TKN EDCA Model for ns-2 Sven Wiethoelter, Marc Emmelmann ...
TKN EDCA Model for ns-2 Sven Wiethoelter, Marc Emmelmann ...
TKN EDCA Model for ns-2 Sven Wiethoelter, Marc Emmelmann ...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
TU Berlin<br />
Chapter 5<br />
Verification of <strong>TKN</strong> <strong>EDCA</strong> model<br />
This section discusses results of <strong>TKN</strong> <strong>EDCA</strong> model by showing its functionality with traffic<br />
of different ACs and its behavior when system changes from non- to the saturated area. The<br />
same scenario and traffic conditio<strong>ns</strong> are applied which were used <strong>for</strong> verification of the older<br />
model already.<br />
The older <strong>TKN</strong> EDCF model was verified by comparing its behavior with the results of<br />
Mangold et al. [13]. These results were published together with the model description in [19].<br />
This work used an IEEE 802.11a PHY with a tra<strong>ns</strong>mission rate of 6Mbps <strong>for</strong> frame’s PLCP<br />
part (we refer to this as PLCP rate in the following) and a data rate of 24Mbps <strong>for</strong> MAC<br />
headers and payload. Further details to the PHY parameter values are described in [19].<br />
The scenario co<strong>ns</strong>ists of a single AP with a different number of statio<strong>ns</strong>, whereby all nodes<br />
are within the tra<strong>ns</strong>mission range of each other. Each station tra<strong>ns</strong>mits three traffic flows<br />
in the uplink direction: a high-priority flow with 128kbps and 80Byte MSDUs, as well as a<br />
medium- and low-priority flow with 160kbps and 200Byte MSDUs, respectively. Although<br />
the authors of [13] use Poisson traffic <strong>for</strong> medium- and low-priority traffic, we decided to<br />
use isochronous flows <strong>for</strong> all three ACs, since MAC’s behavior will be investigated in the<br />
saturated area. ∗ Table 5.1 lists the contention parameters <strong>for</strong> the three ACs, which were<br />
used in [13, 19].<br />
The first metric <strong>for</strong> the verification is the throughput at MAC level of all statio<strong>ns</strong> as used<br />
in [19]. Additionally, we measure the access delay which co<strong>ns</strong>ists of the duration of contention<br />
Table 5.1: Parameters <strong>for</strong> verification<br />
high medium low<br />
priority<br />
AIFSN 2 4 7<br />
CWmin 7 10 15<br />
CWmax 7 31 255<br />
∗ Due to interface queues with lengths of 50 packets, Poisson arrivals average out in overload cases such<br />
that the MAC behavior dominates inter-tra<strong>ns</strong>mission times.<br />
Copyright at Technical University<br />
Berlin. All Rights reserved.<br />
<strong>TKN</strong>-06-003 Page 11