Assessment of the IEEE 802.11e EDCA Protocol Limitations when Dealing with Real-Time Communication
© Ricardo Moraes et al. 2010
Received: 19 August 2009
Accepted: 16 April 2010
Published: 24 May 2010
The timing behavior of the EDCA mechanism defined in the IEEE 802.11e standard is analyzed. More specifically, the target of this paper is to evaluate the limitations of the highest priority level of the EDCA mechanism (voice category) when supporting real-time (RT) communication. By RT communication, we mean small-sized packets generated in periodic intervals that must be delivered before the end of the message stream period. Otherwise, the message is considered to be delayed and a deadline loss occurs. We have assessed the EDCA mechanism considering an open communication environment, where both RT and non-RT stations share the same frequency band. Furthermore, a realistic error-prone model channel was used to measure the impact of interferences against an error-free channel. We show that, for most part of the evaluated scenarios, when using the default parameters of the EDCA mechanism both the number of packet losses and the average packet delays forecast an unacceptable number of deadline losses. However, if adequate Contention Windows (CW) parameters are configured in the set of RT stations, it becomes possible to adequately handle RT traffic. As a conclusion of this paper, we present some potential future directions toward improved QoS in wireless networks.
In the last few years, there has been a growth in the use of wireless technologies in several application domains that require a trustworthy Quality of Service (QoS). Driving examples range from voice over IP (VoIP) to Networked Control System (NCS). For such type of application domains, the support of reliable communication is one of the major requirements. For instance, in automation systems, real-time (RT) control data must be periodically transferred between sensors, controllers and actuators according to strict transfer deadlines.
The IEEE 802.11e amendment, incorporated in the revised version of IEEE 802.11 standard , intends to provide differentiated levels of QoS to the supported applications. A significant number of studies have evaluated the behavior of this standard considering typical multimedia traffic requirements. That is, requirements usually applied for transferring voice and video streams together with background traffic. However, when the communication services are used to support RT applications, specific communication requirements must also be considered, including RT and reliability constraints .
Besides, a relevant aspect that must be considered when addressing wireless networks, is that all the stations share the access to the same radio channel, as the medium is an open communication environment. Thus, any new participant can try to access the medium at any instant according to the MAC rules and establish its own communication channels. Furthermore, the wireless communication environment is susceptible to interferences, not only from devices using the same communication technology, but also from other technologies working in the same frequency band . As a consequence, the system load cannot be predicted at system setup time, nor can it be effectively controlled during the system run-time. Therefore, when dealing with RT communication in wireless networks, it is of utmost importance to consider that the communication medium is shared with external traffic, that may unpredictably overload the communication medium.
Most published works on the performance analysis of IEEE 802.11 networks are focused on typical metrics used in multimedia domain. Moreover, the impact of varying network conditions, which is one of the main challenges to ensure QoS support in IEEE 802.11 networks as identified in , are usually not considered. A relevant exception is , where the authors have experimentally assessed the impact of background traffic upon RT traffic in a wireless communication environment.
In this paper, we evaluate the timing behavior of the IEEE 802.11e EDCA mechanism by simulation. This paper is an extended version of . Its main target is to assess the impact of external traffic upon the behavior of the voice category, when this access category is used to transfer RT traffic. By RT traffic we mean small sized packets, generated in periodic intervals. We also consider both the case of error-free and error-prone channels. That is, the effect of typical interferences within industrial environments (e.g., EMI) are taken into account and compared to the ideal environment behavior. Additionally, we investigate how the RT traffic can be more adequately handled by tuning four of the EDCA parameters: AIFSN, TXOP, aCWmin, and aCWmax.
The remainder of this paper is organized as follows. In Section 2, we describe the basics of the IEEE 802.11e MAC mechanism. In Section 3, we carefully analyze relevant RT simulation scenarios. These simulation scenarios target the analysis of the EDCA timing behavior when supporting RT traffic. In Section 4, state-of-the-art and future directions for the support of RT communication in open communication environments are drawn. Finally, the paper is concluded in Section 5.
2. IEEE 802.11 Medium Access Mechanisms
The Carrier Sense Multiple Access (CSMA) mechanism defines a probabilistic MAC family of protocols, where stations contending for the access to a shared medium must listen before transmitting. Basically, this family of protocols has the following behavior.
When a station wants to transmit, it listens to the transmission medium.
If the medium is idle, the station will start the transmission (either immediately, or after a defined interval, depending on the specific protocol).
If the medium is busy, that is, another station is transmitting, the station will defer its transmission to a later time instant that depends on the specific protocol.
A collision will occur whenever two (or more) stations sense the medium idle and decide to simultaneously transmit.
The CSMA medium access mechanisms that are implemented by different communication protocols differ on how the waiting time intervals before transmitting are evaluated, either after sensing the medium idle, or before re-transmitting after a collision.
The medium access mechanism of the IEEE 802.11 standard  is a CSMA with Collision Avoidance (CSMA/CA), also called Distributed Coordination Function (DCF). More precisely, the IEEE 802.11 MAC sublayer introduces two medium access coordination functions, the mandatory DCF and the optional Point Coordination Function (PCF) (an additional mechanism, RTS/CTS, is defined in the IEEE 802.11 standard to solve the hidden terminal problem and to adequately handle the transmission of long messages. For further details, please refer to ). DCF is the basic IEEE 802.11 mechanism, where stations perform a so-called backoff procedure before initiating a transmission. When a station wants to transmit, it first senses the medium (carrier sensing); if the medium remains idle during a specific time interval called DIFS (Distributed Interframe Space) it immediately starts the transmission. Otherwise, the station selects a random time called backoff time. The duration of this time interval is a multiple of the Slot Time (ST), which is a system parameter that depends on the characteristics of the physical layer (PHY). The number of slots is an integer in the range of [0, CW], where (contention window) is initially assigned as . A backoff counter is used to maintain the current value of the backoff time.
The DCF access method imposes an idle interval between consecutive frames, which is called the Interframe Space (IFS). Different IFSs are defined in order to impose different priorities to multiple frame types as following: SIFS (Short Interframe Space), PIFS (PCF Interframe Space), DIFS (Distributed Interframe Space), and EIFS (Extended Interframe Space). SIFS is the shortest of the interframe spaces and it is used for ACK frames. Only stations operating under the Point Coordination Function (PCF) will use PIFS. DIFS is used by stations operating under the DCF mechanism to transmit data frames and management frames. EIFS is used in communication-error conditions.
