Академический Документы
Профессиональный Документы
Культура Документы
11 Wireless
Networks
Mingzhe Li, Mark Claypool and Robert Kinicki
lmz,claypool,rek@cs.wpi.edu
Computer Science Department at Worcester Polytechnic Institute
Worcester, MA, 01609, USA
Rayleigh) fading [23] was implemented and imported into NS
(1) 2.27. Figure 3 shows simulated effects of Ricean fading for two
wireless nodes 390 meters apart where with fading turned off
After packets traverse each link on an hop end-to-end path, RBAR would fix the data rate at 11 Mbps. The figure tracks
the final dispersion at the receiver is: RBAR dynamically adjusting the rate between 11, 5.5, 2 and 1
Mbps in response to fading strength variability as a function of
(2) time.
where is the end-to-end capacity. Therefore, the end-to-end B. Issues with Packet Dispersion in Wireless Networks
path capacity can be estimated by
. This section discusses physical layer wireless issues that may
Since packet dispersion provides faster measurement times cause bandwidth estimation techniques to perform poorly.
and induces less network load than other bandwidth estimation Most wireless MAC layers use frame retries or Forward Er-
techniques, it has been adopted by commercial applications such ror Correction (FEC) to recover lost frames. IEEE 802.11 net-
as Windows Streaming Media where a three-packet train is sent works retransmit up to a fixed number of times with exponential
prior to streaming to estimate end-to-end capacity. backoff between retransmissions. While frame retries reduce
packet loss, frame retries increase packet delay variance that
III. PACKET D ISPERSION I SSUES IN W IRELESS N ETWORKS yields packet dispersion inconsistencies and large variations in
A. Rate Adaptation Simulation time measurements. Namely, dispersion between packet pairs
can be compressed or expanded when traversing a wireless AP
While ns-22 provides IEEE 802.11 components such as even without congestion in the network.
CSMA/CA, MAC layer retries, contention, propagation and er- Figure 5 depicts a typical network topology for studying
ror models, it lacks a rate control algorithm (RCA). Since the packet dispersion in a WLAN. To characterize the effects of
802.11 standard [16] does not specify a specific RCA, each wireless traffic on packet dispersion, the wireless network traffic
WLAN card manufacturer is free to implement their own RCA. is divided into probing, crossing and contending traffic. Prob-
RCAs adjust link rate based on the signal strength or by reacting ing traffic is the packet pairs or trains sent along the estimated
to accumulated statistics, such as number of retries, packet error network path through the AP to the client (1). Wireless channel
rate or throughput [17], [18]. Auto Rate Fallback (ARF) [19], conditions and other traffic may vary the probing traffic disper-
the first commercial RCA implementation, raises the data rate sion behavior and produce estimation errors.
after consecutive transmission successes and lowers the date rate While crossing traffic does not contend with probe packets,
after link layer transmission failures. Under most wired channel crossing traffic does share the bottleneck and thereby strongly
conditions, ARF outperforms fixed-rate 802.11, but when trans- impacts bandwidth estimate accuracy on the WLAN. Figure 5
mission failures are caused by wireless link layer congestion, shows crossing traffic coming from the AP to associated clients
ARF can have a negative impact [20].
Downloadable from http://www-ece.rice.edu/networks/.
Also called the narrow link. http://www.agere.com/client/wlan.html
The Network Simulator - ns-2. Online at http://www.isi.edu/nsnam/ns/ http://perform.wpi.edu/downloads/#rbar
722
4 12 Fading CBR Ideal CBR
Multiple Rate 1
3.5 1Mbps Single Ideal Channel
Average Throughput (Mbps)
Cumulative Distribution
3 5.5Mbps Single
BER = 0.0005
Fig. 2. Throughput comparison as distance increases Fig. 3. Link rate adaptation under Ricean fading Fig. 4. Capacity estimation using packet Pair tech-
niques in a WLAN
Access Point
the packet pair and the contending traffic send 1000-byte pack-
ets. In all cases, contention is simulated as a 1 Mbps upstream
Streaming
Server CBR flow. For the ideal channel, simulation errors and fading
Client A are disabled. In the fading channel, Ricean propagation from
Section III-A is used. For the BER channel, a uniform bit error
Access Point
rate of
is used. Each CDF curve represents estimates
from 1000 packet pairs sent over the wireless network.
