IEEE 802.11p的英文文档
802.11p综述
IEEE 802.11p综述摘要汽车在能够与路上相遇的汽车通信前,不能容忍长时间的建立连接而产生的延时,加上飞速行驶的汽车和复杂的道路状况给物理层带来了很大的挑战。
IEEE802.11P的研究是基于IEEE802.11解决汽车网络的方案。
由于设计的IEEE802.11标准在灵活性上很差,所以IEEE802.l1p标准主要是解决快速连接高频率切换问题和新的安全问题。
以下就802.11p协议的产生,IEEE802.11p协议与与IEEE802.11的不同之处,以及应用做简单的介绍。
引言0 引言近年来汽车网络越来越受到人们的关注,利用无线通信标准DSRC实现路边到汽车和汽车到汽车的公共安全和私人活动通信的短距离的通信服务。
最初的设定是在300 m距离内能有6 Mb/s的传输速度。
拥有304.8 m的传输距离和6 Mb/s的数据速率。
从技术上来看,它对IEEE802.11进行了多项针对汽车这样的特殊环境的改进,如:热点间切换更先进、更支持移动环境、增强了安全性、加强了身份认证等等。
目前的汽车通信市场,很大程度上由手机通信所占据,但客观上说,蜂窝通信覆盖成本比较高昂,提供的带宽也比较有限。
使用IEEE802.11p有望降低成本、提高带宽、实时收集交通信息等。
1、IEEE 802.11p无线局域网标准,用于智能交通ITSIEEE 802.11p(又称WAVE,Wireless Access in the Vehicular Environment)是一个由IEEE 802.11标准扩充的通信协议,主要用于车载电子无线通信。
它本质上是IEEE 802.11的扩充延伸,符合智能交通系统(ITS,Intelligent Transportation Systems)的相关应用。
应用层面包括高速车辆之间以及车辆与ITS路边基础设施(5.9千兆赫频段)之间的数据交换。
IEEE 1609标准则基于IEEE 802.11p通信协议的上层应用标准。
IEEE 802(完整版).11、802(完整版).15、802(完整版).16、802(完整版).20标准简介(完整版).ppt
.,
5
802.11标准
802.11标准是IEEE最初制定的一个无线局 域网标准,主要用于解决办公室局域网和 校园网中用户与用户终端的无线接入,业 务主要限于数据存取,速率最高只能达到 2Mbps。由于它在速率和传输距离上都不 能满足人们的需要,因此,IEEE小组又 相继推出了802.11b和802.11a两个新标 准。
.,
10
802.11f/802.11r标准
802.11f追加了IAPP(inter-access point protocol)协 定,确保用户端在不同接入点间的漫游,让用户端能平 顺、无形地切换存取区域。 802.11f标准确定了在同一 网络内接入点的登陆,以及用户从一个接入点切换到另 一个接入点时的信息交换。(2006年2月被IEEE批准撤 销)
IEEE 802.11最早是由IEEE(Institute of Electrical and Electronics Engineers,美国电 气和电子工程师协会 )在1997年6月正式发布, 此文档为无线网络的标准规格。
1999年,IEEE协会进一步提出IEEE802.11的扩 展规格:IEEE 802.11a和IEEE802.11b。扩展 规格的出现,让无线网络的速度倍增,也增加 了无线网络的实用性。
802.11r标准,着眼于减少漫游时认证所需的时间,这 将有助于支持语音等实时应用。使用无线电话技术的移 动用户必须能够从一个接入点迅速断开连接,并重新连 接到另一个接入点。802.11r改善了移动的客户端设备 在接入点之间运动时的切换过程。
.,
11
IEEE 802.11h/j标准
802.11h是802.11a的扩展,目的是兼容其他5G 赫兹频段的标准,如欧盟使用的HyperLAN2。 美国和欧洲在5GHz频段上的规划、应用上存在 差异,这一标准的制订目的,是为了减少对同 处于5GHz频段的雷达的干扰。
IEEE P802.11p D5.0
Copyright © 2008 by the IEEE.Three Park Avenue New York, New York 10016-5997, USA All rights reserved.This document is an unapproved draft of a proposed IEEE Standard. As such, this document is subject to change. USE AT YOUR OWN RISK! Because this is an unapproved draft, this document must not be uti-lized for any conformance/compliance purposes. Permission is hereby granted for IEEE Standards Commit-tee participants to reproduce this document for purposes of international standardization consideration. Prior to adoption of this document, in whole or in part, by another standards development organization permission must first be obtained from the Manager, Standards Intellectual Property, IEEE Standards Activities Depart-ment. Other entities seeking permission to reproduce this document, in whole or in part, must obtain permis-sion from the Manager, Standards Intellectual Property, IEEE Standards Activities Department IEEE Standards Activities Department Manager, Standards Intellectual Property 445 Hoes Lane Piscataway, NJ 08854, USA123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354IEEE P802.11p TM /D5.0, November 2008IEEE P802.11p TM /D5.0Draft Standard for Information Technology — Telecommunications and information exchange between systems — Local and metropolitan area networks — Specific requirements — Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications Amendment 7: Wireless Access in Vehicular Environments Prepared by the IEEE 802.11 Working Group of the IEEE 802 Committee Abstract: This amendment specifies the extensions to IEEE Std 802.11™ for Wireless Local Area Net-works providing wireless communications while in a vehicular environment.Keywords: 5.9 GHz, wireless access in vehicular environments, WA VE.1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54IntroductionIEEE Std 802.11™ devices (for example WA VE-compliant stations) may be used in environments where the physical layer properties are rapidly changing and where very short-duration communications exchanges are required. The purpose of this standard is to provide the minimum set of specifications required to ensure interoperability between wireless devices attempting to communicate in potentially rapidly changing com-munications environments and in situations where transactions must be completed in time frames much shorter than the minimum possible with infrastructure or ad hoc IEEE 802.11 networks. In particular, time frames that are shorter than the amount of time required to perform standard authentication and association to join a BSS are accommodated in this amendment.This specification accomplishes the following:•Describes the functions and services required by stations to operate in a rapidly varying envi-ronment and exchange messages without joining a BSS•Defines the signaling techniques and interface functions used by stations communicating out-side of the context of a BSS that are controlled by the IEEE 802.11 MACThis amendment to IEEE Std 802.11™ is based on extensive testing and analyses of wireless communica-tions in a mobile environment. The results of these efforts were documented in ASTM E 2213-03, "Stan-dard Specification for Telecommunications and Information Exchange Between Roadside and Vehicle Systems - 5.9 GHz Band Wireless Access in Vehicular Environments (WAVE) / Dedicated Short Range Com-munications (DSRC) Medium Access Control (MAC) and Physical Layer (PHY) Specifications". This docu-ment is available from: ASTM International, 100 Barr Harbor Drive, PO Box C700, West Conshohocken, PA, 19428. This amendment to IEEE 802.11 is based on the ASTM E 2213-03 document.Please see document, 11-07-2045-00-000p-Development of DSRC/WA VE Standards, (latest version) for additional information on the development of the amendment for WA VE.Notice to usersErrataErrata, if any, for this and all other standards can be accessed at the following URL:/reading/ieee/updates/errata/index.html. Users are encouraged to check this URL for errata periodically.InterpretationsCurrent interpretations can be accessed at the following URL:/reading/ieee/interp/index.html.PatentsAttention is called to the possibility that implementation of this standard may require use of subject matter covered by patent rights. By publication of this standard, no position is taken with respect to the existence or validity of any patent rights in connection therewith. The IEEE shall not be responsible for identifying pat-ents or patent applications for which a license may be required to implement an IEEE standard or for con-This introduction is not part of IEEE P802.11p, Draft Amendment to Standard for Information Technology - Telecommunications and information exchange between systems - Local and Metropolitan networks - specific requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifica-tions: Amendment : Wireless Access in Vehicular EnvironmentsCopyright © 2008 IEEE. All rights reserve d.ii This is an unapproved IEEE Standards Draft, subject to change1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54ducting inquiries into the legal validity or scope of those patents that are brought to its attention. A patent holder or patent applicant has filed a statement of assurance that it will grant licenses under these rights without compensation or under reasonable rates and nondiscriminatory, reasonable terms and conditions to applicants desiring to obtain such licenses. The IEEE makes no representation as to the reasonableness of rates, terms, and conditions of the license agreements offered by patent holders or patent applicants. Further information may be obtained from the IEEE Standards Department.ParticipantsAt the time this draft amendment was completed, the 802.11 Working Group had the following membership:Bruce P. Kraemer, ChairJon Rosdahl and Adrian Stephens, Vice ChairsStephen McCann, SecretaryThe WA VE task group had the following officers:Lee Armstrong, ChairSusan Dickey and Filip Weytjens, SecretariesWayne Fisher, EditorMajor contributions were received from the following individuals:Guillermo AcostaLee ArmstrongBroady CashKen CookSusan DickeyPeter EcclesineWayne FisherTim GodfreyMary Ann IngramDaniel JiangCarl KainDoug KavnerJohn KenneyKeiichiro KogaThomas KuriharaJerry LandtSheung LiJason LiuAlastair MalarkyJustin McNewAndrew MylesRick NoensSatoshi OyamaVinuth RaiEd RingRandy RoebuckJon RosdahlRichard RoyFrancois SimonRobert SorannoLothar StiborBryan WellsFilip WeytjensJeffrey ZhuCopyright © 2008 IEEE. All rights reserved.This is an unapproved IEEE Standards Draft, subject to change iii1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54The following members of the balloting committee voted on this standard. Balloters may have voted for approval, disapproval, or abstention.To be supplied by IEEE staff.Copyright © 2008 IEEE. All rights reserve d.iv This is an unapproved IEEE Standards Draft, subject to change1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54Table of Contents1.Overview (2)1.2Purpose (2)3.Definitions (2)4.Abbreviations and acronyms (2)5.General Description (2)5.2Components of the IEEE 802.11 architecture (2)5.2.2.a STA communication outside the context of a BSS (2)5.3Logical service interfaces (3)5.3.1SS (3)6.MAC service definition (3)6.2Detailed service specification (3)6.2.1MAC data services (3)6.2.1.1MA-UNITDATA.request (3)7.Frame formats (5)7.1MAC frame formats (5)7.1.3Frame fields (5)7.1.3.1Frame Control field (5)7.1.3.1.2Type and Subtype fields (5)7.2Format of individual frame types (6)7.2.2Data frames (6)7.2.3Management frames (6)7.2.3.a Timing and information frame format (7)7.3Management frame body components (7)7.3.1Fields that are not information elements (7)7.3.1.10Timestamp field (7)7.3.2Information elements (7)7.3.2.2Supported Rates element (8)7.3.2.27Extended Capabilities information element (8)7.3.2.29EDCA Parameter Set element (8)7.3.2.a Higher layer information element (HLIE) (9)9.MAC sublayer functional description (10)9.1MAC architecture (10)9.1.1DCF (10)9.1.3.1HCF contention-based channel access (EDCA) (10)9.2.3.4AIFS (10)9.9.1.2EDCA TXOPs (10)9.9.1.3Obtaining an EDCA TXOP (11)yer management (11)Copyright © 2008 IEEE. All rights reserved.This is an unapproved IEEE Standards Draft, subject to change v1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 5410.3MLME SAP interface (11)10.3.9Reset (11)10.3.9.1MLME-RESET.request (11)10.3.a Get TSF timer (11)10.3.a.1MLME-GETTSFTIME.request (11)10.3.a.2MLME-GETTSFTIME.confirm (12)10.3.b Set TSF timer (13)10.3.b.1MLME-SETTSFTIME.request (13)10.3.b.2MLME-SETTSFTIME.confirm (13)10.3.b.3MLME-SETTSFTIME.indication (14)10.3.c Increment TSFtime (14)10.3.c.1MLME-INCTSFTIME.request (14)10.3.c.2MLME-INCTSFTIME.confirm (15)10.3.d Timing and higher layer information (16)10.3.d.1MLME-TIMING_INFO.request (16)10.3.d.2MLME-TIMING_INFO. confirm (17)10.3.d.3MLME-TIMING_INFO. indication (18)11.MLME (19)11.1 Synchronization (19)11.3 STA authentication and association (20)11.a STAs communicating outside the context of a BSS (20)11.a.1Generation and timestamping of a Timing and information frame (21)11.a.2TSF (21)17.Orthogonal frequency division multiplexing (OFDM) PHY specification for the 5 GHz band (21)17.3 OFDM PLCP sublayer (21)17.3.8PMD operating specifications (general) (21)17.3.8.8Transmit and receive operating temperature range (21)17.3.10.2Adjacent channel rejection (21)17.3.10.3Nonadjacent channel rejection (22)17.4 OFDM PLME (22)17.4.1PLME_SAP sublayer management primitives (22)Annex A (23)(normative)Protocol Implementation Conformance Statement (PICS) proforma (23)A.4PICS proforma--IEEE Std 802.11™—2007 Edition (23)A.4.3IUT Configuration (23)A.4.8OFDM PHY function (24)A.4.15QoS enhanced distributed channel access (EDCA) (25)Annex D (25)(normative)ASN.1 encoding of the MAC and PHY MIB (25)Annex I (30)(normative)Regulatory classes (30)I.1External regulatory references (30)I.2Radio performance specifications (31)I.2.1Transmit and receive in-band and out-of-band spurious emissions (31)Copyright © 2008 IEEE. All rights reserve d.vi This is an unapproved IEEE Standards Draft, subject to change1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54I.2.2Transmit power levels (31)I.2.3Transmit spectrum mask (32)Annex J (34)(normative)Country information element and regulatory classes (34)J.2Band specific operating requirements (36)J.2.25.850 to 5.925 GHz in the USA (36)List of FiguresFigure 7-95a1 Higher layer Information element format (9)Figure I.2 5.9 GHz spectrum mask and Application (34)Copyright © 2008 IEEE. All rights reserved.This is an unapproved IEEE Standards Draft, subject to change vii1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54List of TablesTable 7-1 Valid type and subtype combinations (5)Table 7-2 To/From DS combinations in data frames (5)Table 7-18b Timing and information frame body (7)Table 7-26 Element IDs (7)Table 7-35a Capabilities field (8)Table 7-37a Default EDCA parameter set for STA operation outside of a BSS (9)Table 17 -13a WAVE enhanced receiver performance requirements (22)Table 17 -14 MIB attribute default values/ranges (22)Table I.1 Regulatory requirement list (30)Table I.2 Emissions limits sets (30)Table I.3 Behavior limits sets (30)Table I.4 Transmit power level by regulatory domain (31)Table I.5a Maximum Transmit Power classification for the 5.85-5.925 GHz band in the USA (32)Table I.7 Spectrum Mask Data for 5 MHz Channel Spacing in the 5.85-5.925 GHz band in the USA (33)Table I.8 Spectrum Mask Data for 10 MHz Channel Spacing in the 5.85-5.925 GHz band in the USA (33)Table J.1 Regulatory classes in the USA (34)Table J.2 Regulatory classes for 5 GHz band in Europe (35)Copyright © 2008 IEEE. All rights reserve d.viii This is an unapproved IEEE Standards Draft, subject to change1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54IEEE P802.11p TM/D5.0Draft Standard for Information Technology — Telecommunications and information exchange between systems —Local and metropolitan area networks —Specific requirements —Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specificationsAmendment 7: Wireless Access in Vehicular Environments[This amendment is based on IEEE Std 802.11TM -2007 as amended by IEEE Std 802.11k TM -2008, IEEE Std 802.11r TM -2008, IEEE Std 802.11y TM -2008, P802.11w-D6.0, P802.11n-D7.0, and P802.11z-D2.0.] NOTE—The editing instructions contained in this amendment define how to merge the material contained therein into the existing base standard and its amendments to form the comprehensive standard.The editing instructions are shown in bold italic. Four editing instructions are used: change, delete, insert, and replace. Change is used to make corrections in existing text or tables. The editing instruction specifies the location of the change and describes what is being changed by using strikethrough (to remove old mate-rial) and underscore (to add new material). Delete removes existing material. Insert adds new material with-out disturbing the existing material. Insertions may require renumbering. If so, renumbering instructions are given in the editing instruction. Replace is used to make changes in figures or equations by removing the existing figure or equation and replacing it with a new one. Editing instructions, change markings, and this NOTE will not be carried over into future editions because the changes will be incorporated into the base standard.Copyright © 2008 IEEE. All rights reserved.This is an unapproved IEEE Standards Draft, subject to change.1Wireless Access in Vehicular Environments P802.11p/D5.0, November 2008Copyright © 2008 IEEE. All rights reserved .2This is an unapproved IEEE Standards Draft, subject to change.1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253 1. Overview 1.2 Purpose Insert after the first indented statement as follows:— Describes the function and services that allow an IEEE 802.11™-compliant device to communicate directly with another such device outside of an ad hoc or infrastructure network.3. Definitions Insert the following new definition:3.149a Timing and information frame: A frame sent by a STA for transmitting timing and other information used by higher layers. 4. Abbreviations and acronyms Insert the following new abbreviations and acronyms in alphabetical order:HLIE higher layer information element WA VE wireless access in vehicular environments 5. General Description 5.2 Components of the IEEE 802.11 architecture Insert the following new subclause (5.2.2.a) after the last subclause in 5.2.2 inserting the appro-priate subclause numbers:5.2.2.a STA communication outside the context of a BSS In addition to defining STA communication within a BSS, this standard also allows communication between 802.11 STAs outside the context of a BSS. A STA will communicate outside the context of a BSS only if dot11OCBEnabled is set to true. Communication outside the context of a BSS involves the exchange of data frames between STAs that are not members of a BSS. The data frames can be sent to either unicast or group-cast destination MAC addresses. This type of communication, which is possible when IEEE 802.11 STAs are able to communicate directly, allows immediate communication, avoiding the latency associated with establishing a BSS. The transmitting and receiving STAs do not join a BSS or utilize the 802.11 authentica-tion or association services. This capability is particularly well-suited for use in rapidly varying communi-cation environments such as those involving mobile STAs where the interval over which the communication exchanges take place may be of very short-duration (e.g. measured in milliseconds). Since 802.11 MAC sub-layer authentication services are not used when exchanging frames outside the context of a BSS, any required authentication services would be provided by the station management entity (SME) or by applica-tions outside of the MAC sublayer. Communication between STAs outside the context of a BSS might take place in a frequency band that is dedicated for its use, and such bands may require licensing depending on1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54the regulatory domain. STAs that do not have the MIB variable dot11OCBEnabled defined operate as if dot11OCBEnabled is set to false.Rather than scanning to find other STAs with which to communicate outside the context of a BSS, a STA with dot11OCBEnabled set to true will initially transmit and receive on a channel known a priori, either through regulatory designation or some other out of band communication. A STA's SME will determine PHY layer parameters (e.g. data rate), as well as any changes in operating channel. The Timing and Infor-mation frame (see clause 7.2.3.a) provides one means for STAs to exchange management information (e.g. supported rates and QoS parameters) prior to communicating outside the context of a BSS. The BSSID of a frame sent outside the context of a BSS will either be the wildcard BSSID or a non-wildcard BSSID deter-mined by a higher layer or the SME (see Clause 7.1.3.3.3). A STA with dot11OCBEnabled set to true might be connected to a network, but the specification of that network is outside the scope of this standard.5.3 Logical service interfaces5.3.1 SSChange the lettered items (a) - (c) of Clause 5.3.1 as follows:a)Authentication (BSS operation only)b)Deauthentication (BSS operation only)c)Data confidentiality (BSS operation only)6. MAC service definition6.2 Detailed service specification6.2.1 MAC data services6.2.1.1 MA-UNITDATA.request6.2.1.1.2 Semantics of the service primitiveChange the parameters of the primitive as follows:The parameters of the primitive are as follows:MA-UNITDATA.request (source address,destination address,routing information,data,priority,service class,basic service set identification (optional))1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53If supplied, the basic service set identification parameter specifies the value to which the BSSID parameter described in 7.1.3.3.3 is set in the frame to be transmitted.6.2.1.2.2 Semantics of the service primitiveChange the parameters of the primitives as follows:The parameters of the primitive are as follows:MA-UNITDATA.indication (source address,destination address,routing information,data,reception status,priority,service class,basic service set identification (optional))The optional basic service set identification parameter is set to the value of the BSSID parameter (see 7.1.3.3.3) of the received frame.6.2.1.3.2 Semantics of the service primitiveChange the parameters of the primitives as follows:The parameters of the primitive are as follows:MA-UNITDATA.confirm (source address,destination address,transmission status,provided priority,provided service class,basic service set identification (optional))The basic service set identification parameter is the same as specified in the corresponding MA-UNIT-DATA.request primitive.Copyright © 2008 IEEE. All rights reserved.1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 547. Frame formats7.1 MAC frame formats7.1.3 Frame fields7.1.3.1 Frame Control field7.1.3.1.2 Type and Subtype fieldsInsert a row before the last row of management frame types and change the last row of manage-ment frame types in Table 7-1 as shown:Table 7-1—Valid type and subtype combinations7.1.3.1.3 To DS and From DS fieldsChange the first three rows of Table 7-2 as shown:Table 7-2—To/From DS combinations in data frames7.1.3.3.3 BSSID fieldChange the first paragraph of 7.1.3.3.3 as shown:The BSSID field is a 48-bit field of the same format as an IEEE 802 MAC address. When communicating within a BSS, the contents of this This field uniquely identifies each BSS. The value of this field, in an infra-structure BSS, is the MAC address currently in use by the STA in the AP of the BSS. When communicating outside the context of a BSS, the value in the BSSID field may be any 48-bit value.Type valueb3 b2TypedescriptionSubtype valueb7 b6 b5 b4Subtype Description00Management<ANA>Timing and information00Management1110-1111ReservedTo DS and FromDS values MeaningTo DS = 0From DS = 0A data frame direct from one STA to another STA within the same IBSS, or a data frame directfrom one non-AP STA to another non-AP STA within the same BSS, or a data frame outsidethe context of a BSS, as well as all management and control frames.To DS =1From DS = 0A data frame destined for the DS or being sent by a STA associated with an AP to the PortAccess Entity in that AP. For data frames outside the context of a BSS, this standard does notdefine procedures for using this combination of field values.To DS = 0From DS = 1A data frame exiting the DS or being sent by the Port Access Entity in an AP. For data framesoutside the context of a BSS, this standard does not define procedures for using this combina-tion of field values.1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53Insert after the second paragraph of 7.1.3.3.3:When STAs are communicating outside the context of a BSS, the value of the BSSID field may take on any 48-bit value, and, while not identifying a BSS, may be set by a higher layer or the SME. When the optional basic service set identification parameter in the MA-UNITDATA.request is present, the value of that param-eter shall be used to set the values of the address fields containing the BSSID as shown in Table 7-7 (instead of using any BSSID value in the MIB).Change the last sentence of the last paragraph of 7.1.3.3.3 to:A wildcard BSSID value (all 1’s) shall not be used in the BSSID field except for management frames of sub-type probe request where explicitly permitted elsewhere in this standard.7.1.3.5.1 TID subfieldInsert the following at the end of paragraph 7.1.3.5.1:For STAs operating outside the context of a BSS, traffic streams are not used and the TID always corre-sponds to a TC.7.1.3.5.5 Queue Size subfieldChange the second sentence of the first paragraph of 7.1.3.5.5 as follows:The Queue Size subfield is present in QoS data frames sent by STAs associated in a BSS and QoS frames sent by STAs outside the context of a BSS with bit 4 of the QoS Control field set to 1.7.2 Format of individual frame types7.2.2 Data framesChange the statements immediately following Table 7-7 as shown:A STA uses the contents of the Address 1 field to perform address matching for receive decisions. In cases where the Address 1 field contains a group address, the BSSID also is validated to ensure that the broadcast or multicast originated from a STA in the BSS of which the receiving STA is a member or, if dot11OCBEnabled is true and the BSSID is not that of a BSS of which the receiving STA is a member, to ensure that the BSSID is the wildcard BSSID or some other BSSID that the SME accepts as valid.Insert the following after a) and b) of subclause with heading, "The BSSID of the Data frame is determined as follows:":c) If the STA is transmitting a data frame outside of a BSS when dot11OCBEnabled is true, the BSSID may be a MAC address that the receiver can filter on the packet or the wildcard BSSID.7.2.3 Management framesInsert the following new subclause (7.2.3.a) after the last subclause in 7.2.3 inserting the appro-priate subclause number:Copyright © 2008 IEEE. All rights reserved.1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 547.2.3.a Timing and information frame formatThe frame body of a management frame of subtype Timing and information contains the information shown in Table 7-18b. Under the conditions identified in Table 7-18b, a STA shall include a Country information element in the transmission of Timing and information frames.Table 7-18b—Timing and information frame body7.3 Management frame body components7.3.1 Fields that are not information elements7.3.1.10 Timestamp fieldChange the first sentence as follow:This field represents the value of the timing synchronization function (TSF) timer (see 11.1 and 11.a) of a frame’s source.7.3.2 Information elementsInsert the following entry into Table 7-26 in the appropriate row as shown:Table 7-26—Element IdsOrder Information Notes1Timestamp2Capability3Supported Rates IE ID=1 Optional4Country IE ID=7 Included if dot11MultiDomainCapabilityEnabled ordot11SpectrumManagementRequired is true. Optional5EDCA Parameter Set ID=12 Optional6Higher layer informa-tion element(s)(HLIE)ID=69 Optional (Zero or more HLIEs may be included in one frame. NoHLIE may be included if the frame is intended to transmit timing infor-mation only.)7Extended Capabili-ties IEID=127 OptionalLast Vendor specific One or more vendor-specific information elements may appear in thisframe. This information element follows all other information elements.Information Element Element ID Length (in octets) Extensible HLIE (see 7.3.2.a)69 3 to 257。
