Modeling and Simulation of MAC for QoS in IEEE 802.11e Using
OPNET Modeler
Weihua Helen Xi, Toby Whitley, Alistair Munro, Michael Barton
Networks & Protocols Group, CCR, Department of Electrical & Electronic Engineering, University of Bristol
Bristol, UK BS8 1UB
email: helen.xi@bristol.ac.uk
Abstract
This paper presents an IEEE 802.11e model developed using the
OPNET Modeler, which is employed for Medium Access
Control (MAC) enhancements for Quality of Service (QoS).
IEEE 802.11e QoS is implemented using the concept of varying
levels of service for different traffic types. Four Access
Categories (ACs) are defined with each supporting a different
priority for accessing the radio channel. The QoS station
(QSTA) based on the existing 802.11 model but using an AC
priority queuing and access mechanism is presented. The
enhanced queue provides virtual contention for a transmission
opportunity with higher ACs having a greater probability of
success. This work offers a flexible and more accurate model to
simulate the performance of QoS mechanisms within the
802.11e draft. The simulation results prove this model performs
as expected and demonstrate the performance of different traffic
types under different network configurations for the selected
workload.
1. Introduction
Simple deployment and high transmission speed make the
Wireless Local Area Networks (WLAN) more accepted in
public areas like offices and airports. IEEE 802.11 [1] defines the
WLAN MAC and Physical Layer (PHY) Specifications. 802.11b
extends the higher-speed PHY to 11Mbps in the 2.4 GHz band.
The standard OPNET WLAN model is based on these two
specifications. 802.11a [2] provides eight PHY modes with
transmission rates up to 54Mbps by operating in the less used
5GHz unlicensed frequency band. Recently, with the increasing
demands in transmitting multimedia over radio medium, the
IEEE 802.11e draft [3] defines MAC enhancements to support
LAN applications with QoS requirements.
This paper describes an approach for modeling the MAC
enhancements for QoS in 802.11e, based on the OPNET 802.11a
contributed model [4]. The OPNET 802.11 WLAN standard
model served as the foundation for the 802.11a contributed
model, in which the MAC and especially the PHY are heavily
modified. In the presented 802.11e model, a priority queue to
provide virtual contention among different traffic types for a
transmission opportunity within one station is defined, together
with changes in MAC to adapt the 802.11e standard. The eight
PHY modes with the Orthogonal Frequency Division
Multiplexing (OFDM) modulation schemes developed in the
802.11a model are applied.
This paper is organized as follows: Section 2 provides a brief
introduction to the legacy MAC defined in 802.11 and 802.11b;
the MAC enhancements in the 802.11e draft follow in Section 3;
Section 4 presents the implementation of the MAC
1
enhancements in OPNET; the simulation results are
demonstrated in Section 5 and finally, the paper is concluded in
Section 6.
2. 802.11 MAC Overview
The IEEE 802.11 MAC specifies two access methods, the
fundamental Distributed Coordination function (DCF) and the
optional Point Coordination Function (PCF). Most of the
commercial 802.11 products only employ contention based
DCF. Considering the doubts on the efficiency of PCF [5], it was
chosen to implement the 802.11e model supporting DCF mode
only.
DCF: The fundamental access method of the IEEE 802.11 MAC
is known as Carrier Sense Multiple Access with Collision
Avoidance (CSMA/CA). All the stations share one radio
channel, and before a station transmits data, the channel must be
idle for a contention period. To determine whether the channel is
idle or not, the station (STA) needs to continuously sense it
throughout this period. If the STA detects a signal with power
higher than a specific fixed power threshold, the radio channel is
assumed to be busy and thus unavailable for transmission. The
contention period includes a DCF Interframe Space (DIFS) and a
backoff period. The DIFS is 34µs in 802.11a and the additional
backoff period is determined as a multiple of a 9µs slot time.
IFS: The interval between frames is called the Interframe Space
(IFS). IFS has four types in 802.11 (three shown in Figure 2).
