Resource Management For Multimedia Services in High Data Rate Wireless Networks (Ruonan Zhang Et Al.) 2017
Resource Management For Multimedia Services in High Data Rate Wireless Networks (Ruonan Zhang Et Al.) 2017
Resource Management For Multimedia Services in High Data Rate Wireless Networks (Ruonan Zhang Et Al.) 2017
Ruonan Zhang
Lin Cai
Jianping Pan
Resource
Management
for Multimedia
Services in High
Data Rate Wireless
Networks
123
SpringerBriefs in Electrical and Computer
Engineering
123
Ruonan Zhang Lin Cai
School of Electronics and Information Department of Electrical and Computer
Northwestern Polytechnical University Engineering
Xi’an, Shaanxi, China University of Victoria
Victoria, British Columbia, Canada
Jianping Pan
Department of Computer Science
University of Victoria
Victoria, British Columbia, Canada
1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.1 Background. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.2 Wireless Resource Management Basics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.3 Multimedia Traffic Characteristics and Performance Metrics . . . . . . . . 4
1.4 Challenges and Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
1.5 Monograph Outline . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
2 MAC Protocols for High Data-Rate Wireless Networks . . . . . . . . . . . . . . . . . 9
2.1 Wireless Local Area Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
2.2 Wireless Personal Area Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
2.3 Wireless Body Area Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
2.4 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
3 Contention-Based Medium Access Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
3.1 Channel Access Mechanism . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
3.1.1 Traditional Contention-Based Medium Access Control . . . . . . 44
3.1.2 Prioritized Contention-Based Medium Access Control . . . . . . . 50
3.2 Performance Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
3.2.1 Simulation Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
3.2.2 Prioritized Access by Differentiated AIFS . . . . . . . . . . . . . . . . . . . . 56
3.2.3 Prioritized Access by Differentiated CW Size . . . . . . . . . . . . . . . . 59
3.3 Analytical Modeling for Contention-Based MAC. . . . . . . . . . . . . . . . . . . . . 62
3.3.1 Analytical Modeling Principles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
3.3.2 Classic Analytical Frameworks and Models . . . . . . . . . . . . . . . . . . 72
3.4 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
4 Resource Reservation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
4.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
4.1.1 Channel Reservation Principles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
4.1.2 Challenges and Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
4.2 Distributed Channel Reservation Mechanisms . . . . . . . . . . . . . . . . . . . . . . . . 83
4.3 Modeling and Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
v
vi Contents
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133
Chapter 1
Overview
Wireless local area networks (WLANs) have swept across the globe in recent years
as an inexpensive and convenient means for ubiquitous Internet access, thanks to
the popularity of devices such as smart phones and tablet computers. By wireless
communications and the Internet backbone technologies, WLANs provide services
to both mobile and fixed users and have enabled a variety of applications. Given the
lower cost and relatively higher throughput compared to cellular networks, WLANs
are increasingly used to provide multimedia services such as video streaming. How-
ever, multimedia services have posed new requirements and significant technical
challenges on the treatment of traffic within WLANs, to provide users seamless
coverage and quality-of-service (QoS). The resource management of WLAN has
become a very crucial part for future generation of wireless and mobile networks.
Nevertheless, QoS is only partially supported in current WLANs, which has become
an obstacle to supporting multimedia applications nowadays. In this chapter, we
present an overview of the essential concepts of QoS, fundamental principles and
challenges of QoS provisioning, and the resource management mechanisms for
WLANs.
1.1 Background
The wireless and mobile Internet is quickly emerging as a reality, thanks to the
exponential rise in the usage of mobile devices and the fast evolution of the wireless
local area network (WLAN) technologies. WLANs provide the same functionality
as wired LANs, but with much better flexibility and mobility without physical
location constraints and the costs of installing wires. WLANs have been not
only widely installed in hot-spot locations, from markets, airports, and campus to
retail, hospital, and corporate buildings, but also in residential buildings to support
Internet access. WLANs can also be utilized in places that are difficult to wire, for
example, trading floors, manufacturing facilities, and warehouses. Hence, WLANs
have become ubiquitous and an integral part of the Internet.
Given the license-free usage of spectrum and high data rates, the main usage of
WLANs is no longer limited to data services such as Web browsing, file transfer,
and Emails. Convergence of WLANs and the Internet has promoted a variety of
applications for mobile users including real-time multimedia services such as the
delivery of video streaming or video on demand (VoD), voice telephony or voice
over IP (VoIP), teleconferencing, and instantaneous monitoring. There are mainly
two driving forces. First, network service providers are racing to roll out new
value-added services over the Internet, such as Internet protocol television (IPTV).
Second, consumers demand for multimedia streaming to their handheld devices. For
example, when using WiFi and cellular-enabled dual-mode phones, people more
likely switch to WiFi connectivity in the range of an access point (AP) for much
lower costs and higher data rates. As a result, recent years have seen explosive
growth of VoIP over WLAN, where compressed voice data are encapsulated into
IP packets and transferred to the subscribers through the Internet instead of the
traditional public switched telephone network (PSTN).
Multimedia applications often have stringent quality-of-service (QoS) require-
ments on throughput, delay, delay jitter, and delivery ratio. For example, with
the state-of-the-art video coding technologies, the average data rates of high-
quality, high-definition (HD) video streams are reduced significantly, but the more
aggressive source coding and compression lead to a much higher burstiness (the
peak-to-average ratio) in video streaming traffic [128]. These features lead to
the great difficulty in handling multimedia traffic.
A mechanism that provides a certain level of QoS in wireless networks is usually
termed as a QoS enabling mechanism or QoS support mechanism. QoS provisioning
refers to the ability of a network to ensure data delivery over the network and satisfy
certain performance requirements for different classes of traffic. For wired links,
an engineering solution, bandwidth over-provisioning, is widely used to address
the QoS issues. For example, it can be achieved by using high-speed, reliable
fibers. However, the wireless spectrum is at premium and the demand for wireless
services is ever-increasing, and thus bandwidth over-provisioning is not a sustain-
able solution in wireless networks. Furthermore, the physical channel impairments
such as fading and interference, super-linearly decaying of signal strength, and
hidden-terminal issues make QoS support much harder. Third, to support multiple
users simultaneously, WLAN resources are usually accessed in a contention-based
and distributed manner, given the broadcast nature of wireless channels. These
characteristics hence render effective and efficient resource management in WLANs
crucial and challenging. A properly designed resource management scheme is the
key to efficiently allocate radio resources and ensure QoS.
1.2 Wireless Resource Management Basics 3
Resource management has attracted significant interest and research efforts in both
the academical and industrial communities. The key issue is how to utilize the
limited wireless resources efficiently and fairly. Two aspects arise when dealing
with the resource management with QoS constraints. One is the call admission
control (CAC), which determines whether it is possible to fulfill the demands
of a set of clients (i.e., calls or flows). The other is to find an optimal way to
share/schedule the resources among multiple competing stations, in order to meet
the demands from all clients. In a distributed system, the latter is realized by the
media access control (MAC) protocols which coordinate users to utilize a common
communication channel in a network.
In WLANs, CAC normally operates at APs or gateway devices, and works on
the call or session level. It makes the decision on whether or not an incoming call
(or a session) can be accommodated such that the QoS requirements of the admitted
calls can be statistically guaranteed [5, 26, 144]. MAC operates at each wireless
station and it controls the channel access on the link-layer frame level. Aiming to
fairly share the common wireless resources and avoid network congestion, each
station decides when to transmit in a distributed manner or is permitted to transmit
by a central controller/scheduler.
In a practical wireless network, resource management should be feasible and
with low overhead and computational complexity. Overheads are mainly introduced
by the additional fields defined in MAC protocols, and the exchange of signaling
messages. Effective QoS mechanisms must make a good tradeoff between the
introduced overhead and the efficiency in utilizing network resources [101]. In this
monograph we focus on the modeling and performance analysis of the WLAN MAC
protocols, which serves as a foundation for their performance improvement and
optimization.
Resource management by MAC can take different approaches. In the following,
we briefly introduce and compare the three major streams for wireless networks.
(1) Centralized Resource Allocation
To ensure QoS for multimedia applications, wireless resources can be fully
or statistically reserved before a new call is admitted to a network. In the
cellular systems, wireless resources in the time/frequency/code domains can
be channelized. Each admitted call is assigned with a dedicated channel using
one or multiple time slots, frequency bands (subcarriers), and codes. Corre-
spondingly, the fundamental resource allocation for multiple users includes
the time-division multiple access (TDMA), frequency-division multiple access
(FDMA), and code-division multiple access (CDMA). Reference [2] discussed
the centralized resource allocation strategies used in the third-generation (3G)
system.
4 1 Overview
350
300
250
200
150
100
50
0
0 2000 4000 6000 8000 10000
Video Frame Size (KB)
120
100
80
60
40
20
0
0 200 400 600 800 1000
120
100
80
60
40
20
0
0 20 40 60 80 100
Frame Sequence Number
Fig. 1.1 Video frame size vs. frame sequence number [155]
smaller frame sizes, as shown in Fig. 1.1 for the sample video stream.1 A number
of frames are grouped as one group of picture (GoP), e.g., in H.264, each GoP has
12 frames with the structure of “IBBPBBPBBPBB”.
Since a limited size of maximum transmission unit (MTU) is used in the link
layer, which is smaller than most video frames, video frames are segmented and
encapsulated into multiple link-layer frames. Because the inter-frame interval is
fixed (1=30 s), the dramatic variation of video frame sizes within a GoP and between
GoPs results in the high burstiness of video traffic. For the sample video stream, the
peak-to-average ratio of the instantaneous data rate can be as high as 16:18.
On the other hand, multimedia applications and mobile devices have a variety of
service requirements that should be considered when designing effective resource
management solutions. The main QoS metrics for multimedia applications include
delay, jitter, throughput, and loss [37, 71]. End-to-end frame delay, the time from
the arrival of a frame at its source station to the moment it is received by its
destination station, is a key QoS index in WLANs. The waiting time in the source
station buffer (queueing delay) and the backoff time for obtaining transmission
opportunities till being successfully transmitted (channel access delay) for a frame
1
The sample HD video stream is “From Mars to China” with a resolution of 1920 1080 and
quantization parameters of 28, 28, and 30 for I, P, and B frames, respectively. The video is available
at http://trace.eas.asu.edu/h264/mars/.
6 1 Overview
are the main components of the end-to-end delay in a WLAN. The other delay
components, such as processing time, propagation delay, and reception time are
relatively small, so they can be negligible. The end-to-end delay directly affects
the user-perceived service quality. The variation of delay is called delay jitter.
Throughput is related to the data transfer rate from the source to the destination
which is defined as the amount of data successfully received in a unit time. Packets
(a packet may be segmented into multiple frames) may be lost during transmissions
due to various reasons, such as transmission error, buffer overflow, collision, etc.,
which is evaluated by packet loss rate. The International Telecommunication Union-
Telecommunication Standardization Sector (ITU-T) G.114 [71] has specified the
QoS performance indexes. For instance, for real-time voice services, the tolerable
packet loss rate for raw voice data is 13 %. The delay below 150 ms is preferable for
one-way transmission, but it should not be larger than 400 ms.
For portable devices powered by batteries, such as smart phones and tablet
computers, power consumption and computation load are also important and should
be considered. Moreover, being adaptive to wireless channel dynamics is critical for
wireless networks [6].
QoS support in WLANs has made significant progress by extensive research efforts,
but providing satisfactory services for multimedia applications in wireless networks
still poses a number of challenges as listed below.
First, it is difficult to provide hard QoS guarantee when distributed channel
access control is employed. To fairly share wireless resources and avoid network
congestion collapse, DCF uses a backoff counter randomly set according to the
backoff window size. A wireless station reduces its transmission rate by enlarging
the backoff window size exponentially when a frame loss is observed in the first
several backoff stages (the contention window size may be fixed when the number
of retransmissions has reached a threshold). However, using exponential backoff and
random backoff counters introduces variations in delay and throughput. When more
than one node access the channel, frame collisions introduce more delay and loss,
resulting in more difficulties in QoS guarantee. Even with prioritized contention
using EDCF, only soft QoS provisioning can be realized. How to support real-time
multimedia streaming with strict QoS requirements in WLANs remains an open
issue.
Second, multimedia traffic is multiplexed with data traffic in WLANs, different
from the cellular networks where dedicated resources are allocated to multimedia
flows. Consequently, the QoS of real-time applications may be severely degraded
when the best-effort data traffic load increases. It is a challenging task to guarantee
QoS provisioning for multimedia flows and also try to ensure high throughput for
best-effort flows at the same time.
1.5 Monograph Outline 7
Third, as more wireless devices, such as WiFi, Bluetooth, and ZigBee devices,
access the same unlicensed wireless spectrum, packet losses due to interference and
collisions become a challenging issue to deal with. Furthermore, the mobility of
portable devices introduces channel fading and random variations of the received
signal-to-noise ratio (SNR). Since wireless transmission links are error-prone,
highly unreliable, and time-varying, retransmissions of lost packets are usually
required. How to optimize the channel sharing among retransmitted and new packets
should be studied.
Fourth, using adaptive modulation and coding, the physical layer of wireless
networks can support multiple data rates (e.g., 1, 2, 5:5, and 11 Mb/s in IEEE
802.11b) according to the channel condition. The rate adaptation introduces more
delay and throughput variations that should be considered in resource management.
In summary, effective and efficient QoS support mechanisms and appropriate
MAC parameter setting for both multimedia traffic with stringent QoS requirements
and best-effort data are still an open and challenging issue, which introduces rich
research topics.
The monograph consists of five chapters. It begins with the introduction of the QoS
metrics, and the basics and challenges of the resource management in WLANs, as
presented in this chapter.
The wireless network specifications defined by the standardization bodies such as
IEEE are summarized in Chap. 2. The evolution, features, and application scenarios
of the standards for WLANs, wireless personal area networks (WPANs), and wire-
less body area networks (WBANs), which are driven by the ever-increasing demand
for services and the state-of-the-art radio and resource management technologies,
are introduced. The survey provides readers with the useful background information
of the primary MAC protocols and QoS support mechanisms in today’s wireless
networks.
In Chap. 3, the protocols, performance evaluation, and analytical models of the
contention-based MAC are discussed. The fundamental theorems and the widely
adopted analytical models (including the two-dimensional Markov chain, mean
value analysis, and backoff counter distribution analysis) for both the ordinary and
the prioritized contention-based MAC are presented. A taxonomy of the analysis
approaches is provided, and the principles, concepts, and features of each approach
are discussed.
The reservation-based MAC is investigated in Chap. 4. The reservation can be
realized in two ways, i.e., centralized and distributed resource allocation. Using the
WiMedia MAC protocol for high-rate WPANs [49] as an example, the distributed
resource reservation is studied in details. The scheme, analytical model, and
performance evaluation are presented. Furthermore, the improvement of the current
protocol is discussed.
8 1 Overview
The ever-growing demand for multimedia services anywhere, anytime has fostered
the development of high data-rate wireless networks, and various standards have
emerged. In this chapter, we briefly introduce three categories of wireless net-
works, the wireless local area networks (WLANs), wireless personal area networks
(WPANs), and wireless body area networks (WBANs). Their coverage scales
down from over a building to a house/home and finally to a body. Their resource
management and MAC protocols have distinct features due to different data rates,
capacity, radio ranges, and application scenarios. The enabling physical-layer radio
frequency (RF) transmission technologies, MAC schemes, and standardizations of
the three kinds of networks are summarized, with the objective to provide readers
with a preliminary understanding of the design philosophies and implementation
requirements.
The history of the evolution of IEEE 802.11 specifications and the amendments
in progress are listed in Tables 2.1 and 2.2, respectively. The key standards and
amendments are summarized as follows.
1. 802.11-1997 (Initial 802.11 Standard) [65]
The first version, IEEE 802.11-1997 (802.11 legacy), specifies three solutions
in the PHY layer: frequency hopping spread spectrum (FHSS), direct sequence
spread spectrum (DSSS), and infrared PHY schemes. The first two schemes use
the S-band radio frequency (RF) transmission, operating in 2.400–2.500 GHz
(referred to as the 2.4 GHz band) which belongs to the industrial scientific med-
ical (ISM) frequency band under the FCC Part 15 Rules and Regulations [3].
The last one uses the infrared band at 316–353 THz. It is defined in the standard
that all the three PHYs provide a basic data rate of 1 Mbps and an optional
2 Mbps mode. However, the commercial products of the infrared PHY scheme
in 802.11-1997 actually do not exist in the market.
The spectrum is sub-divided into 14 channels and each channel spans 5 MHz.
The center frequency of the first channel is 2.412 GHz. In addition, a spectral
mask is specified in 802.11 and it regulates the power distribution allowed over
the channels. According to the mask, the signals are required to be attenuated by
a minimum of 20 dB compared with the peak amplitude of the power spectrum
of a channel when the frequency is ˙11 MHz away from the center of the band.
Hence the bandwidth of the signal over the 802.11 air interface is effectively
22 MHz. As a result, the center frequencies of stations of two geographically
overlapped 802.11 WLANs must be separated by at least four channels. In other
words, for multiple WLANs to operate at the same location, the stations should
use every fourth or fifth channel to avoid signal frequency overlapping.
2. 802.11a (OFDM Scheme in 5 GHz Band) [73]
The PHY layer based on the orthogonal frequency-division multiplexing
(OFDM) signaling method was originally described in the 1999 specification,
but was later defined in the 2012 specification which used the 4.915–5.825 GHz
(referred to as the 5 GHz band). By following the original standard (802.11
legacy), 802.11a adopts the same MAC protocol and frame format. However,
802.11a specifies transmission and reception at the data rates from 1.5 to
54 Mbps (the rate is higher if the error correction code is counted), which yields
effective throughput up to 20–30 Mbps. The vendors began to ship 802.11a
products in 2001 due to the development of the commercial radio devices
working at the 5 GHz band. Nowadays the term “802.11a” is used by most
WiFi products (interface cards and routers) to indicate inter-operability at the
5.8 GHz band with 54 Mbps data rate.
The advantage of using the 5 GHz band is that there may be less interference
because fewer other systems may operate in this band. However, this higher
carrier frequency brings a disadvantage: signals are absorbed more severely by
the solid objects such as walls in their propagation due to the smaller wavelength
compared with 802.11b/g in 2.4 GHz. Consequently, 802.11a can only penetrate
over shorter distance and provide a smaller effective coverage range.
12 2 MAC Protocols for High Data-Rate Wireless Networks
Meanwhile, other products operating in the 2.4 GHz ISM band, such as
microwave ovens, cordless telephones, baby monitors, Bluetooth, ZigBee, and
some amateur radio equipments, cause severe interference to 802.11b devices.
In order to control the susceptibility, the DSSS scheme is adopted in the physical
layer to mitigate the interference.
4. 802.11g (OFDM Scheme in 2.4 GHz Band) [75]
The 802.11g standard was ratified in June 2003 and it specifies the third
modulation standard, i.e., the same OFDM-based scheme as 802.11a, but works
in the 2.4 GHz band (same as 802.11b) with the channel bandwidth of 20 MHz.
In the physical layer, besides the forward error correction codes, a maximum
bit rate of 54 Mbps can be provided. Working in the same frequency band,
the hardware of 802.11g is fully backward compatible with that of 802.11b.
However, due to this legacy issue, the throughput of 802.11g is reduced by 21 %
compared to 802.11a. In addition, when an 802.11g network and an 802.11b
network co-exist, the data rate of the former will be reduced due to the activities
of the latter. Similarly to 802.11b, 802.11g devices experience interference from
other products that also operate in the 2.4 GHz ISM band, and the OFDM
signaling method provides the ability to mitigate the interference.
The 802.11g standard was rapidly accepted by the market thanks to its high
data rates and manufacturing cost reductions. By summer 2003, most products
of mobile adapter cards and access points became dual-band/tri-mode, which
means that they can work in 802.11a and 802.11b/g networks.
5. 802.11-2007 (Base Standard) [76]
In order to “roll up” a series of amendments to the 802.11-1999 version, the task
group made a single specification that merged the eight amendments including
802.11a, b, d, e, g, h, i, and j with the initial standard. The merged version was
approved on March 8, 2007 and became the new base standard, named as IEEE
802.11-2007.
6. 802.11n (MIMO Enhancement) [77]
The amendment, 802.11n, was published in October 2009, and improved
the previous 802.11 standards by introducing multiple-input multiple-output
(MIMO) antennas. It is mandatory that 802.11n devices can work in the 2.4 GHz
band, and they can optionally operate in the 5 GHz bands. Modifications have
been defined to both the PHY and MAC layers so that operation modes can
be enabled to support a net data rate from 54 Mbps to as high as 600 Mbps.
A maximum throughput above 100 Mbps can be provided as measured at the
MAC data service access point (SAP).
7. 802.11-2012 (Base Standard) [79]
A single document was created to merge the ten amendments (802.11k, r, y, n,
w, p, z, v, u, and s) with the 802.11-2007 base standard. The task group made
much cleanup and reordered many clauses. The merged version was published
on March 29, 2012, which became the new base standard and is referred to as
IEEE 802.11-2012.
16 2 MAC Protocols for High Data-Rate Wireless Networks
26.7 Mbps (if the channel bandwidth is 6 and 7 MHz) and 35.6 Mbps (if 8 MHz
channels are used). The maximum data rates of 426.7 Mbps (6 and 7 MHz
channels) and 568.9 Mbps (8 MHz channels) can be achieved by utilizing four
bonded channels and four spatial streams.
11. 802.11ah (High-rate in sub 1 GHz Bands)
A WLAN working at sub 1 GHz license-exempt bands is specified in
IEEE 802.11ah which is planned to be approved in 2016. Different from the
conventional 802.11 WLANs operating in the 2.4 and 5 GHz bands, 802.11ah
can achieve a wider coverage range thanks to the favorable propagation
characteristics (such as smaller path loss) in the low frequency spectrum.
Because the available bandwidth is relatively narrow, the applications can be
supported by 802.11ah include range-extended hotspots, large-scale sensor
networks, and outdoor WiFi to offload the cellular traffic.
12. 802.11ax (High Efficiency WLANs)
The IEEE 802.11ax amendment was initiated by the high efficiency WLANs
(HEW) task group in 2014, and is expected to be released in 2019. 802.11ax
is proposed to support future dense networks where multiple WLANs co-exist
and each of them may have many stations. In order to address this challenge,
spatial reuse of the channel resources is adopted. Furthermore, as the successor
to 802.11ac, 802.11ax further increases the network resource utilization and
efficiency. It is supposed to be able to increase the throughput of 802.11ac by
four times. New technologies such as MU-MIMO and OFDMA are employed in
both downlink and uplink to improve the network throughput. To be backward
compatible with the current 802.11 WLANs, the legacy PHY preamble is
adopted and EDCF is the basic MAC protocol.
As an amendment to the 802.11 standard, IEEE 802.11ai plans to introduce
new techniques to setup initial links quickly. In order to use WLANs in the
45 GHz spectrum which is unlicensed in China and some other regions, the standard
802.11ad is rebanded in this band in the amendment of 802.11aj. The amendment
802.11u [78] defines the mechanisms for device discovery, and it is extended
in 802.11aq that can perform the pre-association discovery of services. By using
802.11aq, a device may discover the services running on another device or provided
by a network. On the other hand, for the support of multimedia services, the
amendment 802.11e [54] defines the MAC procedures to support applications with
QoS requirements, including the transport of voice, audio, and video over IEEE
802.11 WLANs.
(3) Medium Access Mechanisms
The contents of IEEE 802.11 standard mainly include the specification of the
physical layer and the MAC sublayer. The basic 802.11 MAC sublayer defines
two mechanisms for channel access: the distributed coordination function (DCF)
and point coordination function (PCF). The hybrid coordination function (HCF)
is further defined in 802.11e. The MAC architecture can be illustrated in Fig. 2.1,
where the functionalities of PCF and HCF are provided through the services of DCF.
18 2 MAC Protocols for High Data-Rate Wireless Networks
c f
s
.
s .
p
o s .
c s
b .
Four access categories (ACs) of traffic are prioritized by WME, which are voice,
video, best effort, and background. Table 2.3 lists the mapping from the eight user
priorities (UPs) defined in 802.1D to the four ACs. The primary principle to provide
QoS in EDCA is to give the multimedia traffic a high priority and the best-effort data
traffic a low priority in channel access. For example, emails are assigned with a low
priority (best effort), and voice over wireless LAN (VoWLAN) and streaming videos
are usually assigned to a high priority (voice and video). The channel access of each
AC follows DCF but uses a set of differentiated EDCF channel access parameters. If
a frame from a higher-priority flow is to be sent, it waits for less time on average than
that with a lower priority. As a result, the traffic with a higher priority has a better
chance of accessing the channel and being sent. This is accomplished through the
modification of the backoff parameters in the traditional CSMA/CA. Thus, delay-
sensitive data are protected and QoS is better supported.
Figure 2.2 illustrates the parallel backoff entities in a single IEEE 802.11e station.
The traffic flows belonging to the four ACs are handled by four independent backoff
entities, and an arbitration is performed inside a station to handle the internal
collision among the entities.
