Improving Throughput Performance of The IEEE 802.11 MAC Layer Using Congestion Control Methods
Improving Throughput Performance of The IEEE 802.11 MAC Layer Using Congestion Control Methods
Improving Throughput Performance of The IEEE 802.11 MAC Layer Using Congestion Control Methods
11 MAC Layer
Using Congestion Control Methods
Song Ci
CS Department
University of Michigan-Flint
Flint, MI48502
cisong@umich.edu
Guevara Noubir
College of CS
Northeastern University
Boston, MA02115
noubir@ccs.neu.edu
Hamid Sharif
CEEN Department
University of Nebraska-Lincoln
Omaha, NE68182
hsharif@unl.edu
Abstract
In this paper, we will present and analyze adaptive fragmentation algorithms for enhancing throughput performance under a slow fading channel. We will first study the similarities between the TCP
protocol and MAC protocol. Next, we will propose an adaptive approach to change the fragmentation
size dynamically according to variations of the wireless channel quality. Simulation results show that
the proposed algorithms can greatly improve the throughput performance of the IEEE 802.11 wireless
LAN.
Introduction
There is an increasing demand for QoS provisioning in the IEEE 802.11 wireless LAN. As in other wireless
networks, the IEEE 802.11 WLAN faces problems such as fading channel, interference, power efficiency,
and so forth. Additionally, the IEEE 802.11 network is more complex than other wireless data networks,
since it uses the random access mechanism and the half duplex channel. This makes its performance
more susceptible to be affected by retransmissions than other wireless data networks such as cellular
networks. In general, retransmissions in the IEEE 802.11 wireless LAN are caused by collisions and bit
errors. Collisions are caused by the characteristics of random backoff algorithm and other factors such
as hidden terminals; frame errors are caused by interference, fading, and noises in wireless channels.
Normally, collisions also appear as frame errors at the receiver end.
Unlike its wired counterpart, a wireless channel is error-prone and time-varying due to slow fading, fast
fading, path loss, shadowing, noise, interference, and so forth. This causes a very high frame error rate
at the receiver and results in a lot of retransmissions. As a consequence, the channel efficiency is severely
degraded [8, 5]. On the other hand, current wireless systems are generally designed to use fixed MAC
parameters such as frame size. This is obviously not efficient in terms of the channel utilization [4].
Even though some optional measures, such as data rate drafting and power control, have been mentioned
in the IEEE 802.11 standards [1], no further specification on these issues are defined.
Link adaptation techniques can improve the system performance of wireless LANs by changing the
protocol parameters, according to the channel quality and the network load. These techniques have
been studied in many research works. In [8, 7], the optimal frame size prediction in wireless networks
has been studied. In [8], there are two approaches proposed for obtaining the optimal frame size with
This paper was partially published on proceeding of the 16th ACM Symposium on Applied Computing, Las Vegas, NV,
2001.
the wireless ARQ protocol. In [7], the trade-off between the protocol overhead and the payload size
is studied by gathering physical measurements with the Lucent WAVELAN radio. Generally speaking,
the idea behind these works is to achieve maximum throughput by dynamically changing the frame size
according to variations in wireless channel quality. When the channel quality is good, a longer frame size
could be used; similarly, when the channel quality is bad, a shorter frame size is used to lower the number
of retransmissions. In [6], link adaptation under a Rayleigh fading channel is addressed on frame size,
equalizer, and power control.
In this paper, we will propose and analyze several adaptive fragmentation algorithms for enhancing
throughput performance under a slow fading channel. The paper is organized as follows. A comparison
of TCP protocol and MAC protocol is given in section 2. The proposed fragment adaptation algorithms
are presented in section 3. A simulation is described and the results are given and analyzed in section 4.
The TCP protocol is used to provide end-to-end error-free data transfer services. When transmitting
data of connection-oriented applications across connectionless networks such as the Internet, we cannot
detect whether or not congestions occur inside the network. Congestion is usually caused by unpredictable network load that may trigger buffer overflows in network nodes. As a consequence, packets are
discarded whenever a congestion occurs. The discarded packets will be retransmitted after the timeout
occurs at the sender. In the TCP protocol, all packet losses are assumed to be caused by congestions.
