Latency and Jitter Analysis for IEEE 802.11e Wireless LANs

,


Introduction
The widespread implementation of IEEE 802.11 as the standard for wireless local area networks (WLANs) supports the notion that WLANs may soon be widely adopted for multiservice communication networks.The primary impediment to the use of IEEE 802.11 in multiservice wireless networks is the lack of quality-of-service (QoS) functionality that is required by real-time voice and video applications [1][2][3][4][5][6][7].To resolve this problem, the IEEE 802.11Working Group created Task Group E to design medium access control (MAC) layer QoS enhancements to the IEEE 802.11 standard [8].The focus of the IEEE 802.11e standard is the hybrid coordination function (HCF), which provides an efficient mechanism for centrally coordinated medium access, and uses the enhanced distributed coordination function (EDCF) for distributed coordination of medium access.EDCF provides service differentiation between different traffic priorities and is backward compatible with the legacy 802.11DCF [9].
To analyze and compute the IEEE 802.11DCF saturated throughput, a Markov chain model for the binary exponential back-off procedure is considered in [10], and in [11,12] the authors attempted to construct a mathematical model for the throughput performance of 802.11e, even though they did not present the latency and jitter analysis of a packet.In addition, the average delay of IEEE 802.11e is computed in [11], by using Markov chain analysis.A more practical queuing model incorporating practical packet arrival processes is considered under the nonsaturated environment for IEEE 802.11DCF in [13].In [14][15][16], a personal area network, which is operated under IEEE 802.15.4 and on a DCF-similar mechanism in the nonsaturated scenario, is analyzed, using the theory of discrete time Markov chains and M/G/1/K queues.These models that are proposed for analysis of IEEE 802.11e require complexity, which leads the computation power for admission control in IEEE 802.11e.In [17], a model is proposed to address this issue on throughput and delay analysis, except the jitter.
Since the crucial factors in future QoS networks are latency and jitter, the analysis of delay and therefore the latency and jitter that determines this have to be investigated.To our best knowledge, there is no comprehensive study on the characteristic analysis of latency and jitter for IEEE 802.11eWLANs, and delay analysis is limited to the derivation of the mean value; therefore, we need to analyze the latency and jitter by using higher moments, and the probability distribution function of the delay.

Journal of Applied Mathematics
In this paper, we present an analysis of latency and jitter, by using a Markov model for IEEE 802.11e in the saturation condition.This model is used to elucidate how the EDCF differentiates service.We characterize the probability distribution of the MAC layer packet latency and jitter.In this paper, the latency is the time interval between the time instant a packet starts to contend for transmission and the time instant that either successful reception of the packet by the intended receiver is acknowledged, or the packet is dropped.The jitter is the interarrival time between successful packet transmissions of the station and is obtained from the standard deviation of the latency.
The outline of this paper is as follows.The saturation Markov model is shown in Section 2. The analytical model for the packet latency and jitter is developed in Section 3. Comparisons of analytical and simulation results are presented in Section 4. The conclusions are given in Section 5.

EDCF Analytical Model
A simple and accurate analytical model was presented to compute the throughput of a saturated IEEE 802.11eDCF network under ideal channel conditions [11].The model relies on two discrete time processes, to model the progress of a given station through back-off.One process () represents the back-off counter of the station, which is decremented at the end of every idle back-off slot.When it reaches zero, the station transmits.Regardless of the transmission result, it starts a new back-off procedure, by drawing a new value for ().It only monitors back-off slots, and the decrement of the back-off counter is suspended for the duration of all transmissions and interframe spaces (i.e., SIFS and AIFS).Since the value of () after transmissions depends on the size of the contention window from which it is drawn, and the contention window increases after collision, () depends on the station's transmission history and is therefore non-Markovian.To overcome this problem, another process, (), called a stage, is defined, to track the size of the contention window ([]  ,  = ()).After every successful transmission, () is reset to zero, and for each collision, it is incremented by one, up to a maximum of .We assume that the probability a station in class  will attempt transmission in a timeslot is a constant [], across all timeslots.In addition, we assume that the probability a packet collision in class  will be experienced by any transmission is a constant   [𝑖] and is independent of the number of collisions previously experienced.Using these assumptions, a multidimensional Markov process {((), ())} can be formulated.We describe the Markov chain model of EDCF under saturation condition in Figure 1.
The corresponding state space of the model is and the one-step transition probabilities of the Markov chain are given by By ordering the elements of Ω lexicographically, we obtain the following transition probability matrix: where the submatrices ,   , and  are given by ) , Note that the transition probability is a positive recurrent, and the system is stable.Therefore, there exist the  ,  , , we obtain the following equation: Recursively solving (5), we obtain the following relations for the stationary probabilities: By using be = 1 and   = 2   for  = 1, . . ., , we calculate [] 0,0 as follows: Therefore, [] 0,0 is given by Substituting ( 10) into ( 6)-( 8), we get the stationary probabilities, which are given by We note that the transmission probability [] and the collision probability of  [] are given by respectively, where [] is the number of nodes that have packets to transmit in class .