Client B
(1)
(2)
Probing Traffic In Figure 4, the estimated bandwidth of the ideal channel is
Crossing Traffic
(3)
Contending Traffic uniformly distributed over the range of 3.1 Mbps to 4.1 Mbps
(4)
Contending Traffic
Client C Client D
due to the random backoff between two successive packets. The
Fig. 5. Probing, crossing and contending traffic in a WLAN multiple mode distribution in the fading channel case is due to
dynamic rate adaptation. The strong offset on the capacity es-
timation at about 1.8 Mbps for the contending channel is due
to delay induced by contending packets. The estimated band-
(2). After subtracting contending effects from other wireless width results with bit errors yield a continuous cumulative dis-
traffic, wireless crossing traffic shares the bandwidth with the tribution function (CDF) under the 1.8 Mbps range due to frame
probing traffic. However, even though statistically contending retries and exponential backoff delay between consecutive re-
effects caused by crossing traffic indirectly impact bandwidth transmissions. However, the step trend between 1.8 Mbps and
estimates, this impact can be captured by packet dispersion tech- 3.1 Mbps is similar to the distribution of the contending chan-
niques. Since several statistical filtering methodologies have nel. The Ideal CBR and Fading CBR vertical lines represent
been proposed to mitigate the effects of cross traffic [12], [14], average CBR throughputs which approximate average capacity
crossing traffic effects in WLANs are not considered further in in the ideal and fading channel cases, respectively. Compared to
this paper. the CBR throughputs, the packet pair estimates are spread over a
Contending traffic accesses the shared wireless channel and wide range. This clearly shows the packet dispersion technique
competes with probe packets on the estimated path. Figure 5 is significantly impacted by wireless channel conditions.
shows contending traffic sent by clients to the same AP (3) and
between other clients and APs (4) within interference range (re- IV. W IRELESS N ETWORK PACKET D ISPERSION M ODEL
ferred to as co-channel interference). To avoid channel capture, This section develops an analytical model based on existing
802.11 uses random backoff between two successive packets IEEE 802.11 wireless network models to explore the relation-
from the same node. When packet pairs arrive back-to-back at ship between packet dispersion and WLAN conditions.
the AP, the AP delays the second packet by inserting a random Capturing packet transmission delay is key to bandwidth esti-
backoff time between the packets. Thus, bandwidth estimates mation techniques that use packet pair (or train) dispersion. The
using packet dispersion on 802.11 networks are vulnerable to bottleneck (both the narrow and the tight link) on the end-to-end
contending traffic that transmits during the delay between the network path is assumed to be the last hop WLAN. While not
two packets and further delays the second packet in the pair. necessarily true for all flows, this assumption decouples wireless
Dynamic rate adaptation impedes bandwidth estimation behavior from other issues and simplifies the wireless analysis.
methods because these techniques assume a fixed capacity dur- To further simplify modeling WLAN packet pair dispersion, no
ing the measurement. Figure 3 shows WLAN capacity varying crossing traffic is assumed.
frequently under bad channel conditions. Hence, wireless band-
width estimation changes with the same granularity. Figure 4 A. Packet Dispersion Model
uses ns-2 wireless simulations with RTS/CTS enabled to illus- The model characterizes the dispersion between two pack-
trate the impact of network conditions on packet pair estima- ets in a packet pair in terms of the average, , and the vari-
tion techniques. Each simulation sends continuous packet pairs
ance, , of packet dispersion for a given wireless network
downstream over a single hop wireless 802.11b network. Both that includes packet size, link rate, BER and access methods.