Short IFS (SIFS) is used for an ACK frame and a CTS frame
responding to a data frame and a RTS frame, respectively. PCF
IFS (PIFS) is used by STAs operating under PCF mode to gain
priority access to the medium. In the DCF mode, DIFS is used
instead of PIFS in PCF mode. The shorter the contention period,
the higher the priority is to access the wireless medium.
CW: After sensing the channel idle for DIFS, to minimize the
collision possibility, the STA generates a random backoff period
for an additional deferral time before transmitting. The
Contention Window (CW) is used to determine the number of
slot times in the backoff period. The initial value of CW, or the
reset of CW after a successful transmission attempt, is CWmin.
The CW size will double for every unsuccessful attempt, until
the CW reaches the value of CWmax. The STAs deferred from
channel access during busy period holds the backoff value and
continue to count down the CW.
RTS/CTS: Because of the limited radio range, the transmitting
station may be unaware of stations that can interfere with the
receiving station. The Request to Send (RTS) and Clear to Send
(CTS) mechanism is used to mitigate this hidden station
problem. The RTS/CTS frames transmitted prior to the actual
data frame contain the Network Allocation Vector (NAV) field,
which defines the period of time that the medium is to be
reserved until the end of the Acknowledgement (ACK) to the
following data frame. All STAs within the reception range of
either the originating STA (which transmits the RTS) or the
destination STA (which transmits the CTS) will keep quiet. The
header of the data frame also contains the NAV.
PCF: The PCF provides the contention free frame transfer. This
mode only works in infrastructure networks with the Access
Point (AP) working as a Point Coordinator (PC), which performs
the role of the polling master. The PCF distributes information
within Beacon management frames to gain control of the
medium by setting the NAV in STAs.
3. MAC Enhancements for QoS in 802.11e
The QoS of 802.11e is achieved by providing different classes of
frames with different priorities when accessing the radio
channel. The access method in 802.11e is called Hybrid
Coordination Function (HCF) and combines functions from both
the DCF and the PCF. The EDCF working in the Contention
Period (CP) is the Enhanced version of DCF, which is
implemented in this model. The PCF in the Contention Free
Period (CFP) is beyond the scope of this paper.
Each QoS data packet in QSTA carries its priority value (0 to 7)
in the MAC frame header. The QSTA provides four physical
queues, or ACs, to map the eight Traffic Categories (TCs). The
priority mappings are described in Table 1, taken from the IEEE
802.1d bridge specification [6].
Table 1: Access Category Mapping
User
Priority
Access
Category
Traffic Type
1
2
0
3
4
5
6
7
0
0
1
1
2
2
3
3
Background
Spare
Best Effort
Excellent Effort
Controlled Load
“Video” < 100ms latency and jitter
“Voice” < 10ms latency and jitter
Network Control
Every QSTA includes four virtual stations with each one
representing an AC, as shown in Figure 1. Four ACs are
provided by four queues. The QoS data coming from the higher
layer will drop into one of the four queues. Each queue works as
a DCF station with its own accessing parameters like AIFS[AC],
CW[AC], CWmin[AC] and CWmax[AC] instead of the DIFS,
CW, CWmin and CWmax in DCF, respectively. AIFS[AC] is
determined by:
AIFS[AC] = SIFS + AIFSN[AC] × aSlotTime
Where AIFSN[AC] is an integer greater than zero [7]. A failed
transmission will multiply the backoff period by a Persistence
Factor (PF) [AC].
2
Figure 1: Virtual Contention within a station
The accessing priority goes from AC0, AC1, AC2, up to the
highest priority AC3. As the priority of the AC increases, the
values of the MAC parameters become smaller. Thus the AC
with the shorter contention period has more priority to occupy
the channel, as shown in Figure 2.