On the other hand, the MAC protocol defines a set of functionalities to decide when and how a station
can access and use the physical medium. In the MAC protocol, packet losses are assumed to result from
collisions that occur during transmissions.
The MAC protocol, in terms of resource allocation, is similar to the TCP protocol. In both protocols,
the primary concern is how to allocate the network resources efficiently. In the TCP protocol, end-to-end
congestion-control algorithms have been developed for improving the throughput performance, where the
congestion window size is used as a unit of resource allocation. Through dynamically changing congestion window sizes at the sender and the receiver, congestions will be controlled or avoided. In the MAC
protocol, the frame size can be used as the unit of resource allocation, since it is closely related to the
overall channel access time and channel fading rate.
In both the TCP protocol and MAC protocol, when a packet is not acknowledged successfully or is
discarded, a retransmission will be scheduled. Retransmissions are the main causes of poor throughput performance and channel utilization. Due to the end-to-end nature and coarse-scale timer used in
the TCP protocol, the cost of transport layer retransmissions is much higher than that of MAC layer
retransmissions. Note that even though the MAC ACK can shorten the delay overhead of retransmissions, it is still a main factor of performance degradation, especially in the wireless environment, where
retransmissions are mainly caused by frame errors rather than collisions.
In the IEEE 802.11 wireless LAN, its MAC protocol is much different from its wired counterpart such
as Ethernet. There is only one radio in a wireless LAN terminal, which can either transmit or receive
but cannot do both simultaneously. Therefore, unlike in Ethernet where collisions can be detected right
away after frames having been sent, it is very difficult to detect collisions occurring in a wireless LAN
in a timely manner. Moreover, the hidden station problem increases the number of collisions due to
impairments on channel sensing mechanisms and interferences [2]. Additionally, wireless channels are
Fragment 0
ACK 0
SIFS
...
DIFS
Fragment n
SIFS
ACK n
SIFS
PIFS
Backoff
SIFS
especially error-prone and bursty, often causing serious degradation in channel utilization. All of these
factors make the design of the wireless LAN MAC layer protocol difficult.
In the current IEEE 802.11 MAC protocol [1], Distributed Coordination Function (DCF) and Point
Coordination Function (PCF) are defined to provide a collision-free multiple access environment by
physical carrier sensing mechanism plus virtual carrier sensing mechanism. Several performance enhancement methods specific for the wireless LAN, such as MAC layer Acknowledgement (ACK), MAC
layer fragmentation, etc., are proposed in the current standard [1]. Essentially, all these measures focus
on improving link reliability and reducing the number of retransmissions.
The goal of the MAC layer fragmentation is to lower the frame error rate when interferences caused by
microwave ovens, Bluetooth terminals, and cordless phones occur. In general, the channel efficiency has
the following relation with the frame size
=
1
(1 Pb )L
(1)
here, L = l + h is the total size of a frame, l is the payload size of a frame, and h is the total overhead
that includes header size of a frame, acknowledgement and time of waiting an acknowledgement. P b is
the bit error rate under a given channel quality. Thus, the frame size should be determined in such a
way that it satisfies the specified frame error rate. This could be done by fragmenting a longer frame
into several shorter fragments when the channel quality is bad. This is illustrated in Figure 1.
Although fragmentation is useful to improve the channel throughput, there is no specification on how to
choose the fragmentation threshold in the current standard [1]. The drawback of fragmentation is that
it will increase the overall overhead. There is always a balance between the fragmentation overhead and
the throughput improvement. Based on exploring the similarities between the TCP protocol and the
MAC protocol, new adaptive fragmentation algorithms are proposed in a heuristic manner of studying
congestion control algorithms [4].
Input:
where and are the maximum backoff window sizes used by the increase and decrease procedures
respectively. n and m are the backoff slots used in time k + 1. Note that hereafter we use the time slot to
represent the transmission opportunity for simplicity. is the adaptive fragmentation threshold used by
the sender. In the above algorithm, the fragmentation threshold is increased or decreased exponentially
in a random manner [3].