The EDCA mechanism was designed to enhance the DCF mechanism providing differentiated transmission services with four access categories (AC). Each frame arriving at the MAC layer with a defined priority will be mapped into one of the four ACs. These ACs are based on the eight priority levels of IEEE 802.1D standard, as follows: priorities 1 and 2 for background traffic (BK); priorities 0 and 3 for best effort traffic (BE); priorities 4 and 5 for video traffic (VI); and, finally, priorities 6 and 7 to voice traffic (VO) that is the highest priority level.
3. The Simulation Analysis
Traditionally, the analysis of the RT communication behavior should be made for worst-case scenarios. A common specification for the delay requirement is through the use of a deterministic delay bound, where , being the delay of each message , and the upper bounded delay specified by the application. Usually, this upper bounded delay is also called deadline. However, worst-case scenarios in probabilistic medium access networks, as it is the case of IEEE 802.11 networks, address only rarely occurring cases. The analysis of such cases may only be relevant for safety-critical applications.
Instead, this paper is focused on the timing analysis of the average communication behavior. The main reason for this option is that the target applications are usually loss tolerant in what concerns the loss of some message deadlines. For instance, the transfer of a video stream may be specified to tolerate a maximum of 10% deadline loss rate, if the lost frames are "adequately" spaced. Other examples of relevant loss tolerant applications are Networked Control Systems (NCSs) scheduled according to the (m,k)-firm model , or the support of VoIP applications, where an average packet delay below 150 ms and an average jitter 50 ms are acceptable for most user applications . On the other hand, packet loss rates up to 3% are generally acceptable for VoIP applications.
In the case of loss tolerant applications, the RT behavior can be specified through the use of statistical metrics. For example, the statistical delay bound can be represented by , where and are defined as above, and is the lower bound for the probability of successful and timely delivery. Adequate values for within the industrial environment can be defined among 0.95 to 0.98, when dealing with soft RT applications.
The proposed scenarios analyze the behavior of the highest access category (voice), when this category is used to transmit RT data (small-sized packets in periodic intervals) from RT stations. The communication environment is shared with external traffic sources that are out of the sphere-of-control of the RT architecture. These RT periodic data exchanges are intended to model both sensor messages sent to plant controllers, and output messages sent from plant controllers to the actuators.
There are a number of analytical models to evaluate the EDCA mechanism [9–17]. However, the majority of these models assume simplifying approaches. Common examples of these simplifications are related to the modeling of the AIFS procedure, backoff counter, transmission opportunities (TXOP), virtual collisions, and retransmission limits. Moreover, most of the analytical models presented in the literature assume that the network operates in saturated traffic conditions.
Regarding the scenarios analyzed in this paper, we consider that the use of analytical models is not an adequate approach by the following reasons. First, the simplifications usually employed on these models cannot capture properly important aspects that are considered in our evaluation. Second, most part of these models assume Poisson traffic sources. Therefore, it would be difficult to accurately model real-time traffic. As an example, the periodic behavior is difficult to (accurately) model using Markov chains. Third, in the considered scenarios the network is operating in a nonsaturation area, and therefore only a few of these models were useful. Therefore, we have used a simulation model built using a Stochastic Petri Net (SPN) tool , that describes the dynamics of the EDCA function of the IEEE 802.11e protocol. This simulation model has been validated against the results obtained from simulation models [19, 20]. The achieved results clearly highlight the validity of the employed simulation model (for a complete description of the SPN model, validation and related documentation, please refer to ). For all the simulations, it is used a Gilbert-Elliot variant error model, which is a Semi-Markov model where the channel is always in one of two states: good or bad. This model assumes an independent bit error rate (BER) in each state. For the parametrization of the model, the states holding times are log-normal distributed according to . The mean duration of good state is 65 ms, the mean duration of bad state is 10 ms and, the coefficient of variation (CoV) for the bad state holding times has been set to 10 and for the good state to 20. This set of values leads to a rather bad channel , where the steady-state probability for finding the channel in bad state is approximately . Two sets of simulations are assessed, differing in their respective mean bit error rate. The first set defines a mean BER of 1.0E-4, while the second set defines that no bit errors occur. Therefore, during the bad channel states for the first set, the BER is about 7.5E-4 and, for the good state no errors will occur.
The simulation scenarios were built considering an ad hoc network topology, where multiple ST and RT stations are operating in the same frequency band. It is assumed that all stations are within the range of transmission of each other and there is no node mobility nor hidden stations.
RT stations only transfer RT messages, using the default set of parameters defined by the EDCA function for the voice (VO) access category. On the other hand, ST (standard IEEE 802.11e stations that are out of the sphere-of-control of the RT architecture) stations are intended to model external traffic sources, that are sharing the communication medium with the RT traffic sources. These ST stations transmit several types of traffic using the default set of parameters defined by the EDCA mechanism (Table 1).
The physical parameters used in the simulations are based on the IEEE 802.11a PHY mode and . Each station operates at OFDM (Orthogonal Frequency Division Multiplexing) PHY mode, control frames are transmitted at a basic rate equal to 1 Mbps, while the MSDU (MAC service data units) are transmitted at 36 Mbps. The maximum number of transmission attempts is set to 7. The MAC queue size is set to 50 positions.
All the simulation results have been obtained with a 95% confidence interval with a half-width relative interval of 5%. The performance metrics analyzed in this scenario include: average delay, average queue size and packet loss rate. The average delay is the average delay required to transfer a packet, measured from the start of its generation at the application layer to the end of the packet transfer at the receiving station. The average queue size represents the average output buffer occupancy. The packet loss represents the percentage of packets that are lost for each traffic stream.
3.1. Simulation Scenario 1
In this scenario, two simulation cases are assessed, the first (small population case) considers 10 ST stations operating in the same frequency band with 10 or 20 RT stations. The second one (large population case) extends the number of ST stations to 40.