In EDCA, a station can access the channel without contention during the period
of its TXOP. Within the bounded time period of a TXOP, a station can send a number
of frames given that the transmissions do not exceed the duration limit of the TXOP.
In the case that a frame is too large to be transmitted within a single TXOP, the
station should fragment the frame into multiple frames with a smaller size. By using
the time limit of TXOPs, it can be avoided that a low-rate station occupies too much
channel time to transmit frames in an 802.11 WLAN.
In addition, block acknowledgment (B-ACK) is adopted which can acknowledge
an entire TXOP by using a single ACK frame. This scheme can reduce the overhead
of the acknowledgment especially when TXOPs are long and multiple frames are
delivered within one TXOP. Furthermore, in supporting QoS, the class of service
is defined with two values: QoSAck and QoSNoAck. QoSNoAck is used to inform
that a frame is not acknowledged. Thus, retransmissions of highly time-critical data
(such as real-time VoWLAN), which are unnecessary, can be avoided.
The released IEEE 802.11-2007 standard has included this amendment to provide
statistical instead of hard QoS support. The channel access mechanism of the EDCA
protocol will be analyzed and evaluated in details in Chap. 3.
(d) IEEE 802.11e HCCA in HCF
HCCA is similar to PCF. However, there are several critical differences between
them as listed below.
• In PCF, the time duration between two adjacent beacon frames is partitioned into
two intervals, CFP and CP. In HCCA, CFPs are allowed to start at anytime inside
a CP. Such CFP is referred to as the controlled access phase (CAP) in 802.11e. An
AP can initiate a CAP any time when it wants to transmit a frame to or receive a
frame from a station by contention-free channel access. During a CAP, the access
to the wireless channel is controlled by the hybrid coordinator (HC), i.e., the AP.
On the other hand, inside a CP, all stations contend for the channel access via
EDCA.
Table 2.3 Priority to access category mappings
User AC Index Access Designation Minimum Maximum
2.1 Wireless Local Area Networks
Priority Priority (UP) (ACI) Category (AC) (informative) CW Size CW Size AIFSN
1 0 AC_BK Background aCWmin aCWmax 7
2 0 AC_BK Background
Lowest 0 1 AC_BE Best Effort aCWmin aCWmax 3
# 3 1 AC_BE Best Effort
aCWmin C1
Highest 4 2 AC_VI Video 2
1 aCWmin 2
5 2 AC_VI Video
aCWmin C1 aCWmin C1
6 3 AC_VO Voice 4
1 2
1 2
7 3 AC_VO Voice
21
22 2 MAC Protocols for High Data-Rate Wireless Networks
Fig. 2.2 Four parallel backoff entities for the ACs with different EDCA parameter sets and intra-
contention in one IEEE 802.11e station
• As mentioned earlier, PCF does not define prioritized classes. HCCA specifies
ACs and traffic streams (TS). Thus an HC can construct a queue for each session
(stream), rather than for each station. In addition, HCF can coordinate these
streams or sessions in any fashion (not just round-robin). Meanwhile, the stations
report their queue lengths of all ACs to the HC, and then the HC may adjust the
scheduling accordingly.
• In HCCA, a station may send multiple frames in a burst inside a given period of
time determined by an HC, while this mechanism is not provided in PCF.
• During a CAP in HCCA, stations can also send CF-Poll frames to the HC to
request data transmissions.
2.2 Wireless Personal Area Networks 23
• 902–928 MHz: North America, up to ten channels (2003) and extended to thirty
(2006), transfer rates of 20 and 40 Kbps;
• 2400–2483.5 MHz: worldwide use, up to sixteen channels, transfer rates of
250 Kbps.
The 2006 revision, IEEE 802.15.4-2006 [90], improves the maximum data rates
up to 100 and 250 Kbps in the frequency bands of 868 and 915 MHz. A series of
amendments following the original versions are briefly listed below.
• IEEE 802.15.4a-2007: WPAN Low Rate Alternative PHY [91]. This amendment
specifies two additional PHYs, one using direct sequence (pulse radio) UWB
(operating in the unlicensed UWB spectrum, including below 1, 3–5, and 6–
10 GHz) and the other using chirp spread spectrum (operating in the unlicensed
2450 MHz spectrum). The radio pulse-based PHY schemes are able to perform
localization and ranging with high precision (e.g., the accuracy can be one meter
or even smaller), large aggregate throughput, and scalability in the tradeoff
between longer range and higher data rates. They also provide lower power
consumption options with reduced cost.
• IEEE 802.15.4-2006: Revision and Enhancement [90]. Approved in June 2006
and published in September 2006, 802.15.4-2006 specifies enhancements and
clarifications to the IEEE 802.15.4-2003 standard. The enhancements include
resolving ambiguities, reducing complexity if not needed, increasing scalability
in the use of security key, considering frequency bands that are newly available,
and others.
• IEEE 802.15.4c: PHY Amendment for China [92]. It was approved in 2008 and
published in January 2009. It adds the newly opened RF spectrum bands in China
for WPAN use, including the 314–316, 430–434, and 779–787 MHz bands.
• IEEE 802.15.4d: PHY and MAC Amendment for Japan [93]. It defines a new
PHY and the necessary MAC modifications to operate in the newly allocated
frequency bands from 950 to 956 MHz in Japan. Meanwhile, it ensures the
coexistence between 802.15.4 WPANs and passive tag systems in this band.
• IEEE 802.15.4e: MAC Amendment for Industrial Applications [95]. It was
approved in February, 2012. As the industrial markets increase, 802.15.4e defines
a new amendment to the MAC scheme in the existing standard 802.15.4-2006.
Channel hopping strategy is employed to improve the signal robustness against
external interference and continual multipath fading.
• IEEE 802.15.4f: PHY and MAC Amendment for Active RFID [94]. It defines
new wireless PHY and improvement to the 802.15.4-2006 MAC to enable the
localization applications of active RFID systems.
• IEEE 802.15.4g: PHY Amendment for Smart Utility Networks (SUN) [96].
Released in April 2012, the 802.15.4g standard creates a PHY amendment that
is capable of supporting large, geographically diverse networks. This standard
can facilitate very large-scale process control. For example, the utility smart grid
network may have millions of fixed terminals with minimal infrastructure.
26 2 MAC Protocols for High Data-Rate Wireless Networks
effect, high-data rate, and ability in precise positioning. The UWB technology is
expected to fully exploit the very large bandwidth in transmitting information, and
thus tries to provide a data rate higher than 100 Mbps. By restricting the transmission
power under the appropriate level required by FCC, UWB is able to coexist with
other wireless systems and share the spectrum.
UWB was originally employed as “pulse radio” in radar for positioning. For
high-rate data communications (> 100 Mbps), the UWB system can be imple-
mented by a pulse-based approach [136, 146, 162] or an MB-OFDM based
approach [7, 114]. In the former approach, information is modulated on very short
pulses. The duration of a pulse is typically in the order of a nanosecond. In the latter
approach, the combination of frequency hopping and OFDM is adopted. For the data
transmissions in a multipath wireless channel, either of the two UWB proposals has
its pros and cons.
• In the pulse-based UWB, the multipath diversity can be exploited effectively by
utilizing the rich resolvable multipath components (MPCs).
• A long channel acquisition time is needed for channel estimation in the pulse-
based approach. Also, high-speed analog-to-digital conversion (ADC) is required
in processing the received pulse signals.
• MB-OFDM has the advantage in spectral flexibility and efficiency. It has also the
robustness against narrowband interference.
• MB-OFDM needs a slightly more complicated transmitter compared with the
pulse-based UWB system.
In addition, the pulse-based UWB technology is also flexible in providing low-
rate data transfer (< a few Mbps) over moderate or long distances (from 100 to
300 m) [107, 111].
(b) WiMedia WPAN MAC
The function of MAC in WPANs is similar to that in WLANs, i.e., coordinating
the channel access from the competing stations in order to transmit data efficiently
and fairly. The major MAC specifications for UWB-based WPANs include IEEE
802.15.3 [86] and WiMedia-368 [69] which is specified by the Multiband OFDM
Alliance (MBOA).
Based on the MB-OFDM technology, the WiMedia Alliance has released
the standards for both the PHY scheme and the MAC protocol [49]. WiMedia
UWB has been promoted for personal computers, consumer electronics, mobile
devices, and automotive networks. In order to achieve ad hoc connectivity, two
distributed channel access mechanisms are defined by the WiMedia specification:
the prioritized channel access (PCA) and the distributed reservation protocol (DRP).
PCA is a contention-based approach and it adopts the mechanisms that are
similar to EDCA in IEEE 802.11e to provide differentiated channel access. A device
senses the channel before transmitting frames. To prioritize traffic channel access,
the parameters in the backoff and channel contention are selected depending on
the traffic class and priority. Only statistical QoS provisioning is realized in the
EDCA-like MAC protocols. Therefore, the QoS requirements of isochronous traffic,
2.2 Wireless Personal Area Networks 31
such as the stringent delay bound, are difficult to be satisfied in PCA [21]. The
detailed performance analysis on the PCA protocol can be found in [63] and [138].
The analysis and performance evaluation of EDCA will be presented in details in
Chap. 3, which is readily applicable to PCA.
DRP is a distributed TDMA protocol, by which users reserve channel access
time in superframes and then transmit frames within the reserved time slots without
interruption. However, different from the original TDMA scheme, the stations in a
WPAN first negotiate the channel reservation in a distributed manner. The advantage
of DRP is that the transmission opportunities and time for isochronous traffic are
guaranteed by the channel reservation. Since the QoS requirements such as the
stringent delay bound is satisfied, DRP is preferable for streaming multimedia
applications. However, isochronous data flows such as compressed video traffic have
bursty data rates. The packet inter-arrival time is random (i.e., the instantaneous
data rate varies significantly). The difference between the reserved bandwidth and
the time-varying requirement from the traffic results in the difficulty in resource
reservation. To accommodate the burstiness of the traffic flow, over-reservation is
usually adopted which leads to considerably inefficient utilization of the network
bandwidth when fixed channel time is reserved (hard reservation). This inefficiency
in resource reservation can be improved via the soft reservation. In the latter, the
unused reserved time can be released by the owner and other stations which have
backlogged frames can contend for channel access following the PCA protocol.
Another important aspect of DRP is that the allocation of the reserved time
slots for one flow is more flexible. The main feature of DRP different from the
traditional TDMA scheme is in the reservation pattern. To limit the delay variation,
it is desirable to reserve contiguous or evenly spaced time slots with constant
interval in each scheduling cycle (i.e., a superframe in the MAC protocol). Such
reservation pattern can be realized by a centralized coordinator. However, in DRP,
because the locations of the available time slots within a superframe are arbitrary,
there can be multiple reserved time slots which may be non-uniformly distributed
inside a superframe for one traffic flow, resulting in a random reservation pattern in
a scheduling cycle. The reservation algorithms for multimedia traffic in DRP will
be discussed in details in Chap. 4.
(5) High-Rate WPAN: 60 GHz PHY
(a) Overview and Physical Characteristics
With the hope that all cables in home networks for indoor information delivery
are replaced by high-rate wireless data bus, FCC issued the frequency band from 57–
64 GHz that became available in FCC 95-499 [3] and CFR 15.255. Japan declared
the 59–66 GHz band and the European Telecommunications Standards Institute
(ETSI) allocated the 57–66 GHz band too. Thus, a common, contiguous 5 GHz band
is available around 60 GHz in major markets around the world [9] (see Fig. 2.4).
Since the signal wavelength at 60 GHz is about 5 mm, this spectrum is referred
to as the mmWave band. In July 2003, with the increasing interests in developing
an mmWave PHY within the IEEE 802 family, an interest group belonging to the
32 2 MAC Protocols for High Data-Rate Wireless Networks
2160 MHz
240 120
MHz 1760 MHz MHz
1 22 33 4 4
58 59 60 61 62 63 64 65 frequency
(GHz)
57 GHz 64 GHz
USA, KOREA
59 GHz 66 GHz
JAPAN
57 GHz 66 GHz
G
EUROPE
Fig. 2.4 Channelization of 802.15.3c and unlicensed bands around the globe
802.15 working group was formed for WPANs and a study group was formally
established in March 2004. The members of this group developed an mmWave-
based alternative PHY to support 1 Gbps or higher data rates for the existing
802.15.3 WPAN standard. It was decided by the IEEE 802 Working Group to
adopt the existing MAC protocol (IEEE 802.15.3b), and necessary modifications
and extensions should be done to improve implementation and interoperability
of the MAC. The task group started by concentrating on the application models,
an indoor wireless channel model at 60 GHz, and the evaluation criteria for PHY
proposals. After 2 years of hard work, three PHY schemes and a number of MAC
enhancements were proposed to realize different usage scenarios. Finally, the IEEE
802.15.3c-2009 [88] was released in September 2009, approved by the IEEE-SA
standards board.
The mmWave WPAN operating in 60 GHz band allows the physical coexistence
with other microwave devices communicating within this band. It also allows high
data rate over 2 Gbps to support applications including massive content transfer,
high-speed Internet access, real-time streaming, and wireless cable replacement. By
analyzing in details the potential applications by consumers, the 802.15.3c Task
Group defined five usage models (UMs) in the 60 GHz band [115].
• UM 1) Uncompressed video streaming: The very wide bandwidth enables
sending high-definition television (HDTV) traffic flow from HD video cameras
to display screens to replace video cables. The HD video signals have at least
1920 1080 pixel resolution, 24 bits for each pixel and a rate of 60 frames per
second. Hence the uncompressed video streaming bit rate is more than 3.5 Gbps.
• UM 2) Uncompressed multivideo streaming: A home network gateway may
deliver several video signals to multiple TV sets or a TV can show a couple
2.2 Wireless Personal Area Networks 33
of channels side by side on a screen. One stream may require 720 480 pixels
per frame. Thus the gateway should be able to provide at least two streams with
0.62 Gbps each simultaneously.
• UM 3) Office desktop: This UM considers the data communication between
a personal computer and multiple external peripherals, such as one or more
screens, printers, and hard disks. The data flows can be unidirectional or
bidirectional. For reliable data delivery, retransmissions may be needed.
• UM 4) Conference ad hoc operation: Many computers are communicating with
each other in an ad hoc, bi-directional, and asynchronous mode. The conference
operation range is usually larger than the office desktop.
• UM 5) Kiosk file downloading: The portable devices will be equipped with
transceivers with low complexity and power consumption to enable large data
uploads and downloads. For example, downloading video files and large amount
of pictures from smart phones at 1.5 Gbps within 1 m range will be possible.
(b) 60 GHz Channel Model
Different from the radio systems within unlicensed ISM bands such as 2.4 and
5 GHz, 60 GHz signals have much smaller wavelength, resulting in significantly
higher propagation loss. Hence the efficient PHY technologies and MAC protocols
adapting to the new features are needed. For example, directional transmission and
reception are usually needed to increase the signal power in the target direction. The
conventional Saleh-Valenzuela (S-V) channel model [116], which is suitable for the
signal transmission/reception by the IEEE 802.11 and IEEE 802.15 specifications
in the ISM band, cannot be applied for the 60 GHz propagation. Therefore, a
new channel model has been proposed by the IEEE 802.15.3c channel modeling
subcommittee. It adopts the two-path model which incorporates a line-of-sight
(LOS) component and NLOS reflective clusters similar to the S-V model [56, 125].
The new model is illustrated in Fig. 2.5. In order to cover all the possible
scenarios, the model is determined by a set of different parameters (e.g., path loss
coefficients, shadowing effect [151], etc.). These parameters have been extracted
from field measurements for different scenarios.
(c) MAC in IEEE 802.15.3c
The IEEE 802.15.3c standard [88] defines the PHY and MAC specifications
for mmWave-based high-rate WPANs. In the standard, a group of devices (DEVs)
exchange data in an ad hoc fashion and form a piconet. In order to ensure piconet
synchronization and manage the channel access among DEVs, one DEV would
play the role as the piconet coordinator (PNC). Time is divided into sequential
superframes and each superframe contains three segments: a beacon period, a
contention access period (CAP), and a channel time allocation period (CTAP).
Beacons are broadcast periodically by the PNC which bear the necessary control
information, for example, the time and opportunities a DEV can access the channel.
When a DEV hears a beacon, it would know the presence of a piconet.
34 2 MAC Protocols for High Data-Rate Wireless Networks
P f
f k,l Lk
τ k, l τ
Fig. 2.5 Graphical representation of the 60 GHz channel model
The CAP is mainly used for the PNC and DEVs to exchange command and
control messages. Because the packet-based data transfer is mostly asynchronous,
the contention-based access scheme is adopted, i.e., the prioritized CSMA/CA such
as IEEE 802.11e. The analytical model and performance analysis of CAP with the
existence of the CTAP within a superframe will be presented in details in Chap. 5.
The rest of the superframe includes the CTAP which adopts reservation-based
channel access such as TDMA. The CTAP comprises multiple channel time
allocations (CTAs). The CTAs are time slots granted by the PNC and each CTA
is used by a certain pair of DEVs for data exchange. By TDMA, time-sensitive
applications such as multimedia streaming can utilize CTAs for guaranteed data
delivery and the delay can be bounded.
Based on the fundamental architecture of the MAC protocol for WPANs, the task
group has also developed enhancements in three major areas to define an efficient
and well-structured MAC layer [9].
• Coexistence among 802.15.3c PHYs: For the purpose to make devices using
various PHY schemes physically coexist with each other, sync frames are
employed. It is mandatory that a PNC-capable DEV should transmit a sync frame
in each superframe as specified by the 802.15.3c rules. A PNC is also capable of
receiving and decoding sync frames regardless operating with what kind of PHY
scheme. Consequently, a PNC can obtain the information about the existence
of a nearby piconet. Then it has the chance to join it instead of establishing a
new, independent one. Hence the sync frame mechanism is an effective way to
create, maintain, and manage the coexistence of piconets and to avoid co-channel
interference between nearby piconets.
• Frame Aggregation: In WLAN and WPAN systems, the transmission rate of
the frame header is usually fixed at the lowest mandatory rate in the PHY for
reliable reception. Thus, with the increase of the transmission rate of the data
payload, the network efficiency will decrease because the ratio between the
overhead time and the payload time increases, especially in high-speed networks.
To improve transmission efficiency and effective throughput, frame aggregation
2.3 Wireless Body Area Networks 35
is used. The principle is to concatenate the payload data from multiple MAC
service data units (MSDUs) and remove the extra overhead (such as the preamble
and PHY/MAC header). In the 802.15.3c standard, the standard aggregation and
low-latency aggregation methods are specified.
• Beamforming: The high-speed WPAN is expected to achieve MAC throughput
of a few gigabits per second over a short to moderate range. To accomplish this,
a high received SNR is critical. In order to compensate the high propagation
loss (especially for the 60 GHz band) and mitigate the attenuation caused by
shadowing, directional transmission is preferable. By concentrating the signal
power in the target direction, the received SNR can be increased significantly
compared with the omni-directional emission. Using multiple antennas (antenna
array) and beamforming is an effective way to realize directional transmission.
Integrating multiple antennas into a portable device has also become feasible,
because the dimension and the necessary spacing between the antennas operating
at 60 GHz are in the order of millimeters [51].
In summary, as the first IEEE wireless standard for data rate higher that 1 Gbps
at the MAC service access point (SAP), IEEE 802.15.3c is designed to not only
develop three new PHY schemes, but also enhance the existing 802.15.3 MAC by
specifying piconet management mechanism, frame aggregation, and beamforming
capability. Benefitting from the spectrum regulation and standardization effort,
the rapid deployment of WPANs throughout the world has become possible. The
commercial products following the 802.15.3c standard have already appeared, and
consumers can have the WPANs device coexistence without worrying about the
interference.
There are a lot of research opportunities for WPANs. For example, because of
the high propagation loss of 60 GHz signals in indoor environments, the signal
coverage may be too limited to form an expected home network. Thus, repeaters
and multihop solutions for a typical WLAN deployment will be necessary. The
range enhancement by employing new technologies such as advanced coding and
steerable antennas is also an option. It can be predicted that the new efficient
MAC protocol for high-speed WPANs will consistently play an important role in
improving the network throughput, delay performance, data delivery reliability,
network maintenance, and QoS provisioning.
Fig. 2.6 Interconnection of WBAN, WPAN, (W)LAN, and wide area networks
• The importance of reliability is obvious especially when WBANs are used for
monitoring the health status of patients. Particularly any emergency signal cannot
be missed.
• Energy utilization and efficiency are critical for WBAN sensors, because their
battery capacities are very limited due to their tiny sizes. It is difficult to replace
batteries of the implanted BSUs.
• Another important issue is inter-operability. WBAN systems need to be scalable
and support seamless data delivery over various networks such as Bluetooth and
ZigBee. The smooth migration through networks is required to ensure ubiquitous
connectivity and coverage.
• The BAN sensors must have low complexity, small size and weight, and high
power efficiency.
• Interference should be regulated. Wireless links in a WBAN should reduce the
interference level to other physically close networks, and allow the coexistence
especially when WBANs are densely deployed.
The application requirements such as extreme energy efficiency and the unique
characteristics of the wireless channels, require novel solutions in resource manage-
ment and MAC protocols of WBANs. In the following, we present some networking
techniques and the studies of WBAN channels that could be used to address these
challenges.
(2) The BAN Standards
Multiple standards have been proposed for WPANs, such as Bluetooth [15, 16,
117] and IEEE 802.15.4 [89, 90, 97], which are candidate approaches to address the
challenges raised in WBANs. Comparisons of the traditional and new standards for
the WPANS and WBANS are listed in [19]. In addition to the WPAN standards such
as Bluetooth Low Energy, Bluetooth 3.0, UWB, and ZigBee, other proprietary and
open technologies such as Insteon, Z-Wave, ANT, RuBee, and RFID are introduced.
Insteon and Z-Wave are both proprietary specifications which define the mesh
networking and can be used for home automation. Z-Wave operates in the 2.4 GHz
ISM band, while Insteon utilizes both power lines and the 900 MHz ISM band.
ANT is another proprietary sensor networking technology, and it features the simple
protocol stack and low power consumption. ANT has been embedded in some
Nike shoes to collect workout data and talk to iPod by wireless connection. RuBee
and RFID are technologies to support asset management and tracking. They are
complimentary specifications by utilizing different frequency bands and battery life,
and used for different application scenarios.
These standards have all been implemented by application specific integrated
circuit (ASIC) and are being sold in comparable volumes each year. With the
advances in very large-scale integrated (VLSI) circuit, dual and even multi-standard
radios are integrated on a single chip, greatly reducing the cost and hardware system
complexity, which will boost the applications and deployment of WBANs.
38 2 MAC Protocols for High Data-Rate Wireless Networks
periods, the coordinator may employ slotted ALOHA and CSMA/CA for UWB
and narrowband PHYs, respectively. The MAP period is used for the allocation of
uplink, downlink or both. Type I polled and posted allocations which are used to
obtain scheduled allocations based on the access scheduling mechanism are also
transferred in MAP. A detailed description of these schemes can be found in [99].
In addition, IEEE 802.15.6 introduces a polling and posting mechanism which
is also referred to as “improvised and unscheduled access”. In this mechanism, the
coordinator informs the devices that they have been given time slots to transmit
or receive data exclusively. It can select the improvised access to transmit poll or
post commands. In this mode, a station may not perform pre-reservation or provide
notice in advance in the beacon mode or the non-beacon mode with superframe
boundaries. The commands can be employed to initiate the transactions of one or
multiple data frames transmitted by the nodes or coordinator outside the scheduled
allocation interval. Each device does not need to implement all of the access control
mechanisms, and it can just select only those suitable for its operation.
Reliability is another key consideration in many BAN applications, especially
when used for medical care. Considering that radio spectrum has been more and
more crowded, the mutual interference among a variety of wireless networks is also
increasing. The IEEE 802.15.6 task group has attempted to improve the robustness
against interference of WBANs from various aspects. First, FCC has approved
the allocation of 40 MHz of spectrum bandwidth for low-power medical BAN
(MBAN) in the band of 2360–2400 MHz.1 Thus the traffic from medical BAN can
be off-loaded from the already saturated ISM band of 2400–2500 MHz. Second, by
shifting or rotating the offsets of the beacon periods, the coordinator can switch the
scheduled slot allocation. Consequently, the impact of interference can be further
reduced. Third, the standard provides a dynamic channel hopping method which
allows the network to escape from the narrowband interference from other systems.
Finally, the standard has also specified a two-hop relaying by using a single relay
node. This mechanism can be used when the basic star network topology with
single-hop transmissions only cannot provide the necessary levels of reliability. For
example, when a person is blocking the LOS path between a pair of transceivers,
1
The 2360–2400 MHz frequency range is available on a secondary basis. As this spectrum is
primarily used for aeronautical telemetry, usage of the this frequency band is restricted to indoor
operation at health-care facilities and are subject to registration and site approval.
40 2 MAC Protocols for High Data-Rate Wireless Networks
the link may be attenuated too much due to the propagation obstruction to keep the
received signal power above the receiver sensitivity [120, 151].
