Free Essay

Ieee

In:

Submitted By kang1204
Words 8526
Pages 35
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 18, NO. 3, MARCH 2000

535

Performance Analysis of the IEEE 802.11 Distributed Coordination Function
Giuseppe Bianchi
Abstract—Recently, the IEEE has standardized the 802.11 protocol for Wireless Local Area Networks. The primary medium access control (MAC) technique of 802.11 is called distributed coordination function (DCF). DCF is a carrier sense multiple access with collision avoidance (CSMA/CA) scheme with binary slotted exponential backoff. This paper provides a simple, but nevertheless extremely accurate, analytical model to compute the 802.11 DCF throughput, in the assumption of finite number of terminals and ideal channel conditions. The proposed analysis applies to both the packet transmission schemes employed by DCF, namely, the basic access and the RTS/CTS access mechanisms. In addition, it also applies to a combination of the two schemes, in which packets longer than a given threshold are transmitted according to the RTS/CTS mechanism. By means of the proposed model, in this paper we provide an extensive throughput performance evaluation of both access mechanisms of the 802.11 protocol. Index Terms—802.11, collision avoidance, CSMA, performance evaluation.

I. INTRODUCTION N recent years, much interest has been involved in the design of wireless networks for local area communication [1], [2]. Study group 802.11 was formed under IEEE Project 802 to recommend an international standard for Wireless Local Area Networks (WLAN’s). The final version of the standard has recently appeared [3], and provides detailed medium access control (MAC) and physical layer (PHY) specification for WLAN’s. In the 802.11 protocol, the fundamental mechanism to access the medium is called distributed coordination function (DCF). This is a random access scheme, based on the carrier sense multiple access with collision avoidance (CSMA/CA) protocol. Retransmission of collided packets is managed according to binary exponential backoff rules. The standard also defines an optional point coordination function (PCF), which is a centralized MAC protocol able to support collision free and time bounded services. In this paper we limit our investigation to the DCF scheme. DCF describes two techniques to employ for packet transmission. The default scheme is a two-way handshaking technique called basic access mechanism. This mechanism is characterized by the immediate transmission of a positive acknowledgement (ACK) by the destination station, upon successful reception of a packet transmitted by the sender station. Explicit transManuscript received November 1998; revised July 25, 1999. this work was supported in part by CNR and MURST, Italy. The author is with the Universitá di Palermo, Dipartimento di Ingegneria Elettrica, Viale delle Scienza, 90128 Palermo, Italy (e-mail: bianchi@elet.polimi.it). Publisher Item Identifier S 0733-8716(00)01290-7.

I

mission of an ACK is required since, in the wireless medium, a transmitter cannot determine if a packet is successfully received by listening to its own transmission. In addition to the basic access, an optional four way handshaking technique, known as request-to-send/clear-to-send (RTS/CTS) mechanism has been standardized. Before transmitting a packet, a station operating in RTS/CTS mode “reserves” the channel by sending a special Request-To-Send short frame. The destination station acknowledges the receipt of an RTS frame by sending back a Clear-To-Send frame, after which normal packet transmission and ACK response occurs. Since collision may occur only on the RTS frame, and it is detected by the lack of CTS response, the RTS/CTS mechanism allows to increase the system performance by reducing the duration of a collision when long messages are transmitted. As an important side effect, the RTS/CTS scheme designed in the 802.11 protocol is suited to combat the so-called problem of Hidden Terminals [4], which occurs when pairs of mobile stations result to be unable to hear each other. This problem has been specifically considered in [5] and in [6], which, in addition, studies the phenomenon of packet capture. In this paper, we concentrate on the performance evaluation of the DCF scheme, in the assumption of ideal channel conditions and finite number of terminals. In the literature, performance evaluation of 802.11 has been carried out either by means of simulation [7], [8] or by means of analytical models with simplified backoff rule assumptions. In particular, constant or geometrically distributed backoff window has been used in [5], [9], [10] while [11] has considered an exponential backoff limited to two stages (maximum window size equal to twice the minimum size) by employing a two dimensional Markov chain analysis. In this paper, which revises and substantially extends [12], we succeed in providing an extremely simple model that accounts for all the exponential backoff protocol details, and allows to compute the saturation (asymptotic) throughput performance of DCF for both standardized access mechanisms (and also for any combination of the two methods). The key approximation that enables our model is the assumption of constant and independent collision probability of a packet transmitted by each station, regardless of the number of retransmissions already suffered. As proven by comparison with simulation, this assumption leads to extremely accurate (practically exact) results, especially when the number of stations in the wireless LAN is fairly large (say greater than ten). The paper is outlined as follows. In Section II we briefly review both basic access and RTS/CTS mechanisms of the DCF. In Section III we define the concept of Saturation Throughput, and in Section IV we provide an analytical technique to com-

0733–8716/00$10.00 © 2000 IEEE

536

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 18, NO. 3, MARCH 2000

pute this performance figure. Section V validates the accuracy of the model by comparing the analytical results with that obtained by means of simulation. Additional considerations on the maximum throughput theoretically achievable are carried out in Section VI. Finally, the performance evaluation of both DCF access schemes is carried out in Section VII. Concluding remarks are given in Section VIII. II. 802.11 DISTRIBUTED COORDINATION FUNCTION This section briefly summarizes the DCF as standardized by the 802.11 protocol. For a more complete and detailed presentation, refer to the 802.11 standard [3]. A station with a new packet to transmit monitors the channel activity. If the channel is idle for a period of time equal to a distributed interframe space (DIFS), the station transmits. Otherwise, if the channel is sensed busy (either immediately or during the DIFS), the station persists to monitor the channel until it is measured idle for a DIFS. At this point, the station generates a random backoff interval before transmitting (this is the Collision Avoidance feature of the protocol), to minimize the probability of collision with packets being transmitted by other stations. In addition, to avoid channel capture, a station must wait a random backoff time between two consecutive new packet transmissions, even if the medium is sensed idle in the DIFS time.1 For efficiency reasons, DCF employs a discrete-time backoff scale. The time immediately following an idle DIFS is slotted, and a station is allowed to transmit only at the beginning of each slot time. The slot time size, , is set equal to the time needed at any station to detect the transmission of a packet from any other station. As shown in Table I, it depends on the physical layer, and it accounts for the propagation delay, for the time needed to switch from the receiving to the transmitting state (RX_TX_Turnaround_Time), and for the time to signal to the MAC layer the state of the channel (busy detect time). DCF adopts an exponential backoff scheme. At each packet transmission, the backoff time is uniformly chosen in the range . The value is called contention window, and depends on the number of transmissions failed for the packet. At the first transmission attempt, is set equal to a value called minimum contention window. After each unsuccessful transmission, is doubled, up to a maximum value . The values and reported in the final version of the standard [3] are PHY-specific and are summarized in Table I. The backoff time counter is decremented as long as the channel is sensed idle, “frozen” when a transmission is detected on the channel, and reactivated when the channel is sensed idle again for more than a DIFS. The station transmits when the backoff time reaches zero. Fig. 1 illustrates this operation. Two stations A and B share the same wireless channel. At the end of the packet transmis1As an exception to this rule, the protocol provides a fragmentation mechanism, which allows the MAC to split an MSDU (the packet delivered to the MAC by the higher layers) into more MPDUs (packets delivered by the MAC to the PHY layer), if the MSDU size exceeds the maximum MPDU payload size. The different fragments are then transmitted in sequence, with only a SIFS between them, so that only the first fragment must contend for the channel access.