The generated data frames have a constant size. The RT traffic is characterized by periodic traffic sources with a small amount of imposed jitter ( 1% of the message period). It is also guaranteed that the RT traffic is not correlated among RT stations. Each RT station generates packets with fixed Message Stream Periods (MSPs) of 2 ms, 10 ms, or 20 ms with 45 bytes of data payload, which is equivalent to generate , or packets/s. Therefore, each RT station imposes a constant network load of , or kbits/s that represents about %, % or % of the total network load (without considering the MAC and PHY headers).
On the other hand, ST stations transmit three types of traffic: voice (VO) (packet size of 160 bytes), video (VI) (packet size of 1280 bytes) and background (BK) (packet size of 1600 bytes), according to a Poisson distribution. The network load imposed by the set of ST stations ranges from 10% to 90%, by steps of 10%. In order to impose this set of network loads, each ST station generates a tuple of VO, VI and BK packets at a predefined data rate. For the case of the small population scenario, the predefined set of data rates were ; ; ; ; ; ; ; , or packets/s. Similarly, for the case of the large population scenario, the predefined set of data rates were ; ; ; ; ; ; ; , or packets/s. Therefore, as it is used the same data rates for all types of traffics (VO, VI, and BK), the percentage of each traffic category is directly related with their packet sizes (VO 5.2%, VI 42.1% and BK 52.7%).
From this simulation setup, it is clear that the RT traffic is transferred at the same priority level as the VO (voice) traffic transferred by ST stations. The only distinguishing difference is the length of the transferred packets.
The target of these simulations is to assess the behavior of the RT traffic when the communication medium is shared with external traffic generated by a set of ST stations. It is assumed that RT messages have a production period that is equal to their deadline. If the message delay is higher that its deadline, when it arrives to the receiver its contents are (temporally) invalid, which is equivalent to a deadline miss. If a RT message arrives to a nonempty transmission queue this means that the previous message was not yet transmitted and therefore it missed its deadline.
Based on the RT application characteristics presented above, a set of qualitative upper boundaries are used to assess how well the EDCA mechanism is able to handle RT traffic in those communication scenarios. Those boundaries include: (a) an average message delay that must be clearly smaller than the message stream period (MSP); (b) an average queue size that must be clearly smaller than 1 packet; (c) a packet loss rate that must be clearly smaller than 5%. Any values above these qualitative thresholds indicate an unacceptable rate of message deadlines loss, and therefore an unacceptable RT behavior.
3.2. Simulation Results for Scenario 1
For the sake of simplicity, only the values for RT traffic are plotted in the following figures. Ni  has already demonstrated that the EDCA mechanism can provide a service differentiation between different types of traffic, that is, the highest-priority voice message streams have lower delays than the lowest-priority ones (video, best-effort, and background). However, that service differentiation is reached by downgrading the service of the lower priority message streams. That is, the performance of video and data flows will be degraded, specially when the channel is heavily loaded. Thus, within the context of this work it is not relevant to further discuss the timing behavior of the ST traffic.
3.2.1. The Impact of External ST Traffic upon the Average Queue Size
When comparing the undisturbed scenario (by undisturbed scenario, we mean that there are no external ST stations trying to transfer its own messages, that is, there is an unrealistic closed communication environment) with the case of 10 RT stations operating together with 10/40 ST stations ( ms), the impact that external traffic has upon the average queue size of RT message streams is clear. Figure 3 shows that the average queue size for the RT stations is already larger than 1 packet when the network load imposed by ST stations is only slightly above 10%. This means that the EDCA mechanism is not able to provide a RT communication service for MSPs of 2 ms in open communication environments, when considering the use of default EDCA parameters.
Figure 3 also illustrates the impact of increasing the number of ST stations contending for the medium access, which highlights a degradation of the QoS for the large population scenarios. This is due to the effect of having multiple stations contending for the transmission medium, which leads to a large number of collisions. As a consequence, the medium access delay increases due to the backoff mechanism, and therefore there is also an increase of the average queue size.
From Figure 3 we can also infer that one of the major sources of perturbation upon the RT communication is the increase of the external network load and not only the error-prone characteristics of the wireless medium. It is interesting to compare the impact upon the average queue size between an error-free and an error-prone channel in the following cases: (a) undisturbed versus disturbed scenarios; (b) increase of the network load from 10% to 50%. In both cases, the impact of an error-prone channel is smaller than the increase of the external network load.
3.2.2. The Impact of Uncontrolled External Traffic upon the Packet Loss Rate
This simulation analysis shows that, for a number of RT stations above 10, the impact of the external traffic becomes clearly undesirable (similar results were obtained for MSPs of 20 ms). For instance, when considering 20 RT stations, the packet loss rate is already above 10%, when the external network load increases from just 10% to 30%. This value clearly exceeds the upper bound for the admissible packet loss rate, which means that EDCA is no longer able to provide a RT communication service to the supported applications. Comparing the results presented in Figures 4 and 5, it can be observed that while the average queue size is kept at a reduced value, the packet loss rate quickly increases. The reduced queue size is mainly a consequence of the reduced RT traffic load, the RT packets being losses due to the higher number of retransmissions due to collisions with the increasing ST traffic.
3.2.3. The Impact of External ST Traffic upon the Average Packet Delay
This set of simulations shows that using the EDCA mechanism enables the support of RT traffic with MSPs of 10 ms or 20 ms generated by up to 10 RT stations (the average packet delay remains smaller than the respective MSP). The upper bound for external disturbances may be as high as 70% or 90% in the case of message stream periods of 10 ms or 20 ms, respectively. Additionally, it can be seen that the effect of the error-prone channel becomes more relevant when the external network load increases. However, the impact of the external traffic load upon the average packet delay is higher than the impact of the error-prone channel. The only exception occurs in scenarios with small loads, where the influence of both elements can be considered to be balanced.
3.3. Simulation Scenario 2
The main conclusion from the previous results is that default set of parameter values that are used for the EDCA mechanism are just able to guarantee RT communication requirements for a number of RT stations smaller than 10 with MSPs above 10 ms. Another important result is that the major source of perturbation upon RT communication is caused by the increase of external network load and not by the error-prone characteristics of the wireless medium. Remark that the level of communication errors used in the simulations has been set to a realistic value when dealing with wireless transmission in harsh industrial environments .