In IEEE 802.15.6, energy utilization is increased via the mechanism of low-
power sleep mode. Sensor nodes can stay in the sleep mode for a long time (e.g., for
a number of beacon periods) before transmission/reception. Boulis et al. [17]
presented four MAC techniques that can be used to increase both the 802.15.6
system reliability and the energy utilization.
In summary, the 802.15.6 standard offers three PHY options and the hybrid mode
including different channel access scheduling methods by controlling their lengths
and places in a superframe. Therefore, it gives device manufacturers much flexibility
in a way to select the working mode which can satisfy the requirements on cost,
reliability, energy, etc., and make the tradeoff among these features according to the
target application scenario.
(4) The BAN Wireless Channels
Accurately modeling the WBAN channels is vital for researchers to evaluate
the network performance in realistic environments. For example, while the WBAN
signals are sent from one sensor to a coordinator, the signals propagating through
a body will experience attenuation, diffraction, and reflection around the body. The
power fading and temporal spread of the signals will degrade the reliability and rate
of data transmissions, in particular when sensors are located on various positions on
a body. As shown in [147], it is preferable that the packet error rate (PER) is smaller
than 1 %.
In the last decade, extensive efforts have been made to characterize the BAN
channels based on both measurements and simulations, in order to predict link
level performance and develop more effective antennas. These works have been
conducted in both the ISM bands around 400 MHz and 2.45 GHz and the UWB
spectrum between 3.1 and 10.6 GHz. In all of the bands, intra, on, and off-body
propagation environments are investigated [47]. Significant progress has been made,
such as the statistical models for the fading of BAN links. The channel models
for different body movements and poses with sparse or rich scatterers around
have been proposed. The multipath effects on signal transmissions have also been
investigated [122]. For example, the measurement results in [19] have demonstrated
the path loss for different body positions and frequency bands.
It has been shown that, compared with the UWB signals through the human body
conduction systems, narrowband wireless communication is debatably suitable for
the medical care applications. Within the spectrum of typical narrowband BANs, the
radio channel is essentially flat and slow fading, and the intersymbol interference
caused by multipath may be insignificant [6, 17]. The narrowband propagation
channel inside a body may be modeled by, for instance, the Rician fading with an
appropriate K-factor. The K-factor is the ratio between the average power of the
direct propagation path and that of the scattered/reflected paths, and it denotes the
channel fading level [113].
In the last decade the UWB channel modeling has drawn great interest and the
standardization bodies have put a lot of effort due to the much wider available
2.4 Summary 41
bandwidth. The standardized channel impulse response (CIR) models for UWB
channels have been developed, and typical modulation schemes have been evaluated
based on the channel models. For example, the authors in [154] conducted the field
measurements on a human body over 3.1–10.6 GHz in an indoor environment and
also in an anechoic chamber, and the path loss exponents under different conditions
were obtained.
By considering the attenuation, multipath effect, interference, and mobility in
wireless body channels, more applicable network structure, MAC protocols, and
routing mechanisms in BANs can be developed.
2.4 Summary
where Initial value of backoff counter is a random integer drawn uniformly in the
interval of Œ0; Wk 1 and aSlotTime is a constant time period defined as a PHY
parameter in the 802.11 standard. The initial window size is W0 D aCWmin C 1. In
IEEE 802.11b, the direct sequence (DS) PHY characteristics of aCWmin D 31 and
aCWmax D 1023 are specified and the time slot parameter is aSlotTime D 20 s.
The evolution of the CW size is shown in Fig. 3.1. This exponential backoff
mechanism can make one station wait longer on average after each collision, and
multiple stations defer and wait for random periods of time after the collision. The
station which has the smallest backoff counter will reach zero first and win the
contention. Furthermore, the expectation of the waiting time is doubled (or keeps
constant if it is large enough) for every retransmission. Thus the probability of
another collision among the competing stations is reduced after every collision
thanks to the larger CW sizes, which is the collision avoidance feature of the
protocol.
As illustrative examples, the operations of the DCF-like contention-based
channel access are demonstrated in Fig. 3.2. For easy presentation, the channel
access behaviors of two stations are illustrated, which can be described in three
scenarios.
3.1 Channel Access Mechanism 47
Fig. 3.1 An example of the exponential increase of CW size (direct sequence spread spectrum
(DSSS) PHY specification for the 2.4 GHz band designated for ISM applications in IEEE
802.11 [124])
collision
Fig. 3.2 The basic operation of DCF. (a) Successful frame transaction. (b) Successful collision
avoidance. (c) Collision occurrence
fourth time slot. As a result, the backoff counter of Station B is frozen during the
transaction of Frame A1 including the transmissions of both the data and ACK
frames.
Please note that Station B will not decrement the backoff counter even when
the channel is idle during the SIFS between the data frame and the ACK frame.
This is because Station B must sense the channel idle for DIFS before assessing
that the channel is idle. As defined in the DCF specification, SIFS is smaller than
DIFS. Thus the channel is busy again (due to the transmission of the ACK frame)
before the channel keeps idle for DIFS. Station B will not start/resume backoff
or transmit a frame during SIFS and hence the transaction of Frame A1 will not
be interrupted. After the transmission of the ACK frame, the channel is sensed
idle for DIFS, and Station B resumes decrementing its backoff counter. Starting
from the value of 4, the backoff counter is reduced to 0 after four idle time slots.
Then Station B sends out Frame B2.
Similarly, when Station B is transmitting Frame B2, the channel is sensed
busy by Station A so the backoff counter of Station A is frozen to avoid collision
with Frame B2. Again, after the transaction of Frame B2, the channel can be
sensed idle for DIFS, and Station A resumes decrementing its backoff counter.
Thus, collisions between the two competing stations are avoided.
• Collision Occurrence
Although collisions may be mitigated by using carrier sensing and backoff,
collisions can still happen in the contention-based MAC. As illustrated in
Fig. 3.2c, if the initial value of the backoff counter of Station A for Frame A2
is 4, then the two stations reduce their backoff counters to 0 simultaneously.
Consequently, they will transmit frames in the same time slot and a collision will
occur.
Since the frames cannot be received correctly, the targeted receivers will
not reply ACK frames. After timeout, Stations A and B will perform the next
backoff stage. They will double their CW sizes as described above (exponential
backoff) and draw the initial values for their backoff counters randomly. If their
initial values are different, the transmission time of the two stations will be
different. Thus their frames will not collide.
Otherwise, if they coincidentally select the same value from the CWs, they
will retransmit simultaneously and collide again. Then the two stations will
perform the next backoff stage. Since every time when a collision occurs, the
CW sizes are doubled. The probability that the two stations select the same
integer will be decreased exponentially. Therefore, the collision probability will
be reduced after every collision, which is an effective mechanism to resolve the
collisions among stations.
In a WLAN with heavy traffic load and a large number of stations, a frame
may encounter collisions even when the CW size is quite large. In this case, the
frame will be discarded when it has been retransmitted for a maximal number of
times.
50 3 Contention-Based Medium Access Control
As we can see, since the MAC parameters such as DIFS, aCWmin , and aCWmax
are fixed for all traffic flows of all stations, the flows are not differentiated and have
the same chance to access the channel. In other words, the priority in accessing
the wireless medium is the same for all flows. Therefore, by using the traditional
PHY and MAC sublayer mechanisms with fixed parameters for all traffic, the delay,
bandwidth, and throughput for all flows are the same statistically.
As discussed above, there is no built-in mechanism to support service priority,
guaranteed delay or throughput in the traditional CSMA mechanism. Furthermore,
802.11 DCF expends a considerable amount of airtime in managing channel access
such as backoff, collisions, and retransmissions. The collision, retransmission, and
stochastic backoff procedure lead to a high variance of the throughput and delay,
which is not suitable for delay-sensitive multimedia traffic.
To better support multimedia traffic, the basic CSMA mechanism can be extended
to provide service differentiation. The prioritized CSMA mechanism allows traffic
classes with higher priorities (such as the audio/video packets) to access channel
earlier. To support QoS in channel resource scheduling, traffic classification and
differentiated independent backoff entities need to be defined, as discussed in this
subsection.
(1) Access Categories (ACs)
Traffic flows are classified and prioritized according to their QoS requirements.
For example, four ACs with eight priorities are defined in IEEE 802.11e (see
Sect. 2.1 for details). The ACs are labeled according to their target applications,
including AC_VO (voice), AC_VI (video), AC_BE (best effort), and AC_BK (back-
ground). Usually the delay-sensitive traffic such as real-time voice and video data
is assigned high priorities, while the delay-tolerant traffic such as Email and file
transfer is assigned low priorities. Different parameter sets including interframe
spacing, CW size, and duration of transmission opportunities (TXOPs) are defined
and associated with the ACs to provide priorities in medium access contention.
In order to support the differentiated channel access for the four ACs, multiple
independent backoff entities should be implemented in one station. MAC service
data units (MSDUs) are backlogged in parallel backoff entities which contend for
channel access opportunities independently, using the differentiated AC-specific
parameters. The architecture for the four parallel backoff entities in an 802.11e
station is illustrated in Fig. 2.2 in Sect. 2.1.
3.1 Channel Access Mechanism 51
For example, for two traffic classes denoted by A and B, there are two ranges of
CW sizes: WA (between WA;min and WA;max ) and WB (between WB;min and WB;max ).
As proposed by Chesson et al. [25] and Benveniste [10], the values of CW size are
assigned such that the Wmin and Wmax of a low-priority class are larger than those
of a high-priority class. Since the backoff counter is a random number uniformly
distributed between Wmin and Wmax , the lower-priority traffic will select a larger
value on average, and vice versa. Thus, a flow with a higher priority needs to
wait for fewer idle time slots on average. Consequently it has a larger probability
to finish backoff process earlier and sends frames before lower-priority flows.
Therefore, the higher-priority frames have a better chance to obtain the TXOPs.
The ranges of the CW sizes can either overlap or not. If the CW ranges are
completely separated without overlapping, the higher-priority traffic has higher
chances to have transmissions before the lower-priority traffic. Varying CW sizes
for different ACs are realized by setting aCWmin ŒAC and aCWmax ŒAC for the
CW size limits. For example, the default values of the minimal and maximal CW
sizes defined in the EDCA Parameter Sets are listed in Table 2.3 in Sect. 2.1.
Based on the aCWmin ŒAC, the window size for each backoff stage is computed.
However, this solution may encounter the starvation problem. As the high-
priority traffic load increases, it tends to grab the channel persistently, preventing
the access by low-priority traffic.
aiming to ensure that the throughputs of flows in two traffic classes are in a given
ratio. With the mechanism used in [150], each traffic class gets the appropriate
portion of the bandwidth by regulating the waiting time, which is different from
the schemes that bind the channel access to priority.
Distributed fair scheduling (DFS) proposed by Vaidya et al. [130] maps traffic
classes into the backoff intervals instead of fixing the CW size ranges for different
priorities. The main idea of this scheme is to randomly select a backoff interval
which is positively relevant to the ratio of the packet length and the weight of a
frame.
There are also other proposals for incorporating QoS mechanisms with dis-
tributed protocols. In [131], the authors proposed the virtual MAC and virtual
source. A node could differentiate the resource allocation for voice, video, and
data. In [119], the authors proposed a scheme that split the transmission period into
two parts, one for real-time traffic and the other for non-real-time traffic. Thus, the
transmission opportunities for the former are guaranteed for QoS support, while the
basic contention-based MAC scheme was dramatically changed.
We focus on the EDCA-like prioritized MAC in the rest of this chapter because
it has been standardized by IEEE. The IEEE 802.11e EDCA [54] is a combination
of the approaches discussed above, using different IFSs and CW sizes to provide
service differentiation and priority.
Fig. 3.4 Illustration of the simulation network topology. The number of stations can be changed
to be 6, 12, 18, and 24
A standard OPNET 802.11b PHY module using DSSS scheme with maximum
data rate up to 5.5 Mbps is adopted. The PHY characteristics are set as follows:
aSIFSTime D 10 s, aSlotTime D 20 s, aLongRetryLimit D 7, and the TXOP
limit of 3:264 ms. We simulate the EDCA access process with varying AIFS and CW
size to evaluate their impact on the resource management and QoS provisioning.
Traffic (frames) of the three ACs are fed into the MAC layer from the
higher layer. The frame payload size of each AC is random in the range of
Œ1000; 2000 bytes with uniform distribution. In order to evaluate the effect of
contention parameter differentiation, the stations are saturated, i.e., there are always
frames backlogged in their buffers for transmission. Each station has a buffer of
32; 000 bytes for frame queueing.
The performance metrics evaluated are:
1. End-to-end delay. This delay includes the queuing delay in the source buffer and
the medium access time (i.e., the frame service time) for transmission over the
wireless channel. The queueing delay is the time interval from the moment a
frame arrives at the buffer (MAC service point) to when it becomes the head
of the queue. The service time is the interval when the frame begins to contend
for channel access to when it is successfully received. The delay for data frames
successfully received by the MAC and forwarded to the higher layer are also
56 3 Contention-Based Medium Access Control
counted. The average end-to-end delay refers to the average result of the end-to-
end delay of all the stations belonging to one AC in the simulation.
2. Station throughput. This is the per station throughput in the simulation. The
average station throughput is the average result of the throughput of all the
stations belonging to one AC.
a 20 b 0.25
Scenario 1 Scenario 1
18 Scenario 2 Scenario 2
Scenario 3 Scenario 3
End−to−end delay (seconds)
12 0.15
10
8 0.1
4 0.05
0 0
0 100 200 300 400 500 600 0 100 200 300 400 500 600
Simulation time (seconds) Simulation time (seconds)
Fig. 3.5 The evolution of the delay and throughput of a station of AC(0) for the five scenarios
of AIFSN configurations (total number of stations: 18). (a) Frame end-to-end delay. (b) Station
throughput
a7 b 0.14
Scenario 1
Scenario 2
0.12 Scenario 3
6
End−to−end delay (seconds)
Scenario 4
Station throughput (Mbps)
Scenario 5
0.1
5
0.08
4
0.06
3
0.04
Scenario 1
Scenario 2
2
Scenario 3 0.02
Scenario 4
Scenario 5
1 0
0 100 200 300 400 500 600 0 100 200 300 400 500 600
Simulation time (seconds) Simulation time (seconds)
Fig. 3.6 The evolution of the average delay and throughput of all stations of AC(0) for the five
scenarios of AIFSN configurations (total number of stations: 18). (a) End-to-end frame delay.
(b) Station throughput
a 7 b 0.45
0.4
6
End−to−end delay (seconds)
0.15
2
0.1
1
0.05
0 0
0 100 200 300 400 500 600 0 100 200 300 400 500 600
Simulation time (seconds) Simulation time (seconds)
Fig. 3.7 The evolution of the average delay and throughput of the three ACs (total number of
stations: 18; scenario index: 3). (a) End-to-end frame delay. (b) Station throughput
a 9 b 1.2
AC (0) AC (0)
8 AC (1) AC (1)
End−to−end delay (seconds)
AC (2) 1 AC (2)
Station throughput (Mbps)
6 0.8
5
0.6
4
3 0.4
2
0.2
1
0 0
6 12 18 24 6 12 18 24
Number of stations Number of stations
Fig. 3.8 The performance of the three ACs with respect to the number of stations (scenario
index: 3). (a) End-to-end frame delay. (b) Station throughput
As can be seen in Fig. 3.8, AC(2) has the smallest average end-to-end delay,
and AC(0) has the largest. Meanwhile the collision rate in channel access rises
resulting from the increased number of stations. It is clear that AC(2)’s delay
increases slightly, while the AC(0)’s and AC(1)’s delay increases more significantly.
Consequently, the throughput of AC(2) decreases relatively less than the other ACs.
The results show that varying AIFSN is effective in differentiating the channel
access priority. In addition, when the network load is increased, the highest-priority
traffic class can be protected and its channel access performance is not degraded
much, while the lower-priority traffic classes are more affected.
Figure 3.9 plots the average end-to-end delay and throughput of the three ACs
for the five scenarios defined in Table 3.1, and the number of stations equals 18. As
expected, AC(1) and AC(2) obtain more chance than AC(0) to access the channel
3.2 Performance Evaluation 59
a 7 b 0.4
AC (0)
6 AC (1) 0.35
End−to−end delay (seconds)
AC (2)
1 0.05
0 0
1 2 3 4 5 1 2 3 4 5
Scenario Index Scenario Index
Fig. 3.9 The performance of the three ACs with different AIFS configurations (total number of
stations: 18). (a) End-to-end frame delay. (b) Station throughput
resource. The average frame service time of both AC(1) and AC(2) decreases
because their AIFSNs are reduced. The performance of AC(0) deteriorates although
its parameters remain the same. This is because the AIFSNs of AC(1) and AC(2) are
both reduced and they obtain even more chances to win the contention and access
the channel. Since the channel resources are more occupied by these two ACs,
AC(0) has fewer transmission opportunities and thus its performance deteriorates
considerably.
a 16 b 0.2
Scenario 1 Scenario 1
Scenario 2 Scenario 2
14 Scenario 3 Scenario 3
End−to−end delay (seconds)
10
0.12
0.08
6
4
0.04
2
0 0
0 100 200 300 400 500 600 0 100 200 300 400 500 600
Simulation time (seconds) Simulation time (seconds)
Fig. 3.10 The evolution of the delay and throughput of a station of AC(0) for the four scenarios
of CW size configurations (total number of stations: 18). (a) Frame end-to-end delay. (b) Station
throughput
minimal CW size aCWmin is varying. The CW size of AC(2) is the smallest in each
scenario, which is in the range of ŒaCWmin ; aCWmax D Œ15; 1023. Therefore, it
should have the highest priority in channel access. The aCWmin of AC(0) is the
largest in the four scenarios, which is set to be 31, 63, 127, and 255. Hence AC(0)
has the lowest priority. The value of aCWmin for AC(1) is between the other ACs.
The AIFSN of all the ACs equals 7.
Figure 3.10 plots the instantaneous end-to-end delay and throughput of a station
of AC(0) in the four scenarios, when there are 18 stations. The horizontal axis
represents the simulation time in seconds. From Scenarios 1 to 4, as the CW sizes
of AC(0) and AC(1) are enlarged, the stations of AC(2) get more transmission
opportunities and thus less channel resources are allocated to AC(0). Consequently,
the frame service delays of the AC(0) stations become longer and their throughputs
decrease. The average results of the end-to-end delay and throughput of all the
stations of AC(0) in the four scenarios are plotted in Fig. 3.11. The channel access
performance is affected significantly by the setting of the CW sizes of the ACs.
The effectiveness of the differentiated CW sizes is illustrated by comparing the
frame performance of the three ACs. The evolutions of the average end-to-end
delay and throughput of all the stations in each AC in the simulation are plotted
in Fig. 3.12. There are 18 stations operating in Scenario 3, as listed in Table 3.2.
The performance of AC(2) is much better than those of AC(1) and AC(0), due to the
differentiated CW sizes.
Figure 3.13 plots the average end-to-end delay and the average throughput for
the three ACs with the CW size configuration of Scenario 3 given in Table 3.2,
and the number of stations increases from 6 to 24. As can be seen, the end-to-end
delay of AC(2) is the smallest and that of AC(0) is the largest, as expected. Because
more stations are competing for the channel resource and collision rate increases,
the transmission delay increases and the throughput decreases for all the three ACs.
3.2 Performance Evaluation 61
a 10 b 0.12
9
End−to−end delay (seconds)
0.06
5
4
0.04
3
2 0.02
0 100 200 300 400 500 600 0 100 200 300 400 500 600
Simulation time (seconds) Simulation time (seconds)
Fig. 3.11 The evolution of the average delay and throughput of all stations of AC(0) for the four
scenarios of CW size configurations (total number of stations: 18). (a) End-to-end frame delay. (b)
Station throughput
a 4 b 0.35
3.5
0.3
End−to−end delay (seconds)
3 AC (0)
AC (0)
0.25
AC (1) AC (1)
2.5 AC (2) AC (2)
0.2
2
0.15
1.5
0.1
1
0.5 0.05
0 100 200 300 400 500 600 0 100 200 300 400 500 600
Simulation time (seconds) Simulation time (seconds)
Fig. 3.12 The evolution of the average delay and throughput of the three ACs (total number of
stations: 18; scenario index: 3). (a) End-to-end frame delay. (b) Station throughput
Finally, Fig. 3.14 shows the average performance of the ACs in the four scenarios
and there are a total of 18 stations. It is also clear to see that the tendencies of
both the end-to-end delay and throughput of AC(2) are opposite to those of AC(1)
and AC(0). For example, in Fig. 3.14a, the end-to-end delay of AC(0) and AC(1)
increases from the Scenario 1 to 4, but that of AC(2) reduces. This indicates that with
the increase of the CW sizes of AC(0) and AC(1), AC(2) not only has the highest
priority in channel access but also obtains more channel resources (i.e., TXOPs).
Meanwhile, the performance of AC(0) and AC(1) deteriorates. The performance of
throughput can be analyzed similarly. Therefore, differentiating the CW size is also
effective in providing prioritized channel access.
62 3 Contention-Based Medium Access Control
a 4.5 b 1.2
AC (0) AC (0)
4 AC (1) AC (1)
End−to−end delay (seconds)
AC (2) 1 AC (2)
3 0.8
2.5
0.6
2
1.5 0.4
1
0.2
0.5
0 0
6 12 18 24 6 12 18 24
Number of stations Number of stations
Fig. 3.13 The performance of the three ACs with respect to the number of stations (scenario index:
3). (a) End-to-end frame delay. (b) Station throughput
a 9 b 0.5
AC (0) AC (0)
8 AC (1) 0.45 AC (1)
End−to−end delay (seconds)
AC (2) AC (2)
Station throughput (Mbps)
7 0.4
0.35
6
0.3
5
0.25
4
0.2
3
0.15
2 0.1
1 0.05
0 0
1 2 3 4 1 2 3 4
Scenario index Scenario index
Fig. 3.14 The performance of the three ACs with different CW size configurations (total number
of stations: 18). (a) End-to-end frame delay. (b) Station throughput
Rapid deployment of WLANs and the increasing QoS requirements have moti-
vated extensive performance studies of the contention-based MAC protocol in the
literature. Analytical models are important for performance prediction, protocol
optimization, and deployment of wireless networks. Throughput, delay, and capacity
analyses have been studied extensively. Among them, three major streams for
analytical models have been proposed, which are the Markov chain-based approach,
mean value analysis, and backoff counter distribution analysis. The guiding prin-
ciple behind these different models is actually common. The main differences
3.3 Analytical Modeling for Contention-Based MAC 63
are the approaches to finding the collision and transmission probabilities and
various choices of renewal cycles, as discussed below. Note that these methods are
essentially equivalent and can be transformed between each other.
In this subsection, we discuss the common features of these models, including the
basic principles, assumptions, and theories in all the analytical models. Then, the
three analytical approaches are introduced in details in the following subsections,
including their frameworks and related works. Interested readers are referred to the
references mentioned in this section to study more analytical models that have been
derived from these basic models.
(1) Homogeneous Access Probability Assumption
From the point of view of system characteristics, using the traditional MAC
protocols such as DCF, the flows are homogeneous because their backoff parameters
are identical. Nevertheless, the prioritized MAC protocols such as EDCA employ
various backoff parameters for different ACs. The differentiated CW sizes, backoff
multipliers, time to wait before restarting/resuming backoff (i.e., AIFS), or duration
of TXOPs result in the heterogeneity among the flows. Therefore, the flows in the
whole network are heterogeneous. However, the flows belonging to the same AC
are still homogeneous as they adopt the same set of contention parameters.
All of the three approaches assume that the stations of the same AC access an idle
channel slot with the same transmission probability and collision probability, and
they are actually equivalent and interchangeable with each other. The probabilities
are assumed constant in the steady state of a network.
For channel access analysis, the probability for the nth station belonging to the lth
AC to transmit a frame in a generic slot is a constant (denoted by n ). Similarly, the
probability for a frame of the nth station to have collision is usually assumed to be
a constant too (denoted by pn ). These are key parameters because the other channel
access statistics are derived based on them, as discussed in the following.
(2) Renewal Cycle Approach
In different analytical models, the renewal cycle is adopted, as shown in Fig. 3.15.
The statistics of the channel access behavior of a station (i.e., backoff counter
evolution process) are stationary in different cycles. This results in the fact that the
cycles are independent and the channel activity statistics are regenerated in every
cycle. The analytical models usually take explicitly or implicitly the time between
two adjacent successful transmissions from one station (or flow) as a renewal cycle.
The analysis is effective based on the fact that the channel access process for frames
repeats among the renewal cycles. It is further assumed that the behavior of a station
is homogeneous in each slot inside a renewal cycle. Based on the approximations
above, a WLAN using the contention-based MAC is a fixed-point system that can
be solved through numerical techniques. The throughput and other performance
metrics are derived based on the statistics of the renewal cycles.
