Abstract
The throughput stability is concerned with how much traffic load can be sustained in a network, and has been a research hotspot. Recent studies on the stability in 802.11 networks have arrived at contradictory conclusions. This paper delves into the reasons behind these contradictions. Our study manifests that the maximum stable-throughput is not simply larger than, less than, or equal to the saturation throughput as argued in previous works. Instead, there exists two intervals, over which the maximum stable-throughput follows different rules: over one interval, it may be far larger than the saturated throughput; over the other, it is tightly bounded by the saturated throughput. Most existing related research fails to differentiate the two intervals, implying that the derived results are inaccurate or hold true partially. Finally, we verify our study results via extensive simulations.
This work is partially supported by the Macao Science and Technology Development Fund under Grant (No. 081/2012/A3, No. 104/2014/A3, and No. 013/2014/A1), NNSF of China for Contract 61373027, NSF of Shandong Province for Contract ZR2012FM023, and Strategic Priority Research Program of the Chinese Academy of Sciences (No. XDA06040101). Qinglin Zhao is the corresponding author.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
IEEE Std. 802.11-2007, Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, June 2007
Abramson, N.: The aloha system c another alternative for computer communication. In: Proceedings of the Fall Joint Computer Conference, AFIP Conference 44, pp. 281–285 (1970)
Bianchi, G.: Performance analysis of the IEEE 802.11 distributed coordination function. IEEE J. Sel. Areas Commun. 18(3), 535–547 (2000)
Cali, F., Conti, M., Gregori, E.: Dynamic tuning of the ieee 802.11 protocol to achieve a theoretical throughput limit. IEEE/ACM Trans. Networking 8(6), 785–799 (2000)
Corlessa, R.M., Gonnet, G.H., Hare, D.E.G., Jeffrey, D.J., Knuth, D.E.: On the lambert w function. Adv. Comput. Math. 5, 329–359 (1996)
Dai, L.: Stability and delay analysis of buffered aloha networks. IEEE Trans. Wirel. Commun. 11(8), 2707–2719 (2012)
Dai, L., Sun, X.: A unified analysis of ieee 802.11 dcf networks: Stability, throughput and delay. IEEE Trans. Mobile Comput. 12(8), 1558–1572 (2013)
Fayolle, G., Gelenbe, E., Labetoulle, J.: Stability and optimal control of the packet switching broadcast channel. J. Assoc. Comput. Mach. 24(3), 375–386 (1977)
Heusse, M., Rousseau, F., Guillier, R., Duda, A.: Idle sense: an optimal access method for high throughput and fairness in rate diverse wireless lans. In: Proceedings of ACM Sigcomm (2005)
Javed, Y., Baig, A., Maqbool, M.: Enhanced quality of service support for triple play services in ieee 802.11 wlans. EURASIP J. Wirel. Commun. Networking 2015(1), 1–14 (2015)
Kwak, B.J., Song, N.O., Miller, L.E.: Performance analysis of exponential backoff. IEEE/ACM Trans. Networking 13(2), 343–355 (2005)
Malone, D., Duffy, K., Leith, D.: Modeling the 802.11 distributed coordination function in non-saturated heterogeneous conditions. IEEE/ACM Trans. Networking 15(1), 159–172 (2007)
Rosenkrantz, W.A., Towsley, D.: On the instability of the slotted aloha multiaccess algorithm. IEEE Trans. Automat. Contr. 28(10), 994–996 (1983)
Yao, X., Wang, W., Yang, S., Cen, Y., Yao, X., Pan, T.: Ipb-frame adaptive mapping mechanism for video transmission over ieee 802.11e wlans. Comput. Commun. Rev. 44(2), 5–12 (2014)
Zhai, H., Chen, X., Fang, Y.: How well can the ieee 802.11 wireless lan support quality of service? IEEE Trans. Wirel. Commun. 4(6), 3084–3094 (2005)
Zhai, H., Kwon, Y., Fang, Y.: Performance analysis of ieee 802.11 mac protocols in wireless lans. Wirel. Commun. Mobile Comput. 4(8), 917–931 (2004)
Zhang, Y.J., Liew, S.C., Chen, D.R.: Sustainable throughput of wireless LANs with multipacket reception capability under bounded delay-moment requirements. IEEE Trans. Mobile Comput. 9(9), 1226–1241 (2010)
Zhao, Q.L., Tsang, D.H.K., Sakurai, T.: A simple critical-offered-load-based CAC scheme for IEEE 802.11 DCF networks. IEEE/ACM Trans. Networking 19(5), 1485–1498 (2011)
Zhao, Q.L., Tsang, D.H.K., Sakurai, T.: Modeling nonsaturated IEEE 802.11 DCF networks under arbitrary buffer size. IEEE Trans. Mobile Comput. 10(9), 1248–1263 (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Appendix
Appendix
Proof of Theorem 1 : We first prove that \(0<\eta <1\) . Note that \(T_{c}\) \(=\max (T_{b},T_{b_{0}})\) \(\gg \sigma \) and \(0<C_{0}<1\). If \(T_{b}\ge T_{b_{0}}\), then \(0<\eta =\frac{(T_{b}-T_{b_{0} })+C_{0}(T_{b_{0}}-\sigma )}{T_{b}}<\frac{T_{b}-\sigma }{T_{b}}<1\). If \(T_{b}<T_{b_{0}}\), then \(0<\eta =\frac{C_{0}(T_{b}-\sigma )}{(1-C_{0})T_{b_{0} }+C_{0}T_{b}}<\frac{C_{0}T_{b}}{(1-C_{0})T_{b_{0}}+C_{0}T_{b}}<1\). Next we prove (a) and (b).
(a) When \(n\rightarrow \infty \), noting \(k=\lim \limits _{n\rightarrow \infty }(n-1)\beta \) if k exists, and applying the Poisson distribution to approximate the binomial distributions in (1), we have
Then, (4) is derived from \(\varGamma (k)\) \(=\lim \limits _{n\rightarrow \infty }P_{s}L/\varOmega \).
(b) To maximize \(\varGamma (k)\), we set the first derivative of \(\varGamma (k)\) to zero and have \(k=1-\eta e^{-k}\), and hence \((k-1)e^{k-1}=-\eta e^{-1}\). Then \(k-1=\mathscr {W}_{0}(-\eta e^{-1})\) or \(\mathscr {W}_{-1}(\frac{-\eta }{e})\). We have \(k_{opt}=\mathscr {W}_{0}(-\eta e^{-1})+1\ge 0\), since only \(\mathscr {W} _{0}(-\eta e^{-1})>-1\) for \(-\eta e^{-1}\in (-1/e,0).\) \(\blacksquare \)
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Zhao, Q., Sakurai, T., Yu, J., Sun, L. (2015). On the Stable Throughput in Wireless LANs. In: Xu, K., Zhu, H. (eds) Wireless Algorithms, Systems, and Applications. WASA 2015. Lecture Notes in Computer Science(), vol 9204. Springer, Cham. https://doi.org/10.1007/978-3-319-21837-3_73
Download citation
DOI: https://doi.org/10.1007/978-3-319-21837-3_73
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-21836-6
Online ISBN: 978-3-319-21837-3
eBook Packages: Computer ScienceComputer Science (R0)