Next Article in Journal
SmartGroup: A Tool for Small-Group Learning Activities
Next Article in Special Issue
The Energy Efficiency of Heterogeneous Cellular Networks Based on the Poisson Hole Process
Previous Article in Journal
Using Social Media & Sentiment Analysis to Make Investment Decisions
Previous Article in Special Issue
A Survey of Wi-Fi 6: Technologies, Advances, and Challenges
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Statistical Model of Accurately Estimating Service Delay Behavior in Saturated IEEE 802.11 Networks Based on 2-D Markov Chain

1
School of Electrical & Information Engineering, Lanzhou University of Technology, Lanzhou 730050, China
2
School of Sciences, Lanzhou University of Technology, Lanzhou 730050, China
3
Department of Computer & Information Science, Arkansas Tech University, Russellville, AR 72801, USA
*
Author to whom correspondence should be addressed.
Future Internet 2023, 15(1), 6; https://doi.org/10.3390/fi15010006
Submission received: 12 November 2022 / Revised: 16 December 2022 / Accepted: 21 December 2022 / Published: 25 December 2022
(This article belongs to the Special Issue 5G Wireless Communication Networks)

Abstract

:
To accurately estimate the service delay behavior of IEEE 802.11 networks, this paper comprehensively considers four main factors that affect the performance of IEEE 802.11 networks and establishes a service delay model with statistical characteristics. We analyzed the operation mechanism of 802.11 DCF, using the backoff stage and the backoff counter to portray the dynamic change characteristics of the system regarding the data frame transmission states. Afterward, we calculated the one-step transition probability of these states, establishing a 2-D Markov model, including the ICS procedure and the backoff procedure. Based on this model, we constructed steady-state equations to derive a relationship between the transmission probability and collision probability for each node transmission queue. By analyzing the ICS delay and the backoff delay, we obtained the probability generating function (PGF) of the average idle time. The analytical expressions of other service delays, such as the successful transmission time and collided transmission time, were derived to obtain the PGF of the total service delay. In the numerical simulation, we compared the first two statistical moments of the PGF with the Nav model, and it was found that our delay evaluation results were significantly better than the traditional evaluation results. The average service delay of the Nav model in all the scenarios was larger than that of the proposed model due to the lack of the ICS procedure in the Nav model. Since a DIFS duration is generally much shorter than a random backoff duration, our model saves the bandwidth and improves transmission efficiency.