At first, suppose that the retry limit of the nth station is Kn C 1 (a maximum
number of Kn retransmissions can be performed for a frame) and the indexes of
the backoff stage are k D 0; 1; 2; ; Kn . For example, the short retry limit is 7
64 3 Contention-Based Medium Access Control
ξ ξ +1 ξ +2
ξ ξ +1 ξ +2 ξ +3
while the long retry limit is 4 in the IEEE 802.11 specifications. Given that the
collision probability of the nth station is pn , the number of transmission trials in
a renewal cycle, denoted by Rn , follows a truncated geometric distribution. The
average number of the transmission trails, EŒRn , is given by
Let EŒBn;k denote the expected initial value of the backoff counter of the nth
station in the kth backoff stage, i.e., the average number of slots for the station to
experience in the stage. Then, the average number of backoff slots of a frame during
the whole backoff process, denoted by E ŒBn , is calculated as
1
X
E ŒBn D p0n .1 pn /E ŒBn;0 C p1n .1 pn / E ŒBn;k C
kD0
KX
n 1 X
Kn
C pKn n 1 .1 pn / E ŒBn;k C pKn n E ŒBn;k
kD0 kD0
2 3
KX
n 1 KX
n 1 KX
n 1
X
Kn
C pKn n E ŒBn;k
kD0
p0 .1 pKn n / p1 .1 pKn n 1 /
D .1 pn / E ŒBn;0 n C E ŒBn;1 n C
1 pn 1 pn
XKn
pKn 1 .1 pn /
C E ŒBn;Kn 1 n C pKn n E ŒBn;k
1 pn kD0
D E ŒBn;0 p0n E ŒBn;0 pKn n C E ŒBn;1 pn E ŒBn;1 pKn n C
X
Kn
C E ŒBn;Kn 1 pKn n 1 E ŒBn;Kn 1 pKn n C pKn n E ŒBn;k
kD0
"K 1 #
Xn
k KX
n 1 KX
n 1
D pn E ŒBn;k pn
Kn
E ŒBn;k C pKn n E ŒBn;k C pKn n E ŒBn;Kn
kD0 kD0 kD0
X
Kn
D pkn E ŒBn;k : (3.4)
kD0
The result in (3.4) is general in the sense that the CW sizes and the distribution of
the initial values of the backoff counter in the Kn backoff stages can be arbitrary.
The CW of the nth station in the kth backoff stage is denoted by Œ0; Wn;k with the
size of Wn;k C 1. As specified in the 802.11 standards, the CW size is exponentially
expanded by the persistence factor (PF) fn in the first Kn0 C 1 backoff stages (the
backoff stage indexes are 0; 1; ; Kn0 ) and keeps constant in the remaining Kn Kn0
stages (the backoff indexes are Kn0 C 1; Kn0 C 2; ; Kn ). Hence the CW sizes are
determined by
(
.fn /k Wn;0 ; 0 k Kn0 ;
Wn;k D Kn0 (3.5)
.fn / Wn;0 ; Kn0 C 1 k Kn ;
where Wn;0 D aCWmin ŒAC is the initial CW size for the AC of the nth station (e.g.,
as listed in Table 2.3 in Sect. 2.1). The 802.11 specifications have defined fn D 2.
Furthermore, it is specified in the 802.11 standards that the initial value of the
backoff counter is uniformly drawn from the CW (in the range of Œ0; Wn;k ) for the
kth backoff stage. Thus the initial value (average number of slots for the station to
experience) in the kth stage is
W
1 C 2 C C .Wn;k 1/ C Wn;k .Wn;k C 1/ 2n;k Wn;k
EŒBn;k D D D : (3.6)
Wn;k C 1 Wn;k C 1 2
66 3 Contention-Based Medium Access Control
For the 802.11 specification, by plugging (3.5) and (3.6) into (3.4), the average
total number of backoff slots for a frame to experience can be further derived as
Kn0 1
X XKn
k
E ŒBn D pn E ŒBn;k C
k
pn E Bn;Kn0
kD0 kDKn0
Kn0 1
X Wn;k Wn;Kn0 X
Kn
D pkn C pkn
kD0
2 2 0
kDKn
2 3
Kn0 1
1 4X X
Kn
k k 0
pkn 5
K
D p f Wn;0 C fn n Wn;0
2 kD0 n n 0 kDKn
2 3
Kn0 1
Wn;0 4 X 0 X
Kn
pkn 5
K
D .pn fn /k C fn n
2 kD0 0 kDKn
2 0 K Kn0 C1
3
0
Wn;0 4 1 .pn fn /Kn .pn fn /Kn 1 pn n
D C 5: (3.7)
2 1 pn fn 1 pn
collided frames. Hence, the slot duration is denoted by c;l where l is the priority
whose frame length is the largest. The duration of a busy time slot is calculated by
where EŒYl is the average payload length of the traffic with the lth priority, TPHY ,
TMAC , TDATA , and TACK are the average transmission time of the PHY header, MAC
header, payload, and ACK frame, respectively.
(4) Channel Access Zones in Prioritized MAC
As mentioned in Sect. 3.1.2, different AIFS intervals can be employed for ACs in
the prioritized contention-based MAC. A station starts/resumes counting down its
backoff counter after the channel is idle for the corresponding AIFS. An AC with
a higher-priority is assigned with a smaller value of AIFS so that the traffic flows
of this AC can reduce backoff counters and in turn access channel earlier than the
lower-priority flows. Consequently, channel access in some time slots is restricted
to a subset of flows with high priority only, and transmission/collision probabilities
will vary in different time slots.
Figure 3.16 illustrates the access zones of two ACs (AC2 has a higher priority
than AC1). Suppose that the AIFSs of the two ACs are AIFSŒ1 and AIFSŒ2
(AIFSŒ2 < AIFSŒ1). The time period between two adjacent busy time slots except
the AIFS for the higher-priority AC, AIFSŒ2, is divided into two contention zones.
In Zone 1, only AC2 stations can access the channel because the channel has been
idle for AIFSŒ2 but not for AIFSŒ1 (the AC1 stations are still waiting). The AC1
stations are allowed to transmit only in Zone 2 where all the stations belonging
to both AC1 and AC2 contend for channel access. Consequently, the competing
stations will confront different contention levels in these contention zones. Please
note that Fig. 3.16 can be extended to accommodate more ACs with different AIFS
values and contentions zones (see Fig. 1 in [60]).
(5) Fixed-Point Analysis of Channel Access
The fixed-point is an important concept in functional analysis [148] which has
been widely applied to determining the existence and uniqueness of solutions by
pure mathematicians. Fixed-point theorems give the conditions under which vari-
able mappings (by single or multi-valued mathematical functions) have solutions.
Over the last several decades, it has been found that the fixed-point theory is a
very useful and powerful tool in studying nonlinear systems. A diversity of fields
such as biology, chemistry, economics, engineering, game theory, and physics have
employed the fixed-point techniques. A well-known application of the Banach fixed-
point theorem is the Newton’s method proposed for nonlinear algebra equations.
The system using the traditional contention-based MAC is homogeneous because
all stations (flows) adopt the same backoff parameters (like IEEE 802.11 DCF). Due
to the symmetry, stations will have equal transmission probabilities and collision
probabilities in their backoff processes. Brouwer’s fixed-point theorem guarantees
68 3 Contention-Based Medium Access Control
Fig. 3.16 An illustration of the channel access zones for prioritized ACs. (a) One or more AC2
stations transmit in Zone 1. (b) One or more AC1 and/or AC2 stations transmit in Zone 2
that there exists a balanced, unique fixed-point solution for the behaviors of the
competing stations in a network [57]. Then the collision probabilities of all stations
correspond to the fixed point. Similarly, in a heterogeneous WLAN using the
prioritized MAC (like IEEE 802.11e), the flows belonging to the same AC are
still equivalent and should have common backoff behaviors in the steady state. It
has been shown that under certain conditions, the uniqueness of the fixed point for
both the homogeneous and heterogeneous networks can be ensured [108]. Then
the saturation throughput of the network can be calculated from the channel access
statistics of the stations at this unique fixed point.
As mentioned above, a WLAN using the contention-based MAC is a fixed-point
system. In the literature, the equilibrium channel access behavior of stations has
been analyzed and the existence of the fixed-point solution is discussed [127].
Let p be the vector of the collision probabilities of all the stations in a WLAN.
The collision probability of the nth station, pn , is determined by the transmission
behaviors of the other stations in a time slot, and is given by
Y
N
pn D Hn .1 ; 2 ; : : : ; N / D 1 .1 n0 /; n D 1; 2; ; N; (3.9)
n0 D1;n0 ¤n
When the system is in the equilibrium (steady) state, the parameters of the
backoff behaviors of the stations should satisfy the following equation set
p D H .G.p// ; (3.11)
Y
N
.1 pn / D Œ1 Gn0 .pn0 / ; n D 1; 2; ; N: (3.12)
n0 D1;n0 ¤n
Y
N
.1 pn / Œ1 Gn .pn / D Œ1 Gn0 .pn0 / ; n D 1; 2; ; N: (3.13)
n0 D1
We can see that the right-hand side of (3.13) is independent of n. Therefore, the
solution of the fixed-point equation in (3.11) should satisfy
.1 pi / Œ1 Gi .pi / D .1 pj / 1 Gj .pj / ; i; j D 1; 2; ; N: (3.14)
Equation (3.14) has provided a necessary condition for the solutions of (3.11).
In a homogeneous network using DCF, we have pi D pj for all 1 i; j N due to
the fairness of the protocol. The fixed point of a homogeneous IEEE 802.11 WLAN
is unique and also balanced. Under certain conditions (safe ranges of node backoff
parameters), a heterogeneous network using IEEE 802.11e EDCA has a unique fixed
point and obviously the solution of p is an unbalanced fixed point. In these cases,
the unique fixed point can capture the long-run average channel access operations
of the stations and accurately predict the saturation network throughput [108].
The specific fixed-point equations can be derived using different approaches/
models, as will be discussed in the following subsection. In a practical network, the
parameters and statistics of the channel access behaviors should be identical for the
stations belonging to the same AC, and otherwise for different ACs. In the numerical
70 3 Contention-Based Medium Access Control
solutions of the fixed-point equations, the results of only one representative station
of each AC need to be calculated. The numerical computations are repeated for the
representative stations of the ACs. Since the number of ACs is much smaller than
that of the stations, the computational complexity can be reduced considerably.
(6) Throughput
The aforementioned design principles in developing analytical models are unified
for both saturated (every station always has backlogged frames to transmit) and
unsaturated networks. It is worthy to notice that the calculation of throughput is
different for the two cases. For a saturated network, the per station normalized
throughput is just the ratio of the frame payload length (e.g., in bits) over the
frame service time (or end-to-end delay). This is because one frame is successfully
delivered in a renewal cycle. Therefore, the main task of the analytical models
is to obtain the average frame service time for each traffic class. The per-station
throughput of the nth station, denoted by n , is
The mean value analysis can be employed to study both the traditional non-
prioritized MAC protocols and the differentiated QoS-oriented MAC protocols for
both saturated and unsaturated networks. Kumar et al. [57] significantly simplified
and generalized the Bianchi’s model [12] for the IEEE 802.11 backoff mechanism.
In this work, the authors employed a one-dimensional fixed-point equation set for
the collision probability experienced by the traffic flows using DCF. To consider
unsaturated traffic and unbalanced traffic load often seen in a realistic infrastructure-
based WLAN, the mean value analysis of the IEEE 802.11 DCF has been developed
by Cai et al. [18]. The authors have obtained the conditional collision probabilities
and frame service rates of the access point (AP) and stations, respectively, and the
queue utilization ratio.
For prioritized MAC protocols, Ling et al. [60] further generalized the mean
value analysis framework to model the EDCA protocol in the steady state. The
system performance metrics such as the mean frame service time and the normalized
station throughput were obtained. Using this method, Liu et al. [63] studied the
performance of the prioritized channel access (PCA, defined in WPAN WiMedia-
368 standard, see Sect. 2.2) protocol. This work considered two user traffic classes.
The traffic of voice/video streaming and other multimedia applications has a higher
priority in channel access than the background data traffic such as file transfer.
The frame backoff and transmission procedure of a tagged station in either class
was modeled, and the probability generating function (PGF) of the frame service
time was obtained. Thus, the statistics of the system performance metrics could
be calculated. In order to analyze the differentiated channel access mechanism,
Ramaiyan et al. [108] extended the fixed-point analysis method for heterogeneous
networks, using the multidimensional fixed-point equations.
(3) Backoff Counter Distribution Analysis
The Markov-chain and the mean value analysis study the network performance
through per-slot statistics, such as the transmission and the collision probabilities
defined with respect to a generic time slot. An alternative modeling technol-
ogy, instead of relying on the per-slot transmission/collision probabilities, is to
characterize each competing station through the steady-state distribution of the
random backoff counter after one or multiple simultaneous transmission trials in
the network.
The value of the nth station’s backoff counter is a discrete-time discrete-state
random process, denoted by Bn .t/ where t is the index of the generic time slots of the
network. The activities of the wireless channel can be described in cycles and each
cycle is composed of an initial random waiting time (all stations are deferring due to
the contention avoidance) and a transmission slot where a frame may be successfully
delivered (if only one station transmits in the slot) or a collision happens (if two or
more stations transmit in the slot). The time instant when a packet transaction or a
collision finishes is the start of the next channel access cycle.
Let D 1; 2; 3; indicate the start of the channel access cycles. At the
beginning of a cycle, i.e., the time instant , the nth station (n D 1; 2; ; N) begins
to compete for the channel access and its operation in the current cycle depends on
3.4 Summary 75
its constant AIFS and the initial value of its backoff counter at the start of the cycle
which is denoted by bn ./. Obviously, the initial values bn ./ of all the stations
(n D 1; 2; ; N) determine the number of idle slots before the transmission event
and the transmission result (successful transaction or collision) at the end of the
cycle. The model is observed at the beginning of each contention cycle, i.e., the
discrete-time immediately before the expiration of the minimal AIFS after a channel
busy slot (transmission or collision event) in the network.
Due to the distributed nature and fairness of the contention-based MAC schemes,
two assumptions can be accepted. First, similar to the Markov-chain approach, the
decoupling approximation is assumed. At the time instant , the statistical behaviors
of the competing stations are independent from each other, and the statistics of the
channel access behavior of a station is determined by the distribution of its backoff
counter process at , i.e., bn ./. Second, the statistical distribution of bn ./ seen by
a station at the beginning of a cycle is independent from the specific cycle. In other
words, the statistics of the channel access behavior of a station (i.e., backoff counter
evolution process) are stationary in different cycles. This also results in the fact that
the cycles are independent and the channel activity statistics are regenerated in every
cycle. This principle is actually similar with the reward renewal cycle in the mean
value analysis discussed above. Based on these approximations, a WLAN using the
contention-based MAC is a fixed-point system that can be solved through numerical
techniques. The fixed-point solution is the distributions of the backoff counters at the
beginning of each cycle. The throughput and other performance metrics are derived
based on the statistics of the renewal cycles, as discussed in Sect. 3.3.1. Readers are
referred to [127] for the detailed derivation of the backoff counter distribution and
the performance metrics.
3.4 Summary
Distributed resource reservation has attracted great interest from academia, industry,
and standards organizations thanks to its advantages in guaranteed QoS pro-
visioning. Given the shared wireless media, contention-free protocols rely on
additional coordination among competing stations. With the bandwidth and delay
requirements, multimedia traffic often needs to reserve certain channel time. There
are two kinds of contention-free protocols. One is the centralized allocation, such
as IEEE 802.11 point coordination function (PCF) and IEEE 802.15 channel time
allocation (CTA), where one station is designated or elected as the piconet controller
and manages channel allocation. The other is distributed reservation protocols,
such as the WiMedia ultra-wideband (UWB) MAC, where each station exchanges
the channel availability information with neighbors through the broadcast beacon
messages in a well-defined superframe structure and negotiates with the destination
for channel allocation. The latter has advantages in scalability and fault-tolerance.
In this chapter, we show two reservation algorithms, subframe-fit and isozone-fit,
initially specified in [49] for the distributed reservation mechanisms. The analytical
models proposed in [31] are presented and validated by simulations using NS-2 and
an MPEG-4 traffic generator.
4.1 Introduction
Fig. 4.1 Typical channel resource reservation schemes in the time, frequency, and code domains
distributed inside a radio coverage area and share a common channel, they are
required to compete for opportunities to transmit their data. In contention-based
random access mechanisms, such as ALOHA and CSMA discussed in Chap. 3, the
channel access is controlled in a distributed manner and thus is quite flexible: each
user decides when to send its frames individually and independently. Nevertheless,
frame collisions among users can happen frequently which cause throughput and
service time variation. In particular, when traffic load is heavy, the contention-
based schemes suffer from serious collisions due to the severe contention, resulting
in drastically decreased throughput and increased delay. To guarantee bandwidth
and delay, real-time voice/video traffic often needs to reserve certain channel time
for contention-free transmission. Despite the contention nature of wireless media,
channel reservation can be done by additional coordination among competing
stations, and it can provide more stable throughput and delay. In the reservation-
based resource management, each user is pre-allocated an exclusive portion of
channel resources, such as bandwidth, time, or codes, and it can transmit frames
using the assigned resources only. The typical channel resource reservation in the
time, spectrum, and code domains are time division multiple access (TDMA),
frequency division multiple access (FDMA), and code division multiple access
(CDMA). The principles of the three reservation mechanisms are illustrated in
Fig. 4.1.
Combined with packet-based multiple access, the resource management by
reservation can effectively support QoS for integrated multimedia and data traffic
where several different ACs exist with various throughput and delay requirements.
For example, Cheng et al. [23] have investigated a wireless clustered mesh network
with an orthogonal frequency division multiplexing (OFDM) physical layer. In the
multi-channel environment within a cluster, by allocating subcarriers to different
stations, simultaneous transmissions are allowed and thus the network capacity is
increased. Meanwhile, subcarrier reservation and collision-free packet scheduling
can enable QoS provisioning for multimedia traffic. In addition, power allocation
for the subcarriers needs to be considered due to different channel fading charac-
teristics among the subcarriers. Therefore, a joint power-subcarrier-time resource
4.1 Introduction 79
its own assigned time slot(s). Inter-user interference is prevented by strict adherence
to time slot schedules, and by guard times and time-alignment procedures which
prevent overlaps even with different propagation times.
A channel time scheduling frame (usually called “superframe”) generally con-
tains a number of time slots which are the units for time allocation. A time slot
can accommodate user data bits (perhaps including channel coding bits for error
detection and correction) and extra bits for synchronization, adaptation, control,
guard time, etc. The smaller the fraction of the frame devoted to these “overhead”
bits, the more efficient is the TDMA frame design. For instance, in the GSM, PHS,
and DECT systems, about 30 % of the total transmitted bits are for overhead. The
IS-54 and PDC systems, on the other hand, incorporate roughly 20 % extra data
bits for overhead. Most of the overhead in the GSM and IS-54 systems is the
training sequences for the adaptive equalizer, while in DECT the major portion of
the overhead is used for system control [39]. For a given amount of overhead, higher
efficiencies could in principle be achieved by increasing the time slot duration (to
reduce the portion of the overhead in the total data rates or channel time). However
this may have the adverse effects of increasing the total transmission delay for time-
sensitive traffic and hampering the system’s ability to adapt to rapid changes in the
fading environments. Goodman [46] provides a comprehensive description of the
frame structures of several TDMA systems.
TDMA has several advantages compared with other reservation-based multiple
access techniques. Working at the same carrier frequency, the networking devices
can employ the common radio frequency (RF) and modulation/demodulation
equipment. Thus the complexity and cost for the hardware systems are reduced
significantly. Another advantage is that, by allocating more or fewer time slots to
each individual station, it is convenient to adjust the bit rates for users according
to their instant traffic load and QoS requirements. This is especially desirable for
supporting integrated services. Compared with CDMA, TDMA does not require
strict power control for the near-far effect, since inter-user interference is avoided
by using alternative time slots instead of by processing gain obtained from spectrum
spreading.
(2) MAC Protocols for Channel Reservation
Polling and reservation are two strategies for contention-free MAC protocols,
and the latter can be more efficient and are often used to provide QoS guarantees for
delay-sensitive traffic over wireless links.
By using reservation-based MAC protocols, priorities in channel access and
resource utilization can be conveniently provided in the reservation allocation
stage. Several resource allocation schemes have been designed. The resource
management strategy suggested in some protocols is that all low-priority flows
should refrain/backoff from transmission until all higher-priority flows have already
successfully accessed the channel [72, 121]. Some other protocols, however, adopt
the policies which are less restrictive to low-priority flows [27, 58]. According to
these schemes, low-priority flows are allowed to contend for channel access against
high-priority flows. But, the low-priority flows are required to wait for longer time
4.1 Introduction 81
There are also some research efforts on such distributed reservation protocols. On
one hand, the performance of DRP with arbitrary slot reservation was analyzed. Wu
et al. [140] have proposed a two-dimensional Markov chain to analyze the delay
performance of DRP under a given reservation pattern. The model can only deal
with hard reservation which is not suitable for delay-sensitive traffic with bursty
arrivals. In [64], Liu et al. have investigated the performance of DRP in a more
realistic scenario where the time slots are reserved non-uniformly in superframes
and the communication link between a pair of transceivers is obstructed by a
person (body shadowing). A cross-layer analytical model was proposed where the
UWB multipath channel with shadowing was modeled by a finite-state discrete-
time Markov chain. In addition to the time-varying channel state (channel fading),
the reservation protocol and the induced reservation pattern in a superframe also
affected the protocol performance. In order to analyze the frame delivery of a flow
with arbitrary reservation pattern, the analytical model was developed based on the
vacation queuing process where the interval between two reservation periods was
regarded as the vacation period of the flow. The impact of the reservation pattern on
the DRP performance was revealed in this work. Liu et al. [62] have further studied
the impact on delay by different reservation patterns for UWB MAC taking into
account the wireless shadowing channel. By cross-layer analysis, Zhang et al. [152]
developed a general analytical framework which incorporates the UWB channel
fading, joint error control (adaptive modulation and coding, auto-repeat request,
and packet fragmentation), and arbitrary reservation pattern in superframes. Based
on this model, the frame queueing process was analyzed and the link delay and
loss performance was quantified. On the other hand, the reservation algorithms
have been studied by Daneshi et al. in [29, 31] and [30]. The authors proposed
two heuristic reservation algorithms to meet the application QoS requirements and
ensure efficient channel utilization, which will be discussed in more details in the
following sections.
Resource allocation has been extensively studied in the field of operating systems
for memory and disk management [134]. For memory allocation, paging-based
approaches become predominant with fixed-size memory pages, and only the
request size is considered due to the direct access of main memory devices.
Although the location of disk blocks may affect the access delay, such difference
is often ignored in disk management. In the context of distributed reservation
protocols for wireless links, e.g., WiMedia UWB MAC, not only the size of the
reservation, but also the tolerable delay should be considered. The constraints on
where the reservation blocks can appear and how large they can be also introduce
new challenges for reservation allocation algorithms.
To design broadband wireless multimedia communication systems using TDMA
technologies, we must take the following requirements into account:
4.2 Distributed Channel Reservation Mechanisms 83
the block cannot have more than four MASs; when starting before row 4 or
after row 11, the block size can be larger or smaller than 4, respectively. For a
particular reservation, row components (i.e., those containing reservation blocks in
all columns) should be in the lower portion of the superframe matrix, and column
components (i.e., all but row components) should be in the upper portion of the
superframe as much as possible. Figure 4.3 shows three ways of reserving 16 MASs
in the superframe. Compared with the reservation Scheme 1, Scheme 2 has a smaller
block size but is more evenly distributed. Scheme 3 is a row component with blocks
in all columns of the bottom row.
We need to create a reservation strategy for WiMedia MAC to assign MASs
to flows based on their QoS requirements. Thus, we first need to determine how
many slots are needed for a flow according to its delay requirement, which will be
used by the reservation algorithm to find a feasible reservation. Upon a successful
reservation, the owner will inform other UWB stations by updating the reservation
bitmap in beacon messages. The reservation shall guarantee the service rate between
the minimum and maximum ones requested by a flow and meet its maximum
tolerable delay.
(2) Reservation Approaches
Making a reservation of network resources for video flows over WiMedia UWB
channels requires the determination of the number of MASs needed and their
locations within the superframe. The number of slots needed per superframe can
be derived from the flow’s traffic specification (TSpec). Delay requirement of each
flow, specified in the TSpec, is defined as the maximum delay each packet of the
flow can tolerate from the time it arrives at the MAC layer till it is transmitted.
Satisfying the delay requirement for video traffic then depends on the service rate
(due to the queuing delay) and the location of the reserved slots (due to service
interval).
86 4 Resource Reservation
To obtain the number of required slots for a reservation, Daneshi et al. used the
approach of equivalent bandwidth (EBW) in [31]. The EBW function characterizes
the bit rate required to be reserved for a given flow with regard to its TSpec. More
precisely, for a flow with a cumulative arriving function R over the time and for a
fixed but arbitrary delay D, we can define the effective bandwidth g D f .R; D/ of
the flow as the bit rate required to serve the flow in a work-conserving manner, with
a delay bound of D.
