop results in the increase inthe number of long retries, a new state is picked up from thenext plane. The rules of these transitions will be covered inmore details later in this section.3

Let now bi,j,k be the stationary distribution of the Markovchain stochastic process for a given station. As it can be seenin Figure 1, with the total probability of PRTS

col , the stationchooses a new backoff counter from the next row. However,in case of successful RTS/CTS transmission, if the stationsuccessfully transmits its DATA packet with the probability ofPData

suc the chain is reset to initial stage; alternatively if with theprobability of PData

col the DATA packet is dropped, the stationchooses its new backoff value from the plane i = 1 and theprocess continues. In addition, according to equation (3), thenumber of backoff states (Wj) will not increase after a stationreaches stage B (maximum backoff stages) and remains fixed.The state transition diagram shown in figure 1 is governedby transition probabilities given in equations 4 and 5. Also,along with each transition probability, its transition durationis specified to enable us to calculate the average time that astation stays in one state.

• The backoff counter decrements and the station makes atransition from state (i,j,k) to state (i,j,k-1):{

P{(i, j, k − 1)|(i, j, k)} = 1t{(i, j, k − 1)|(i, j, k)} = σ

(4)

where σ represents the system time slot.• The station sends a RTS packet in state (i,j,0), but its RTS

packet collides and the station reaches state (i,j+1,k).{P{(i, j + 1, k)|(i, j, 0)} = P RT S

col

Wj+1

t{(i, j + 1, k)|(i, j, 0)} = TRTScol

(5)

where PRTScol and TRTS

col refer to the probability and averagetime of RTS collision, respectively.

Although the structure of the other planes are similar toFigure 1, it is important to note that different planes donot share exactly the same characteristics. For instance, theminimum value of the current number of backoff stage (j) inplanes i ≥ 1 is greater than or equal to 1 since when thestation is in plane i �= 0, it means there has been minimumone unsuccessful transmission exactly prior to the transition,so J ≥ 1. (Figure 2)

The state transition diagram between different planes inFigure 2 is governed by transition probabilities and durationsgiven below in equations 6 and 7:

• The station sends a RTS/CTS packet successfully in state(i,j,0), but the actual DATA is dropped (due to channel

3For simplicity and sake of argument, in the rest of this study we assume theRTS/CTS exchange is performed for all higher layer data packets and refer tosuch packets as DATA packet to distinguish them from 802.11 control packets.

Fig. 2. The key states of the Markov chain plane’s transition

error, hidden terminal, etc.) and the station reaches state(i+1,j+1,k).

{P{(i + 1, j + 1, k)|(i, j, 0)} = P RT S

suc ∗P Datacol

Wj+1

t{(i + 1, j + 1, k)|(i, j, 0)} = TDatacol

(6)

here PRTSsuc and PData

col are the probability of RTS successand DATA packet collision, respectively. Also, TData

col

refers to the average time the channel is occupied whena DATA packet collision occurs.

• The station sends a Data packet (following a successfulRTS/CTS exchange) successfully in state (i,j,0), andtherefore reaches state (0,0,k).

{P{(0, 0, k)|(i, j, 0)} = P RT S

suc ∗P Datasuc

Wj+1

t{(0, 0, k)|(i, j, 0)} = TDatasuc

(7)

where PDatasuc and TData

suc refer to the probability andaverage time of DATA success event.

Since the chain is regular, for each k ∈ (0,Wj − 1) we havethe following relations:

bi,j,k = bi,j,0 ∗ Wj − k

Wj

b0,j,0 = b0,0,0 ∗ (PRTScoll )j for(i = 0, 0 ≤ j ≤ S − 1)

bi,j,0 = bi,1,0 ∗ (PRTScoll )j−1 for(i �= 0, 1 ≤ j ≤ S)

bi,1,0 = b0,0,0 ∗ [PRTSsuc ∗ PData

col )]i for(i �= 0) (8)

Using the set of equations in (8) and the normalizationcondition, we get:

Page 4: [IEEE 2009 IEEE Vehicular Technology Conference (VTC 2009-Fall) - Anchorage, AK, USA (2009.09.20-2009.09.23)] 2009 IEEE 70th Vehicular Technology Conference Fall - Analysis of IEEE802.11

1 =L∑

i=0

S∑j=0

WJ−1∑k=0

bi,j,k =S−1∑j=0

WJ−1∑k=0

(b0,j,0 ∗ Wj−kWj

)+

L∑i=1

S∑j=1

WJ−1∑k=0

(bi,j,0 ∗ Wj−kWj

) =

b0,0,0

⎡⎢⎢⎢⎣

S−1∑j=0

((PRTS

col )j ∗ Wj+12

)+

L∑i=1

S∑j=1

( [(1 − PRTS

col

) (PData

col

)] i [PRTS

col

]j−1

∗(Wj+12 )

)⎤⎥⎥⎥⎦

(9)

Although in the above equation, b0,0,0 dependson both PData

col and PRTScol , the value of PData

col canstatistically be estimated by each station. This isbecause PData

col =1-[P (Data success)|P (RTS success)]and [P (Data success)|P (RTS success)] can be estimatedby each station since each station may keep track oftwo parameters: (1) The number of occasions that it hastransmitted a DATA packet (after a successful RTS/CTSreservation) and has received a MACK for that packet; and(2) the total number of transmitted DATA packets. Basedon the above values, the node at each time can statisticallycalculate the probability of

(PData

suc |PRTSsuc

)as the ratio of

the first to second parameter. Therefore, this implies thatin equation (9), b0,0,0 only depends on the value of PRTS

col

which can be calculated as follow:

PRTScol = 1 − (1 − τ)n−1 (10)

where τ is the probability of RTS transmission from a givennode in a randomly chosen slot time. On the other hand, sinceRTS transmission occurs when the backoff counter reaches 0,we have:

τ =L∑

i=0

S∑j=0

bi,j,0 =S−1∑j=0

b0,j,0 +L∑

i=1

S∑j=1

bi,j,0 =

b0,0,0

⎡⎢⎢⎣

1−(P RT Scol )S

1−P RT Scol

+L∑

i=1

S∑j=1

([(1 − PRTS

col

) (PData

col

)] i [PRTS

col

]j−1)⎤⎥⎥⎦

(11)

Therefore, equations (9), (10), and (11) represent a nonlinearsystem with two unknowns τ and PRTS

col which can beobtained by numerical results in terms of different n andPData

col . Table I presents the value of τ and its correspondingPRTS

col for different number of n and PDatacol .

IV. IMPACT OF 802.11 PARAMETERS ON THROUGHPUT

In this section, we investigate the impact of different 802.11parameters on the achieved throughput. To this aim, let T bethe normalized saturated throughput, defined as the fractionof time the channel is used to successfully transmit DATA

TABLE Iτ AND ITS CORRESPONDING P RTS

col UNDER DIFFERENT n AND P Datacol

PDatacol = 0.001 PData

col = 0.01

n = 5 P RTScol = 0.0306 P RTS

col = 0.0301τ = 0.0587 τ = 0.0582

n = 10 P RTScol = 0.0987 P RTS

col = 0.0976τ = 0.0541 τ = 0.0537

n = 20 P RTScol = 0.2197 P RTS

col = 0.2184τ = 0.0441 τ = 0.0439

n = 40 P RTScol = 0.3531 P RTS

col = 0.3522τ = 0.0310 τ = 0.0309

payload.4. Assuming the average DATA payload size as E[P],the average amount of DATA payload information successfullytransmitted in a slot time is PData

tr PDatasuc E[P ]. On the other

hand, the average length of a slot time can be obtained byconsidering that a single slot time falls in one of the followingfour cases:

1) With probability P1 =(1 − (PRTS

suc + PRTScol )