Output:
if
else
k+1 = k 2;
if (k+1 > F RGmax )
k+1 = F RGmax ;
end-if
The algorithm 2 is designed by using the method behind the slow-start congestion-control algorithm that
is widely adopted in the TCP protocol [9]. If ACK is lost or timed out, the adaptive fragmentation
threshold will be decreased by half; in other words, in time k + 1, the threshold will be one-half of
the threshold in time k. Similarly, if ACK is received successfully, the fragmentation threshold will be
doubled in time k + 1. In this algorithm, the fragmentation threshold should be less than the maximum
frame size and larger than the minimum frame size.
Both the algorithm 1 and 2 adopt the exponential increase and decrease of the fragmentation threshold.
This may cause an overreaction due to the nature of exponential algorithm, especially when the channel
quality is changing slowly. In order to mitigate or to avoid this deficiency, we design the following
fragmentation adaptation algorithms.
In algorithm 3, the fragmentation threshold is decreased in a random exponential way; but increased
in an additive way. The algorithm 4 is designed by using an idea behind an improved version of slowstart algorithm [9]. In algorithm 4, a preset limit is specified to slow down the further increase of
fragmentation threshold beyond the limit.
where is the global optimal fragmentation threshold under a given network scenario. When the last
frame is acknowledged correctly, the fragmentation threshold will be increased exponentially until the
fragmentation threshold reaches a preset limit. After that, the fragmentation threshold will be increased
additively. In algorithm 5, the global optimal fragmentation threshold is always used for retransmissions
while the same increasing scheme as in algorithm 4 is adopted.
Output:
if
else
if(k < )
k+1 = k 2;
else
k+1 = k + ;
if (k+1 > F RGmax )
k+1 = F RGmax ;
end-if
65
70
75
80
85
90
95
500
1000
1500
Channel Measurement
2000
2500
3000
the fragment size 100 Bytes to 1500 Bytes with an increase step of 10 Bytes, and then we pick the one
that achieves the best throughput performance.
According to the simulation results, the optimal fragment size under the given frame size and given
network scenarios is 750 Bytes, which is one-half of the selected long frame size. This is because under
the given channel quality and network load, fragmenting a large frame just into two fragments results in
the lowest overhead, as illustrated in Figures 3, 4, 5 and 6.
We evaluate the average throughput performance of the proposed algorithms by using the algorithms
to transfer files with different file sizes. We run all simulations ten times and compute the mean and
confidence intervals of the average good throughput.
Result Analysis
We first evaluated the average good throughput performance by transferring a 100 KB file. Table 1
shows the comparison of throughput performance with different fixed fragmentation threshold, where the
noise floor (NF) is -85dB and the number of stations (M) is 5. In this case, the algorithm 5 achieves the
best throughput performance due to its constant decrease and slow-start increase procedure. Actually,
algorithm 1 can also achieve a better average throughput performance than the fixed fragment size
scheme or the non-fragment scheme. In addition, all proposed algorithms can achieve a higher average
good throughput than the fixed size scheme. But note that the lower bounds of other algorithms fail to
meet the lower bound of 95% confidence interval of the fixed fragment scheme, even though its average
performance is better than that of the fixed fragment scheme.
Table 2 is derived under a scenario in which NF=-85dB, M=20. In this case, algorithm 4 achieves
the best throughput performance. This is probably due to the fact that it has aggressive decrease and
slow-start increase procedure. The lower bound of algorithm 1 is smaller than the lower bound of 95%
confidence intervals of the fixed fragment scheme, even though its average performance is better than
that of the fixed fragment scheme.