1. Introduction

While ensuring a stable and consistent user experience, the fifth-generation (5G) communication network provides ultra-high speed, low delay, ultra-reliability, and low-cost service quality, creating unprecedented new opportunities and convenience for society and the economy. Therefore, the large-scale commercialization of 5G networks is a current research hotspot in communication technology [1]. In the field of wireless technology, massive Multiple-Input Multiple-Output (MIMO), millimeter-Wave (mmWave) technology, carrier aggregation technology, new multi-access access, and other technologies are important means to enhance the performance of 5G [2]. In particular, massive MIMO systems can handle large network throughput and support a large number of client connections, which is expected to radically improve the capacity limitations of base stations and enable individual base stations to talk to more devices, thus driving the development of the Internet of Everything (IoE) [3]. MmWave technology, which is higher than 4G radio frequency, can provide ultra-high speed and ultra-high spectral efficiency while reducing network connectivity costs [4,5]. These emerging 5G technologies can deliver a variety of extreme services more flexibly and reliably, supporting applications in various vertical industries to enable the IoE.
Even with the rapid development of wireless network technologies, IEEE 802.11 protocol-based network technology, as a reliable and economic information network construction method, is still considered a promising technology affecting the future communication industry and is also an important component of 5G and future wireless local area networks (WLANs). The transmission of emergency information and data with ultra-high reliability and low delay is one of the challenges faced by WLANs. Therefore, when numerous real-time emergency traffic is loaded on WLANs, it is necessary to provide it with a higher quality of service, which makes us think first of reducing the delay, so analyzing this parameter is a vital step to solving the problem [6].
There have been many works on IEEE 802.11 network performance analysis and modeling [2,3,4,5,6], but few works simultaneously consider the following factors to analyze the service delay of the medium access control (MAC) layer, such as the initial-carrier-sensing (ICS) procedure, the backoff counter freezing, up-to-date standard parameters, and computational complexity, etc. In [7], Bianchi proposed a representative 2-D Markov model to analyze the saturated throughput of the IEEE 802.11 distribution coordination function (DCF). Afterward, based on the model of [7], Ziouva et al. In [8], the authors introduced the initial state before the node entered the backoff procedure and analyzed the throughput and delay of the 802.11 DCF. In [9], the authors compared the proposed 2-D Markov model with a model that considered continuous packet transmission without activating the backoff procedure and demonstrated that the Markov model is more accurate in predicting the performance of the 802.11 protocol, obtaining the relationship between the data rate of the transmitted packets and the packet delay, packet discard time, and throughput. In [10], the state of the channel when the buffer is idle is described, and the authors proposed a 2-D Markov model to analyze the throughput performance of the IEEE 802.11 MAC layer under non-ideal conditions. In [11], the authors proposed a system model based on the 802.11 MAC protocol applicable to multiple contentions and proved that the stochastic evolution of different station backoff states converges to deterministic evolution in the limit state. The authors in [12] analyzed an accurate MAC delay model, which considered the backoff counter decrementing time. Tadayon et al. [13] proposed a service delay model to track the service delay behavior of 802.11 networks. The authors in [14] studied the fair issue of access to the channel by vehicles with different speeds and its impact on the network throughput. All the above research works used the queueing theory approach or the Markov approach to model the performance of the 802.11 MAC layer. In addition, in [15,16,17,18], the use of machine learning methods (supervised learning [15], reinforcement learning [16], deep reinforcement learning [17], joint learning [18], etc.), which have been hotter in recent years, is proposed to study the performance of the MAC layer of 802.11 networks in terms of the throughput and channel utilization.
However, a great deal of research has been conducted on modeling the service delay of 802.11 networks. These studies generally conducted modeling in the form of non-closed expressions or individual statistical moments. For example, the authors in [19] deduced the queuing delay and channel access delay of the 802.11 p DCF, but which were the non-closed model. In [20], the author used the limiting probability, p , of successful transmission head-of-line (HOL) grouping to represent the saturated or unsaturated state of the network to study the performance of homogeneous cached IEEE 802.11 DCF networks, such as the delay, but the delay model was in the form of a single statistical moment. In [21], the authors derived the access delay of the IEEE 802.11 DCF in the saturated state, as well as in [22], where the authors derived the MAC delay and queuing delay using z-transform, which all investigated the mean, variance, and probability distributions of the MAC delay, but none of the resulting models could estimate the total delay spent in the transmitting packets. Furthermore, for the delay analysis of the point coordination function (PCF), see [23,24].
In this paper, we comprehensively consider four primary factors affecting the performance of IEEE 802.11 networks, including the ICS procedure, the backoff counter freezing, up-to-date standard parameters, and computational complexity, and constructed a novel statistical model for the service delay in 802.11 networks; it is a 2-D Markov model including the ICS procedure and the backoff procedure. The model can identify the service delay’s behavior and fully characterize the network performance. By analyzing the ICS delay and the backoff delay, we obtained the probability generating function (PGF) of the average idle time. The analytical expressions of the other service delays, such as the successful transmission time and collided transmission time, were derived to obtain the PGF of the total service delay. It was found that our delay evaluation results were significantly better than the traditional evaluation results. The average service delay of the Nav model in all the scenarios was larger than that of the analysis model due to the lack of the ICS procedure in the Nav model. Since a DIFS duration is generally much shorter than a random backoff duration, our model saves the bandwidth and improves transmission efficiency.
The rest of the paper is organized as follows. In Section 2, we briefly analyze the transmission procedure of the IEEE 802.11 DCF mechanism and put forward the corresponding modeling ideas. In Section 3, a 2-D Markov model is established to simulate the operating mechanism of the 802.11 DCF, and the transmission probability is obtained. In Section 4, we calculate the average idle time experienced by a node between two consecutive successful transmissions. In Section 5, we establish the total service delay model in the IEEE 802.11 network. In Section 6, the validity and accuracy of the proposed model are verified by numerical simulation. Finally, the paper is concluded in Section 7.