Probability Distribution of MAC Layer Latency and Jitter
Three basic processes occur when the MAC layer transmits a packet: decrement of the back-off counter that takes time period  (the time slot unit), successful packet transmission that takes time period []  , and packet collision that takes time period []  .We assume that  is a positive constant, and []  and []  are nonnegative random variables representing the period that the medium is sensed busy due to a successful transmission, and the period that the medium is sensed busy by each station due to a collision, respectively.
The MAC layer latency is the time interval from the time instant that a packet reaches the head of the queue and starts to contend for transmission to the time instant that either successful transmission of the packet is acknowledged, or the packet is dropped.On the other hand, the jitter is the interarrival time between successful packet transmissions of station and is obtained from the standard deviation of the latency.
These times are important for investigating the performance of higher protocol layers.Apparently, the MAC layer latency and jitter are discrete random variables, since the time unit used in transmission is a timeslot.Even though []  and []  depend on the transmission rate, the packet length, and the packet header overhead (a discrete unit, i.e. a bit), as well as the specific transmission scheme (basic access or RTS/CTS), we are assuming the variables take discrete values of the timeslot unit.
If the basic scheme is adopted, []  is determined by the longest colliding packet.When the probability of three or more packets simultaneously colliding is neglected, its probability distribution can be approximated by the following equation: where   ( = 1, 2) is the packet length of the th colliding packet.In this mechanism, the time taken for a successful transmission is given by while the time taken for a collision []  is equal to where DATA * is the time taken for the longest frame involved in a collision.Thus we can infer that For the RTS/CTS access mechanism, the period of a successful transmission []  is equal to while the period of a collision []  is equal to Note that, except for the data component, all other factors on the right-hand side of (19) are constant, while all factors on the right-hand side of (20) are constant.Therefore, when the DATA length has a uniform distribution taking integers in the range [ max ,  min ], the probability generation functions (PGF) of []  and []  , which are denoted by  []  () and  []  (), respectively, are given by In the case that the DATA length is a fixed value   , its PGF  []  () equals In the back-off process, if the medium is idle, the backoff counter is decreased by one, for every idle slot detected.During detection of an ongoing successful transmission, the back-off timer will be suspended and deferred for a time period []  , while if there are collisions between stations, the deferring time will be []  .Therefore, the latency []  , expressed as the time taken by the data link layer to successfully deliver a class  packet over the radio channel, can be written as where []  is the number of collisions the packet undergoes before success, taking time [] , at each collision, and T[]  is the contribution to the delay due to the backoff procedure.We assume that the transmission times are independent identically distributed (i.i.d.) random variables, with probability mass function  []  .Note that the number of collisions []  a packet undergoes before success will be a geometric random variable with probability mass function , where  [] is given in Section 2. Then the PGF for the latency []  is given by Let  be the tick period, which is the time interval for one of the following three events; channel is idle, transmission success, and collision.Then it can be expressed as where   is an indicator function that takes the value 1 if event  occurs, and 0 otherwise.Note that the back-off counter is decremented by 1 per time slot , and when any node undergoes transmission success or a collision, the back-off counter remains unchanged.Furthermore, in any tick period, the three events are pairwise disjoint.Let T[]  () be the   overall back-off time, given that the packets experience  collisions before success.Then it can be written as where []  is the number of tick periods that a node waits before attempting the  + 1 packet transmission, given that the first  attempts resulted in collisions.Note that    = 1, . . ., []  , is an i.i.d random variable, and its PGF,   (), is given by where  [] ,   , and  [] are given as follows: To determine the statistic of the number []  of tick periods a node spends in back-off, we introduce some further notations.Let   be the number of tick periods a node spends in the back-off stage .Then let {  }  =1 be the set of i.i.d, random variables.Since the back-off counter can take any of the values in the back-off window [0, . . ., []  − 1] with probability 1/  , the PGF of   is given by Since the random variable []  can be expressed as The PGF of []  is calculated as +1 ,  = 0, . . ., . (32) Then the PGF for the latency []  is calculated as follows: Taking the inverse discrete fourier transform (IDFT) of  []  (), we can numerically obtain the PMF of the latency: and thereafter, the cumulative distribution function (CDF), Taking the standard derivation of   , we can obtain the jitter as √Var(  ); if the contention window size is constant at every stage , the variance of the latency is given by In the case of the binary exponential back-off algorithm for each class , we apply squared and cross-product terms.For conciseness, we omit here the intermediate steps and give the final expression of the jitter obtained after some algebra, because []  is considered as constant: (36)