英文版04 IEEE 802.11无线网
3
infrastructure vs. ad-hoc networks
infrastructure network
AP
AP wired network AP: Access Point
AP
ad-hoc network
4
802.11 - Architecture of an infrastructure network
clear channel assessment signal (carrier sense) modulation, coding channel selection, MIB
MAC Management
PMD Physical Medium Dependent
PHY Management
Direct communication within a limited range
802.11 LAN
STA1
IBSS1
STA3
Station (STA): terminal with access mechanisms to the wireless medium Independent Basic Service Set (IBSS): group of stations using the same radio frequency
STA2
IBSS2 STA5
STA4
802.11 LAN
6
IEEE standard 802.11
fixed terminal mobile terminal
infrastructure network access point
application
IEEE 802.11 Communications Test For Robotic Systems Prepared by
IEEE802.11Communications TestForRobotic SystemsPrepared by:Narek ManoukSPAWAR Systems Center San DiegoAdaptive Systems Branch(code2371)Phone:(619)553-7875Fax:(619)553-5578narek@/robots/AbstractDesigning a robust communications structure needed in a robotic system often leads to many difficulties and compromises due to design constraints.Some of the capabilities of an802.11 Ethernet radio modem can suffer as a direct result of compromises made to allow a robotic system to operate effectively within its established parameters.This was the case in the Man Portable Robotic System(MPRS)project,funded by the Army.The Urban Robot(URBOT)developed under this project had many specific user requirements,which led to challenging problems when designing the communications system.A communications test was conducted to determine the baseline capabilities of the BreezeNET PRO.11modems that are currently being used in the URBOT.Tests conducted measured the received throughput under different circumstances,such as multi-hop,multi-node,multicast,and variable antenna height and range.Results show that under some circumstances throughput improvements are possible.Lessons learned from the outcome of the communications test will help in designing an improved communications system for future projects.1.0IntroductionThe following is a summary of a test report concerning the BreezeCOM BreezeNET PRO.11Wireless Local Area Network(WLAN)Frequency Hopping Spread Spectrum(FHSS) radio modems,which conform to the IEEE802.11protocol.These modems are currently being used in the Urban Robot(URBOT)and its companion Operator Control Unit(OCU)shown in Figure 1.The URBOT,designed primarily for the Army to perform tunnel and sewer reconnaissance,can also operate outdoors,and is waterproof.The tests performed were designed to gather data regarding the performance of these modems in different topologies.The informationgathered by conducting these tests isimportant in that it will help inoptimizing the communications systemused to control and gather informationfrom the robot.The objective of these tests wasto characterize the performance of theBreezeNET PRO.11modems in termsof received throughput.The throughputis a function of the transmitted packet size,the data rate at which the packets were transmitted,and the received signal level.The range of packet sizes used varies from 64bytes –the minimum size of an Ethernet packet –to a maximum of 1518bytes.According to the IEEE 802.11protocol standard,the data rates can vary up to 2Megabits per second (Mbps).BreezeCOM has incorporated a proprietary data rate of 3-Mbps in the BreezeNET PRO.11modems.This data rate has also been tested.Three types of BreezeNET PRO.11modems are used in the URBOT/OCU infrastructure;an Access Point (AP-10),a Workgroup Bride (WB-10),and a Station Adapter (SA-40).An AP-10is a wireless hub that connects a wireless network to a wired network,and it also allows communication between SAs and WBs.A WB-10allows connectivity between different Ethernet networks,while an SA-40allows up to four wired stations to access a wireless network.In all laboratory tests,coaxial cables were used in conjunction with variable attenuators to connect the antenna ports of the modems to establish communications channels.The attenuators serve two purposes.First and foremost,they protect the modems from being damaged by alargeFigure 1.URBOT and OCU Backpackinput signal.Second,they simulate an increase in distance between two modems as the attenuation level is increased.The software involved in performing these tests included SmartApplications,SmartWindow,and SmartMulticastIP,which work in conjunction with a SmartBits-200(SMB-200)chassis using SmartCard 7710Modules.The URBOT and the OCU currentlycommunicate using User Datagram Protocol(UDP)packets.A significant portion of theseEthernet packets transmitted from the URBOTcontains digitized video.As a result,theEthernet protocol for all tests was set to UDP.On average,the size of a packet transmitted by the URBOT is around 500bytes;this includes audio/video and other telemetry information.The performance of the modems at a packet size of 512bytes is a point of interest in these tests since it is close to the maximum packet size transmitted by the URBOT.1.1Overview of Test CasesThe performance of the modems was tested in six different scenarios in which the URBOT could potentially operate.The following briefly explains each scenario.Baseline Throughput –This is a simple point-to-point communication topology where theURBOT communicates with its companion OCU.This test measures a best-case throughput to which results from the remaining tests arecompared.Figure 2.BreezeNET PRO.11ModemMulti-node Baseline Throughput–This setup simulates a more realistic situation where more than one URBOT communicates with a single OCU,although currently this feature is not implemented.Throughput in Multi-hop–Repeater units are used in the URBOT/OCU infrastructure to increase the effective distance.This test measures whether or not the addition of a single and a dual repeater system affects the throughput.Range–The range test conducted in the laboratory measures the throughput as a function of free-space path loss(simulated by an attenuator),which was converted into an approximate distance using a first-order equation.The range test conducted in the field measures the throughput using different antenna types and heights.Multicast Throughput–It may be required to view video transmitted by the URBOT on other stations in addition to the OCU.For example,an officer may need to see the video coming from the URBOT in order to make a command decision and relay that to the operator controlling the URBOT.To accomplish this,a multicast session can be started wherein several stations can join the session and receive the appropriate data.This test measures the throughput of multicast packets.Interoperability–The purpose of this test is to determine if the BreezeNET PRO.11 modems can interoperate with other802.11-compliant radios.A symbol Spectrum24 Ethernet Access Bridge was used in this test.2.0Summary of Test ResultsThe following sections summarize the full test report and provide the results obtained from the performance tests.2.1Baseline ThroughputThis test measures the fastest rate at which the modems can communicate.The throughput is measured at each data rate over a range of variable packet sizes.In addition,the Request To Send(RTS)option is enabled/disabled to test the effect on the throughput.RTS is important when multiple nodes are trying to communicate with a single AP.Since only a simple point-to-point topology is used in this test,where only two modems are communicating with one another,RTS is enabled only to show that it does affect the overall throughput,given that it adds some overhead to the transmitted packets.Figure3.Highest Possible Bit Rate With Point-to-Point CommunicationThe baseline throughput tests were conducted to measure the maximum possible throughput at1-Mbps,2-Mbps,and3-Mbps data rates.Each test was performed with RTS enabled anddisabled.A continuous stream of data at the given rate and packet size was transmitted and the received throughput measured.The results are shown in Figure3.As the packet size increases,so does the throughput.The maximum throughput of2.22-Mbps was achieved at a packet size of1468bytes,with the data rate set to3-Mbps.The BreezeNET modems fragment packets greater than1468bytes;as a result,there is a somewhat lower throughput at packet sizes greater than this built-in threshold.The RTS feature was enabled next and the same test was performed.The RTS feature adds overhead to the packet,thus the overall throughput drops.The drop in throughput is about250 Kbps at packet sizes of512bytes and greater,and less at smaller packet sizes.The advantage of enabling RTS will become evident in Section2.2.2.2Multi-Node Baseline ThroughputThe Multi-Node test is performed mainly to show the advantage of enabling the RTS feature.When several nodes are trying to communicate with an AP,they are contending for the same channel.This is especially a problem when the transmitting nodes are hidden from each other due to range or barrier separation,but are within range of the AP.In this case both nodes will sense that the channel is clear and will start transmitting.Packets arriving simultaneously at the AP will collide and drop;therefore,both nodes will back off randomly and retransmit.Eventually one node will capture the channel as its packets get through and acknowledge packets are received from the AP.The packets of the other node will not be acknowledged,and as a result the connection to this node will become progressively worse due to exponential back-offs and timeouts.With RTS enabled,a fair channel access is achieved.A node transmits an RTS packet requesting a predetermined amount of airtime from the AP.If the AP approves,it sends a Clear To Send(CTS)packet to all listening nodes,at which time only the approved node can get on the air.At the end of its transmission it will back off for a random amount of time and other nodes will get a chance to send an RTS packet.RTS is generally not justified for small packet sizes,since they are likely to get through to the AP,especially if retransmissions of data packets are performed.However,for this test the RTS is either completely disabled or enabled for all packet sizes.Figure4.Node Channel Capture Effect With RTS DisabledAttenuators were used to hide the transmitting nodes from each other but not from the AP. The effect of RTS can clearly be seen in Figures4and5.With RTS disabled,one node captured the channel completely when packet sizes were greater than128bytes.With RTS enabled,both nodes were able to transmit data,although the throughput of each node is less than the throughput of a single node with RTS disabled.This is due to the limited amount of airtime that is given to each node by the AP.Although the average throughput is approximately half that of a single nodewith RTS disabled,both nodes are at least able to transmit at a satisfactory bining the throughput of each node yields a total throughput that is comparable to what was achieved when a single node captured the channel,as seen in Figure4.Figure5.Fair Channel Access Achieved With RTS Enabled2.3Throughput in Multi-hopA major issue in wireless communications is the effective range between nodes.One way to increase the range is to add amplifiers(See Section2.4),but the output power amplification at radio frequencies is generally limited due to design constraints,and regulated by the FCC.Another way to increase range between wireless communication points is to introduce repeaters,or hop-points,into the wireless infrastructure.This option in turn will be limited by practicality,cost,and degraded performance.To test the performance in a multi-hop system,repeaters were addedbetween two communication points.A single repeater was first added,and its effect on the throughput measured.Then a second repeater was added,and the test repeated.The BreezeNET modems communicate in the following manner:An SA and a WB can only communicate directly with an AP,and not with each other.In order for an SA to communicate with a WB,it must first go through an AP.Therefore,a repeater consists of an AP-WB pair.A sample test topology is shown in Figure6.Figure6.Dual Repeater TopologyThe result of single and dual repeater topology are almost identical except that there is a slight drop in throughput in the two-repeater topology.For example,the largest difference in throughput,which is approximately100Kbps between the two topologies,occurs at a packet size of1518bytes.This indicates a drop of about4.5%from the baseline throughput at this packet size. The percentage difference is reduced at lower packet sizes.The throughput measured in a dual-hop topology is shown in Figure7.Figure7.Throughput Measured of a Two Repeater System2.4RangeAs stated in Section2.3,one way to increase the range between communication points is the addition of amplifiers.The amplifiers used in these tests(see Figure8)consist of a power amplifier for the transmitting end and a low noise amplifier(LNA)for the receiving end.Two different amplifiers were used,but not in every test.The range tests were conducted both in the laboratory and in the field.The tests performed in the laboratory were conducted solely for the purpose of obtaining best-case scenario data to which the data obtained in the field would be compared.In the laboratory,the range between the modems was simulated by increasing the attenuation level between two ends.At each level the throughput was recorded and a plot of throughput-versus-distance generated.The distance was derived from a first-order equation that isa function of frequency measured in MHz and free-space path loss measured in dB.The laboratory test was conducted with and without a 2W amplifier.Tx PowerRx Sensitivity Thresholdwithou t amp500mW amp2W ampwithout LNALNA (in 500mW amp)LNA (in 2W amp)17dBm27dBm33dBm-81dBm:1Mbps -75dBm:2Mbps -67dBm:3-85dBm:1Mbps -79dBm:2Mbps -71dBm:3Mbps-84dBm:1Mbps -78dBm:2Mbps -70dBm:3Figure parison Between AmplifiersFigure 9.Field Range Test Showing The Transmitter Station SetupURBOTPatch antenna Whip antenna Transmitting StationURBOT Height12inches24inches6feet6feetYagi antennaFigure10.Mobile Receiver Station in Field Range Test(Simulated OCU)The field tests were conducted to determine how the throughput changes as a function of antenna height,antenna type,and distance.In order to receive data coming from the URBOT to the OCU at a rate that is fast enough to deliver uninterrupted audio/video and telemetry information,a minimum rate of approximately400Kbps is required.As a result,this threshold was used in the field to measure the maximum distance that can be achieved using various antenna types and antenna heights.To take into account the geometry of the URBOT body,which affects the RF signal,the antennae were actually mounted on an URBOT as shown in Figure9.To measure the maximum range the throughput was observed as the receiver moved away from the transmitter.When the throughput dropped to approximately400Kbps,the separation distance was measured.The block diagram of the field range test is shown in Figure11.The laboratory test results are shown in Figure 12.It can bee seen that the addition of anamplifier improves the distance by a factor of four when comparing the points on both plots where the throughput just drops below the saturation level.This factor decreases as the throughput drops.The results of the field test are shown in Figure 13.Three different antenna types wereused:5-dBi whip antennae (omni-directional)currently used on the URBOT,8-dBi patch antennae (directional)currently used on the OCU,and a 13-dBi Yagi antenna (highly directional)used by the OCU when extended range is required.The patch and the Yagi antennae,which were fixed at a height of 6feet,were used on the receiver (OCU)side.The whip and the patch antennae were used on the transmitter (URBOT)side.They were interchanged and mounted at heights of 6inches (the current location of URBOT antennae),12inches,24inches,and in a few cases at 6feet.A 2W amplifier was used on the transmitter side throughout the tests.A 2W and a 500mW amplifier were used on the receiver side,although not at the same time,to take advantage of their integrated LNA.The distance values given in the figure are in feet.The +sign indicates distances in excessof what the test area would allow.The “best case”and “worst case”distances apply only to the patch antenna.“Best case”indicates that the patch antenna on the URBOT pointed to the receiver antenna,and “worst case”indicates that the patch pointed 90°away from the receiver antenna.This is best illustrated in Figure 14.Stationaryunit MobilunitFigure 11.Field Range Test SetupFigure12.Significant Improvement in Distance With the Addition of a2W AmplifierIn normal operation,the URBOT uses two antennae although only one is operational at a given time.An internal(to the modem)continuous check selects the antenna that receives the stronger signal.That same antenna is used for transmission.If two patch antennae are used,then the worst-case scenario will be when the URBOT antennae are facing90°away from the OCU.In this state the radiation emanating from the selected patch antenna on the URBOT would come from the weaker side lobes of that antenna and therefore set the range limit.This is clearly seen in Figure13,where the worst-case scenario always yielded a shorter distance than the best-case scenario.Directional antennae,such as the patch and the Yagi antennae increase the range.This is due to their ability to concentrate most of the RF energy in one general direction.Increasing the height of the antenna also improved the range.Many factors contribute to this improvement.Forexample,a height increase allows the RF energy to clear the Fresnel Zone more effectively.Other factors that may improve as the antenna is raised are diffraction and multi-path fading,which depend on the antenna position,surrounding environmental geometry,and environmental conditions.Looking at Figure 13it is seen that a height increase always improved the effective range.To further demonstrate the effects of antenna heights,a simulation was conducted using theEREPS (Engineer’s Refractive Effects Prediction System)software,where antenna heights andAntenna type Antenna height on URBOTURBOT (2W)OCU (fixed at 6’)URBOT height 12’’24’’6’WhipPatch 500mW 900105615003000Yagi 500mW214246716921+PatchPatch 500mWBest case 3240Worst case 1680Best case 3615Worst case 1500Best case 5085Worst case 3348Yagi 500mWBest case 6921+Worst case 39216267Whip Patch 2W 1155323739216921+Yagi 2W 168044976921+Patch Patch 2WBest case 2385Worst case 1110Best case 4101Worst case 2775Best case 4788Worst case 2049Yagi 2WBest case 6921+Worst case 3900Best case 6921+Worst case 3921Figure 13.Maximum Distance at 400Kbpsfrequency can be entered and a plot of attenuation vs.propagation loss generated.Results from the simulation show that as the antenna height is increased,the propagation loss is decreased.2.5Multicast ThroughputA popular form of a multicast session is the transmission of live video from one node toothers that join the session.It may be desirable to view video coming from the URBOT on several stations,therefore the URBOT must generate and transmit multicast packets.The OCU would receive these frames and forward them to other stations that have joined the multicast session.The purpose of this test is to determine the throughput of received multicast frames.Since multicast packets are not acknowledged when received,they are transmitted at 1-Mbps,in order to decrease excessive bit errors.It is possible,at least in firmware,to increase the multicast data rate of a BreezeNET modem to 3-Mbps.This option was tested to find if the throughput improves.Another parameter that was tested was the Delivery Traffic Indication Message (DTIM)period.The DTIM period determines on which beacon of the AP the multicast framesareURBOTOCU antenna(a)(b)Figure 14.a)URBOT Patch Antenna Facing OCU Antenna;b)Facing 90°Awaytransmitted.According to the BreezeNET PRO.11manual,the DTIM period applies to stations in power-save mode and those not in power-save mode(normal mode).The default setting for the DTIM period is4beacons,indicating multicast traffic is sent on the4th beacon(approximately once every second).It follows that reducing this period should increase the rate at which the multicast frames are sent.Figure15.Multicast Throughput Using Different Modem Settings The test setup was designed to simulate the transmission of video from the URBOT being received by the OCU and two additional stations.The throughput was measured at each station and plotted,as shown in Figure15.Default settings were used to plot the throughput against varying packets sizes,which is shown as the“1Mbps”plot.Increasing the multicast data rate to3-Mbps did not change the throughput rate.Decreasing the DTIM interval to1beacon also had no effect.2.6InteroperabilityWireless modems from different vendors incorporating the IEEE802.11protocol should be able to communicate with one another.To test this interoperability and to make throughput measurements,a Symbol Spectrum24Ethernet Access Bridge(EAB)was used.The throughput was measured against variable packet sizes.Figure16.Interoperability Results of the BreezeNET AP and the Spectrum24EABA simple point-to-point topology was used in this test.The EAB operates at the standard data rates of1-Mbps and2-Mbps,and does not include a3-Mbps data rate.The throughput wasonly measured for the standard802.11data rates.Both modems were also swapped and the test performed at a2-Mbps data rate,to ensure complete interoperability.The throughput results of both data rates are shown in Figure16.The1-Mbps data rate is comparable to the baseline rate shown in Figure3.However,the2-Mbps data rate is not.Enabling both modems to transmit and receive at2-Mbps did not increase the overall throughput.The modems were then swapped so that the EAB was allowed to transmit and the AP was able to receive.The data rate for each packet was manually adjusted so that the received throughput was measured at its highest level.The plot labeled“Interchange”in Figure16shows the throughput result.The input data rate was manually adjusted because a constant stream of data fed into the EAB at2-Mbps caused the throughput to drop to much lower levels for each packet than that shown in the“Interchange”plot.The EAB did not perform as well as the BreezeNET AP since the AP was able to receive at higher throughput rates(see Section2.1).However,the purpose of this test is to show that the BreezeNET modems do interoperate with other802.11wireless modems.3.0ConclusionsTests show that the throughput is directly related to the packet size,received signal power, and selected data rate.Contrarily,the highest throughput was not achieved at the maximum Ethernet packet size of1518bytes.It was achieved at1468bytes,the built-in packet fragmentation point.Beyond this packet size the throughput dropped a negligible amount.The RTS feature was not needed in a simple two-node point-to-point topology,but was absolutely necessary when more than two nodes were present.Without RTS one node can capture the channel and not allow other nodes to communicate.Enabling RTS ensures that fair access is granted to all nodes,although the throughput of each node drops by a factor that is inverselyproportional to the number of nodes requesting to use the channel.Additionally,the throughput is somewhat reduced due to RTS packet overhead.BreezeNET PRO.11modems can be configured as repeaters,although two modems(an AP and a WB)are required to set up a repeater set.Only after adding a second repeater pair was there a slight degradation in the overall throughput.Results obtained in the laboratory tests show that adding a2W amplifier can increase the range by a factor of four when the throughput is saturated at a packet size of512bytes.Field tests show that the range is not only a function of transmission power and received signal level,but also the antenna type,position,and other environmental factors and radio wave properties.Highly directional antennae such as the Yagi and the patch antenna significantly improved the maximum range.The Yagi antenna is much more directional than the patch antenna and as a result there is not much room for play.The patch antenna was able to transmit even when faced90°away, although the effective range was reduced by about half.Tests also show that raising the antenna from its current position on the URBOT(6”)to heights of12”or more can significantly improve the range even with omni-directional antennae.The Multicast performance test shows that the data rate does not exceed1-Mbps.The BreezeNET modem parameters related to the multicast data rate have no effect.The BreezeNET PRO.11modems were able to successfully communicate with another 802.11compliant radio,at a data rate no greater than1-Mbps.The overall results show that significant improvements in throughput cannot be made in the URBOT/OCU infrastructure by simply changing the default modem parameters.Removing the small overhead of the RTS packets by disabling the RTS feature can make a slight improvement since it is not needed in the current point-to-point topology used in the URBOT/OCU combination.A more significant improvement can be made in the effective range by replacing the current whip antennae with patch antennae.Results show that the maximum range obtained from worst-case scenario of the patch antennae in comparable,if not better,than the whip antennae.Raising the antenna height will bring about further improvements.This option,however,is not practical given the requirements of the URBOT(the URBOT is invertible;therefore raising the antenna on one side will hamper its operation should the URBOT turn over).4.0References[BreezeCOM]BreezeNET PRO.11Series User’s Guide,BreezeCOM Ltd.,Cat.No.213083,1999[Breyer,Riley]Switched,Fast,And Gigabit Ethernet,3rd Edition,Robert Breyer&SeanRiley,New Riders Publishing,1999[EREPS]Engineer’s Refractive Effects Prediction System,Program:PROPH version3.0,Naval Command,Control and Ocean Surveillance Center(NCCOSC),D833,October1996[Geier]Wireless LANs:Implementing Interoperable Networks,1st Edition,JimGeier,Macmillan Technical Publishing,1999[SSC-SD1]IEEE802.11FHSS System Test Report,Space and Naval Warfare Systems Center,San Diego(SSC-SD),D855[SSC-SD2]Wireless Local Area Network Test Plan,v1.01,Space and Naval WarfareSystems Center,San Diego(SSC-SD),D85。