723
Our packet dispersion model is built from two Markov chain Equations 10-13, defined in [24], define ,
, , and
models: 1) Bianchi [24] uses a Markov model that assumes an , which are and
for the basic access and RTS/CTS
idealistic, collision-free channel with a number of stations to access, respectively:
analyze DCF operation. To simplify the model, frame retrans-
missions are considered unlimited such that frames are retrans-
mitted until successful transmission and the 802.11 channel is (10)
saturated with each station always having a frame to send. 2)
(11)
Chatzimisios et al [25] extend this model to include transmis-
sion error effects. For a given BER, their model derives the
probability that a station transmits in a randomly chosen time (12)
slot as:
(13)
(3) data packets, respectively. for a fixed packet size.
is the propagation delay. (Short Interframe Space),
where is the initial contention window size, is the max- (Distributed Interframe Space) and other specific values
imum number of backoff stages, and
is conditional packet er- for DSSS are defined in the IEEE 802.11 Standard [16]. Since
ror probability:
assumes only basic access [25],
. This is
incorrect if RTS/CTS is enabled.
(4) As modeled in [25], the average packet delay of a
is the number of stations in the network, and are the packet that is not discarded, is given by:
packet and packet header sizes (physical layer plus MAC layer)
in bits. Since the authors prove there exists a unique solution for
(14)
and
from the nonlinear system presented by Equation 3 and
where is the average number of slot times required to suc-
4, these two probabilities can be obtained by numerical tech- cessfully transmit a packet and is given by:
niques.
Characterizing any given MAC layer time slot as either idle,
is the probability that a packet that is
(7) (16)
and PER is the packet error rate, computed from the BER as
where is modeled by Equation 10 or Equation 12. is
. The probability
of a collision
a function of the average slot time length given in Equation 5
and the average number of slot times to transmit a data packet.
when two or more stations simultaneously transmit is:
Since depends on (the number of nodes in the contention
domain), the wireless link rate and average packet size , we
(8) have:
and the probability that a packet is received in error is: (17)
Similarly, to include the impact caused by wireless link rate
(9) and the probe packet size , Equation 10 and Equation 12
are modified as:
In Equation 5, is the idle slot time, is the average time the
channel is busy because of a successful transmission,
and
(18)
are the average time the channel is sensed busy by each station
during a collision or packet error, respectively. Thus, the packet dispersion estimation can be computed as:
724
where the
are the probabilities that a
packet error occurs in RTS, CTS, DATA and ACK packets, re-
(19)
spectively.
Note that while is the average bandwidth estimate from Given that the capacity function is twice dif-
packet dispersions, it does not equal throughput. Through- ferentiable and the mean and variance of are finite, the vari-
put, the average achievable data rate, takes into consideration ance of the estimated capacity can be approximated by the Delta
the probability of transmitting and the probability of successful method using second-order Taylor expansions:6
transmission.
WLAN contending traffic causes extra delay to the probing
packets. For packet dispersion techniques, this extra delay can
(25)
result in an under-estimate of the capacity. The impact caused by
contending traffic is more sensitive to the number of nodes in the
network than the traffic load at the individual nodes. Assuming B. Model Validation
each WLAN node always has data to send, includes the
This section provides two distinct sets of validation results
contending traffic based on the number of WLAN nodes.
for the packet dispersion model. First, the ideal WLAN channel
Wireless channel conditions can be characterized by received
dispersion model with no contending traffic or bit errors is val-
signal strength indication (RSSI), SNR, and BER. However,
idated via both ns-2 simulations and wireless testbed measure-
modeling the effects of such channel conditions on packet dis-
ments. Then with contention and BER included in the models,
persion is left as future work. Instead, our simplified model only
a large set of simulations with randomized wireless nodes are
uses BER to characterize the channel condition and assumes
used to validate the more complex packet dispersion model. Ta-
the other wireless factors impact BER. As the number of back-
offs increases, increases exponentially until it successfully
ble I lists the set of MAC layer parameters used for all instances
of the dispersion model and all the reported simulations.
transmits or until the retry limit has been exceeded.