TABLE I SLOT TIME, MINIMUM, AND MAXIMUM CONTENTION WINDOW VALUES FOR THE THREE PHY SPECIFIED BY THE 802.11 STANDARD: FREQUENCY HOPPING SPREAD SPECTRUM (FHSS), DIRECT SEQUENCE SPREAD SPECTRUM (DSSS), AND INFRARED (IR)

sion, station B waits for a DIFS and then chooses a backoff time equal to 8, before transmitting the next packet. We assume that the first packet of station A arrives at the time indicated with an arrow in the figure. After a DIFS, the packet is transmitted. Note that the transmission of packet A occurs in the middle of the Slot Time corresponding to a backoff value, for station B, equal to 5. As a consequence of the channel sensed busy, the backoff time is frozen to its value 5, and the backoff counter decrements again only when the channel is sensed idle for a DIFS. Since the CSMA/CA does not rely on the capability of the stations to detect a collision by hearing their own transmission, an ACK is transmitted by the destination station to signal the successful packet reception. The ACK is immediately transmitted at the end of the packet, after a period of time called short interframe space (SIFS). As the SIFS (plus the propagation delay) is shorter than a DIFS, no other station is able to detect the channel idle for a DIFS until the end of the ACK. If the transmitting station does not receive the ACK within a specified ACK_Timeout, or it detects the transmission of a different packet on the channel, it reschedules the packet transmission according to the given backoff rules. The above described two-way handshaking technique for the packet transmission is called basic access mechanism. DCF defines an additional four-way handshaking technique to be optionally used for a packet transmission. This mechanism, known with the name RTS/CTS, is shown in Fig. 2. A station that wants to transmit a packet, waits until the channel is sensed idle for a DIFS, follows the backoff rules explained above, and then, instead of the packet, preliminarily transmits a special short frame called request to send (RTS). When the receiving station detects an RTS frame, it responds, after a SIFS, with a clear to send (CTS) frame. The transmitting station is allowed to transmit its packet only if the CTS frame is correctly received. The frames RTS and CTS carry the information of the length of the packet to be transmitted. This information can be read by any listening station, which is then able to update a network allocation vector (NAV) containing the information of the period of time in which the channel will remain busy. Therefore, when a station is hidden from either the transmitting or the receiving station, by detecting just one frame among the RTS and CTS frames, it can suitably delay further transmission, and thus avoid collision. The RTS/CTS mechanism is very effective in terms of system performance, especially when large packets are considered, as it reduces the length of the frames involved in the contention process. In fact, in the assumption of perfect channel sensing by every station, collision may occur only when two (or more) packets are transmitted within the same slot time. If both trans-

BIANCHI: PERFORMANCE ANALYSIS OF THE IEEE 802.11 DCF

537

Fig. 1.

Example of basic access mechanism. Fig. 2. RTS/CTS Access Mechanism.

mitting stations employ the RTS/CTS mechanism, collision occurs only on the RTS frames, and it is early detected by the transmitting stations by the lack of CTS responses. A quantitative analysis will be carried out in Section VII. III. MAXIMUM AND SATURATION THROUGHPUT PERFORMANCE In this paper we concentrate on the “Saturation Throughput”. This is a fundamental performance figure defined as the limit reached by the system throughput as the offered load increases, and represents the maximum load that the system can carry in stable conditions. It is well known that several random access schemes exhibit an unstable behavior. In particular, as the offered load increases, the throughput grows up to a maximum value, referred to as “maximum throughput.” However, further increases of the offered load lead to an eventually significant decrease in the system throughput. This results in the practical impossibility to operate the random access scheme at its maximum throughput for a “long” period of time, and thus in the practical meaningless of the maximum throughput as performance figure for the access scheme. The mathematical formulation and interpretation of this instability problem is the object of a wide and general discussion in [13]. Indeed, the 802.11 protocol is known to exhibits some form of instability (see, e.g., [5], and [11]). To visualize the unstable behaviour of 802.11, in Fig. 3 we have run simulations in which the offered load linearly increases with the simulation time. The general simulation model and parameters employed are summarized in Section V. The results reported in the figure are obtained with 20 stations. The straight line represents the ideal offered load, normalized with respect of the channel capacity. The simulated offered load has been generated according to a Poisson arrival process of fixed size packets (payload equal to 8184 bits), where the arrival rate has been varied throughout the simulation to match the ideal offered load. The figure reports both offered load and system throughput measured over 20 s time intervals, and normalized with respect to the channel rate. From the figure, we see that the measured throughput follows closely the measured offered load for the first 260 s of simulation, while it asymptotically drops to the value 0.68 in the second part of the simulation run. This asymptotic throughput value is referred to, in this paper, as saturation throughput, and represents the system throughput in overload conditions. Note than, during the simulation run, the instantaneous throughput temporarily increases over the saturation value (up to 0.74 in

Fig. 3. Measured Throughput with slowly increasing offered load.

the example considered), but ultimately it decreases and stabilizes to the saturation value. Queue build-up is observed in such a condition. IV. THROUGHPUT ANALYSIS The core contribution of this paper is the analytical evaluation of the saturation throughput, in the assumption of ideal channel conditions (i.e., no hidden terminals and capture [6]). In the analysis, we assume a fixed number of stations, each always having a packet available for transmission. In other words, we operate in saturation conditions, i.e., the transmission queue of each station is assumed to be always nonempty. The analysis is divided into two distinct parts. First, we study the behavior of a single station with a Markov model, and we obtain the stationary probability that the station transmits a packet in a generic (i.e., randomly chosen) slot time. This probability does not depend on the access mechanism (i.e., Basic or RTS/CTS) employed. Then, by studying the events that can occur within a generic slot time, we express the throughput of both Basic and RTS/CTS access methods (as well as of a combination of the two) as function of the computed value . A. Packet Transmission Probability Consider a fixed number of contending stations. In saturation conditions, each station has immediately a packet available

538

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 18, NO. 3, MARCH 2000

Fig. 4. Markov Chain model for the backoff window size.

for transmission, after the completion of each successful transmission. Moreover, being all packets “consecutive,” each packet needs to wait for a random backoff time before transmitting. be the stochastic process representing the backoff Let time counter for a given station. A discrete and integer time correspond to the beginning of scale is adopted: and two consecutive slot times, and the backoff time counter of each station decrements at the beginning of each slot time. Note that this discrete time scale does not directly relates to the system time. In fact, as illustrated in Fig. 1, the backoff time decrement is stopped when the channel is sensed busy, and thus the time interval between two consecutive slot time beginnings may be much longer than the slot time size , as it may include a packet transmission. In what follows, unless ambiguity occurs, with the term slot time we will refer to either the (constant) value , and the (variable) time interval between two consecutive backoff time counter decrements. Since the value of the backoff counter of each station depends also on its transmission history (e.g., how many retransmission the head-of-line packet has suffered), the stochastic process is non-Markovian. However, define for convenience . Let , “maximum backoff stage,” be the value such , and let us adopt the notation , that is called “backoff stage.” Let be the stowhere of the chastic process representing the backoff stage station at time .

The key approximation in our model is that, at each transmission attempt, and regardless of the number of retransmissions suffered, each packet collides with constant and independent probability . It is intuitive that this assumption results more and get larger. will be referred to as accurate as long as conditional collision probability, meaning that this is the probability of a collision seen by a packet being transmitted on the channel. Once independence is assumed, and is supposed to be a constant value, it is possible to model the bidimensional process with the discrete-time Markov chain depicted in Fig. 4. In this Markov chain, the only non null one-step transition probabilities are2

(1) The first equation in (1) accounts for the fact that, at the beginning of each slot time, the backoff time is decremented. The second equation accounts for the fact that a new packet following a successful packet transmission starts with backoff
2We

adopt the short notation:

BIANCHI: PERFORMANCE ANALYSIS OF THE IEEE 802.11 DCF

539

stage 0, and thus the backoff is initially uniformly chosen in the . The other cases model the system after an range unsuccessful transmission. In particular, as considered in the third equation of (1), when an unsuccessful transmission occurs , the backoff stage increases, and the new at backoff stage . initial backoff value is uniformly chosen in the range Finally, the fourth case models the fact that once the backoff stage reaches the value , it is not increased in subsequent packet transmissions. Let be the stationary distribution of the chain. We now show that it is easy to obtain a closed-form solution for this Markov chain. First, note that

However, in general, depends on the conditional collision probability , which is still unknown. To find the value of it is sufficient to note that the probability that a transmitted packet encounters a collision, is the probability that, in a time remaining stations transmit. The slot, at least one of the fundamental independence assumption given above implies that each transmission “sees” the system in the same state, i.e., in steady state. At steady state, each remaining station transmits a packet with probability . This yields (9) Equations (7) and (9) represent a nonlinear system in the two unknowns and , which can be solved using numerical techniques. It is easy to prove that this system has a unique solution. . In fact, inverting (9), we obtain This is a continuous and monotone increasing function in the , that starts from and grows up to range . Equation defined by (7) is also continuous in : continuity in correspondence of the critthe range is simply proven by noting that can be ical value alternatively written as