One of the simplifications of simulation Scenario 1 is that the voice traffic has been modeled as a Poisson traffic. This can be seen as an acceptable modeling simplification, as the RT traffic is sharing the same AC with the voice traffic. However, there is the need to assess if using the voice AC to transfer VoIP traffic according to a realistic CODEC model is less damaging to the transfer of RT traffic. Additionally, it was also decided to consider RT traffic sources with MSPs of 5 ms, and 50 ms (and not only MSPs equal to 2 ms, 10 ms, and 20 ms), which are equivalent to generate 200 or 20 packets/s.
As in Simulation Scenario 1, it is considered a number of RT stations operating in the same frequency band with a set of ST stations. In Scenario 2, ST stations transmit two types of traffic: voice (VO) and background (BK). The voice traffic is characterized as a two state Markov ON/OFF to represent realistic voice calls . The ITU-T G.711 recommendation has been selected, with 64 kb/s bit rate, packet size of 160 bytes generated every 20 ms during a talking (ON) period, and no packet generated in a listening (OFF) period. The mean value of ON/OFF period is 1.5 s and 1.35 s, respectively. The transmission rate of background traffic is 1024 kb/s (packet size of 1500 bytes).
Basically, a scenario that considers 2, 6, 10, 14, 18, 22, 26, and 30 external ST stations is analyzed, where each ST station imposes a network load of 2.84%. This means that the network load imposed by this set of external ST stations varies from 5.69% (case of 2 ST stations) to 85.33% (case of 30 ST stations). These external ST stations are operating in the same frequency band together with 10, 20, and 30 RT stations. The characteristics of the RT traffic pattern are the same as defined in Simulation Scenario 1. As in the previous scenario, it is assumed that all stations are within the range of transmission of each other and there is no node mobility nor hidden stations. Finally, it is only considered the case of an error-free channel.
3.4. Results Scenario 2
From this set of simulations (Figure 7), it can be observed for the case of MSPs equal to 50 ms that, whatever the external network load, the average packet delay is always kept below than deadline. In the case of MSPs equal to 5 ms, the average packet delay is kept below the deadline only up to 20 RT stations. On the other hand, the average packet delay is almost independent of the number of external ST stations. The main reason for this behavior is the higher priority traffic of ST not being always active (ON/OFF behavior) and therefore the level of interference with the RT traffic is much smaller. Remember that for this simulation scenario the ST stations do not generate any voice packet during the listening (OFF) period (1.35 s), while in the previous scenario they generate Poisson distributed traffic in the voice AC category.
As previously discussed, the EDCA mechanism provides traffic differentiation based on three independent mechanisms: the Arbitration Interframe Space (AIFS), the Transmission Opportunity time interval (TXOP) and the Contention Window size (CW). For a reduced network load, small CW values can be an adequate choice. However, when the number of stations and the network load increase, small CW values means higher number of collisions. Throughout the previously presented results, it becomes clear that one of the main sources of weakness of the EDCA mechanism when dealing with uncontrolled traffic sources is related to the increasing number of RT stations. Therefore, considering that we have full control upon the set of RT stations, it is reasonable to propose the selection of adequate AIFS, TXOP, and CW parameter values according to the characteristics of the RT application. This proposal is consistent with the "open communication environment" concept, as we are not imposing any particular setup for the external ST stations. Therefore, in the next section we investigate the impact of the variation of these EDCA parameters upon the behavior of the RT traffic.
3.5. Tuning the AIFSN, TXOP, and CW Parameters
Considering the case of Scenario 2 with a specific number of ST stations (14 ST stations—external network load of about 40%). We firstly investigate the impact of the AIFSN parameter upon the behavior of the RT traffic. That is, we analyzed the average packet delay and packet loss rate of the RT traffic, when there are 20 RT stations transmitting messages with periodicity of 5 ms and 10 ms. For the sake of simplicity, we omit the values for MSPs of 2 ms, 20 ms and 50 ms and we only consider an error-free channel. In this experiment, the AIFSN parameter varies from 2 to 6 in the set of RT stations. Remember that, the default EDCA value for voice traffic is 2. The other parameters are the default values defined for the EDCA mechanism, where according to IEEE 802.11a PHY mode , ; and ms.
Effects of varying AIFSN on the RT traffic, for 20 RT stations—MSP = 5 ms and 10 ms.
Effects of varying TXOP on the RT traffic, for 20 RT stations—MSP = 5 ms and 10 ms.
Effects of varying aCWmin, aCWmax on the RT traffic, for 20 RT stations—MSP = 5 ms.
Effects of varying aCWmin, aCWmax on the RT traffic, for 20 RT stations—MSP = 10 ms.
It can be observed a significant improvement in the RT traffic when comparing the CW default parameter values (underlined values: ; ) with the best CW values (bold values) for this specific scenario. It indicates that, depending on the type of supported RT communication, the EDCA mechanism may be considered suitable for RT communication purposes.
3.6. Tuning the Best CW Parameters
Based on the best CW parameters extracted from the previous simulation scenarios ( and ), we repeated the simulations from Scenario 2, considering 20 RT stations transmitting messages with MSPs of 5 ms and 10 ms, operating together with 2, 6, 10, 14, 18, 22, 26, and 30 ST stations.
Finally, an important metric when dealing with RT communication is the maximum transmission delay. In the case of Figure 10, it is also plotted the maximum delay when considering 95% and 98% of the successful message transmissions. These values are relevant for the case of loss tolerant applications, where up to 5% and 2% of deadline misses can be encompassed. The previous simulation analysis (average packet delays) are only indicative of the average communication behavior, but may be valuable enough to provide an indication of the QoS that can be supported by the EDCA mechanism.
4. State-of-the-Art and Future Directions
Traditionally, when supporting RT communication in CSMA wired networks, the timing behavior has been guaranteed through the tight control of every communicating device. The coexistence of RT controlled stations with non-RT stations has been made possible by constraining the traffic behavior of the latter. Unfortunately, this approach cannot be enforced in wireless environments as, at any instant, external traffic sources may start sharing the same radio channel. In this section, we briefly describe the state-of-the-art approaches intended to provide QoS support in IEEE 802.11 networks.