IEEE 802(完整版).11、802(完整版).15、802(完整版).16、802(完整版).20标准简介(完整版).ppt
802.11:无线局域网Wireless LAN
802.15:无线个域网 Wireless Personal Area Network
802.16:宽带无线接入 Broadband Wireless Access
802.17:弹性分组环 Resilient Packet Ring
802.18:无线管制 RadiE 802简介
802.1 :高层局域网协议Higher Layer LAN Protocols
802.2 :逻辑链路控制Logical Link Control
802.3 :以太网Ethernet
802.4 :令牌总线Token Bus
802.5 :令牌环Token Ring
802.19:共存 Coexistence TAG
802.20:移动宽带无线接入 Mobile Broadband Wireless Access (MBWA)
802.21:媒质无关切换 Media Independent Handoff
.,
3
IEEE 802.11系列标准简介
.,
4
802.11标准简介
蓝牙是第一个面向低速率应用的标准,但是它的市场情况不 太理想,其原因之一是受WiFi(802.11b) 的冲击,WiFi产品的 价格大幅度下降在某些应用方面抑制了蓝牙的优势。另一个原因 是蓝牙为了覆盖更多的应用和提供QoS使其偏离了原来设计简单的 目标,复杂使蓝牙变得昂贵,不再适合那些要求低功率、低成本
802.15.3也称WiMedia,旨在实现高速率。其原始版本 规定的速率高达55Mbit/s,使用基于802.11但不兼容的 物理层。后来多数厂商倾向于使用802.15.3a,它使用 超宽带(UWB)的多频段OFDM联盟(MBOA)的物理 层,速率高达480Mbit/s。
Performance Evaluation of the IEEE 802.11p WAVE Communication Standard 中文翻译
C.曼哈顿电网低数据情况下的通信量
在第二次模拟场景中,我们使用的场景 大小 2000 米×2000 米分为 500 个米长度的 一个网格。在内部网格边界道路都位于生成 曼哈顿网格。该节点将在这些道路上,平均 速度 60 公里/秒。仿真时间设定为 15 分钟。 每个节点使用指数到达间隔时间与生成的 消息平均参数标签在二中给出。模拟与运行 不同的节点密度已经进行,其中 100 个节点 相当于平均 1.9 邻居,200 个节点是相当于 3.8 邻居,和 300 个节点相当于 5.9 邻居。
表格-Ⅱ 交通荷载参数
D.曼哈顿电网高数据情况下的通信量 在模拟中使用高数据流量各自的应用
消息生成参数表二。他们仅仅导致比低数据 流量方案两倍多一点的负荷,。
发送和接收的消息的平均数目 每个节点的绘制见图 10。节所描述的影响。 Ⅳ-C 为低数据流量可以在高看到结果负载 的情况下更大。由于高负荷由于模拟控制器 0 和 1 的减少与广播的数量越来越多的节 点。这种下降几乎为 0 指数,而 AC1 是以线 性方式跌幅的,同样的效果,但并在发生模 拟控制器 2 和 3(见图 10(b))中并不严 重。而在模拟控制器 2 降低的消息数 16%比 15000 的平均的发送的消息,消息在 AC3 数 仍下降 9%相比 11250 的平均消息发送。一个 高度的影响饱和信道和为不同的模拟控制 器的后果可以清楚地看到在接收机侧(图 10 (c))。第一接收的数据包数(0 开始在 100 节点)然后接收的数据包数(AC1 200 开始节点)严重下降。高优先级的模拟控制 器不影响严重,然而,为了进一步增加节, 点的吞吐量也将达到一个最大值。
在车载环境下无线接入的 MAC 层相当于 IEEE 802.11e 增 强 的 分 布 式 信 道 接 入 (EDCA)质量服务(QoS)的扩展[ 3 ]。因 此,应用程序消息分为不同的 ACS,其中 AC0 具有最低的优先级和 AC3 的最高优先级。在 MAC 层的数据包中,每个 AC 队列存在的分组 的选择时四个 ACS 内容内部传输。选定分组 然后竞争信道从外部使用其选择的竞争参 数,竞争参数用于 CCH 显示选项卡。我们计 算的 CWmin 和 CWmax 值。CWmin=15,CWmax = 1023 都有使用价值。
802.11简介
Key Features
TDLS Discovery TDLS Setup/Teardown TDLS U-APSD TDLS Peer Power Save Mode TDLS Channel Switching
NAS Drive 11n Radio
AP 11gRadio
TDLS
802.11 -2012
802.11n High Throughput (>100 Mbps)
802.11W Management Frame Security
PHY
2
IEEE 802.11 Revisions
MAC
802.11ak GLK 802.11aq PAD Smart Grid High Efficiency WLAN WNG 802.11 ah 802.11af TVWS 802.11ac VHT 5GHz 802.11ai FILS 802.11aa Video Transport
Bandwidth
Maximum 40MHz
MCS
BPSK, QPSK, 64QAM
BPSK, QPSK, 64QAM, 256 QAM (optional)
11.5 times
11
Max Throughput
600 Mbps
6933.3 Mbps
IEEE 802.11ad
Goal
A maximum single link throughput of at least 1Gbps
802.11r Fast Roam 802.11k RRM
802.11Y
802.11 -2003
j JPห้องสมุดไป่ตู้bands
计算机 毕业论文 外文文献翻译 中英文:IEEE802.11 媒体接入控制
英文资料与中文翻译IEEE 802.11 MEDIUM ACCESS CONTROLThe IEEE 802.11 MAC layer covers three functional areas:reliable data delivery, medium access control, and security. This section covers the first two topics.Reliable Data DeliveryAs with any wireless network, a wireless LAN using the IEEE 802.11 physical and MAC layers is subject to considerable unreliability. Noise, interference, and other propagation effects result in the loss of a significant number of frames. Even with error-correction codes, a number of MAC frames may not successfully be received. This situation can be dealt with by reliability mechanisms at a higher layer. such as TCP. However, timers used for retransmission at higher layers are typically on the order of seconds. It is therefore more efficient to deal with errors at the MAC level. For this purpose, IEEE 802.11 includes a frame exchange protocol. When a station receives a data frame from another station. It returns an acknowledgment (ACK) frame to the source station. This exchange is treated as an atomic unit, not to be interrupted by a transmission from any other station. If the source does not receive an ACK within a short period of time, either because its data frame was damaged or because the returning ACK was damaged, the source retransmits the frame.Thus, the basic data transfer mechanism in IEEE802.11 involves an exchange of two frames. To further enhance reliability, a four-frame exchange may be used. In this scheme, a source first issues a request to send (RTS) frame to the destination. The destination then responds with a clear to send (CTS). After receiving the CTS, the source transmits the data frame, and the destination responds with an ACK. The RTS alerts all stations that are within reception range of the source that an exchange is under way; these stations refrain from transmission in order to avoid a collision between two frames transmitted at the same time. Similarly, the CTS alerts all stations that are within reception range of the destination that an exchange is under way. The RTS/CTS portion of the exchange is a required function of the MAC but may be disabled.Medium Access ControlThe 802.11 working group considered two types of proposals for a MAC algorithm: distributed access protocols, which, like Ethernet, distribute the decision to transmit over all the nodes using a carrier-sense mechanism; and centralized access protocols, which involve regulation of transmission by a centralized decision maker. A distributed access protocol makes sense for an ad hoc network of peer workstations (typically an IBSS) and may also be attractive in other wireless LAN configurations that consist primarily of burst traffic. A centralized access protocol is natural for configurations in which a umber of wireless stations are interconnected with each other and some sort of base station that attaches to a backbone wired LAN: it is especially useful if some of the data is time sensitive or high priority.The end result for 802.11 is a MAC algorithm called DFWMAC (distributed foundation wireless MAC) that provides a distributed access control mechanism with an optional centralized control built on top of that. Figure 14.5 illustrates the architecture. The lower sub-layer of the MAC layer is the distributed coordination function (DCF). DCF uses a contention algorithm to provide access to all traffic. Ordinary asynchronous traffic directly uses DCE. The point coordination function (PCF) is a centralized MAC algorithm used to provide contention-free service. PCF is built on top of DCF and exploits features of DCF to assure access for its users. Let us consider these two sub-layers in turn.MAClayerFigure 14.5 IEEE 802.11 Protocol ArchitectureDistributed Coordination FunctionThe DCF sub-layer makes use of a simple CSMA (carrier sense multiple access) algorithm, which functions as follows. If a station has a MAC frame to transmit, it listens to the medium. If the medium is idle, the station may transmit; otherwise the station must wait until the current transmission is complete before transmitting. The DCF does not include a collision detection function (i.e. CSMA/CD) because collision detection is not practical on a wireless network. The dynamic range of the signals on the medium is very large, so that a transmitting station cannot effectively distinguish incoming weak signals from noise and the effects of its own transmission.To ensure the smooth and fair functioning of this algorithm, DCF includes a set of delays that amounts to a priority scheme. Let us start by considering a single delay known as an inter-frame space (IFS). In fact, there are three different IFS values, but the algorithm is best explained by initially ignoring this detail. Using an IFS, the rules for CSMA access are as follows (Figure 14.6):Figure 14.6 IEEE 802.11 Medium Access Control Logic1. A station with a frame to transmit senses the medium. If the medium is idle. It waits to see if the medium remains idle for a time equal to IFS. If so , the station may transmit immediately.2. If the medium is busy (either because the station initially finds the medium busy or because the medium becomes busy during the IFS idle time), the station defers transmission and continues to monitor the medium until the current transmission is over.3. Once the current transmission is over, the station delays another IFS. If the medium remains idle for this period, then the station backs off a random amount of time and again senses the medium. If the medium is still idle, the station may transmit. During the back-off time, if the medium becomes busy, the back-off timer is halted and resumes when the medium becomes idle.4. If the transmission is unsuccessful, which is determined by the absence of an acknowledgement, then it is assumed that a collision has occurred.To ensure that back-off maintains stability, a technique known as binary exponential back-off is used. A station will attempt to transmit repeatedly in the face of repeated collisions, but after each collision, the mean value of the random delay is doubled up to some maximum value. The binary exponential back-off provides a means of handling a heavy load. Repeated failed attempts to transmit result in longer and longer back-off times, which helps to smooth out the load. Without such a back-off, the following situation could occur. Two or more stations attempt to transmit at the same time, causing a collision. These stations then immediately attempt to retransmit, causing a new collision.The preceding scheme is refined for DCF to provide priority-based access by the simple expedient of using three values for IFS:●SIFS (short IFS):The shortest IFS, used for all immediate responseactions,as explained in the following discussion●PIFS (point coordination function IFS):A mid-length IFS, used by thecentralized controller in the PCF scheme when issuing polls●DIFS (distributed coordination function IFS): The longest IFS, used as aminimum delay for asynchronous frames contending for access Figure 14.7a illustrates the use of these time values. Consider first the SIFS.Any station using SIFS to determine transmission opportunity has, in effect, the highest priority, because it will always gain access in preference to a stationwaiting an amount of time equal to PIFS or DIFS. The SIFS is used in the following circumstances:●Acknowledgment (ACK): When a station receives a frame addressed onlyto itself (not multicast or broadcast) it responds with an ACK frame after, waiting on1y for an SIFS gap. This has two desirable effects. First, because collision detection IS not used, the likelihood of collisions is greater than with CSMA/CD, and the MAC-level ACK provides for efficient collision recovery. Second, the SIFS can be used to provide efficient delivery of an LLC protocol data unit (PDU) that requires multiple MAC frames. In this case, the following scenario occurs. A station with a multi-frame LLC PDU to transmit sends out the MAC frames one at a time. Each frame is acknowledged after SIFS by the recipient. When the source receives an ACK, it immediately (after SIFS) sends the next frame in the sequence. The result is that once a station has contended for the channel, it will maintain control of the channel until it has sent all of the fragments of an LLC PDU.●Clear to Send (CTS):A station can ensure that its data frame will getthrough by first issuing a small. Request to Send (RTS) frame. The station to which this frame is addressed should immediately respond with a CTS frame if it is ready to receive. All other stations receive the RTS and defer using the medium.●Poll response: This is explained in the following discussion of PCF.longer than DIFS(a) Basic access methoddefers(b) PCF super-frame constructionFigure 14.7 IEEE 802.11 MAC TimingThe next longest IFS interval is the: PIFS. This is used by the centralized controller in issuing polls and takes precedence over normal contention traffic. However, those frames transmitted using SIFS have precedence over a PCF poll.Finally, the DIFS interval is used for all ordinary asynchronous traffic.Point C00rdination Function PCF is an alternative access method implemented on top of the DCE. The operation consists of polling by the centralized polling master (point coordinator). The point coordinator makes use of PIFS when issuing polls. Because PI FS is smaller than DIFS, the point coordinator call seize the medium and lock out all asynchronous traffic while it issues polls and receives responses.As an extreme, consider the following possible scenario. A wireless network is configured so that a number of stations with time, sensitive traffic are controlled by the point coordinator while remaining traffic contends for access using CSMA. The point coordinator could issue polls in a round—robin fashion to all stations configured for polling. When a poll is issued, the polled station may respond using SIFS. If the point coordinator receives a response, it issues another poll using PIFS. If no response is received during the expected turnaround time, the coordinator issues a poll.If the discipline of the preceding paragraph were implemented, the point coordinator would lock out all asynchronous traffic by repeatedly issuing polls. To prevent this, an interval known as the super-frame is defined. During the first part of this interval, the point coordinator issues polls in a round, robin fashion to all stations configured for polling. The point coordinator then idles for the remainder of the super-frame, allowing a contention period for asynchronous access.Figure l4.7 b illustrates the use of the super-frame. At the beginning of a super-frame, the point coordinator may optionally seize control and issues polls for a give period of time. This interval varies because of the variable frame size issued by responding stations. The remainder of the super-frame is available for contention based access. At the end of the super-frame interval, the point coordinator contends for access to the medium using PIFS. If the medium is idle. the point coordinator gains immediate access and a full super-frame period follows. However, the medium may be busy at the end of a super-frame. In this case, the point coordinator must wait until the medium is idle to gain access: this result in a foreshortened super-frame period for the next cycle.OctetsFC=frame control SC=sequence controlD/I=duration/connection ID FCS=frame check sequence(a ) MAC frameBitsDS=distribution systemMD=more data MF=more fragmentsW=wired equivalent privacy RT=retryO=orderPM=power management (b) Frame control filedFigure 14.8 IEEE 802.11 MAC Frame FormatMAC FrameFigure 14.8a shows the 802.11 frame format when no security features are used. This general format is used for all data and control frames, but not all fields are used in all contexts. The fields are as follows:● Frame Control: Indicates the type of frame and provides contr01information, as explained presently.● Duration/Connection ID: If used as a duration field, indicates the time(in-microseconds) the channel will be allocated for successful transmission of a MAC frame. In some control frames, this field contains an association, or connection, identifier.●Addresses: The number and meaning of the 48-bit address fields dependon context. The transmitter address and receiver address are the MAC addresses of stations joined to the BSS that are transmitting and receiving frames over the wireless LAN. The service set ID (SSID) identifies the wireless LAN over which a frame is transmitted. For an IBSS, the SSID isa random number generated at the time the network is formed. For awireless LAN that is part of a larger configuration the SSID identifies the BSS over which the frame is transmitted: specifically, the SSID is the MAC-level address of the AP for this BSS (Figure 14.4). Finally the source address and destination address are the MAC addresses of stations, wireless or otherwise, that are the ultimate source and destination of this frame. The source address may be identical to the transmitter address and the destination address may be identical to the receiver address.●Sequence Control: Contains a 4-bit fragment number subfield used forfragmentation and reassembly, and a l2-bit sequence number used to number frames sent between a given transmitter and receiver.●Frame Body: Contains an MSDU or a fragment of an MSDU. The MSDUis a LLC protocol data unit or MAC control information.●Frame Check Sequence: A 32-bit cyclic redundancy check. The framecontrol filed, shown in Figure 14.8b, consists of the following fields.●Protocol Version: 802.11 version, current version 0.●Type: Identifies the frame as control, management, or data.●Subtype: Further identifies the function of frame. Table 14.4 defines thevalid combinations of type and subtype.●To DS: The MAC coordination sets this bit to 1 in a frame destined to thedistribution system.●From DS: The MAC coordination sets this bit to 1 in a frame leaving thedistribution system.●More Fragments: Set to 1 if more fragments follow this one.●Retry: Set to 1 if this is a retransmission of a previous frame.●Power Management: Set to]if the transmitting station is in a sleep mode.●More Data: Indicates that a station has additional data to send. Each blockof data may be sent as one frame or a group of fragments in multiple frames.●WEP:Set to 1 if the optional wired equivalent protocol is implemented.WEP is used in the exchange of encryption keys for secure data exchange.This bit also is set if the newer WPA security mechanism is employed, as described in Section 14.6.●Order:Set to 1 in any data frame sent using the Strictly Ordered service,which tells the receiving station that frames must be processed in order. We now look at the various MAC frame types.Control Frames Control frames assist in the reliable delivery of data frames. There are six control frame subtypes:●Power Save-Poll (PS-Poll): This frame is sent by any station to the stationthat includes the AP (access point). Its purpose is to request that the AP transmit a frame that has been buffered for this station while the station was in power saving mode.●Request to Send (RTS):This is the first frame in the four-way frameexchange discussed under the subsection on reliable data delivery at the beginning of Section 14.3.The station sending this message is alerting a potential destination, and all other stations within reception range, that it intends to send a data frame to that destination.●Clear to Send (CTS): This is the second frame in the four-way exchange.It is sent by the destination station to the source station to grant permission to send a data frame.●Acknowledgment:Provides an acknowledgment from the destination tothe source that the immediately preceding data, management, or PS-Poll frame was received correctly.●Contention-Free (CF)-End: Announces the end of a contention-freeperiod that is part of the point coordination function.●CF-End+CF-Ack:Acknowledges the CF-End. This frame ends thecontention-free period and releases stations from the restrictions associated with that period.Data Frames There are eight data frame subtypes, organized into two groups. The first four subtypes define frames that carry upper-level data from the source station to the destination station. The four data-carrying frames are as follows: ●Data: This is the simplest data frame. It may be used in both a contentionperiod and a contention-free period.●Data+CF-Ack: May only be sent during a contention-free period. Inaddition to carrying data, this frame acknowledges previously received data.●Data+CF-Poll: Used by a point coordinator to deliver data to a mobilestation and also to request that the mobile station send a data frame that it may have buffered.●Data+CF-Ack+CF-Poll: Combines the functions of the Data+CF-Ack andData+CF-Poll into a single frame.The remaining four subtypes of data frames do not in fact carry any user data. The Null Function data frame carries no data, polls, or acknowledgments. It is used only to carry the power management bit in the frame control field to the AP, to indicate that the station is changing to a low-power operating state. The remaining three frames (CF-Ack, CF-Poll,CF-Ack+CF-Poll) have the same functionality as the corresponding data frame subtypes in the preceding list (Data+CF-Ack, Data+CF-Poll, Data+CF-Ack+CF-Poll) but withotit the data. Management FramesManagement frames are used to manage communications between stations and APs. The following subtypes are included:●Association Request:Sent by a station to an AP to request an association,with this BSS. This frame includes capability information, such as whether encryption is to be used and whether this station is pollable.●Association Response:Returned by the AP to the station to indicatewhether it is accepting this association request.●Reassociation Request: Sent by a station when it moves from one BSS toanother and needs to make an association with tire AP in the new BSS. The station uses reassociation rather than simply association so that the new AP knows to negotiate with the old AP for the forwarding of data frames.●Reassociation Response:Returned by the AP to the station to indicatewhether it is accepting this reassociation request.●Probe Request: Used by a station to obtain information from anotherstation or AP. This frame is used to locate an IEEE 802.11 BSS.●Probe Response: Response to a probe request.●Beacon: Transmitted periodically to allow mobile stations to locate andidentify a BSS.●Announcement Traffic Indication Message: Sent by a mobile station toalert other mobile stations that may have been in low power mode that this station has frames buffered and waiting to be delivered to the station addressed in this frame.●Dissociation: Used by a station to terminate an association.●Authentication:Multiple authentication frames are used in an exchange toauthenticate one station to another.●Deauthentication:Sent by a station to another station or AP to indicatethat it is terminating secure communications.IEEE802.11 媒体接入控制IEEE 802.11 MAC层覆盖了三个功能区:可靠的数据传送、接入控制以及安全。
802.11p MAC层解析 车联网
