A New Approach for Accurate Modelling of Medium Access Control (MAC) Protocols Presenter: Moshe Zukerman ARC Centre for Ultra Broadband Information Networks EEE Dept., The University of Melbourne Presented at EE Dept., City University of Hong Kong, 11 April, 2002 Credit: Chuan Foh (EEE, Melbourne) OUTLINE 1. 2. 3. 4. 5. The big picture Classical performance models Ethernet IEEE 802.3 How can we get performance statistics for a complicated protocol 6. Breaking the problem into two: Saturation and SSQ fed by correlated SRD Markovian traffic 7. Numerical results The Big Picture Link and Network Design and Dimensioning Traffic Modelling Performance Evaluation Traffic Queueing Measurements Theory Formulae in Closed Form Traffic Prediction Simulations and Fast Simulations Numerical Solutions Research in Performance Evaluation 1. Exact analytical results (models) 2. Exact numerical results (models) 3. Approximations 4. Simulations (slow and fast) 5. Experiments 6. Testbeds 7. Deployment and measurements 8. Typically, 4-7 validate 1-3. Classical Performance Models Poisson Traffic Model Many simplified assumptions on System/protocol operation Inaccurate results We want Realistic Traffic Model No simplified assumptions on System/protocol operation Accurate results Example 1: Ethernet The Ethernet MAC protocol: (1) Carrier Sensed Multiple Access with Collision Detection (CSMA/CD) (2) The Binary Exponential Backoff (BEB) Algorithm Ethernet C D E F G time C D E F G The Big Bang of E, F & G D time E F G Detailed Analysis LAN traffic CSMA/CD Served packets BEB collided packets Ethernet -or IEEE 802.3 Classical Performance Models offered load G 1-persistent CSMA/CD retransmission Poisson LAN traffic BEB Poisson collided packets Served packets Example 2: IEEE 802.11 The IEEE 802.11 MAC protocol: (1) Carrier Sensed Multiple Access with Collision Avoidance (CSMA/CA) (2) The Binary Exponential Backoff (BEB) Algorithm channel is busy idle slots Data ACK idle slots time DIFS (a) idle RTS slots CTS Data SIFS DIFS idle slots ACK time DIFS SIFS SIFS (b) SIFS DIFS Figure 1: The IEEE 802.11 access methods: (a) Basic access method. (b) Four-way handshaking access method Detailed Analysis LAN traffic CSMA/CA Served packets BEB collided packets IEEE 802.11 Simplified Performance Models offered load G CSMA/CA fixed window retransmission Bernoulli or Poisson LAN traffic BEB collided packets Served packets How do we do it? Well, we know how to get: Queueing performance of state dependent Markovian Single Server Queue (SSQ) Performance results without simplified assumptions on System/protocol operation when system is saturated so, we break the hard problem into two separate easy problems: Queueing performance of a state dependent Markovian SSQ Performance evaluation of the System/protocol operation when system is saturated From saturation analysis without simplified assumptions on system/protocol operation, we can get: The service rate, given that there are n saturated stations in the system. Then using state dependent Markov Chain analysis, we get: The performance results we are after State dependent single Server queue State dependent (n) service Markovian SRD arrival process For each n solve MAC under saturation n stations What statistical traffic models we have considered? Source Traffic Arrival Model Phase type distributed transmission time Exp. distributed gaps Data frame Phase type distributed transmission time Data frame Packet Data frame = Train of packets time Source Traffic Arrival Model A new data frame is generated, it is scheduled for transmission immediately Exponentially distributed The data frame is transmitted successfully at this point of time After an idle period, another new data frame is generated. It is scheduled for transmission immediately time Another Traffic Model considered: Markov Modulated Poisson Process (MMPP) The number of active stations increases based on MMPP And decreases based on the MAC service process Now let’s use the simpler problem under saturation to model the service rate Saturation Traffic n stations arrival departure Service Process Probability Exponential E8 E32 E8 will be chosen Simulation: IEEE 802.11 for 20 saturated stations Service Time (second) Why we think it will work? Why E8 is good enough? Let X exp(), E [X] = 1/ X8 E8, X32 E32 both with mean 1/ , Var [X] = 1/ 2 Var [X8] =8/(8)2=1/(82) Var [X32] = 32/(32)2=1/(322) Var [X32] = (1/4)Var [X8] = (1/32)Var [X] 2 [X32] = [X8] , 2.82 [X8] = [X] Why E8 is good enough (cont.)? From M/G/1 mean queue size result: S 2 S Q 21 2 2 2 Q: mean queue size : utilization S:SD of the service time distribution S: mean service time Why E8 is good enough (cont.)? Det. SD/Mean 0 X32 X8 (1/32)(1/2) (1/8)(1/2) = 0.176 X 1 = 0.353 When the SD/mean is small (as for X32), doubling it does not significantly affect queueing performance for small . However, when it is already doubled, multiplying it further by 2.82, affects performance. How accurate are we? Mean data frame delay (msec) Mean delay under different payload sizes: simulation vs. analysis Payload: 512 bits 2430 bits 4348 bits 8184 bits Throughput Mean data frame delay (msec) Mean delay under different date frame distributions: simulation vs. analysis 512 bits (75%) 8184 bits (25%) Solid lines: dual fixed data frames 512 bits (50%) 8184 bits (50%) Dotted lines: fixed size data frames Throughput Mean delay under different train arrival processes: simulation vs. analysis Mean message delay (msec) Hyper-geometric Geometric Dual fixed Fixed Mean train size = 24576 bits Throughput Mean data frame delay (msec) Delay performance: IEEE 802.11 Simulation M/M/1/50 M/E8/1/50 and M/E32/1/50 Throughput Mean data frame delay (msec) Delay Performance: 802.11 Simulation MMPP/E8/1/50 MMPP parameters 0=51 r0=0.00002 msec r1=0.00008 msec Throughput Mean data frame delay (slots) Delay Performance: IEEE 802.3 Simulation M/M/1/50 M/E8/1/50 Throughput How inaccurate are classical performance models? A Comparison Lam’s results Our results Normalized mean delay, D/b1 100 a=0.1 a=0.01 50 20 10 5 2 1 0 0.2 0.4 0.6 Throughput, S 0.8 1.0 Lam’s results overestimate the performance. Our results indicate that the Ethernet protocol will be unstable at 30% for a=0.1 and 75% at a=0.01. Lam’s predictions (Computer Network 4, 1980) are much higher in the two cases. a = the signal propagation delay normalized to the data frame transmission time between any pair of stations. We assume a star network and the distance between any station and the hub (active or passive) is fixed. D/b1= the mean transmission delay normalized to the data frame transmission time. Traffic: Lam’s=Ours=Poisson traffic Data frame size distribution: Lam’s=Ours=fixed Retransmission algorithm: Lam’s=An adaptive retransmission algorithm; Ours=BEB Conclusion: Accurate MAC performance results under statistical traffic can be achieved by breaking up the original problem into two simpler easier problems: (1) SSQ (2) MAC under saturation
© Copyright 2026 Paperzz