There are different EBW functions in the literature, and in [31], the authors used
a computationally simple approximation. The required bandwidth allocation, g, for
a traffic source with a given overall flow loss ratio Ploss is suggested in [109] as:
g D a1 r C a2 2 =C, where C is the channel capacity, r and 2 are the mean and
variance of the traffic bit rate, respectively. We have 2 D r.p r/ where p is the
peak source rate. For the coefficients a1 and a2 , [109] has suggested the following
empirical approximation:
In (4.1), Ploss can be chosen based on the acceptable packet loss ratio for the type
of traffic under consideration. We here set Ploss D 0:01 for MPEG-4 video traffic
with error concealment decoding. With this approximation for the service rate, a
flow is guaranteed to be transmitted between its minimum and maximum requested
data rate. Once g is obtained, the number of slots needed can be determined by the
channel data rate and protocol overhead.
(3) Reservation Algorithms
Although the DRP in WiMedia MAC is very flexible, the standard only spec-
ifies the physical-layer and fairness constraints on possible allocations, not the
reservation algorithms and their performance. As discussed above, the WiMedia
superframe is treated as a two-dimensional matrix, and the maximum number of
slots can be reserved is row/column-dependent. To make the tradeoff between
allocatable slots and the intrinsic delay among them, we should model, analyze,
and evaluate the two reservation algorithms, subframe-fit and isozone-fit proposed
for distributed reservation in WiMedia MAC. Subframe-fit tries to follow the one-
dimensional allocation and replication strategy by taking the reservation size and
delay into account, while isozone-fit takes one step further to meet the WiMedia
allocation constraints as well by following a two-dimensional allocation strategy.
Thus, subframe-fit provides an optimistic bound for all WiMedia-compliant alloca-
tion schemes.
• Subframe-Fit Algorithm
The subframe-fit algorithm only considers the size and delay requirements of
a flow. It does not take all the WiMedia MAC rules into account, which makes
the algorithm computationally simple and provides an optimistic upper bound for
4.3 Modeling and Analysis 87
achievable performance. Knowing how many time slots (denoted by m) a flow needs
to reserve in addition to its delay requirement (denoted by d), the algorithm divides
the superframe into subframes of length C0 D bC=kc time slots each, where C is the
number of time slots in the superframe, k D dT=de and T is the superframe duration.
Accordingly, the algorithm divides the request into subflows, each requesting dm=ke
time slots per subframe. Then it tries to fit each of these subflows in the appropriate
subframe. A reservation can be made only if all of the subflows of a flow can be
reserved.
Although subframe-fit is not fully compliant with the WiMedia MAC, its
performance can be investigated as a baseline, since it provides an optimistic bound
for all WiMedia-compliant algorithms such as isozone-fit. It also allows us to
evaluate the performance penalty of WiMedia MAC policies to ensure fairness, and
to investigate possible improvements of isozone-fit.
• Isozone-Fit Algorithm
With the number of slots required (m) and also the delay requirement (d), the
isozone-fit algorithm starts from the isozone that has the closest natural service
interval to the flow’s tolerable delay (excluding the queuing delay) and searches
through the superframe starting from that isozone for available slots. Isozone-fit
tries to keep the superframe symmetric and well-structured, i.e., it allocates the
blocks of the same flow in the same row of different columns. If a flow leaves
and releases its reserved time slots, the superframe will still be well-structured. By
keeping reservations symmetric, it may block some reservation requests, but future
flows can fit easily and the superframe will have less fragmentation. This algorithm
also follows the reservation rules of the WiMedia standard, which limits both the
size of the reservation blocks and their possible locations in the superframe.
The basic isozone-fit algorithm only keeps one request in the current isozone,
if the request can be accommodated; otherwise, the request will be dropped (or
overflowed) to the next isozone with a higher isozone index, which normally has
more available slots and tighter service interval and hence a better chance to
accommodate the request. In the next section, we will further evaluate the case
where one request can be accommodated in multiple isozones at the same time.
In this section, the analytical models for the ECMA MAC introduced in the previous
section are presented. Since the reservation algorithms aim to support bursty traffic
such as compressed video, we first specify how to handle traffic offered to the
system. Then, the analytical models proposed in [31] for the two channel reservation
algorithms, subframe-fit and isozone-fit, are presented.
88 4 Resource Reservation
i zi
wi;1 D ai ;
i 1
zi 1
wi;2 D ai : (4.2)
i 1
X
n
xPx;j D wi;1 Pxmi C wi;2 Pxi mi ; 0 < x C0 ; (4.3)
iD1
4.3 Modeling and Analysis 89
C ′= C / k
(a, z, m ′ = m / k )
k = [T / d ]
(a, z, m, d )
because wi;1 and wi;2 have the request size of mi and i mi , respectively, and each
slot of the subframe with C0 slots is treated as a stream. The boundary and unit
P 0
conditions for Px are Px D 0 for x < 0, and CxD1 Px D 1. The condition x < 0 is
used for computation purposes only. For notation convenience, Qx D P.X > x/ D
1 P.X x/, Qx1 D Qx C Px1 ; 1 x C0 , and QC0 D PC0 . Thus the blocking
probability of each stream is given by
wi;1 QC0 mi C1 C wi;2 QC0 i mi C1
bi D ; (4.4)
ai
i.e., for any new incoming request when any subframe is full, it will be dropped.
Accordingly, the carried traffic of each stream is computed as xPx , and the total
carried traffic is
0 0 0
X
C X
C X
C
cD xPx D x .Qx1 Qx / D Qx : (4.5)
xD0 xD0 xD0
u D c=C0 : (4.6)
X
n
ˇD bi : (4.7)
iD0
90 4 Resource Reservation
c0
α0
c1
(a ,z ,m ,d ) α1
c2
α2
c3
α3 β
P Cj
where Px;j D 0 for x < 0, and xD1 Px;j D 1. Again, the condition x < 0 is used for
computation purposes. For notation convenience, Qx;j D Pj .X > x/ D 1 Pj .X
x/, Qx1;j D Qx;j C Px1;j ; 1 x Cj and QCj ;j D PCj ;j . The blocking probability
of each stream for each class is
wi;1 QCj mi C1;j C wi;2 QCj i mi C1;j
bi;j D ; (4.9)
ai
if flow i is offered to class j; otherwise, bi;j D 0: Thus, the total blocking probability
of this class is computed as
X
n
˛j D bi;j : (4.10)
iD0
X
Cj
X
Cj
X
Cj
cj D xPx;j D x.Qx1;j Qx;j / D Qx;j : (4.11)
xD0 xD0 xD0
When the flow cannot be served by the initial class, the class with a higher
isozone index can be used as an alternative for the overflowed traffic. Therefore,
the traffic to the next class is no longer Poissonian. Wilkinson initially modeled
the overflowed traffic based on equivalent random theory (ERT). For each class,
if the blocking probability is greater than zero, the overflowed portion of the
requests is offered to the next class. The ERT theory is to approximate the
traffic by a Pascal (negative binomial) distribution. After that, Delbrouck [32]
found the parameter similarities between Pascal and Bernoulli distributions and
their convergence to Poisson distributions. It is then possible to use a unified
approximation procedure to estimate the main congestion functions of peaky traffic.
To determine the parameters of the overflowed traffic from a primary class to an
alternative, the Wilkinson’s approximation is utilized. In this model, which is based
on the Riordan’s formula [133], the moments of the marginal distribution are derived
from the Erlang’s B recursive formula as
aEx1 ai;j
Ex ai;j D ;
x C aEx1 ai;j
E0 ai;j D 1; (4.12)
92 4 Resource Reservation
where ai;j is the offered load and x could have any value between 0 and the maximum
server capacity Cj . Based on the Erlang’B formula, the approximation for the mean
(a0i;j ) and peakedness (z0i;j ) of the overflowed portion is given in [133] as
Glabowski’s model [45] has extended the Wilkinson’s formula to match the
multi-rate traffic by
X
Cj
Vi;j D Cj cl;j ; j D 0; 1; 2; 3;
lD1;l¤i
ai;j
z0i;j D 1 a0i;j C ; (4.14)
Vi;j =mi;j C 1 ai;j C a0i;j
where Vi;j is defined as the part of class j’s capacity that is not occupied by the
carried requests and cl;j is the lth flow’s traffic carried by class j.
The same method used from (4.3) to (4.11) can be used in each individual class to
compute the carried traffic and blocking probability of that class. The total blocking
probability of the system is actually the dropping probability of the last class.
Therefore, the system blocking probability ˇ is equal to ˛3 . System utilization is
computed by using the ratio of the total traffic carried by the system and the total
system capacity, i.e.,
P3
jD0 cj
uD : (4.15)
C0 C C1 C C2 C C3
In this section, we present the analytical and simulation results of the subframe-fit
and isozone-fit algorithms and validate their models presented in Sect. 4.3.
(1) Simulation Scenarios
The simulation tool is NS-2 version 2.33 [70] with added WiMedia DRP MAC
module. An MPEG-4 video traffic generator [68] contributed to NS-2 is used to
generate video streams at different data rates for homogeneous or heterogeneous
traffic. To regulate the traffic according to the TSpec, each video traffic generator is
attached to a twin-token bucket filter (i.e., a traffic shaper) [135]. The filter follows
the traffic parameters of the video source, and we gather these parameters from the
video trace file. For the simulation, a WPAN scenario is used for IPTV in-home
4.4 Performance Evaluation 93
7
Model-Homo
Sim-Homo-D=0.03
Model-Hetero
Blocking probability (%) 6 Sim-Hetero-D=0.03
0
0 5 10 15 20 25 30 35 40
Offered load (# of concurrent flows)
Fig. 4.6 Blocking probability of the subframe-fit algorithm and model [31]
distribution. Ten UWB stations are located on the circumference of a circle with a
radius of 15 m. An access point (AP) is located at the center of the circle. All stations
are in the one-hop transmission range of the AP, and we assume that the channel is
ideal due to the short distance inside a house and the strong error recovery ability in
UWB. All stations transmit video traffic to the AP at 480 Mbps.
(2) Subframe-Fit Performance
The analytical results are obtained following the approaches in Sect. 4.3 and
are compared with the simulation results to validate the system model. In the
analysis, requests are assumed to have a fixed size, and only the SI is considered.
In simulation, both the queuing delay and the SI delay are considered for the
maximum delay bound. The request size is determined by the traffic generator and
the reservation algorithms. All simulation results presented in this section are the
average of 15 runs. Error bars show 95 % confidence interval for the mean value.
If the error bars are too small, they are not shown in the figures.
Figure 4.6 shows the blocking probability for the subframe-fit algorithm (Sim)
and the subframe-fit model (Model) for both homogeneous (Homo) and heteroge-
neous (Hetero) traffic scenarios with a fixed delay of 30 ms. In the analysis, the
subframe’s length is computed based on the delay requirements of the flows, which
limits the subframe-fit model to work only with the fixed delay value for all flows.
Based on the traffic specification, in the homogeneous scenario, the video flow
requires on average six time slots per superframe for its bandwidth requirement.
In the heterogeneous case we have used nine video flows, where stations pick
one of them for transmission based on a uniform distribution. The flows require
Œ2; 10 time slots. As shown in the figure, the subframe-fit model closely captures
94 4 Resource Reservation
90
Model-Homo
Sim-Homo-D=0.03
80 Model-Hetero
Sim-Hetero-D=0.03
70
System Utilization (%)
60
50
40
30
20
10
0
0 5 10 15 20 25 30 35 40
Offered Load (# of concurrent flows)
Fig. 4.7 System utilization of the subframe-fit algorithm and model [31]
the blocking probability of the algorithm. When the offered load is increased to
40 requests, if all requests were accepted, the system would be fully utilized.
However, due to the delay bound constraints, not all requests can be accommodated,
leading to a considerable blocking probability. The algorithm can perform better
when there are variable-size flows, since they can “fill” the gap due to fragmentation,
which explains that homogeneous scenarios indeed have worse performance.
Figure 4.7 shows both the analytical and simulation results of the system
utilization. As discussed above, the subframe-fit model captures the properties of
the real behavior. In the heterogeneous case, flows on average need six time slots
but the superframe can be better utilized when the requests have variable sizes.
(3) Isozone-Fit Algorithm
In the following we present the results of both simulation and analysis for the
isozone-fit algorithm, under both homogeneous and heterogeneous traffic scenarios
as well as fixed and variable delay bounds. In the variable delay case, flows may
have a delay requirement uniformly between Œ10; 50 ms.
Figures 4.8 and 4.9 show the blocking probability and system utilization of both
homogeneous (Homo) and heterogeneous (Hetero) traffic with fixed and variable
delay bound (D).
We can see from these two figures that the analytical model can capture
the properties of both homogeneous and heterogeneous cases closely. Also the
heterogeneous case has a better performance compared with the homogeneous
scenario. Variable request sizes can better utilize the superframe. On the other hand,
the performance with a variable delay bound is not as good as that with a fixed
delay bound. Even though the superframe has empty time slots, flows with tight
4.4 Performance Evaluation 95
40
Model-Homo
Sim-Homo-D=0.03
35 Sim-Homo-D=variable
Model-Hetero
Sim-Hetero-D=0.03
30 Sim-Hetero-D=variable
Blocking probability (%)
25
20
15
15
12
10 9
6
5 3
29 29.5 30 30.5 31
0
0 5 10 15 20 25 30 35 40
Offered load (# of concurrent flows)
Fig. 4.8 Blocking probability of the isozone-fit algorithm and model [31]
90
Model-Homo
Sim-Homo-D=0.03
80 Sim-Homo-D=variable
Model-Hetero
70 Sim-Hetero-D=0.03
Sim-Hetero-D=variable
System utilization (%)
60
50
40
70
30 68
66
20 64
10 62
29 29.5 30 30.5 31
0
0 5 10 15 20 25 30 35 40
Offered load (# of concurrent flows)
Fig. 4.9 System utilization of the isozone-fit algorithm and model [31]
delay bounds cannot be carried, and therefore we see a higher blocking probability
for these cases (later we will show the improvement of isozone-fit to reduce the
blocking probability).
In terms of the system utilization, the performance of the isozone-fit algorithm is
not as good as the subframe-fit algorithm. The subframe-fit algorithm only considers
the request sizes and their delay requirements whereas the isozone-fit specifically
96 4 Resource Reservation
14
12
10
Percentage (%)
0
0 5 10 15 20 25 30 35
DRP delay (ms)
follows the WiMedia MAC policies on block sizes and locations, which indicates
that subframe-fit gives an optimistic bound for all WiMedia-compliant schemes.
(4) Delay Analysis
We study the delay that a flow will experience due to the reservation, which is an
important performance metric in QoS provisioning. In the TSpec, flows specify the
maximum tolerable delay. This delay is from the time when a packet arrives at the
MAC layer till it is transmitted, which includes any queuing delay and the SI in DRP.
Figure 4.10 shows the delay distribution in isozone-fit (m D 6 and D D 30 ms). As
we can see from the figure, the majority of the packets encounters a delay due to
DRP (both queuing delay and SI) well below the bound. Only 0.26 % of the packets
(13 out of 5035 packets from the simulation trace) are slightly above the bound (the
maximum packet delay is 30.7 ms), which is due to the EBW estimation in Sect. 4.3,
but the delay outage probability is still below the chosen Ploss (1 %).
In [31], the authors proposed new algorithms to support video streaming over UWB
networks. By introducing cross-isozone allocation and on-demand compaction, the
performance of isozone-fit is further improved in terms of both blocking probability
and system utilization. These methods help to accommodate more flows and also
achieve a better utilization of the superframe.
4.5 Reservation Performance Improvement 97
where xj is the block size of the request in isozone j and isozone j has 2j columns
(or zones). Based on the value of d and the natural SI of each isozone, the block
size of xj , where j is the isozone index with the SI less than or equal to the requested
delay, should be nonzero. Block sizes with indexes higher than j are initially set to
zero. To implement this heuristic approach, a recursive search method is added to
the algorithm, which is designed according to the request size and isozone index.
The pseudo-code of this method is listed in Algorithm 1.
20 Model-Hetero
Sim-Isozone
Sim-Split
Sim-Isozone-Compact
Sim-Cross-Isozone
15 Sim-Cross-Isozone-Compact
Blocking probability (%)
10
8
6
4
5 2
0
29 29.5 30 30.5 31
0
0 5 10 15 20 25 30 35 40
Offered load (# of concurrent flows)
100
Model-Hetero
Sim-Isozone
90 Sim-Split
Sim-Isozone-Compact
80 Sim-Cross-Isozone
Sim-Cross-Isozone-Compact
70
System utilization (%)
60
50
85
40
80
30
75
20 70
10 65
29 29.5 30 30.5 31
0
0 5 10 15 20 25 30 35 40
Offered load (# of concurrent flows)
Table 4.1 shows the average reservation processing time per flow for hetero-
geneous traffic with a fixed delay of 30 ms. The simulations were performed on
a quad-processor Intel(R) Xeon(R) computer with 2.66 GHz CPU, 4 GB RAM,
and Scientific Linux SL release 5.2. Subframe-fit has the smallest running time
as expected. Compared with isozone-fit with compaction-only, all other isozone-
fit algorithms reduce the running time due to the well-structured superframe which
makes the reservations easier to fit.
4.6 Summary
In this chapter, we have discussed the principles and challenges in the reservation-
based MAC for QoS provisioning. With emphasis on the distributed reservation
protocols, we use WiMedia UWB MAC as an example and analyze two algorithms,
subframe-fit and isozone-fit. Equivalent bandwidth theory, non-Poissonian traffic
decomposition, and the approximation of overflow traffic in multi-class-traffic,
multi-class-server systems, have been used for analytical modeling of the channel
time reservation. Network simulation and MPEG-4 traffic generator have been
4.6 Summary 101
To reserve or not for bursty video traffic over wireless access networks has been
a long-debated issue. Reservation can ensure QoS provisioning at the cost of lower
resource utilization. Contention-based MAC is more flexible and efficient in sharing
resources for bursty traffic by a higher multiplexing gain, but the QoS may degrade
severely with the increase of traffic load. In wireless networks using hybrid MAC,
nodes can reserve time periods inside scheduling cycles and the time not reserved
can be used by all stations through contention-based access. The hybrid MAC is
attractive because each video source reserves well below its peak data rate and
uses contention-based media access to transmit the remainder/bursts of the traffic.
Thus, satisfactory QoS may be provided by resource reservation and high channel
utilization can be achieved due to the multiplexing gain in the contention periods.
In this chapter, we first introduce the hybrid hard and soft-reservation schemes
and then present the analytical models. We illustrate how to use the mean value
analysis approach to calculate the collision probability and the average service
time of a frame. Furthermore, using the standard WiMedia MAC protocols as an
example, extensive simulations using NS-2 and real video traces are given which
verify the analysis and demonstrate the effectiveness of the hybrid MAC. The results
show that the hybrid MAC, especially with soft reservation, has much better delay
performance and higher capacity (supporting more video streaming flows) than the
contention or reservation-only MAC.
TC TS Δ
TK
φ
TA TV δ
TF
TI
TY
(MIFS), while the B-ACK frame is separated by an SIFS to allow the transmis-
sion/reception mode switch of the involved stations. Following the B-ACK is a
guard time (GT) in order to separate the reservation and contention periods. The
burst size is determined such that the burst transaction (including B-ACK and GT)
should be finished within the reserved time. In the burst mode, the duration for
a frame transaction is B D TDATA C MIFS. Such burst transmission can reduce
protocol overheads and increase channel utilization.
During TC , a station obtains the TXOP when the backoff counter is decreased
to zero. A single transaction with an immediate-acknowledgement (I-ACK) may be
completed in the TXOP. The duration is D TDATA CSIFSCTACK , where TDATA and
TACK are the transmission time of a data frame and the I-ACK frame, respectively.
The novelty of hybrid MAC is to reserve well below the peak data rate and
handle traffic bursts using contention-based channel access, aiming to fully utilize
the reserved channel time and reduce the traffic load for competition during the con-
tention periods (reducing the collision probability and backoff time). Consequently,
the hybrid approach can provide better QoS and also increase network capacity (i.e.,
supporting more flows) by more efficient channel contention.
(3) Conflict Avoidance
The contention-based access in hybrid MAC follows the CSMA/CA and expo-
nential backoff schemes such as the IEEE 802.11 DCF protocol. However, the
contention is even more complicated compared with the traditional contention-only
MAC due to the presence of the reserved channel time slots.
1. A station shall freeze its backoff counter once the medium becomes busy (during
frame transactions) or unavailable for contention (during reserved periods). The
station shall wait the channel to be in the contention-access period and sense
106 5 Hybrid Medium Access for Multimedia Services
idle for an AIFS before starting to decrement the backoff counter. Therefore, the
reservations enlarge the backoff slot and service time of the contention-based
access considerably.
2. When a station obtains a TXOP, it needs to ensure that the whole frame
transaction finishes at least one SIFS plus one GT before the beginning of
the incoming reserved period. Otherwise, the TXOP has a conflict with the
reservation. The time interval of TF D CSIFS CGT is thus called conflict time.
If a station obtains a TXOP during TF , it should avoid conflict with the incoming
reserved time slot, following one of the two conflict avoidance strategies:
• Hold-on strategy: the station just holds on and transmits immediately after
the reserved time plus AIFS.
• Backoff strategy: the station invokes the next backoff stage by selecting a new
backoff counter, i.e., having a virtual collision with the reservation.
It has been shown that the backoff strategy results in less frame service time and
higher throughput with a moderate traffic load [112]. Suppose that several stations
obtain TXOPs during TF . According to the hold-on strategy, their transmissions
right after the reserved period will collide. On the contrary, if the backoff strategy
is adopted, the stations will initiate another round of backoff, so their collision
probability is reduced. The performance of the two conflict avoidance strategies
will be compared by simulations in Sect. 5.3.
As shown in Fig. 5.1, the stations can perform backoff inside the time interval
between the end of the previous reservation period plus AIFS and the beginning of
the next reservation. This interval is denoted as TK , i.e., TC AIFS. TK is further
divided into TA and TV . The frame transactions initiated in the current contention
period are completed during TA (called access time). Because an ongoing transaction
may finish inside TF before the next reservation period, the time period left in TC ,
i.e., TV (called vulnerable time), is actually smaller than TF .
(4) Dual-Buffer Architecture
The hybrid MAC approach can be accompanied with two different buffering
architectures for video streaming. The single-buffer and the dual-buffer architec-
tures are illustrated in Fig. 5.2a and b, respectively. Using the former architecture,
when the reserved period becomes available for a flow, frames accumulated in the
buffer are transmitted up to the maximum burst size. Otherwise, the remaining
frames compete with other flows for channel access during the contention periods.
One major issue with the single-buffer architecture is as follows. Due to the
asynchronous nature between video traffic and reservation schedule, it is possible
that there are not enough frames to send in the buffer during a reserved period and
thus the reserved time is under-utilized. Consequently, the load and the contention
level during the contention periods may be still quite high.
Using a dual-buffer architecture can solve this problem. As shown in Fig. 5.2b,
the size of the R-Buffer equals the maximum number of frames that can be
transmitted in a reservation slot. The arrived frames are first backlogged in the
R-Buffer to wait for the next reserved period. When it is full, newly arrived
5.1 Hybrid Approach 107
a b
Fig. 5.2 Buffering architectures for the hybrid MAC. (a) Single buffer architecture (b) Dual buffer
architecture
frames are stored in the C-Buffer which will contend for the channel access during
contention periods.1 The main advantage of the two-buffer architecture is that
the number of frames in the reserved periods is maximized so as to maximize
the utilization of the reserved periods. Consequently, the frame arrival rate and
competition level during contention periods are reduced and thus the collision
probability and service time are reduced compared with the contention-only MAC.
However, the dual-buffer architecture introduces two issues:
1. It causes frame re-ordering at the receiver side. In one case, the follow-on frames
may have been delivered but the earlier frames are still in the R-Buffer waiting for
the reserved time. However, the scheduling can be set such that the reservation
interval is smaller than the delay jitter bound. In the second case, it is also
possible that the earlier frames are still waiting in the C-Buffer due to the random
backoff procedure and follow-on frames have been received through reserved
period. For this case, we can restrict the competition in the contention period by
using the admission region (as will be shown in Sect. 5.4) to guarantee that the
frame delay in the C-buffer will also not exceed the delay jitter bound. Thus, the
reordering due to the two-buffer architecture does not affect the video streaming
performance.
2. Part of the reserved time is still wasted due to the traffic burstiness. To solve
this problem, we can utilize soft-reservation by which the unused reserved time
is released and the other stations can compete to utilize the released time. The
soft-reservation approach will be described in the next subsection.
We need to quantify and optimize the hybrid MAC performance carefully
to ensure the QoS for video flows. However, the existing analytical models for
traditional contention-only MAC cannot be directly applied to hybrid MAC due
to the difference presented above, whose model and analysis will be presented in
Sect. 5.2.
1
Note that if transmission errors happen in the burst transaction during reserved periods, the frames
that need to be retransmitted can be queued in the C-Buffer. In this chapter, we only consider
collisions and ignore transmission errors to simplify the analysis.