2. Analysis of IEEE 802.11 DCF Mechanism and Modeling Ideas

The basic operating principle of the 802.11 DCF mechanism is that the node should sense the channel activities before sending a data frame [25]. The channel is usually busy or idle, so the node sensing channel activities are divided into two situations: (1) If the channel is sensed to be idle for a DCF interframe space (DIFS), the data frame will be sent. (2) If the channel is sensed to be busy, the node will continuously sense the channel until it becomes idle for a DIFS. At this moment, in order to avoid collisions as much as possible, the nodes will generate a random backoff interval that follows the binary exponential backoff algorithm. That is, when a node tries to transmit a data frame, the backoff timer (or the backoff counter) is uniformly chosen in the range of t 0 , W i 1 , and the backoff window length in the i -th backoff stage is W i = 2 i × W 0 , 0 i m . When the first attempt to send is made, the backoff window’s original length is W 0 = W m i n , and after each failed attempt to send, the backoff window length is two times that of the previous one until the maximum backoff stage is reached, W m = W m a x . During the backoff, whenever the node senses that the channel is idle for a slot time, the backoff counter is decremented by one, and the node cannot send data frames until it decrements to zero. It should be noted that nodes send data frames only at the beginning of each slot time, where the time slot length is the time required by any node to sense the farthest node transmission. Furthermore, the value of the DIFS can be expressed as T D I F S = D I F S N × δ + T S I F S , where D I F S N , δ , and T S I F S stand for the DIFS number, a time slot length, and a SIFS length, respectively.
The DCF has two transmission modes [26]. In the basic mode, after the data frame is sent, its successful reception is confirmed by the receiving node sending an acknowledgment (ACK) frame. Additionally, if no ACK frame is received, it will go through a backoff procedure and start to retransmit. This mode does not solve the problem of conflicts that may be caused by hidden nodes. However, the ready-to-send (RTS)/clear-to-send (CTS) transmission mode avoids the conflicts caused by the hidden nodes during transmission [11]. Its main principle is to control the transmission status of the node (transmitting data or in the backoff procedure) using the transmitting data frames’ information carried by the RTS/CTS frames. Therefore, we mainly discuss the RTS/CTS transmission mode. The main feature of this mode is that before sending data frames to the receiving node B, the sending node A must send the RTS frames to make a reservation channel and to inform the other nodes, except node B, to postpone sending while node B will send the CTS frames to node A after receiving the RTS frames. The specific transmission process is shown in Figure 1.
In order to describe the service delay’s behavior more accurately in real WLANs, different from existing research, this paper comprehensively considers the following four major factors to build a system model:
  • ICS procedure: If a new data frame arrives when the channel is idle, the frame will start the ICS procedure, i.e., if the channel is idle for a DIFS, the data frame will be transmitted immediately at the end of the DIFS without entering the backoff procedure. Otherwise, if the channel is detected to be busy during the DIFS, the data frame will enter the backoff procedure;
  • Backoff counter freezing: When the channel is sensed to be busy, the backoff counter will pause its decrementing process. Once the channel is sensed to be idle, the backoff counter will be activated again to continue its decrement procedure;
  • Up-to-date standard parameters: to make our model suitable for the real network environment, some parameters need to be updated, including the DIFS, SIFS, time slot length, retransmission limit, and contention window size, and so on;
  • Computational complexity: In order to solve the problem more clearly and simply, the model should minimize the complexity of the calculation. Therefore, the transmission model considers a 2-D Markov model, and to verify the model’s accuracy, we only need to focus on the first two statistical moments of the service delay model.

3. Markov Modeling Analysis of IEEE 802.11 Operations

In this section, we will improve the model by adding the ICS procedure based on the Bianchi model [7]. i.e., if the node senses that the previous data frame has been successfully received and the channel is idle for a DIFS, the node will directly send a new data frame, which the process of the new data frame waits for sending is called the ICS procedure.
As shown in Table 1, to further illustrate the difference between the proposed model and the original Bianchi model, we briefly summarize it, and we assume that after the node successfully transmits the previous frame, the node has a new data frame waiting to be sent (the successful transmission of the previous data frame can be seen in Figure 1). Obviously, the proposed model does not need to enter the backoff procedure after successfully transmitting the previous frame but directly starts the ICS procedure, which greatly reduces the idle time of the channel. This work can not only reduce the service delay of the network but also reduces the waste of the bandwidth so as to improve the network throughput and channel utilization. In particular, a low delay and high throughput are the desired goals when the network is loaded with large amounts of emergency traffic.
Next, we assume that the channel condition is a single-cell environment with n terminals. The channel has no defects, i.e., the data frames’ collision (probability p ) is the only factor that causes transmission errors. Furthermore, the terminal is always in three states, i.e., the transmission, ICS, or backoff procedure.
Letting X t denote the state of the transmit queue at time t , we can obtain:
  • the backoff state, X t = { i ,   k | 0 i m , 0 k W i 1 } , where i denotes the value of the backoff stage, and k is the value of the backoff counter of the data frame at the head-of-line (HOL);
  • The ICS state, X t = { 1 ,   σ | σ = 0 ,   1 ,   2 ,   ,   D } , where D = D I F S / δ , and δ is a time slot length. The state means that the channel is sensed to be idle for the D σ δ period during the ICS procedure;
Next, we obtain the state transition diagram (Figure 2) of the 2-D Markov chain, which considers all the major factors. The corresponding one-step transition probabilities are as follows (where p b is the probability that the channel is busy):
  • For 0 i m , there are the following three state transitions:
if the HOL data frame is successfully transmitted, start the backoff procedure:
P ( 0 , k | i , 0 ) = 1 p × p b W 0 , 0 k W 0 1 .
If the HOL data frame is unsuccessfully transmitted, the frame is retransmitted, resulting in an increase in the backoff stage:
P ( i ,   k | i 1 , 0 ) = p W i , 0 k W i 1 .
If the HOL data frame is successfully transmitted and the channel is sensed to be idle for a DIFS, the ICS procedure is initiated:
P ( 1 , D | i , 0 ) = 1 p 1 p b
2.
For the case of 0 σ D during the ICS procedure:
if the channel is sensed to be idle for a time slot, the counter decreases by one:
P ( 1 , σ 1 | 1 , σ ) = 1 p b
If the channel is sensed to be busy, the backoff procedure is initiated:
P ( 0 , k | 1 , σ ) = p b W 0 , 0 k W 0 1 .
3.
For the case of σ = 0 during the ICS procedure:
after the node successfully transmits the previous data frame, it senses that the channel is idle for a DIFS and continues the ICS procedure:
P ( 1 , D | 1 , 0 ) = 1 p 1 p b
If the transmitted HOL frame encounters a collision, it enters the 0-backoff stage, or if the channel is sensed to be busy after successfully transmitting the frame:
P ( 0 , k | 1 , 0 ) = p + 1 p p b W 0 ,   0 k W 0 1
4.
In order to represent the backoff counter freezing, for 0 k W 0 1 :
the backoff counter freezes when the node senses that the channel is busy:
P ( i , k | i , k ) = p b ,   0 k W i 1
If the channel is sensed to be idle, the counter is decremented by one:
P ( i , k 1 | i , k ) = 1 p b ,   1 k W i 1
Then, set the probability of the collision during the data frame transmission as p , and denote the steady-state probability distribution of the system b i ,   k as follows:
b i ,   k lim t P X t = i , k ,       0 i m , 0 k W i 1 b 1 ,   σ lim t P X t = 1 ,   σ ,       0 σ D
Under the steady-state condition of the system, we have the following steady-state equations:
b i , 0 = p i b 0 , 0 , 0 i m .
b i , k = W i k W i 1 1 p b b i , 0 ,   0 i m ,
b i , k = p b + p 1 p b 1 p b D b 1 , 0
b 1 , σ = σ 1 p b σ b 1 , 0 ,   0 σ D .
From the probability normalization, σ = 0 D σ b 1 ,   σ + i = 0 m k = 0 W i 1 b i ,   k = 1 , and Equations (10)–(13), we can obtain:
b 1 , 0 = 1 1 p b D + 1 p b + 1 p b D + p b + p 1 p b 2 1 p b D + 1 1 2 p m + 1 1 2 p W 0 + 1 p m + 1 1 p 1
According to Equations (10)–(14), we obtain the steady-state probability distribution. Define τ as the probability that a node transmits in a time slot, i.e., the steady-state probability when a node is in the backoff stage, i ( 0 i m ), and the backoff counter is 0 , or the ICS procedure ends. Therefore, it holds that:
τ = b 1 , 0 + i = 0 m b i , 0 .
Substituting Equations (10) and (14) into the above equation, we obtain:
τ = 1 1 p b D + 1 p b + 1 p b D + p b + p 1 p b 2 1 p b D + 1 1 2 p m + 1 1 2 p W 0 + 1 p m + 1 1 p 1 × 1 + p b + p 1 p b 1 p b D .