Evaluation of the IEEE 802.11p MAC method for Vehicle-to-Vehicle CommunicationKatrin Bilstrup†,§, Elisabeth Uhlemann†,‡, Erik G. Ström†,§ and Urban Bilstrup††Centre for Research on Embedded Systems ‡Volvo Technology Corporation§Department of Signals and Systems Halmstad University Transport, Information and Communication Chalmers University of Technology Box 823, SE-301 18 Halmstad, Sweden M1:6, SE-405 08 Göteborg, Sweden SE-412 96 Göteborg, Sweden Email: Katrin.Bilstrup@hh.se, Elisabeth.Uhlemann@hh.se, Erik.Strom@chalmers.se and Urban.Bilstrup@hh.seAbstract – In this paper the medium access control (MAC) me-thod of the upcoming vehicular communication standard IEEE 802.11p has been simulated in a highway scenario with periodic broadcast of time-critical packets (so-called heartbeat messages) in a vehicle-to-vehicle situation. The 802.11p MAC method is based on carrier sense multiple access (CSMA) where nodes lis-ten to the wireless channel before sending. If the channel is busy, the node must defer its access and during high utilization periods this could lead to unbounded delays. This well-known property of CSMA is undesirable for time-critical communications. The si-mulation results reveal that a specific node/vehicle is forced to drop over 80% of its heartbeat messages because no channel access was possible before the next message was generated. To overcome this problem, we propose to use self-organizing time division multiple access (STDMA) for real-time data traffic be-tween vehicles. This MAC method is already successfully applied in commercial surveillance applications for ships (AIS) and air-planes (VDL mode 4). Our initial results indicate that STDMA outperforms CSMA for time-critical traffic safety applications in ad hoc vehicular networks.I. I NTRODUCTIONThe area of intelligent transportation systems (ITS) has at-tracted a lot of attention during the last years due to the range of new applications enabled by emerging wireless communica-tion technologies. Existing in-vehicle safety systems together with new cooperative systems using wireless data communica-tion between vehicles can potentially decrease the number of accidents on the roads. Due to this, a tremendous interest in cooperating safety systems for vehicles can be noticed through the extensive range of project activities around the world. Lane departure warning, merge assistance and emergency ve-hicle routing are all examples of applications which can be found in for example the American VII [1], the European Sa-fespot [2], and the Japanese DSSS [3] projects.These new traffic safety systems implies increased re-quirements on the wireless communication and the challenge is not only to overcome the behavior of the unpredictable wireless channel but also to cope with rapid network topology changes together with strict timing and reliability require-ments. The timing requirements can be deduced from the fact that it is only relevant to communicate about an upcomingThis work was funded in part by the Knowledge Foundation, www.kks.se.The authors would also like to acknowledge COST2100 SIG C for fruitfuldiscussions, . dangerous situation before the situation is a fact and perhaps can be avoided (e.g., communicate a probable collision before the vehicles are colliding). Therefore traffic safety systems could be classified as real-time systems [4]. Real-time com-munication implies that there needs to be an upper bound on the communication delay that is smaller than the deadline. If the correct data does not reach its intended recipient before a certain deadline in a real-time system, the data is more or less useless and the missed deadline will have more or less severe consequences for the system performance. Communicating real-time messages does not necessarily require a high trans-mission rate, or a low delay, but it does require a predictable system that is able to deliver the message before the deadline. Thus, the ability to predict worst case system behavior is the most important feature in a real-time system.One crucial thing in this respect is how the shared commu-nication channel should be divided in a fair and predictable way among the participating users. This is done through the medium access control (MAC) method. Much attention within the standardization of vehicle communication systems has been devoted to enhancing the M AC method by introducing different quality of service (QoS) classes for data traffic with different priorities [5]. However, in the context of safety appli-cations applied in a high speed vehicular environment, there has been limited discussion about the type of real-time re-quirements actually imposed by the new traffic safety systems and if the MAC method is able to meet these requirements.The MAC layer in a traffic safety application is unlikely to need many different service classes or transfer rates. Instead, to guarantee that time-critical communication tasks meet their deadlines, the MAC method must first of all provide a finite worst case access time to the channel. Once channel access is a fact, different coding strategies, diversity techniques and retransmission schemes can be used to achieve the required correctness and robustness against the impairments of the un-predictable wireless channel. However, if the M AC scheme does not provide an upper bound on the maximum delay be-fore channel access, it is not possible to give any guarantees about meeting deadlines. Information that is delivered after the deadline in a critical real-time communication system is not only useless, but implies severe consequences for the traffic safety system. This problem has also been pointed out in [6].The IEEE 802.11p, also known as dedicated short-range communication (DSRC), is an upcoming WLAN standardintended for future traffic safety systems. This is currently the only standard with support for direct vehicle-to-vehicle (V2V) communication [7]. Unfortunately, the term DSRC is ambi-guous. The original DSRC standards, which are found in Eu-rope, Japan and Korea, are more application-specific standards containing the whole protocol stack with a physical (PHY), a MAC and an application layer. They are intended for hot spot communication such as electronic toll collection systems.The PHY in 802.11p and its capabilities have been treated in several articles [8-10]. The PHY mainly affects the reliabili-ty (error probability) of the system; however, if we do not get channel access the benefits of the PHY cannot be exploited. The 802.11p MAC method is based on carrier sense multiple access (CSM A), where nodes listen to the wireless channel before sending. If the channel is busy, the node must defer its access and during high utilization periods this could lead to unbounded delays. Evaluations and enhancements of CSM A have been proposed in [11-15]. In [11] an investigation of 802.11p is made using real-world application data traffic, col-lected from three vehicles communicating with each other on a highway in the US. However, this scenario does not show the scalability problem of the MAC protocol. All MAC methods will function well as long as they are not loaded in terms of nodes and data traffic. Hence, a worst case analysis of a vehi-cular communication system is needed. The performance of 802.11p is evaluated analytically and through simulation in [12]. It is concluded that 802.11p cannot ensure time-critical message dissemination due to the amount of data that needs to be sent. The solution proposed in [12] is to decrease the amount of data traffic. The suggested enhancements of 802.11p include trying to avoid packet collisions by using a polling scheme [13] or by decreasing the amount of data traf-fic, e.g., through better prioritization [14-15]. However, none of these papers clearly point out that the MAC layer lacks the real-time properties required by traffic safety systems.This paper evaluates the real-time requirements on the M AC protocol when used in a d hoc vehicle communication systems for low-delay traffic safety applications. Next two different MAC methods are evaluated by means of computer simulations: the MAC method in 802.11p, CSMA, and a solu-tion potentially better suited for decentralized real-time sys-tems, namely self-organizing time division multiple access (STDM A). First, an introduction to the concept of M AC is given together with functionality descriptions of CSM A and STDMA. Next, the system model is detailed and results from the simulator are presented. The paper is concluded with a discussion and conclusions regarding the two examined MAC methods in the context of traffic safety applications.II. M EDIUM A CCESS C ONTROLA vehicular a d hoc network (VANET) is a spontaneous, unstructured network based on direct V2V communication and its topology is changing constantly due to the high mobility of the nodes. In a VANET it is harder to deploy a MAC scheme that is relying on a centralized controller, e.g., time division multiple access (TDM A), frequency division multiple access (FDMA), or code division multiple access (CDMA). In a cen-tralized, infrastructure-based network, a base station or an access point is responsible for sharing the resources among the users, thereby enabling guaranteed QoS for time-sensitive data traffic. The idea of having a node that could act as a central control unit in a distributed VANET is not appealing because of the high mobility nodes. The central unit would not remain central for long and constantly changing the central unit would require much information exchange and negotiation among the nodes. The negotiation can be expected to incur excessive de-lay and once a decision is made it is likely to already be out-dated. A MAC scheme that does not require a central control unit is CSMA, where each node starts by listening to the wire-less channel and transmits only if the channel is free. This scheme is easily deployed in a distributed network, but has one big disadvantage; the nodes could experience unbounded de-lays due to constantly sensing a busy channel during high uti-lization periods. This is not acceptable in real-time systems. Real-time systems such as traffic safety applications, call for a deterministic MAC method. We define a deterministic MAC method to be a scheme for which the time from channel access request to channel access has a finite upper bound. In the fol-lowing we will evaluate CSMA and STDMA in this respect. A. IEEE 802.11pAn upcoming amendment to the WLAN standard IEEE 802.11 is the DSRC standard of North America. This standard, 802.11p[16] intended for V2V communication, is still in its draft stage. It will make use of the PHY supplement 802.11a and the MAC layer QoS amendment from 802.11e. The IEEE 802.11p is one part in the protocol stack called Wireless Access in Vehicular Environments (WAVE) developed by IEEE. 802.11p will use the enhanced distributed channel access (EDCA) as M AC method, which is an enhanced ver-sion of the basic distributed coordination function (DCF) from 802.11. EDCA uses CSM A with collision avoidance (CSMA/CA), meaning that the node starts by listening to the channel, and if it is free for an AIFS (arbitration interframe space), the node starts transmitting directly. If the channel is busy or becomes busy during the AIFS, the node must perform a backoff. The backoff procedure in 802.11 works as follows: (i) draw an integer from a uniform distribution [0, CW], (ii) multiply this integer with the slot time derived from the PHY in use to get a backoff value, (iii) decrement the backoff value only when the channel is free, (iv) when reaching a backoff value of 0, send immediately.The MAC protocol of 802.11 is a stop-and-wait protocol and therefore the sender awaits an acknowledgment (ACK). If no ACK is received due to e.g., the transmitted packet never reaching the recipient, the packet being incorrect at reception, or the ACK being lost or corrupted, a backoff procedure is invoked before a retransmission is allowed. For every attempt to send a specific packet, the size of the contention window (CW) will be doubled from its initial value (CW start) until a maximum value (CW end) is reached. This is due to the fact that during high utilization periods, it is convenient to spread the nodes that want to send in time. After a successful transmis-sion or when the packet had to be thrown away because the maximum number of channel access attempts was reached, the contention window will be set to its initial value again. In 802.11p different QoS classes are obtained by prioritizing the data traffic within each node. There are four different priority levels implying that each station maintains four queues. These queues have different AIFS and different backoff parameters, e.g., the higher priority, the shorter AIFS. In a broadcast situa-tion, i.e., when packets destined for all nodes are transmitted, none of the receiving nodes will send ACKs in response. Therefore, a sender never knows if anyone has received the transmitted packet correctly, and it will perform at most one backoff (which occurs when a busy channel is sensed at the initial channel access attempt). Hence, at most one backoff decrement will take place for broadcasted packets.B. Self-Organizing Time Division Multiple AccessThe STDMA algorithm, invented by Håkan Lans [17, 18], is already used in commercial applications for surveillance, i.e., the Automatic Identification System (AIS) used by ships and the VHF data link (VDL) mode 4 system used by the avionics industry. Traditional surveillance applications for airplanes and ships are based on ground infrastructure with radar support. Radar has shortcomings such as the inability to see behind large obstacles or incorrect radar images due to bad weather conditions. By adding data communication based on STDM A, more reliable information can be obtained about other ships and airplanes in the vicinity and thereby accidents can be avoided. Since STDMA is so successful in these sys-tems, it is interesting to investigate if it can manage a more dynamic setting such as a vehicular network.STDM A is a decentralized M AC scheme where the net-work members themselves are responsible for sharing the communication channel. Nodes utilizing this algorithm, will broadcast periodic data messages containing information about their position. The algorithm relies on the nodes being equipped with GPS receivers. Time is divided into frames as in a TDMA system and all stations are striving for a common frame start. These frames are further divided into slots, which typically corresponds to one packet duration. The frame of AIS and VDL mode 4 is one minute long and is divided into 2250 slots of approximately 26 ms each. All network members start by determining a report rate, i.e., how many position messages that will be sent during one frame. Then follows four different phases; initialization, network entry, first frame, and continuous opera tion. During the initialization, a node will listen to the channel activity during one frame length to deter-mine the slot assignments. In the network entry phase, the node determines its own transmission slots within each frame according to the following rules: (i) calculate a nominal in-crement (NI) by dividing the number of slots with the report rate, (ii) randomly select a nominal start slot (NSS) drawn from the current slot up to NI, (iii) determine a selection inter-val (SI) of slots as 20% of NI and put this around the NSS ac-cording to Fig. 1, (iv) now the first actual transmission slot is determined by picking a slot randomly within SI and this will be the nominal transmission slot (NTS). If the chosen NTS is occupied, then the closest free slot within SI is chosen. If all slots within the SI are occupied, the slot used by a node fur-thest away from oneself will be chosen. When the first NTS is reached in the superframe, the node will enter the third phase called the first frame. Here a nominal slot (NS) is decided for the next slot transmission within a frame and the procedure of determining the next NTS will start over again. This procedure will be repeated as many times as decided by the report rate (i.e., the number of slots each node uses within each frame), Fig. 1.Figure 1. The STDMA algorithm in the first frame phase.After the first frame phase (which lasts for one frame) when all NTS were decided, the station will enter the continuous operation phase, using the NTSs decided during the first frame phase for transmission. During the first frame phase, the node draws a random integer {}3,...,8n∈for each NTS. After the NTS has been used for n frames, a new NTS will be allocated in the same SI as the original NTS. This procedure of chang-ing slot after a certain number of frames is to cater for network changes, e.g., two nodes using the same NTS which were not in radio range of each other when the NTS was chosen could have come closer and will then interfere. The STDMA relies on the position information sent by other network members and it will not work without this.III. S IMULATIONSMany future traffic safety systems will rely on vehicles pe-riodically broadcasting messages containing their current state (e.g., position, speed, etc). We have developed a simulator in Matlab where each vehicle sends a position message according to a predetermined heartbeat of 5 or 10 Hz. Simulations have been conducted both for the CSMA of 802.11p as well as for the proposed STDMA algorithm. The vehicle traffic scenario is a highway of 10 000 meter with 5 lanes in each direction. The highway scenario is chosen because here the highest rela-tive speeds in vehicular environments are found and hence it should constitute the biggest challenge for the MAC layer. The vehicles are entering each lane of the highway according to a Poisson process with a mean inter-arrival time of 3 seconds (consistent with the 3-second-rule used in Sweden, which re-commends drivers to maintain a 3 second spacing between vehicles). The speed of each vehicle is modeled as a Gaussian random variable with different mean values for each lane; 23 m/s (~83 km/h), 30 m/s (~108 km/h) and 37 m/s (~133 km/h), and a standard deviation of 1 m/s. For simplicity we assume that no overtaking is possible and vehicles always remain in the same lane. There is no other data traffic in addition to the heartbeat broadcast messages. The channel model is a simplecircular transmission model where all vehicles within a certain sensing range will sense and receive packets perfectly. The simulated sensing ranges are 500 m and 1000 m. We focus onhow the two MAC methods perform in terms of time between channel access request until actual channel access within each node. Three different packet lengths have been considered: 100, 300 and 500 byte. The shortest packet length is just long enough to distribute the position, direction and speed, but dueto security overhead, the packets are likely longer. The transferrate is chosen to be the lowest rate supported by 802.11p, namely 3 Mbps. Since all vehicles in the simulation are broad-casting, no ACKs are used. Table 1 contains a summary of the simulation parameter settings.Table 1. Simulation parameter setting for highway scenario simulationParameter Value Length of highway 10 000 mNumber of lanes 10 (5 in each direction)Speed of vehicles 70-140 km/hPacket sending frequency 5, 10 HzPacket length 100, 300, 500 byteTransfer rate 3 MbpsSensing range 500, 1000 meterAIFS (listening time before sending)CSMA parameter34μs (highest priority)STDMA frame size 1 sNo of slots in the STDMA frame 3076 slots (100 byte packets), 1165 slots (300 byte) 718 slots (500 byte)IV. R ESULTSWe evaluate CSM A and STDM A in terms of channel access delay, i.e., the time between channel access request and the actual channel access. Simulations have been carried out with the parameter settings in Table 1, yielding 12 differentscenarios. Data from the simulations have been collected only when the highway was filled with vehicles, i.e., not in the be-ginning of the simulation and not close to the edges of the highway.The results from all 12 simulated scenarios using CSMA are shown in Table 2 where the numbers represent the packet drops in percent. A packet is dropped (discarded) by the node when the next heartbeat packet is generated. The old packet is dropped because a newer packet with more accurate position data has arrived from the application within the node. We con-sider the channel access delay to be infinite for dropped pack-ets.Table 2. Packet drops on average for different data traffic scenarios.CSMA Sensing range:500 meter 1000 meter Heartbeat rate: 5 Hz 10 Hz 5 Hz 10 HzPacket length: 100 byte 0% 0% 0% 0% 300 byte 0% 0% 0% 35% 500 byte 0% 22% 33% 53%From Table 2 it can be seen that, if 500 byte long packets are sent every 100 ms and the sensing range is 1000 meters, only 47% of the channel access requests will result in actual chan-nel access for 802.11p. However, this value is averaged over all transmissions made by all vehicles in the system which means that certain nodes experience an even worse situation. In Figure 2, the best and worse performance experienced by a single user is depicted together with the average for all users in the system. In the worst case, a node achieves successful channel access only 16% of the time, i.e., over 80% of all gen-erated packets in this node are dropped. When the sensing range is 1000 meters, a node will compete for the channel with approximately 230 other nodes.Figure 2. Cumulative density functions for the channel access delay in CSMA with a sensing range of 1000 m, report rate 10 Hz and packet length 500 byte.In Figure 3, the results from a sensing range of 500 m are depicted, and the worst-case nodes are experiencing packet drops of 55%. In this scenario, approximately 115 nodes are competing for channel access.Figure 3. Cumulative density functions for the channel access delay in CSMA with a sensing range of 500 m., report rate 10 Hz and packet length 500 byte.The STDMA algorithm will always ensure that a node re-questing channel access will be granted channel access and thus no packets are dropped. If all slots within an SI are occu-pied, the node searching for a new NTS will select a slot be-longing to another node (located furthest away from itself). Since a node using STDM A always achieves channel access albeit by sharing a slot with a node located further away, it is instead interesting to see how many slots that are reused in this way and how far away nodes sharing a slot are. Simulations have been carried out with the same parameter settings found in Table 1. The STDMA frame size of 1 s was kept constant while the number of slots changed for different packet sizes. The results from the STDMA simulations are found in Table 3, where the percentage of slots being reused within sensing range is tabulated. In the case with a sensing range of 1000 meter and a heartbeat of 10 Hz, 30% of all slots are reused within sensing range, i.e., around 200 slots in a frame consist-ing of 718 slots. The average distance between two nodes uti-lizing the same slot is approx. 825 meters. The number of nodes within sensing range is the same as in the CSMA case; ~230 nodes for 1000 m and ~115 nodes for 500 m.Table 3. STDMA results in terms of slot reuse.STDMA Sensing range:500 meter 1000 meter Heartbeat rate: 5 Hz 10 Hz 5 Hz 10 HzPacket length: 100 byte 0% 0% 0% 0% 300 byte 0% 0% 0% 0.1% 500 byte 0% 1% 0% 30%V. C ONCLUSIONSFuture traffic safety system can be classified as real-time systems which mean that the data traffic sent on the wireless channel has a deadline. The most important component of a real-time communication system is the MAC protocol. In this paper, two M AC methods have been evaluated according to their ability to meet real-time deadlines, i.e., having a bound on the time from channel access request to channel access.The MAC of the upcoming vehicular communication stan-dard IEEE 802.11p CSMA was examined through simulation, and the results indicate severe performance degradation for a heavily loaded system, both for individual nodes and for the system as a whole. The simulations show that 802.11p is not suitable for periodic position messages in a highway scenario, if the network load is high (range, packet size and report rate) since some nodes will drop over 80% of their data packets. Heartbeat position messages will be a central part of vehicle communication systems and many traffic safety applications will depend on vehicle locations. The simulation results indi-cate how 802.11p should be configured in order to avoid se-vere performance loss: short packet lengths together with a low heartbeat repetition frequency or shorter range. It should be noted though that if retransmissions are used to increase reliabilty, the system will be heavily loaded already at low heartbeat frequencies. The main drawback with CSMA is its unpredictable behavior, meaning that no finite upper bound on channel access delay exists since nodes could experience un-bounded delays due to collisions. This implies that CSMA is unsuitable for real-time data traffic.The second evaluated algorithm STDM A scheme will al-ways grant channel access regardless of the number of com-peting nodes. If all slots are occupied, a node will use the same slot as another node which is situated furthest away from it. The worst case access time in STDMA is thus bounded and equal to the listening period plus a nominal increment. From a sending perspective STDMA outperforms CSMA during high utilization periods. The reuse of slots in STDMA is not notice-able until 500 byte long packets and an inter-arrival time of 100 ms with a sensing range of 1000 m are used. Then 30% of all slots are reused within sensing range implying a potential increase in interference – but no packet drops. This is much better than the CSM A algorithm using the same data traffic model since increased interference can be combated with cod-ing and diversity, but the 53% packet drops in the correspond-ing CSMA scenario are lost.R EFERENCES[1]VII, /vii/index.htm.[2]SAFESPOT, .[3]DSSS, http://www.utms.or.jp/english/system/dsss.html[4] C. M. Krishna and K. G. Shin, Real-Time Systems, M cGraw-Hill, NewYork, 1997.[5]IEEE Std. 802.11e-2005, Part 11: Wireless LAN Medium Access Control(MAC) a nd Physica l La yer (PHY) Specifica tions: Amendment 8: Me-dium Access Control (MAC) Quality of Service Enhancements, 2005. [6]J. J. Blum, A. Eskandarian, and L. J. Hoffman, ”Challenges of interve-hicle ad hoc networks,” IEEE Trans. Intelligent Transportation Systems, vol. 5, no.4, pp. 347-351, Dec. 2004.[7]K. Bilstrup, “A survey regarding wireless communication standardsintended for a high-speed vehicle environment,” Technical Report IDE 0712, Halmstad University, Sweden, Feb. 2007.[8]L. Stibor, Y. Zang and H-J. Reumermann, “Evaluation of communica-tion distance of broadcast messages in a vehicular ad-hoc network using IEEE 802.11p,” in Proc. IEEE Wireless Communications and Network-ing Conf., Hong Kong, China, Mar. 2007, pp. 254-257.[9]M. Wellen, B. Westphal and P. Mähönen, “Performance evaluation ofIEEE 802.11-based WLANs in vehicular scenarios,” in Proc. IEEE Ve-hicular Technology Conf., Dublin, Ireland, Apr. 2007, pp. 1167-1171. [10]W. Xiang, P. Richardson and J. Guo, “Introduction and preliminaryexperimental results of wireless access for vehicular environments (WAVE) systems,” in Proc. Int. Conf. Mobile and Ubiquitous Systems: Network and Services, San José, CA, US, Jul. 2007, pp. 1-8.[11] F. Bai and H. Krishnan, “Reliability analysis of DSRC wireless commu-nication for vehicle safety applications,” in Proc. IEEE Intelligent Transportation Systems Conf., Toronto, Canada, Sep. 2006, pp. 355-362.[12]S. Eichler, “Performance evaluation of the IEEE 802.11p WAVE com-munication standard,” in Proc. IEEE Vehicula r Technology Conf., Bal-timore, MD, US, Oct. 2007, pp. 2199-2203.[13]N. Choi et al., “A solicitation-based IEEE 802.11p M AC protocol forroadside to vehicular networks,” in Proc. Work. on Mobile Networking for Vehicular Environments, Anchorage, AK, US, May 2007, pp. 91-96.[14] C. Suthaputchakun and A. Ganz, “Priority based inter-vehicle communi-cation in vehicular ad-hoc networks using IEEE 802.11e,” in Proc. IEEE Vehicular Technology Conf., Dublin, Ireland, Apr. 2007, pp. 2595-2599.[15]S. Shankar and A. Yedla, “MAC layer extensions for improved QoS in802.11 based vehicular ad hoc networks,” in Proc. IEEE Int. Conf. on Vehicular Electronics and Safety, Beijing, China, Dec. 2007, pp. 1-6. [16]IEEE P802.11p/D3.0, Pa rt 11: Wireless LAN Medium Access Contrl(MAC) and Physical Layer (PHY) Specifications: Amendment: Wireless Access in Vehicular Environments (WAVE), Draft 3.0, Jul. 2007.[17]H. Lans, Position Indicating System. Patent: US patent 5,506,587 (1996)[18]R. Kjellberg, Ca pa city a nd Throughput Using a Self Orga nized TimeDivision Multiple Access VHF Da ta Link in Surveilla nce Applica tions, Master Thesis, The Royal Institute of Technology, Sweden, Apr. 1998.。