108 5 Hybrid Medium Access for Multimedia Services
TU TS
ΔB TA TV Δ TB TR
TF δ
TC TB
TI
TY
φB φ
Due to the burstiness of video traffic, it is possible that the reservation owner has no
more frames to transmit during its reserved time, resulting in the waste of channel
time. In this subsection, we consider soft reservation, where the owner implicitly
releases the unused reserved time for other stations to access by contention. The
model of soft-reservation hybrid MAC is shown in Fig. 5.3. The reservation owner
may transmit the backlogged frames in a burst transaction from the beginning of its
reserved periods (as presented in the previous subsection, the transmissions from
the other stations are suppressed before the reserved periods due to the conflict
avoidance strategy). Similarly to the hard-reservation approach, frame transactions
in the burst mode during reserved periods finish with a B-ACK, while a single-
frame transaction during contention periods finishes with an I-ACK. The durations
of a frame transaction in the two cases are B and , as mentioned earlier.
Other stations keep sensing the channel. Because they have to wait for the
channel to be idle for AIFS (which is larger than MIFS and SIFS), they cannot
perform backoff or transmit during the burst transaction. If the reservation owner has
no more frames to transmit, the channel will be idle for an AIFS after the B-ACK
and then the other stations start or resume backoff procedures, the same as that
during the contention periods. Thus the unused reservation is released automatically.
Furthermore, the reservation owner can have a higher priority to regain the channel
and transmit new frames, by just waiting for a shorter IFS during its released time.
Therefore, the soft reservation is easy to implement.
5.2 Mean Value Analysis 109
This soft-reservation approach leads to more efficient channel utilization and bet-
ter network performance (e.g., smaller frame service time) than the hard reservation
(which does not release the unused time). In addition, the dual buffer architecture
is unnecessary for soft reservation because the unused reservation period can be
released.
In this section we study the analytical models for hybrid MAC considering the
interactions of reservation and contention periods. The reservation-based access is
deterministic, while the behavior of the contention-based channel access is signif-
icantly affected by reservation, which is essentially different from the traditional
contention-only MAC (such as the IEEE 802.11 DCF). Therefore, we focus on the
performance analysis of the contention-based access.
Using the mean value analysis method, we evaluate the average values of the
system variables, such as station transmission probability, collision probability, and
frame service time, without considering the details of the stochastic backoff process.
We first present the model for the hard-reservation hybrid MAC with saturated traffic
case, and then show how to extend it to derive the tight performance bounds for the
unsaturated case. Secondly, the analytical model for the soft-reservation scheme is
developed. The approaches are of low computational complexity so they can be used
for on-line admission control and optimizing the per-flow reservation.
Let EŒR and EŒB denote the average number of transmission slots and backoff
slots experienced by a frame, respectively. Given that a station is busy, i.e., the
station is performing backoff or transmitting, the probability to transmit in a slot
equals
EŒR
D : (5.1)
EŒR C EŒB
Let p denote the collision probability for the tagged station when it sends a
frame. After collision, the station tries to retransmit the frame. The number of
transmission trials of a frame follows a truncated geometric distribution with the
success probability of 1 p. Suppose that the retry limit is K (the indexes of the
backoff stages are k D 0; 1; 2; ; K) and the CW in the kth stage is Œ0; Wk . Similar
to the derivations in Sect. 3.3.1, EŒR and EŒB can be obtained by
P
EŒR D KkD0 pk ;
P (5.2)
EŒB D KkD0 pk W2k ;
where Wk and W2k are the contention window size and the average number of backoff
slots in the k-th backoff stage, respectively.
(3) Contention Access Period
During TA , a time slot can have three states.
First, a slot may be idle if no station transmits. The duration of an idle slot is ı
and, within TA , the probability of a slot to be idle is aA .
Second, a slot may contain a frame transaction, either successful or with
collision, with probability of bA . The duration of this type of slots is D C AIFS.
Third, if a frame transaction begins during the interval of ŒTF ; before a
reservation period (as defined in ECMA-368, > TF ), then after the frame
transaction, the reserved time period will begin within an AIFS. Thus, all the
contention stations have no chance to perform backoff after this frame transaction.
We can regard the reservation period together with the frame transaction as one
time slot with probability of bAD and the duration of 0 . We approximate that, if
such a scenario happens, the beginning time of the frame transaction is uniformly
distributed inside ŒTF ; before the reservation. Thus, the average duration of this
type of transaction slots is 0 D CT 2
F
C TS . Further, given that a frame transaction
occurs within TA , the probability for the transaction begins during ŒTF ; is TTA
F
.
In this scenario, we also have TV D 0.
The probabilities for a slot to be in the three states are given by
8
ˆ
< aA D .1 / ;
N
bAD D .1 aA / T
T
F
; (5.3)
:̂ b D 1 a b A :
A A AD
5.2 Mean Value Analysis 111
SA D aA ı C bA C bAD 0 : (5.4)
If a transaction begins inside the time interval ŒTF ; TF C before the beginning
of a reservation period, the transaction will end inside the conflict time, which makes
the vulnerable time TV smaller than TF on average. If a transaction begins inside
the interval of ŒTF ; TF C , we approximate that its starting time is uniformly
distributed, so the average vulnerable time is T2F . However, if no transmission occurs
inside the interval, the vulnerable time is TF . The number of idle slots in the interval
ŒTF ; TF C is D ı . The probability of no transmission initiated during the
interval is aA . The average duration of the vulnerable time is2
TF TF
TV D 1 aA C aA TF D 1 C aA : (5.5)
2 2
Then, the average duration of TA can be obtained by TA D TK TV , and the average
number of slots in TA is A D TSAA .
(4) Vulnerable Time and Reservation Period
Because the contention stations cannot transmit during TV and the following
reserved period, we consider these two periods together. A slot inside TV has two
states. The upcoming reservation period arrives during the last idle slot, which is
thereby enlarged by TS plus AIFS. We assume that the arrival time of the following
reserved period is uniformly distributed inside the last idle slot in TV . Thus, the
average duration of the enlarged slot is
ı
ıD D C TS C AIFS: (5.6)
2
All the other slots within TV are idle slots with the duration of ı. The average
duration of TV is given in (5.5) and hence the average number of slots can be
estimated by V D TıV . Finally, given a slot within the vulnerable time, the
probability to have the duration of ı (i.e., not the last one) is g D V 1
V
.
(5) Generic Channel Slot
Considering the total number of generic slots during TK , the probability for a
generic slot to be in the vulnerable time is
V
hD : (5.7)
A C V
2
For easy presentation, we reuse the notations of TA , TS , etc., so they also represent the averages
of the corresponding durations in the equations in this section.
112 5 Hybrid Medium Access for Multimedia Services
In summary, from the viewpoint of the entire channel time, the generic channel
slots have four states: idle slots within TA and TV periods and with the duration of ı
and the probability of a; frame transaction slots within TA and with the duration of
and the probability of b; after the frame transaction, if the incoming reservation
period starts within an AIFS, the transaction slot is combined with the reservation
period and they are regarded as one slot, with the duration of D D 0 C AIFS and
the probability of bD ; and the last idle slot inside TV is combined with the following
reservation period as one slot, with the duration of ıD and the probability of aD . The
state probabilities are given by
8
ˆ
ˆ a D hg C .1 h/aA ;
<
b D .1 h/bA ;
(5.8)
ˆ bD D .1 h/bAD ;
:̂
aD D h.1 g/:
S D aı C aD ıD C b C bD D : (5.9)
By solving Eqs. (5.1)–(5.10) numerically, we can obtain the mean values of the
system variables, such as p, , etc.
For the hold-on strategy, a virtual collision will not result in a new backoff stage,
but the station will experience collisions when more than one stations obtain TXOPs
within the vulnerable time. In this case, the collision probability is
Similarly, we can numerically obtain p and for the hold-on strategy. We will
compare the performance of the two conflict avoidance strategies in Sect. 5.3.
5.2 Mean Value Analysis 113
Since only one frame is (re-)transmitted during the frame service time on
average, the rate to send a new frame is 1 . When all the transmissions (up to
the specified retry limit, K) of a frame have failed, the frame will be discarded.
Therefore, the per-station throughput (bps) can be obtained as
LP
D 1 pK ; (5.13)
Different from the saturated-station case, an unsaturated station only contends for
channel access when its buffer is non-empty. The key parameter is the probability
that a station is busy in a selected generic slot, called busy probability.
(1) Correlated Channel Access
The most challenging issue for the analysis with unsaturated stations comes from
the fact that the assumption for the unsaturated stations to be busy independently is
not valid. This is because the channel sensing effort from a station may be blocked
by the ongoing transaction or the reservation period. As a result, the probability for
another station to be busy given that the tagged station is busy (i.e., the conditional
busy probability) is higher than the probability for another station to be busy in a
randomly selected slot (i.e., unconditional busy probability).
In this section, we extend the mean value analysis to the hybrid MAC with
unsaturated stations. Because it is very complicated, if not impossible, to obtain
the accurate conditional busy probability of another station given that the tagged
station is busy, we develop the lower and upper bounds of the system performance.
As shown by the numerical results, these two bounds are tight and they converge
when the stations become saturated.
(2) Lower Bound
Because the probability for another station to be busy conditioned on that the
tagged station is busy is larger than the unconditional busy probability, we can
obtain the lower bound of the collision probability by using the unconditional busy
probability in a randomly selected slot. The symbols with the superscript 0 represent
the lower-bound parameters.
114 5 Hybrid Medium Access for Multimedia Services
.R0 C B0 /S0
0 D min ; 1 ; (5.14)
where is the average arrival interval of frames and S0 is the average duration of
a generic slot for the entire channel time. In (5.14), S0 gives the average number
of generic slots between two consecutive arrivals. Given the station is busy, the
transmission probability is 0 , the same as the saturated case in (5.1). Thus, an
unsaturated station transmits in a generic slot inside the contention period with the
probability 0 0 . The probabilities of the three states of a slot inside TA are changed
to be
8
ˆ
< aA D .1 / ;
0 0 0 N
0 TF
bAD D .1 aA / T ;
0
(5.15)
:̂ b0 D 1 a0 b0A :
A A AD
Following the procedure in Sect. 5.2.1, we can obtain the unsaturated versions
of the other equations, which have the same form as those for the saturated case.
Combined together with (5.14)–(5.16), the mean values of all the system variables
can be solved. Finally the frame service time 0 is obtained similarly to that in (5.12).
Different from the saturated case, the throughput for unsaturated stations depends
on the incoming traffic load. Here we ignore the limit of MAC buffer size and frame
drops are caused by exceeding the retry limit only. Since the lower bound of the
collision probability is p0 , the upper bound of the station throughput is
LP
0 D 1 .p0 /K : (5.17)
Except the new version of (5.18), all the other equations have the same forms as
those for the lower bound case presented in the previous subsection. For example,
the station busy probability 00 and the collision probability p00 can be calculated
similarly using (5.14) and (5.16), respectively. By solving this new equation set, we
can obtain the mean values of the system variables.
Note that, the average slot duration conditioned on that a station is busy is larger
than the average duration of a randomly selected slot. Therefore, S00 (obtained by
assuming there is at least one station busy) is the upper bound of the average
duration of a generic slot in a network with all stations unsaturated. Finally, the
lower-bound of the station throughput can be obtained in a similar way.
(4) Asymptotic Property
An unsaturated station can be driven into saturation when its traffic load increases
or when more channel time is reserved. When the portion of reserved time increases,
the occurrence of conflict (virtual collision) and also the backoff slot duration will
increase. Consequently, the frame service time increases. When the service time is
larger than the frame arrival interval, the station becomes saturated.
When the stations in the network become saturated, the approximation for the
lower-bound model (i.e., the busy probability of another station conditioned on that
the tagged station is busy is equal to the unconditional busy probability) becomes
accurate because both probabilities approach 1. On the other hand, with all stations
becoming saturated, the hypothesis for the upper-bound model that there is always
at least one node being busy, is satisfied. Therefore, the lower-bound and upper-
bound both converge to the analytical results of the saturated case. Meanwhile,
the convergence of the two bounds indicates that the contention stations become
saturated.
The analysis of the soft reservation with a single buffer is more complicated than the
hard reservation with dual buffer. The durations and traffic load of the reservation
and contention periods are random and interact with each other. For example, the
service time of the contention-based access affects the burst sizes in the reserved
periods, because the service rate during the contention periods determines the
number of frames to transmit during reserved time. Meanwhile, the durations of the
reserved periods used by the owners affect the backoff slot length and the service
time of the contention-based access.
(1) Network Model
The network model is the same as that for the hard-reservation hybrid MAC. We
consider a single-hop network with N stations (or N flows) and the frame arrival
for each flow follows a Poisson process with the arrival rate of frames/s. As
shown in Fig. 5.3, during TC , a station obtains a TXOP when the backoff counter
is decreased to zero, during which a single transaction with an I-ACK may be
116 5 Hybrid Medium Access for Multimedia Services
completed. The duration of a TXOP is D TDATA C SIFS C TACK , where TDATA and
TACK are the transmission time of a data frame and the I-ACK frame, respectively,
as defined in Sect. 5.1.1. As for the hard-reservation model, the conflict time is
TF D C SIFS C GT. Because a transaction which is initiated before TF may finish
inside TF , the vulnerable time where the stations encounter conflict is smaller than
TF on average. The time interval before TV is the contention-based access time,
denoted by TA in Fig. 5.3. Note that the owner station of the incoming reservation
does not perform conflict avoidance and can transmit immediately.
As mentioned in Sect. 5.1.2, the reservation owner has a higher priority during the
released time. For easy explanation, we incorporate the frames transmitted during
the released time in the burst transaction. This simplification does not affect the
accuracy of the analysis due to the following: if the network is lightly loaded, the
probability to have new frames arrive during the released time is quite small; if
the network is heavily loaded, the duration of the released time becomes quite small
and the impact of this simplification can be ignored.
(2) Renewal Process
According to the system model in Fig. 5.3, the channel time is divided into two
phases from the viewpoint of a tagged station: (1) the burst transactions inside
reserved periods, and (2) the interval between the tagged station’s two consecutive
reserved periods where it accesses the channel by contention. The average durations
of the two phases are denoted by TB and TI , and the average numbers of frames
delivered are VB and VI , respectively. Thus, the average time released by the owner
in a reserved period is TR D TS TB .
Furthermore, inside the scheduling cycle TY , the intervals of TA , TV , and the burst
transactions (with the average duration of TB plus the AIFS) occur alternatively and
repeatedly. Thus, we combine them together as TU (called unit time). TU is the small
cycle and there are N cycles of TU inside an interval of TY .
The system can be regarded as a renewal process, and TY is the renewal cycle.
Considering the stability of the network, we classify the traffic situation into three
levels:
1. Lightly loaded: The frame arrival rate is so small that the average service time
during the contention period (denoted by ) is smaller than the frame arrival
interval (denoted by and D 1= ), i.e., < . Thus, the reserved periods are
mostly unused and released.
2. Heavily loaded: The frame arrival rate is larger and > . Some frames are
backlogged in the buffer during contention periods, but they are delivered during
reserved periods. The network is still stable because all frames are delivered by
the end of a scheduling cycle.
3. Overloaded: The frame arrival rate is so large that becomes much larger than
. There are so many frames backlogged in the buffer during a contention period
that the number of backlogged frames plus those arriving during the reserved
period is larger than the maximal burst size. Thus, the reserved periods are fully
used and the queue length in the buffer will keep increasing and the network is
unstable.
5.2 Mean Value Analysis 117
For the first and second levels, the network is stable and the frame arrival
rate is guaranteed smaller than the overall frame service rate (including by both
contention-based and reservation-based transmissions). We have the following
necessary condition
TY < VI C VB : (5.19)
Consequently, the queue length of a station should be 0 on average at the end of its
own reserved period. In other words, on average the frames that accumulate in the
buffer during TI and arrive during TS must be delivered by the end of the station’s
reserved period.
(3) Traffic Transmitted in Different Phases
To estimate VI , let denote the average service time of contention-based access
during TI (as defined earlier). If a station has frame(s) arriving during before its
own reserved period, the frame(s) will be delivered inside the incoming reserved
.m/
period. Thus, the maximal number of frames which can be delivered is VI D .TI
/=. Considering the Poisson arrival model, the average number of backlogged
frames at the beginning of the reserved period is
X
1
.m/ .TI /k TI
WD k dVI e e : (5.20)
.m/
kŠ
kDdVI eC1
During TB , the frames stored in the buffer and those arrived during TS are transmitted
in burst mode. We have VB D W C . C TS / . Thus, the buffer is empty after TB on
average, which is consistent with the necessary condition in (5.19).
The reduced frame arrival rate for contention access is
0 TY VB
D ; (5.21)
TY
and we have VI D TY VB D TY 0 .
(4) Access Time
To obtain the collision probability and average service time of a frame, we
investigate the busy procedure of the tagged station, which includes backoff slots
and transmission slots.
During TA , a time slot can have two states. First, a slot may be idle if no station
transmits and has the duration of ı (specified in the wireless standards). Second, a
slot may contain frame transaction(s), either successful or with a collision, with the
duration of D C AIFS.
Given the condition that the tagged station is performing backoff, the probabili-
ties for one generic slot inside TA to be one of the two states are aA and bA , and
aA D .1 /N1 ;
(5.22)
bA D 1 aA ;
118 5 Hybrid Medium Access for Multimedia Services
SA D aA ı C bA : (5.23)
average vulnerable time is thus aA TF C 1 aA T2F . Besides, as the arrival time
of the following reserved period is uniformly distributed in the last idle slot, the slot
(with the duration of 2ı ) is combined with the burst transaction slot.
Thus, by approximating TF to C AIFS D for simplicity, the average length
of the vulnerable time is
TF ı ı
TV D aA TF C 1 aA D 1 C aA : (5.24)
2 2 2 2
A slot in TV has a duration of ı because the transactions are suppressed by
the conflict avoidance. The average number of slots in TV can be estimated by
V D TV =ı.
where B and are the frame transaction duration in the burst mode and in the
single-frame mode, respectively, as defined in Sect. 5.1.1. For the contention-based
access, we can combine the last slot before the burst transaction (as described
earlier), the burst transaction, and the following AIFS together as a single, busy
slot. The average duration of such slots, denoted by B , equals
ı
B D C TB C AIFS: (5.26)
2
The number of slots in TB is obviously B D 1.
5.2 Mean Value Analysis 119
EŒR
D : (5.28)
EŒR C EŒB
The station busy probability, , is determined by the reduced traffic level and
D 0; (5.30)
0
where is from (5.21).
120 5 Hybrid Medium Access for Multimedia Services
Solving the equations from (5.20) to (5.30) by the fixed-point method, we can
obtain the mean values of the system parameters, such as , , p, EŒB, EŒR, ,
etc.
(11) Average Service Time and Throughput
The service time of the reservation-based access is approximated by the burst
transaction time, B . Thus, the average service time of all frames is
VI VB
N D C B : (5.31)
VI C VB VI C VB
In a stable network, ignoring the limit of MAC buffer size, the per-station
throughput (in bps) is
LP
D VB C VI .1 pK / ; (5.32)
TY
a 0.8 b 1600
Simulation, N = 4 Simulation, N = 4
Analytical, N = 4 Analytical, N = 4
0.7 Simulation, N = 6 1400 Simulation, N = 6
Analytical, N = 6 Analytical, N = 6
Collision probability (p)
0.5 1000
0.4 800
0.3 600
0.2 400
0 2 4 6 8 10 12 14 16 0 2 4 6 8 10 12 14 16
Number of reserved MAS per flow (M) Number of reserved MAS per flow (M)
Fig. 5.4 Performance of saturated PCA stations with different M (a) Collision probability.
(b) Service time
a b
0.8 2000
Saturated Saturated
Simulation 1800 Simulation
0.7
Analytical (Upper Bound) Analytical (Upper Bound)
1600
0.6 Analytical (Lower Bound) Analytical (Lower Bound)
Collision probability (p)
1400
0.4 1000
800
0.3
600
0.2
400
0.1
200
0 0
0 2 4 6 8 10 12 14 16 0 2 4 6 8 10 12 14 16
Number of DRP periods per flow (M) Number of DRP periods per flow (M)
Fig. 5.5 Performance of unsaturated PCA stations with different M (a) Collision probability.
(b) Service time
the collision probability and average service time with N D 6 flows. The results of
the saturated cases are also plotted for comparison.
When M increases, the collision probability and service time increase accord-
ingly, similar to the saturated case. Note that when M 10, the service time is
smaller than the arrival interval D 1000 s (as shown in Fig. 5.5b) and thus the
stations are unsaturated. We can see that the analytical models can give valid lower
and upper bounds. However, when M 12, the service time becomes larger than
, which indicates that the stations have become saturated. Both bounds converge
to the results of saturated stations, as expected due to the asymptotic property given
in Sect. 5.2.2. Also we can see that the convergence of the lower and upper bound
models correctly predicts the transition from unsaturated to saturated status (when
is smaller than the average frame service time).
Note that for M 12, although the stations have become saturated, the average
frame service time is only slightly larger than the inter-arrival interval , and there
still exist some moments that a station is idle due to the burstiness of the traffic.
Therefore, the simulation results are slightly lower than the analytical results for a
real saturated station (which is always busy).
(4) Comparison of Backoff and Hold-on Strategies for Hard-Reservation
To compare the performance of the two conflict avoidance strategies, we present
the simulation results of N D 6 and N D 10 saturated stations, because the
saturation throughput indicates the limit of the network capacity. The reservations
of the DRP periods are the same as above.
Figure 5.6a shows that the collision probability (those collisions resulting in
backoff) using the backoff strategy is slightly higher than that of the hold-on
strategy. The difference is because of the following scenario: the tagged station
obtains TXOPs during the vulnerable time TV . According to the backoff strategy,
5.3 Performance Evaluation 123
a b
0.75 8000
Backoff, Saturated, N=6 Backoff, Saturated, N=6
0.7 Hold−on, Saturated, N=6 7000 Hold−on, Saturated, N=6
Backoff, Saturated, N=10 Backoff, Saturated, N=10
0.65 Hold−on, Saturated, N=10 6000 Hold−on, Saturated, N=10
Collision probability (p)
0.55 4000
0.5 3000
0.45 2000
0.4 1000
0.35 0
0 2 4 6 8 10 12 14 16 0 2 4 6 8 10 12 14 16
Number of DRP periods per flow (M) Number of DRP periods per flow (M)
Fig. 5.6 Performance of the two conflict avoidance strategies with different M (a) Collision
probability. (b) Service time
a virtual collision happens definitely and the station invokes a new stage of backoff.
However, if the hold-on strategy is used, this station holds on and may successfully
transmit in the slot immediately following the DRP period (i.e., no other station
obtains TXOPs during TV ). In this case, there is no collision. This scenario
is actually presented analytically by comparing (5.10) and (5.11). Obviously, p
calculated in (5.10) (backoff strategy) is larger than that in (5.11) (hold-on strategy).
However, given that the stations are saturated, the probability of this no-collision
case for the hold-on strategy is quite small. Consequently, in the hold-on strategy,
a TXOP obtained during TV will experience a collision after the DRP period with
a high probability. Therefore, the difference of the collision probabilities of the two
strategies is small.
However, the average frame service time for the backoff strategy is smaller, as
shown in Fig. 5.6b. This is because, with the backoff strategy, if a station obtains
a TXOP during TV , it immediately starts the next backoff stage. So after DRP, the
station may finish its backoff earlier to transmit. But with the hold-on strategy, a
station will delay its transmission until the slot after DRP, where it also has a high
probability to have a collision with other PCA stations. Thus, the hold-on strategy
may waste the slots in the vulnerable time for backoff. In addition, using the hold-on
strategy, each collision results in wasted channel time of frame transaction , but
with the backoff strategy, a virtual collision does not waste additional channel time.
Note that, when M increases, the percentage of the vulnerable time in the
total channel time increases. Hence, the service time difference between the two
strategies becomes larger. In summary, for saturated stations, the backoff strategy
can lead to a higher throughput. This has also been discussed in [112].
(5) Soft-Reservation, Unsaturated Stations, Backoff Strategy
Figure 5.7 shows the overall collision probability and the average frame service
time of the hybrid MAC using soft reservation, single buffer, and the backoff conflict
124 5 Hybrid Medium Access for Multimedia Services
a 1
b 650
N = 6, Simulation 600 N = 6, Simulation
0.9
N = 6, Analytical N = 6, Analytical
Collision probability (p)
0.8 550
N = 8, Simulation N = 8, Simulation
N = 8, Analytical 500
Fig. 5.7 Performance vs. frame arrival rate for soft reservation (a) Collision probability.
(b) Service time
a 1 b 800
Soft−Reservation Soft−Reservation
0.9 Hard−Reservation Hard−Reservation
700
PCA−only PCA−only
0.8
Collision probability (p)
0.7 600
Service time (μs)
0.6
500
0.5
400
0.4
0.3 300
0.2
200
0.1
0 100
600 800 1000 1200 1400 1600 1800 2000 600 800 1000 1200 1400 1600 1800 2000
Frame arrival rate (frames/second) Frame arrival rate (frames/second)
Fig. 5.8 Performance vs. frame arrival rate for the three MAC protocols (a) Collision probability.
