Modelling the IEEE 802.11 protocol in wireless multi-hop networks

IEEE 802.11 is probably the most widely used, medium access control protocol in current wireless networks. In the Wireless LAN (i.e., single-hop) setting, its performance is by now quite well understood. However, in the multi-hop setting where relay nodes are used to achieve end-to-end communication, there is, to date, no widely accepted model. Consequently, when confronted with experimental results, people often find it hard to interpret them. The goals of this thesis are (i) to model protocols "a la 802.11" in the context of multi-hop ad hoc networks, (ii) to derive theoretical limits for their performance, (iii) to contrast the performance of the current IEEE 802.11 protocol with these limits and (iv) to identify all the factors that prevent IEEE 802.11 from reaching these limits. Most of this thesis is dedicated to achieving the two first goals. We begin by proposing an idealized version of IEEE 802.11. We model this idealized protocol using a continuous Markov chain. We then use the properties and the stationary distribution of this Markov chain to derive the performance of the idealized 802.11 protocol. We first look at its spatial reuse or, in other words, at its ability to schedule a large number of concurrent successful transmissions. We show that the idealized 802.11 protocol organizes the transmissions in space in such a way that it leads to an optimal spatial reuse when its access intensity is large. This is encouraging, as it shows that a protocol using only local interactions can find a global optimum in a completely decentralize way. We then consider the short and long-term fairness properties of the idealized 802.11 protocol. We observe a clear trade-off between its spatial reuse and its fairness. At low access intensities, its fairness is high but its spatial reuse is low; whereas at high access intensities, the reverse is true. As a result, the access intensity of the protocol can be used to adapt its performance to fit the requirements of the applications running on top of it. The fairness performance of 802.11 also highly depends on the underlying network topology – 802.11 only amplifies the existing topological inequalities. In regular lattice topologies these inequalities arise only at the border where the nodes have fewer neighbors than the nodes inside the network. We demonstrate that, in large line networks and for all finite access-intensities, this border effect does not propagate inside the network, as a result 802.11 is fair. In contrast, we demonstrate that in large grid topologies a phase transition occurs. Under a certain access intensity, the border effect fades away; whereas above a certain access intensity, it propagates throughout the network, and the protocol is severely unfair. Finally, after extending our model to consider different node sensing and capture capabilities, we compare the performance of the ns-2 implementation of IEEE 802.11 and of the idealized protocol. We observe a large gap between the theoretical and practical performance. We identify the three problems that are responsible for this gap. We then propose a remedy to address each of these problems, and show that a 'cured' IEEE 802.11 can achieve the level of performance of the idealized 802.11 protocol.

[1]  S. Zachary,et al.  Loss networks , 2009, 0903.0640.

[2]  Eitan Altman,et al.  New Insights From a Fixed-Point Analysis of Single Cell IEEE 802.11 WLANs , 2007, IEEE/ACM Transactions on Networking.

[3]  J. J. Garcia-Luna-Aceves,et al.  A scalable model for channel access protocols in multihop ad hoc networks , 2004, MobiCom '04.

[4]  Patrick Thiran,et al.  Reaction-diffusion based transmission patterns for ad hoc networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[5]  Pramod K. Varshney,et al.  Tuning the carrier sensing range of IEEE 802.11 MAC , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..

[6]  Ray Jain,et al.  The art of computer systems performance analysis - techniques for experimental design, measurement, simulation, and modeling , 1991, Wiley professional computing.

[7]  Fouad A. Tobagi,et al.  Towards Performance Modeling of IEEE 802.11 Based Wireless Networks: A Unified Framework and Its Applications , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[8]  Patrick Thiran,et al.  Border Effects, Fairness, and Phase Transition in Large Wireless Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[9]  Marco Conti,et al.  IEEE 802.11 protocol: design and performance evaluation of an adaptive backoff mechanism , 2000, IEEE Journal on Selected Areas in Communications.

[10]  David Starobinski,et al.  RTS/CTS-induced congestion in ad hoc wireless LANs , 2003, 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003..

[11]  Michele Garetto,et al.  Modeling Per-Flow Throughput and Capturing Starvation in CSMA Multi-Hop Wireless Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[12]  David S. Johnson,et al.  Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .

[13]  Biplab Sikdar,et al.  Improving spatial reuse of IEEE 802.11 based ad hoc networks , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).

[14]  Raghupathy Sivakumar,et al.  IEEE 802.11 over multi-hop wireless networks: problems and new perspectives , 2002, Proceedings IEEE 56th Vehicular Technology Conference.

[15]  Shugong Xu,et al.  Does the IEEE 802.11 MAC protocol work well in multihop wireless ad hoc networks? , 2001, IEEE Commun. Mag..

[16]  Yechiam Yemini,et al.  The Asymptotic Analysis of Some Packet Radio Networks , 1986, IEEE J. Sel. Areas Commun..

[17]  Isabelle Guérin Lassous,et al.  Experiments of Some Performance Issues with IEEE 802.11b in Ad Hoc Networks , 2005, Second Annual Conference on Wireless On-demand Network Systems and Services.

[18]  Biplab Sikdar,et al.  Distance-aware virtual carrier sensing for improved spatial reuse in wireless networks , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..

[19]  J. Laurie Snell,et al.  Markov Random Fields and Their Applications , 1980 .

[20]  Samir Ranjan Das,et al.  A multichannel CSMA MAC protocol with receiver-based channel selection for multihop wireless networks , 2001, Proceedings Tenth International Conference on Computer Communications and Networks (Cat. No.01EX495).

[21]  David Starobinski,et al.  Evaluation of the masked node problem in ad hoc wireless LANs , 2005, IEEE Transactions on Mobile Computing.

[22]  Koushik Kar,et al.  Throughput modelling and fairness issues in CSMA/CA based ad-hoc networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[23]  J. Berg,et al.  A uniqueness condition for Gibbs measures, with application to the 2-dimensional Ising antiferromagnet , 1993 .

[24]  Tzi-cker Chiueh,et al.  Architecture and algorithms for an IEEE 802.11-based multi-channel wireless mesh network , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[25]  Patrick Thiran,et al.  Modeling the 802.11 Protocol Under Different Capture and Sensing Capabilities , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[26]  Michele Garetto,et al.  Modeling media access in embedded two-flow topologies of multi-hop wireless networks , 2005, MobiCom '05.

[27]  The random geometry of equilibrium phases , 1999, math/9905031.

[28]  Vaduvur Bharghavan,et al.  MACAW: a media access protocol for wireless LAN's , 1994, SIGCOMM 1994.

[29]  Ole J. Heilmann,et al.  Phase transition of hard hexagons on a triangular lattice , 1973 .

[30]  Rick Durrett,et al.  An introduction to infinite particle systems , 1981 .

[31]  J. Berg,et al.  Percolation and the hard-core lattice gas model , 1994 .

[32]  Nitin Gupta,et al.  A Performance Analysis of the 802.11 Wireless Lan Medium Access Control , 2003, Commun. Inf. Syst..

[33]  F.A. Tobagi,et al.  Modeling and performance analysis of multihop packet radio networks , 1987, Proceedings of the IEEE.

[34]  Christina Fragouli,et al.  Towards Reliable Broadcasting using ACKs , 2007, 2007 IEEE International Symposium on Information Theory.

[35]  Nitin H. Vaidya,et al.  Multi-channel mac for ad hoc networks: handling multi-channel hidden terminals using a single transceiver , 2004, MobiHoc '04.

[36]  Basil S. Maglaris,et al.  Throughput Analysis in Multihop CSMA Packet Radio Networks , 1987, IEEE Trans. Commun..

[37]  Ashok K. Agrawala,et al.  Sniffing out the correct physical layer capture model in 802.11b , 2004, Proceedings of the 12th IEEE International Conference on Network Protocols, 2004. ICNP 2004..

[38]  M. F.,et al.  Bibliography , 1985, Experimental Gerontology.

[39]  Yu Wang,et al.  Modeling of Collision Avoidance Protocols in Single-Channel Multihop Wireless Networks , 2004, Wirel. Networks.

[40]  Piyush Gupta,et al.  An Experimental Scaling Law for Ad Hoc Networks , 2001 .

[41]  J. Mackenzie Sequential Filling of a Line by Intervals Placed at Random and Its Application to Linear Adsorption , 1962 .

[42]  Van den Berg,et al.  Disagreement percolation in the study of Markov fields , 1994 .

[43]  Patrick Thiran,et al.  A Packing Approach to Compare Slotted and Non-Slotted Medium Access Control , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[44]  Marco Conti,et al.  Dynamic tuning of the IEEE 802.11 protocol to achieve a theoretical throughput limit , 2000, TNET.

[45]  Yechiam Yemini Astatistical Mechanics of Distributed Resource Sharing Mechanisms , 1983, INFOCOM.

[46]  Christophe Diot,et al.  Network availability based service differentiation , 2003, IWQoS'03.

[47]  Yuliy Baryshnikov,et al.  Space filling and depletion , 2004, Journal of Applied Probability.

[48]  Patrick Thiran,et al.  Understanding the Gap between the IEEE 802.11 Protocol Performance and the Theoretical Limits , 2006, 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks.

[49]  A. Girotra,et al.  Performance Analysis of the IEEE 802 . 11 Distributed Coordination Function , 2005 .

[50]  Ole J. Heilmann,et al.  The use of reflection as symmetry operation in connection with Peierls' argument , 1974 .

[51]  J Talbot,et al.  Adsorption-desorption model and its application to vibrated granular materials. , 2000, Physical review. E, Statistical physics, plasmas, fluids, and related interdisciplinary topics.

[52]  John Odentrantz,et al.  Markov Chains: Gibbs Fields, Monte Carlo Simulation, and Queues , 2000, Technometrics.

[53]  Samir R. Das,et al.  Multichannel CSMA with signal power-based channel selection for multihop wireless networks , 2000, Vehicular Technology Conference Fall 2000. IEEE VTS Fall VTC2000. 52nd Vehicular Technology Conference (Cat. No.00CH37152).

[54]  Sukumar Nandi,et al.  Modeling the short-term unfairness of IEEE 802.11 in presence of hidden terminals , 2004, Perform. Evaluation.

[55]  David J. Aldous,et al.  Lower bounds for covering times for reversible Markov chains and random walks on graphs , 1989 .

[56]  Kavita Ramanan,et al.  Nonmonotonicity of phase transitions in a loss network with controls , 2006, math/0610321.

[57]  Mario Gerla,et al.  How effective is the IEEE 802.11 RTS/CTS handshake in ad hoc networks , 2002, Global Telecommunications Conference, 2002. GLOBECOM '02. IEEE.

[58]  L. Kleinrock,et al.  Packet Switching in Radio Channels : Part Il-The Hidden Terminal Problem in Carrier Sense Multiple-Access and the Busy-Tone Solution , 2022 .

[59]  Giuseppe Anastasi,et al.  Stability and performance analysis of HIPERLAN , 1998, Proceedings. IEEE INFOCOM '98, the Conference on Computer Communications. Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies. Gateway to the 21st Century (Cat. No.98.

[60]  J. Lehoczky,et al.  Insensitivity of blocking probabilities in a circuit-switching network , 1984 .