(2) Owing to the chain regularities, for each , it is (3) By means of relations (2), and making use of the fact that , (3) rewrites as (4) are expressed Thus, by relations (2) and (4), all the values and of the conditional collision as functions of the value is finally determined by imposing the norprobability . malization condition, that simplifies as follows:

and, therefore, . Moreover, is trivially shown to be a monotone decreasing function that and reduces up to starts from . Uniqueness of the solution is now proven noting that and . B. Throughput Let be the normalized system throughput, defined as the fraction of time the channel is used to successfully transmit payload bits. To compute , let us analyze what can happen in a be the probability that there randomly chosen slot time. Let is at least one transmission in the considered slot time. Since stations contend on the channel, and each transmits with probability (10)

(5) from which (6) We can now express the probability that a station transmits in a randomly chosen slot time. As any transmission occurs when the backoff time counter is equal to zero, regardless of the backoff stage, it is

that a transmission occurring on the channel The probability is successful is given by the probability that exactly one station transmits on the channel, conditioned on the fact that at least one station transmits, i.e., (11) We are now able to express as the ratio (12)

(7) , As a side note, it is interesting to highlight that, when i.e., no exponential backoff is considered, the probability results to be independent of , and (7) becomes the much simpler one independently found in [9] for the constant backoff window problem (8)

payload information transmitted in a slot time length of a slot time

the average packet payload size, the average amount Being of payload information successfully transmitted in a slot time , since a successful transmission occurs in a slot is . The average length of a slot time time with probability , is readily obtained considering that, with probability

540

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 18, NO. 3, MARCH 2000

Fig. 5.

and

for basic access and RTS/CTS mechanisms.

the slot time is empty; with probability cessful transmission, and with probability tains a collision. Hence, (12) becomes

it contains a sucit con-

payload size. Taking the conditional expectation on the number of colliding packets, writes as follows:

(13) (15) is the average time the channel is sensed busy (i.e., Here, the slot time lasts) because of a successful transmission, and is the average time the channel is sensed busy by each station during a collision. is the duration of an empty slot time. Of , and must be expressed with course, the values the same unit. Note that the throughput expression (13) has been obtained without the need to specify the access mechanism employed. To specifically compute the throughput for a given DCF access mechanism it is now necessary only to specify the correand . sponding values Let us first consider a system completely managed via the be basic access mechanism. Let the packet header, and be the propagation delay. As shown in Fig. 5, in the basic access case we obtain When the probability of three or more packets simultaneously colliding is neglected, (15) simplifies to (16) is the period of time during which the channel is sensed busy by the noncolliding stations. We neglect the fact that the two or more colliding stations, before sensing the channel again, for these colneed to wait an ACK Timeout, and thus the liding stations is greater than that considered here (the same approximation holds in the following RTS/CTS case, with a CTS Timeout instead of the ACK timeout). Let us now consider a system in which each packet is transmitted by means of the RTS/CTS Access mechanism. As, in such a case, collision can occur only on RTS frames, it is (see Fig. 5)

(14) is the the average length of the longest packet where payload involved in a collision. In the case all packets have the same fixed size, . In the general case, the payload size of each collided packet is an independent random variable . It is thus necessary to assume a suitable probability distribution function for the packet's payload size. Let be the maximum

(17)

and the throughput expression depends on the packet size distribution only through its mean. Finally, (13) can be also adopted to express the throughput of an “Hybrid” system in which, as suggested in the standard [3], packets are transmitted by means of the RTS/CTS mechanism

BIANCHI: PERFORMANCE ANALYSIS OF THE IEEE 802.11 DCF

541

only if they exceed a given predetermined threshold on the the packet's payload size. More specifically, being, again, is the probability distribution function of the packet size, probability that a packet is transmitted according to the basic access mechanism (i.e., the packet size is lower than ), while is the probability that a packet is transmitted via the RTS/CTS mechanism. For convenience, let us indicate with (18)

Finally, noting that in the case of collision between two basic access packets, the probability distribution function of the length of the longest packet payload involved in a collision is the square of the conditional probability distribution function of the packet size distribution (23) By substituting (21), (22), and (23) in (20), we finally obtain

the RTS/CTS overhead for a successful packet transmission. It is easy to recognize that, for the described hybrid access scheme, it is

(19) in the case of the Hybrid Access To compute scheme, we rely on the simplifying assumption that the probability of a collision of more than two packets in the same slot time is negligible. Hence, three possible collision cases may occur: 1) collision between two RTS frames, with probability ; 2) collision between two packets transmitted via , and 3) collision between basic access, with probability a basic access packet and an RTS frame. Hence, indicating with and the respective average collision durations, we obtain

(24) For simplicity, in the rest of this paper we restrict our numerical investigation to the case of fixed packet size, and therefore we will evaluate the performance of systems in which all stations operate either according to the basic access mechanism or according to the RTS/CTS mechanism (i.e., never operating in the hybrid mode.)3 V. MODEL VALIDATION To validate the model, we have compared its results with that obtained with the 802.11 DCF simulator used in [9]. Ours is an event-driven custom simulation program, written in the C++ programming language, that closely follows all the 802.11 protocol details for each independently transmitting station. In particular, the simulation program attempts to emulate as closely as possible the real operation of each station, including propagation times, turnaround times, etc. The values of the parameters used to obtain numerical results, for both the analytical model and the simulation runs, are summarized in Table II. The system values are those specified for the frequency hopping spread spectrum (FHSS) PHY layer [3]. The channel bit rate has been assumed equal to 1 Mbit/s. The frame sizes are those defined by the 802.11 MAC specifications, and the PHY header is that defined for the FHSS PHY. The values of the ACK_Timeout and CTS_Timeout reported in Table II, and used in the simulation runs only (our analysis neglects the effect of these timeouts) are not specified in the standard, and they have been set equal to 300 µs. This numerical value has been chosen as it is sufficiently long to contain a SIFS, the ACK transmission and a round trip delay. Unless otherwise specified, we have used in the simulation runs a constant packet payload size of 8184 bits, which is about one fourth of the maximum MPDU size specified for the FHSS PHY, while it is the maximum MPDU size for the DSSS PHY. Fig. 6 shows that the analytical model is extremely accurate: analytical results (lines) practically coincide with the simulation
3A detailed performance analysis of the hybrid mode requires to assume one or more suitable probability distribution functions for the packet's payload size, and also to determine the sensitivity of the throughput on the assumed distributions. Such a straightforward, but lengthy, study is out of the scopes of the present work.

(20) The average collision durations adopted in (20) detail as folbe the extra lows. Let length of the packet header with respect of the RTS frame, and . The value has been already let of (17), and can be rewritten with computed in the case new notation as (21) To compute the average length of a collision between an RTS frame and a basic access packet, let us note that, according to the numerical values provided by the standard [3], the length of an RTS frame is always lower than the packet header size, defined above is strictly or, in other words, the value positive. Thus, the average length of such a collision is given by the average amount of time the channel is kept busy by the unsuccessful transmission of the basic access packet. Since is the conditional probability distribution function of the payload size of the packets transmitted according to the basic access mechanism, we readily obtain (22)

542

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 18, NO. 3, MARCH 2000

results (symbols), in both basic access and RTS/CTS cases. All simulation results in the plot are obtained with a 95% confidence interval lower than 0.002. Negligible differences, well below 1%, are noted only for a small number of stations (results for the extreme case of as low as 2 and 3 stations are tabulated in Table III). VI. MAXIMUM SATURATION THROUGHPUT The analytical model given above is very convenient to determine the maximum achievable saturation throughput. Let us rearrange (13) to obtain (25) , and , are constants, the throughput As imized when the following quantity is maximized: is max-