), the slot

time is empty2) With probability P2 =

(PData

tr PDatasuc

)the time slot

contains a unsuccessful DATA transmission3) With probability P3 =

(PRTS

col

)the time slot contains a

unsuccessful RTS transmission4) With probability P4 =

(PData

tr PDatacol

)the time slot

contains a successful DATA transmission

Therefore, the normalized throughput can be written as:

T =PData

tr PDatasuc E[P ]

P1σ + P2TDatasuc + P3TRTS

col + P4TDatacol

(12)

or alternatively,

T =E[P ]⎛

⎝(

1−(P RT Ssuc +P RT S

col)

P RT Ssuc

)+

(P RT S

col

P RT Ssuc

∗T RT Scol

σ

)+

(P Data

col∗T Data

colσ

)P Data

suc

⎞⎠+ TData

suc

(13)Note that in the above equation, the terms PData

suc and PDatacol

indeed refer to [P (Data success)|P (RTS success)] and[P (Data collision)|P (RTS success)], respectively which asexplained earlier can be statistically computed by each node.In addition, we have:

PDatatr = PRTS

Suc = nτ(1 − τ)n−1 (14)

Finally, the corresponding values of transition times can becalculated as follows:

TDatasuc = DIFS + Trts + Tcts + H + E[P ] + Tack + 2SIFS + 3δ

TRTScol = DIFS + Trts + SIFS + Tcts_timeout

TDatacol = DIFS + Trts + δ + Tcts + 2SIFS + Tack_timeout

(15)

4As explained earlier, in this paper DATA payload refers to upper layerpackets and does not include the control packets in link layer in contrary to[8] throughput model

Page 5: [IEEE 2009 IEEE Vehicular Technology Conference (VTC 2009-Fall) - Anchorage, AK, USA (2009.09.20-2009.09.23)] 2009 IEEE 70th Vehicular Technology Conference Fall - Analysis of IEEE802.11

Here, Trts, Tcts, and Tack represent the time required totransmit RTS, CTS, and MACK over the channel, respectively.Also, Tcts_timeout (or Tack_timeout) refer to time intervalsbefore a station assumes its RTS transmission (or Datatransmission) has been unsuccessful and triggers a packetretransmission. In addition, H = PHYhdr + MAChdr is thepacket header size and δ is the propagation delay.

It is important to note that based on equations (10),(13), and(14), τ is the only configurable parameter that affects the MACthroughput. Therefore, the issue of investigating the impact of802.11 parameters on throughput can be directly translatedinto analyzing the impact of 802.11 parameters on the valueof τ . Figure 3 depicts the impact of changing different MACparameters on τ under various number of stations and PData

col

by using equation (11) and the system parameters given inTable II5.

Table II: System parameters for MAC and DSSS PHY LayerPacket payload 11680 bits

MAC header 224 bits

PHY header 192 bits

ACK 112 bits + PHY header

RTS 160 bits + PHY header

CTS 112 bits + PHY header

Channel bit rate 2Mbps

Propagation delay 1 μs

Slot time 20 μs

CTST imeout 300 μs

MACKT imeout 300 μs

SIFS 10 μs

DIFS 50 μs

From the above results it is obvious that the value of τis highly sensitive to change of W0 while the number oflong retry limits almost has no impact on τ . Meanwhile, forS>5, the value of τ remains almost constant regardless of thechange in maximum number of short retry limits. Therefore,the main parameter that has a major impact on the 802.11MAC throughput is the size of minimum contention window.

V. THROUGHPUT OPTIMIZATION

Having investigated the impact of different 802.11 param-eters on throughput, the next interesting issue is to find theoptimum value of 802.11 parameters (or equivalently theoptimum τ ) that result in maximum throughput 6. To this aim,we take the derivative of equation (13) with respect to τ andimpose it equal to 0. After some simplifications, the followingequation is obtained:(

(1 − τ) +T ∗RTS

col

(1 − τ)n−1− T ∗RTS

col (1 + nτ − τ))

+

τ

(1 − T ∗RTS

col

(n − 1

(1 − τ)n− (n − 1)

))= 0

(16)

where T ∗RTScol = TRTS

col /σ.