4. Calculation of the Average Idle Time

Based on the above Equation (15), we will calculate the average idle time from the perspective of observer node B, as shown in Figure 3. Note that the value k of the backoff counter decreases in units of 1 when node B detects that the channel is idle, with a probability of 1 p b . The counter is frozen when node B detects that the channel is busy with the probability, p b , and only when the counter’s value is decremented from W i 1 to 0 will the node successfully transmit with the probability, p s . When the backoff stage reaches the maximum (or retransmission limit), the data frame still fails to transmit, i.e., i > m , and the frame will be discarded immediately. Therefore, the following correlation probabilities were found:
  • The collision probability, p , i.e., the probability that at least one of the remaining n 1 competing nodes at a time slot sends a data frame, can be found as p = 1 1 τ n 1 ;
  • The probability p b that the channel is busy, i.e., the probability that at least one node transmits at a time slot, can be found as p b = 1 1 τ n ;
  • Since the channel has no defects, the total collision probability, p c , is only related to the busy channel caused by the data frame transmission and data frames’ collision, and it can be expressed as p c = 1 1 p b 1 p ;
  • The successful transmission probability, p s , i.e., under the condition that at least one node of the n nodes transmits at a time slot, the probability that exactly one node transmits successfully can be expressed as p s = n τ 1 τ n 1 1 1 τ n .
Based on the above analysis, we note that the time interval between the two consecutive successful transmissions of node B ( k -th and k + 1 -th in Figure 3) may include events, such as failure of sending data frames by node B, the other n 1 nodes successfully send data frames or fail to send data frames when B carries out the backoff procedure, and the channel is idle. Thus, the average idle time, B O ¯ , experienced by node B between two consecutive successful transmissions is defined as the average time that the ICS procedure was performed and the average time that the backoff counter was active during the backoff procedure. From this, it can be determined that the expression of B O ¯ is:
B O ¯ = 1 p b 1 p c m D + p b 1 p b D 2 1 p c m D 2 x 0 + 1 p c 1 p c m x 0 + x 1 + p c 1 p c 1 p c m x 1 + x 2 + p c 2 1 p c 1 p c m x 1 + x 2 + x 3 + + p c m 1 1 p c 1 p c m x 1 + x 2 + + x m .
The first term of Equation (16) is the average idle time to complete the ICS procedure, denoted as T 1 . The second item is the average idle time that the node may traverse, which performs the backoff procedure after the channel is sensed to be busy during the ICS procedure. Note that σ 0 , D follows a uniform distribution, with a mean of D / 2 . Therefore, starting from the second term, it describes the average idle time of the backoff procedure, denoted as T b t , where x is a random variable subject to a uniform distribution and is the original length of the backoff counter at each retransmission attempt, and x i and x j are independent of each other.
Let the probability generation function (PGF) of B O ¯ be G B O ¯ , and use the properties of PGF to obtain:
G B O ¯ z = G T 1 z + G T b t z = G T 1 z + 1 z W 0 1 z W 0 + i = 0 m 1 1 z 2 i a i W 0 2 i W 0 1 z a i .
where a i = p c i 1 p c m i 1 p c m . The above equation will be used to derive our modeling.