TABLE II FHSS SYSTEM PARAMETERS AND ADDITIONAL PARAMETERS USED TO OBTAIN NUMERICAL RESULTS

(26) is the duration of a collision measured in slot where time units . Taking the derivative of (26) with respect to , and imposing it equal to 0, we obtain, after some simplifications, the following equation: (27) Under the condition
Fig. 6. Saturation Throughput: analysis versus simulation. TABLE III ANALYSIS VERSUS SIMULATION: COMPARISON FOR A VERY LOW NUMBER OF STATIONS—

holds, and yields the following approximate solution: (28) Equation (27) and its approximate solution (28) are of fundamental theoretical importance. In fact, they allow to explicitly compute the optimal transmission probability that each station should adopt in order to achieve maximum throughput performance within a considered network scenario (i.e., number of stations ). In other words, they show that (within a PHY and an access mechanism, which determine the constant value ) maximum performance can be, in principle, achieved for every network scenario, through a suitable sizing of the transmission probability in relation to the network size. However, (7) and (9) show that depends only on the network and . As is not a size and on the system parameters directly controllable variable, the only way to achieve optimal performance is to employ adaptive techniques to tune the values and (and consequently ) on the basis of the estimated value of . This problem has been specifically considered in [9] for the ). In such a case, case of fixed backoff window size (i.e.,

is given by (8), and therefore the backoff window that maximizes the system throughput is readily found as

Refer to [9] for an extensive discussion related to the problem of estimating the value . and Unfortunately, in the 802.11 standard, the values are hardwired in the PHY layer details (see Table I for the standardized values), and thus they cannot be made dependent on . As a consequence of this lack of flexibility, the throughput in some network scenarios can be significantly lower than the maximum achievable. Figs. 7 and 8 show the maximum throughput theoretically achievable by the DCF protocol in both the cases of basic access and RTS/CTS mechanisms. The values reported in these figures have been obtained assuming the system parameters reported in

BIANCHI: PERFORMANCE ANALYSIS OF THE IEEE 802.11 DCF

543

Fig. 7. Throughput versus the transmission probability method.

for the basic access

Fig. 8. Throughput versus the transmission probability mechanism.

for the RTS/CTS

Table II. The figure reports also the different throughput values obtained in the case of exact and approximate solution for . As the maximum is very smooth, even a nonnegligible difference in the estimate of the optimal value leads to similar throughput values. The accuracy of the throughput obtained by the approximate solution is better testified by the numerical values reported in Table IV. Note that the agreement is greater in the basic acis greater. cess case, as A surprising result is that the maximum throughput achievable by the basic access mechanism is very close to that achievable by the RTS/CTS mechanism. Moreover, the maximum throughput is practically independent of the number of stations in the wireless network. This is easily justified by noting that the throughput formula can be approximated as , and let us use the approximate follows. Let . For sufficiently large solution (29)

TABLE IV COMPARISON BETWEEN MAXIMUM THROUGHPUT AND THROGHPUT RESULTING FROM APPROXIMATE SOLUTION (28)—THE CASE IS OBTAINED FROM (31)

TABLE V VALUES
AND MEASURED IN BITS AND IN 50 FOR THE CONSIDERED SYSTEM PARAMETERS, FOR RTS/CTS ACCESS METHODS

s SLOT TIME UNITS, BOTH BASIC AND

The maximum achievable throughput imated as

(30) can thus be approxdecrease in the throughput for the basic access case than for the RTS/CTS case. Hence, we expect (see quantitative results in the following Section VII) a much lower dependence of the RTS/CTS throughput on the system engineering parameters with respect of the basic access throughput. VII. PERFORMANCE EVALUATION Unless otherwise specified, the following results have been obtained assuming the parameters reported in Table II and, in bits. particular, assuming a constant payload size Fig. 6 shows that the throughput for the basic access scheme strongly depends on the number of stations in the network. In particular, the figure shows that, in most cases, the greater is the

(31) which results to be independent of . Using the numerical values for the basic access mechaof Table V, we obtain for the RTS/CTS mechanism. The renism, and sulting maximum throughput approximation values are reported . in Table IV under the label An advantage of the RTS/CTS scheme is that the throughput is less sensitive on the transmission probability . In fact, we see from Figs. 7 and 8 (note the different axis scale) that a small variation in the optimal value of leads to a greater

544

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 18, NO. 3, MARCH 2000

Fig. 9. Saturation Throughput versus initial contention window size for the basic access mechanism.

Fig. 10. Saturation Throughput versus initial contention window size for the RTS/CTS mechanism.

network size, the lower is the throughput. The only partial ex. For such an initial contention ception is the case window size, the throughput is comparable in networks with five to ten stations, although it smoothly decreases as the network size increases. The same figure shows that performance impairment does not occur for the RTS/CTS mechanism when increases. In fact, the throughput is practically constant for , and even increases with the number of mobile sta. tions when To investigate the dependency of the throughput from the iniwe have reported in Figs. 9 and tial contention window size for, respec10 the saturation throughput versus the value tively, the basic access and the RTS/CTS mechanisms. In both figures, we have assumed a number of backoff stages equal to 6, . The figures report four different network i.e., sizes, i.e., number of stations equal to 5, 10, 20, and 50. Fig. 9 shows that the throughput of the basic access mechanism highly depends on , and the optimal value of depends on the number of terminals in the network. For example, an high (e.g., 1024) gives excellent throughput performance value of in the case of 50 contending stations, while it drastically penalizes the throughput in the case of small number (e.g., 5) of contending stations. This behavior is seen also in Fig. 10, where the may, in RTS/CTS mechanism is employed. Large values of fact, limit the throughput of a single station, which, when alone in the channel is bounded by (32) and are the average packet payload and the avwhere erage channel holding time in case of successful transmission. Equation (32) is directly obtained from (13) of Section IV-B by observing that, as there are no other stations which can collide with the considered one, the probability of success is equal to that a transmission occurs on 1. In addition, the probability the channel is equal to the probability that the station transmits. Being the conditional collision probability equal to 0, is given by (8).

Of more practical interest is the case of small values of , , and particularly in correspondence of the values and (i.e., those standardized for the three PHY—see Table I). Figs. 9 and 10 show that the two access mechanisms achieve a significantly different operation. In the case of the basic access mechanism, reported in Fig. 9, the system throughput increases as long as gets closer to 64. Moreover, the throughput significantly decreases as the number of stations increases. On the contrary, Fig. 10 shows that the throughput obtained with the RTS/CTS mechanism is almost independent of the value , and, in this range, it is furthermore almost insensitive on the network size. This surprising independence is quantitatively explained as , follows. Dividing numerator and denominator of (13) by we obtain (33) The denominator of (33) expresses the average amount of time spent on the channel in order to observe the successful transmission of a packet payload. This time is further decomposed into three components. is the time spent in order to successfully transmit a packet. and , comTable V reports the numerical values for puted according to (14) and (17), in the assumption of system and channel parameters of Table II. The difference between and (586 bits) is the additional overhead introduced by the RTS/CTS mechanism. The second term at the denominator of (33) does not depend on the access mechanism employed, and represents the amount of time the channel is idle, per successful packet transmission. is the average number of slot times spent on In fact, the channel in order to have a successful transmission. Of those is empty, and each empty slot time slot times, a fraction lasts . The average number of idle slot times per packet trans, is plotted in Fig. 11 versus the mission, i.e., network size, for three different values of the initial contention and , the amount window . We see that, for

