12.07.2015 Views

Tech Report - University of Virginia

Tech Report - University of Virginia

Tech Report - University of Virginia

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

7Throughput (Mbps)43.532.521.510.50Average Jitter (ms)2.221.81.61.41.210.80.60.4AAggregateBAAggregateBtw=50ms tw=80ms tw=100mstw value (ms)Fig. 9: ThroughputAOriginalOverlappedSegmentedNormalAggregate0.26 12 24 36 48Bit Rate (Mbps)Fig. 12: Average JitterBAverage Packet Delay (ms)Average Back-<strong>of</strong>f (Ts)1110987651.110.90.80.70.60.50.40.30.2OriginalOverlappedSegmentedNormal0.16 12 24 36 48Bit Rate (Mbps)Fig. 10: Average Delay4OriginalOverlapped3 SegmentedNormal26 12 24 36Bit Rate (Mbps)48Fig. 13: Average Back<strong>of</strong>fThroughput (Mbps)Average Packet Delay (ms)131211109140012001000800600400200OriginalOverlappedSegmentedNormal01 2 3 5 10 15 20CBR Traffic Rate (Mbps)Fig. 11: Traffic Rate Vs Delay8Original7OverlappedSegmentedNormal66 12 24 36Bit Rate (Mbps)48Fig. 14: Hidden Terminal ProblemAverage Back<strong>of</strong>f Time: To further investigate how theopportunistic access improves the throughput and jitter, wecollected the back<strong>of</strong>f time in terms <strong>of</strong> time slots <strong>of</strong> eachtransmission. Figure ?? shows the average back<strong>of</strong>f time persuccessful transmission for each access algorithm. Averageback<strong>of</strong>f slot time per packet is calculated as the sum <strong>of</strong>individual packet back<strong>of</strong>f time slots over the total number <strong>of</strong>packets transmitted successfully. From the figure, the opportunisticaccess algorithms consume much less time in back<strong>of</strong>fthan the original access, up to 400% less at 48 Mbps. Theoverall network performance improves because 1) the equalprobability access in the original algorithm results in almostconstant average back<strong>of</strong>f, and 2) the opportunistic accessalgorithms spend less time on back<strong>of</strong>f, namely contention.Discussion on Opportunistic Access Algorithms: Amongthe proposed three opportunistic access schemes, the SegmentedContention yields in general the best performance fromFigure 9 to ??. This is because the channel access <strong>of</strong> nodesat different bit rates is deterministically prioritized when theircontention windows are segmented. Nodes with lower ratesnever get a smaller back<strong>of</strong>f value than the ones with higher bitrates. The Overlapped Contention and the Normal DistributionBased Back<strong>of</strong>f result in almost identical performance. This isbecause both <strong>of</strong> them have a similar expectation in selectingback<strong>of</strong>f values for the nodes at the same bit rate. Because theyboth have contention windows starting at “0”, the higher bitrate nodes may still be occasionally beaten by nodes at lowerbit rates.2) Impact <strong>of</strong> Hidden Terminal Problem: In this case, thenetwork was configured to still have one access point and twoclient nodes with one at 54 Mbps and the other varying itsbit rate, but the clients do not hear each other. RTS and CTSare disabled to fully stimulate the hidden terminal problem.Figure 14 plots the measured throughputs at different rates.The hidden terminal problem does hurt the performance <strong>of</strong> allalgorithms. The figure tells that the overall network throughputis still improved by the opportunistic access, although theimprovement is reduced to some degree by the hidden terminalproblem. To show more clearly the effect <strong>of</strong> hidden terminal,we further studied the percentage <strong>of</strong> packet loss ratio <strong>of</strong>the network. Packet loss ratio percentage is the differencebetween total transmitted packets and total received packetsover the total number <strong>of</strong> transmitted packets. Figure 16 showsthat packet loss ratio is considerably reduced in opportunisticaccess which explains the performance improvement <strong>of</strong> opportunisticaccess as compared to the original access.3) With RTSCTS: Although opportunistic access performsbetter than original one, the measured throughput performanceis mainly due to high bit rate nodes in the presence <strong>of</strong> hiddenterminal. This is because the high bit rate nodes wins thechannel more frequently due to its initial smaller contentionwindow size, suppressing the channel acces to lower bit ratenodes. Hence the channel should be reserved by nodes beforeits access to provide the fairness among the nodes. We haveenabled the RTS/CTS reservation technique for this purpose.As expected, the opportunistic access outperforms the originalone in throughput and gives the throughput proportional to its

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!