5. Service Delay Statistical Model

In this section, the total service delay in 802.11 networks is analyzed to obtain its PGF. We define service delay as the period from the time when the data frame arrives at the HOL of the sending node to the time when it is successfully received by the receiving node. During this period, a node may detect or go through different channel activities, such as whether the node succeeded or failed in sending the data frames and the success or failure of the other n 1 nodes to send data frames and channel leisure [13].
Let T s , T c j , T s j , T c j , and T i d l e denote the time when node B successfully transmits a data frame, the node B transmission collision time, the time when the other n 1 nodes successfully transmit the data frames, the other n 1 nodes transmission collision times, and the channel’s idle duration, respectively. Then, the service delay, T w , can be expressed as:
T w = T s + j = 1 n c T c j + j = 1 n c T c j + j = 1 n s T s j + T i d l e
where n c , n c , and n s denote the number of node B retransmissions and the number of collided transmissions and successful transmissions for the other n 1 nodes during B O ¯ , respectively. Regarding them, the following conclusions hold:
Conclusion 1: 
The number of a node retransmissions, n c , obeys a truncated geometric distribution. Thus,
p n c = i = p s 1 p s i 1 1 p s m + 1 , i = 0 ,     ,   m .
Conclusion 2: 
If the B node has successfully completed its r 1 -th transmission and started the backoff procedure, the n nodes are trying to access the channel at this time. The B O ¯ events and k 1 successful transmissions occur for the remaining n 1 nodes, attempting to access the channel during the node B backoff period. Let the random variable v denote the number of times that the remaining n 1 nodes attempt to send a data frame before node B successfully transmits its r = k -th data frame. Then, v obeys the conditional probability distribution:
p ( v | k ) = C v 1 k 1 p s k 1 1 p s v k × p s .  
where p s = n 1 × τ × 1 τ n 2 1 1 τ n 1 .
Conclusion 3: 
Define n c = v k , i.e., the number of collisions that occur when the remaining n 1 attempt to send the data frames before the node makes the k -th successful transmission. Then, the conditional probability distribution of n c is:
p ( n c | k ) = C n c + k 1 k 1 p s k 1 1 p s n c × p s .  
The following analyzes n s . We find that there must be only busy or idle events in the time period between two consecutive transmissions of a node, and the two events occur alternately in the 802.11 DCF protocol. The length of time of each idle or busy event that occurs depends on the size of the transmitted data frame and the opportunity of the node to transmit the data frame, etc., while the average time for idle events to occur is:
L i d l e = 1 p b 1 = 1 p b p b .
Due to channel idle events occurring independently, it obeys the geometric distribution of parameter p b . Let N represent the number of idle events (counted in a slot time), then:
N = B O ¯ L i d l e = B O ¯ 1 p b 1 = B O ¯ · p b 1 p b
Furthermore, since the busy or idle state of the channel in the DCF protocol takes place alternately successively over time, it is impossible for the idle or busy to occur twice in succession. Therefore, the number of idle events during B O ¯ can be approximately equal to the number of busy events (counted in a slot time), M , and namely, N M . Since the occurrence of the busy events is caused by the successful transmission of the data frames or data frame transmission collision, M is divided into two parts, namely the number of busy events due to the successful sending of the data frames, n s , and the number of busy events due to the data frame transmission conflicts, n c . Therefore,
Conclusion   4 :   n s = N p s ,     n c = N × 1 p s .
For the last term, T i d l e , the idle time in (18), since the backoff counter is frozen when the channel is busy, can be expressed as B O ¯ minus the number of busy slots, M , i.e., T i d l e = B O ¯ M = B O ¯ N . In addition, since n c , n c , and n s are independent random variables, the PGF of T w can be obtained by applying z -transformation to Equation (18), as follows:
E z T w = E z T s + j = 1 n c T c j + j = 1 n c T c j + j = 1 n s T s j + I d l e T i m e
G T w z = G T s z E z j = 1 n c T c j E z j = 1 n c T c j E z j = 1 n s T s j E z I d l e T i m e .
Combining the above results, using the properties of the conditional PGF [27], we can obtain:
E z j = 1 n c T c j = i = 1 m p s 1 p s i 1 1 p s m + 1 G T z z i .
E z j = 1 n c T c j = r = 1 i = 1 p n s i C i + r 1 i 1 × p s i 1 1 p s r p s G T c z r
E z j = 1 n s T s j = i = 1 p n s G T c z i .
E z I d l e T i m e = E z B O ¯ N .
where p n s i = δ i n s , n s = N p s = B O · ¯ p b 1 p b p s .
So far, we obtain a closed expression for the PGF of the service delay T w by Formulas (25)–(29). Since all the protocol details have been considered in the discussion, the PGF can reasonably describe the service delay behavior of the 802.11 network. Furthermore, we obtain the mean and the variance of T w by the first-order derivative and second-order derivative, i.e.,
E T w i = d i d z i G T w z | z = 1 T w ¯ = d d z G T w z | z = 1 V a r T w = d 2 d z 2 G T w z | z = 1 + T w ¯ T w ¯ 2 .

