Performance analysis and simulation in wireless mesh networks Roberto Cusani, Tiziano Inzerilli, Giacomo Di Stasio University of Rome Sapienza INFOCOM Dept. Via Eudossiana 8, 84 Rome, Italy Abstract Wireless Mesh Networks (WMNs) can be used as convenient replacements of wireline networks in the context of emergency scenarios. WMNs technologies can be advantageously exploited to quickly set-up a new communication infrastructure to recover from terrestrial network collapse. However, in order to enable effectively operative communications through a WMN infrastructure, traffic control measures are generally needed, as wireless communications especially in mesh network configurations can be affected by significant congestion and channel impairments problems. In this work, we are focusing on performance assessment and enhancement in WMNs. In particular we are examining traffic control design aided by simulation. Experimental results are presented from simulation models of IEEE8.b technology obtained through the open source INET framework of OMNET++. Index Terms Wireless Mesh Networks, traffic control, IP QoS I. INTRODUCTION IEEE 8. is a largely adopted technology for deployment of wireless local area networks (LANs)[]. In this context, IEEE 8. is often configured to operate in the infrastructure mode, where a set of access points (APs) serve as communication hubs for mobile stations and provide entry points to the Internet and the current role of IEEE 8. is limited to direct communications between mobile clients with a single AP. As an alternative, IEEE 8. can be used to interconnect form a full wireless mesh network (WMN) by means of two additional modes of operation. The ad-hoc mode can be used to form a single-hop ad-hoc network where nodes communicate with each other directly without the use of APs and the wireless distribution system (WDS) mode allows forming point-to-point AP relay links where each AP acts also as a wireless relay node. Such WMN, however, does not possess satisfactory levels of QoS, for various reasons. The intrinsic unreliability of the wireless medium along with the potentially high number of traversed hops, make it difficult to provide bandwidth guarantees as in all WMNs. In addition, the contention based MAC scheme, i.e. CSMA/CA [] operated with the DCF (Distributed Coordination Function), poses serious challenges This work is partially supported by the Italian National project Wireless 8O.6 Multi-antenna mesh Networks (WOMEN)[] under grant number 5948. in the control of the end-to-end delay [4, 5], as it does not assure time-bounded access. In order to support real-time multimedia communications in a IEEE8. WMN, one can compensate for the lack of effective traffic control strategy at the IP layer. Before IP traffic is relayed to the IEEE8. NIC (network interface card) for transmission [6] bandwidth and buffer management strategies can be applied. In addition, the alternative timebounded PCF (Point Coordination Function) [] MAC scheme can be adopted along with the DCF based on CMSA/CA. In this work we are presenting traffic control analysis and design in a IEEE8. WMN using simulation models, which have been developed using OMNET++ tool. In particular, we are concentrating on bandwidth allocation and control of packet transfer delays in nodes receiving multiple real-time and non-real-time IP flows with a CSMA/CA MAC. In section II we introduce the simulation models which we have used to study IEEE8. mesh networks. In section III a theoretical estimation of available bandwidth in a IEEE8. link is developed. Finally, in section IV we show esperimental results obtained with the OMNET++ simulator. II. SIMULATION MODELS OMNeT++ [7] is an open-source simulation tool, which can be freely used for academic research. Within OMNET, the INET framework provides support for most common network protocols, including TCP/IP and ethernet networks. Instead, the Mobility framework includes simulation models for wireless channels and mobile nodes, including IEEE8.b (currently work in progress). We have used these two frameworks as the basis for building our traffic control models for IEEE8. networks. Fig. shows a possible network configuration for a WMN, obtained by interconnecting two AP nodes heading two wireless cells. AP relay stations are critical nodes for QoS as they aggregate and dispatch traffic. In APs traffic control policies are needed in order to control end-to-end delays and bandwidth allocation. In our simulation models we have then provided such nodes with traffic control. Fig. depicts the traffic control model along with the NIC (Network Interface Card) model it interacts with. The traffic control is based on an EDFPS (Earliest Deadline First Packet Scheduler) model in the AP node consists of the following components:
S Cell_ S EDFPS S4 NIC AP 8. AP D4 Fig. WMN scenario example CLASS. LB LB LB LB mac AP Cell_ FIFO decider snreval FIFO FIFO FIFO Fig. traffic control architecture in an AP relay station D D SERVER (i) A CLASSIFIER separating IP packets into distinct flows (ii) FIFO queues for storing packets of different service classes. (iii) LBs (Leaky Buckets) used to limit bandwidth allocations to each service class (iv) A SERVER implementing the EDF[8] scheduling and PQ (Priority Queuing) scheduling The FIFO queues containing UDP traffic can operate a delay jitter regulation by dropping packets reaching queuing delays beyond a certain threshold value, while, a RED/RIO [9] dropping strategy can be set for queues storing TCP traffic. In the wireless link, channel errors have been modelled using the Gilbert-Elliot wireless channel model [,]. OMNET++ supports a number of applications and protocols which can be generated and conveyed in a generic network scenario. Including TCP and UDP, RTP, HTTP, FTP. In the following section we are analysing performance of UDP and TCP flows conveyed in a IEEE8.b link. Using OMNET++ it is then possible to simulate performance of anelastic traffic on UDP and elastic traffic conveyed with TCP and assess the impact of the CSMA/CA MAC. III. ESTIMATING MAXIMUM COMMUNICATION THROUGHPUT IN AN IEEE8. MULTIHOP LINK Overall capacity experienced in a IEEE 8.b link decreases from its nominal value on account of various factors, including (i) channel impairments, determined by locationdependent errors due to multipath fading. (ii) overhead introduced by control information added to each packet at the various architectural levels, which is strictly related to the packet size. (iii) link contention, which is strongly dependent on the nodes contending the wireless medium bandwidth for transmission. Effective capacity which is available in a IEEE8. link contended by N source nodes can be derived from [], which we briefly summarize. Let us consider a single host transmitting one data frame in a IEEE8.b link. The overall transmission time, i.e. T, is given by: T = t tr + t ov where t tr is a MAC PDU (protocol data unit) transmission time and t ov is a fix overhead introduced by the CSMA/CA protocol, including fixed intervals of time during which the medium is sensed prior sending a MAC frame and prior returning the corresponding acknowledgment respectively, the transmission time for an acknowledgment and the fix time for sending the PLCP preamble and header prior each MAC PDU. When there are N- other hosts, further delay needs to be accounted for medium contention. In this case, an additional N t cont N can be delay t cont ( ) (an analytical formula for ( ) found in [, 4]) will have to be considered, corresponding to the time spent during contention among the N nodes. The overall transmission time becomes as follows: T ( N ) t + t t (N) tr ov + cont () = () Hence, the actual MAC capacity which is used for transmission in the IEEE8.b will be given by C ( N ) C t T tr = max () ( N ) where C max is the nominal capacity of the link IEEE8.b, equal to Mbps. We are now deriving an approximate formula for assessment of throughput in multi-hop scenario, which will be validated through simulations. In Fig. is depicted the dynamics of a multi-hop transmission from a source node S to a destination node D, through intermediate relay stations R, R and R, which are used to interconnect nodes that are not in visibility.
PHASE PHASE PHASE PHASE In order to validate eq. (4) we have collected statistics of throughput from two scenarios where link capacity is completely saturated (Fig. 4, scenarios and ). Namely, two nodes (scenario, N max = ) and four nodes (scenario, N max = 4) transmit UDP video streams to a destination node through an intermediate relay station respectively. PHASE 4 PHASE 5 PHASE 6 PHASE 7 Fig. multi-hop transmission flow (Mbps) 4 analytical simulation As non-adjacent nodes cannot interfere with each other, they are allowed to transmit simultaneously. Therefore, in order to maximize the overall throughput, each relay station should alternate intervals of transmission and reception as in see Fig. and dedicate 5% of their time for each of them. The maximum throughput at MAC layer can be then estimated at half of the link capacity in eq. (). Each application level PDU which is transmitted in the IEEE8. link include an overhead OV introduced by MAC, IP and UDP/TCP headers. Hence, the maximum throughput, i.e. Beff for a multi-hop link which can be observed at application layer is given by C( Nmax ) L ( BER) ( L, BER, Nmax ) ( L + OV ) = (4) where L is the length in bytes of the transmitted application PDU, BER the average bit error rate experienced along the multi-hop path and N max the biggest number of contending nodes within each hop. IV. EXPERIMENTAL RESULTS A. Maximum throughput with anelastic traffic..5 BER 5 L(byte) Fig. 5 Multi-hop throughput assessment vs. packet length L and BER (scenario, N max= ) (Mbps)..5 BER 5 analytical simulation L(byte) 5 5 Scenario Scenario S S S S4 R R Fig. 6 Multi-hop throughput assessment vs. packet length L and BER (scenario, N max= 4) In Fig. 5 and Fig. 6, the theoretical results obtained with eq. (4) are compared with the results obtained through simulation. In both scenarios the analytical plane as for eq. (4) approximate well the simulation plane obtained through OMNET++ models. The maximum difference between the two planes is of 5% (scenario N max =, Fig. 4) and 7% (scenario N max =4, Fig. 5). This provides an overall validation and assessement of eq. (4). Eq. (4) can be used for an overall dimensioning of a multihop network rather then to provide accurate estimate of throughput, which in general can be hardly provided. Fig. 4 Multi-hop scenarios
B. Throughput in presence of elastic and anelastic traffic It is worth highlighting that theoretical throughput calculated as in eq. (4) can be approached only when the link is saturated with sessions running on UDP, which conveys anelastic traffic. If we instead transport TCP sessions in the link, throughput can be significantly reduced on account of packet loss due to contention as well as channel impairments. TCP, unlike UDP, react to packet loss by considerably reducing the throughput. As a consequence when bandwidth is contended between UDP and TCP sessions, UDP sessions tend to prevail over TCP sessions as their throughput is insensitive to packet loss. This behaviour has been observed and commented in the work [5]. We have then considered scenario in Fig. 4 with a mix of UDP and TCP sources. Namely, we have considered two UDP video streaming sources along with an HTTP and an FTP session. The BER has been set to % and packet size for all the sessions set to 4 byte. We have then observed a reduction of the throughput from, Mbps experience with 4 UDP video sources (Fig. 6) to,54 Mbps with mixed UDP and TCP sessions, which accounts for a loss of throughput of %, with video sources maintaining a mean throughput of 58 Kbps. This result shows that in order to improve performance of TCP traffic in a IEEE8. link, it is necessary to separate contention of UDP sessions with TCP sessions, e.g. using PCF window for UDP flows and DCF window for TCP flows. B. End-to-end delay performance Mean end-to-end delay(sec).6.5.4... FTP HTTP Video Video 4 6 8 Fig. 7 Mean end-to-end (ee) packet delay in scenario with mixed UDP and TCP sources without traffic control Fig. 7 shows delay performance of the four traffic sources in scenario. If we compare delay statistics of the two TCP sources (FTP and HTTP flow) with the UDP ones (video and video) we observe that performance of TCP transport is generally better than that of UDP transport. As no traffic control strategy is applied, delay differentiation between UDP and TCP can only depend on the interaction of UDP and TCP protocols with channel errors and the CSMA/CA MAC. This demonstrates that a traffic control strategy is required, first of all, to invert delay performance of TCP and UDP flows, so that UDP packets are generally delivered in shorter time than TCP packets. Mean ee delay(sec)..5..5 Mean ee delay(sec) 4 6 8 HTTP Video Video FTP 4 6 8 Fig. 8 Mean end-to-end (ee) packet delay in scenario with mixed UDP and TCP sources with traffic control Figure 8 shows delay statistics in the previous scenario when traffic control is used in the AP node to implement differentiated QoS management of UDP and TCP flows. The traffic control which is used consists of two EDF [REF] schedulers, i.e. EDF and EDF, and a PQ (priority queuing) scheduler [REF]. EDF is used to schedule packets of UDP flows and EDF packets for TCP flows. The PQ scheduler imposes that packets can be extracted from TCP queues only when UDP queues are empty. In addition, UDP flows are regulated by LB prior EDF so as to assure that TCP traffic is not starved by excessive consumption of resources by UDP traffic, which are given absolute priority over TCP traffic by the PQ scheduler. Table I shows priority parameters used in the simulation, which sets approximate target values to be reached by the end-to-end delay of the various traffic sources. TABLE I EDF PRIORITY PARAMETERS EDF EDF Video.4 s HTTP.8 s Video. s FTP. s It can be noticed from figure 8 that the incorporated traffic control has allowed to reduce the dependency of delay performance on the IEEE8. MAC and invert performance of UDP and TCP flows as required. In addition, adoption of traffic control has also resulted into performance differentiation among flows transported with the same protocol. Namely, end-to-end delay for one video source has been reduced from roughly 5 ms to 5 ms. In turn, end-toend delay for HTTP and FTP flows from initial values of 4 ms for both has been increased to ms and s respectively.
The delay differentiation introduced by the traffic control has to regarded particularly good considering that the overall load of video sources corresponds to 75% of the total traffic (i.e. throughput of each video source is roughly 58 Kbps, while the total throughput of the four sources,54 Mbps, as discussed in subsection A). CONCLUSION In this work we have dealt with performance analysis of IP flows transport over an IEEE8. mesh network. We have developed simulation models of traffic control for an IEEE8.b network using the OMNET++ tool to carry out extensive simulations of various WMN scenarios. Basing on [] we have first developed a theoretical approach to estimate effective capacity in a IEEE8.b link, where the medium is contended by N nodes. Statistics collected with the simulation models has shown that the throughput which is reached when using UDP sources well approximate the effective link capacity estimated theoretically. Formulas in the theoretical approach can be used for an overall dimensioning of a WMN. As observed also in [5], when TCP sources contend the medium with UDP sources, generally exhibit lower performance. Namely, we have measured significant throughput loss in TCP flows with respect to UDP flows, which can be avoided scheduling UDP and TCP flows in separate PCF and DCF windows. Conversely, when we observed end-to-end delay statistics, UDP flows has exhibited slightly worse performance. Using a traffic control strategy in relay nodes, we have showed how to invert UDP and TCP delay performance in favour of UDP traffic and determine further delay differentiation within UDP sources and TCP sources. [] E. O. Elliot. Estimates of error rates for codes on burst-noise channels. Bell Systems Technical Journal, vol. 4, pp. 977-997, September 96, vol, pag. [] M. Heusse, et al, "Performance Anomaly of 8.b," Proceedings of Infocom, date, location, pages, volume. [] F. Cali, et al, "IEEE 8. Wireless LAN: Capacity Analysis and Protocol Enhancements," Proceedings of Infocom, month 998 [4] G. Bianchi, "Performance Analysis of the IEEE 8. Distributed Coordination Function," IEEE Journal on Selected Area on Communications, volume, pp 55-547, March. [5] Raffaele Bruno, Marco Conti, Enrico Gregori, Throughput Analysis of UDP and TCP Flows in IEEE 8.bWLANs: A Simple Model and its Validation IEEE Computer Society Proceedings of the 5 Workshop on Techniques, Methodologies and Tools for Performance Evaluation of Complex Systems (FIRB-PERF 5), vol.,pag.,date. REFERENCES [] R. Bruno, M. Conti, and E. Gregori, Mesh networks: commodity multihop ad hoc networks, IEEE Communications Magazine, vol. 4, pp., March 5. [] www.womenproject.altervista.org [] IEEE Standard for Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, ISO/IEC 88-: 999. [4] O. Tickoo, B. Sikdar, Queueing analysis and delay mitigation in IEEE 8. random access MAC based wireless networks. In Proc. of IEEE INFOCOM 4, rd Annual Joint Conference of the IEEE Computer and Communications Societies, pp. 44-4 Vol., 7- March 4, location. [5] C. Hoene, A. Guenther, and A. Wolisz, Measuring the impact of slow user motion on packet loss and delay over IEEE 8.b wireless links, in Proc. of IEEE Workshop on Wireless Local Networks (WLN), Bonn, Germany, October, vol., pages. [6] Chou and A. Misra, Low latency multimedia broadcast in multi-rate wireless meshes, in Proc. of the First IEEE Workshop on Wireless Mesh Networks, September 5, vol.,pag.,location. [7] www.omnetpp.org [8] D. Ferrari and D. Verma, A scheme for real-time channel establishment in wide-area networks, IEEE J. Selected Areas Commun., Vol. 8, pp. 68 79, month 99. [9] K. Xu, M. Gerla, L. Qi, Y. Shu. Enhancing TCP Fairness in Ad Hoc Wireless Networks Using Neighborhood RED, in Proc. of ACM MOBICOM, month, vol,pag,location. [] E. N. Gilbert, Capacity of a burst-noise channel. Bell Systems Technical Journal, vol. 9, pp. 5-65, September 96, vol, pag.