The Point Coordination Function (PCF) is one of the main solutions intended to support QoS guarantees in IEEE 802.11 wireless networks. It has been proposed in the original IEEE 802.11 standard as an optional access mechanism. It implements a centralized polling scheme to support synchronous data transmissions, where the Point Coordinator (PC) performs the role of polling master. Usually, the PC resides in the Access Point (AP).
The HCCA mechanism was proposed in the IEEE 802.11e amendment  to improve the PCF scheme. It is based on a round-robin scheme and it is intended to guarantee bounded delay requirements. Like the PCF scheme, the PC also polls all the stations in the polling list, even though some stations may not have messages to transmit. When the PC polls a station that has no packets to transfer, the station will transmit a null frame. As a consequence, the polling overhead is roughly equal to the time interval from sending the polling frame till the end of the ACK frame . A number of improvements have been recently proposed to reduce the HCCA polling overhead. For instance, Gao et al.  proposed a new admission control framework to replace the traditional CSMA mechanism. It uses the mean data rate and the mean packet-size values to calculate the resource needed by each message flow. Thus, this new mechanism is particularly adequate when dealing with variable resource bit rate (VBR) traffic over HCCA.
Rashid et al.  have pointed out the performance deficiencies of the HCCA scheduler and proposed a new scheduling scheme. The prediction and optimization-based HCCA (PRO-HCCA) uses a prediction mechanism to account for the dynamic intensity of VBR traffic. This mechanism tries to find an optimal allocation of available transmission time among the competing traffic streams.
Solutions based on token passing mechanisms have also been proposed to support QoS communication in wireless networks. In , Ergen et al. proposed the WTRP (Wireless Token Ring Protocol), which is a MAC protocol that exchanges special tokens and uses multiple timers to maintain the nodes synchronized. The token is rotated around the ring. Each station transmits during a specified time and if enough time is left, the station invites nodes outside the ring to join. In , Cheng et al. presents a wireless token-passing protocol, named Ripple. Basically, Ripple modifies the data transmission procedure of 802.11 DCF and employs request-to-send (RTS) and ready-to-receive (RTR) frames as tokens. A node that has the right to send a data frame will send a RTS frame, and a node which has the right to receive a data frame will send a RTR frame to the sender if the expected RTS frame has not been received. Summing up, a station can only send a DATA frame if it holds the token.
Based on the EDCA mechanism, Villalón et al.  designed the B-EDCA mechanism that intends to provide QoS support to multimedia communication, and it is able to coexist with legacy DCF-based stations. Basically, it changes the AIFS value of the highest AC to when stations are in the Backoff state. Moreover, in order to keep the compatibility with the HCCA mechanism, a station implementing the B-EDCA mechanism must wait for an additional SIFS time when the backoff counter reaches zero, that is, . Therefore, it is adequate when operating in the IEEE 802.11b PHY mode, as the waiting time will be larger than the one used by the HCCA mechanism and smaller than the time used by standard EDCA stations.
In , it is also proposed a modified EDCA mechanism, where soft real-time guarantees are provided by dynamically adjusting the priority level of a traffic flow based on the estimated per-hop delay, and generating a nonuniformly distributed backoff timer for retransmitted frames according to their individual end-to-end delay requirements.
Hamidian and Körner  presented an interesting solution that provides QoS guarantees to the EDCA mechanism. The proposed solution allows stations with higher priority traffic to reserve time for collision-free access to the medium. Basically, it proposes to transfer the HCCA admission control and scheduling algorithms from the HCCA controller to the contending stations.
Wang et al.  designed a new collision resolution mechanism, referred as gentle DCF or GDCF. The difference between GDCF and DCF is that GDCF takes a more conservative measure by halving the CW value only if there are consecutive successful transmissions. Conversely, DCF resets its CW to the minimum value once there is a successful transmission. The GDCF needs to maintain a continuous successful transmission counter that is reset to zero after each collision. Then, when a collision occurs GDCF works similarly to DCF.
Yang and Vaidya  proposed the Busy Tone Priority Scheduling (BTPS) protocol. This scheme makes the following assumptions: (i) each station is capable to monitor the carrier status of the data channel; (ii) each station in idle state is capable to monitor two busy tone channels (BT1 and BT2) and lock onto the signal in the data channel as desired; (iii) it is assumed that the two busy tone signals (BT1 or BT2) sent by a station can be sensed by other stations within the interference range of the former station. In BTPS, busy tone serves as the indication of backlogged high priority packets.
BTPS works similarly to the IEEE 802.11 DCF, with the difference that high priority and low priority stations behave differently during IFS and backoff stages. The BTPS protocol uses DIFS as the IFS for high priority stations. However, during DIFS and backoff stages, high priority stations with queued packets send an energy pulse every M slots, where M is a constant. Between two consecutive busy tone pulse transmissions, there should be at least one empty Slot Time interval, as the station must have a chance to listen to the data channel. Therefore, M could be any value larger than or equal to 2 and, the IFS of low priority stations should be larger than M slots, in order to enable sensing the busy tone signal.
In , it was proposed a distributed algorithm intended to provide fair scheduling in a WLAN, referred as DFS (Distributed Fair Scheduling). The DFS protocol behaves quite similarly to IEEE 802.11 DCF, except in what concerns the backoff interval initially calculated, which is chosen proportional to the finish tag of the packet to be transmitted. The finish tag is calculated similarly to the SCFQ (Self-Clocked Fair Queueing) algorithm . In , the authors modify the distributed SCFQ algorithm combined with the prioritization schemes proposed in the EDCA mechanism and specify the RT-FCR (real-time fast collision resolution), where the priorities are implemented by assigning different backoff ranges based on the type of traffic.
In , Lopez-Aguilera et al. evaluated the performance of the IEEE 802.11e EDCA when its working procedure is unsynchronized. The authors proposed the use of AIFS values whose differences are not multiple of the slot time. As a consequence, it would become possible to avoid collisions between frames from different access categories.
Lo Bello et al.  proposed a wireless traffic smoother (WTS) to support soft RT traffic over IEEE 802.11 WLANs. The presented solution is similar to the traffic smoother scheme previously proposed for Ethernet networks . However, its main drawback is that it requires the smoothing strategy to be implemented in all the communicating devices.
Another approach to support Qos guarantees are those based on forcing the collision resolution schemes in favor of the RT stations. A relevant proposal has been made by Sobrinho and Krishnakumar , who adapted the EQuB mechanism (black burst)  to ad hoc CSMA wireless networks. This scheme requires the shutdown of the standard retransmission scheme. Real-time stations implementing the EQuB approach contend for the channel access after a medium interframe spacing , rather than after the long interframe spacing , used by standard stations. Thus, RT stations have priority over standard stations. When a RT station wants to transmit, it sorts its access rights by jamming the channel with Black Bursts (BB's), that is, energy pulses immediately after an idle period of length . The length of the BB transmitted by a RT node is an increasing function of the contention delay experienced by the node.
A similar scheme is presented in , where voice nodes (RT stations) use energy-burst (EB) (that are similar to BB) periods to prioritize RT packets over data packets. The AP (Access Point) can transmit a VoIP packet after PIFS without backoff or contention. On the other hand, each voice station has its own address (ID), referred as VID (virtual identification). The VID can be assigned during the traffic stream (TS) setup procedure. The VID is expressed as a binary value, which is determined by the voice packet resolution period (VPRP). The station with the highest VID wins the contention.
In , Sheu et al. proposed a priority MAC protocol based on Sobrinho's approach, complemented by a binary tree referred as contention tree. Basically, the black-burst scheme is adopted to distinguish the priorities of stations. Stations with the same priority send messages in a round robin manner. The basic idea is that a station can obtain an unique ID number, which depends on its position in the contention tree.
In , a RT-communication approach (VTP-CSMA) has been proposed based on a traffic separation mechanism. Such mechanisms are able to prioritize RT-traffic over other traffic, without directly controlling the latter. The proposed architecture is based on a Virtual Token Passing procedure that circulates a virtual token among a number of RT devices. This virtual token is complemented by an underlying traffic separation mechanism that prioritizes the RT traffic over the non-RT traffic.
In , it was presented preliminary results of a new mechanism called Contention Window Adapter. It dynamically changes the contention window size of the different ACs of the EDCA mechanism, according to the workload conditions of the wireless network. It represents one step more forward the use of wireless communication in industrial environments.
A common characteristic of almost all these previous solutions is that an enhanced (QoS-enabled) station is not able to support RT communication in the presence of unconstrained IEEE 802.11 stations, unless these standard stations do not initiate any communication. That is, the majority of the RT communication approaches are not able to provide QoS guarantees whenever unconstrained stations try to access the shared communication medium. Relevant exceptions are the improvements included in the HCF (PCF and HCCA) mechanism of the IEEE 802.11e amendment. However, despite PCF being well suited to handle delay-sensitive applications, it is rather complex and almost none WLAN network card ever implemented the PCF scheme . Preliminary studies [28, 49] have also shown that the HCCA mechanism may not be suitable to guarantee the special requirements of RT applications. Furthermore, it is still not clear whether the HCCA mechanism will be implemented in next generation WLAN network cards, overcoming the unavailability problem of the PCF mechanism.
We entirely agree with Bianchi et al.  that in wireless architectures, the service differentiation mechanism must be compulsory introduced as medium access control (MAC) layer extension. Within this context, other relevant exceptions are those based on the black burst (BB) scheme  and VTP-CSMA approach . BB solutions are technically very interesting, but they are in practice not viable , since they require an extensive modification of the WLAN cards, which prevents the use of commercial-of-the-shelf (COTS) hardware. Although the VTP-CSMA mechanism also needs to modify parts of the MAC layer, it could be easily implemented in COTS hardware (e.g., Field Programmable Gate Array—FPGA) upon standard IEEE 802.11e hardware.
Besides these approaches, all other mechanisms require the strict control of the communication environment. Therefore, they are not suitable to handle communication environments where a set of non-RT stations can be operating in the same frequency band as the RT stations. For next generation communication environments, allowing the coexistence of both RT and non-RT stations in the same communication domain is likely to become a major requirement. Furthermore, solutions that enable the prioritization of RT traffic only when considering closed communication environment are unacceptable. Specifically, the underlying wireless communication protocol must be able to guarantee the timing constraints of the RT traffic in a communication environment shared with timing unconstrained devices. Therefore, the most promising solutions to provide RT communication in IEEE 802.11 are those that force the collision resolution in favor of the RT stations, compelling all the other contending stations to postpone the medium access.
We have evaluated the timing behavior of the EDCA function when supporting RT traffic, similar to the traffic that is usually found in industrial environments. The simulated scenarios consider a set of RT stations operating in the same frequency band of a set of timing unconstrained ST stations. Basically, we have assessed the impact of external traffic (generated by ST stations) upon the behavior of the highest access category (voice), when this access category is used to transfer RT traffic (small-sized packets in periodic intervals). Moreover, both error-free and error-prone channels are considered. The obtained results show the following:
both increasing the number of stations and the network load strongly influence the RT traffic, by means of higher packet delays, higher percentage of packet losses, higher average queue sizes;
the packet loss rate for transferring RT packets is highly influenced in an error-prone channel, mainly for high rates of network load imposed by external (ST) stations.
The main conclusion of the first set of simulated scenarios is that default parameter values of the EDCA mechanism are just able to guarantee industrial communication (timing) requirements for a number of RT stations smaller than 10 stations with message stream periods above 10 ms. From a second set of simulated scenarios it can be concluded that the RT behavior of the EDCA mechanism can be significantly improved by adequately tuning the EDCA parameters. More specifically, by enlarging the default values of the CW parameters, the packet loss rate can be reduced down to an acceptable range values. This improvement in the packet loss rate is achieved at the cost of slightly increasing the average packet delay. Therefore, by carefully tuning the CW parameters, is is possible to significantly improve the RT behavior of the EDCA mechanism.
- IEEE Standard for Information Technology - Telecommunications and information exchange between systems -local and metropolitan area networks-specific requirements—part 11: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications IEEE Std 802.11-2007 (Revision of IEEE 802.11-1999), 2007Google Scholar
- Willig A, Matheus K, Wolisz A: Wireless technology in industrial networks. Proceedings of the IEEE 2005, 93(6):1130-1151.View ArticleGoogle Scholar
- Miorandi D, Uhlemann E, Vitturi S, Willig A: Guest Editorial: Special section on wireless technologies in factory and industrial automation, part I. IEEE Transactions on Industrial Informatics 2007, 3(2):95-97.View ArticleGoogle Scholar
- Ramos N, Panigrahi D, Dey S: Quality of service provisioning in 802.11e networks: challenges, approaches, and future directions. IEEE Network 2005, 19(4):14-20. 10.1109/MNET.2005.1470678View ArticleGoogle Scholar
- Cena G, Bertolotti IC, Valenzano A, Zunino C: Evaluation of response times in industrial WLANs. IEEE Transactions on Industrial Informatics 2007, 3(3):191-201.View ArticleGoogle Scholar
- Moraes R, Portugal P, Vasques F, Fonseca JA: Limitations of the IEEE 802.11e EDCA protocol when supporting real-time communication. Proceedings of the 7th IEEE International Workshop on Factory Communication Systems (WFCS '08), May 2008 119-128.Google Scholar
- Hamdaoui M, Ramanathan P: A dynamic priority assignment technique for streams with (m,k)-firm deadlines. IEEE Transactions on Computers 1995, 44(12):1443-1451. 10.1109/12.477249MATHMathSciNetView ArticleGoogle Scholar
- Goode B: Voice over Internet Protocol (VoIP). Proceedings of the IEEE 2002, 90(9):1495-1517. 10.1109/JPROC.2002.802005View ArticleGoogle Scholar
- Hui J, Devetsikiotis M: A unified model for the performance analysis of IEEE 802.11e EDCA. IEEE Transactions on Communications 2005, 53(9):1498-1510. 10.1109/TCOMM.2005.855013View ArticleGoogle Scholar
- Kong Z-N, Tsang DHK, Bensaou B, Gao D: Performance analysis of IEEE 802.11e contention-based channel access. IEEE Journal on Selected Areas in Communications 2004, 22(10):2095-2106. 10.1109/JSAC.2004.836019View ArticleGoogle Scholar
- Xiao Y: Performance analysis of priority schemes for IEEE 802.11 and IEEE 802.1 le wireless LANs. IEEE Transactions on Wireless Communications 2005, 4(4):1506-1515.View ArticleGoogle Scholar
- Tao Z, Panwar S: Throughput and delay analysis for the IEEE 802.11e enhanced distributed channel access. IEEE Transactions on Communications 2006, 54(4):596-603.View ArticleGoogle Scholar
- Xiong L, Mao G: Saturated throughput analysis of IEEE 802.11e EDCA. Computer Networks 2007, 51(11):3047-3068. 10.1016/j.comnet.2007.01.002MATHView ArticleGoogle Scholar
- Lin Y, Wong VWS: Saturation throughput of IEEE 802.11e EDCA based on mean value analysis. Proceedings of IEEE Wireless Communications and Networking Conference (WCNC '06), April 2006 475-480.Google Scholar
- Engelstad PE, Østerbø ON: Analysis of the total delay of IEEE 802.11e EDCA and 802.11 DCF. Proceedings of IEEE International Conference on Communications (ICC '06), July 2006 552-559.Google Scholar
- Zhang W, Sun J, Liu J, Zhang H-B: Performance analysis of IEEE 802.11e EDCA in wireless LANs. Journal of Zhejiang University: Science A 2007, 8(1):18-23. 10.1631/jzus.2007.A0018MathSciNetView ArticleGoogle Scholar
- Inan I, Keceli F, Ayanoglu E: Modeling the 802.11e enhanced distributed channel access function. Proceedings of the 50th Annual IEEE Global Telecommunications Conference (GLOBECOM '07), November 2007 2546-2551.Google Scholar
- Moraes R, Portugal P, Vasques F: A stochastic petri net model for the simulation analysis of the IEEE 802.11e EDCA communication protocol. Proceedings of IEEE Conference on Emerging Technologies and Factory Automation (ETFA '06), September 2006 38-45.Google Scholar
- Wiethoelter S, Emmelmann M, Hoene C, Wolisz A: TKN EDCA model for NS-2 (TKN-06-003). Telecommunication Networks Group, Technical University of Berlin, Berlin, Germany; 2006.Google Scholar
- Mangold S, Sunghyun C, Klein O, Hiertz G, Stibor L: IEEE 802.11 wireless LAN for quality of service. Proceedings of European Wireless (EW '02), 2002 1: 32-39.Google Scholar
- Moraes R: Supporting real-time communication in CSMA-based networks: the VTP-CSMA virtual token passing approach, Ph.D. dissertation. University of Porto; 2007. http://www.fe.up.pt/~vasques/rmoraes/PhDRicardo.pdfGoogle Scholar
- Willig A: Redundancy concepts to increase transmission reliability in wireless industrial LANs. IEEE Transactions on Industrial Informatics 2005, 1(3):173-182. 10.1109/TII.2005.852070View ArticleGoogle Scholar
- Willig A, Wolisz A: Ring stability of the PROFIBUS token-passing protocol over error-prone links. IEEE Transactions on Industrial Electronics 2001, 48(5):1025-1033. 10.1109/41.954567View ArticleGoogle Scholar
- Ni Q: Performance analysis and enhancements for IEEE 802.11e wireless networks. IEEE Network 2005, 19(4):21-27. 10.1109/MNET.2005.1470679View ArticleGoogle Scholar
- Zhu H, Chlamtac I: Performance analysis for IEEE 802.11e EDCF service differentiation. IEEE Transactions on Wireless Communications 2005, 4(4):1779-1788.View ArticleGoogle Scholar
- Son J, Lee I-G, Yoo H-J, Park S-C: An effective polling scheme for IEEE 802.11e. IEICE Transactions on Communications 2005, E88-B(12):4690-4693. 10.1093/ietcom/e88-b.12.4690View ArticleGoogle Scholar
- Gao D, Cai J, Chen CW: Admission control based on rate-variance envelop for VBR traffic over IEEE 802.11e HCCA WLANs. IEEE Transactions on Vehicular Technology 2008, 57(3):1778-1788.View ArticleGoogle Scholar
- Rashid M, Hossain E, Bhargava V: Controlled channel access scheduling for guaranteed QoS in 802.11e-based WLANs. IEEE Transactions on Wireless Communications 2008, 7(4):1287-1297.View ArticleGoogle Scholar
- Ergen M, Lee D, Sengupta R, Varaiya P: WTRP-wireless token ring protocol. IEEE Transactions on Vehicular Technology 2004, 53(6):1863-1881. 10.1109/TVT.2004.836928View ArticleGoogle Scholar
- Cheng R-G, Wang C-Y, Liao L-H, Yang J-S: Ripple: a wireless token-passing protocol for multi-hop wireless mesh networks. IEEE Communications Letters 2006, 10(2):123-125. 10.1109/LCOMM.2006.02005View ArticleGoogle Scholar
- Villalón J, Cuenca P, Orozco-Barbosa L, Garrido A: B-EDCA: a QoS mechanism for multimedia communications over heterogeneous 802.11/802.11e WLANs. Computer Communications 2008, 31(17):3905-3921. 10.1016/j.comcom.2008.07.012View ArticleGoogle Scholar
- Wu Y-J, Chiu J-H, Sheu T-L: A modified EDCA with dynamic contention control for real-time traffic in multi-hop ad hoc networks. Journal of Information Science and Engineering 2008, 24(4):1065-1079.Google Scholar
- Hamidian A, Körner U: An enhancement to the IEEE 802.11e EDCA providing QoS guarantees. Telecommunication Systems 2006, 31(2-3):195-212. 10.1007/s11235-006-6520-zView ArticleGoogle Scholar
- Wang C, Li B, Li L: A new collision resolution mechanism to enhance the performance of IEEE 802.11 DCF. IEEE Transactions on Vehicular Technology 2004, 53(4):1235-1246. 10.1109/TVT.2004.830951View ArticleGoogle Scholar
- Yang X, Vaidya N: Priority scheduling in wireless ad hoc networks. Wireless Networks 2006, 12(3):273-286. 10.1007/s11276-005-5274-yView ArticleGoogle Scholar
- Vaidya N, Dugar A, Gupta S, Bahl P: Distributed fair scheduling in a wireless LAN. IEEE Transactions on Mobile Computing 2005, 4(6):616-629.View ArticleGoogle Scholar
- Golestani S: A self-clocked fair queueing scheme for broadband applications. Proceedings of IEEE Conference on Computer Communications. Networking for Global Communications (INFOCOM '94), 1994 2: 636-646.View ArticleGoogle Scholar
- Kwon Y, Fang Y, Latchman H: Design of MAC protocols with fast collision resolution for wireless local area networks. IEEE Transactions on Wireless Communications 2004, 3(3):793-807. 10.1109/TWC.2004.827731View ArticleGoogle Scholar
- Lopez-Aguilera E, Casademont J, Cotrina J, Rojas A: Enhancement proposal for WLAN IEEE 802.11e: desynchronization of its working procedure. Proceedings of the 14th IEEE Workshop on Local and Metropolitan Area Networks (LANMAN '05), September 2005Google Scholar
- Lo Bello L, Kaczyński GA, Sgró F, Mirabella O: A wireless traffic smoother for soft real-time communications over IEEE 802.11 industrial networks. Proceedings of IEEE Conference on Emerging Technologies and Factory Automation (ETFA '06), September 2006 1073-1079.Google Scholar
- Lo Bello L, Kaczyński GA, Mirabella O: Improving the real-time behavior of Ethernet networks using traffic smoothing. IEEE Transactions on Industrial Informatics 2005, 1(3):151-161. 10.1109/TII.2005.852071View ArticleGoogle Scholar
- Sobrinho JL, Krishnakumar AS: Quality-of-service in ad hoc carrier sense multiple access wireless networks. IEEE Journal on Selected Areas in Communications 1999, 17(8):1353-1368. 10.1109/49.779919View ArticleGoogle Scholar
- Sobrinho JL, Krishnakumar AS: EQuB—Ethernet quality of service using black bursts. Proceedings of the 23rd Conference on Local Computer Networks, October 1998 286-296.Google Scholar
- Hwang G-H, Cho D-H: New access scheme for VoIP packets in IEEE 802.11e wireless LANs. IEEE Communications Letters 2005, 9(7):667-669. 10.1109/LCOMM.2005.1461699View ArticleGoogle Scholar
- Sheu J-P, Liu C-H, Wu S-L, Tseng Y-C: A priority MAC protocol to support real-time traffic in ad hoc networks. Wireless Networks 2004, 10(1):61-69. 10.1023/A:1026292830673View ArticleGoogle Scholar
- Moraes R, Vasques F, Portugal P, Fonseca JA: VTP-CSMA: a virtual token passing approach for real-time communication in IEEE 802.11 wireless networks. IEEE Transactions on Industrial Informatics 2007, 3(3):215-224.View ArticleGoogle Scholar
- Vittorio S, Lo Bello L: An approach to enhance the QoS support to real-time traffic on IEEE 802.11e networks. Proceedings of the 6th International Workshop on Real Time Networks (RTN '07), 2007Google Scholar
- Miorandi D, Vitturi S: Analysis of master-slave protocols for real-time industrial communications over IEEE802.11 WLANs. Proceedings of the 2nd IEEE International Conference on Industrial Informatics (INDIN '04), June 2004 143-148.Google Scholar
- Casetti C, Chiasserini C-F, Fiore M, Garetto M: Notes on the inefficiency on 802.11e HCCA. Dipartimento de Elettronica, Politecnico di Torino; 2005.Google Scholar
- Bianchi G, Tinnirello I, Scalia L: Understanding 802.11e contention-based prioritization mechanisms and their coexistence with legacy 802.11 stations. IEEE Network 2005, 19(4):28-34. 10.1109/MNET.2005.1470680View ArticleGoogle Scholar
- Decotignie J-D: Ethernet-based real-time and industrial communications. Proceedings of the IEEE 2005, 93(6):1102-1117.View ArticleGoogle Scholar
This article is published under license to BioMed Central Ltd. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.