5The system values used in this paper are those specified for the DSSS(Direct Sequence Spread Spectrum) physical layer

6Since the results from figure 3 and table I suggest that the dependency ofτ on P Data

col is very marginal and almost negligible, in the rest of this paperand without the loss of generality we assume P Data

col =0.001 .

0 2 4 6 8 10 12 14 16 18 200.03

0.035

0.04

0.045

0.05

0.055

0.06

Maximum Number of Short Retry Limits (S)

τ

n=5, P(data collision)=0.001n=5, P(data collision)=0.1n=20, P(data collision)=0.001n=20, P(data collision)=0.1n=40, P(data collision)=0.001n=40, P(data collision)=0.1

(a) Impact of maximum short retry limits on τ

0 2 4 6 8 10 12 14 16 18 200.03

0.035

0.04

0.045

0.05

0.055

0.06

Maximum Number of Long Retry Limits (L)

τ

n=5, P(Data collision)=0.001n=5, P(Data collision)=0.1n=20, P(Data collision)=0.001n=20, P(Data collision)=0.1n=40, P(Data collision)=0.001n=40, P(Data collision)=0.1

(b) Impact of maximum long retry limits on τ

0 50 100 150 200 250 300 350 4000

0.02

0.04

0.06

0.08

0.1

0.12

0.14

0.16

Minimum Contention Window (slots)

τn=5, P(data collision)=0.001n=5, P(data collision)=0.1n=20, P(data collision)=0.001n=20, P(data collision)=0.1n=40, P(data collision)=0.001n=40, P(data collision)=0.1

(c) Impact of minimum contention window size on τ

Fig. 3. The impact of changing different MAC parameters on τ

Equation 16 shows that the optimum τ at which maximumthroughput occurs is solely dependent on number of con-tending stations (n). Based on this result, Table IV presentsthe default values of τ (based on current values of 802.11parameters) as well as the optimum τ (at which the throughputis maximum) for different number of n.

Table IV: Default and Optimum τ for different number of contendingstations

Number of Stations Default τ Optimum τn=5 τdef = 0.0587 τopt = 0.0480n=10 τdef = 0.0541 τopt = 0.0229n=20 τdef = 0.0441 τopt = 0.0112n=40 τdef = 0.0310 τopt = 0.0055

Comparing the default values of τ (τdef ) and the optimumτ (τopt), it is obvious the default values of 802.11 parameterstend to overshoot the optimum τ in which the maximumthroughput is achieved. In order to understand the importanceof this observation, figure 4 shows the relation between MACthroughput and the parameter τ .

Page 6: [IEEE 2009 IEEE Vehicular Technology Conference (VTC 2009-Fall) - Anchorage, AK, USA (2009.09.20-2009.09.23)] 2009 IEEE 70th Vehicular Technology Conference Fall - Analysis of IEEE802.11

0 0.02 0.04 0.06 0.08 0.1 0.12 0.14 0.16 0.18 0.20

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

τ

Sa

tura

tio

n T

hro

ug

hp

ut

n=5

n=10

n=20

n=40

Maximum Throughput for n=5

Maximum Throughput for n=10

Maximum Throughput for n=20

Maximum Throughput for n=40

Fig. 4. 802.11 saturated throughput versus τ

It is clear from the above figure that as the number of nodesincreases, it becomes increasingly important for the networkto operate very closely to τopt (shown by different symbols infigure 4) as even a slight deviation in the value of τopt canseverely degrade the system throughput.

In order to tune the τdef to τopt, let us recall from figure3 that τ is mainly dependent on minimum contention windowsize (i.e W0). Therefore, the issue of tuning the default τ tooptimum τ can be merely done by adjusting the value of W0.Using equation (11) and (16), figure 5 depicts the values of W0

for different number of n for which τdef = τopt and thereforethe acheived throughput of 802.11 will be maximum.