Numerical Analysis
In this section, we compare the numerical and simulation results, in order to quantify the effect of the approximation introduced into the theoretical model.Our analytical approach is inspired by work on the analysis of the EDCF [11] but has some distinguishing features, for example, the latency and jitter characteristics of the AC in the EDCF are evaluated.The default values selected in the standard for EDCF parameters are summarized in Table 1.In order to verify the accuracy of the analytical model, the comparisons of the average latency and jitter for varying numbers of nodes within each class are presented in Tables 2 and 3, respectively.As shown in the tables, the results of simulation are almost the same as those of numerical analysis.All simulation results in the tables are obtained with a 95.24% confidence rate (CR), which is calculated by the following: where  denotes the average latency or jitter.Figure 2 shows the curves corresponding to the latency obtained with packets of constant length, and the number of the nodes in each class in the cluster.The figure clearly shows the service differentiation, for instance, the latency of packets in the highest priority class is distributed at low values, while that of packets in the lowest priority class is distributed at high values.Figure 3 shows the jitter obtained from the standard deviation of latency.The jitters are produced at less than the latency.The jitter of higher priority is less than that of lower priority.Both Tables 2 and 3 show that the numerical and simulation results are in agreement.
Figure 4 shows the probability mass functions of the latency for 4 categories of services.The figure shows that the latency PMF values are spread from 0 to 0.9, according to priority; in other words, the values for the highest priority service are concentrated on the latency between 0.005 and 0.017 (Figure 4(a)), those for the middle priority service are spread from 0.05 to 0.14 (Figures 4(b) and 4(c)), and those for the lowest priority service are widely spread from 0 to 0.9 (Figure 4(d)).This implies that the services are appropriately differentiated, according to priority.In addition, the values are discrete, which is because the times for successful transmission and collision are constant.When the number of nodes in each class is 4, the mean latency is 1.173 seconds in Table 2.The IEEE specification recommended that the voice service delay should be no more than 0.2 seconds; and therefore, the delay in such an environment is higher than the recommended value.This implies that the access point has to restrict the number of nodes.

Conclusions
This paper presented a numerical model for the latency and jitter of 802.11eEDCF in saturation mode.The model accounts for both arbitrary interframe spaces and contention window differentiation mechanisms and considers both basic and RTS/CTS access mechanisms.Most importantly, it contains a probability distribution of the MAC packet latency, which is needed for M/M/1 systems with small contention windows or very high operating loads and describes the standard deviation of the MAC packet latency.From this model, we can choose the available number of nodes that determine the system performance, in order to satisfy user demand and handle the delay.

Figure 1 :
Figure 1: Markov chain model of EDCF in saturation regime.
result of service class 4 Numerical result of service class 3 Numerical result of service class 2 Numerical result of service class 1 Simulation of service class 4 Simulation of service class 3 Simulation of service class 2 Simulation of service class 1

Figure 2 :
Figure 2: Latency result according to service classes.
[]  , Numerical result of service class 4 Numerical result of service class 3 Numerical result of service class 2 Numerical result of service class 1 Simulation of service class 4 Simulation of service class 3 Simulation of service class 2 Simulation of service class 1

Figure 3 :
Figure 3: Jitter performance according to service classes.

Table 1 :
DSSS system parameters and access category parameters used in simulation.

Table 2 :
Comparisons between numerical and simulation results on latency (unit: sec). is statistically dependent on []  .However, in (25) we neglect this dependency and assume that [] , and []  are independent.Such an assumption is clearly an approximation; however, it does not compromise the fidelity of the results, as proved by the comparison with the simulation results.
where T[]  () is the overall back-off time, given that the packets experience  collisions before success.It is worth stressing that, in the case of the basic access mode, []

Table 3 :
Comparisons between numerical and simulation results on jitter (unit: sec).