(b) Service time
a 25 b 400
Hybrid MAC with Soft−Reservation PCA−only MAC
350
Buffer queue length (frames)
250
15
200
10
150
100
5
50
0 0
0 2000 4000 6000 8000 10000 12000 14000 0 2000 4000 6000 8000 10000 12000 14000
Channel time slots Channel time slots
Fig. 5.9 Queue length evolution of a sender’s buffer (a) Hybrid MAC. (b) Contention-based MAC
backlogged in the buffers. Thus, the burst size is increased and less time is released,
so soft reservation performs similar to hard reservation.
Second, the collision probability of the hybrid MAC is always larger than that
of the contention-only MAC. Note that, in the figures, the collision probability
includes both the real collisions between the PCA transactions and the conflict
(virtual collisions) with the DRP periods. The presence of the reservation (i.e., DRP
periods) introduces conflicts for the contention-based access in hybrid MAC and
therefore increases the collision probability.
Third, the service time of the contention-only MAC is smaller than that of soft
reservation when the traffic load is light (e.g., 1000 frames/s). This is because there
is almost no frame backlogged in the buffers when the reserved periods arrive. The
reservation is not utilized but just introduces conflict, resulting in a larger collision
probability and service time. However, when the traffic load is heavy, the service
time of the contention-only MAC increases quickly, because the network tends to
be saturated. But the reservation in hybrid MAC can be fully utilized to transfer the
traffic in the burst mode efficiently, leading to a much smaller service time.
Fourth, Fig. 5.9 plots the queue length evolution of a sender’s buffer using the
contention-based MAC and the hybrid MAC with soft reservation. The frame arrival
rate is 2000 frames/s. We can see that the queue length of the contention-based
MAC (Fig. 5.9b) keeps increasing (close to 400 frames). Hence the network is
overloaded (saturated) and cannot work. However, the queue length of the hybrid
MAC (Fig. 5.9a) is still limited (less than 20 frames), which shows that the network
is heavily loaded but can still support the traffic and is stable. This further illustrates
the advantages of the hybrid MAC, in particular in supporting heavy traffic.
In summary, the hybrid MAC with soft reservation can accommodate a higher
traffic arrival rate, so its admission region is larger than the contention-only MAC
and the hybrid MAC with hard reservation.
126 5 Hybrid Medium Access for Multimedia Services
In this section, we study the case of using the hybrid MAC to support HDTV [155].
We first outline the simulation setup, including the simulation scenarios and
parameters, then present the analysis and simulation results for video streaming
over hybrid DRP/PCA MAC, and finally give the admission region considering the
IPTV-like applications.
(1) Simulation Setup
We adopt a trace-driven simulation strategy to demonstrate the effectiveness of
the hybrid MAC. In this section, the sample HD video stream is “From Mars to
China” with a resolution of 19201080. The video is H.264/MPEG-4 AVC encoded
with quantization parameters of 28, 28, and 30 for I, P, and B frames, respectively.
The video is available at http://trace.eas.asu.edu/h264/mars/. In this sample video,
the maximum video frame size is 326; 905 bytes and the average frame size is
20; 209 bytes with high burstiness, as shown in Fig. 1.1. If the video frame size
is 1000 bytes, the average video data rate is 621:486 frames per second for each
flow.
We employ a commonly-used network simulator, NS-2, and have extended
TKN’s IEEE 802.11e code to simulate WiMedia MAC protocols. The superframe
duration is 65:536 ms for 256 MASs of 256 s each. The transmitter needs to ensure
that the whole frame transaction including acknowledgment should finish at least
one SIFS plus one guard time before the PCA period transitions into DRP, or vice
versa. Otherwise, it will hold on the frame transaction completely until the channel
is available for PCA again. These behaviors due to the hybrid DRP/PCA MAC have
been captured closely in our simulation.
In WiMedia PCA, for video traffic, aCWmin is 7 and the retry limit is 7, the AIFSN
is 2, the slot time ı is 9 s, and the SIFS is 10 s, so the video’s AIFS is 28 s. The
guard time is 12 s. During the PCA periods, a frame transaction includes the time
to transmit a data frame and an acknowledgment, as well as SIFS and AIFS. During
the DRP periods, since the reservation owner has the exclusive access to the channel,
a frame transaction includes the time to transmit the frame and acknowledgment, as
well as at most two SIFSs. The video frames are encapsulated in RTP, UDP, IP
frames, and WiMedia LLC frames, with a total overhead of 56 bytes, before going
to the PLCP layer.
The WiMedia data rate of 480 Mbps is used. According to WiMedia’s standard,
PLCP preamble and header are also considered in our simulation and transmitted at
a lower data rate, while the video payload including the upper-layer headers is trans-
mitted at the given data rate (480 Mbps). For a video frame of 1000 bytes, it takes
31:875 s to transmit the entire PLCP frame, and the MAC-layer acknowledgment
takes 13:125 s. We ignore the propagation delay due to the short range in UWB
networks.
We adopt the dual buffer architecture, as depicted in Fig. 5.2b. The R-Buffer
stores the video frames to be transmitted in the following DRP MASs reserved by
5.4 Case Study: Supporting HDTV 127
the station. Given the maximal number of frames that can be served in one MAS
(denoted by FMAS ) and the number of reserved slots, we can determine the R-Buffer
size, such that the time to transmit a full buffer of frames does not exceed the video
delay jitter bound allowed in the wireless network. When the R-Buffer is full, the
excess video frames will be put into the C-Buffer, where they can compete to access
the channel during the PCA periods.
(2) DRP/PCA Traffic Breakdown
Here we present the results when a certain number (M) of MASs are reserved for
each video flow, and the remaining is available for PCA among all flows. Thus, the
hybrid DRP/PCA approach has M > 0 and the PCA-only approach has M D 0.
We pre-process the video trace to determine the number of video frames
transmitted through DRP and PCA. If we consider I-ACK for DRP frames, which
are separated by SIFS between frame transactions due to exclusive access, a total
frame transaction lasts 31:875 C 10 C 13:125 C 10 D 65 s. For a reserved MAS, it
can accommodate b.25612/=65c D 3 frames due to the guard time. If we consider
B-ACK, one MAS can accommodate b.256121013:125/=.31:875C10/c D 5
frames. If we consider both B-ACK and burst transmission with MIFS, one MAS
can accommodate b.256 12 10 13:125 10 C 1:875/=.31:875 C 1:875/c D 6
frames. Even with burst PLCP preamble in the physical layer, at most 6 frames can
be accommodated in one MAS.
As shown in Fig. 5.10, the percentage of the remaining PCA traffic after DRP
reservation strictly decreases as the number of reserved slots increases. However,
the percentage reduction is much slower than the increase of DRP slots. This is due
to the burstiness of video traffic, which cannot fully utilize all reserved slots in each
superframe. At the beginning, one more reserved MAS can reduce the remaining
PCA traffic greatly, especially when one MAS can accommodate 6 frames with
B-ACK and MIFS. After a certain number of MASs are reserved, an additional
reserved MAS only has a marginal benefit for I frames, since there is no remaining
traffic for P and particularly B frames any further. For example, with B-ACK and
MIFS (which is the most efficient way to use DRP), even with 16 MASs reserved
in one superframe, more than 10 % of the total traffic (mainly the I frames) still has
to go through PCA. This indicates that a suitable number of reserved slots should
be chosen carefully. For illustration purposes, we use B-ACK and MIFS for the
simulations presented in this chapter, i.e., 6 video frames going through a DRP
MAS.
(3) Frame Service Time
Figure 5.11 shows the average frame service time obtained from both analysis
and simulation for PCA frames. In this figure, there are 8, 10, and 12 concurrent
video flows. As being expected, when M is small, the service time decreases with
regard to M, and the trend is reversed with a large M. This is because, a small
number of reserved MASs can be efficiently utilized and the number of frames
left for contention in PCA is greatly reduced. With less contention, the overhead
(collisions and backoff) in the PCA periods can be reduced as well. When M is large,
128 5 Hybrid Medium Access for Multimedia Services
100
3 pkts/MAS
Percentage of remaining PCA traffic (%) %reduction
5 pkts/MAS
80 %reduction
6 pkts/MAS
%reduction
60
40
20
0
0 2 4 6 8 10 12 14 16
# of MASs reserved per superframe
Fig. 5.10 The percentage of the remaining PCA traffic after DRP reservation
2.1
8 flows (ana)
8 flows (sim)
1.8 10 flows (ana)
Average frame service time (ms)
10 flows (sim)
12 flows (ana)
12 flows (sim)
1.5
1.2
0.9
0.6
0.3
0
0 2 4 6 8 10 12 14 16
# of MASs reserved per flow
Fig. 5.11 Average frame service time: simulation and analysis results
since the duration of a MAS for DRP (256 s) is much longer than that of a fixed
contention slot for PCA (9 s), frequent interruption by the DRP periods will bring
up the service time in PCA. In addition, with a large M, the DRP reserved MASs
are not efficiently utilized, but the remaining channel time for PCA is significantly
5.4 Case Study: Supporting HDTV 129
0.7
8 flows (ana)
Frame transmission collision probability 8 flows (sim)
10 flows (ana)
0.6
10 flows (sim)
12 flows (ana)
12 flows (sim)
0.5
0.4
0.3
0.2
0.1
0
0 2 4 6 8 10 12 14 16
# of MASs reserved per flow
reduced, which results in a higher contention level and longer service time. The
frame service time “bounce-back” behavior shows that there is an optimal number
of MASs reserved for each video flow.
(4) Frame Collision Probability
Figure 5.12 shows the frame transmission collision probability obtained from
both the analysis and simulation for the PCA frames. As shown in the figure, when
there is a small number of MASs reserved for DRP, the frame collision probability
for PCA frames is actually reduced, due to fewer active stations contending for the
channel during PCA periods. However, when the number of MASs reserved for
DRP increases, more PCA backoff processes are interrupted by the DRP periods.
After the DRP reserved periods, the PCA frames may collide due to the “pre-
transmission” withhold when the time before the DRP periods is not enough to finish
the frame transaction. In addition, when more MASs are reserved for DRP, fewer
will be available for PCA, which leads to a higher chance of contention overall. This
trend is more obvious when the number of video flows is large (e.g., 12 flows). For
8 flows, the same “bounce-back” behavior is expected with the slow reduction in
collision probability and the increase in frame service time in Fig. 5.11. The optimal
number of reserved MASs in a superframe (M) to minimize the frame service time
and collision probability depends on the number of flows (N).
In the analytical framework presented in Sect. 5.2, we only consider average
traffic arrival rate and assume the independence of competing flows, which should
be general enough to investigate the performance of other traffic types with
different bursty levels. Besides using the video traces, we also use Poisson traffic
130 5 Hybrid Medium Access for Multimedia Services
in simulation for verification. Simulation results with both video traces and Poisson
traffic validate the correctness and wide applicability of the analytical models
presented in Sect. 5.2.
(5) Admission Region
The admission region is determined by ensuring both frame loss rate (FLR)
and delay jitter for video streams to meet their QoS requirement. For IPTV-like
applications, FLR should be less than 104 and the delay jitter should be less
than 100 ms. FLR can be obtained from the collision probability and the maximum
video frame jitter is due to the queuing delay of the largest video frames over the
wireless networks. Our analytical and simulation results show that, for the PCA-
only and hybrid MAC, the delay jitter constraint for HD video is tighter than the
FLR constraint due to collisions. Therefore, the number of video flows that can be
supported is mainly determined by the frame service time of video frames.
For the PCA-only and hybrid MAC, we use the frame service time for the largest
video frame (around 327 KB) as the admission criterion. It is estimated as the
number of frames being transmitted in PCA periods times the frame service time
of PCA. For the DRP-only MAC, we can calculate the MASs needed for each video
and then determine the admission region accordingly.
To ensure that the maximum delay jitter is less than two or three video-frame
durations (i.e., 66:67 ms and 100 ms, respectively), only 5 and 7 video streams can
be supported with the DRP-only MAC, as we need to over-reserve significantly for
the bursty video traffic. As shown in Fig. 5.13, for the PCA-only MAC (i.e., the
number of MASs reserved per flow is 0), at most 8 and 10 flows can be supported to
meet the two criteria of maximum video frame jitter. For the hybrid MAC and when
each DRP MAS can send 6 frames, we can support 10 and 13 flows if we reserve
6 MASs for each flow, which outperforms both the PCA-only and DRP-only MAC
considerably. This admission region comparison clearly shows the tradeoff between
contention and reservation-based medium access control mechanisms, and the way
to strike a better balance between them.
5.5 Summary
In this chapter, we have introduced the hybrid MAC protocols to better support video
streaming over wireless networks and studied the QoS performance and admission
region. Furthermore, we have discussed two conflict avoidance strategies, and the
simulation results show that the backoff strategy can achieve a higher throughput
when the channel time is reserved frequently. Two buffering architectures are
also discussed and it is shown that the dual-buffer can provide a considerably
better performance for hard-reservation approach, thanks to the higher reservation
utilization and lower contention level. We have also discussed the hybrid MAC
using soft-reservation, where the unused reserved time can be released implicitly
and accessed by other stations through contention.
5.5 Summary 131
180
7 flows
8 flows
9 flows
160 10 flows
11 flows
Maximum video frame jitter (ms)
12 flows
13 flows
140 14 flows
120
100
80
60
40
0 2 4 6 8 10 12 14 16
# of MASs reserved per flow
Fig. 5.13 Admission region determined by the maximum video frame jitter
An accurate analytical model based on the mean value analysis for the hard-
reservation with saturated stations has been presented first. The collision probability
and the average service time of a frame are obtained. For the unsaturated case, we
have presented tight lower and upper bounds which converge when the stations
become saturated. The analytical framework for the hybrid MAC using soft-
reservation has also been presented.
The hybrid MAC based on the WiMedia ECMA-368 standard has been simulated
to validate the analysis and compare the performance between the conventional
contention-only MAC and the hybrid MAC. Analysis and simulation results show
that the soft reservation has the best performance and reaches high capacity when
the traffic load is relatively high. In addition, using the WiMedia UWB WPAN as
an example, a case study with a real video trace and the NS-2 simulator has been
conducted. The simulation results validate the analytical model of the hybrid MAC
and also show the admission region in supporting HDTV streaming flows.
Both analytical and simulation results demonstrate that the hybrid MAC is
desired for high-quality video streaming. This is because, if we reserve a portion of
channel time for each video flow, the reserved periods can be efficiently utilized and
at the same time the collision and service time in contention periods are significantly
reduced. Thus, better QoS and even more video flows can be supported.
As many wireless standards adopt the interleaved reservation and contention
MAC protocols, the hybrid MAC approach reported in this chapter is anticipated
to be a key enabling technology to bridge the gap. There are many open issues
beckoning for further research, for instance, how to optimize the reservation
132 5 Hybrid Medium Access for Multimedia Services
duration and pattern, considering heterogeneous data and multimedia traffic; how
to make the tradeoff of hard and soft reservation to further improve the network
efficiency; how to fine-tune the contention access protocols at the presence of
frequent reservation periods; how to flexibly utilize the hybrid MAC approach to
deal with channel fading and interference, etc.
References
1. Aad, I., Castelluccia, C.: Differentiation mechanisms for IEEE 802.11. In: Proceedings of
IEEE/ACM International Conference on Computer Communications (INFOCOM), Anchor-
age, AK, pp. 209–218 (2001)
2. Akyildiz, I.F., McNair, J., Martorell, L.C., Puigjaner, R., Yesha, Y.: Medium access control
protocols for multimedia traffic in wireless networks. IEEE Netw. 13(4), 39–47 (1999)
3. Amendment of parts 2, 15, and 97 of the commission’s rules to permit use of radio
frequencies above 40 GHz for new radio applications. Technical Report FCC 95-499, Federal
Communications Commission (FCC) (1995)
4. Amitay, N., Greenstein, L.J.: Resource auction multiple access (RAMA) in the cellular
environment. IEEE Trans. Veh. Technol. 43(4), 1101–1111 (1994)
5. Assi, C.M., Agarwal, A., Liu, Y.: Enhanced per-flow admission control and QoS provisioning
in IEEE 802.11e wireless LANs. IEEE Trans. Veh. Technol. 57(2), 1077–1088 (2008)
6. Barry, M.G., Campbell, A.T., Veres, A.: Distributed control algorithms for service differen-
tiation in wireless packet networks. In: Proceedings of IEEE/ACM International Conference
on Computer Communications (INFOCOM), Anchorage, AK, pp. 582–590 (2001)
7. Batra, A., Balakrishnan, J., Aiello, G.R., Foerster, J.R., Dabak, A.: Design of a multiband
OFDM system for realistic UWB channel environments. IEEE Trans. Microwave Theory
Tech. 52(9), 2123–2138 (2004)
8. Battiti, R., Li, B.: Supporting service differentiation with enhancements of the IEEE 802.11
MAC protocol: models and analysis. Technical Report, University of Trento, Trento (2003)
9. Baykas, T., Sum, C.S., Lan, Z., Wang, J., Rahman, M.A., Harada, H., Kato, S.: IEEE
802.15.3c: the first IEEE wireless standard for data rates over 1 Gb/s. IEEE Commun. Mag.
49(7), 114–121 (2011)
10. Benveniste, M.: TCMA proposed draft text. Technical Report Doc. 802.11-01/117r2, IEEE
Working Group (2001)
11. Beshai, M.: The poissonian-spectrum method for treating a loss system serving non-
poissonian multi-bit-rate traffic. In: Proceedings of IEEE/ACM International Conference on
Computer Communications (INFOCOM), Ottawa, ON, pp. 1010–1019 (1989)
12. Bianchi, G.: Performance analysis of the IEEE 802.11 distributed coordination function. IEEE
J. Sel. Areas Commun. 18(3), 535–547 (2000)
13. Bianchi, G., Tinnirello, I.: Analysis of priority mechanisms based on differentiated inter
frame spacing in CSMA/CA. In: Proceedings of IEEE Vehicular Technology Conference
(VTC-Fall), Jeju Island, pp. 1401–1405 (2003)
14. Bianchi, G., Tinnirello, I.: Remarks on IEEE 802.11 DCF performance analysis. IEEE
Commun. Lett. 9(8), 765–767 (2005)
15. Bluetooth core version 4.0 specification. Technical Report V4.0, Bluetooth special interest
group (SIG) (2010). https://www.bluetooth.org/Technical/Specifications/adopted.htm
16. Bluetooth core version 4.1 specification. Technical Report V4.0, Bluetooth special interest
group (SIG) (2013). https://www.bluetooth.org/Technical/Specifications/adopted.htm
17. Boulis, A., Smith, D., Miniutti, D., Libman, L., Tselishchev, Y.: Challenges in body area
networks for healthcare: the MAC. IEEE Commun. Mag. 50(5), 100–106 (2012)
18. Cai, X.L., Shen, X., Cai, L., Mark, J.W., Xiao, Y.: Voice capacity analysis of WLAN with
unbalanced traffic. IEEE Trans. Veh. Technol. 55(3), 752–761 (2006)
19. Cao, H., Leung, V., Chow, C., Chan, H.: Enabling technologies for wireless body area
networks: A survey and outlook. IEEE Commun. Mag. 47(12), 84–93 (2009)
20. Chatzimisios, P., Boucouvalas, A., Vitsas, V.: IEEE 802.11 packet delay a finite retry limit
analysis. In: Proceedings of IEEE Global Communications Conference (GLOBECOM), San
Fransisco, CA, pp. 950–954 (2003)
21. Chen, D., Gu, D., Zhang, J.: Supporting real-time traffic with QoS in IEEE 802.11e based
home networks. In: Proceedings of IEEE Consumer Communications and Networking
Conference (CCNC), Las Vegas, NV, pp. 205–209 (2004)
22. Chen, X., Zhai, H., Tian, X., Fang, Y.: Supporting QoS in IEEE 802.11e wireless LANs. IEEE
Trans. Wirel. Commun. 5(8), 2217–2227 (2006)
23. Cheng, H.T., Zhuang, W.: Novel packet-level resource allocation with effective QoS provi-
sioning for wireless mesh networks. IEEE Trans. Veh. Technol. 8(2), 694–700 (2009)
24. Cheng, Y., Ling, X., Song, W., Cai, L.X., Zhuang, W., Shen, X.: A cross-layer approach for
WLAN voice capacity planning. IEEE J. Sel. Areas Commun. 25(4), 678–688 (2007)
25. Chesson, G., et al.: EDCF proposed draft text. Technical Report Doc. 802.11-01/131r1, IEEE
Working Group (2001)
26. Chou, C.T., Sai-Shankar, N., Shin, K.G.: Achieving per-stream QoS with distributed airtime
allocation and admission control in IEEE 802.11e wireless LANs. In: Proceedings of
IEEE/ACM International Conference on Computer Communications (INFOCOM), Miami,
FL, pp. 1584–1595 (2005)
27. Chung, W.S., Un, C.K.: Collision resolution algorithm for M-priority users. IEE Proc.
Commun. 142(3), 151–157 (1995)
28. Cisco visual networking index: flobal mobile data traffic forecast update, 2012–2017.
Technical Report, Cisco (2013)
29. Daneshi, M.: Distributed reservation algorithms for video streaming over WiMedia UWB
networks. Master’s thesis, University of Victoria, BC (2009)
30. Daneshi, M., Pan, J., Ganti, S.: Distributed reservation algorithms for video streaming over
UWB-based home networks. In: Proceedings of IEEE Consumer Communications and
Networking Conference (CCNC), Las Vegas, NV, pp. 1–6 (2010)
31. Daneshi, M., Pan, J., Ganti, S.: Towards an efficient reservation algorithm for distributed
reservation protocols. In: Proceedings of IEEE/ACM International Conference on Computer
Communications (INFOCOM), San Diego, CA, pp. 1855–1863 (2010)
32. Delbrouck, L.: A unified approximate evaluation of congestion functions for smooth and
peaky traffics. IEEE Trans. Commun. 29(2), 85–91 (1981)
33. Deng, D.J., Yen, H.C.: Quality-of-service provisioning system for multimedia transmission
in IEEE 802.11 wireless LANs. IEEE J. Sel. Areas Commun. 23(6), 1240–1252 (2005)
34. Djukic, P., Valaee, S.: Distributed link scheduling for TDMA mesh networks. In: Proceedings
of IEEE International Conference on Communications (ICC), Glasgow, pp. 3823–3828
(2007)
35. Duan, C., Pekhteryev, G., Fang, J., Nakache, Y., Zhang, J., Tajima, K., Nishioka, Y., Hirai, H.:
Transmitting multiple HD video streams over UWB links. In: Proceedings of IEEE Consumer
Communications and Networking Conference (CCNC), Las Vegas, NV, pp. 691–695 (2006)
36. Elnoubi, S., Alsayh, A.M.: A packet reservation multiple access (PRMA)-based algorithm for
multimedia wireless system. IEEE Trans. Veh. Technol. 53(1), 215–222 (2004)
References 135
37. End-user multimedia QoS categories. Technical Report G.1010, International Telecommuni-
cation Union-Telecommunication Standardization Sector (ITU-T) (2001)
38. Engelstad, P., Osterbo, O.: Analysis of the total delay of IEEE 802.11e EDCA and 802.11
DCF. In: Proceedings of IEEE International Conference on Communications (ICC), Istanbul,
pp. 552–559 (2006)
39. Falconer, D.D., Adachi, F., Gudmundson, B.: Time division multiple access methods for
wireless personal communications. IEEE Commun. Mag. 33(1), 50–57 (1995)
40. First report and order in the matter of revision of part 15 of the commission’s rules regarding
ultra-wideband transmission systems. Technical Report FCC 02-48, Federal Communications
Commission (FCC) (2002)
41. Foh, C., Zukerman, M., Tantra, J.: A markovian framework for performance evaluation of
IEEE 802.11. IEEE Trans. Wirel. Commun. 6(4), 1276–1285 (2007)
42. Frigon, J.F., Leung, V.C.M., Chan Bun Chan, H.: Dynamic reservation TDMA protocol for
wireless ATM networks. IEEE J. Sel. Areas Commun. 19(2), 370–383 (2001)
43. Garetto, M., Chiasserini, C.F.: Performance analysis of the 802.11 distributed coordination
function under sporadic traffic. In: Proceedings of 4th International Networking Conference,
Waterloo, pp. 1–12 (2005)
44. Generic criteria for version 1.0 wireless access communications system (WACS). Technical
Report TA-NWT-001313, Bellcore Technical Advisory (1992)
45. Glabowski, M., Kubasik, K., Stasiak, M.: Modelling of systems with overflow multi-rate
traffic and finite number of traffic sources. In: Proceedings of International Symposium
on Communication Systems, Networks and Digital Signal Processing (CSNDSP), Graz,
pp. 196–199 (2008)
46. Goodman, D.: Trends in cellular and cordless communications. IEEE Commun. Mag. 29(6),
31–40 (1991)
47. Hall, P.S., Hao, Y.: Antennas and Propagation for Body-Centric Wireless Communications.
Artech House, Boston (2006)
48. He, J., Zheng, L., Yang, Z., Chou, C.T.: Performance analysis and service differentiation in
IEEE 802.11 WLAN. In: Proceedings of IEEE Conference on Local Computer Networks
(LCN), Bonn, pp. 691–697 (2003)
49. High rate ultra wideband PHY and MAC standard. Technical Report ECMA-368, WiMedia
Alliance (2005). http://www.ecma-international.org/publications/standards/Ecma-368.htm
50. Hossain, E., Bhargava, V.K.: A centralized TDMA-based scheme for fair bandwidth alloca-
tion in wireless IP networks. IEEE J. Sel. Areas Commun. 19(11), 2201–2214 (2001)
51. Howarth, J.A., et al.: Towards a 60 GHz gigabit System-On-Chip. In: Proceedings of Wireless
World Research Forum Meeting (WWRF), Shanghai (2006)
52. Huang, Y.K., Pang, A.C., Hsiu, P.C., Zhuang, W., Liu, P.: Distributed throughput optimization
for ZigBee cluster-tree networks. IEEE Trans. Parallel Distrib. Syst. 23(3), 513–520 (2012)
53. Hui, J., Devetsikiotis, M.: Designing improved MAC packet scheduler for 802.11e WLAN.
In: Proceedings of IEEE Global Communications Conference (GLOBECOM), San Francisco,
CA, pp. 184–189 (2003)
54. IEEE standard for wireless medium access control (MAC) and physical layer (PHY)
specifications: medium access control (MAC) quality of service enhancements. Technical
Report IEEE 802.11e-2005, IEEE Standards Association - Wireless LAN Working Group
(2005)
55. Jiang, H., Wang, P., Zhuang, W., Shen, X.: An interference aware distributed resource
management scheme for CDMA-based wireless mesh backbone. IEEE Trans. Wirel.
