throbber
318
`
`IEEE COMMUNICATIONS LETTERS, VOL. 2, NO. 12, DECEMBER 1998
`
`IEEE 802.11—Saturation Throughput Analysis
`
`Giuseppe Bianchi
`
`Abstract—To satisfy the emerging need of wireless data commu-
`nications, IEEE is currently standardizing the 802.11 protocol for
`wireless local area networks. This standard adopts a CSMA/CA
`medium access control protocol with exponential backoff. In
`this letter, we present a simple analytical model to compute the
`saturation throughput performance in the presence of a finite
`number of terminals and in the assumption of ideal channel
`conditions. The model applies to both basic and RTS/CTS access
`mechanisms. Comparison with simulation results shows that the
`model is extremely accurate in predicting the system throughput.
`
`Index Terms— IEEE 802.11 protocol, multiple access control,
`performance evaluation.
`
`Fig. 1. Basic access mechanism.
`
`TO ACCESS the medium,
`
`I. INTRODUCTION
`IEEE 802.11 employs a
`CSMA/CA (carrier sense multiple access with collision
`avoidance) MAC protocol with binary exponential backoff,
`called distributed coordination function (DCF)
`[1]. DCF
`defines a basic access method, and an optional four-way
`handshaking technique, known as request-to-send/clear-to-
`send (RTS/CTS) method.
`This letter provides a simple but nevertheless very accurate
`analysis to compute the throughput of both basic and RTS/CTS
`access schemes, in the assumption of ideal channel (see [2] and
`[3] for approximate models that account for hidden terminals
`and capture). We focus on the saturation throughput, which is
`a fundamental performance figure defined as the limit reached
`by the system throughput as the offered load increases, and
`it represents the maximum load that the system can carry
`in stable conditions (as in most random access protocols, the
`maximum throughput may be greater than the saturation one,
`but it is of no practical importance as not sustainable for “long”
`time—see a general discussion about stability in [4]).
`
`II. DISTRIBUTED COORDINATION FUNCTION
`The DCF basic access method [1] is shortly summarized
`as follows. A station with a packet to transmit, monitors the
`channel activity until an idle period equal to a distributed
`interframe space (DIFS) is detected. The time immediately
`following an idle DIFS is slotted, and a station is allowed to
`transmit only at the beginning of each slot time, defined as
`the time needed at any station to detect the transmission of a
`packet from any other station. It accounts for the propagation
`delay, for the time needed to switch from the receiving to
`
`Manuscript received February 9, 1998. The associate editor coordinating
`the review of this letter and approving it for publication was Dr. K. Sriram.
`The author is with the Dipartimento di Elettronica e Informazione, Politec-
`nico di Milano, 20133 Milano, Italy (e-mail: bianchi@elet.polimi.it).
`Publisher Item Identifier S 1089-7798(98)09502-7.
`
`the transmitting state (RX TX Turnaround Time), and for the
`time to signal to the MAC layer the state of the channel (busy
`detect time).
`After sensing an idle DIFS, the station generates a random
`backoff interval before transmitting. The backoff time counter
`is decremented as long as the channel is sensed idle, stopped
`when a transmission is detected on the channel, and reactivated
`when the channel
`is sensed idle again for more than a
`DIFS (see Fig. 1). The station transmits when the backoff
`time reaches zero. At each transmission, the backoff time
`is uniformly chosen in the range
`. At the first
`transmission attempt,
`, namely the minimum backoff
`window. After each unsuccessful transmission,
`is doubled,
`up to a maximum value
`.
`Since the CSMA/CA does not rely on the capability of the
`stations to detect a collision by hearing their own transmission,
`a positive acknowledgment (ACK) is transmitted by the des-
`tination station to signal the successful packet transmission.
`To allow an immediate response,
`the ACK is transmitted
`following the received packet, after a short interframe space
`(SIFS). If the transmitting station does not receive the ACK
`within a specified ACK Timeout, or it detects the transmission
`of a different packet on the channel, it reschedules the packet
`transmission according to the previous backoff rules.