Parameterization for the packet dispersion model required
The impact of the channel condition on the bandwidth esti-
creating programs based on the equations in Section IV to ob-
mation is evaluated by modeling the packet dispersion variance,
tain the numerical solutions for
and since no closed-form
. Assuming the variance is caused by contention and errors, solutions exist. Furthermore, the computation of the times for
similar to Equation 16:
and
was modified to account for the lower transmission
rate of the PLCP header [16].
The ideal WLAN scenario consists of an AP and a single
wireless client with both basic and the RTS/CTS access meth-
ods possible. In this case, since is simply the slot time
and is the backoff between two successive packets with
contention window size , the delay model simplifies to:
(20)
where
, is the probability that a
(26)
Windows XP laptop wirelessly connected to the AP via a Dell
(21) TrueMobile 1300 Mini PCI card. The PC sends at full capacity,
packet pairs at the specified packet size. The wireless receiver
(22) computes estimations using packet pair dispersion.
Figure 7 graphs the bandwidth estimation results from the
The average delay caused by a packet error for RTS/CTS access models, simulations and measurements for the ideal WLAN sce-
method can be modeled as:
nario. For each packet size in either RTS/CTS or basic access
mode (BAS), the simulation results and the error bar in the fig-
ure are the average and standard deviation from 500 packet pair
estimations. The measurement includes 100 packet pair disper-
(23)
sions with the same packet sizes7 and channel rate. For ba-
sic access, the model, simulation and measurement results all
and the expected overall probability of a packet error for closely match. This indicates that the model and simulation both
RTS/CTS access can be modeled as:
http://en.wikipedia.org/wiki/Variance
Due to the Ethernet MTU limit, 1460 bytes are used instead of 1500 bytes as
(24) the maximum packet size in the measurement.
725
TABLE II
300 E RRORS IN THE BANDWIDTH ESTIMATION MODEL COMPARED WITH
Parameter Value
SIMULATIONS
32
1024
Error Free
MAC header 34 bytes
Phy header 24 bytes RTS/CTS Basic RTS/CTS Basic
Meters
RTS 44 bytes
Slot time 20 sec
AP SIFS
10 sec
(27)
DIFS 50 sec
Nodes
0
0 300
Meters and the mean and standard deviation of error are defined as the
average and standard deviation of the values. Table II sum-
TABLE I
Fig. 6. Randomly generated topology M ODEL PARAMETERS
marizes the dispersion model with contention validation results
performed under different channel conditions and shows a close
match between the model and simulations for both ideal and bit
7
error channels. Further model parameter tests comparing mod-
Estimated Bandwidth (Mbps)
3 V. A NALYSIS
BAS Model
2 BAS Simulation A. Packet Dispersion in 802.11
BAS Measurement
1 RTS/CTS Model Since the model developed does not extend over the whole
RTS/CTS Simulation
RTS/CTS Measurement network path, the analysis focuses on a WLAN with the assump-
0
0 200 400 600 800 1000 1200 1400 1600 tions that all packet dispersion occurs at the AP and that there is
Packet Size (Bytes) no crossing traffic in the downstream direction.
Understanding packet dispersion in wireless networks, re-
Fig. 7. Bandwidth estimation validation for an ideal WLAN
quires separating the non-saturated and saturated scenarios.