BIANCHI: PERFORMANCE ANALYSIS OF THE IEEE 802.11 DCF

545

of idle slot times per packet transmission is very low, particugiven in Table V. This larly when compared with the values gets greater (the case value becomes significant only when is reported in the figure) and the number of stations in the network is small. Finally, the third term at the denominator of (33) represents the time wasted on the channel because of collisions, is the per successful packet transmission. In fact, average number of collided transmissions per each successful transmission, which is multiplied by , i.e., the amount of time the channel is held by a collision. Table V shows that the the RTS/CTS mechanism significantly reduces the time spent during a collision, with respect to the basic access mechanism. This reduction is extremely effective when the system and the network size lead to a large collision parameter probability. This fact is graphically shown in Fig. 12. This figure reports the average amount of time spent in collisions, per successful packet transmission, normalized with respect to the value . It shows that, for the basic access mechanism, the amount of channel time wasted in collisions is extremely and a large number of stations in the large for a small value network. Conversely, the additional amount of time wasted in collisions is negligible for the RTS/CTS mechanism, regardless of the values and . This explains the surprising constant RTS/CTS throughput in any practical system and network operation conditions. Fig. 13 shows that the dependence of the throughput from the maximum number of backoff stages is marginal. The figure reports the cases of both Basic and RTS/CTS access schemes, (similar behaviour is observed for other values of with . The points in the box indicate the parameter ) and , i.e., in correspondence the throughput achieved when of the standardized engineering parameters of the DSSS PHY (Table I). We see that the choice of does not practically affect the system throughput, as long as is greater than four or five. The only case in which the throughput still grows, for relatively large, is the basic access mechanism with a large network size. Our model allows to obtain other measures of interest. The conditional collision probability is the probability, seen by the station, that its transmitted packet collides. Owing to the model's key assumption of independence at each retransmission, the average number of transmissions that each station must perform in order to successfully complete a packet transmission is given . This value is reported in Fig. 14, obtained with the by same system parameters of Figs. 9 and 10. Fig. 14 shows that the number of transmissions per packet significantly increases reduces, and as the network as the initial backoff window size increases. At a first glance, it might seem that the throughput performance of the 802.11 protocol strongly depends on the slot time size . In particular, the lower is , the better is the expected performance. Instead, we note that, as far as saturation throughput performance is concerned, its dependence on the slot time size is only marginal. Table VI reports results for three different system configurations corresponding to the different PHY’s. Results are obtained for both basic access and RTS/CTS mechanism, and for two different network sizes of 10 and 50 stations.

Fig. 11.

Average number of idle slot times per successful packet transmission.

Fig. 12. Average number of slot time units wasted on the channel because of packet collision, per successful packet transmission.

Columns in boldface type correspond to the standardized slot time length for the related PHY. The marginal dependence of the throughput on the slot time size is related to the fact, commented above by means of (33) and Fig. 11, that the number of idle slot times per packet transmission is extremely small. A change of has the only effect to multiply by a constant value the amount of idle channel time per packet transmission. However, for any practical value of and , the amount of idle channel time remains marginal with respect to the time spent in transmission and collision. This result is of fundamental importance for the future development of higher bit rate physical layer recommendations, as the slot time size is difficultly scalable. Finally, let us add some considerations regarding the dependence of the access method on the packet length. It is often qualitatively stated that the RTS/CTS mechanism is effective when the packet size increases. This is justified in Fig. 15. This figure reports the system throughput for both basic access and and RTS/CTS cases, for two different network sizes ( ), and for three different configuration parameters, referred to as FH, DS and IR, corresponding to the three PHY's

546

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 18, NO. 3, MARCH 2000

TABLE VI DEPENDENCE OF THE SATURATION THROUGHPUT ON THE SLOT TIME

Fig. 13.

Throughput versus the maximum number of backoff stages:

.

Fig. 15. Throughput versus packet size for the standardized configuration parameters. Fig. 14. Average number of transmissions per packet.

reference values and Slot time size reported in Table I. It is no more a surprise that the RTS/CTS mechanism achieves very similar performance in all the considered cases. This is due to the fact that the throughput performance marginally depends on the slot time, as shown in Table VI, and on the fact that the RTS/CST scheme is negligibly dependent on the network size and on the minimum contention window size. In the assumption of fixed packet payload size, it is very easy to quantify the threshold value for the packet size over which it is convenient to switch to the RTS/CTS mechanism. In fact, let and the throughput achieved respecus indicate with tively by the basic access and RTS/CTS mechanism in the same system parameters and network size conditions. From (33), the inequality

Let now the overhead introduced by the be the extra RTS/CTS mechanism, and let length of the packet header with respect of the RTS frame size bits, and (according to the values of Table II, bits). Indicating the packet payload with the variable , condition (34) yields (35) The threshold value over which it is convenient to switch to the RTS/CTS scheme is plotted versus the network size in Fig. 16, for the three possible sets of parameters specified for the different PHY’s. This figure shows that the threshold is highly dependent on the PHY employed. This is not a consequence of the different slot time size , which does not affect (35). Instead, it is a direct consequence of the different initial contention adopted (see Table I). The lower the value , window sizes the greater is the performance impairment of the basic access scheme (see Fig. 9), and the greater (and thus for more packet size cases, as shown in Fig. 15) is the advantage of the RTS/CTS scheme.

implies that (34)

BIANCHI: PERFORMANCE ANALYSIS OF THE IEEE 802.11 DCF

547

sizes. When the capability of the RTS/CTS scheme to cope with hidden terminals is accounted, we conclude that this access method should be used in the majority of the practical cases. ACKNOWLEDGMENT The author wishes to thank the anonymous refereers for their helpful comments that have significantly improved the quality of the presentation. REFERENCES
[1] K. Pahlavan and A. H. Levesque, “Wireless data communications,” Proc. IEEE, vol. 82, pp. 1398–1430, Sept. 1994. [2] A. De Simone and S. Nanda, “Wireless data: Systems, standards, services,” J. Wireless Networks, vol. 1, no. 3, pp. 241–254, Feb. 1996. [3] IEEE Standard for Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, Nov. 1997. P802.11. [4] L. Kleinrock and F. Tobagi, “Packet switching in radio channels, Part II—The hidden terminal problem in carrier sense multiple access and the busy tone solution,” IEEE Trans. Commun., vol. COM-23, no. 12, pp. 1417–1433, Dec. 1975. [5] H. S. Chhaya and S. Gupta, “Performance modeling of asynchronous data transfer methods of IEEE 802.11 MAC protocol,” Wireless Networks, vol. 3, pp. 217–234, 1997. [6] K. C. Huang and K. C. Chen, “Interference analysis of nonpersistent CSMA with hidden terminals in multicell wireless data networks,” in Proc. IEEE PIMRC, Toronto, Canada, Sept. 1995, pp. 907–911. [7] B. P. Crow, “Performance evaluation of the IEEE 802.11 Wireless Local Area Network Protocol,” M.S. thesis, Dept. Electrical and Computer Eng., Univ. Arizona, Tucson, AZ, 1996. [8] J. Weinmiller, M. Schlager, A. Festag, and A. Wolisz, “Performance study of access control in wireless LANs IEEE 802.11 DFWMAC and ETSI RES 10 HIPERLAN,” Mobile Networks and Applicat., vol. 2, pp. 55–67, 1997. [9] T. S. Ho and K. C. Chen, “Performance evaluation and enhancement of the CSMA/CA MAC protocol for 802.11 wireless LAN’s,” in Proc. IEEE PIMRC, Taipei, Taiwan, Oct. 1996, pp. 392–396. [10] F. Cali, M. Conti, and E. Gregori, “IEEE 802.11 wireless LAN: Capacity analysis and protocol enhancement,” presented at the INFOCOM'98, San Francisco, CA, Mar. 1998. [11] G. Bianchi, L. Fratta, and M. Oliveri, “Performance analysys of IEEE 802.11 CSMA/CA medium access control protocol,” in Proc. IEEE PIMRC, Taipei, Taiwan, Oct. 1996, pp. 407–411. [12] G. Bianchi, “IEEE 802.11—Saturation throughput analysis,” IEEE Commun. Lett., vol. 2, pp. 318–320, Dec. 1998. [13] D. Bertsekas and R. Gallager, Data Networks. Englewood Cliffs, NJ: Prentice-Hall, 1987.

Fig. 16. Packet payload threshold over which the RTS/CTS mechanism is advantageous.