`The standard defines an additional mechanism of four-
`way handshaking to be optionally used in the case a packet
`exceeds a specified length, to improve the system throughput
`by shortening the duration of the collisions. This mechanism
`requires the transmission of special short request to send (RTS)
`and clear to send (CTS) frames prior to the transmission of
`the actual data frame. As shown in Fig. 2, an RTS frame is
`transmitted by a station which needs to transmit a packet.
`When the receiving station detects an RTS frame, it responds,
`after a SIFS, with a CTS frame. The transmitting station is
`thus allowed to transmit its packet only if it correctly receives
`the CTS frame. Moreover, the frames RTS and CTS carry
`1089–7798/98$10.00 ª
`
`1998 IEEE
`
`Ex. 1012 / Page 1 of 3
`ERICSSON v. UNILOC
`
`

`

`BIANCHI: IEEE 802.11—SATURATION THROUGHPUT ANALYSIS
`
`319
`
`Fig. 2. RTS/CTS access mechanism.
`
`the information of the length of the packet to be transmitted.
`This information can be read by each station, which is then
`able to update a network allocation vector (NAV) containing
`the information of the period of time in which the channel
`will remain busy. This latter technique has been introduced to
`combat the system degradation due to hidden terminals [5]. In
`fact, a station able to detect the transmission of at least one of
`the RTS or CTS frames, can avoid collision even when unable
`to sense the channel busy.
`
`III. THROUGHPUT ANALYSIS
`Consider a fixed number
`of contending stations. In satu-
`ration conditions, each station has immediately a packet avail-
`able for transmission, after the completion of each successful
`transmission. Let
`be the stochastic process representing
`the size of the backoff window for a given station at slot
`time
`(note that, as shown in Fig. 1, the time is stopped
`when the channel is sensed busy). Clearly, this process is
`non-Markovian. However, define for convenience
`,
`where
`is called “backoff stage,” and let
`be the
`stochastic process representing the backoff stage
`of the station at time .
`The key approximation in our model is that the probability
`that a transmitted packet collides is independent on the state
`of the station (this is more accurate as
`and
`are larger).
`In this condition, the bidimensional process
`is
`a discrete-time Markov chain, for convenience depicted in
`Fig. 3, with the only nonnull one-step transition probabilities
`being1
`
`Fig. 3. Markov chain model for the backoff window size.
`
`Owing to the chain regularities, the following relations hold:
`
`The value of
`condition
`
`is determined by imposing the normalization
`
`from which
`
`Let
`be the probability that a station transmits in a
`generic slot time. As any transmission occurs when the backoff
`window is equal to zero, regardless of the backoff stage, it is
`
`(1)
`
`These transition probabilities account, respectively, for: 1) the
`decrement of the backoff time counter; 2) the fact that a
`new packet following a successful transmission starts with
`a backoff stage 0; and 3), 4) the fact that after an unsuc-
`cessful transmission at backoff stage , the backoff interval is
`uniformly chosen in the range
`.
`Let
`
`,
`,
`be the stationary distribution of the chain.
`
`1 We adopt the short notation: P fi1; k1ji0; k0g = P fs(t + 1) = i1,
`b(t + 1) = k1js(t) = i0; b(t) = k0g.
`
`(2)
`
`To finally compute the probability
`that a transmitted
`packet collides, note that
`is the probability that, in a time
`slot, at least one of the
`remaining stations transmits
`
`(3)
`
`where
`is given in (2) as function of the only unknown .
`Numerically solving (3), the value of
`, and therefore, of
`,
`is found. Once
`is known, the probability
`that in a slot
`time there is at least one transmission, given
`active stations,
`
`Ex. 1012 / Page 2 of 3
`ERICSSON v. UNILOC
`
`

`

`320
`
`and the probability
`readily obtained as
`
`that a transmission is successful, are
`
`(4)
`
`(5)
`
`the r.v. representing the number of consecutive idle
`Being
`slots between two consecutive transmissions on the channel
`(see Fig. 1), it is
`
`(6)
`
`We are finally in the condition to determine the normalized
`system throughput
`, defined as the fraction of time the
`channel is used to successfully transmit payload bits. As the
`instants of time right after the end of a transmission are
`renewal points, it is sufficient to analyze a single renewal
`interval between two consecutive transmissions, and express
`as the ratio
`timeused for successful transm. in interval
`length of a renewal interval
`
`(7)
`
`is the average
`is the average packet length,
`where
`time the channel
`is sensed busy because of a successful
`transmission, and
`is the average time the channel is sensed
`busy by the stations during a collision. The times
`,
`and
`must be measured in slot times, as this is the time unit
`of
`.