6. Numerical Simulation

In this section, the numerical simulation results are given to verify the validity of the proposed analysis model. As mentioned above, W m i n , n , m , p c , T s , and T c represent the minimum contention window size, the number of contending nodes, the maximum backoff stage (or retransmission limit), collision probability, and the time when a node successfully transmits a data frame and transmission collision time, respectively. The time when a node successfully transmits a data frame and transmission collision time depends on two transmission modes, i.e., one is the RTC/CTS mode, T c = R T S + D I F S + δ , T s = D a t a + 3 S I F S + D I F S + R T S + C T S + A C K + 4 δ , and the other is the basic mode, T c = D a t a + D I F S + δ and T s = D a t a + S I F S + D I F S + A C K + 2 δ . Using the above parameters, we consider three transmission scenarios (as shown in Table 2), and the parameter settings of each scenario are from [13]. That is, exactly one set of data is taken for each of the three different scenarios set in [13] to achieve the goal of ensuring that the proposed model is valid over a wide range of parameters while also avoiding the complexity of the simulation process.
Figure 4 and Figure 5 show the functional relationship between the average service delay and collision probability, p c , in all the scenarios, where Figure 4 is in Scenario 1, and Figure 5 is in Scenario 2 and Scenario 3. Obviously, the average service delay of the Nav model in all the scenarios is bigger than that of the analysis model due to missing the lack of the ICS procedure in the Nav model. For the ICS procedure, after the previous data frame is successfully sent, the new data frame can be sent directly after the channel is idle for a DIFS, which further effectively reduces the service delay. Furthermore, the phenomenon in Figure 4 that the average service delay of the analysis model is much smaller than that of the Nav model could indicate that the RTS/CTS mode has advantages over the basic mode.
In Figure 6, we obtain the comparison graphs of the successful transmission probability, p s , between the analysis model and the Nav model in three scenarios. The following is a brief explanation, with Scenario 2 as an example. We can observe that as the collision probability increases, the successful transmission probability of our model is much larger than that of the Nav model because it comprises the ICS procedure. Indeed, since a DIFS duration is generally much shorter than a random backoff duration, our model saves the bandwidth and improves the transmission efficiency.
Figure 7 shows the standard deviation of the service delay in terms of the collision probability in all the scenarios. In any scenario, when the collision probability is smaller, the standard deviation of the service delay for the analysis model is smaller than that of the Nav model. That is because the ICS procedure added to the analysis model saves the transmission delay. When the collision probability reaches a certain value, the standard deviation of the service delay for our model is much larger than that of the Nav model. That is because the duration of the ICS procedure is much smaller than the backoff procedure. Thus, as the collision probability increases, the service delay of the analysis model is bigger as the frequency of entering the backoff procedure increases, and the gap of the service delay standard deviations is larger.

7. Conclusions

In this paper, by adding the ICS procedure to research the service delay in IEEE 802.11 networks, it is found that our delay evaluation results are significantly better than the traditional evaluation results. The average service delay of the Nav model in all the scenarios is larger than that of the analysis model due to missing the ICS procedure in the Nav model. Since a DIFS duration is generally much shorter than a random backoff duration, our model saves the bandwidth and improves transmission efficiency. Moreover, a comprehensive statistical characterization of the service delay is one of the most useful tools for dealing with Quality of Service (QoS) issues, especially when the network is loaded with numerous emergency traffic. Therefore, our model also applies to 802.11 e networks based on prioritization and will also lay a foundation for subsequent research work, such as dealing with emergency events in public safety networks or traffic flow information in the Internet of Vehicles.

Author Contributions

Q.Y. researched the literature, conceived the study concepts, designed the algorithm, and took charge of the original draft preparation; S.L. improved the mathematical models, provided the systematic research and analysis methodology, edited the manuscript, and the refinement of the paper was completed under the supervision of S.L.; H.L. completed and checked the English grammar; W.C. checked the numerical simulations and formula deducing. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded in part by the National Natural Science Foundation of China under Grant 61663024, and in part by the Hongliu First Class Discipline Development Project of Lanzhou University of Technology under Grant 225305.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data supporting this article are from previously reported studies and datasets, which have been cited.