Moreover, Fig. 16 runs counter to the “known” fact that the RTS/CTS mechanism should be employed when the packet size exceeds a given (meaning fixed) threshold. Instead, it shows that such a threshold strongly depends on the network size, and particularly it significantly decreases when the number of stations in the network increases. For example, in the case of 50 stations, the threshold is equal to about 1470 bits for the infrared PHY, while it is as low as 820 bits for the frequency hopping PHY. The same threshold raises, respectively, to about 10065 bits and 3160 bits when the network is composed by five stations only. VIII. CONCLUSION In this paper, we have presented a simple analytical model to compute the saturation throughput performance of the 802.11 Distributed Coordination Function. Our model assumes a finite number of terminals and ideal channel conditions. The model is suited for any access scheme employed, i.e., for both basic access and RTS/CTS Access mechanisms, as well as for a combination of the two. Comparison with simulation results shows that the model is extremely accurate in predicting the system throughput. Using the proposed model, we have evaluated the 802.11 throughput performance. We have shown that performance of the basic access method strongly depends on the system parameters, mainly minimum contention window and number of stations in the wireless network. Conversely, performance is only marginally dependent on the system parameters when the RTS/CTS mechanism is considered. The RTS/CTS mechanism has proven its superiority in most of the cases. Notable is the advantage of the RTS/CTS scheme in large network scenarios, even with fairly limited packet

Giuseppe Bianchi received the “Laurea” degree in electronic engineering from Politecnico di Milano, Milano, Italy, in 1990, and the specialization degree in information technology from CEFRIEL, Milano, in 1991. He was a Researcher at CEFRIEL from 1991 to 1993, and Assistant Professor at the Politecnico di Milano from 1994 to 1998. He spent 1992 as a Visitor Researcher at Washington University, St. Louis, MO, and spent 1997 as a Visiting Professor at Columbia University, New York. Since November 1998, he has been Associate Professor at the University of Palermo, Italy. His research interests include design and performance evaluation of broadband and wireless networks and systems.

Similar Documents

Premium Essay

Ieee Group

...Research IEEE Group The IEEE 802.1 Working Group is sanctioned to fret about and improve principles and proposed follows in the accompanying territories: 802 LAN/MAN structural planning, internetworking around 802 MANs, LANs, and other wide range networks, 802 by and large network administration, 802 Security, and convention layers above the layers of LLC & MAC. The 802.1 working assembly have four animated assignment aggregations: Interworking, Security, Time Sensitive Networking and Data Center Bridging. IEEE 802.1 handles the building design, security, Metropolitan Area Networks, Wide Area Networks and Local Area Networks, institutionalized by IEEE 802. Following are the key tasks of IEEE 802.1: • Outlines and executes models that manage network administration practices • Furnishes administrations, incorporating LAN/MAN administration, media access control (MAC) connecting, information encryption/encoding and network movement administration (Hiertz, Denteneer, et al. 2010) IEEE 802.1 is contained four assemblies that keep tabs on distinctive guidelines and arrangements in the accompanying zones: • Audio/video (A/V) bridging • Internetworking • Security • Data center bridging The Internetworking assembly handles generally structural planning, connection conglomeration, convention tending to, network way identification/calculation and other specialized practices and suggestions. Need of the IEEE 802 Standard IEEE 802 alludes to a group of IEEE standards managing...

Words: 1026 - Pages: 5

Free Essay

A New Integrated Control Algorithm for Ieee 802.11g Standards

...A New Integrated Control Algorithm for IEEE 802.11g Standards Qian Liu, Yongxin Yan International School Beijing University of Posts and Telecommunications Beijing, China e-mail: ee08b050@bupt.edu.cn, ee08b044@bupt.edu.cn Abstract—Wi-Fi (Wireless Fidelity) mainly adopts IEEE 802.11g standards. And a binary exponential backoff algorithm is adopted to prevent channel collision, which also introduces reduction of the performance of the network. In this paper, an integrated control mechanism (ICM) is proposed which combines a centrally controlled approach and a distributed access mechanism to control the behavior of the system. Through this mechanism, backoff is eliminated from transmission mode, which can significantly enhance the performance of the system. Through theoretical analysis and simulation, the new mechanism can improve the throughput and reduce delay and packet loss rate. According to the results of simulation, with ICM, the throughput can have an improvement of 83.3% and the packet loss rate remains at 0 under appropriate conditions. Keywords-Wi-Fi, integrated control mechanism, centrally control, distributed access Jing Tu, Bainan Xia International School Beijing University of Posts and Telecommunications Beijing, China e-mail: ee08b253@bupt.edu.cn, ee08b217@bupt.edu.cn Many experts have proposed different algorithms and approaches to improve the performance of Wi-Fi. Souvik Sen, Romit Roy Choudhury and Srihari Nelakuditi transformed the contention from time...

Words: 3037 - Pages: 13

Free Essay

Ieee

...* Export citation * PDF (228 K) * More options... Search Wear Volume 253, Issues 1–2, July 2002, Pages 9–16 CM2000 S.I. Wear and fatigue in rolling contact * Yoshitsugu Kimuraa, , ,  * Masami Sekizawab,  * Akio Nitanaic * a Kagawa University, 1-1 Saiwai-cho, Takamatsu, Kagawa 760-8521, Japan * b NTN Corporation, 1578 Higashi-Kaizuka, Iwata, Shizuoka 438-8510, Japan * c Tamagawa University, 6-1-1 Tamagawa Gakuen, Machida, Tokyo 194-8610, Japan * http://dx.doi.org/10.1016/S0043-1648(02)00077-7, How to Cite or Link Using DOI * Permissions & Reprints Abstract Researches on wear and fatigue in rolling contact from a tribological viewpoint are introduced. Transmission of traction and accompanying microslip in the contact region play critical roles in these phenomena. First, a quantitative analysis of wear in rolling contact with microslip is introduced, and it is shown that a simplified microslip theory can explain its behavior. Second, a marked change in contact fatigue life with traction is demonstrated, and a theory is introduced which relates the fatigue life with cumulative shear strain in the subsurface. Keywords * Contact fatigue;  * Microslip;  * Rolling contact;  * Wear 1. Introduction Reduction of wear and prevention of contact fatigue are important objectives of railway technology and of tribology as well. However, these two engineering fields have been developing as different worlds, and researchers...

Words: 4521 - Pages: 19

Free Essay

Ieee

...隐马尔可夫模型在语音处理中的应用 陈号天 1301111397 戚向波 1201214748 汤恒河 1201214746 2013-11-24 隐马尔可夫模型在语音处理中的应用 1 研究背景介绍 21世纪以来,由于国际互联网的普及,自然语言的计算机处理成为从互联网上获取知识的重要手段。生活在信息网络时代的现代人,几乎都要与互联网打交道,都要或多或少地使用自然语言处理的研究成果来帮助他们获取或挖掘在广阔无边的互联网上的各种知识和信息。语言是人类表达和传播信息的有效工具,消除不同语言,不同表达方式间的障碍,用信息化手段促进人类的交流便是自然语言处理的任务。但由于自然语言本身上的歧义性和算法上的可实现难度,使得自然语言处理研究不光任重,而且道远。因此,世界各国都非常重视自然语言处理的研究,投入了大量的人力、物力和财力。 自然语言处理,有时亦称作计算语言学,是语言学和计算机科学的交叉学科,属于认知科学的范畴。大致地讲,自语语言处理的研究着眼于对人类语言建模的实用效果,以建立具有一定人类语言知识的软件产品。今天的计算机不理解人类的语言,人类也很难掌握计算机的语言,减少人机交互的障碍便是这类产品的目标。通过这类的自然语言处理研究建立的“自然语言人机界面”将使得用户可以直接通过自然语言(英语 汉语 德语 法语)同计算机交互。 自然语言处理包括的应用范围很广,包括自然语言人机接口、机器翻译、文献检索、自动文摘、自动校对、语音识别与合成、字符识别等等。其中机器翻译系统是典型的,其应用价值也是最明显的自然语言处理系统,其处理过程对于其它自然语言处理应用具有典型意义。以中英翻译为例,自然语言处理一般处理过程包括分析、转换和生成。其中分析过程独立于目标语言,而生成过程独立于源语言。 图1. 典型机器翻译过程框架 简单的现存的存储程序计算去解决复杂的人类语言思维,这本身就是一个难题。更何况翻译工作对于人而言也是很难的,是一项很复杂的工作。总结起来,目前自然语言处理应用主要存在以下特殊困难。首先是语言的歧义性,其次语言的错形问题,即现实语言中存在的那些用形式化的语言无法解释的现象。最后,如何高效的收集、运用知识是当前自然语言处理研究和应用的瓶颈。 当前国内外自然语言处理研究主要有以下4个显著的特点: 第一,基于句法语义规则的理性主义方法受到质疑,随着语料库建设和语料库语言学的崛起,大规模真实文本的处理成为自然语言处理的主要战略目标。 第二,自然语言处理中越来越多地使用机器自动学习的方法来获取语言知识。 第三,自然语言处理中越来越重视词汇的作用,出现了强烈的“词汇主义”的倾向。 第四,统计数学方法越来越受到重视。 自然语言处理中越来越多地使用统计数学方法来分析语言数据;使用人工观察和内省的方法,显然不可能从浩如烟海的语料库中获取精确可靠的语言知识,必须使用统计数学的方法。语言模型是描述自然语言内在规律的数学模型,构造语言模型是自然语言处理的核心。语言模型可以分为传统的规则型语言模型和基于统计的语言模型。规则型语言模型是人工编制的语言规则,这些语言规则来自语言学家掌握的语言学知识,具有一定的主观性和片面性,难以处理大规模的真实文本。基于统计的语言模型通常是概率模型,计算机借助于语言统计模型的概率参数,可以估计出自然语言中语言成分出现的可能性,而不是单纯地判断这样的语言成分是否符合语言学规则。 统计数学方法不需任何先验知识,只需收集足够多数量和足够高质量的语料库,然后按照特定模型从中训练,统计所得的所有知识最后都包含语言模型的参数中。...