Given a non-saturated WLAN with low BER where the prob-
ability of packet pair dispersion due to contending traffic is rel-
provide high fidelity compared to real 802.11b networks. With atively low, the packet pair dispersion estimate represents the
RTS/CTS enabled, the measurement results are slightly higher maximum channel capability for forwarding traffic for a given
than the model and simulation. In-depth analysis shows that packet size. However, this capability includes overhead caused
this difference is because the testbed sends management frames, not only by packet headers, but also by the random delay be-
such as RTS/CTS/ACK at 2 Mbps, which is higher than the 1 tween successive packets, MAC layer contention backoff, MAC
Mbps base rate used in the model and simulation. layer retries and basic two way hand-shake (DATA/ACK) or
A random simulation topology was created (see Figure 6) to four hand-shake (RTS/CTS/DATA/ACK). Emphasizing this dif-
study the packet dispersion model with contention and bit errors. ference, the term effective capacity indicates the maximum ca-
Since all the nodes are within transmission range of each other, pability of the wireless network to deliver network layer traffic.
there are hidden terminals in this topology. Bandwidth estima- Unlike in wired networks, wireless dynamic rate adaptation al-
tion is computed with , where is the average dispersion ters effective capacity by adjusting the packet transmission rate.
time from 500 packet pairs. Therefore, effective capacity is defined as a function of time and
The number of sending nodes is increased from 2 to 50 to in-
crease the contention level in the models. By assuming every
packet size:
node always has traffic to send, the model estimates packet dis-
persion under saturation conditions. To simulate saturation, an (28)
upstream 10 Mbps CBR flow is sent from each wireless node
to the AP, while the packet pair traffic is sent downstream from where is the average packet pair dispersion at time . More-
the AP to a single node. The wireless data rate is fixed at 11 over, given discrete packet pair samples, the effective capacity
Mbps and both the CBR flows and the packet pair probes send
1500-byte packets. To avoid severely impacting the estimation
is:
results, packet pairs are sent at a lower rate of 100 Kbps. (29)
All the contention simulations without errors were repeated
with bit error rates of
. With
and
as the
where is the number of samples from packet pair measure-
modeled and simulated bandwidth estimations, respectively, the
ments and is the dispersion of the th packet pair.
relative error for each topology from 2 to 50 nodes is defined However, in a wireless network with considerable contending
as: traffic or BER, MAC layer retries due to bit errors and collisions
726
2.5 Packet train techniques apply the same packet dispersion
Estimated Bandwidth (Model)
Average Throughput (Model) ideas to packet pair dispersions. However, the large number of
Estimated Bandwidth (Mbps)
with both basic and RTS/CTS access methods. To effectively
estimate bandwidth, probing packet size must be close to the
(30)
packet size of the applications that use the bandwidth estima-
tion. For example, streaming video should use a probing packet
MAC layer retries caused by contention and BER are ma- size close to the video packet size to pick an effective streaming
jor sources of achievable throughput degradation. Achievable rate.
throughput is greater than available bandwidth because it ag- MAC layer rate adaptation impacts the effective capacity sig-
gressively takes bandwidth from the crossing traffic and it rep- nificantly. However without knowing wireless channel condi-
resents the average throughput along the same direction as the tions and the vendor-implemented rate adaptation algorithm, it
probing traffic. Therefore, the following relationship exists is difficult to model the practical effects of rate adaptation. Fig-
among the available bandwidth (), achievable throughput ( ) ure 9 illustrates the relationship between effective capacity and
and effective capacity ( ): . Moreover, in a non- the channel rate in a ideal condition with 1500 byte packets for
saturated WLAN that has available bandwidth for new traffic, both basic and RTS/CTS access methods. Although the adap-
the achievable throughput can be modeled using a fluid model tation algorithm and channel conditions may vary the result of
because contending effects can be ignored if total throughput in rate adaptation, the relationship between the channel rate and
the wireless network is less than the effective capacity. the effective capacity still holds because of the statistical nature
A saturated wireless network is caused by multiple non- of the model. Therefore, the model can be used to predict the
responsive traffic sources, such as UDP flows, transmitting effective capacity by using the average channel rate instead of a
above the flows fair-share bandwidth. However, in a saturated fixed date rate.