802.11_interp
Interpretation #1Interpretation Number: 1-05/03 (status codes)Topic: 802.11 status codesRelevant Clauses: 7.3.1.9Classification: unambiguousInterpretation RequestIn clause 7 there are several status codes defined that appear in several different frames. Yet, when each of these status codes is to be transmitted and any action to be taken by a station upon reception of these status codes is not specified. Please specify the use of the status codes on both transmission and reception.Interpretation for IEEE STD 802.11-1999 (reaffirmed 2003)The standard defines as valid a set of status codes for use in management frames defined in clause 7 and in MLME primitives defined in clause 10. Normative behavior is provided for status code 0, corresponding to successful status code. Transmission of some status codes during authentication, association and re-association processes are described in Annex C. The standard does not define normative behavior for transmitting other status codes. Reception of status codes is defined by the standard in that the code is passed across the MLME SAP interface to an external entity outside the scope of the standard. This item is being brought to the attention of the 802.11 working group for the possibility of action in a future revision or maintenance change.Interpretation #2Interpretation Number: 2-05/03 (status codes)Topic: 802.11 reason codesRelevant Clauses: 7.3.1.7Classification: unambiguousInterpretation RequestIn clause 7 of IEEE Std. 802.11-1999, the content of a Reason Code field is defined that appears in several different 802.11 frames. There is not any definition of the use of each of the different reason codes on transmission nor any definition of the behavior of a station upon reception of these reason codes. Please define the use of these reason codes for both transmission andreception.Interpretation for IEEE std 802.11-1999 (reaffirmed 2003)The standard defines as valid a set of reason codes for use in management frames defined in clause 7 and in MLME SAP primitives defined in clause 10. Transmission of some reason codes during authentication, association and re-association processes are described in Annex C. The standard does not define normative behavior for transmitting other reason codes. Reception of reason codes is defined by the standard in that the code is passed across the MLME SAP interface to an external entity outside the scope of the standard. This item is being brought to the attention of the 802.11 working group for the possibility of action in a future revision or maintenance change.Interpretation #3Interpretation Number: 3-05/03 (802.11a channels) Topic: 802.11a channel definitions Relevant Clauses: 17.3.8.3.1, 17.3.8.3.2, 17.3.8.3 Classification: unambiguousInterpretation RequestIn IEEE Std. 802.11a-1999, 200 channels are defined, one each centered every 5 MHz from 5000 MHZ to 6000 MHz. Yet only 12 of these channels are defined as legal and only in the US-NII radio bands. How are legal channels defined for regulatory domains, other than the US? Interpretation for IEEE std 802.11-1999 (reaffirmed 2003)The standard defines as valid a set of only those channels for use in the US U-NII band. See clause 17.3.8.3.3 for this definition. It does not define how other sets of valid channels are defined. Current work in both 802.11h and 802.11j are addressing this issue. This item is being brought to the attention of the 802.11 working group for the possibility of action in a future revision or maintenance change.Interpretation #4Interpretation Number: 4-05/03 (Country Information Element)Topic: Country Information Element RelevantClauses: 7.3.2.9 (7.3.2.12 from the requester), 17.3.8.3.3Classification: unambiguousInterpretation RequestAbstractThe current description of the country information element is vague about the precise contentsof the country information element. It remains unclear whether the country information must always contain the full set of regulatory domain information as specified by the regulatory administrations or that a subset of the regulatory domain information can be used as specified by the network operator. Furthermore, it is ambiguous how the country information element should be used in the 5GHz band.Current definition of the country information elementThe country information element contains the information required to allow a station to identify the regulatory domain in which the station is located and to configure its PHY for operation in that regulatory domain.Vague rules for sub band definition in 2GHz bandThe country information element allows the definition of multiple sub bands with each their own maximum transmit power levels.The rules specified for these sub bands are:sub band ranges must not overlap;sub bands must monotonically increase.This definition does not demand that sub bands exactly fill up the regulatory channels.For example, this definition allows network operators to create a country element as follows: The country element contains three sub bands.1) The First Channel Number element of the first sub band is set to channel 1 and the Number of Channels element is set to one.2) The First Channel Number element of the second sub band is set to channel 5 and the Number of Channels element is set to one.3) The First Channel Number element of the third sub band is set tot channel 9 and the Number of Channels element is set to one.The resulting country information element is valid within the FCC regulatory domain and might be valid to the definition of the country information element in the IEEE 802.11d standard. STAs that use the above country information to determine the regulatory domain, will only mark channels 1, 5 and 9 as regulatory permitted and will not look for networks at the other channels. Although this may improve the scanning behavior of STAs, we believe this is not what the country information element is intended for according to the definition in the first paragraph of section 7.3.2.12 (lines 30-32 of page 1 of this document).ProposalChange text to clearly state that the country information element must be used to inform STAs about the full regulatory domain of operation. Sub bands may only be used if the regulatory domain consists of sub bands.Proposed text change(802.11d, page 4, paragraph 4): Change “The group of channels described .. increasing in channel numbers.” into “The group of channels described by each pair of the First Channel Number and Number of Channels fields shall not overlap, shall be monotonically increasing in channel numbers and shall describe all channels allowed in the regulatory domain.” Interpretation for IEEE std 802.11-1999 (reaffirmed 2003)The definition of the use of the Country information element in either of the cases described by the requester is allowed in the standard. The Country information element provides a mechanism to communicate information relevant to the configuration of a radio necessary for proper operation in a regulatory domain. The standard does not limit the use of this mechanism to transfer only information identical to that required for the full use of bands (or sub-bands) defined for the regulatory domain.It is possible that some clarifying text might be helpful to guide the implementer to the expect either of these uses of the mechanism. This is being brought to the attention of the 802.11 working group with the possibility of action in a future revision or maintenance change. Interpretation RequestAmbiguous definition in 5GHz bandIt is not defined how to use the country information element in the 5GHz band. Unlike the 2GHz band, in the 5GHz band channels numbers specify the center frequencies of 20MHz wide channels. Channel numbers below 240 are encoded as steps of 5MHz from the 5GHz base (e.g. channel 36 => 5GHz + (36*0.005) = 5.18GHz). Channel numbers from 240 and up are defined as negative channel numbers with steps of 5MHz from base 5GHz (e.g. channel 240 = 5GHz –(16*0.005) = 4.92GHz).Channels in the 5GHz band are always spaced 20MHz apart. If the channel number of a channel is 40, its neighboring channels will have channel numbers 36 and 44 respectively.The ambiguity in the country information element is the definition of a sub band in the 5GHz. If the channel number is set to 36 and the number of channels is set to 4, does this imply that this sub band consists of channels 36, 40, 44 and 48 or consists of channels 36, 37, 38 and 39? The latter definition would not make any sense with respect to the 20MHz wide channels. ProposalAdd text to describe that the channel number specifies the first channel of the sub band andthat in the 5GHz band the number of channels specifies the number of 20MHz wide channels in the sub band.Proposed text addition(802.11d, page 4, paragraph 5): Add following text after: “The Number of Channels field .. in length.” “In the 5GHz band, it shall contain a positive integer value that indicates the number of 20MHz wide channels in the sub band adjacent to the first channel. Expressed in channel numbers this implies that the last channel in the sub band will have channel number First Channel Number + ((Number of Channels –1) * 4).”Interpretation for IEEE std 802.11-1999 (reaffirmed 2003)Because the channel numbers are specific to a particular PHY, it is critical to understanding how the channel number and number of channels is used in the Country information element to refer to the definition of valid, or legal, channels defined in the PHY. For the instance cited by the requester, the 5 GHz PHY defines those valid channels in clause 17.3.8.3.3. For a First Channel Number of 36 and a Number of Channels of 4 in a Country information element the individual channel numbers defined for the 5 GHz PHY by these parameters are 36, 40, 44, and 48.It is possible that some clarifying text might be helpful to guide the implementer to the information already in the standard. This is being brought to the attention of the 802.11 working group with the possibility of action in a future revision or maintenance change. Interpretation #5Interpretation Number: 1-07/03 (delayed CFP Beacon)Topic: 802.11 BeaconRelevant Clauses: 9.3.3.2Classification: unambiguousInterpretation Requestoriginal line : In the case of a busy medium due to DCF traffic, the beacon shall be delayed for the time required to complete the current DCF frame exchange.I think there is no direct answer about the following case.Q : When a PCF beacon(CFPeriod=0, DTIM COunt=0) is defered due to a busy medium(DCF), PC shall use xxxxxxxxxx delay to start the CFP after this DCF medium busy.A :<1> served as normal DCF beacon, use DIFS+random backoff delay<2> served as normal PCF beacon while not deffered by medium, use PIFS delay Interpretation for IEEE STD 802.11-1999 (reaffirmed 2003)Clause 9.3.3.2 says, in part: “… the PC shall use a DIFS plus a random backoff delay (with CW in the range of 1 to aCWmin) to start a CFP when the initial beacon is delayed because of deferral due to a busy medium.” This is a clear statement that the Beacon is to be transmitted using a backoff after DIFS after the medium becomes idle.This area of the standard is being modified by the work going on 802.11 Task Group e. You may be interested in following that work as it progresses.Interpretation #6Interpretation Number: 1-09/03 (Contention window and retry counters)Topic: Reset of contention window to CWminRelevant Clauses: 9.2.4, 9.2.5.3Classification: unambiguousInterpretation RequestAccording to the above sub-clauses, the Station {Short, Long} Retry counters are incremented every time a (Short/Long) retry counter associated with an MSDU is incremented. They are only reset upon successful transmission of an MPDU (of appropriate length).The CW is 'controlled' by the Station counters, increasing in size every time either of the Station counters increases. It is reset to CWmin onlya) after a successful MSDU transmission, orb) when either of the Station counters reaches their respective limit.Consider a scenario where a station *continually* fails to transmit successfully: The CW will increase, until condition b) above is met, at which point it will revert to CWmin. However, the Station retry counters are not reset at this point, and will continue to increase; condition b) will not be met again, and CW will increase (or remain at CWmax) for all subsequent (failed) attempts, regardless of the state of the respective MSDU counters.Is this the intended behavior? It seems odd that the CW will be reset after the first failure (when b) is met, and the MSDU is discarded), but not for subsequent MSDUs.Interpretation for IEEE STD 802.11-1999 (reaffirmed 2003)The requester’s interpretation of the standard is correct. The standard allows the contention window to be reset to CWmin in this situation only once, after which the CW value will progress to the largest value in the sequence and remain there until one of the conditions to reset the CW to CWmin is met. This behavior is intended to minimize the bandwidth wasted by a station that is unable to successfully exchange frames with its intended receiver(s).Interpretation #7Interpretation Number: 2-09/03 (Maximum transmit power level in Country information element)Topic: Maximum transmit power level in Country information elementRelevant Clauses: 7.3.2.9Classification: unambiguousInterpretation Request (part 1)The phrase “…maximum power…allowed to be transmitted” is ambiguous.The most likely interpretations include:1. TPO (Transmitter Power Output)2. EIRP (Effective Isotropically Radiated Power)Unfortunately, different administrations have regulations that are based on either TPO (e.g. FCC) or EIRP (e.g. ETSI), and in such a way that they cannot always be converted into one another. E.g. the FCC specifies a maximum TPO and allows up to 6dBi antenna gain. Above 6dBi the TPO should be reduced dB for dB, except for point-to-point links, where a higher antenna gain is allowed and less reduction is to be applied. This cannot be converted to an equivalent EIRP limit. ETSI specifies a plain EIRP limit.What is the interpretation of the Maximum Transmit Power Level field?Interpretation for IEEE STD 802.11-1999 (reaffirmed 2003) (part 1)The interpretation of a value in the Maximum Transmit Power Level field of a Country information element does not need be expressed as TPO, EIRP, or any other particular means of measurement. The interpretation is defined by the regulations of the country identified in theCountry String of the same information element. Assuming the examples provided by the requester are correct, this would mean that a value in the Maximum Transmit Power Level field of a Country information element with a Country String value of “US” would be interpreted as a measure of the TPO of the device, whereas a value in an information element where the value of the Country String is “NL” would be interp reted as a masue of the EIRP of the device.Interpretation Request (part 2)Apart from a limit on radiated power, the regulations usually contain a PSD (Power Spectral Density) limit. In some domains, the PSD limit is more strict than the TPO/EIRP limit and thus further limits the transmitted power.Example: The EIRP limit under ETSI regulations in the 5150-5350 MHz band is 200mW, but the PSD limit is 10mW/MHz EIRP. Since an OFDM signal has a bandwidth of 16MHz, the EIRP is further limited to approximately 160mW.Should, in this case, the Maximum Transmit Power Level field be set to 200mW or 160mW?If the interpretation is plain EIRP, the station will exceed PSD limits for certain countries, since the PSD limit is not part of the country information elements. How should in that case the PSD limit be derived?If the interpretation is to take the PSD limit into account in the Maximum Transmit Power Level, we have to integrate the PSD over the signal bandwidth to convert to total power. However, there is a problem in the 2.4GHz band, since the spectral shape for DSSS/CCK is not accurately defined, so that the conversion factor may depend on the transmitter filter implementation (and thus may vary for each client STA). What conversion factor should be used in that case? Interpretation for IEEE STD 802.11-1999 (reaffirmed 2003) (part 2)The information in the Country information element provides an indication of the regulatory domain and the requirements of that domain. It is not expected that the information in the information element is sufficient to configure all of the parameters of a device to comply with the regulations in effect in the regulatory domain. The value of the Maximum Transmit Power Level is to contain the value specified in the regulations of the particular regulatory domain identified by the value of the Country String. It is up to each manufacturer to use the information in the Country information element, along with local configuration information, such as a power backoff value, to configure a device for operation that is compliant with the local regulations where the device is operating.Interpretation Request (part 3)The Country Information Element does not indicate whether a particular subband hasindoor/outdoor restrictions. How should this information be derived?Interpretation for IEEE STD 802.11-1999 (reaffirmed 2003) (part 3)The Country information element provides, as part of the Country String, an indication as to whether the bands described in the information element are utilizing regulations that are differentiated for indoor and outdoor operation. While an access point or station may be sending a Beacon or Probe Response containing a Country information element that does not match the location of the receiver, i.e., an access point that is indoors might be received outdoors, it is expected that the receiver will utilize the information in the Country String and determine its local configuration based on that information. There is no mechanism specified in the standard to convey both indoor and outdoor information for a single band or to describe one or more subbands for indoor operation and one or more other subbands for outdoor operation.Interpretation #8Interpretation Number: 1-01/04 (Use of Status and Reason Codes)Topic: Usage of Status and Reason CodesRelevant Clauses: 7.3.1.7, 7.3.1.9Classification: unambiguousInterpretation RequestValues for the Reason Code are defined in clause 7.3.1.7 and values for the Status Code are defined in clause 7.3.1.9. These values are to be included in various MAC Management frames. However, there is no definition of when a station or AP is to transmit a particular value for these items, nor what a station or AP is to do upon receipt of a particular value for these items. \How are the values for the Reason Code and Status Code to be selected for transmission and what is to be done upon reception of each code?Interpretation for IEEE STD 802.11-1999 (reaffirmed 2003)This request duplicates requests that have been received in the past. The response to these requests is available on the IEEE 802.11 web site at the following URLs:/11/Interpretations/03-402r1-M-Interpretation_Response_02-0503.doc/11/Interpretations/03-401r1-M-Interpretation_Response_01-0503.docThis information has been forwarded to the 802.11 working group for consideration of inclusion in a future revision or maintenance release of the standard.Interpretation #9Interpretation Number: 2-01/04 (Undefined information elements)Topic: Definition of certain information elementsRelevant Clauses: 7.3.2Classification: unambiguousInterpretation RequestIn 2002, the 802.11 Working Group created a set of Element IDs, defining the use of many information elements defined as "Reserved" in the standard. Many of these element IDs are assigned for the use of individual companies. An additional element ID is defined as a "vendor-specific" information element. The format and use of these newly defined information elements is not described in the standard or any of its supplements.What is the format of each of the information elements defined by the newly assigned element IDs, when are they used, and in which frames may they appear?Interpretation for IEEE STD 802.11-1999 (reaffirmed 2003)The standard defines the information element IDs that are the subject of the interpretation request as “reserved”. This includes the wo rking group-assigned information element IDs for the use of individual companies and the “vendor-specific” information element. This indicates that the element IDs may be used in a future amendment of the standard. The standard does not provide any definition of the use of these information element IDs for individual company use or for use as a “vendor-specific” information element. The request has been forwarded to the 802.11 working group for consideration of inclusion in a future revision or maintenance release of the standard.Interpretation #10Interpretation Number: 1-03/04 (Adopting beacon parameters in an IBSS)Topic: Adopting beacon parameters in an IBSSRelevant Clauses: 3.8, 7.2.3, 7.3.2.2, 9.1.2, 10.3.3.1, 10.3.2.2, 11.1.2.2, 11.1.3, 11.1.4Classification: ambiguousInterpretation Request11.1.4 says: “A STA receiving such a frame *a beacon+ from another STA in an IBSS with the same SSID shall compare the Timestamp field with its own TSF time. If the Timestamp field of the received frame is later than its own TSF time, the STA shall adopt all