Words: 1202 - Pages: 5

Premium Essay

Ieee Project

...format Sample IEEE Paper for A4 Page Size First Author#1, Second Author*2, Third Author#3 #First-Third Department, First-Third University Address Including Country Name 1first.author@first-third.edu 3third.author@first-third.edu *Second Company Address Including Country Name 2second.author@second.com Abstract— This document gives formatting instructions for authors preparing papers for publication in the Proceedings of an IEEE conference. The authors must follow the instructions given in the document for the papers to be published. You can use this document as both an instruction set and as a template into which you can type your own text. Keywords— Include at least 5 keywords or phrases I. Introduction This document is a template. An electronic copy can be downloaded from the conference website. For questions on paper guidelines, please contact the conference publications committee as indicated on the conference website. Information about final paper submission is available from the conference website. II. Page Layout An easy way to comply with the conference paper formatting requirements is to use this document as a template and simply type your text into it. A. Page Layout Your paper must use a page size corresponding to A4 which is 210mm (8.27") wide and 297mm (11.69") long. The margins must be set as follows: • Top = 19mm (0.75") • Bottom = 43mm (1.69") • Left = Right = 14.32mm (0.56") Your paper must be in two column format...

Words: 1801 - Pages: 8

Free Essay

Parallel

...Recognized as an American National Standard (ANSI) IEEE Std 1284-1994 IEEE Standard Signaling Method for a Bidirectional Parallel Peripheral Interface for Personal Computers IEEE Computer Society .- Sponsored by the Microprocessor and Microcomputer Standards Committee h Published by the Institute of Electrical and Electronics Engineers, Inc., 345East 4Tth Street, New York, N y lwlz USA. lEEE December 2, 1994 SH 1 7335 Authorized licensed use limited to: UNIVERSITY OF VICTORIA. Downloaded on July 29,2010 at 20:21:17 UTC from IEEE Xplore. Restrictions apply. THIS PAGE WAS BLANK IN THE ORIGINAL Authorized licensed use limited to: UNIVERSITY OF VICTORIA. Downloaded on July 29,2010 at 20:21:17 UTC from IEEE Xplore. Restrictions apply. Recognized as an American National Standard (ANSI) IEEE Std 1284-1994 IEEE Standard Signaling Method for a Bidirectional Parallel Peripheral Interface for Personal Computers Sponsor Microprocessor and Microcomputer Standards Committee of the IEEE Computer Society Approved March 30, 1994 IEEE Standards Board Approved September 2, 1994 American National Standards Institute Abstract: A signaling method for asynchronous, fully interlocked, bidirectional parallel communications between hosts and printers or other peripherals is defined. A format for a peripheral identification string and a method of returning this string to the host outside of the bidirectionaldata stream is also specified...

Words: 34986 - Pages: 140

Premium Essay

Account

...Protect & Share Your Internet Connection Wirelessly Share Your Internet Connection D-Link’s eXtended Range (XR) Technology for Better Wireless Signal Coverage2 Built-in Cable Tester for Troubleshooting Advanced Security and Parental Control Features Keep Your Network Safe D-Link, an industry leader in networking, introduces another performance breakthrough in wireless connectivity – the AirPlus Xtreme G® series of wireless networking devices. Based on D-Link 108G Technology, these 802.11g compatible devices are capable of delivering maximum wireless signal rates of up to 108Mbps1 when used together. The award-winning DI-624 Wireless Router creates an 802.11g wireless network and wirelessly share a single broadband Internet connection throughout your home or office. Furthermore, the DI-624 has the superior performance capability to transfer large files and handle heavy network traffic. The Wi-Fi certified DI-624 features extremely high performance as well as industry-wide compatibility. With this certification, this router remains compatible with a wider range of networking devices. The built in 4-port switch allows you to connect up to four Ethernet-enabled devices such as additional computers or network storage devices. The DI-624 also features D-Link’s Extended Range (XR) Technology designed to provide increased wireless signal range as well as fewer dead spots2. When used with XR-enabled client devices, enjoy wireless coverage in areas where...

Words: 780 - Pages: 4

Free Essay

Microstrip Antenna

...IEEE TRANSACTIONS ON ANTENNAS AND PROPAGATION, VOL. 54, NO. 12, DECEMBER 2006 3755 A New Compact Microstrip-Fed Dual-Band Coplanar Antenna for WLAN Applications Rohith K. Raj, Manoj Joseph, C. K. Aanandan, K. Vasudevan, Senior Member, IEEE, and P. Mohanan, Senior Member, IEEE Abstract—A novel compact microstrip fed dual-band coplanar antenna for wireless local area network is presented. The antenna comprises of a rectangular center strip and two lateral strips miprinted on a dielectric substrate and excited using a 50 crostrip transmission line. The antenna generates two separate resonant modes to cover 2.4/5.2/5.8 GHz WLAN bands. Lower resonant mode of the antenna has an impedance bandwidth (2:1 VSWR) of 330 MHz (2190–2520 MHz), which easily covers the required bandwidth of the 2.4 GHz WLAN, and the upper resonant mode has a bandwidth of 1.23 GHz (4849–6070 MHz), covering 5.2/5.8 GHz WLAN bands. The proposed antenna occupy an area of 217 mm2 when printed on FR4 substrate . A rigorous experimental study has been conducted to confirm the characteristics of the antenna. Design equations for the proposed antenna are also developed. ( = 4 7) Index Terms—Coplanar waveguide, dual-band antennas, printed antennas, wireless local area networks (WLANs). I. INTRODUCTION IRELESS LOCAL area networks (WLAN) are being widely recognized as a viable, cost effective and high speed data connectivity solution, enabling user mobility. The rapid developments in WLAN technologies...

Words: 5288 - Pages: 22

Premium Essay

Apex Design Plan

...display to Apex what they can do to bring their company to enjoy the modern conveniences of a wireless network. This deployment plan will cover Team B’s recommendations based off of the site survey provided by Apex. We will discuss our recommended wireless network type. The access point layout and how these points will be managed. We will go over the foreseen obstacles and what our plan is to overcome these obstacles. Finally, we will go over the security policy that should be implemented to keep Apex as secure with our wireless network as they are with their current wired network. IEEE Network Type Apex Designs has asked our company to design a wireless network for their business. This network will consist of several different pieces of hardware that all will work together to meet Apex’s needs. To ensure that the new network is operational, special considerations must be made as to which IEEE network standard to be used. Since Apex Designs is a business that has a preexisting network installed, the new network must be compatible with the legacy systems already in use. Failure to meet this requirement would cause major interruptions in work flow, thus hindering our joint goal of enhancing Apex Designs productivity. Our proposed network will also allow current and future technology connectivity. In order to meet these requirements, the use of dual band access points will be installed at strategic locations to allow maximum coverage. The access points will use the 802.11ac...