Table 3 is derived for the case where NF=-95dB, M=5, and Table 4 is derived under the scenario with
3.5
x 10
2.5
1.5
0.5
200
400
600
800
1000
Fragment Size (Bytes)
1200
1400
2.5
x 10
1.5
0.5
200
400
600
800
1000
Fragment Size (Bytes)
1200
1400
x 10
4.5
3.5
2.5
1.5
0.5
200
400
600
800
1000
Fragment Size (Bytes)
1200
1400
3.5
x 10
2.5
1.5
0.5
200
400
600
800
1000
Fragment Size (Bytes)
1200
1400
Table 1: Comparison of Throughput Performance of Different Algorithms with NF=-85dB and M=5
Algorithm
Algorithm 1
Algorithm 2
Algorithm 3
Algorithm 4
Algorithm 5
Fixed fragment size
Non-fragment scheme
Table 2: Comparison of Throughput Performance of Different Algorithms with NF=-85dB and M=20
Algorithm
Algorithm 1
Algorithm 2
Algorithm 3
Algorithm 4
Algorithm 5
Fixed fragment size
Non-fragment scheme
Table 3: Comparison of Throughput Performance of Different Algorithms with NF=-95dB and M=5
Algorithm
Algorithm 1
Algorithm 2
Algorithm 3
Algorithm 4
Algorithm 5
Fixed fragment size
Non-fragment scheme
NF=-95dB, M=20. We can conclude that when the channel quality is good, all proposed algorithms
achieve a better performance than the fixed fragment size scheme. But we should note that when the
number of users increases, the performance of fragmentation gradually decreases in that collisions become
the main reason of retransmissions. Under this situation, continuing to use fragmentation will make the
network more crowded. For example, with NF=-95dB and M=20, the non-fragment scheme may perform
better than all the other fragment schemes.
Table 4: Comparison of Throughput Performance of Different Algorithms with NF=-95dB and M=20
Algorithm
Algorithm 1
Algorithm 2
Algorithm 3
Algorithm 4
Algorithm 5
Fixed fragment size
Non-fragment scheme
In general, from above analyses, we can conclude that by using the proposed algorithms, we can achieve
a much better throughput performance than what is achieved by the conventional fix fragment scheme.
But the proposed algorithms have a larger variance of average good throughput than the fixed fragment
algorithm. In addition, using the proposed algorithms to transfer a small file like a web page, the
maximum improvement on the average good throughput is 50%.
Recall that TCP congestion control algorithms are optimized to the TCPs coarse timer (500ms) and
end-to-end delay, we evaluate the performance of the proposed algorithms by running simulations, where
we use the algorithms to transfer a large file (1 MB).
Table 5 shows the comparison of throughput performance with different fixed fragmentation threshold,
Table 5: Comparison of Throughput Performance of Different Algorithms with NF=-85dB and M=5
Algorithm
Algorithm 1
Algorithm 2
Algorithm 3
Algorithm 4
Algorithm 5
Fixed fragment size
Non-fragment scheme
where the noise floor is -85dB and the number of stations is 5. Table 6 is derived for the case where
NF=-85dB, M=20; Table 7 is derived under the scenario with NF=-95dB, M=5; Table 8 is derived
under the scenario with NF=-95dB, M=20.
Table 5 and 6 show that by using the proposed algorithms, the throughput performance can be greatly
improved, especially when the channel quality is bad. In Table 5, the average good throughput can be
improved more than seven times by using the proposed algorithms. From this table, we can observe that
we can achieve a much better throughput performance than with the fixed fragment scheme. The overall
system overhead is greatly increased by using the fixed fragment size scheme due to a large number of
retransmissions. We can also conclude that in the given network scenario the adaptive fragment scheme
can achieve a better average throughput performance than the non-fragment scheme. We can get similar
Table 6: Comparison of Throughput Performance of Different Algorithms with NF=-85dB and M=20
Algorithm
Algorithm 1
Algorithm 2
Algorithm 3
Algorithm 4
Algorithm 5
Fixed fragment size
Non-fragment scheme
Table 7: Comparison of Throughput Performance of Different Algorithms with NF=-95dB and M=5
Algorithm
Algorithm 1
Algorithm 2
Algorithm 3
Algorithm 4
Algorithm 5
Fixed fragment size
Non-fragment scheme
Table 8: Comparison of Throughput Performance of Different Algorithms with NF=-95dB and M=20
Algorithm
Algorithm 1
Algorithm 2
Algorithm 3
Algorithm 4
Algorithm 5
Fixed fragment size
Non-fragment
90
80
70
60
50
40
30
Algorithm 1
Algorithm 2
Algorithm 3
Algorithm 4
Algorithm 5
20
10
0
4
5
6
7
File Size (Unit: 100 KB)
10
Figure 7: Throughput Performance with Different File Sizes with NF=-85dB (Normalized to the Max.