wireless network no bandwidth is available, and each node con- Bit errors reduce achievable throughput in wireless networks
tends with other traffic to access the wireless channel. Over- because MAC layer retries reduce the efficiency of the wire-
all throughput is reduced by contending effects and achievable less network. Moreover, packet drops due to exceeding MAC
throughput represents the fair share of the effective capacity for layer retry limits also directly reduce the achievable throughput
all the active contending nodes. in wireless networks. Figure 10 shows the packet dispersion re-
To illustrate achievable throughput in a saturated wireless net- sults of the model and simulation for 1500-byte packets sent on
work, packet pair results are compared with CBR throughput a 5-node wireless basic access network with BER ranging from
using the simulation topology in Figure 6. Achievable through-
to
. Achievable throughput decreases as the
put is computed from the dispersion time of 500 packet pairs BER increases. As the BER reaches approximately
,
with a sending rate of 100 Kbps and a 10 Mbps CBR flow. The the wireless network gets almost no achievable throughput.
contending traffic at each node is 10 Mbps, and the packet size The RTS/CTS four-way handshake lowers the impact of hid-
for packet pairs, contending traffic and CBR traffic are all 1500 den terminals by reducing the cost of collisions while intro-
bytes. Figure 8 shows that the packet pair estimates are nearly ducing considerable WLAN overhead. Without considering the
the same as the average CBR throughput for both the model and hidden terminal problem, RTS/CTS can still improve the net-
simulations. In this saturated scenario, CBR throughput repre- work average throughput under high traffic load conditions. Fig-
sents achievable throughput. ure 11 uses the model to illustrate the crossover point for 1500-
727
Throughput turning point (RTS/CTS > BAS)
7 2 60
BAS (Model) Model Error Free
RTS/CTS (Model) Simulation BER=1.0e-5
BAS (Simulation)
RTS/CTS (Simulation) 1.5
(Number of nodes)
5
40
4
1 30
3
20
2
0.5
1 10
0 0 0
0 2 4 6 8 10 12 1e-07 1e-06 1e-05 1e-04 0.001 0 2 4 6 8 10 12
Channel Datarate (Mbps) Bit Error Rate Channel Datarate (Mbps)
Fig. 9. The impacts of channel datarate Fig. 10. The impacts of channel bit error rate (BER) Fig. 11. Compare RTS/CTS with basic access on
achievable throughput
ever, for less than five nodes, the modeled standard deviations do estimations increases as the channel datarate increases. This im-
not match the simulation results. This is because the variance of plies that the higher the link datarate, the higher the relative error
a randomly selected number of backoff time slots in the con- in the estimation. Compared to the channel without errors, the
tention window is not included in Equation 20. With high traffic channel with errors has a higher variance for all datarates. This
load, the variance from multiple random backoff time slots can is because the bit errors cause more MAC layer retries and more
be safely ignored because it is relatively small compared to the variance in the estimation results.
variance due to the number of retries. However, retry probabil- Bit errors impact not only the packet dispersion result in wire-
ity is low for the network with fewer than five nodes. Thus the less networks, but also its variance. Figure 15 shows the stan-
dard deviation for 1500-byte packets on a 5-node 11 Mbps wire-
time slot variance dominates the overall variance and causes the
less network with BER ranging from to . For
a packet train. Furthermore, packet dispersion variance also pro- number of retries reaches the retransmission limit, therefore re-
ducing the variance in the backoff delay across multiple packet
vides additional information for inferring network conditions,
such as the traffic load and the bit error rate. pairs. In fact, for a BER higher than , the packet drop rate is
Packet size also affects the variance in the bandwidth estima- so high that only a few packets get through the network (with a
tions. Larger packet sizes yield a relatively larger variance. Fig- large number of retries). Note, the RTS/CTS access method has
ure 13 depicts the standard deviation of packet pair estimations a lower standard deviation than the basic method in all cases.