Acknowledgments

The authors express their gratitude to the editor and reviewers for their work and valuable comments on the article.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Yu, H.; Lee, H.; Jeon, H. What is 5G? Emerging 5G mobile services and network requirements. Sustainability 2017, 9, 1848. [Google Scholar] [CrossRef] [Green Version]
  2. Dogra, A.; Jha, R.K.; Jain, S. A survey on beyond 5G network with the advent of 6G: Architecture and emerging technologies. IEEE Access 2020, 9, 67512–67547. [Google Scholar] [CrossRef]
  3. Gupta, A.; Jha, R.K. A survey of 5G network: Architecture and emerging technologies. IEEE Access 2015, 3, 1206–1232. [Google Scholar] [CrossRef]
  4. Fascista, A.; Coluccia, A.; Wymeersch, H.; Seco-Granados, G. Downlink single-snapshot localization and mapping with a single-antenna receiver. IEEE Trans. Wirel. Commun. 2021, 20, 4672–4684. [Google Scholar] [CrossRef]
  5. Hong, W.; Jiang, Z.H.; Yu, C.; Hou, D.; Wang, H.; Guo, C.; Zhou, J.Y. The role of millimeter-wave technologies in 5G/6G wireless communications. IEEE J. Microw. 2021, 1, 101–122. [Google Scholar] [CrossRef]
  6. Bellalta, B.; Bononi, L.; Bruno, R.; Kassler, A. Next generation IEEE 802.11 Wireless Local Area Networks: Current status, future directions and open challenges. Comput. Commun. 2016, 75, 1–25. [Google Scholar] [CrossRef] [Green Version]
  7. Bianchi, G. Performance analysis of the IEEE 802.11 distributed coordination function. IEEE J. Sel. Areas Commun. 2000, 18, 535–547. [Google Scholar] [CrossRef]
  8. Ziouva, E.; Antonakopoulos, T. CSMA/CA performance under high traffic conditions: Throughput and delay analysis. Comput. Commun. 2002, 25, 313–321. [Google Scholar] [CrossRef]
  9. Chatzimisios, P.; Boucouvalas, A.C.; Vitsas, V. Performance analysis of the IEEE 802.11 MAC protocol for wireless LANs. Int. J. Commun. Systems 2005, 18, 545–569. [Google Scholar] [CrossRef]
  10. Daneshgaran, F.; Laddomada, M.; Mesiti, F.; Mondin, M. Unsaturated throughput analysis of IEEE 802.11 in presence of non-ideal transmission channel and capture effects. IEEE Trans. Wirel. Commun. 2008, 7, 1276–1286. [Google Scholar] [CrossRef]
  11. Sharma, G.; Ganesh, A.; Key, P. Performance analysis of contention based medium access control protocols. IEEE Trans. Inf. Theory 2009, 55, 1665–1682. [Google Scholar] [CrossRef]
  12. Kang, K.; Lin, X.; Hu, H. An accurate MAC delay model for IEEE 802.11 DCF. In Proceedings of the 2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications, Penang, Malaysia, 14–17 May 2007. [Google Scholar]
  13. Tadayon, N.; Askari, E.; Aissa, S.; Khabazian, M. A novel analytical model for service delay in IEEE 802.11 networks. IEEE Syst. J. 2012, 6, 627–634. [Google Scholar] [CrossRef]
  14. Wu, Q.; Zheng, J. Performance modeling and analysis of IEEE 802.11 DCF based fair channel access for vehicle-to-roadside communication in a non-saturated state. Wirel. Netw. 2015, 21, 1–11. [Google Scholar] [CrossRef]
  15. Edalat, Y.; Obraczka, K. Dynamically tuning IEEE 802.11′s contention window using machine learning. In Proceedings of the 22nd International ACM Conference on Modeling, Miami Beach, FL, USA, 25–29 November 2019. [Google Scholar]
  16. Kumar, A.; Verma, G.; Rao, C.; Swami, A.; Segarra, S. Adaptive contention window design using deep q-learning. In Proceedings of the ICASSP 2021–2021 IEEE International Conference on Acoustics, Toronto, ON, Canada, 6–11 June 2021. [Google Scholar]
  17. Ali, R.; Shahin, N.; Zikria, Y.B.; Kim, B.S.; Kim, S.W. Deep reinforcement learning paradigm for performance optimization of channel observation—Based MAC protocols in dense WLANs. IEEE Access 2018, 7, 3500–3511. [Google Scholar] [CrossRef]
  18. Zhang, L.; Yin, H.; Zhou, Z.; Roy, S.; Sun, Y. Enhancing WiFi multiple access performance with federated deep reinforcement learning. In Proceedings of the 2020 IEEE 92nd Vehicular Technology Conference (VTC2020-Fall), Victoria, BC, Canada, 18 November–16 December 2020. [Google Scholar]
  19. Cao, S.; Lee, V.C. An accurate and complete performance modeling of the IEEE 802.11p MAC sublayer for VANET. Comput. Commun. 2020, 149, 107–120. [Google Scholar] [CrossRef]
  20. Dai, L.; Sun, X. A unified analysis of IEEE 802.11 DCF networks: Stability, throughput, and delay. IEEE Trans. Mob. Comput. 2012, 12, 1558–1572. [Google Scholar] [CrossRef]
  21. Sakurai, T.; Vu, H.L. MAC access delay of IEEE 802.11 DCF. IEEE Trans. Wirel. Commun. 2007, 6, 1702–1710. [Google Scholar] [CrossRef]