Throughput of Fixed Fragment Scheme)
3.5
2.5
2
Algorithm 1
Algorithm 2
Algorithm 3
Algorithm 4
Algorithm 5
1.5
10
Figure 8: Throughput Performance with Different File Sizes with NF=-95dB (Normalized to the Max.
Throughput of Fixed Fragment Scheme)
network load, using the proposed adaptive fragmentation algorithms can improve the good throughput
performance significantly, especially under an unfavorable channel quality. This improvement can be
attributed to the exploration of the similarities between the TCP protocol and MAC protocol in terms
of adaptivity.
However, we should note that the proposed algorithms cannot achieve the best throughput performance
under all network scenarios. This is because fragmentation will increase the overall system overhead, even
though it can enhance the reliability of transmissions. Moreover, the congestion control algorithms in the
TCP protocol are proposed and optimized for the characteristics of the TCP protocol; for example, TCP
congestion control algorithms have to accommodate factors such as end-to-end nature, the coarse timer,
and the assumption of having a reliable medium. Since TCP congestion control algorithms are optimized
for a coarse timer, the proposed adaptive fragmentation algorithms cannot keep track of variations in
channel quality in a timely manner. As a result, there is not too much margin on the throughput
improvement in some cases, especially with ftp or downloading a small file such as a web page.
Conclusion
In this work, we improved the throughput performance of the IEEE 802.11 wireless LAN with link
adaption algorithms at the MAC layer. We investigated the effect of adapting frame fragmentation sizes
to channel variations. We proposed and studied several adaptive fragmentation algorithms by exploring
the analogies between the TCP protocol and the MAC protocol. We have shown by simulating our
proposed algorithms greatly improved the good throughput.
References
[1] ANSI/IEEE Std 802.11. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY)
Specifications. http://www.ieee.org, 1999.
[2] H.S. Chhaya and S. Gupta. Performance Modeling of Asynchoronous Data Transfer Methods of
IEEE 802.11 MAC Protocol. Wireless Networks, 3:217234, 1997.
[3] S. Ci and H. Sharif. Adaptive approaches to enhance throughput of ieee 802.11 wireless lan with
bursty channel. The 25th Annual IEEE Conference on Local Area Network (LCN2000), 2001.
[4] S. Ci, H. Sharif, and G. Noubir. Improving Performance of MAC Layer by Using Congestion
Control/Avoidance Methods in Wireless Network. The 16th ACM Symposium on Applied Computing
(ACM SAC 2001), 2001.
[5] S. Ci, H. Sharif, and A. Young. A Link Adaptation Approach for QoS Enhancement in Wireless
Networks. The 26th Annual IEEE Conference on Local Area Network (LCN2001), 2001.
[6] C. Chien et al. Adaptive Radio for Multimedia Wireless Links. IEEE Journal on Selected Areas in
Communications, 17(5):793813, 1999.
[7] P. Lettieri and M.B. Srivastava. Adaptive Frame Length Control for Improving Wireless Link
Throughput, Range, and Energy Efficiency. IEEE INFOCOM 98, 2:56471, 1998.
[8] E. Modiano. An Adaptive Algorithm for Optimizing the Packet Size Used in Wireless ARQ Protocols. Wireless Networks, 5:279286, 1999.
[9] L.L. Perterson and B.S. Davie. Computer Network: A Systems Approach. Morgan Kaufmann
Pulishers Inc., 1996.
[10] N. VanErven, L. Sarsoza, and B. Yarbrough. Fading Channel vs. Frequency Band, Receiver Antenna
Height, Antenna Orientation in Office Environment. Technical Report of Radio System Engineering
Group of 3COM Corporation, 2001.