in a basic access, 5-node wireless network, with no errors and
. The BER curve shows a higher standard devia- VI. C ONCLUSION
tion than the error free channel for the same packet size. This is This paper presents an analytic model to investigate packet
because packet error rate increases with BER, and this raises the dispersion behavior in IEEE 802.11 wireless networks. The
728
Stdev of Estimated Bandwidth (Mbps)
1.4
1 1 1
Fig. 13. The impact of packet sizes on the standard Fig. 14. The impact of channel datarate on the stan- Fig. 15. The impacts of BER on the standard devia-
deviation of bandwidth estimation dard deviation of bandwidth estimation tion of bandwidth estimation
packet dispersion model is validated by an extended ns-2 simu- [8] Ningning Hu and Peter Steenkiste, Evaluation and characterization of
lator and with wireless 802.11b testbed measurements. Utilizing available bandwidth probing techniques, IEEE Journal on Selected Areas
in Communications, vol. 21, no. 6, Aug. 2003.
the packet dispersion model, the following observations can be [9] V. Jacobson, Congestion avoidance and control, in Proceedings of the
made: ACMSIGCOMM88 Conference, Stanford, CA, USA, Aug. 1988.
[10] Srinivasan Keshav, A control-theoretic approach to flow control, in
1. Packet dispersion measures the effective capacity and the Proceedings of the ACM SIGCOMM 1991, Sept. 1991.
achievable throughput of a wireless network instead of the ca- [11] Jean-Chrysotome Bolot, End-to-end packet delay and loss behavior in
pacity as in a wired network. Effective capacity, defined as a the internet, in SIGCOMM 93, San Francisco, CA, USA, Sept. 1993.
[12] Robert L. Carter and Mark E. Crovella, Measuring bottleneck link speed
function of packet size and time, represents the ability of a wire- in packet-switched networks, Performance Evaluation, vol. 27, no. 8, pp.
less network to forward data over a given time period. Achiev- 297318, Oct. 1996.
able throughput is the maximum throughput that a node can [13] Kevin Lai and Mary Baker, Measuring link bandwidths using a determin-
istic model of packet delay, in Proceedings of ACM SIGCOMM, Stock-
achieve when contending with other existing traffic on a wireless holm, Sweden, Aug. 2000, pp. 283294.
network. [14] Constantinos Dovrolis, Parameswaran Ramanathan, and David Moore,
Packet-dispersion techniques and a capacity-estimation methodology,
2. Wireless channel conditions, such as and RTS/CTS access IEEE/ACM Transactions on Networking, vol. 12, no. 6, 2004.
method impact the bandwidth estimation results and the vari- [15] Rohit Kapoor, Ling-Jyh Chen, Li Lao, Mario Gerla, and M. Y. Sanadidi,
ance of the results. The packet size and link rate have positive Capprobe: a simple and accurate capacity estimation technique, SIG-
COMM Comput. Commun. Rev., vol. 34, no. 4, pp. 6778, 2004.
correlation with both the bandwidth estimations and variances of [16] IEEE 802.11, 1999 Edition, Wireless LAN Medium Access Control
the estimations. The BER of the channel has a negative corre- (MAC) and Physical Layer (PHY) Specifications, .
lation with the bandwidth estimations and a positive correlation [17] I. Haratcherev, J. Taal, K. Langendoen, R. Lagendijk, and H. Sips, Auto-
matic ieee 802.11 rate control for streaming applications, Wireless Com-
with variances of the estimations. RTS/CTS reduces estimated munications and Mobile Computing, vol. 5, no. 4, pp. 421437, June 2005.
bandwidth and the variance of the estimations. [18] Sourav Pal, Sumantra Kundu, Kalyan Basu, and Sajal Das, Performance
evaluation of ieee 802.11 multi-rate control algorithms using heteregenous
Our ongoing work involves further evaluation of the packet traffic and real hardware, in PAM 06, Adelaide, Australia, Mar. 2006.
dispersion model in a wireless testbed under a variety of net- [19] A. Kamerman and L. Monteban, Wavelan ii: A highperformance wireless
work conditions that includes saturation, contention and wire- lan for unlicensed band, in Bell Labs Technical Journal, 1997.
