15.11.2012 Views

TKN EDCA Model for ns-2 Sven Wiethoelter, Marc Emmelmann ...

TKN EDCA Model for ns-2 Sven Wiethoelter, Marc Emmelmann ...

TKN EDCA Model for ns-2 Sven Wiethoelter, Marc Emmelmann ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

TU Berlin<br />

Chapter 5<br />

Verification of <strong>TKN</strong> <strong>EDCA</strong> model<br />

This section discusses results of <strong>TKN</strong> <strong>EDCA</strong> model by showing its functionality with traffic<br />

of different ACs and its behavior when system changes from non- to the saturated area. The<br />

same scenario and traffic conditio<strong>ns</strong> are applied which were used <strong>for</strong> verification of the older<br />

model already.<br />

The older <strong>TKN</strong> EDCF model was verified by comparing its behavior with the results of<br />

Mangold et al. [13]. These results were published together with the model description in [19].<br />

This work used an IEEE 802.11a PHY with a tra<strong>ns</strong>mission rate of 6Mbps <strong>for</strong> frame’s PLCP<br />

part (we refer to this as PLCP rate in the following) and a data rate of 24Mbps <strong>for</strong> MAC<br />

headers and payload. Further details to the PHY parameter values are described in [19].<br />

The scenario co<strong>ns</strong>ists of a single AP with a different number of statio<strong>ns</strong>, whereby all nodes<br />

are within the tra<strong>ns</strong>mission range of each other. Each station tra<strong>ns</strong>mits three traffic flows<br />

in the uplink direction: a high-priority flow with 128kbps and 80Byte MSDUs, as well as a<br />

medium- and low-priority flow with 160kbps and 200Byte MSDUs, respectively. Although<br />

the authors of [13] use Poisson traffic <strong>for</strong> medium- and low-priority traffic, we decided to<br />

use isochronous flows <strong>for</strong> all three ACs, since MAC’s behavior will be investigated in the<br />

saturated area. ∗ Table 5.1 lists the contention parameters <strong>for</strong> the three ACs, which were<br />

used in [13, 19].<br />

The first metric <strong>for</strong> the verification is the throughput at MAC level of all statio<strong>ns</strong> as used<br />

in [19]. Additionally, we measure the access delay which co<strong>ns</strong>ists of the duration of contention<br />

Table 5.1: Parameters <strong>for</strong> verification<br />

high medium low<br />

priority<br />

AIFSN 2 4 7<br />

CWmin 7 10 15<br />

CWmax 7 31 255<br />

∗ Due to interface queues with lengths of 50 packets, Poisson arrivals average out in overload cases such<br />

that the MAC behavior dominates inter-tra<strong>ns</strong>mission times.<br />

Copyright at Technical University<br />

Berlin. All Rights reserved.<br />

<strong>TKN</strong>-06-003 Page 11

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!