Commun. 6(12), 4558–4567 (2007)
56. Kato, S., Harada, H., Funada, R., Baykas, T., Sum, C.S., Wang, J., Rahman, M.A.: Single
carrier transmission for multi-gigabit 60-GHz WPAN systems. IEEE J. Sel. Areas Commun.
27(8), 1466–1478 (2009)
57. Kumar, A., Altman, E., Miorandi, D., Goyal, M.: New insights from a fixed point analysis of
single cell IEEE 802.11 WLANs. IEEE/ACM Trans. Netw. 15(3), 588–601 (2007)
136 References
58. Lee, J.G., Corson, M.S.: The performance of an “imbedded” Aloha protocol in wireless
networks. In: Proceedings of IEEE International Symposium on Personal, Indoor and Mobile
Radio Communications (PIMRC), Taipei, vol. 2, pp. 377–381 (1996)
59. Ling, X.: Performance analysis of distributed MAC protocols for wireless networks. Ph.D.
dissertation, University of Waterloo, Ontario (2007)
60. Ling, X., Liu, K.H., Cheng, Y., Shen, X.: A novel performance model for distributed
prioritized MAC protocols. In: Proceedings of IEEE Global Communications Conference
(GLOBECOM), Washington, DC, pp. 4692–4696 (2007)
61. Ling, X., Cheng, Y., Mark, J.W., Shen, X.: A renewal theory based analytical model for
the contention access period of IEEE 802.15.4 MAC. IEEE Trans. Wirel. Commun. 7(6),
2340–2349 (2008)
62. Liu, K.H., Shen, X., Zhang, R., Cai, L.: Delay analysis of distributed reservation protocol
with UWB shadowing channel for WPAN. In: Proceedings of IEEE International Conference
on Communications (ICC), Beijing, pp. 2769–2774 (2008)
63. Liu, K.H., Ling, X., Shen, X., Mark, J.W.: Performance analysis of prioritized MAC in UWB
WPAN with bursty multimedia traffic. IEEE Trans. Veh. Technol. 57(4), 2462–2473 (2008)
64. Liu, K.H., Shen, X., Zhang, R., Cai, L.: Performance analysis of distributed reservation
protocol for UWB-based WPAN. IEEE Trans. Veh. Technol. 58(2), 902–913 (2009)
65. Local and metropolitan area networks - wireless LAN medium access control (MAC) and
physical layer (PHY) specifications. Technical Report IEEE 802.11-1997, IEEE Standards
Association - LAN/MAN Standards Committee (1997)
66. Ma, X., Refai, H.H.: Analysis of sliding frame R-ALOHA protocol for real-time distributed
wireless networks. Wirel. Netw. 15(8), 1102–1112 (2009)
67. Malone, D., Dangerfield, I., Leith, D.: Verification of common 802.11 MAC model assump-
tions. In: Proceedings of Passive and Active Measurement Conference (PAM), Louvain-la-
Neuve, pp. 63–72 (2007)
68. Matrawy, A., Lambadaris, I., Huang, C.: MPEG4 traffic modeling using the transform
expand sample methodology. In: Proceedings of IEEE International Workshop on Networked
Appliances (IWNA), Liverpool, pp. 249–256 (2002)
69. MBOA wireless medium access control (MAC) specification for high rate wireless personal
area networks (WPANS). Technical Report MBOA MAC Specification Draft 0.65, Multiband
OFDM Alliance (2004). http://www.multibandofdm.org/
70. Network simulator 2 (NS-2): version 2.33 (2008)
71. One-way transmission time. Technical Report G.114, International Telecommunication
Union-Telecommunication Standardization Sector (ITU-T) (2003)
72. Papantoni-Kazakos, T., Likhanov, N.B., Tsybakov, B.: A protocol for random multiple access
of packets with mixed priorities in wireless networks. IEEE J. Sel. Areas Commun. 13(7),
1324–1331 (1995)
73. Part 11: Wireless LAN medium access control (MAC) and physical layer (PHY) specifica-
tions: high speed physical layer in the 5 GHz band. Technical Report IEEE 802.11a-1999,
IEEE Standards Association - Wireless LAN Working Group (1999)
74. Part 11: Wireless LAN medium access control (MAC) and physical layer (PHY) specifica-
tions: higher speed physical layer (PHY) extension in the 2.4 GHz band. Technical Report
IEEE 802.11b-1999, IEEE Standards Association - Wireless LAN Working Group (1999)
75. Part 11: Wireless LAN medium access control (MAC) and physical layer (PHY) specifi-
cations: further higher data rate extension in the 2.4 GHz band. Technical Report IEEE
802.11g-2003, IEEE Standards Association - Wireless LAN Working Group (2003)
76. Part 11: Wireless LAN medium access control (MAC) and physical layer (PHY) specifica-
tions. Technical Report IEEE 802.11-2007, IEEE Standards Association - Wireless LAN
Working Group (2007)
77. Part 11: Wireless LAN medium access control (MAC) and physical layer (PHY) specifi-
cations: enhancements for higher throughput. Technical Report IEEE 802.11n-2009, IEEE
Standards Association - Wireless LAN Working Group (2009)
References 137
78. Part 11: Wireless LAN medium access control (MAC) and physical layer (PHY) specifi-
cations: interworking with external networks. Technical Report IEEE 802.11u-2011, IEEE
Standards Association - Wireless LAN Working Group (2011)
79. Part 11: Wireless LAN medium access control (MAC) and physical layer (PHY) specifica-
tions. Technical Report IEEE 802.11-2012, IEEE Standards Association - Wireless LAN
Working Group (2012)
80. Part 11: Wireless LAN medium access control (MAC) and physical layer (PHY) specifica-
tions: enhancements for very high throughput for operation in bands below 6 GHz. Technical
Report IEEE 802.11ac-2013, IEEE Standards Association - Wireless LAN Working Group
(2013)
81. Part 11: Wireless LAN medium access control (MAC) and physical layer (PHY) specifica-
tions: enhancements for very high throughput in the 60 GHz band. Technical Report IEEE
802.11ad-2012, IEEE Standards Association - Wireless LAN Working Group (2012)
82. Part 11: Wireless LAN medium access control (MAC) and physical layer (PHY) specifica-
tions: television white spaces (TVWS) operation. Technical Report IEEE 802.11af-2013,
IEEE Standards Association - Wireless LAN Working Group (2013)
83. Part 15: Wireless medium access control (MAC) and physical layer (PHY) specifications
for wireless personal area networks (WPAN). Technical Report IEEE 802.15.1-2002, IEEE
Standards Association - WPAN Working Group (2002)
84. Part 15.1a: Wireless medium access control (MAC) and physical layer (PHY) specifications
for wireless personal area networks (WPAN). Technical Report IEEE 802.15.1-2005, IEEE
Standards Association - WPAN Working Group (2005)
85. Part 15.2: Coexistence of wireless personal area networks with other wireless devices
operating in unlicensed frequency bands. Technical Report IEEE 802.15.2-2003, IEEE
Standards Association - WPAN Working Group (2003)
86. Part 15.3: Wireless medium access control (MAC) and physical layer (PHY) specifications for
high rate wireless personal area networks (WPAN). Technical Report IEEE 802.15.3-2003,
IEEE Standards Association - WPAN Working Group (2003)
87. Part 15.3: Wireless medium access control (MAC) and physical layer (PHY) specifications for
high rate wireless personal area networks (WPAN): amendment to MAC sublayer. Technical
Report IEEE 802.15.3b-2005, IEEE Standards Association - WPAN Working Group (2005)
88. Part 15.3: Wireless medium access control (MAC) and physical layer (PHY) specifications for
high rate wireless personal area networks (WPAN): millimeter-wave-based alternative phys-
ical layer extension. Technical Report IEEE 802.15.3c-2009, IEEE Standards Association -
WPAN Working Group (2009)
89. Part 15.4: Wireless medium access control (MAC) and physical layer (PHY) specifications for
low rate wireless personal area networks (WPANs). Technical Report IEEE 802.15.4-2003,
IEEE Standards Association - WPAN Working Group (2003)
90. Part 15.4: Wireless medium access control (MAC) and physical layer (PHY) specifications for
low rate wireless personal area networks (WPANs). Technical Report IEEE 802.15.4-2006,
IEEE Standards Association - WPAN Working Group (2006)
91. Part 15.4: Wireless medium access control (MAC) and physical layer (PHY) specifications
for low rate wireless personal area networks (WPANs): add alternate PHYs. Technical Report
IEEE 802.15.4a-2007, IEEE Standards Association - WPAN Working Group (2007)
92. Part 15.4: Wireless medium access control (MAC) and physical layer (PHY) specifications
for low rate wireless personal area networks (WPANs): alternative physical layer extension to
support one or more of the Chinese 314–316 MHz, 430–434 MHz, and 779–787 MHz bands.
Technical Report IEEE 802.15.4c-2009, IEEE Standards Association - WPAN Working
Group (2009)
93. Part 15.4: Wireless medium access control (MAC) and physical layer (PHY) specifications
for low rate wireless personal area networks (WPANs): alternative physical layer extension
to support the Japanese 950 MHz bands. Technical Report IEEE 802.15.4d-2009, IEEE
Standards Association - WPAN Working Group (2009)
138 References
94. Part 15.4: Wireless medium access control (MAC) and physical layer (PHY) specifications
for low rate wireless personal area networks (WPANs): active radio frequency identification
(RFID) system physical layer (PHY). Technical Report IEEE 802.15.4f-2012, IEEE
Standards Association - WPAN Working Group (2012)
95. Part 15.4: Wireless medium access control (MAC) and physical layer (PHY) specifications
for low rate wireless personal area networks (WPANs): MAC sublayer. Technical Report
IEEE 802.15.4e-2012, IEEE Standards Association - WPAN Working Group (2012)
96. Part 15.4: Wireless medium access control (MAC) and physical layer (PHY) specifications for
low rate wireless personal area networks (WPANs): physical layer (PHY) specifications for
low-data-rate, wireless, smart metering utility networks. Technical Report IEEE 802.15.4g-
2012, IEEE Standards Association - WPAN Working Group (2012)
97. Part 15.4: Wireless medium access control (MAC) and physical layer (PHY) specifications for
low rate wireless personal area networks (WPANs). Technical Report IEEE 802.15.4-2015,
IEEE Standards Association - WPAN Working Group (2015)
98. Part 15.5: Mesh topology capability in wireless personal area networks (WPANs). Technical
Report IEEE 802.15.5-2009, IEEE Standards Association - WPAN Working Group (2009)
99. Part 15.6: Wireless body area networks. Technical Report IEEE 802.15.6-2012, IEEE
Standards Association - WPAN Working Group (2012)
100. Part 15.7: Short-range wireless optical communication using visible light. Technical Report
IEEE 802.15.7-2011, IEEE Standards Association - WPAN Working Group (2011)
101. Pattara-Atikom, W., Krishnamurthy, P., Banerjee, S.: Distributed mechanisms for quality of
service in wireless LANs. IEEE Wirel. Commun. 10(3), 26–34 (2003)
102. Pavon, J.D.P., Shankar, N.S., Gaddam, V., Challapali, K., Chou, C.T.: The MBOA-WiMedia
specification for ultra wideband distributed networks. IEEE Commun. Mag. 44(6), 128–134
(2006)
103. Personal digital cellular telecommunication system. Technical Report RCR STD-27 (2008)
104. Personal handy phone system. Techical Report RCR STD-28 (2011)
105. Qiao, D., Shin, K.G.: Achieving efficient channel utilization and weighted fairness for
data communications in IEEE 802.11 WLAN under the DCF. In: Proceedings of IEEE
International Workshop on Quality of Service (IWQoS), Miami, FL, pp. 227–236 (2002)
106. Qiu, X., Li, V.O.K.: Dynamic reservation multiple access (DRMA): a new multiple access
scheme for personal communication system (PCS). Wirel. Netw. 2(2), 117–128 (1996)
107. Qiu, R.C., Liu, H., Shen, X.: Ultra-wideband for multiple access communications. IEEE
Commun. Mag. 43(2), 80–87 (2005)
108. Ramaiyan, V., Kumar, A., Altman, E.: Fixed point analysis of single cell IEEE 802.11e
WLANs: uniqueness and multistability. IEEE/ACM Trans. Netw. 16(5), 1080–1093 (2008)
109. Roberts, J., Mocci, U., Virtamo, J.: Broadband Network Teletraffic. Final Report of Action
COST 242. Springer, Berlin (1996)
110. Robinson, J.W., Randhawa, T.S.: Saturation throughput analysis of IEEE 802.11e enhanced
distributed coordination function. IEEE J. Sel. Areas Commun. 22(5), 917–928 (2004)
111. Roy, S., Foerster, J.R., Somayazulu, V.S., Leeper, D.G.: Ultrawideband radio design: the
promise of high-speed, short-range wireless connectivity. Proc. IEEE 92(2), 295–311 (2004)
112. Ruby, R., Pan, J.: Video streaming with PCA and hard vs soft DRP. In: Proceedings of IEEE
Global Communications Conference (GLOBECOM), Miami, FL, pp. 1–6 (2010)
113. Ruiz, J.A., Shimamoto, S.: Novel communication services based on human body and
environment interaction: applications inside trains and applications for handicapped people.
In: Proceedings of IEEE Wireless Communications and Networking Conference (WCNC),
Las Vegas, NV, pp. 2240–2245 (2006)
114. Saberinia, E., Tewfik, A.H.: Pulsed and non-pulsed OFDM ultra wideband wireless personal
area networks. In: Proceedings of IEEE Ultra Wideband Systems and Technologies
(UWBST), Reston, VA, pp. 275–279 (2002)
115. Sadri, A.: Summary of usage models for 802.15. 3c. Technical Report 15, IEEE P802 (2006)
116. Saleh, A.A., Valenzuela, R.A.: A statistical model for indoor multipath propagation. IEEE J.
Sel. Areas Commun. 5(2), 128–137 (1987)
References 139
117. Shah, R.C., Yarvis, M.D.: Characteristics of on-body 802.15.4 networks. In: Proceedings of
IEEE Workshop on Wireless Mesh Networks (WiMesh), Reston, VA, pp. 138–139 (2006)
118. Shen, X., Zhuang, W., Jiang, H., Cai, J.: Medium access control in ultra-wideband wireless
networks. IEEE Trans. Veh. Technol. 54(5), 1663–1677 (2005)
119. Sheu, S.T., Sheu, T.F.: A bandwidth allocation/sharing/extension protocol for multimedia over
IEEE 802.11 ad hoc wireless LANs. IEEE J. Sel. Areas Commun. 19(10), 2065–2080 (2001)
120. Smith, D., Miniutti, D., Hanlen, L.: Characterization of the body-area propagation channel
for monitoring a subject sleeping. IEEE Trans. Antennas Propag. 59(11), 4388–4392 (2011)
121. Stavrakakis, I., Kazakos, D.: A multiuser random-access communication system for users
with different priorities. IEEE Trans. Commun. 39(11), 1538–1541 (1991)
122. Takizawa, K., Aoyagi, T., Kohno, R.: Channel modeling and performance evaluation of
UWB-based wireless body area networks. In: Proceedings of IEEE International Conference
on Communications (ICC), Dresden, pp. 1–5 (2009)
123. Tasaka, S., Hayashi, K., Ishihashi, Y.: Integrated video and data transmission in the TDD
ALOHA-reservation wireless LAN. In: Proceedings of IEEE International Conference on
Communications (ICC), Seattle, WA, vol. 3, pp. 1387–1393 (1995)
124. Telecommunications and information exchange between systems – Local and metropolitan
area networks – Specific requirements – Part 11: Wireless LAN Medium Access Control
(MAC) and Physical Layer (PHY) Specifications. Technical Report ISO/IEC 8802–11:2005
(IEEE Std 802.11–2003 Edition), IEEE Standards Association – Wireless LAN Working
Group (2005)
125. TG3c channel modeling sub-committee final report. Technical Report IEEE802.15-07-0584-
00-003c, IEEE P802.15 Working Group for Wireless Personal Area Networks (2007)
126. Tickoo, O., Sikdar, B.: Modeling queueing and channel access delay in unsaturated IEEE
802.11 random access MAC based wireless networks. IEEE/ACM Trans. Netw. 16(4),
878–891 (2008)
127. Tinnirello, I., Bianchi, G.: Rethinking the IEEE 802.11e EDCA performance modeling
methodology. IEEE/ACM Trans. Netw. 18(2), 540–553 (2010)
128. Triple-play services quality of experience (QoE) requirements. Technical Report TR-126,
DSL Forum Architecture & Transport Working Group (2006)
129. Ullah, S., Mohaisen, M., Alnuem, M.A.: A review of IEEE 802.15.6 MAC, PHY, and security
specifications. Hindawi Int. J. Distrib. Sens. Netw. 9(4), 1–12 (2013)
130. Vaidya, N.H., Bahl, P., Gupta, S.: Distributed fair scheduling in a wireless LAN. In:
Proceedings of ACM International Conference on Mobile Computing and Networking
(MOBICOM), Boston, MA, pp. 167–178 (2000)
131. Veres, A., Campbell, A.T., Barry, M., Sun, L.H.: Supporting service differentiation in wireless
packet networks using distributed control. IEEE J. Sel. Areas Commun. 19(10), 2081–2093
(2001)
132. Wang, P., Zhuang, W.: A collision-free MAC scheme for multimedia wireless mesh backbone.
IEEE Trans. Wirel. Commun. 8(7), 3577–3589 (2009)
133. Wilkinson, R.: Theories for toll traffic engineering in the U.S.A. Bell Syst. Tech. J. 35(2),
421–514 (1956)
134. Wilson, P., Johnstone, M., Neely, M., Boles, D.: Dynamic storage allocation: a survey and
critical review. In: Memory Management, pp. 1–116. Springer, Berlin (1995)
135. Wimedia logical link control protocol. Technical Report, WiMedia Alliance (2007)
136. Win, M.Z., et al.: Ultra-wide bandwidth time-hopping spread-spectrum impulse radio for
wireless multiple-access communications. IEEE Trans. Commun. 48(4), 679–689 (2000)
137. Winands, E., Denteneer, T., Resing, J., Rietman, R.: A finite-source feedback queueing
network as a model for the IEEE 802.11 DCF. Eur. Trans. Telecommun. 16(1), 77–89 (2005)
138. Wong, D., Chin, F., Shajan, M., Chew, Y.: Performance analysis of saturated throughput of
PCA in the presence of hard DRPs in wimedia MAC. In: Proceedings of IEEE Wireless
Communications and Networking Conference (WCNC), Hong Kong, pp. 423–429 (2007)
139. Wu, H., Peng, Y., Long, K., Cheng, S., Ma, J.: Performance of reliable transports protocol over
IEEE 802.11 wireless LAN: analysis and enhancement. In: Proceedings of IEEE/ACM Inter-
national Conference on Computer Communications (INFOCOM), New York, pp. 599–607
(2002)
140 References
140. Wu, H., Xia, Y., Zhang, Q.: Delay analysis of DRP in MBOA UWB MAC. In: Proceedings
of IEEE International Conference on Communications (ICC), Istanbul, pp. 229–233 (2006)
141. Xiao, Y.: Backoff-based priority schemes for IEEE 802.11. In: Proceedings of IEEE
International Conference on Communications (ICC), Anchorage, AK, pp. 1568–1572 (2003)
142. Xiao, Y.: Enhanced DCF of IEEE 802.11e to support QoS. In: Proceedings of IEEE Wireless
Communications and Networking Conference (WCNC), New Orleans, LA, pp. 1291–1296
(2003)
143. Xiao, Y.: Performance analysis of priority schemes for IEEE 802.11 and IEEE 802.11e
wireless LANs. IEEE Trans. Wirel. Commun. 4(4), 1506–1515 (2005)
144. Xiao, Y., Li, H.: Evaluation of distributed admission control for the IEEE 802.11e EDCA.
IEEE Commun. Mag. 42(9), 20–24 (2004)
145. Xu, K., Wang, Q., Hassanein, H.: Performance analysis of differentiated QoS supported
by IEEE 802.11e enhanced distributed coordination function (EDCF) in WLAN. In: Pro-
ceedings of IEEE Global Communications Conference (GLOBECOM), San Francisco, CA,
pp. 1048–1053 (2003)
146. Yang, L., Giannakis, G.B.: Ultra-wideband communications: an idea whose time has come.
IEEE Signal Process. Mag. 21(6), 26–54 (2004)
147. Yu, J.Y., Liao, W.C., Lee, C.Y.: A MT-CDMA based wireless body area network for
ubiquitous healthcare monitoring. In: Proceedings of Biomedical Circuits and Systems
Conference (BioCAS), London, pp. 98–101 (2006)
148. Zeidler, E.: Nonlinear Functional Analysis and Its Applications, 1: Fixed-Point Theorems.
Springer, Berlin (1986)
149. Zhai, H., Kwon, Y., Fang, Y.: Performance analysis of IEEE 802.11 MAC protocols in wirless
LANs. Wirel. Commun. Mob. Comput. 4(8), 917–931 (2004)
150. Zhang, H.: Service disciplines for guaranteed performance service in packet-switching
networks. Proc. IEEE 83(10), 1374–1396 (1995)
151. Zhang, R., Cai, L.: A packet-level model for UWB channel with people shadowing process
based on angular spectrum analysis. IEEE Trans. Wirel. Commun. 8(8), 4048–4055 (2009)
152. Zhang, R., Cai, L.: Joint AMC and packet fragmentation for error-control over fading
channels. IEEE Trans. Veh. Technol. 59(6), 3070–3080 (2010)
153. Zhang, L., Shu, Y., Yang, O., Wang, G.: Study of medium access delay in IEEE 802.11
wireless networks. IEICE Trans. Commun. 89, 1284–1293 (2006)
154. Zhang, Y., Bin, L., Qi, C.: Characterization of on-human-body UWB radio propagation
channel. Microw. Opt. Technol. Lett. 49(6), 1356–1371 (2007)
155. Zhang, R., Ruby, R., Pan, J., Cai, L., Shen, X.: A hybrid reservation/contention-based MAC
for video streaming over wireless networks. IEEE J. Sel. Areas Commun. 28(3), 389–398
(2010)
156. Zhang, R., Cai, L., Pan, J.: Performance study of hybrid MAC using soft reservation for
wireless networks. In: Proceedings of IEEE International Conference on Communications
(ICC), Kyoto, pp. 1–5 (2011)
157. Zhang, R., Cai, L., Pan, J., Shen, X.: Resource management for video streaming in ad hoc
networks. Elsevier Ad Hoc Netw. 9(4), 623–634 (2011)
158. Zhao, J., Guo, Z., Zhang, Q., Zhu, W.: Performance study of MAC for service differentiation
in IEEE 802.11. In: Proceedings of IEEE Global Communications Conference (GLOBE-
COM), Taipei, pp. 778–782 (2002)
159. Zheng, Y., Lu, K., Wu, D., Fang, Y.: Performance analysis of IEEE 802.11 DCF in imperfect
channels. IEEE Trans. Veh. Technol. 55(5), 1648–1656 (2006)
160. Zhu, H., Chlamtac, I.: An analytical model for IEEE 802.11e EDCF differential services.
In: Proceedings of International Conference on Computer Communications and Networks
(ICCCN), Dallas, TX, pp. 163–168 (2003)
161. Zhu, H., Chlamtac, I.: Performance analysis for IEEE 802.11e EDCF service differentiation
J. IEEE Trans. Wirel. Commun. 4(4), 1779–1788 (2005)
162. Zhuang, W., Shen, X., Bi, Q.: Ultra-wideband wireless communications. Wirel. Commun.
Mob. Comput. 3(6), 663–685 (2003)