parameters contained in the Beacon frame.”What is the meaning of “all parameters” in this context? It’s clearly not just the TSF timer, or there would be no need to say “all” pa rameters. And if it includes information carried in IEs, does it, or does it not, include IEs which the STA does not recognize?Interpretation for IEEE STD 802.11-1999 (reaffirmed 2003)The items in question are identified in clause 10.3.3.1 (MLME-JOIN.request), which in turns references the enumerated list within BSSDescription in clause 10.3.2.2 (MLME-SCAN.confirm). Each BSSDescription consists of the following elements:BSSID – A STA in IBSS mode receiving this field in a beacon would adopt this value since this is the identification value for the IBSS assigned per clause 11.1.3.SSID – A STA in IBSS mode receiving this field in a beacon would adopt this value, as stated explicitly in clause 11.1.4.BSSType – A STA in IBSS mode receiving this field in a beacon would implicitly adopt this value, because the STA is operating in IBSS mode.Beacon Period – A STA in IBSS mode receiving this field in a beacon would adopt this value, as stated explicitly in clause 11.1.2.2.DTIM Period – A STA in IBSS mode receiving this field in a beacon would adopt this value, as stated explicitly in clause 11.1.2.2.Timestamp – A STA in IBSS mode receiving this field in a beacon would adopt this value, as stated explicitly in clause 11.1.4.Local time – This field is not applicable to this interpretation request since this is a local value used for computational purposes in adopting the TSF of the peer MAC entity (per clause 11.1.4) and is not a beacon parameter per se.PHY parameter set – A STA in IBSS mode receiving this field in a beacon would adopt this value.CF parameter set – A STA in IBSS mode receiving this field in a beacon would not adopt this value since a CFP is not allowed in an IBSS (per clause 9.1.2).IBSS parameter set – A STA in IBSS mode receiving this field in a beacon would adopt this value.Capability Information – A STA in IBSS mode receiving this field in a beacon would not adopt this value since this value in the local MAC entity must represent the advertised capabilities of the local MAC entity.BSSBasicRateSet –Per clause 3.8, “the BSS basic rate set data rates are preset for allstations in the BSS”. A STA participating in a BSS is required to “avoid associating with a BSS if the STA cannot rec eive and transmit all the data rates in the BSS basic rate set” per clause7.3.2.2.Processing of unknown IEs is defined in clause 7.2.3.This information has been forwarded to the 802.11 working group for consideration of inclusion in a future revision or maintenance release of the standard.Interpretation #11Interpretation Number: 2-03/04 (Reinitializing the 802.11b scrambler for header and psdu fields)Topic: Reinitializing the 802.11b scrambler for header and psdu fieldsRelevant Clauses: 15.2.3, 15.2.4Classification: unambiguousInterpretation RequestI have doubt regarding scrambling in 802.11b. For each packet we have 3 fields (plcp header, plcp preamble and psdu). while scrambling plcp preamble we are initializing with particular seed based on preamble. What about header and psdu fields. We have to be reinitialize the scrambler state or not?Interpretation for IEEE STD 802.11b-1999 (reaffirmed 2003)IEEE STD 802.11b-1999 (reaffirmed 2003) clearly states the requirements for scrambling in clauses 15.2.3 and 15.2.4. Since the standard is clear on this matter, no interpretation is required.Interpretation #12Interpretation Number: 1-11/04 (Annex G acccuracy)Topic: Accuracy of material in Annex GRelevant Clauses: Annex GClassification: Conflicts with clause 17Interpretation RequestA possible mistake was found while working with IEEE 802.11a standard, as follows:1. Designation of the standard, including the year of publication.IEEE Std 802.11a-1999Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications High-speed Physical Layer in the 5 GHz Band2. The specific subsection being questioned.Annex G.An example of encoding a frame for OFDM PHY. Table G.17-Last 144 bits scrambling.3. The applicable conditions for the case in question.In order to check if our design of the PHY is correct, we have check it by means of the example given in Annex G "An example of encoding a frame for OFDM PHY".All our results match properly with those given in all the tables except for 'Table G.17-Last 144 bits after scrambling'. In this case, the bits number 818 and 820 which are in the standard are '0'. However, we obtain two '1'.In order to check if the scrambler module works properly we have tried to obtain the 127-bit repetitive sequence given in page 16 in chapter '17.3.5.4. PLCP DATA scrambler and descrambler' and we do it correctly. As it can be saw, the values of the 7-bit shift register of the scrambler depends only on the seed. In the example given, the seed is '1011101' and we have checked as well that we match the 'Table G.15- Scrambling sequence for seed 1011101'. Therefore, in our opinion the mismatch in 'Table G.17' might be caused by the input of the scrambler, that is, the DATA bits. However, we are obtaining the same values than those given in 'Table G.14-Last 144 DATA bits'.After all this explanation, i would be really grateful if you could confirm to us that the data showed at 'Table G.17' are completely correct or if there is any mistakes on it. Interpretation for IEEE STD 802.11a-1999 (reaffirmed 2003)In document 11-04-1198-00-00m, Inoue-san, et al, provide an analysis of the material in question in Annex G. This analysis is reproduced here.• The two bits (bit#818 and bit#820) in the Table G.17 should be corrected–Both of bit #818 and bit #820 in the Table G.17 are “0” in current standard.。
802.11白皮书
White Paper 802.11n: Next-Generation Wireless LANTechnologyThis white paper explains IEEE 802.11n, the newest draft specification for Wi-Fi®. It is designed to provide an overview of the technology, describe new techniques used to achieve greater speed and range, and identify applications, products, and environments that will benefit from the technology.April 2006OverviewDemand for wireless LAN hardware has experienced phenomenal growth during the past several years, evolving quickly from novelty into necessity. As a measure of this expansion, WL AN chipset shipments in 2005 surpassed the 100-million-unit mark, a more than tenfold increase from 2001 shipments of less than 10 million units.Thus far, demand has been driven primarily by users connecting notebook computers to networks at work and to the Internet at home as well as at coffee shops, airports, hotels, and other mobile gathering places. As a result, Wi-Fi®technology is most commonly found in notebook computers and Internet access devices such as routers and DSL or cable modems. In fact, more than 90 percent of all notebook computers now ship with built-in WLAN.The growing pervasiveness of Wi-Fi is helping to extend the technology beyond the PC and into consumer electronics applications like Internet telephony, music streaming, gaming, and even photo viewing and in-home video transmission. Personal video recorders and other A/V storage appliances that collect content in one spot for enjoyment around the home are accelerating this trend.These new uses, as well as the growing number of conventional WL AN users, increasingly combine to strain existing Wi-Fi networks. Fortunately, a solution is close at hand. The industry has come to an agreement on the components that will make up 802.11n, a new WLAN standard that promises both higher data rates and increased reliability, and the IEEE standards-setting body is ironing out the final details. Though the specification is not expected to be finalized before 2007, the draft is proving to be reasonably stable as it progresses through the formal IEEE review process.In the meantime, hardware that conforms to the 802.11n draft is becoming available, so consumers can begin building high-speed wireless networks in anticipation of the standard while ensuring interoperability at high speeds and still supporting their existing WLAN hardware.The purpose of this white paper is to explain the impending 802.11n standard and how it will enable WL ANs to support emerging media-rich applications. The paper will also detail how 802.11n compares with existing WL AN standards and offer strategies for users considering higher-bandwidth alternatives.Wi-Fi® Standards ComparisonThe first WL AN standard to become accepted in the market was 802.11b, which specifies encoding techniques that provide for raw data rates up to 11 Mbps using a modulation technique called Complementary Code Keying, or CCK, and also supports Direct-Sequence Spread Spectrum, or DSSS, from the original 802.11 specification. The 802.11a standard, defined at about the same time as 802.11b, uses a more efficient transmission method called Orthogonal Frequency Division Multiplexing, or OFDM. OFDM, as implemented in 802.11a, enabled raw data rates up to 54 Mbps. Despite its higher data rates, 802.11a never caught on as the successor to 802.11b because it resides on an incompatible radio frequency band: 5 GHz versus 2.4 GHz for 802.11b.Note: All of the WL AN standards provide for multiple transmissionoptions, so that the network can drop to lower (albeit easier tomaintain) data rates as environmental interference challengescommunications. In the most favorable circumstances, 802.11a and802.11b support data rates up to 54 Mbps and 11 Mbps respectively.)In June 2003, the IEEE ratified 802.11g, which applied OFDM modulation to the 2.4-GHz band. This combined the best of both worlds: raw data rates up to 54 Mbps on the same radio frequency as the already popular 802.11b. WLAN hardware built around 802.11g was quickly embraced by consumers and businesses seeking higher bandwidth. In fact, consumers were so eager for a higher-performing alternative to 802.11b that they began buying WL AN client and access-point hardware nearly a year before the standard was finalized.Today, the vast majority of computer network hardware shipping supports 802.11g. Increasingly, as technology improves and it becomes easier and less costly to support both 2.4 GHz and 5 GHz in the same chipset, dual-band hardware is becoming more commonplace. Much of the WLAN client hardware available today, in fact, supports both 802.11a and 802.11g.A similar scenario to the draft 802.11g phenomenon is now unfolding with 802.11n. The industry came to a substantive agreement with regard to the features to be included in the high-speed 802.11n standard in early 2006. And though it will likely be 2007 before the standard is ratified, the specification is stable enough for draft-n Wi-Fi cards and routers to already be making their way to store shelves.802.11n: A Menu of OptionsThe emerging 802.11n specification differs from its predecessors in that it provides for a variety of optional modes and configurations that dictate different maximum raw data rates. This enables the standard to provide baseline performance parameters for all 802.11n devices, while allowing manufacturers to enhance or tune capabilities to accommodate different applications and price points. With every possible option enabled, 802.11n could offer raw data rates up to 600 Mbps. But WL AN hardware does not need to support every option to be compliant with the standard. In 2006, for example, most draft-n WLAN hardware available is expected to support raw data rates up to 300 Mbps.In comparison, every 802.11b-compliant product must support data rates up to 11 Mbps, and all 802.11a and 802.11g hardware must support data rates up to 54 Mbps. Better OFDMIn the 802.11n draft, the first requirement is to support an OFDM implementation that improves upon the one employed in the 802.11a/g standards, using a higher maximum code rate and slightly wider bandwidth. This change improves the highest attainable raw data rate to 65 Mbps from 54 Mbps in the existing standards. MIMO Improves PerformanceOne of the most widely known components of the draft specification is known as Multiple Input Multiple Output, or MIMO. MIMO exploits a radio-wave phenomenon called multipath: transmitted information bounces off walls, doors, and other objects, reaching the receiving antenna multiple times via different routes and at slightly different times. Uncontrolled, multipath distorts the original signal, making it more difficult to decipher and degrading Wi-Fi performance. MIMO harnesses multipath with a technique known as space-division multiplexing. The transmitting WL AN device actually splits a data stream into multiple parts, called spatial streams, and transmits each spatial stream through separate antennas to corresponding antennas on the receiving end. The current 802.11n draft provides for up to four spatial streams, even though compliant hardware is not required to support that many.Doubling the number of spatial streams from one to two effectively doubles the raw data rate. There are trade-offs, however, such as increased power consumption and, to a lesser extent, cost. The draft-n specification includes a MIMO power-save mode, which mitigates power consumption by using multiple paths only when communication would benefit from the additional performance. The MIMO power-save mode is a required feature in the draft-n specification.Table 1. Major Components of Draft 802.11nFeature Definition Specification StatusBetter OFDM Supports wider bandwidth &higher code rate to bringmaximum data rate to 65 MbpsMandatorySpace-Division Multiplexing Improves performance byparsing data into multiplestreams transmittedthrough multiple antennasOptional forup to fourspatialstreamsDiversity Exploits the existence ofmultiple antennas toimprove range andreliability. Typicallyemployed when the numberof antennas on thereceiving end is higher thanthe number of streamsbeing transmitted. Optional for up to four antennasMIMO Power Save Limits power consumptionpenalty of MIMO by utilizingmultiple antennas only onas-needed basisRequired40 MHz Channels Effectively doubles data ratesby doubling channel widthfrom 20 MHz to 40 MHzOptionalAggregation Improves efficiency byallowing transmissionbursts of multiple datapackets between overheadcommunicationRequiredReduced Inter-frame Spacing (RIFS) One of several draft-nfeatures designed toimprove efficiency. Providesa shorter delay betweenOFDM transmissions than in802.11a or g.RequiredGreenfield Mode Improves efficiency byeliminating support for802.11a/b/g devices in anall draft-n networkCurrentlyoptionalMIMO EnhancementsThere are two features in the draft-n specification that focus on improving MIMO performance, called beam-forming and diversity. Beam-forming is a technique that focuses radio signals directly on the target antenna, thereby improving range andperformance by limitinginterference.Diversity exploits multipleantennas by combining theoutputs of or selecting thebest subset of a largernumber of antennas thanrequired to receive a numberof spatial streams. This isimportant because the draft-n specification supports up tofour antennas, so devices willprobably encounter othersbuilt with a different numberof antennas. A notebookcomputer with two antennas,for example, might connectto an access point with threeantennas. In this case, onlytwo spatial streams can beused even though the accesspoint itself may be capable ofthree spatial streams.With diversity, surplusantennas are put to gooduse. The device with moreantennas uses the extra onesto operate at longer range.For example, the outputs oftwo antennas may becombined to receive onespatial stream to achieve alonger link range. The conceptmay be extended to combinethe outputs of three antennasto receive two spatialstreams for higher data rateand range and so on.Diversity is not restricted to802.11n or even WL AN. Itcan be used to improve anytype of radio communication. In fact, diversity has typically been implemented in some existing 802.11a, 802.11b, and 802.11g hardware through selection of the best of two antennas.Improved Throughput and Higher Data RatesAnother optional mode in the 802.11n draft effectively doubles data rates by doubling the width of a WLAN communications channel from 20 MHz to 40 MHz. The primary trade-off here is fewer channels available for other devices. In the case of the 2.4-GHz band, there is enough room for three non-overlapping 20-MHz channels. Needless to say, a 40-MHz channel does not leave much room for other devices to join the network or transmit in the same airspace. This means intelligent, dynamic management is critical to ensuring that the 40-MHz channel option improves overall WL AN performance by balancing the high-bandwidth demands of some clients with the needs of other clients to remain connected to the network. This paper has covered many of the major mandatory and optional features of the draft 802.11n specification, though coverage is by no means exhaustive. Other optional features that draft-n hardware may support, for example, include high-throughput duplicate mode, which helps extend the network's range, and shortguard interval, which improves efficiency by further limiting overhead.With all the optional modes and back-off alternatives, the array of possible combinations of features and corresponding data rates can be overwhelming. To be precise, the current 802.11n draft provides for 576 possible data rate configurations. In comparison, 802.11g provides for 12 possible data rates, while 802.11a and 802.11b specify eight and four, respectively.Table 2 compares the primary IEEE 802.11 specifications.Table 2. Primary IEEE 802.11 Specifications802.11a 802.11b 802.11g 802.11nStandardApprovedJuly 1999 July 1999 June 2003 Not yet ratifiedMaximum DataRate54 Mbps 11 Mbps 54 Mbps 600 MbpsModulation OFDM DSSS or CCK DSSS or CCKor OFDM DSSS or CCK or OFDMRF Band 5 GHz 2.4 GHz 2.4 GHz 2.4 GHz or 5 GHz Number ofSpatialStreams1 1 1 1, 2, 3, or 4 Channel Width 20 MHz 20 MHz 20 MHz 20 MHz or 40 MHzCoexisting with Today’s WLANsThe draft 802.11n specification was crafted with the previous standards in mind to ensure compatibility with more than 200 million Wi-Fi devices currently in use. A draft-n access point will communicate with 802.11a devices on the 5-GHz band as well as 802.11b and 802.11g hardware on the 2.4-GHz frequencies. In addition to basic interoperability between devices, 802.11n provides for greater network efficiency in mixed mode over what 802.11g offers.Network efficiency is basically the proportion of the available bandwidth that is used to transmit data as opposed to overhead or protocols used to manage network communications. Wireless environments are much more challenging to orchestrate than wired networks, so there is generally more overhead to ensure that data sent is actually received, and that other clients leave the channel open during transmission.The presence of 802.11b nodes makes communications difficult on the 2.4G-Hz band because the older standard does not recognize OFDM, which is employed by 802.11g and draft-n. This means that if OFDM clients want to communicate in the presence of 802.11b clients, they need to use the older standard’s communication protocol at least to protect their higher-rate OFDM transmissions. This drops network efficiency considerably because data packets take far less time to transmit with 802.11g and draft-n than they do under the old 802.11b standard.Some WLAN chipset suppliers, including Broadcom, devised innovative schemes to improve the efficiency of mixed 802.11b/g networks. Fortunately, the issue is addressed directly in the draft-n specification.One of the most important features in the draft-n specification to improve mixed-mode performance is aggregation. Rather than sending a single data frame, the transmitting client bundles several frames together. Thus, aggregation improves efficiency by restoring the percentage of time that data is being transmitted over the network, as Figure 1 illustrates.Figure 1: How Aggregation Improves Efficiency in a Mixed-Mode NetworkIt is much easier for draft-n devices to coexist with 802.11g and 802.11a hardware because they all use OFDM. Even so, there are features in the specification that increase efficiency in OFDM-only networks. One such feature is Reduced Inter-Frame Spacing, or RIFS, which shortens the delay between transmissions.For the best possible performance, the draft-n specification provides for what is called greenfield mode, in which the network can be set to ignore all earlier standards. It is not clear at this stage whether greenfield mode will be a mandatory or an optional feature in the final 802.11n draft, but it is likely to be an option. Realistically, battery-powered WL AN hardware will continue to be built around 802.11g and even 802.11b for some time. Despite the improved efficiency built into the draft-n specification, however, it is difficult to eliminate all of the obstacles of 802.11b. This means that consumers looking for the best possible network performance may want to consider replacing 802.11b WL AN hardware on their networks.Consumer Applications Demand 802.11nBecause it promises far greater bandwidth, better range, and reliability, 802.11n is advantageous in a variety of network configurations. And as emerging networked applications take hold in the home, a growing number of consumers will come to view 802.11n not just as an enhancement to their existing network, but as a necessity.With most Internet connection speeds below 5 Mbps, it is unlikely that consumers who use WL AN technology simply to pair a single computer with an Internet connection are taxing their existing network, at least when used at close range. Even this class of consumer may be pleasantly surprised by the increase in range and reliability that an upgrade to draft-n WL AN hardware can offer. Some of the current and emerging applications that are driving the need for 802.11n are Voice over IP (VoIP), streaming video and music, gaming, and network attached storage. VoIP is mushrooming as consumers and businesses alike realize they can save money on long-distance phone calls by using the Internet instead of traditional phone service. An increasingly popular way to make Internet calls is with VoIP phones, which are battery-powered handsets that typically connect to the Internet with built-in 802.11b or 802.11g. Telephony does not demand high bandwidth, although it does require a reliable network connection to be usable. Both 802.11b and 802.11g consume less power than 802.11n in MIMO modes, but single-stream 802.11n may become prevalent in VoIP phones. VoIP phones can benefit today from the increased range and reliability of a draft-n access point.As with voice, streaming music is an application that requires a highly reliable connection that can reach throughout the home. Millions of consumers are building libraries of digital music on their personal computers by ripping their CD collections and buying digital recordings over the Internet. In addition, growing numbers are streaming music directly from the Internet.As their digital music collections grow, more consumers find they would like to be able to listen to it through living room stereos or via players in other rooms around the house. Though higher bandwidth is not absolutely necessary, the additional range and reliability that draft-n offers may be better suited to streaming music than older-generation WLAN hardware.Gaming is an application that increasingly is making use of home WLANs, whether users connect wirelessly to the Internet from their computers and portable gaming devices or use the network to compete with others in the home.A growing application that demands all that 802.11n has to offer―high data rates as well as range and reliability―is Network-Attached Storage, or NAS. NAS has become popular in the enterprise as an inexpensive, easy-to-install alternative for data backup. More recently, NAS is taking hold in small offices and even some homes, as users want to safeguard their growing digital photo albums from hard-drive failure, and as the price of self-contained NAS backup systems falls well below $1,000. New, more exciting applications for NAS are emerging, such as video storage centers that demand reliable, high-bandwidth connections to stream prerecorded TV shows, music videos and full-length feature films to televisions and computers throughout the house.Transferring large files such as prerecorded TV shows from a personal video recorder onto a notebook computer or portable media player for viewing outside the home takes planning and patience on an older WLAN. Figure 2 compares the time it would take to transfer a 30-minute video file. At the best data transfer rate, it would take 42 minutes to copy the file using 802.11b, and less than a minute with a two-antenna draft-n client.Figure 2: Time (Best Case) to Transfer 30-Minute HD Video.The enterprise may have the most to gain from the higher raw data rates that the draft-n standard