Words: 1940 - Pages: 8

Free Essay

Lab 6.1

...Exercise 6.1.1 * Basic Service Sets (BSS) - In computer networking a service set is a set consisting of all the devices associated with a consumer or enterprise IEEE 802.11 Wireless local area network. The service set can be local, independent, extended, or mesh * Extended Services Sets (ESS) - Extended service sets is a component of the IEEE 802.11 WLAN architecture that extends the range of mobility to a single basic service set. An extended service set is a set of two or more BSSs that form a single sub network. Exercise 6.1.2 Standard | Frequency | Max Tran Rate | St indoor TR | St outdoor TR | 802.11a | 5 GHz | 54 Mbps | 35 | 120 | 802.11b | 2.4 GHz | 11 Mbps | 35 | 140 | 802.11g | 2.4 GHz | 54 Mbps | 38 | 140 | 802.11n | 2.4/5 GHz | 300/600 Mbps | 70 | 250 | Lab 6.1 Review 1.) IBSS works with devices only without an AP. Each device sends its data directly to the other device. SSID doesn’t exist because the communication is device to device. 2.) With beaming, the IR ports have to be facing one another, which in an office or other greater distance is not efficient. Beaming requires both devices to face one another and clear path. 3.) WLAN is appealing to home use because there aren’t any extra wires showing up everywhere. Also, it’s convenient when the user wants to sit on the couch instead of the desk. So the tradeoff is lower speed , but you can be anywhere in the...

Words: 258 - Pages: 2

Free Essay

Research Paper Format Ieee

...Research Paper Template for A4 Page Size J.Q. Author M.Tech. Student Centre for Computer Science & Technology Central University of Punjab, Bathinda (Punjab). Abstract— This document gives formatting instructions for authors preparing papers for publication in the proceedings of CAMA. The authors must follow the instructions given in the document for the papers to be published. You can use this document as both an instruction set and as a template into which you can type your own text. Keywords— Include at least 5 keywords or phrases I. Introduction This document is a template. An electronic copy can be downloaded from the conference website. For questions on paper guidelines, please contact the conference publications committee as indicated on the conference website. Information about final paper submission is available from the conference website. II. Page Layout An easy way to comply with the conference paper formatting requirements is to use this document as a template and simply type your text into it. A. Page Layout Your paper must use a page size corresponding to A4 which is 210mm (8.27") wide and 297mm (11.69") long. The margins must be set as follows: • Top = 19mm (0.75") • Bottom = 43mm (1.69") • Left = Right = 14.32mm (0.56") Your paper must be in two column format with a space of 4.22mm (0.17") between columns. III. Page Style All paragraphs must be indented. All paragraphs must be justified, i.e. both left-justified...

Words: 1776 - Pages: 8

Free Essay

The Athletes Shack Wireless Upgrade Proposal

...The Athletes Shack Wireless Upgrade Proposal | | | Proposal with recommendations for installing a wireless network to the existing wire LAN. | | | 6/17/2012 | | Executive Summary 3 Site Survey 4 WLAN Security 5 Beta Testing 7 Equipment 8 Budget 12 Conclusion 12 Bibliography 14 Appendix A: TECHNICAL TERMS 15 Executive Summary The Athletes Shack (TAS) is a chain of sporting goods stores that is looking into adding a wireless network (WLAN) to their current network. TAS has 10 retail distribution stores in the area and would like all the stores to be able to see live inventory suing mobile devices. The management team at Athletes Shack has realized that their success depends on exceptional customer service and efficiency on the floors of the store. To take the next step the company is looking to go wireless and use that technology to separate themselves from other sporting good chains. To continue to have an edge over Foot Locker, Champs Sports and other Athletes Shack feel this is a necessary step. Once the WLAN is installed in each of the 10 locations this will allow remote log in via the internet and VPN connection. The expectation is to have a major improvement on customer service. Added technological benefits to sales associates while on the floor will include real time sales pricing quotes, inventory product availability and to check the company website. In store operations will see additional business value through addition of...

Words: 2939 - Pages: 12

Premium Essay

Introduction to Networking

... Which of the following statements are true when comparing the wired and wireless LANs on this floor? b. The wireless LAN has a larger capacity d. A single transmission from the AP to a WLAN user device goes faster than the transmission from the Ethernet switch to a wired user device. 5. Which of the following answers describes the most accurate method the engineer can use to determine the coverage area? a. Do a wireless site survey. 6. Which of the following plays the biggest role in testing and certifying products to prove that they work with other products that have already been certified? c. Wi-Fi Alliance 7. Which of the following answers define a wireless LAN physical layer standard that was originally ratified by the IEEE before the year 2000? a. 802.11a b. 802.11.b 8. Which of the following locations is the least likely place to find a wireless LAN? b. As a link between two Ethernet switches on two different floors of the same building 9. Which of the following wireless LAN topologies use at least one wireless access point? a. BSS b. ESS 10. Which of the following is true of an ESS-WLAN topology but not a BSS-WLAN topology? c. The wireless LAN has at least two access points. 11. Which answer is most likely to be true about how these user’s tablets work? c. Chuck’s tablet is...

Words: 915 - Pages: 4

Free Essay

Wireless Lan Security

...LAN SECURITY Contents: I. Introduction…………………………………………………………………1 II. Wireless LAN Deployment……………………………………………7 III. Wireless LAN Security Overview…………………………………10 IV. Protecting Wireless LANs…………………………………………...13 V. Wireless LAN Security Summary……………………………………18 I. Introduction a. The 802.11 Wireless LAN Standard In 1997, the IEEE ratified the 802.11 Wireless LAN standards, establishing a global standard for implementing and deploying Wireless LANS. The throughput for 802.11 is 2Mbps, which was well below the IEEE 802.3 Ethernet counterpart. Late in 1999, the IEEE ratified the 802.11b standard extension, which raised the throughput to 11 Mbps, making this extension more comparable to the wired equivalent. The 802.11b also supports the 2 Mbps data rate and operates on the 2.4GHz band in radio frequency for high-speed data communications As with any of the other 802 networking standards (Ethernet, Token Ring, etc.), the 802.11 specification affects the lower layers of the OSI reference model, the Physical and Data Link layers. The Physical Layer defines how data is transmitted over the physical medium. The IEEE assigned 802.11 two transmission methods for radio frequency (RF) and one for Infrared. The two RF methods are frequency hopping spread-spectrum (FHSS) and direct sequence spread-spectrum (DSSS). These transmission methods operate within the ISM (Industrial, Scientific, and Medical) 2.4 GHz band for unlicensed use. Other devices that operate on this...

Words: 4933 - Pages: 20

Premium Essay

Wireless Design Paper

...as it sends digital data to provide internet access the IDU will be in the closet room of the Warehouse and 1st floor of the main building. II. Headquarter and Warehouse (Internal) A. Warehouse 1. Router a. Cisco ASA5505-BUN-K9 ASA 5505 which I found from amazon.com for $269. b. The device will protect the network and will serve as the router for the business office and warehouse. We can make sure to have a laptop in to make sure the device is up to date. 2. Switch and Wireless Access Point a. Cisco Catalyst WS-C2960S-24TS-S 24-port 10/100/1000 switch will be our switch also found on amazon.com for 771.90 b. The Switch will be used to distribute the data to our wireless access points in the building via Ethernet. c. Cisco Wap371 IEEE 802.11Ac 1.27 Gbps Wireless Access Point - Ism Band - Unii Band for 300.63 on Amazon.com d. It will be our wireless access points that will be distributed at least in all the rooms unless they are the computer rooms. We want to make sure that everyone gets the same access no matter where they are at. 3. Server a. PowerEdge T320 Tower Server from Dell for 1,629.00. b. These Server would be in the Warehouse and on floor 10 for the Supervisors and Managers respectively. The business is 25 miles apart so by having this server set up for Cloud Servers so transactions can run smoothly and cost of gas will not be an issue. 4. Network Printer...

Words: 690 - Pages: 3