Figure 2: Interframe spaces and backoff windows contend
for channel access in EDCF
4. 802.11e Model in OPNET
The node model for the 802.11e STA has an architecture like the
OPNET standard node model of wlan_station_adv, which
includes the MAC, PHY (comprised of transmitter and receiver),
wlan_mac_inf, source and sink, as shown in Figure 3. The higher
layers (such as TCP/IP protocols and applications) are replaced
by a source (the dotted box) and a sink process. The MAC
interface wlan_mac_intf is an equivalent of Address Resolution
Protocol (ARP). In this way, the effects of MAC attributes on
the performance of WLAN can be evaluated, independent of the
higher layers.
CWmin, CWmax and PF are each replaced by a relative vector
of four elements.
Figure 3: 802.11e WLAN Node model
The PHY in the 802.11a model is used, in which the eight sets of
transmitters and receivers employ the OFDM modulation
scheme. In the MAC process, changes are made to the variables
representing the contention parameters such as AIFS and CW,
and three existing functions corresponding with the virtual
contention in the higher layer are modified. Additionally the
RTS/CTS function is corrected to behave as required by the
standard. Another important contribution is to implement
functions of the virtual contention as shown in Figure 1 and thus
the simple bursty source as used in the standard model
wlan_station_adv is replaced.
In the dotted box, each of the four bursty sources named as ac0
to ac3 has an attribute Traffic Category with an integer value
from 0 to 3. The On-Off Process model of the bursty source is
easy to configure as both Constant Bit Rate (CBR) and Variable
Bit Rate (VBR) traffic. Each source will generate packets with a
TC_Packet format that has a field also called Traffic Category,
which inherits its process model’s Traffic Category attribute
value at the initial state. Packets generated with different AC
values flow into the queue module vc, then the queue module
inserts the packets into its subqueues indexed from 0 to 3. The
queue module is responsible for extracting the head packet of the
subqueue with the highest priority, this having the shortest
contention period.
The Finite State Machine (FSM) of the queue module is depicted
in Figure 4. It works as the virtual contention within the QSTA
shown in Figure 1. It can insert and extract packets from the
corresponding subqueue, calculate the weights of each subqueue
and send the packet from the subqueue with the smallest weight
to the MAC layer. We extend the MAC access parameters to the
module’s attributes, so the user of the 802.11e model can easily
set different values to evaluate the impact of MAC parameters
on the network performance of different traffic types. The AIFS,
3
Figure 4: Process Model of Priority Queue Module
INIT state: Acquire the MAC parameter values set by the user
and calculate the contention periods. The contention periods
including the backoff window size are not real timers which will
count down with every tick of the clock; they work as the
weights of the subqueue and will be updated every time this
QSTA transmits the previous packet successfully.
IDLE state: The machine enters an Idle state and waits for an
incoming event. The event can be either an incoming packet
from the 4 bursty source modules, a feedback interrupt from the
MAC process to inform it of a successful transmission, or ready
to send the next packet to the MAC layer to contend with other
stations for the radio channel.
RECEIVE state: Packets arriving from any of the four bursty
sources will trigger the ARRIVAL event. The state machine then
goes into the RECEIVE state and will insert the packet into the
corresponding subqueue with the same AC. If no packets stay in
the MAC layer to contend with other stations, an interrupt will
be sent to trigger the SEND state.
UPDATE state: After MAC transmits a packet successfully to
the destination or the transmission attempt retry counter reaches
its limit, the MAC process will send the queue module a remote
interrupt to inform it that MAC is ready to acquire the next
packet. This remote interrupt triggers the UPDATE_CP event in
order to update the CW sizes of the four subqueues. The CW of
the three deferred subqueues will deduct the immediate past
winning subqueue’s last CW, while the past winner is reset to its
CWmin value.
SEND state: Updating of the CW triggers the SEND_PKT event
and the state machine enters the SEND state. It compares the
non-empty subqueues to find the smallest weight of the
subqueue. The selected subqueue extracts its head packet and
sends it to the MAC layer. In the case where there is light traffic
and when all the four subqueues are empty, a flag is set. Thus
when the next packet is generated, it is sent to MAC
immediately.
5. Simulation Results
The goal of the simulation is to verify the expected operation of
this model. The simulation environments are described as
follows:
Each network configuration in the simulations has the same
WLAN parameter settings (Table 2). The MAC address of each
station is automatically assigned by the OPNET Modeler. The
randomly selected destination address makes it possible for each
station to receive traffic equally. The RTS/CTS mechanism is
used to mitigate the hidden station problem, although it adds
overhead and decreases throughout. Since the packet size is
below the 2034-byte limit, fragmentation is not needed.
Table 2: WLAN Parameters Setting
statistics of the whole network and catalogued according to the
packet's AC.
Two sets of simulation are executed. The first scenario is to test
the performance of the different priorities in an Ad hoc network
with 10 QSTAs. The simulation is run over each of the eight
PHY modes of 802.11a. The second scenario runs at 24Mbps
speed in an Ad hoc network with 3, 5 and 10 QSTAs,
respectively. The network structure is as shown in Figure 5, with
each scale representing 12.5 meters.
6, 9, 12, 18, 24, 36, 48, 54
256
Date Rate (Mbps)
RTS threshold (bytes)
Fragmentation Threshold None
Modulation Scheme
MAC Address
Destination Address
OFDM
Auto Assigned
Random
Each QSTA in our simulation has the same traffic generation
pattern (Table 3). Packets of each AC have a size of 1500 bytes
and arrive every 5ms. Each station has four ACs and the data
rate is 9.6Mbps. A simple and high traffic mode [8] [9] is used to
make sure that the throughput and delay performance of each
AC will be independent of the characteristics of the traffic
streams. For example, the starvation of the traffic or the
correlated packet arrival of realistic voice traffic would influence
the throughput results [10].
Table 3: Packet Generation for every AC
Packet Size (bytes)
Interarrival Time (seconds)
Data Rate (Kbps)
constant (1500)
constant (0.005)
2400
Table 4 lists the MAC access parameters for each traffic type.
Each station generates traffic for all the four ACs equally.
Table 4: MAC Access Parameters used for Simulations
Figure 5: Network Structures
5.1. Simulations in an Ad hoc network with 10 QSTAs over 8
PHY modes
Figure 6 and Figure 7 illustrate the different Throughput and
Delay of each AC in the Ad hoc network with 10 QSTAs. The
figure of Load is very similar with that of Throughput, and the
trend of Medium Access Delay is similar to Delay. Throughput
and Delay statistics are used in this paper. The Throughput of
AC3 is observed to be higher than the others at every PHY mode
and the Delay is lower as expected, this also agrees with
simulation results in [7] [10]. AC0 suffers a significantly larger
delay than AC1, AC2 and AC3, and the throughput is
significantly impacted owing to the low priority of achieving
transmission opportunities. The delay of the audio and video
services (AC3 and AC2) is lower than 0.2ms, which is negligible
for users in real audio and video transmission. From the PHY
mode point of view, the higher the PHY modes used, the shorter
the transmission time, so the shorter the delay and the higher the
throughput [11].
Type AIFSD CWmin CWmax PF
1.2
AC3
AC2
2.0
2.6
AC1
AC0
3.0
15
31
255
1023
7
10
15
31
1
2
3
4
All simulations last 60 seconds of simulated time and the first 2
seconds of the data are discarded to ensure stable system
statistics. Performance measurements logged include
Throughput, Load, Medium Access Delay and Delay.
Throughput is the rate of bits being sent from MAC to the higher
layer. Load statistics are collected at the MAC layer when the
data frame arrives from higher layer at MAC and is ready to
transmit. Medium Access Delay is the period from the time
when a packet arrives at MAC until it is removed for
transmission. Delay is the time from when a packet arrives at the
transmission station’s MAC until it reaches the destination
station’s MAC. Each of the four measurements is the aggregated
4
Figure 6: Throughput per AC over 8 PHY modes in an Ad hoc
Network with 10 QSTAs
Figure 7: Delay per AC over 8 PHY modes in an Ad hoc
Network with 10 QSTAs
5.2. Simulations with Different Numbers of QSTAs at
24Mbps Rate
In this scenario, the PHY speed is fixed at 24Mbps, while we
investigate the performance differences in three Ad hoc
networks with different numbers of stations. Figure 8 and Figure
9 demonstrate the Throughput and Delay of each AC run under
networks with 3, 5 and 10 QSTAs, respectively. Three
simulations indicate the similar results trend as concluded above.
Higher AC traffic gain advantages from having QoS. The
highest priority packets which are delay sensitive like
conversations enjoy ten times less delay than the lowest priority
packets like large file downloading.
Figure 9: Delay per AC with Different Numbers of QSTAs at
24Mbps
We can also observe the network with 3 QSTAs experiences a
better performance than the 5 QSTAs and the 10 QSTAs
networks, i.e. higher Throughput and lower Delay. Figure 10
tells us the aggregated Data Dropped in the 10 QSTAs network
is 20 times as much as that of 3 QSTAs. The 10 QSTAs network
has more than twice the number of transmission attempts, thus
more collisions occur, that cause more retransmissions. If the
retransmission count reaches four, the packet will be dropped;
too many users can deteriorate network performance.
Figure 8: Throughput per AC with Different Numbers of
QSTAs at 24Mbps
Figure 10: Data Dropped with Different Numbers of QSTAs
6. Conclusion
In this paper, an 802.11e model developed using the OPNET
Modeler was presented. QoS of the model was implemented
using the concept of varying levels of services for different
traffic types, i.e. voice, video and data. We defined four Access
Categories, each of which supports a different priority to access
the radio channel. The QoS station was modeled with a priority
queue and access mechanism enhanced from the existing 802.11
model. Simulation results prove the validity of this model and
demonstrate its fidelity and flexibility for the study of IEEE
802.11e QoS mechanisms.
5
References
[1] IEEE Std. 802.11-1999, Part 11: Wireless LAN Medium Access
Control (MAC) and Physical Layer (PHY) Specifications, Reference
number ISO/IEC 8802-11:1999(E), IEEE Std. 802.11, 1999
edition, 1999.
[2] IEEE Std. 802-11a, IEEE Standard for Wireless LAN Medium
Access Control (MAC) and Physical Layer (PHY) Specifications: High-
Speed Physical Layer in the 5 GHz Band, September 1999.
[3] IEEE 802.11e/D4.0, Draft Supplement to Part 11: Wireless Medium
Access Control (MAC) and physical layer (PHY) specifications:
Medium Access Control (MAC) Enhancements for Quality of Service
(QoS), November 2002.
[4] B. E. Braswell, J. C. McEachen, "A Baseline Model for the IEEEE
802.11A WLAN Protocol," OPNETWORK 2001 Proceedings, August
2001.
[5] S. Mangold, S. Choi, “IEEE 802.11e Wireless LAN for Quality of
Service,” in Proc. European Wireless ’02, Florence, Italy, February
2002.
[6] IEEE 802.1d-1998, Part 3: Media Access Control (MAC) bridges,
ANSI/IEEE Std. 802.1D, 1998 edition, 1998.
[7] S. Choi, J.Prado, S. Shankar N, and S. Mangold, “IEEE 802.11e
Contention-Based Channel Access (EDCF) Performance Evaluation,”
in Proc. IEEE ICC’03, Anchorage, Alaska, USA, May 2003.
[8] ITU-T Recommendation H.261: Video codec for audiovisual
services at 64 kb/s. (1993).
[9] ISO/IEC JTC1/SC29/WG11: MPEG4 coding of audio visual
objects: visual. (1998).
[10] S. Mangold, S. Choi, "Analysis of IEEE 802.11e for QoS Support
in Wireless LANs," IEEE Wireless Communications, Dec 2003.
[11] D. Qiao, S. Choi, and K. G. Shin, "Goodput Analysis and Link
Adaptation for IEEE 802.11a Wireless LANs,” IEEE Trans. on Mobile
Computing (TMC), vol. 1, no. 4, pp. 278-292, October-December 2002.
6