promises. Knowledge workers have grown accustomed to the benefits of WL ANs in the office. They can carry their notebooks to conference rooms, coworkers’ desks, even break areas, and still have access to e-mail, instant messaging, and the Internet, as well as corporate data.But some everyday applications such as transferring large files from a group server, accessing corporate databases, and system backups, can be painstakingly slow on a 54-Mbps WL AN. For such high-traffic applications, many otherwise untethered workers anchor their computers to an Ethernet cable, which connects to the network at 100 Mbps or even 1 Gbps.With draft-n hardware, users can have the best of both worlds: the speed of wired Ethernet and the mobility of WLAN.RecommendationsAs is evident from the previous section, virtually all enterprises could benefit today from higher-bandwidth WLANs. Nevertheless, many large businesses are expected to wait until 802.11n is ratified before initiating large deployments of the new standard. Corporations that are ready to deploy, as well as consumers and smaller businesses anxious to take advantage of the higher data rates and improved range and reliability, should shop carefully. Not all WL AN hardware featuring MIMO, diversity, and other 802.11n-like features can claim to be compliant with the emerging standard. Buyers should look for products that say “IEEE 802.11n Draft Compliant.”Buyers should also keep in mind that there are a host of optional features in the draft-n specification. Many of them, such as channelization and greenfield mode, to name a few, are designed to improve raw data rates, and need to be present on both ends of the link in order to be enabled.There are also differences between how draft-n features are implemented. Some draft-n hardware supporting 40-MHz channelization, for example, is better than others at balancing the demands of high-bandwidth communications for one client with the needs of other users on the network.A good strategy for consumers planning to upgrade the data rates and range of their home WLANs is to start with a draft-n router and purchase one that supports the most spatial streams and optional features that budgets allow. Follow a similar strategy for high-bandwidth file-sharing appliances such as personal video recorders and backup storage devices.For stationary clients that do not need high data rates, for example music players streaming content from a digital home library or the Internet, draft-n may help improve range and reliability.Selecting the right draft-n alternatives for battery-powered devices may be the trickiest item on the shopping list because power consumption is as important a consideration as data rates, range, and cost. VoIP phones, for example, are low-bandwidth devices that might benefit from MIMO techniques in environments where range and reliability are an issue, but at the cost of battery life.Notebook computers may benefit from high-performance features like MIMO, channelization and greenfield mode for file transfers and data backups. Keep in mind that with channelization and MIMO power-conservation, which enables multiple spatial streams only when they are needed, performance features may end up saving power in some cases because the notebook is active on the WL AN for shorter periods.Figure 3 depicts a number of considerations for choosing draft-n WLAN hardware.Figure 3: Considerations for Choosing Draft-n WLAN HardwareWhy Choose Broadcom for Draft-N?First and foremost, Broadcom’s Intensi-fi TM family of WL AN chipsets is 802.11n draft-compliant. And although the draft-n standard appears to be fairly stable at this stage, the Intensi-fi family is highly programmable, which means it is adaptable to unforeseen and unexpected changes in the specification.Second, due to Broadcom-designed signal processing techniques, Intensi-fi chipsets feature Active Diversity, which gives a network connection between two dual-antenna devices higher performance, range, and reliability without the cost and power consumption of a third antenna on one of the connections.The fidelity of the Intensi-fi TM radio is second to none, which means it can maintain higher data rates at longer distances and in more adverse conditions.With regard to the optional 40-MHz channel mode, the Intensi-fi chipset provides superior balance between performance and the needs of other members of the WL AN. Intensi-fi’s “good-neighbor” approach to channelization includes frequent scans for other network traffic, along with a mechanism to dip quickly back to all-20-MHz channels when other clients need to communicate.The Intensi-fi chipset supports the latest standards to secure WL ANs, including WPA2 and CCX version 4. In addition, Intensi-fi supports SecureEasySetup™, a one-touch push-button security setup that makes it easy to install a secure WLAN.Phone: 949-450-8700 Fax: 949-450-8710E-mail: info@ Web: 802_11n-WP100-R BROADCOM CORPORATION16215 Alton Parkway, P.O. Box 57013Irvine, California 92619-7013© 2006 by BROADCOM CORPORATION. All rights reserved.04/21/06Broadcom®, the pulse logo, Connecting everything®, the Connecting everything logo, Intensi-fi TM, BroadRange™, Secur eEasySetup™, High Speed Mode™, SpeedBooster™, and Broadcom 54g™ are trademarks of Broadcom Corporation and/or its affiliates in the United States, certain other countries and/or the EU. Any other tr ademar ks or tr ade names mentioned ar e theFinally, Intensi-fi supports 125 High Speed Mode™ (also known as SpeedBooster), a proprietary high-speed mode in Broadcom’s 54g™ 802.11g family of chipsets, as well as BroadRange™ signal processing technology that improves the ability of Wi-Fi devices to extend coverage area. A network can take advantage of 125 High Speed Mode if all WLAN devices in the network include Intensi-fi or 54g TM chipsets. BroadRange TM, on the other hand, improves network performance in 802.11g modes regardless of the chipsets inside the other devices on the network.For added assurance of greatest reliability and best range, choose products built with Intensi-fi TM technology.。
IEEE 802.11p Towards an International Standard for Wireless Access in Vehicular Environments
IEEE 802.11p: Towards an International Standard for Wireless Access in Vehicular EnvironmentsDaniel Jiang, Luca DelgrossiMercedes-Benz Research & Development North America, Inc.{daniel.jiang, luca.delgrossi}@ABSTRACTVehicular environments impose a set of new requirements on today’s wireless communication systems. Vehicular safety communications applications cannot tolerate long connection establishment delays before being enabled to communicate with other vehicles encountered on the road. Similarly, non-safety applications also demand efficient connection setup with roadside stations providing services (e.g. digital map update) because of the limited time it takes for a car to drive through the coverage area. Additionally, the rapidly moving vehicles and complex roadway environment present challenges at the PHY level.The IEEE 802.11 standard body is currently working on a new amendment, IEEE 802.11p, to address these concerns. This document is named Wireless Access in Vehicular Environment, also known as WAVE. As of writing, the draft document for IEEE 802.11p is making progress and moving closer towards acceptance by the general IEEE 802.11 working group. It is projected to pass letter ballot in the first half of 2008.This paper provides an overview of the latest draft proposed for IEEE 802.11p. It is intended to provide an insight into the reasoning and approaches behind the document.KeywordsIEEE 802.11, DSRC, WAVE1.INTRODUCTIONThe IEEE 802.11p WAVE standardization process originates from the allocation of the Dedicated Short Range Communications (DSRC) spectrum band in the United States and the effort to define the technology for usage in the DSRC band.This section first provides a brief overview of the DSRC spectrum. The context and history of WAVE standardization is then described.1.1DSRC Spectrum AllocationIn 1999, the U.S. Federal Communication Commission allocated 75MHz of Dedicated Short Range Communications (DSRC) spectrum at 5.9 GHz to be used exclusively for vehicle-to-vehicle and infrastructure-to-vehicle communications.The primary goal is to enable public safety applications that can save lives and improve traffic flow. Two such application scenarios are shown in Figure 1. Private services are also permitted in order to spread the deployment costs and to encourage the quick development and adoption of DSRC technologies and applications.Figure 1, Vehicle safety communication examplesAs shown in Figure 2, the DSRC spectrum is structured into seven 10 MHz wide channels. Channel 178 is the control channel (CCH), which is restricted to safety communications only [1]. The two channels at the ends of the spectrum band are reserved for special uses [2]. The rest are service channels (SCH) available for both safety and non-safety usage.Figure 2, DSRC spectrum band and channels in the U.S. The DSRC band is a free but licensed spectrum. It is free because the FCC does not charge a fee for the spectrum usage. Yet it should not be confused with the unlicensed bands in 900 MHz, 2.4 GHz and 5 GHz that are also free in usage. These unlicensed bands, which are increasingly populated with WiFi, Bluetooth and other devices, place no restrictions on the technologies other than some emission and co-existence rules. The DSRC band, on the other hand, is more restricted in terms of the usages and technologies. FCC rulings regulate usage within certain channels and limit all radios to be compliant to a standard. In other words, one cannot develop a different radio technology (e.g. that uses all 75 MHz of spectrum) for usage in the DSRC band even if it is limited in transmission power as related to the unlicensed band. These DSRC usage rules are referred as “license by rule”.Similar efforts are occurring in other parts of the world to set spectrum aside for vehicular usage. Europe, for example, is getting close to allocating 30 MHz of spectrum band in the 5 GHz range for the express purpose of supporting vehicular communications for safety and mobility applications.1.2 WAVE Standardization HistoryIn the U.S., the initial effort at standardizing DSRC radio technology took place in the ASTM 2313 working group [5]. In particular, the FCC rule and order specifically referenced this document for DSRC spectrum usage rules.In 2004, this effort migrated to the IEEE 802.11 standard group as DSRC radio technology is essentially IEEE 802.11a adjusted for low overhead operations in the DSRC spectrum. Within IEEE 802.11, DSRC is known as IEEE 802.11p WAVE, which stands for Wireless Access in Vehicular Environments [4]. IEEE 802.11p is not a standalone standard. It is intended to amend the overall IEEE 802.11 standard [3].One particular implication of moving the DSRC radio technology standard into the IEEE 802.11 space is that now WAVE is fully intended to serve as an international standard applicable in other parts of the world as well as in the U.S. The IEEE 802.11p standard is meant to:•Describe the functions and services required by WAVE-conformant stations to operate in a rapidly varying environment and exchange messages without having to join a Basic Service Set (BSS), as in the traditional IEEE 802.11 use case.•Define the WAVE signaling technique and interface functions that are controlled by the IEEE 802.11MAC.Figure 3, DSRC standards and communication stack As shown in Figure 3, IEEE 802.11p WAVE is only a part of a group of standards related to all layers of protocols for DSRC-based operations. The IEEE 802.11p standard is limited by the scope of IEEE 802.11, which is strictly a MAC and PHY level standard that is meant to work within a single logical channel. All knowledge and complexities related to the DSRC channel plan and operational concept are taken care of by the upper layer IEEE 1609 standards. In particular, the IEEE 1609.3 standard covers the WAVE connection setup and management [6]. The IEEE 1609.4 standard sits right on top of the IEEE 802.11p and enables operation of upper layers across multiple channels, without requiring knowledge of PHY parameters [7].At the time of writing, the IEEE 802.11p draft version 3.0 had already gone through its third letter ballot in the IEEE 802.11 working group. It failed to reach the critical approval rate of 75% by just 2 votes. The task group is currently resolving the comments received through the letter ballot and updating the draft standard document accordingly. This paper provides an overview of the general direction and technical approach in this draft standard but its content should not be viewed as binding or final.2. MAC AMENDMENT DETAILSIn an overly simplified manner, the IEEE 802.11 MAC is about how to arrange for a set of radios in order to establish and maintain a cooperating group. Radios can freely communicate among themselves within the group but all transmissions from outside are filtered out. Such a group is a Basic Service Set (BSS) and there are many protocol mechanisms designed to provide secure and robust communications within a BSS. The key purpose of the IEEE 802.11p amendment at the MAC level is to enable very efficient communication group setup without much of the overhead typically needed in the current IEEE 802.11 MAC. In other words, the focus is on simplifying the BSS operations in a truly ad hoc manner for vehicular usage. In this section, we first provide an overview of the core mechanism in setting up the IEEE 802.11 connectivity. Then the approach introduced by the IEEE 802.11p amendment is described.2.1 IEEE 802.11 Operations Overview2.1.1 Basic Service SetAn Infrastructural Basic Service Set is a group of IEEE 802.11 stations anchored by an Access Point (AP) and configured to communicate with each other over the air-link. It is usually just referred to as a BSS. The BSS mechanism controls access to an AP’s resources and services, and also allows for a radio to filter out the transmissions from other unrelated radios nearby. A radio first listens for beacons from an AP and then joins the BSS through a number of interactive steps, including authenticationand association.Figure 4, Independent and extended service set concepts As shown in Figure 4, the IEEE 802.11 standard further allows administrators to logically combine a set of one or more interconnected BSSs into one ESS (Extended Service Set) using DS (Distribution Service). An ESS appears as a single BSS to the LLC (Logical Link Control) layer at any station associated with one of those BSSs.The ad-hoc operating mode defined for IEEE 802.11 also follows the similar interactive establishment process of a Infrastructure BSS and is called IBSS (Independent BSS). While the name is “ad hoc”, IBSS still carries too much complexity and overhead to be suitable for vehicular communications in the DSRC use cases.A BSS is known to the users through the Service Set Identification (SSID). This corresponds to the names of WiFi hotspots that people can observe and connect to at home orpublic locations. The SSID information field is between 0 and 32 Bytes.2.1.2 BSSID and received frame filteringThe SSID should not be confused with the BSSID, which stands for Basic Service Set Identification. In contrast to SSID, BSSID is the name of a BSS known to the radios at the MAC level and is a 48-bit long field just like a MAC address. Each BSS must have a unique BSSID shared by all members. This is ensured simply by using the MAC address of the AP.For an IBSS, a locally administered IEEE MAC address is used. This is formed by using a random 46-bit number with the individual/group bit set to 0 and the universal/local bit set to 1. BSSID filtering is the key mechanism to restrict, at the MAC level, all incoming frames to only those received from radiosthat are members in the same BSS.Figure 5, IEEE 802.11 data frame formatAs shown in Figure 5, each IEEE 802.11 data frame includes up to 4 address fields. These address fields are used to carry source address (SA), destination address (DA), transmitting STA address (TA), receiving STA address (RA) and BSSID. The use of the four address fields differ according to the “To DS” (Distribution Service) and “From DS” bits in the frame control field, and is illustrated in Figure 6.To DS From DSAddress 1 Address 2 Address 3 Address 4 0 0 RA = DA TA = SA BSSID N/A 0 1 RA = DA TA = BSSID SA N/A 1RA = BSSIDTA = SADAN/A1 1 RA TA DA SAFigure 6, IEEE 802.11 data frame address field contents The MAC level of a station, upon receiving a frame from the PHY, uses the contents of the Address 1 field to perform address matching for receiving decisions. If the Address 1 field contains a group address (e.g., a broadcast address), the BSSID is compared to ensure that the broadcast or multicast originated from a station in the same BSS.A special case of the BSSID is the wildcard BSSID, which is composed of all “1s”. The current IEEE 802.11 standard limits the usage of the wildcard BSSID to only management frames of subtype probe request.2.2 WAVE Approaches2.2.1 WAVE modeIEEE 802.11 MAC operations, as described above, are too time-consuming to be adopted in IEEE 802.11p. Vehicular safety communications use cases demand instantaneous data exchange capabilities and cannot afford scanning channels for the beacon of a BSS and subsequently executing multiple handshakes to establish the communications.Think, for instance, of a scenario where a vehicle encounters another vehicle on the road coming from the opposite direction: depending on the vehicles dynamics, the time available for the communications may be extremely short.Therefore, it is essential for all IEEE 802.11p radios to be, by default, in the same channel and configured with the same BSSID to enable safety communications.A key amendment introduced by the IEEE 802.11p WAVE is the term “WAVE mode”. A station in WAVE mode is allowed to transmit and receive data frames with the wildcard BSSID value and without the need to belong to a BSS of any kind a priori. This means, two vehicles can immediately communicate with each other upon encounter without any additional overhead as long as they operate in the same channel using the wildcard BSSID.2.2.2 WAVE BSSEven for non-safety communications and services, the overhead of traditional BSS setup may be too expensive. A vehicle approaching a road side station that offers, say digital map download service, can hardly afford the many seconds that are typically needed in a conventional WiFi connection setup because the total time this vehicle would be in the coverage is very short.The WAVE standard introduces a new BSS type: WBSS (WAVE BSS). A station forms a WBSS by first transmitting a on demand beacon. A WAVE station uses the demand beacon, which uses the well known beacon frame and needs not to be periodically repeated, to advertise a WAVE BSS. Such an advertisement is created and consumed by upper layer mechanisms above the IEEE 802.11. It contains all the needed information for receiver stations to understand the services offered in the WBSS in order to decide whether to join, as well as the information needed to configure itself into a member of the WBSS. In other words, a station can decide to join and complete the joining process of a WBSS by only receiving a WAVE advertisement with no further interactions.This approach offers extremely low overhead for WBSS setup by discarding all association and authentication processes. It necessitates further mechanisms at upper layers to manage the WBSS group usage as well as providing security. These mechanisms, however, are out of the scope of the IEEE 802.11.2.2.3 Expanding wildcard BSSID usageGiven the focus of safety as the key usage of WAVE, the use of wildcard BSSID is also supported even for a station already belonging to a WBSS (i.e., configured with a particular BSSID). In other words, a station in WBSS is still in WAVE mode and can still transmit frames with the wildcard BSSID in order to reach all neighboring stations in cases of safety concerns. Similarly, a station already in a WBSS and having configured its BSSID filter accordingly, can still receive frames from others outside the WBSS with the wildcard BSSID.The ability to send and receive data frames with wildcard BSSID benefits not only safety communications. It is also able to support signaling of future upper layer protocols in this ad hoc environment.2.2.4 Distribution ServiceThe DS is still available to WAVE devices. Over the air, this simply means that it is possible for data frames to be transmitted with “To DS” and “From DS” bits set to 1. However, the ability for a radio in a WAVE BSS to send and receive data frames with the wildcard BSSID introduces complications. It is likely that a radio will be restricted to send a data frame with thewildcard BSSID only if the “To DS” and “From DS” bits are set to 0. In other words, radios that are communicating within the context of a WAVE BSS need to send data frames using a known BSSID in order to access DS.2.2.5MAC amendment summaryHere is a quick summary of the changes at MAC for WAVE operations:• A station in WAVE mode can send and receive data frames with the wildcard BSSID with “To DS” and “From DS”fields both set to 0, regardless of whether it is a member ofa WAVE BSS.• A WAVE BSS (WBSS) is a type of BSS consisting of a set of cooperating stations in WAVE mode that communicate using a common BSSID. A WBSS is initialized when a radio in WAVE mode sends a WAVE beacon, which includes all necessary information for a receiver to join. • A radio joins a WBSS when it is configured to send and receive data frames with the BSSID defined for that WBSS.Conversely, it ceases to belong to a WBSS when its MAC stops sending and receiving frames that use the BSSID of that WBSS.• A station shall not be a member of more than one WBSS at one time. A station in WAVE mode shall not join an infrastructure BSS or IBSS, and it shall not use active or passive scanning, and lastly it shall not use MAC authentication or association procedures.• A WBSS ceases to exist when it has no members. The initiating radio is no different from any other member after the establishment of a WBSS. Therefore, a WBSS can continue if the initiating radio ceases to be a member.3.PHY AMENDMENT DETAILSAt PHY level, the philosophy of IEEE 802.11p design is to make the minimum necessary changes to IEEE 802.11 PHY so that WAVE devices can communicate effectively among fast moving vehicles in the roadway environment. This approach is feasible because IEEE 802.11a radios already operate at 5 GHz and it is not difficult to configure the radios to operate in the 5.9 GHz band in the U.S. and similar bands internationally. It is also desirable and sensible because of the technical challenges involved in radically amending a wireless PHY design. While MAC level amendments are fundamentally software updates that are relatively easy to make, PHY level amendment necessarily should be limited in order to avoid designing an entirely new wireless air-link technology. Accordingly, three changes are made and are described in the following subsections.3.1.110 MHz channelIEEE 802.11p is essentially based on the OFDM PHY defined for IEEE 802.11a, with a 10 MHz wide channel instead of the 20 MHz one usually used by 802.11a devices.IEEE 802.11 already defines 10 MHz wide channels, and it is straightforward in implementation since it mainly involves doubling of all OFDM timing parameters used in the regular 20 MHz 802.11a transmissions. The key reason for this scaling of 802.11a is to address the increased RMS delay spread in the vehicular environments. A recent study by CMU and General Motors [8] shows that•Guard interval at 20 MHz is not long enough to offset the worst case RMS delay spread (i.e. the guardinterval is not long enough to prevent inter-symbolinterferences within one radio’s own transmissions inthe vehicular environments).•If choice is simply between scaled versions of 802.11a, then 10 MHz is a reasonable choice.3.1.2Improved receiver performance requirements While there are a number of channels available in the US and (expectedly) internationally for IEEE 802.11p deployment and usage, the nature of closely distributed vehicles on the road creates increased concern for cross channel interferences. The measurements presented in [9] demonstrated the potential for immediate neighboring vehicles (i.e., next to each other in adjacent lanes) to interfere each other if they are operating in two adjacent channels. For example, a vehicle A transmitting in channel 176 (see Figure 2) could interfere and prevent a vehicle B in the next lane (i.e. 2.5 m apart) from receiving safety messages sent by vehicle C that is 200 m away in channel 178. Cross channel interference is a well known and natural physical property of wireless communications. The most effective and proper solution to such concerns is through channel management policies that is completely outside of the scope at IEEE 802.11. Nevertheless, IEEE 802.11p introduces some improved receiver performance requirements in adjacent channel rejections. There are two categories of requirements listed in the proposed standard. Category 1 is mandatory and generally understood to be reachable with today’s chip manufacturers. Category 2 is more stringent and optional. It is likely to be more expensive to realize in the next few years.3.1.3Improved transmission maskSpecific to the usage of IEEE 802.11p radios in the U.S. ITS band (i.e., the 5.9 GHz DSRC spectrum), four spectrum masks are defined that are meant for class A to D operations. These constraints are issued in FCC CFR47 Section 90.377 and Section 95.1509.