`To conclude the analysis, it remains only to specify the
`values
`and
`. Let
`be the packet
`header, and
`be the propagation delay. For the basic access
`method it is (see Fig. 1):
`
`is the average length of the longest packet
`where
`payload involved in a collision2: in the case all packets have
`the same fixed size,
`.
`is the time in
`which the channel is sensed busy by the noncolliding stations:
`we have neglected the fact that the two or more colliding
`stations, before sensing the channel again, need to wait an
`additional SIFS plus an ACK timeout (the same approximation
`holds in the following RTS/CTS case, with a CTS timeout
`instead of the ACK timeout).
`For the RTS/CTS access method, assuming for simplicity of
`presentation that all the stations use the RTS/CTS mechanism
`for all
`the transmitted packets, regardless of the packet’s
`length, it is (see Fig. 2)
`
`2 When the probability of three of more packets simultaneously colliding is
`neglected, this is given by E[ max (P1; P2)], where Pi are independent and
`identically distributed r.v.s. To proceed further it is then necessary to assume
`a suitable pdf for the packet’s length.
`
`IEEE COMMUNICATIONS LETTERS, VOL. 2, NO. 12, DECEMBER 1998
`
`Fig. 4. Saturation throughput: Analysis versus simulation.
`
`IV. MODEL VALIDATION
`To validate the model, we have compared its results with
`that obtained with the 802.11 DCF simulator used in [6],
`which accounts for all the protocol details. The packet payload
`length has been chosen constant and equal
`to 8184 bits.
`The other protocol and channel parameters adopted are those
`specified for the FH (frequency hopping) PHY layer [1], and
`are reported in the following table (additional parameters are
`specified in [6]):
`
`packet payload
`MAC header
`PHY header
`ACK length
`RTS length
`CTS length
`Channel Bit Rate
`Propagation Delay
`SIFS
`Slot Time
`DIFS
`
`8184 bits
`272 bits
`128 bits
`112 bits + PHY header
`160 bits + PHY header
`112 bits + PHY header
`1 Mbit/s
`1 s
`28 s
`50 s
`128 s
`
`Fig. 4 shows that the analytical model is highly accurate: an-
`alytical results (lines) practically coincide with the simulation
`results (simbols), in both basic access and RTS/CTS cases. All
`simulation results are obtained with a 95% confidence interval
`lower than 0.002.
`
`REFERENCES
`
`[1] P802.11, “IEEE standard for wireless LAN medium access control
`(MAC) and physical layer (PHY) specifications,” Nov. 1997.
`[2] H. S. Chhaya and S. Gupta, “Performance modeling of asynchronous
`data transfer methods of IEEE 802.11 MAC protocol,” Wireless Net-
`works, vol. 3, pp. 217–234, 1997.
`[3] K. C. Huang and K. C. Chen, “Interference analysis of nonpersistent
`CSMA with hidden terminals in multicell wireless data networks,” in
`Proc. IEEE PIMRC’95, Toronto, Ont., Canada, Sept. 1995, pp. 907–911.
`[4] D. Bertsekas and R. Gallager, Data Networks. Englewood Cliffs. NJ:
`Prentice Hall, 1987.
`[5] L. Kleinrock and F. Tobagi, “Packet switching in radio channels: Part
`II—The hidden terminal problem in carrier sense multiple access and
`the busy tone solution,” IEEE Trans. Commun., vol. COM-23, pp.
`1417–1433, Dec. 1975.
`[6] G. Bianchi, L. Fratta, and M. Oliveri, “Performance evaluation and
`enhancement of the CSMA/CA MAC protocol for 802.11 wireless
`LAN’s,” in Proc. PIMRC 1996, Taipei, Taiwan, R.O.C., Oct. 1996, pp.
`392–396.
`
`Ex. 1012 / Page 3 of 3
`ERICSSON v. UNILOC
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket