1. Introduction
Wireless networks have experimented an exponential growth in the last few years. Currently, wireless is the most used technology by devices to access to the Internet or to communicate with one another or throughout an access point (AP). Wireless networks are also being used in other environments, which are very sensitive in terms of Quality of Service (QoS), such as Vehicular Ad-Hoc Networks (VANET) or Wireless Sensor Networks (WSN). In addition, it is expected that low-cost Single Board Computer (SBC) devices like Raspberry-pi or Odroid produce a further expansion of wireless networks, especially for real-time applications in IoT environments, which are also QoS aware. As a consequence, nowadays, the QoS in wireless networks is no longer an option but a requirement.
One of the methods to provide QoS in multiple access networks is by giving more channel access opportunities to nodes involved in QoS-aware sessions, using the Binary Exponential Backoff mechanism. In fact, this is the background idea of the IEEE 802.11e in its contention-based medium access function, called
Enhanced Distributed Channel Access (EDCA) [
1], which allows traffic differentiation for the stations in the network. EDCA operation is based on the idea of four Access Categories (AC): Voice, Video, Best Effort, and Background. Access Categories map directly from Ethernet-level class of service (CoS) priority levels, defined in IEEE 802.1p.
IEEE 802.11e provides long-term QoS in terms of application requirements. Different backoff values are defined for each access category, according by the physical layer supported by IEEE 802.11e. However, these values are fixed and cannot be dynamically modified to maintain the QoS requirements against network changes or to response to dynamic application needs.
In this regard, we can highlight one of the contributions of this work. We propose DEDCA (Dynamic Enhanced Distributed Channel Access) mechanism for 802.11 networks. This mechanism offers an efficient solution for the dynamic management of the QoS requirements of terminals. In our proposal, independently of the kind of traffic, the configuration of the backoff values is not fixed over the time, but they depend on the punctual QoS requirements of the applications.
Being able to respond to QoS requirements of applications in short-term intervals can be useful, especially in some scenarios such as VANET, WSN and IoT (Internet of Things). This new scenario of short-term QoS requirements could be solved by giving a light advantage to these particular stations assigning, only temporarily, more bandwidth to them at the expense of reducing the bandwidth of other nodes. This is the key idea of mechanism presented in this work.
To perform this new QoS aware access method, a mathematical model to orchestrate who can—and who cannot— temporarily use an advantageous backoff procedure would be very valuable. Unfortunately, the mathematical analysis proposed in the literature to model 802.11 networks (most of them based on Markov chains) are too complex to be used for this purpose. In this paper it is proposed an easy-to-use mathematical model, which allows the development of new QoS policies able to adapt to the network dynamics in real time. The mathematical model, another contribution of this work, relies only on the calculation of a scalar value called
gain. This solution is computationally much simpler than most of the solutions proposed in the literature, and consequently can be useful even for low-performance devices like embedded systems. The mathematical model is in fact an extension of a preliminary study that was developed for PLC networks (
Power Line Communications) [
2]. Here, the model has been extended to enable that all the nodes can configure different levels of QoS independently, by the modification of its QoS related configuration parameters. As far as we know, there is not any other mathematical model in the literature with these characteristics.
In addition, we propose a SDN (
Software Defined Networking)-based framework that takes advantage of the centralized management of the network to give a response to dynamic QoS requirements in 802.11 networks by applying the DEDCA mechanism. Traditionally, SDN is in charge of configuring the wired networks by dynamically changing the flow table of a forwarding element (i.e.,
router or
switch) [
3]. On the other hand, when SDN is applied to the wireless networks, it is mainly used to configure a set of APs for efficient resource allocation, interference mitigation, network slicing, congestion control, and load balancing among other things [
4]. However, in this SDN framework, not only the Access Points but also the mobile elements will be able to configure their link and physical layers parameters following the guidelines of a centralized SDN controller. The SDN controller monitors the mobile devices and, depending the QoS requirements, the backoff values of some of them will be modified in real time, following the rules of the developed mathematical model.
The amount of real scenarios and applications which could benefit from the implementation of the proposed DEDCA mechanism is wide and varied. By way of example, we are going to consider a particular scenario that allows us to show the validity and usefulness of our proposal. In this case, the proposed SDN-based framework is used to manage a controlled surveillance system in an outdoor parking lot.
Our proposal has been evaluated by simulation using Estinet network simulator. The testbed consists of an SDN 802.11a Access Point and a set of 802.11a outdoor surveillance cameras, that are controlled by a SDN controller. The Wifi-Infrastructure module of Estinet 9.0 has offered us the possibility of modifying the IEEE 802.11a protocol configuration as required.
The rest of the paper is organized as follows:
Section 2 presents the DEDCA (
Dynamic Enhanced Distributed Channel Access) mechanism and describes the mathematical model it is based on. The SDN-based framework for IEEE 802.11 infrastructure-based networks that allows the application of the DEDCA mechanism is presented in
Section 3. In
Section 4 the mathematical model and the applicability of the proposed solutions in a specific scenario are evaluated by simulation. A review of related works are described in
Section 5. Finally,
Section 6 summarizes the main contributions of this work.
2. Contention Window Adaptation Mechanism
2.1. The Backoff Scheme in Shared Networks
The well-known wireless network IEEE 802.11 family, especially the IEEE-802.11e, provides a QoS compliant medium access control based on traditional CSMA/CA. A common aspect of any kind of CSMA/CA variant is the exponential backoff procedure. Actually, most of the QoS facilities in wireless networks are provided by means of fine-tuning -in one way or in another- the behavior of the exponential backoff scheme (see Related Work section for more information).
The traditional exponential backoff scheme consists of generating a random backoff interval to minimize the probability of collision with other contending stations. For every packet transmission, the backoff interval is obtained from the slot time and a value called backoff counter. The backoff counter is uniformly chosen in the range (0, CW), where CW is called Contention Window. CW value is related to the number of failed transmission attempts for a packet. Initially, CW is set equal to a value , called the minimum contention window. For each unsuccessful transmission, CW is doubled up to a maximum value . On the other hand, the backoff counter is decremented as long as the channel is sensed idle. If a transmission is detected on the channel, the counter is frozen, and reactivated when the channel is sensed idle again. When the counter reaches 0, the station transmits. A successful packet reception is marked by the transmission of a positive acknowledgment (ACK) by the destination station after another fixed period of time (Short Interframe Space (SIFS)). The failure in the reception of an ACK frame at the transmitter is assumed as a collision at the receiver. On the other hand, upon a successful transmission, the backoff algorithm reduces the contention window to . The backoff procedure guarantees a fair play (i.e., the channel is equally shared among all station) and, at the same time, it tries to avoid collisions.
Using the exponential backoff mechanism is one of the methods of providing QoS in multiple access networks. Depending on the values of the backoff parameters, a mobile terminal is giving more channel access opportunities. This is the background idea of the IEEE 802.11e in its contention-based medium access function, called
Enhanced Distributed Channel Access (EDCA) [
1]. 802.11e defines different types of user data named Access Categories (AC): Voice, Video, Best Effort, and Background, and defines
and
values of contention window depending on the type of data. These values are fixed and cannot be dynamically changed to maintain the QoS requirements against network changes or to response to dynamic application requirements.
2.2. The Proposed Mechanism
In this work, we propose DEDCA (Dynamic Enhanced Distributed Channel Access) mechanism, an alternative solution to response to dynamic QoS requirements in 802.11 network based on the definition of Terminal Categories (TC). By default, all the terminals are classified as normal stations, using default backoff values. When a terminal requests a punctual and time-limited more demanding QoS requirement it becomes a requesting station. The requesting station will modify its value to increment the channel access opportunity and, consequently to obtain more bandwidth, at the expense of other terminals that give some bandwidth up to the requesting station. These last terminals, that also modify their value to decrement their channel access opportunities, are called giving terminals.
With the goal of determining how to modify the contention window size of the giving and requesting stations, a mathematical model has been developed. At this point, it is important to stress that we are not interested in finding a general purpose mathematical model of shared networks using the backoff mechanism. On the contrary, we are looking for a simple and easily programmable model that offers a tool to manage the QoS of these networks. Concretely, we will find a scalar called gain (G), which will show us how the bandwidth is spread out among the wireless terminals.
In this paper, we present a particular implementation of this proposed mechanism. As presented in
Section 3, we propose to make use of the
Software Defined Networking (SDN) technology to define a framework where DEDCA mechanism can be applied in order to give a response to dynamic QoS requirements in 802.11 network.
2.2.1. Modeling the Gain
In backoff-based algorithms, the stations that are competing for the medium have a probability of winning the channel that depends on the backoff parameters. We call this probability . As said before, DEDCA algorithm is based on the modification of the value of some terminals to increase or decrease their probability of winning the channel.
Thus, we define
Gain G as the multiplicative increase or decrease of this probability when a terminal modifies its
value with respect to a non-modified terminal. This scalar value
G is obtained as the probability of winning the channel when the station modifies its
value, normalized to the case when
has the default value:
Firstly, we obtain the probability of winning the channel access of a reference station, that is, a non-modified station.
The
variable is defined as the backoff counter that station
i obtains for a particular channel access. For convenience, instead of using the interval
we will use the interval
, where
. Therefore,
with
. After the random backoff procedure, the channel access is obtained by the node of the
n competing nodes with the lowest
value. If we consider station 1 as reference, and without loss of generality, its channel access probability
can be calculated as follows:
The above equation is difficult to calculate because the involved variables are dependent on each others. Nevertheless, if an auxiliary random variable
d is defined as:
then, the probability that station 1 wins the backoff contention is simply:
Random variable
d models the behavior of the rest of stations. Using it, the probability of winning conditioned to
d can be easily calculated:
and applying the total probability theorem:
Now, we obtain the probability of a reference station of winning the channel access when its value is decremented in k units, that is, it obtains some advantage with respect to the others (a similar development can be applied in the case that value is increased in k units).
If station 1 decreases its
in
k units, then:
with
,
. As before, the probability of winning conditioned to
d can be calculated:
Finally, the gain
G associated with the reference station is obtained:
Surprisingly, the calculation of
G is relatively straightforward. Both terms have been already calculated when the window size is decremented (Equations (
2) and (
3) respectively). Therefore,
and naming the content of the parenthesis
,
The term
can be expressed as:
Figure 1 shows the term
as a function of
k for
(that is,
). It can be seen that the value of
is practically one, even for values of
k close to
W. The numerator of
is a weighted average of the last terms of
. However, as it is explained in
Appendix A, the random variable
d concentrates its probabilities in the first values of
d. On the other hand, the numerator is always greater than 1. Thus,
is a value very close to 0 and can be disregarded in Equation (
4), and consequently,
It can be seen that the expression of G does not depend on the random variable d, which means that the gain of the reference station does not depend on the rest of stations.
As said before, a similar analysis can be carried out in the case that the
value is increased in
k units, obtaining the following expression:
Again, G does not depend of the random variable d.
Due to the fact that G does not depend of the number of competing stations, G can be used to propose new solutions that manage QoS requirements in wireless networks. The gain gives us: (1) a measure of the cost/benefit of modifying the default , (2) a simple way to measure the competitive advantage gained by a station in front of others, and (3) a scalable strategy to fairly compensate the positive and negative gains around the network.
Figure 2 shows the evolution of the gain
G when the
value is decremented in
k units (it is represented as
) and when it is incremented in
k units (it is represented as
). As it can be clearly seen,
has a quasi-exponential behavior, while
decreases slowly in a liner way.
The different behavior of and is going to determine the number of terminals that are required to manage a certain bandwidth redistribution between requesting terminals and giving terminals. To compensate the gain obtained by a terminal that reduces its contention window size, it will be necessary to increase drastically the contention window size of a giving terminal (if it is possible), or even better, to select a group of giving terminals for distributing the total increase among them.
Each scenario of application of the proposed DEDCA mechanism will determine design constraints that, known the behavior of and , will allow to obtain the number of involved terminals and the adequate k values.
Finally, it is important to point out that the only requirement of the model is the fact that each contending station selects uniformly the duration of its backoff period. No other assumptions are needed. The simplicity of a mathematical model is often the guarantee that it will be valuable in real situations, especially in VANET, WSN and IoT networks.
2.2.2. Gain Calculation in Asymmetric Scenarios
The gain value deduced in
Section 2.2.1 supposes that all the stations use the same initial
value. However, as a consequence of our QoS-aware medium access control algorithm, it would be possible to find an scenario where nodes have different initial values of
. In
Appendix B, it is developed a mathematical study to show that the gain
G is practically independent of the initial window size (
) of the participants (see Equations (
A8) and (
A9)).
3. Proposed SDN-Based Framework for Implementing DEDCA
This section describes a SDN framework for IEEE 802.11 infrastructure-based networks that implements the proposed DEDCA mechanism. Being the central point of the network management and network monitoring, the SDN controller is the ideal network element to manage the processes related to the EDCA mechanism, by programming the adequate software module. This framework makes possible a dynamic management of the backoff values related to contention-based medium access mechanism of the standard IEEE 802.11, offering to the wireless terminals a response to dynamic QoS requirements.
The amount of real scenarios and applications which could benefit from the implementation of the proposed DEDCA mechanism is wide and varied. By way of example, we are going to consider a particular scenario that allows us to show the validity and usefulness of our proposal. In this case, we are going to consider an outdoor parking lot, where a surveillance system is installed. It is represented in a schematic way in
Figure 3.
The wireless network consists of an SDN 802.11a Access Point that is equipped with OpenFlow protocol (i.e., OpenWRT AP) and sixteen 802.11a outdoor surveillance cameras that cover a parking lot of dimension 200 m × 200 m. The video signals captured by the cameras are transmitted to a surveillance center, where a surveillance software and the SDN controller are executed.
When all the wireless terminals are configured by default, the available bandwidth is equally shared among all the cameras. The 802.11a data rate is set to 24 Mbps. Thus, due to the fact that there are sixteen contending stations, each station only obtains enough bandwidth to transmit H.264 video streaming at the common frame resolution 4CIF and 12 fps (the typical frame rate in parking lots). If a higher resolution is required by any of the cameras at a given time, the bandwidth sharing has to be modified.
We propose to use the DEDCA mechanism to give a solution to this problem. As detailed in
Section 2.2, the DEDCA mechanism is based on the definition of three terminal categories (TC):
normal,
requesting and
giving terminals. In this case, the default backoff configuration of a terminal, which corresponds to a
of 31, defines a
normal terminal. On the other hand, the cameras that require a higher bandwidth are the
requesting terminals and, finally, the set of cameras that give part of their bandwidth up are the
giving terminals.
The SDN controller will be in charge of detecting the
requesting terminals and selecting the set of
giving terminals. In addition, using the
gain scalar
G from
Section 2.2.1, the controller will obtain the new backoff values of all these terminals.
3.1. Detecting Requesting Terminals
In our scenario, we considered two situations in which a normal terminal can become a requesting terminal. The first one considers that there is a sensor-based application associated with each camera that launches an Alarm when something unusual happens. In the second case, it is the security officer at the security center who detects a problematic situation and launches an Alarm. In both cases, the alarm messages, whose structure is ALARM:0, are encapsulated into UDP packets. The associated camera will improve its frame resolution. Consequently, a higher bandwidth is needed in order to be able to transmit a video of higher quality.
In a SDN network, the well-known OpenFlow protocol [
5] offers a direct communication between the controller and the network elements that allows the programming of the forwarding plane of the network elements. However, terminals and the controller are not directly accessible. In this SDN-based proposed framework, we will use the fully programmable forwarding plane of the SDN application point to solve this limitation, as it is described next.
The Alarm messages, which are received by the SDN 802.11 Access Point, have to reach the SDN controller, where the system intelligence is located. To enable this to be done, an adequate flow table entry is proactively inserted in the OpenFlow flow table of the access point (step 1 in
Figure 4). Thus, the Alarm messages will match the corresponding entry of the flow table at the access point, and will be sent to the controller as
packet_in messages (step 2 in
Figure 4).
The SDN controller, which has a global knowledge of the network (among other parameters, the location of the cameras and their networking configuration), will be able to identify the requesting station after receiving the packet_in message and parsing the encapsulated packet.
3.2. Selecting Giving Terminals
As said before, the aim objective of our solution is to change the way the available bandwidth is shared among the cameras in order to allow a requesting camera to transmit the video with a higher resolution. In this scenario we want to improve the resolution from 4CIF@12fps to 720p@12fps, which means to double the required data rate.
If the default value of
is set to 31 in all the cameras, from Equation (
5), it can be deduced that the value of
of the
requesting camera should be reduced in 16 units in order to double the probability of winning the channel.
Because the
requesting camera improves its bandwidth, the rest of cameras will get worse. However, as it is studied by simulation in
Section 4.1.1, if a subset of cameras are chosen to compensate the increase in the gain of the
requesting terminals, the remaining nodes will not notice any change in their channel access rate. It does not matter how the compensation is done as long as the increment in the obtained bandwidth of the
requesting terminal is equal to the decrement in the obtained bandwidth of the
giving terminals (see Equation (
7)).
This behavior has been taking into account to define the algorithm that the controller applies to select the
giving terminals in this scenario and to obtain their required
values. When a camera launches an Alarm, the SDN controller will consider as
requesting terminals this camera and its two neighbor cameras. This will enable to increase the video resolution of these cameras, offering to the security officer a more detailed view of the conflict area. In addition, the controller hast to select the
giving stations and to obtain their new
values. In this implementation, we have chosen that the
giving stations are the seven furthest cameras, as it is shown in
Figure 5. Finally, applying Equation (
7), the new
value of these terminals is obtained.
In this case, the number of stations
, and the number of
requesting stations and
giving stations are set to
and
, respectively. As the objective of the requesting stations is to duplicate the obtained bandwidth,
. Consequently, applying Equation (
7) it can be obtained that the
giving stations have to increase their
value in
units, so their
value will be increased to 55.
3.3. How to Communicate the Configuration Changes
Once requesting and giving terminals have been identified and the new values have been obtained by the SDN controller, it is necessary to communicate the new configuration to the cameras.
As said before, there is no a direct communication channel between the controller and the stations. Again, we are going to use OpenFlow protocol and the programmable capability of the SDN access point to solve this limitation.
For each
requesting and
giving terminal, the controller will create an ALARM response message, whose structure is
. As in the case of the Alarm messages, the Alarm response message is encapsulated into an UDP packet that is sent to the corresponding station by the Access Point. To force the sending, the SDN controller will generate
packet_out messages that contain the frame in the payload field, and indicate the instruction of sending the frame to the wireless port (step 3 in
Figure 4).
The stations, that are listening for UDP packets on the predefined port, will receive the Alarm response and will apply the new
configuration by means of modifying its value in the network-device firmware (see
Section 4.2.1).
This procedure will be used also to restore the initial configuration of the requesting and giving terminals once the high-demanding situation, generally of limited duration, has finished.
5. Related Works
Much of the research in wireless SDN has focused in IEEE 802.11 networks. An important feature of SDN-enabled WLANs is virtualization. The ability to slice the network, based on users, subnets or traffic, allows many benefits [
10]. Another research interest in this area is related to mobility management. For example, Odin [
11] is an SDN framework that proposes to simplify the implementation of authentication, authorization and accounting (AAA), by moving to a centralized architecture, which eases to implement mobility managers and to mitigate the hidden terminal problems. On the other hand, there have been multiple research efforts in multi-hop networks. Ref. [
12] proposed an architecture for wireless mesh networks with traffic management functionality. In this architecture, the control plane is composed by four modules: global overview manager, routing path computation, traffic scheduling, and lastly spectrum allocation to configure radio resources. In addition to this, routers are also equipped with a monitor module to send neighbor connectivity information to the global overview manager at the controller and a radio frequency tuning module for assigning the radio frequency to transmit the data and control traffic.
Regarding QoS management in SDN networks, the rule placement and caching in SDN switches have been studied in [
13,
14]. Given a set of sessions with certain QoS requirements, instead of installing all the forwarding rules and QoS requirement rules in every switch, the authors of [
13] divide a session into several independent sub-sessions with different subsets of QoS requirement rules, which are scattered across multiple switches, to reduce the TCAM usage. In [
14], the authors studied the rule caching problem in SDN in order to minimize the amount of TCAM and remote controller processing cost. Finally, in [
15] authors studied a problem in which the load balancing of the control plane traffic and the cost of stablishing the control channel are jointly considered when selecting the protection paths for control channels. Simulation results show that the algorithm has high efficiency in resource utilization.
The main contribution of this work refers to the media access control mechanism of 802.11 networks. An analytical model of the IEEE 802.11 CSMA/CA mechanism was presented in [
16,
17]. Based on a complex bi-dimensional Markov Chain, this model has been widely used in the literature as a theoretical corpus to calculate different set of parameters related to CSMA/CA performance evaluation. The model has also been extended to include priorities [
18], high traffic conditions [
19] and loss channels [
20].
With regard to the modification of the value, different solutions have been proposed. These works differ in the parameters that are used to calculate the new value, where the modification is calculated (in the access point or the stations) or when the value is updated.
In [
21], the
value of each Access Category defined in IEEE 802.11e is adapted according to the traffic load and channel conditions. A higher value is set when the channel is estimated to be congested and a smaller value is set when the channel load is estimated to be low. The
value is obtained at each station (that is, in a distributed way), considering the instantaneous collision rate (calculated using the number of collisions and the number of packets sent during a period of time) experimented during the update period. Therefore, there does not exist any coordination between the stations that increase and decrease their
values. On the contrary, in our proposal, the mechanism that determines how to modify the
value of the stations is implemented in a centralized way.
Ref. [
22] proposes a
adaptation mechanism which takes place periodically at the access point. In this case, all the stations update the
parameter to the same value, which is computed at the access point. This
parameter is computed considering the maximum collision probability among all the stations, which report an explicit feedback to the access point containing measurements of their individual collision probabilities. If the maximum collision probability exceeds an upper control threshold, the
is doubled respect to the behavior defined by the IEEE 802.11e standard. If the probability is below a lower threshold, the
is decreased by half. After a contention window adaptation, the algorithms waits for a period
before changing the
value again. In this proposal, the network resources are not properly used. Assuming that all the stations have the same behavior is not a good statement, considering that in a wireless medium the channel conditions can only change for some stations.
In general, the
adaptation mechanisms that are executed periodically can be divided into two types:
Multiplicative Increase-Multiplicative Decrease (MIMD) and
Additive Increase-Additive Decrease (AIAD) schemes. Authors in [
23,
24,
25,
26] propose MIMD solutions. The multiplication factor is defined by a function of the priority and the collision rate, or simply by using a fixed value. Authors in [
21,
27,
28] use AIAD schemes. The additive changes of the contention window depend on the collision rate, the priority, or simply fix values are used.
On the other hand, the modification of the
parameter has been applied in different environments. [
29,
30] try to solve the throughput unfairness problem inherent to WiFi networks where devices of
a/b/g and
n types can coexist. Slow stations occupy the channel more time to transfer the same amount of data. This fact degrades significantly the performance of high-speed stations and decreases the overall network throughput. To solve this problem, faster stations should get a higher chance of accessing the medium (i.e., get more transmission opportunities) than slower ones. This can be achieved via scaling down their contention windows or by scaling up contention windows used by slow stations. However, this proposal only takes into account the WiFi standard of every station, that is, it does not take into account the channel conditions at all.
In multihop wireless networks, packets from a source node are relayed by intermediate nodes (relay nodes) towards their destination along a multihop wireless path. Ideally, in this scenario, a node should not transmit to the relay node more packets than the relay node can forward. In [
31], authors propose a fully distributed contention window adaptation mechanism that adjusts the channel access probability depending on the difference between the incoming and outgoing traffic at each node, in order to equate the traffic forwarding capabilities among all the nodes in the path.
Ref. [
32] considers vehicular networks based on IEEE 802.11. In this scenario, it is proposed to adjust the
parameter depending on the local node density. For that, five different mechanisms for local density estimation are proposed and evaluated. Results show the efficiency and simplicity of such mechanisms, so they recommended as building blocks of any architecture for VANET congestion control.
There are a set of works that propose to obtain the exact value of the in the backoff procedure instead of just modify the parameter.
In [
33], authors propose to turn off the binary exponential backoff algorithm of IEEE 802.11 and use an appropriate fixed value for
W, according to the node density and the instantaneous PER. To estimate the number of competing stations (
M), stations should measure two variables: the number of slots in which the station does not transmit, and the number of busy slots whose energy level measured is higher than a predefined value. Then, a central controller tunes the value of
(the ratio between
and
M) periodically, searching for the optimal
. This value is sent to the network and then each station sets its contention window size according to its
M value, i.e.,
.
In [
34] authors analytically derive the CW value that maximizes the throughput under both saturated and non-saturated conditions. Then, they propose a distributed algorithm to be executed each time there is a packet on the buffer of a station to be transmitted or when a collision occurs.
Refs. [
35,
36,
37] propose mechanisms to tune the CW by observing the channel status. Ref. [
38] proposes to dynamically adjust the CW size considering channel bit error rate (BER). However, these methods have to estimate the number of active stations.
Finally, ref. [
6] proposes a modification of CSMA/CA contention protocol to mitigate inter-packet latency (also known as tail latency) in IEEE 802.11-based networks. Here, it is guaranteed that every competing node transmits a packet in a round (virtual time slot). The rounds are implemented in a distributed way by the definition of two non-overlapped contending ranges, one of them
and the other
. As nodes success in their transmissions, they change the contending range from the first range to the second one. However, this solution is still focused on providing QoS in scenarios where real-time services are dominant.
6. Conclusions
Nowadays, IEEE 802.11 technology is used in a wide variety of scenarios, such as mobile, vehicular or sensor networks. In all of them, the transmission of real-time and multimedia traffic is very common, and the corresponding applications require that the network supports some minimum QoS requirements. One of the methods to provide it is by giving more channel access opportunities to nodes involved in such sessions. This is the background idea of EDCA, the contention-based medium access mechanism of IEEE 802.11e, that provides long-term Qos.
However, in some situations it is possible that some multimedia traffic sessions require additional QoS guarantees during short-term intervals. For these situations, in this work we have proposed DEDCA. In DEDCA, stations are classified in three different Terminal Categories (TC): normal stations, requesting stations and giving stations. By default, all the terminals are classified as normal stations, using default values. Stations that require additional QoS guarantees are called requesting stations, and they will modify their values to increment their channel access opportunities, at the expense of giving stations that they will modify their value to decrement their channel access opportunities. With the goal of determining how to modify the value of the giving and requesting stations, a mathematical model has been developed. This model is able to determine the number requesting stations and giving stations that are required to manage a certain QoS requirement.
The previous processes related to the DEDCA mechanism need to be implemented in a centralized way, in order to be able to identify the giving and requesting stations in the network. Controllers of Software-Defined Networks have a centralized control over the network, and they seem to be the ideal elements to implement this mechanism. In this paper, that is the reason we have proposed a SDN framework for IEEE 802.11 networks that implements the proposed DEDCA mechanism. In this framework, the SDN controller is attached to the IEEE 802.11 access points. The communication between the SDN controller and the access points is based on OpenFlow protocol and the flow tables of access points have an appropriate flow entry in order to forward the UDP alarm messages generated by the requesting stations to the SDN controller. On the other hand, the SDN controller will generated packet_out messages with the new values for giving and requesting stations. These messages will be encapsulated in UDP segments by the access points and they will be forwarded to the corresponding stations.
The proposed SDN framework has been evaluated by simulation using the Estinet network simulator. We have considered an outdoor parking lot, where a surveillance system is installed. The simulations results show that after modifying their value adequately, the requesting cameras are able to reach the demanding bandwidth. On the contrary, as it was expected, the giving cameras suffer a decrement of the throughput due to the increment of their value. The remaining cameras are considered normal stations. Consequently, due to the fact that their CWmin value is not modified, their performance is maintained.