[20] Amit P. Jardosh, Krishna N. Ramachandran, Kevin C. Almeroth, and Eliz-
less rate adaptation. Other possible future work may include the abeth M. Belding-Royer, Understanding Congestion in IEEE 802.11b
improvement to bandwidth estimation techniques by utilizing Wireless Networks, in Proceedings of IMC, Berkeley, CA, 2005.
the model in actual wireless networks. [21] Gavin Holland, Nitin H. Vaidya, and Paramvir Bahl, A rate-adaptive
MAC protocol for multi-hop wireless networks, in Proceedings of Mobile
Computing and Networking, 2001, pp. 236251.
R EFERENCES [22] B. Sadeghi, V. Kanodia, A. Sabharwal, and E. Knightly, Opportunis-
tic media access for multirate ad hoc networks, in Proceedings of ACM
[1] R.S. Prasad, M. Murray, C. Dovrolis, and K.C. Claffy, Bandwidth Es- MOBICOM 2002, Atlanta, Georgia, Sept. 2002.
timation: Metrics, Measurement Techniques, and Tools, IEEE Network, [23] Ratish J. Punnoose, Pavel V. Nikitin, and Daniel D. Stancil., Efficient
November-December 2003. simulation of ricean fading within a packet simulator, in Proceedings
[2] Tony Sun, Guang Yang, Ling-Jyh Chen, M. Y. Sanadidi, and Mario Gerla, Vehicular Technology Conference, 2000.
A measurement study of path capacity in 802.11b based wireless net- [24] G. Bianchi, Performance Analysis of the IEEE 802.11 Distributed Coor-
works, in WiTMeMo05, Seattle, USA, 2005. dination Function, IEEE Journal on Selected Areas in Communications,
[3] Karthik Lakshminarayanan, Venkata N. Padmanabhan, and Jitendra Pad- Wireless series, vol. 18, no. 3, pp. 535547, Mar. 2000.
hye, Bandwidth estimation in broadband access networks., in Proceed- [25] Periklis Chatzimisios, Anthony C. Boucouvalas, and Vasileios Vitsas,
ings of IMC 2004, Taormina, Sicily, Italy, Oct. 2004. Performance analysis of IEEE 802.11 dcf in presence of transmission
[4] Steven M. Bellovin, A best-case network performance model, Tech. errors, in ICC 2004, June 2004, vol. 27, pp. 38543858.
Rep., ATT Research, Feb. 1992. [26] M. Carvalho and J.J. Garcia-Luna-Aceves, Delay Analysis of IEEE
[5] Van Jacobson, pathchar: A tool to infer characteristics of internet paths, 802.11 in Single-Hop Networks, in Proceedings of ICNP 2003, Atlanta,
Apr. 1997, Online: ftp://ftp.ee.lbl.gov/pathchar/. Georgia, USA, Nov. 2003.
[6] Manish Jain and Constantinos Dovrolis, End-to-end available bandwidth: [27] Mingzhe Li, Mark Claypool, and Robert Kinicki, Modeling and simulat-
Measurement methodology, dynamics, and relation with tcp throughput, ing packet dispersion in wireless 802.11 networks, Tech. Rep. WPI-CS-
IEEE/ACM Transactions in Networking, , no. 295-308, Aug. 2003. TR-06-03, Worcester Polytechnic Institute, Mar. 2006.
[7] Bob Melander, Mats Bjorkman, and Per Gunningberg, A new end-to-end [28] Samarth Shah, Available bandwidth estimation in IEEE 802.11-based
probing and analysis method for estimating bandwidth bottlenecks, in wireless networks, in Finale Report of Bandwidth Estimation ISMA Work-
IEEE GLOBECOM, San Francisco, CA, USA, Nov. 2000. shop, San Diego, CA, USA, Dec. 2003.
729