0 10 20 30 40 500

50

100

150

200

250

300

350

400

Number of Stations

Con

tent

ion

Win

dow

siz

e (s

lots

)

Fig. 5. Optimum value of W0 for different number of stations

The above result suggest that by merely setting the parame-ter W0 according to values in figure 5, the 802.11 will achieveits highest throughput. Nevertheless, it is very important tonote that though the above results suggest the negligible impactof T and L on 802.11 throughput, their values can dramaticallychange the TCP performance. Interested readers are referredto [11] for further discussion on the impact of such parameterson TCP performance.

VI. CONCLUSION

In this paper, we proposed a 3-d Markov chain to accuratelymodel the performance of 802.11 when RTS/CTS mechanismis used. Based on the model, the impact of different 802.11parameters on achievable throughput was investigated and itwas shown that the current values of 802.11 may result in adramatic throughput degradation. It was also shown that thevalue of 802.11 minimum contention window size is the mainconfigurable parameter that needs to be adjusted to maximizethe MAC throughput. The model can be further refined byconsidering unsaturated traffic condition. In addition, the im-pact of 802.11 parameters on other performance metrics suchas service time burstiness can be further studied.

REFERENCES

[1] “IEEE Standards for Wireless LAN Medium Access Control (MAC)and Physical Layer (PHY),Part 11:Technical Specifications,” Tech. Rep.,1999.

[2] O. Tickoo and B. Sikdar, “Queueing analysis and delay mitigation inIEEE 802.11 random access MAC based wireless networks,” Proceed-ings - IEEE INFOCOM, vol. 2, pp. 1404 – 1413, 2004.

[3] M. M. Carvalho and J. J. Garcia-Luna-Aceves, “Delay Analysis of IEEE802.11 in Single-Hop Networks,” 11th IEEE International Conferenceon Network Protocols, 2003.

[4] Y. Barowski, S. Biaz, and P. Agrawal, “Towards the performanceanalysis of IEEE 802.11 in multi-hop ad-hoc networks,” IEEE WirelessCommunications and Networking Conference, WCNC, vol. 1, pp. 100 –106, 2005.

[5] R. Jiang, V. Gupta, and C. V. Ravishankar, “Interactions between TCPand the IEEE 802.11 MAC protocol,” DARPA Information SurvivabilityConference and Exposition, 2003. Proceedings, vol. 1, pp. 273–282,2003.

[6] E. Hamadani and V. Rakocevic, “Evaluating and Improving TCP Per-formance against Contention Losses in Multihop Ad Hoc Networks,”IFIP International Conference on Mobile and Wireless CommunicationNetworks, 2005. Proceedings, vol. 1, 2005.

[7] F. Cali, M. Conti, and E. Gregori, “IEEE 802.11 wireless LAN: capacityanalysis and protocol enhancement,” Proceedings - IEEE INFOCOM,vol. 1, pp. 142 – 149, 1998.

[8] G. Bianchi, “Performance analysis of the IEEE 802.11 distributed coor-dination function,” IEEE Journal on Selected Areas in Communications,vol. 18, no. 3, pp. 535 – 547, 2000.

[9] H. Wu, Y. Peng, K. Long, S. Cheng, and J. Ma, “Performance ofreliable transport protocol over IEEE 802.11 wireless LAN: Analysisand enhancement,” Proceedings - IEEE INFOCOM, vol. 2, pp. 599 –607, 2002.

[10] J. He, D. Kaleshi, A. Munro, Y. Wang, A. Doufexi, J. McGeehan, andZ. Fan, “Performance investigation of IEEE 802.11 MAC in multihopwireless networks,” ACM MSWiM 2005 - Proceedings of the EighthACM Symposium on Modeling, Analysis and Simulation of Wireless andMobile Systems, vol. 2006, pp. 242 – 249, 2006.

[11] Y. Wang, K. Yu, Y. Liu, and H. Zhang, “Effects of MAC retransmissionon TCP performance in IEEE 802.11-based Ad-hoc networks,” IEEEVehicular Technology Conference, vol. 59, no. 4, pp. 2205 – 2209, 2004.