  22. Vardakas, J.S.; Sidiropoulos, M.K.; Logothetis, M.D. Performance behaviour of IEEE 802.11 distributed coordination function. IET Circuits Devices Syst. 2008, 2, 50–59. [Google Scholar] [CrossRef] [Green Version]
  23. Ramesh, A.; Vineeth, B.S. Empirical delay models for 802.11 under deterministic convergecast traffic. In Proceedings of the 2018 IEEE International Conference on Advanced Networks and Telecommunications Systems, Indore, India, 16–19 December 2018. [Google Scholar]
  24. Gao, Y.; Tan, C.W.; Huang, Y.; Zeng, Z.; Kumar, P.R. Characterization and optimization of delay guarantees for real-time multimedia traffic flows in IEEE 802.11 WLANs. IEEE Trans. Mob. Comput. 2016, 15, 1090–1104. [Google Scholar] [CrossRef]
  25. IEEE 802.11 Working Group. Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, 1st ed.; Institute of Electrical and Electronics Engineers, Inc.: Penfield, NY, USA, 1999. [Google Scholar]
  26. Weng, C.E.; Chen, H.C. The performance evaluation of IEEE 802.11 DCF using Markov chain model for wireless LANs. Comput. Stand. Interfaces 2016, 44, 144–149. [Google Scholar] [CrossRef]
  27. Ng, C.H.; Boon-Hee, S. Queueing Modelling Fundamentals: With Applications in Communication Networks, 2nd ed.; Wiley: Hoboken, NJ, USA, 2008; pp. 22–26. [Google Scholar]
Figure 1. RTS/CTS transmission in the proposed model.
Figure 1. RTS/CTS transmission in the proposed model.
Futureinternet 15 00006 g001
Figure 2. The 2-D Markov chain of IEEE 802.11 operations.
Figure 2. The 2-D Markov chain of IEEE 802.11 operations.
Futureinternet 15 00006 g002
Figure 3. Possible events that occurred between two consecutive successful transmissions for node B.
Figure 3. Possible events that occurred between two consecutive successful transmissions for node B.
Futureinternet 15 00006 g003
Figure 4. The average service delay with respect to the collision probability in Scenario 1.
Figure 4. The average service delay with respect to the collision probability in Scenario 1.
Futureinternet 15 00006 g004
Figure 5. The average service delay with respect to the collision probability in Scenarios 2 and 3.
Figure 5. The average service delay with respect to the collision probability in Scenarios 2 and 3.
Futureinternet 15 00006 g005
Figure 6. Successful transmission probabilities in all scenarios.
Figure 6. Successful transmission probabilities in all scenarios.
Futureinternet 15 00006 g006
Figure 7. The standard deviation of the service delay in all scenarios.
Figure 7. The standard deviation of the service delay in all scenarios.
Futureinternet 15 00006 g007
Table 1. Comparison of transmission procedure between Bianchi model and proposed model in the 802.11 DCF protocol.
Table 1. Comparison of transmission procedure between Bianchi model and proposed model in the 802.11 DCF protocol.
Markov ModelChannel StateTerminal Transmission StatusNext MDPU
(The Legend is Shown on the Right)
Futureinternet 15 00006 i001
Bianchi modelBusyBackoffFutureinternet 15 00006 i002
IdleBackoffFutureinternet 15 00006 i003
Proposed modelBusyBackoffFutureinternet 15 00006 i004
IdleInitial carrier-sensing (ICS)Futureinternet 15 00006 i005
Table 2. DCF parameters in three different scenarios.
Table 2. DCF parameters in three different scenarios.
Scenarios11 Mbit/s 802.11 b1 Mbit/s 802.11 b54 Mbit/s 802.11 g
123
RTS/CTSYesNoNo
MAC (byte)512501024
n102020
W m i n 7315
m336
ACK202020
SIFS101010
DIFS505028
Slot ( μ s )20209
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Yang, Q.; Li, S.; Li, H.; Chen, W. Statistical Model of Accurately Estimating Service Delay Behavior in Saturated IEEE 802.11 Networks Based on 2-D Markov Chain. Future Internet 2023, 15, 6. https://doi.org/10.3390/fi15010006

AMA Style

Yang Q, Li S, Li H, Chen W. Statistical Model of Accurately Estimating Service Delay Behavior in Saturated IEEE 802.11 Networks Based on 2-D Markov Chain. Future Internet. 2023; 15(1):6. https://doi.org/10.3390/fi15010006

Chicago/Turabian Style

Yang, Qian, Suoping Li, Hongli Li, and Weiru Chen. 2023. "Statistical Model of Accurately Estimating Service Delay Behavior in Saturated IEEE 802.11 Networks Based on 2-D Markov Chain" Future Internet 15, no. 1: 6. https://doi.org/10.3390/fi15010006

APA Style

Yang, Q., Li, S., Li, H., & Chen, W. (2023). Statistical Model of Accurately Estimating Service Delay Behavior in Saturated IEEE 802.11 Networks Based on 2-D Markov Chain. Future Internet, 15(1), 6. https://doi.org/10.3390/fi15010006

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop