- Open Access
A network resource availability model for IEEE802.11a/b-based WLAN carrying different service types
© Luo and Bodanese; licensee Springer. 2011
- Received: 1 March 2011
- Accepted: 19 September 2011
- Published: 19 September 2011
Operators of integrated wireless systems need to have knowledge of the resource availability in their different access networks to perform efficient admission control and maintain good quality of experience to users. Network availability depends on the access technology and the service types. Resource availability in a WLAN is complex to gather when UDP and TCP services co-exist. Previous study on IEEE802.11a/b derived the achievable throughput under the assumption of inelastic and uniformly distributed traffic. Further study investigated TCP connections and derived a model to calculate the effective transmission rate of packets under the assumption of saturated traffic flows. The assumptions are too stringent; therefore, we developed a model for evaluating WLAN resource availability that tries to narrow the gap to more realistic scenarios. It provides an indication of WLAN resource availability for admitting UDP/TCP requests. This article presents the assumptions, the mathematical formulations, and the effectiveness of our model.
Operators that control integrated wireless systems with multiple radio access technologies (RATs) need to have a very good knowledge of the current context of each radio access network (RAN) to perform efficient call admission control and at the same time maintain a good quality of experience to their users. With the emergence of various service types, such as video call and streaming services, RAN selection needs to be intelligent and context aware. The selection not only should consider the user/service requirements, but it also should take into account the resource availability and the load of the networks. Network resource availability is an important attribute of the context information. The network availability is dynamic and dependent on the access technology and the service type. In order to develop a context aware RAN selection algorithm and investigate its performance, we have built a call level simulator which implements models of different wireless networks, where the resource availability of each network can be calculated at any time. We have developed models for UMTS and WLAN networks. In this article, we focus on the presentation of the mathematical formulations for the resource availability model we developed for IEEE802.11a/b networks. It is a simple but effective model for evaluating IEEE802.11a/b-based WLAN resource availability having in mind the prospective service requests of a heterogeneous wireless environment. We evaluated the effectiveness of the proposed mathematical model in providing resource availability information with simulations of a WLAN IEEE 802.11b network under the same traffic demands.
This rest of the article is organized as follows: Section 2 describes the basic operation of the IEEE 802.11 standard and presents some typical parameter values. Section 3 presents previous study on IEEE 802.11 standard analysis. Section 4 explains the proposed formulations for calculating the resource availability in IEEE802.11b WLAN. Section 5 shows the effectiveness of the proposed model and Section 6 presents the conclusion.
2. The IEEE 802.11 Standard
The IEEE 802.11 standard supports two MAC schemes: distributed coordination function (DCF) and point coordination function (PCF). PCF is a centralized mechanism which uses a central coordinator. The central coordinator polls the wireless stations and provides a contention free (CF) access to the channel. However, many commercial products do not implement the PCF scheme. On the other hand, the carrier sense multiple access with collision avoidance (CSMA/CA) based on DCF is widely used for supporting asynchronous data transfer on a best effort basis and provides fairness among the wireless stations.
The basic operation of the DCF can be described as follows. Before transmitting the first packet, the wireless station monitors the channel activity. If the channel remains idle for a DCF interframe space (DIFS) period, the station transmits the packet. If the channel is sensed as busy either immediately or during the DIFS period, the wireless station keeps monitoring the channel until it is idle for a DIFS period. Then, to minimize the probability of collision with the packets transmitted by other wireless stations, a random backoff time is generated. In order to avoid channel capture, the station also waits for a random backoff time between two consecutive packet transmissions, even though the channel is sensed as idle for a DIFS interval.
The backoff time is slotted. The size of a time slot depends on the physical layer and accounts for the propagation delay. At each packet transmission, the wireless station randomly selects the number of time slots in the range from 0 to the contention window (CW) - 1. The value of the CW depends on the number of unsuccessful packet transmissions. At the first transmission attempt, the value of the CW is equal to CWmin. CWmin is the minimum contention window. After each unsuccessful packet transmission, the value of the CW is doubled up to the maximum value CWmax.
After sensing the channel as idle for a DIFS period, the wireless station begins to decrease the backoff time counter. Before the counter reaches zero, if the channel is sensed as busy, the wireless station pauses the counter, and it reactivates the counting down only when the channel is sensed as idle for a DIFS period. When the backoff time counter reaches zero, the wireless station transmits the packet.
In the wireless channel, the stations cannot detect a packet collision by hearing their own transmissions. Therefore, after receiving a packet, the destination station waits for a short interframe space (SIFS) period and then transmits an acknowledgement (ACK) back to the transmitting station to signal the successful packet reception. Because the SIFS period and the consequent propagation delay are shorter than the DIFS period, other wireless stations cannot sense the channel as idle for a DIFS period until the ACK is transmitted. If the transmitting station cannot receive the ACK within a specific timeout or it senses a different packet in the channel, it considers the former packet transmission as unsuccessful and it schedules a retransmission according to the backoff rules.
Typical values for the IEEE 802.11b DCF parameters
1, 2, 5.5, 11 Mbps
3. Previous work on IEEE 802.11a/b network analysis
The IEEE 802.11a/b-based WLAN uses CSMA/CA mechanism for the multiple access control. The performance of IEEE 802.11a/b-based WLAN has been investigated in [1, 2]. The authors of these articles attempted to model the IEEE 802.11a/b backoff mechanism and derive the achievable throughput and maximum channel utilization taking in account different network conditions and configurations. The models presented in these two articles have been used as basic analytical methods for investigating IEEE 802.11a/b-based WLAN performance and they are cited in many latter publications in the field. However, the authors of these articles assume that the traffic in the network is inelastic, which does not adjust its transmitting rate according to the available channel bandwidth. The authors also assume that the senders operate in an asymptotic (or saturated) condition, which means that their traffic sources have unlimited amount of data and in each sender's queue always there is a packet ready to send. Furthermore, the traffic is assumed to be uniformly distributed. That means each packet sent by one station is directed to another randomly selected station . These assumptions are not very consistent with the reality. First, a IEEE 802.11a/b-based WLAN primarily provides users with non-real-time data services, e.g., web browsing, FTP, etc. 95% of the traffic in WLANs is composed of packets carried over the transport control protocol (TCP) . The TCP traffic is elastic, because the TCP employs the flow control and the congestion control mechanisms to regulate its transmitting rate and avoid continuous packet transmission . Moreover, even for inelastic traffic, the senders may not operate in the asymptotic condition. For example, in voice over IP (VoIP) services, the voice data will be segmented into packets and these packets are not transmitted continuously, but they are transmitted at fixed intervals. The size of the voice data packet and the length of the transmission interval depend on the voice encoder being used. Second, most WLANs operate in infrastructure-based mode, where the stations access network services through an AP. Therefore, the traffic is not uniformly distributed but all the packets are destined to/transmitted from the AP.
Bruno et al.  pointed out the above inconsistencies with real scenarios and investigated the performance of the TCP connections over IEEE802.11a/b-based WLANs. Bruno et al.  assume that the size of the TCP congestion window of each TCP flow is identical and, after an initial phase, the congestion window of each TCP flow grows to its maximum value. This assumption ensures that the TCP flows will have a fair access to the channel bandwidth. Bruno et al. also assume that each station in the WLAN possesses a single "long-live" TCP session, which has an unlimited amount of data at the source and at least one packet to transmit. However, this assumption is inconsistent with the reality when considering the characteristics of different service applications. For example, a typical Web Browsing service session is not a "long-live" TCP session and it can be divided into ON/OFF periods . The ON period represents the web page download comprising of packet calls. The OFF period represents the intermediate reading time.
Based on the assumptions made in , Bruno et al. also presented a throughput analysis of UDP and TCP flows in WLANs . However, they only considered the competition of multiple TCP downlink and uplink connections, with UDP uplink flows. Moreover, the UDP flows are still assumed to be saturated.
4. Network resource availability analysis
We realized that the assumptions of previous study are too stringent abstractions of the real scenarios. Therefore, we have developed a simple but effective model for evaluating resource availability in IEEE802.11a/b-based WLAN that tries to narrow the gap to more realistic network scenarios. Our model analysis various service types, including VoIP, Video Call, Audio Streaming, Video Streaming, Web Browsing, and File Transfer. The first four services are real-time and UDP-based. The others are non-real-time and TCP-based. For the TCP-based services, we assume the size of the TCP congestion window of each TCP flow is identical, the same assumption that was made by  to insure fairness.
We calculate the expected number of contending packets over the wireless channel, which is denoted by encp. Assuming a new service request is made to the network, if encp is greater than 1, it means that, on average, there is more than one packet in contention to access the network channel at any time. We have to consider the requested and the existing service types within the network before performing any decision. If the requested and the existing service types are hybrid (e.g., UDP-based and TCP-based services coexist) the connection request will be rejected. This is because packet collisions will cause unacceptable delays and packet loss for the real-time UDP-based services. If the requested and the existing service types are all TCP-based, the analysis method proposed in  will be implemented to calculate the effective transmission rate (excluding traffic and protocol overheads) of each packet generated by the requested connection and the existing users. If the effective transmission rate satisfies the requirements of all the users, the connection request will be admitted. If not, the request will be rejected.
For example, assuming encp is 2, that means, on average there are two packets in contention to access the network channel at any time. In reality, not all services' sessions behave as a "long-live" TCP session, one example is the web browsing mentioned before. The packets transmitted over the network channel may be generated by more than two traffic sources. Therefore, these packets are supposed to be generated by two virtual TCP sessions coexisting in the network. These virtual TCP sessions always have packets in their queues and they are ready to send the packets at any time. Compared to the "long-live" TCP session assumed in , these two virtual TCP sessions behave in the same way. Therefore, the analytical method presented in  can be used to calculate the effective data transmission rate for each packet of the requested service and the existing services. For the IEEE802.11b-based WLAN, as an example, these two virtual "long-live" TCP sessions can have a fair access to the channel whose effective packet transmission rate is about 4,500 kbps. This value is derived from the analytical method presented in , which assumes that the size of the congestion window of each TCP flow is the same, the size of a data packet is 1,500 bytes (including the IP and TCP headers), and it uses the typical values of the IEEE 802.11b DCF parameters. The method in  was validated with realistic discrete-event simulations. Consequently, each virtual "long-live" TCP session can transmit each packet at an effective transmission rate of about 2,250 kbps. That means the payload of each packet generated by these two virtual "long-live" TCP sessions can be transmitted at the data rate of 2,250 kbps in the IEEE802.11b-based WLAN. The calculation of encp takes into account the requested service and the existing services in the network. As mentioned before, the virtual "long-live" TCP session may comprise several real TCP-based service sessions. As a consequence, on average, each packet generated by each service session can be transmitted at an effective transmission rate of 2,250 kbps. If the minimum QoS requirements (e.g., data rate) of all the TCP-based services can be complied with, then the service request will be admitted. Otherwise, the service request will be rejected.
In a situation where the value of encp is equal to or less than 1, on average there is less than one packet in contention to access the network channel at any time. For the UDP-based real-time services in the network, such as VoIP, the data packets do not have to compete with other packets for channel access, so that packet loss and severe delay can be avoided and the effective data rates are identical to the transmission rates of the encoders. For the TCP-based non-real-time services, without channel contention, each data packet can be transmitted at the maximum effective packet transmission rate (e.g., 4,500 kbps in the IEEE802.11b-based WLAN). If the minimum QoS requirements of the requested service and the existing services can be satisfied, the request will be admitted. Otherwise, the service request will be rejected.
where s represents the service type and p_on s is the probability that the channel is occupied by the transmission of the packets belonging to the service type s. n s is the number of connections of service type s and its value is service dependent.
in_p s represents the packet interarrival time of service type s. e_t_p s is the expected time spent in completing the transmission for a packet of service type s. It consists of not only the time used for transmitting the packet payload and the headers, but also the overheads introduced by the CSMA/CA mechanism . Below, we explicitly show how in_p s and e_t_p s are calculated for different real-time services.
DIFS represents the DCF inter-frame space and SIFS represents the short inter-frame space . e_idle is the average backoff time based on . phy_mac_hdr is the time spent in transmitting the physical and MAC layer headers. t_b means the time used for transmitting a byte in the WLAN. delay represents the maximum propagation delay between two wireless stations . t_ack is the time used to transmit an ACK packet. Table 1 shows typical values for most of the overheads above for an IEEE802.11b DCF network.
Assuming the voice codec generates 33 packets per second at a data rate of 6.3 kbps, the packet interarrival time in _p video_call_voice_part is 30 ms and the packet size is 24 bytes. e_t_p video_call_audio_part can be calculated based on Equation 4 only changing the value of the payload to 24 bytes.
For a premium service class, let us assume a data rate of 64 kbps. Therefore, the size of the packet payload is 160 bytes. We can use Equation 6 and only change the value of 80 to 160 to calculate the value of e _t _p audio_str for the premium service.
Similar to the video call service, a video streaming service also comprises of two parts: video and audio. Therefore, two probabilities should be considered: p _on video_str_video_part and p _on video_str_audio_part . p _on video_str_video_part is the probability that the channel is occupied by the transmission of the video packets of the video streaming service. p _on video_str_audio_part is the probability that the channel is occupied by the transmission of the audio packets of the video streaming service.
For the premium service class, the video data rate could be assumed to be 128 kbps. On average, the frame payload is 533 bytes. One frame is divided into eight blocks and the size of each block is 67 bytes. e _t _p video_str_video_part can be calculated as in Equation 7 by only changing the value of the payload from 66 to 67 and multiplying by 8 instead of 4.
Similarly, for the audio component, the p _on video_str_audio_part can be calculated. Let us assume that the audio part employs G.726, which generates 50 packets per second and its data rate is 32 kbps. It means that, the packet inter-arrival time is 20 ms and the packet payload is 80 bytes. This is similar to the audio streaming service in Equation 6 and it can be calculated in the same way.
The calculation of in_p s and e_t_p s is different for non-real time services based on TCP. For example, for an active File Transfer service session, the user receives data packets from the FTP server, and replies with TCP acknowledgement packets. Before the file is completely transferred, there is a packet, which can be a data packet or a TCP acknowledgement packet, in contention to access the network channel at any time. Therefore, the value of p_on file_transfer is 1 and an active File Transfer service session can be considered as one "long-live" TCP session .
e_t_p web_page is the expected time spent in completing the transmission of a web page. avg_reading_time is the average time spent in reading a downloaded web page, which could be assumed to be 30 seconds from the values published in .
avg_size_web_page is the average size of a web page in bytes, which could be assumed to be 312,000 bytes based on the values published in . wlan_data_rate is the effective TCP packet transmission rate in the WLAN (e.g., 4,500 kbps for the IEEE802.11b-based WLAN). n_ftp_session is the number of active File Transfer service sessions in the WLAN.
Equation 9 is derived considering that the Web Browsing service sessions in the WLAN are not able to constitute a virtual " long-live" TCP session. An active File Transfer service session can be considered as one "long-live" TCP session. As the value of encp is smaller than the number of File Transfer service sessions plus one, it means that, by neglecting the File Transfer service sessions, the Web Browsing service sessions cannot make the value of encp greater than or equal to one. Such result indicates that, on average, there is less than one Web Browsing service packet in contention to access the network channel at any time. Therefore, from a Web Browsing service session's point of view, during the ON period, the major competition it will face is from the active File Transfer service sessions rather than the peer Web Browsing service sessions. Therefore, the effective packet transmission rate for the Web Browsing service session can be calculated as wlan_data_rate/(n_ftp_session+1).
Equation 10 is derived considering that the Web Browsing service sessions in the WLAN can constitute virtual "long-live" TCP session(s). As the value of encp is greater than or equal to the number of File Transfer service sessions plus one, it means that, by neglecting the File Transfer service sessions, the Web Browsing service sessions can make the value of encp greater than or equal to one. Such result indicates that, on average, there is at least one Web Browsing service packet in contention to access the network channel at any time. Therefore, from a Web Browsing service session's point of view, during the ON period, the major competition it will face is not only from the active File Transfer service sessions but also from the peer Web Browsing service sessions. Therefore, the effective packet transmission rate for the Web Browsing service session can be calculated as wlan_data_rate/encp.
5. Effectiveness of the encpmodel
In this section, we evaluate the ability of our model in predicting the resource availability in a WLAN. We consider an IEEE802.11b-based WLAN and compare the information provided on the resource availability given by encp with the simulation results obtained from a packet level simulator of an IEEE802.11b network under the same traffic demand.
In the simulations, the wireless stations (denoted as STA_1, STA_3, etc.) are distributed in a Basic Service Set. These wireless stations communicate with an access point, AP_1. The AP_1 is connected to an Ethernet switch, Switch_1. The Switch_1 communicates with the wired stations, which are denoted as CN_E_2, CN_E_4, etc. The wired stations are acting as the correspondent nodes to the wireless stations. For example, CN_E_2 is the correspondent node to STA_1. For conversational services, such as VoIP and video call, both the wireless and wired stations are acting as packet transmitters and receivers. For streaming services, such as video streaming and audio streaming, only the downlink is simulated and the wired stations act as the packet transmitters and the wireless stations act as the packet receivers.
We have validated our model by evaluating the results of the resource availability given by encp against the OPNET simulations for requests of each service in isolation first. We have evaluated scenarios for VoIP basic services only, for VoIP premium services only, for basic video call services only, for premium video call services only, and so on. After, we evaluated scenarios with several different types of service requests. In all the evaluated scenarios, the results of the OPNET simulations agreed with the expected behaviour of the network from what was informed by resource availability model through the values of the encp. In this article, we present only two of the scenarios we have evaluated. Details of all remaining evaluated scenarios can be found in .
The first scenario is composed only by VoIP service requests. The second scenario is a mixed application scenario composed of VoIP, video call, audio streaming, and video streaming services. For each scenario presented in this article, we analyse the network behaviour under two different demands of traffic.
e ncp slightly exceeds 1. These results indicate that the WLAN should be able to support 11 premium VoIP users, but not 12 VoIP premium users.
Premium VoIP traffic generation parameters
Traffic generation parameters
Start time (seconds)
ON state time (seconds)
OFF state time (seconds)
Packet generation arguments
Interarrival time (seconds)
Packet size (bytes)
Constant (73) (Including IP/UDP/RTP header)
Segmentation size (bytes)
Stop time (seconds)
Figures 5 and 6 present the average delay of the packets received by a wireless station and the delay variation at a wireless station when there are 12 premium VoIP users and the value of encp is 1.055782. When there are 12 premium VoIP users in the WLAN, Figure 5 shows that after the fluctuations in the early stage of the simulation, the average packet delay stabilises at around 6.2 ms. This value is acceptable for the real-time VoIP service. However, Figure 6 depicts fluctuations in packet delay and the delay variation is greater than 1 ms. The delay variation exceeds the constraint of 1 ms and is unacceptable. The WLAN network is unable to provide acceptable quality of service when 12 premium VoIP users are in the network and should not admit more than 11 premium VoIP users.
Service parameters and typical values
Service type and class
Basic audio streaming
Premium audio streaming
Basic video streaming
Premium video streaming
64 kbps (Video)
6.3 kbps (Voice)
32 kbps (Audio)
32 kbps (Audio)
Packet generation rate
10 frames/s (Video)
33 packets/s (Video)
30 frames/s (Video)
50 packets/s (Video)
30 frames/s (Video)
50 packets/s (Video)
Assuming that there is one request for each service type and service class shown in Table 3, we have in total 12 connection requests to consider in the WLAN. Based on Equations 2 to 7, e p can be calculated as 0.077478. Then, encp can be calculated using Equation 1 resulting in a value of 0.929735. encp is smaller than 1, which means, on average, there is less than one packet in contention to access the network channel. Therefore, the IEEE802.11b-based WLAN is evaluated as being capable to support these users.
When one more video call request is added into the network, the number of connection requests increases to 16 and e p becomes 0.071033. The new calculated value of encp is 1.13652 that exceeds 1. Considering the UDP-based real-time services within the WLAN, the video call request should be rejected to maintain the service quality of the existing users.
However, after adding one more video call user into the network, the simulation results indicate that the WLAN performance is worsened and this affects the service quality of all the users. According to Figure 8, the value of the average packet delay increases dramatically and reaches a value around 300 ms. This value is not acceptable for conversational services [11, 12]. Therefore, to maintain an acceptable service quality, the video call request should be rejected.
In all the presented results, the OPNET simulations confirmed the expected behaviour of the network from what was indicated by the resource availability model through the values of the encp. It is important to stress that our mathematical model is an approximate prediction of the expected behaviour of the network based on the assumptions made, and therefore it cannot be taken as an exact model to predict the behaviour of the network. However, it is simple and very effective; consequently it can be used as a conservative measure of the resource availability of the networks in admission control decisions.
We did not perform simulations on IEEE 802.11a, however, in terms of our proposed mathematical model, as the MAC layer mechanisms of IEEE 802.11a and IEEE 802.11b are the same, the calculation of encp would not be different for IEEE 802.11a networks, only the typical parameter values of the IEEE 802.11a standard should be used instead (DIFS, SIFS, etc.). We expect the effectiveness of the predictions of encp would be similar for an IEEE 802.11a network as the ones verified for the IEEE 802.11b network.
In this article, we proposed a simple but effective model for evaluating IEEE 802.11a/b-based WLAN resource availability. The mathematical model defines the expected number of contending packets (encp), and combines it with previous research on WLAN to provide an indication of the resource availability of a WLAN network for admitting or not real-time and non-real-time requests. The model has in mind the characteristics of the access technology and the prospective service requests of a heterogeneous wireless environment. Although our model is an abstraction of real networks, it is based on appropriate assumptions, and effectively obtains important network context information that can help in the development and evaluation of efficient RAN selection algorithms. We compared the predictions of our model with numerical results obtained through simulations carried out using OPNET under the same traffic demands. The simulation results have confirmed the effectiveness of our mathematical model and they have shown that our model has the ability to capture the resource availability for a WLAN and provide a fairly good indication of the expected behaviour of the network. Although our mathematical model is not exact and it does not make any explicit guarantees in terms of the delay behaviour, it is very useful as an approximation of the expected behaviour of the network, and it can be used as a conservative indication of the availability of the network for call admission decisions.
We acknowledge that this research received partial financial support from the EPSRC grant number EP/G049939/1.
- Cali F, Conti M, Gregori E: Dynamic tuning of the IEEE 802.11 protocol to achieve a theoretical throughput limit. IEEE/ACM Trans Netw 2000, 8(6):785-799. 10.1109/90.893874View ArticleGoogle Scholar
- Bianchi G: Performance analysis of the IEEE 802.11 distributed coordination function. IEEE J Select Areas Commun 2000, 18(3):535-547. 10.1109/49.840210View ArticleGoogle Scholar
- Bruno R, Conti M, Bregori E: Average-value analysis of 802.11 WLANs with persistent TCP flows. IEEE Commun Lett 2009, 13(4):218-220.View ArticleGoogle Scholar
- Derryberry RT: HTTP model. 3GPP2 Technical Specification Group C. 3GPP2/TSG-C.R1002. 1xEV-DV Evaluation Methodology (V13) 2003, 16-24.Google Scholar
- Bruno R, Conti M, Bregoni E: Throughput analysis of UDP and TCP flows in IEEE 802.11b WLANs: a simple model and its validation. Proceeding of 2005 Workshop on Technologies, Methodologies and Tools for Performance Evaluation of Complex Systems, FIRB-Perf 2005 2005, 54-63.Google Scholar
- Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE 802.11 Wireless Local Area Networks. 2007.Google Scholar
- Wenger S: H.264/AVC Over IP. IEEE Transactions on Circuits and Systems for Video Technology 2003., 13(7):Google Scholar
- King A: Website Optimization: Speed, Search Engine & Conversion Rate Secrets. O'Reilly Media, Inc.; 2008.Google Scholar
- Derryberry RT: 3GPP2 Technical Specification Group C. 3GPP2/TSG-C.R1002. 1xEV-DV Evaluation Methodology (V13) 2003.Google Scholar
- Luo W: An Intelligent Radio Access network selection and Optimisation System in Heterogeneous Communications Environments. PhD Thesis, School of Electronic Engineering and computer Science, Queen Mary, University of London;Google Scholar
- Garg VK, Yu OTW: Integrated QoS support in 3G UMTS networks. Wireless Communications and Networking Conference, WCNC 2000 IEEE 2000, 3(23-28):1187-1192.Google Scholar
- Wang W, Liew S, Li O: Solutions to performance problems in VoIP Over a 802.11 wireless LAN. IEEE Trans Veh Technol 2005, 54(1):366-384. 10.1109/TVT.2004.838890View ArticleGoogle Scholar
This article is published under license to BioMed Central Ltd. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.