•For Class A operation using 10 MHz channel spacing, the transmitted spectrum shall have a 0 dBr bandwidthnot exceeding 9 MHz, and shall not exceed -10 dBr at5 MHz frequency offset, -20 dBr at 5.5 MHzfrequency offset, -28 dBr at 10 MHz frequency offset,-40 dBr at 15 MHz frequency offset and above.•For Class B operation using 10 MHz channel spacing, the transmitted spectrum shall have a 0 dBr bandwidthnot exceeding 9 MHz, and shall not exceed -16 dBr at5 MHz frequency offset, -20 dBr at 5.5 MHzfrequency offset, -28 dBr at 10 MHz frequency offset,-40 dBr at 15 MHz frequency offset and above.•For Class C operation using 10 MHz channel spacing, the transmitted spectrum shall have a 0 dBr bandwidthnot exceeding 9 MHz, and shall not exceed -26 dBr at5 MHz frequency offset, -32 dBr at 5.5 MHzfrequency offset, -40 dBr at 10 MHz frequency offset,-50 dBr at 15 MHz frequency offset and above.•For Class D operation using 10 MHz channel spacing, the transmitted spectrum shall have a 0 dBr bandwidthnot exceeding 9 MHz, and shall not exceed -35 dBr at5 MHz frequency offset, -45 dBr at 5.5 MHzfrequency offset, -55 dBr at 10 MHz frequency offset,-65 dBr at 15 MHz frequency offset and above.Generally speaking, these spectrum masks are more stringent than the ones demanded of the current IEEE 802.11 radios. There are debates regarding whether and when chip makers would be able to meet such requirements.4.SUMMARYWireless access in vehicular environment imposes a set of new requirements on the communications system that led to the introduction of the WAVE operating mode and of the WAVE BSS in IEEE 802.11p.When operating in WAVE mode, stations do not need to join a BSS as they can exchange data using a wildcard BSSID that is available at all times. This dramatically reduces the connection setup overhead and suits vehicular safety applications well. Private services offered over the DSRC spectrum service channels benefit from a reduced connection setup overhead through mechanisms defined for a WAVE BSS. Joining a WAVE BSS only requires receiving a single WAVE Advertisement message from the initiating station. A station in a WAVE BSS is further enabled to still send and receive data frames with the wildcard BSSID.While the IEEE 802.11p standardization process is moving closer to pass a letter ballot in the general IEEE 802.11 working group, there are also industry efforts in implementing and field testing such radios. Prototype IEEE 802.11p radios have been developed by the Vehicle Infrastructure Integration Consortium (VII-C) in 2007 both for on-board and roadside units. Likewise, interoperable radios are being built by the Crash Avoidance Metric Partnership (CAMP) for collision avoidance and vehicle-to-vehicle safety applications.It should be noted that while IEEE 802.11p describes how the communications take place over each individual channel of the DSRC spectrum, a complete communications system for WAVE needs to include support for multi-channel operations, security, and other upper layer operations. These are addressed by the IEEE 1609 trial-use standards, which are expected to be substantially updated in the near future.5.REFERENCES[1]“FCC Report and Order 03-324: Amendment of theCommission’s Rules Regarding Dedicated Short-RangeCommunication Services in the 5.850-5.925 GHz Band,”December 17, 2003.[2]“FCC Report and Order 06-110: Amendment of theCommission’s Rules Regarding Dedicated Short-RangeCommunication Services in the 5.850-5.925 GHz Band,”July 20, 2006.[3]“IEEE Std. 802.11-2007, Part 11: Wireless LAN MediumAccess Control (MAC) and Physical Layer (PHY)specifications,” IEEE Std. 802.11, 2007.[4] “IEEE P802.11p/D3.0, Draft Amendment for WirelessAccess in Vehicular Environments (WAVE),” July 2007. [5]“Standard Specification for Telecommunications andInformation Exchange Between Roadside and VehicleSystems - 5 GHz Band Dedicated Short RangeCommunications (DSRC) Medium Access Control (MAC)and Physical Layer (PHY) Specifications”, ASTM DSRCSTD E2313-02, 2002[6]“IEEE 1609.3-2007 WAVE Networking Services”, 2007[7]“IEEE 1609.4-2007 WAVE Multi-Channel Operation”,2007[8] D. Stancil, L. Cheng, B. Henty and F. Bai, “Performance of802.11p Waveforms over the Vehicle-to-Vehicle Channelat 5.9 GHz ”, IEEE 802.11 Task Group p report, September 2007[9]V. Rai, F. Bai, J. Kenney and K. Laberteaux, “Cross-Channel Interference Test Results: A report from the VSC-A project”, IEEE 802.11 Task Group p report, July 2007。
ieee802.11
IEEE 802.11h,2004年,无线覆盖半径的调整,室内 (indoor)和室外(outdoor)信道(5.2GHz频段)。 IEEE 802.11i,2004年,无线网络的安全方面的补 充。 IEEE 802.11j,2004年,根据日本规定做的升级。 IEEE 802.11l,预留及准备不使用。 IEEE 802.11m,维护标准;互斥及极限。 IEEE 802.11n,更高传输速率的改善,支持多输入 多输出技术(Multi-Input Multi-Output,MIMO)。 提 供标准速度300M,最高速度600M的连接速度 IEEE 802.11k,该协议规范规定了无线局域网络频 谱测量规范。该规范的制订体现了无线局域网络对频 谱资源智能化使用的需求。
数据传送率
编码长度
调制方式
波串速率
位数/波串ຫໍສະໝຸດ 1 Mbps2 Mbps 5.5 Mbps 11 Mbps
11 (BS串)
11 (BS串) 8(CCK) 8(CCK)
BPSK
QPSK QPSK QPSK
1 MSps
1 MSps 1.375 MSps 1.375 MSps
1
2 4 8
动态调节技术
为了支持在有噪音的环境下能够获得较好的传 输速率,802.11b采用了动态速率调节技术,来 允许用户在不同的环境下自动使用不同的连接 速度来补充环境的不利影响。在理想状态下, 用户以11M的全速运行,然而,当用户移出理 想的11M速率传送的位置或者距离时,或者潜 在地受到了干扰的话,这把速度自动按序降低 为5.5Mbps、2Mbps、1Mbps。同样,当用户回 到理想环境的话,连接速度也会以反向增加直 至11Mbps。速率调节机制是在物理层自动实现 而不会对用户和其它上层协议产生任何影响。
IEEE802.11-2020中译版:概述
IEEE802.11-2020中译版概述摘要 本系列文章为IEEE802.11-2020标准的中译版,本文原文请参考英文标准的第1章。
本章主要对标准的范围、目的等做了说明,并对标准中出现的单词用法做了说明。
1 范围该标准的范围是为本区域内的固定、便携式和移动站(STA)的无线连接定义一个媒体访问控制(MAC)和多个物理层(PHY)规范。
2 目的该标准的目的是为本地区域内的固定、便携式和移动站提供无线连接。
该标准还为监管机构提供了一种标准化访问一个或多个频段的方法,以便进行局域通信。
3 关于目的的补充资料具体而言,在符合IEEE802.11™标准的设备中,此标准—描述设备在独立、个人和基础结构网络中运行所需的功能和服务,以及这些网络中设备移动性(转换)的各个方面网络。
—描述允许设备与独立网络或基础结构网络外部的另一个此类设备直接通信的功能和服务。
—定义MAC过程以支持MAC服务数据单元(MSDU)传递服务。
—定义了几种由MAC控制的PHY信令技术和接口功能。
—允许在与多个重叠的IEEE802.11WLAN共存的无线局域网(WLAN)中操作设备。
—描述为通过无线介质(WM)传输的用户信息和MAC管理信息提供数据机密性和设备身份验证的要求和过程。
—定义动态频率选择(DFS)和发射功率控制(TPC)的机制,这些机制可用于满足任何频段操作的法规要求。
—定义MAC过程以支持具有服务质量(QoS)要求的局域网(LAN)应用程序,包括语音、音频和视频的传输。
—定义设备的无线网络管理机制和服务,包括BSS转换管理、信道使用和共存、并置干扰报告、诊断、组播诊断和事件报告、灵活的多播、高效的信标机制、代理ARP播发、位置、时序测量、定向多播、扩展休眠模式、流量过滤和管理通知。
—定义帮助设备发现和选择网络的功能和程序,使用QoS映射从外部网络传输信息,以及提供紧急情况的一般机制服务业。
—定义无线多跳通信所需的MAC过程,以支持无线LAN网状拓扑。
IEEE 80211
EEE 802
Version 1.0 IEEE 802 March 2011 workshop Page 9
EEE 802
Version 1.0 IEEE 802 March 2011 workshop Page 10
Market Size and Trends
900
800
700 600 Devices (million) 500 400 300 200 100
―At lectures, symposia, seminars, or educational courses, an individual presenting information on IEEE standards shall make it clear that his or her views should be considered the personal views of that individual rather than the formal position, explanation, or interpretation of the IEEE.‖
• Regulated & Shared
– Regulatory considerations –by region – Interference
15 28-Jul-13
EEE 802
Page 15
Version 1.0
IEEE 802 March 2011 workshop
Wireless Constraints
IEEE-SA Standards Board Operation Manual (subclause 5.9.3)
2 28-Jul-13
802.11通信协议
1.0 Changes required to implement the mandatory portion
1.1 Service Field Changes
To accommodate the optional modes of the standard, the following Service Field should be used for 802.11b transmissions. 1.2 High Rate PLCP sublayer 1.2.1 Overview This subclause provides a convergence procedure for the 2, 5.5, and 11 Mbps mandatory 802.11b modes, the optional PBCC-22 and PBCC-33 optional modes, and the optional CCK-OFDM modes at 6, 9, 12, 18, 24, 36, 48, and 54 Mbit/s specification in which PSDUs are converted to and from PPDUs. During transmission, the PSDU shall be appended to a PLCP preamble and header to create the PPDU. Two different mandatory supported preambles and headers are defined: the long preamble and header which interoperates with the 1 and 2 Mbit/s DSSS specification as described in IEEE Std 802.11-1999, and the short preamble and header as described in IEEE Std 802.11b-1999. At the receiver, the PLCP preamble and header are processed to aid in demodulation and delivery of the PSDU. The short preamble and header is intended for applications where maximum throughput is desired and interoperability with legacy and non-short preamble capable equipment is not a consideration. That is, it is expected to be used only in networks of like equipment that can all handle the mode. 1.2.3.3 Long PLCP Signal (SIGNAL) field The 8-bit signal field indicates to the PHY the modulation that shall be used for transmission (and reception) of the PSDU. The High Performance PHY supports five mandatory rates given by the following 8 bit words where the lsb shall be transmitted first in time: a) X’0A’ (msb to lsb) for 1 Mbit/s b) X’14’ (msb to lsb) for 2 Mbit/s c) X’37’ (msb to lsb) for 5.5 Mbit/s d) X’6E’ (msb to lsb) for 11 Mbit/s e) X’DC’ (msb to lsb) for 22 Mbit/s f) X’21’ (msb to lsb) for 33 Mbit/s The High Performance PHY rate change capability is described in g.2.3.14. This field shall be protected by the CCITT CRC-16 frame check sequence described in G.2.3.6. 1.2.3.4 Long PLCP SERVICE (SERVICE) field Six bits have been defined in the SERVICE field to support the high performance extension. The three right most bits (bits 5, 6 and 7) shall be used to supplement the LENGTH field described in G.2.3.5. Bit 3 shall be used to indicate whether the modulation method is CCK <0> or PBCC <1> as shown in Table 1. Bit 2 is used to indicate that the transmit frequency and symbol clocks are derived from the same oscillator. For an 802.11g-compliant device, this Locked Clocks bit shall be set to 1. The bit b0 if set to 1 indicates the modulation mode is CCK-OFDM.
On the Fidelity of 802.11 Packet Traces
On the Fidelity of802.11Packet TracesAaron Schulman,Dave Levin,and Neil SpringDepartment of Computer ScienceUniversity of Maryland,College Park{schulman,dml,nspring}@Abstract.Packet traces from802.11wireless networks are incompleteboth fundamentally,because antennas do not pick up every transmission,and practically,because the hardware and software of collection may beunder provisioned.One strategy toward improving the completeness ofa trace of wireless network traffic is to deploy several monitors;these arelikely to capture(and miss)different packets.Merging these traces intoa single,coherent view requires inferring access point(AP)and clientbehavior;these inferences introduce errors.In this paper,we present methods to evaluate thefidelity of merged and independent wireless network traces.We show that wireless tracescontain sufficient information to measure their completeness and clockaccuracy.Specifically,packet sequence numbers indicate when packetshave been dropped,and AP beacon intervals help determine the accuracyof packet timestamps.We also show that trace completeness and clockaccuracy can vary based on load.We apply these metrics to evaluatefidelity in two ways:(1)to visualize the completeness of different802.11traces,which we show with several traces available on CRAWDAD and(2)to estimate the uncertainty in the time measurements made by theindividual monitors.1IntroductionStudying wireless networks“in the wild”gives researchers a more accurate view of802.11behavior than simulations alone.Researchers deploy monitors at hotspots such as cafes or conferences[10],or measure other deployed net-works[1],to obtain traces of MAC and user behaviors.These traces provide realistic models of mobility[11,18]and interference[1,3]and many traces are readily available through sites such as CRAWDAD[7].However,traces of real wireless networks have their own errors or assump-tions.Indeed,capturing a high-quality wireless trace requires great -ing too few monitors,placing them poorly,or using inadequate hardware can introduce missed or reordered packets and incorrect timestamps[10,16,17]. If multiple monitors are used,a merging algorithm combines the independent traces into a single view of the wireless network[10],but this process may order This work was supported by NSF-0643443(CAREER).Dave Levin was supported in part by NSF Award CNS-0626964and NSF ITR Award CNS-0426683.packets incorrectly.These potential errors mean that publicly available wireless traces vary greatly in quality(§5).Researchers must decide for themselves which wireless trace will provide them the most accurate,reproducible results.We consider the problem of measuring thefidelity of wireless traces,which we decompose to their completeness—what fraction of the packets that could have been captured in fact were—and the accuracy of their timestamps.Our work is motivated by others’observations on how to use and improve the data that drives the networking community.As Paxson[12]notes,it is beneficial to identify how closely a measurement compares to reality before using it as experiment data.Haeberlen et al.also observe that researchers may fall into the trap of inappropriately generalizing their results if based on very specific or perhaps error-ridden data[8].The difficult nature of capturing wireless traces further motivates a set of metrics and systematic means of measuring their quality.We discuss how wireless tracefidelity can be measured by exploiting infor-mation in the trace(§3);external validation data is rarely available.We analyze a scoring method for wireless traces(§4).The percent of packets captured has been thought to be sufficient for quantifying a trace’sfidelity,but we show that a richer description offidelity is important and propose a way to visualize trace completeness that incorporates load(§5).We present several case studies from the CRAWDAD repository.We then study the accuracy of monitor and bea-con timestamps,showing that clock accuracy is largely inversely proportionate to load and that clocks may need to be synchronized more frequently than at beacon intervals(§6).We conclude with lessons learned and directions for future work(§7)./projects/wifidelity holds our code and results. 2Related WorkBecause wireless traces are imperfect,many researchers have sought to improve tracefidelity.Yeo et al.[16,17]and Rodrig et al.[14]discuss the steps they took to obtain high-fidelity traces,and use missing packets(§4)as a measure offidelity.We focus on the relationship between trace quality and load on the monitor,and compare existing traces using our metrics.Wit[10]attempts to refine existing traces by inferring and inserting missing packets.We believe traces that are as complete as possible at the time of capture are preferable,but that more complete traces will help the missing packet infer-ence.Our tools are intended to help guide researchers toward capturing better traces and choosing the trace that best suits their needs.Wireless traces are used for many reasons:to validate models of wireless be-havior,study usage characteristics,and so on.Jigsaw[4,5]uses wireless traces to measure and troubleshoot wireless networks.We emphasize that these pieces of work evaluate the network,and not the trace.We expect our work to com-plement these and other similar projects as pathologies in the input trace data could easily lead to false diagnosis by troubleshooting tools.3Self-Evident Truths of Wireless TracesIdeally,one could determine a trace’sfidelity by comparing it to“truth”:a perfect,complete trace of what was sent and when.In practice,only the trace itself is available.We show how the information in a wireless trace itself can be used to measure the trace’sfidelity by detecting missed packets and measuring clock skew,and discuss the limitations of our methods.3.1Core data in wireless tracesTraces vary in the information they include.Some traces have timestamps precise to nanoseconds,others only to milliseconds;not all traces record802.11acknowl-edgments;to maintain users’anonymity,few researchers release full payloads, and so on[13,15].The following data are available in all802.11CRAWDAD traces;we assume them as the core data that are likely to be available in future wireless traces:1.All types of data packets.2.All types of management packets including beacons,probe requests,andprobe responses.3.Full802.11header in all captured packets,including source and destinationaddresses(possibly anonymized),sequence number,retransmission bit,type, and subtype.Beacon packets also have timestamps applied by the AP.4.Monitor’s timestamp(set by the kernel or possibly the device).3.2Detecting missed packetsMonitors can fail to capture a packet because the monitor is overloaded,because there is interference and perhaps no stations receive the packet,because the signal is too weak at the monitor,and so on(Fig.1).A common practice to reduce the number of missed packets is to place each monitor near an AP.Most packet loss at the monitor can be inferred from802.11sequence numbers and the retransmission bit.When initially transmitted,each host(AP and client) assigns a packet a monotonically increasing sequence number from0to4095(or 2047in some Cisco APs),and sets the retransmission bit to zero.One sign of missed packets is a gap in captured sequence numbers from a given host.Another sign of missed packets is a retransmitted packet without the correspondingfirst (non-re)transmission.Missed retransmissions are more difficult to infer.Upon retransmission,the packet’s sequence number remains unchanged,but the retransmission bit is set to one;future retransmissions of this packet are identical,which means that not all retransmissions can be inferred.If802.11acks and accurate timestamps are available,some of these retransmissions could be inferred.For instance,if a monitor captures an ack that is too late to correspond to any captured retrans-mission,we could infer that there must have been another retransmission.We do not consider this approach further,since not all traces contain acknowledgments.Fig.1.Example sources of packet loss or timing errors in capturing wireless traces.3.3Detecting incorrect timestampsMonitors apply a timestamp to every packet in the kernel or possibly in the wireless device itself.The accuracy of these timestamps is vulnerable to delay at the AP and clock skew or clock drift at the monitor.Delay at monitors can come for many reasons,some of which we show in Fig.1.Beacon packets serve as a source of“truth”in that they allow us to syn-chronize the monitor’s clock[5,10].However,this introduces its own sources of inaccuracy;timestamps in the beacon packets are subject to delay errors at the AP.Delay at the AP comes predominately in times of high load.When it is time to send a beacon packet,the AP creates the payload(including the timestamp), and attempts to send it.The timestamp in the beacon packets denotes when the packet was created,not necessarily when it was sent.Under high load,the packet may be stalled until the medium becomes free[2],increasing the difference between the packet’s timestamp and when it was actually sent.4Scoring a Wireless Trace’s CompletenessWe propose a method to score wireless trace completeness.We value complete-ness—the fraction of packets captured—with the expectation that the more complete a trace is,the more useful it is.In the following section,we use our score along with traffic load to visualize completeness.4.1Estimating the number of missed packetsOur scoring method is based on the number of missing packets from the wireless trace.This is an extension of what was introduced by Yeo et al.[16].We define P t to be the number of packets that should have appeared over time t.P t def=nodes SeqNumChange t+nodesRetransmissions tThe number of missing packets during time t,M t,is the number of packets that should have been captured minus the number of packets that were captured:M t def=P t−nodesNumPacketsCaptured t-0.04-0.02 0 0.02 0.04 0.06 0.08 0.1 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.91R e l. e r r o r o f m i s s . p a c k e t e s t i m a t e Frac. non-beacon packets removed Fig.2.Validation of our missing packets estimation.Starting with a high-quality trace (the Portland State University ug trace [13]),we remove non-beacon packets uniformly at random.Error bars represent 95%confidence intervals.To evaluate the accuracy of this expression,we apply it to traces that we inten-tionally degrade.Starting with a high-quality trace (the Portland ug trace),we created progressively lower-quality traces by removing non-beacon packets uni-formly at random and computed our score on these degraded traces (we expect monitors to capture most beacon packets:§5).We present the error of our miss-ing packets estimation in Figure 2.Ideally,our method would detect all of these removed packets,but it is impossible to detect missing retransmission packets without 802.11acknowledgments (§3).Even with a drastically degraded trace missing 95%of non-beacon packets,our score underestimates actual packet loss by only 10%.For more reasonable packet loss,our score has less than 5%error.These results indicate that this method of detecting missing packets is accurate for both high-and low-quality traces .4.2Score definitionWe define the score of a wireless trace’s completeness during time t ,S t ,as thefraction of packets captured during time t :S t def =1−Mt P t .Both APs and clients increment an independent sequence number for each unique packet transmitted.The technique used to reveal missing packets sent by an AP can do the same for clients.Unlike APs,clients do not transmit beacon packets at a regular interval.We must therefore be careful to keep track of how long it has been since the monitor last received a packet from a given client,so as to distinguish loss from,say,mobility.Our scoring method is subject to the same limitations as the missing packet estimation;the score cannot identify missing retransmissions.5Visualizing Wireless Trace CompletenessTrace completeness is an important component of fidelity.Rodrig et al.[14],for example,have used the percent of packets captured,similar to the score from1 10 100 1000 10000 100000 1e+06 1e+07Load (change in sequence number)S c o r e 10100 1000 10000 100000 1e+06 1e+07Load (change in sequence number)S c o r e Fig.3.Example T-Fi plots from the Sigcomm 2004“chi”dataset,with scoring for only the AP (left),and scoring for APs and clients in a BSS (right).§4,but we find a single number to be insufficient.This is in part because trace quality can depend on load.A monitor may appear to capture a high percentage of packets,and one may be inclined to use that percentage to quantify the quality of a trace,but this number is misleading.For example,the Sigcomm 2004trace “chi”contains 81%of AP data and management transmissions on channel 11.This percentage does not reveal that 37%of the packets collected were beacon packets sent when the AP was idle;not sending any other data or management packets.Excluding beacon packets sent during otherwise idle times,the monitor only saw 70%of the AP’s transmissions.5.1T-Fi plotsTo overcome this problem,we visualize the score with a colormap,as shown in Figure 3.We refer to the colormaps as T-Fi or Trace Fidelity plots.The x -axis denotes the load from an epoch (beacon interval)in terms of the sequence number change during that epoch,and the y -axis denotes the score for that load.Color intensity denotes how often that (x,y )-pair occurred throughout the trace.The T-Fi plot displays these trace features:1.The location on the y -axis shows completeness.2.The width of the shaded region on the x -axis shows the range of load.3.The intensity of the shaded region shows the frequency of load.An ideal trace would have no missing packets and therefore a score of 1;in our visualization,this corresponds to a dark bar only at the top of the graph (the closest example of this is the Portland UG trace in Fig.4).Fig.3(left)shows how the single number problem can be overcome with a T-Fi plot.The darkest point on the plot is in the upper left hand corner.The upper left hand corner (sequence number change 1and score 1)represents idle time beacon packets sent from an AP.The number of beacon intervals in this trace that fell in this region is 100times larger than any other region in the plot.This would dominate a simple percentage,but is relegated to a small,clear region of the T-Fi plot.For load between 30and 50,the trace scores no greater than 0.1,indicating low fidelity under high load.Indeed,Fig.3(left)shows a negative correlation of fidelity to load.1 10 100 1000 10000 100000Load (change in sequence number)S c o r e 1 10 100 1000 10000 100000Load (change in sequence number)S c o r e 1 10 100 1000 10000 100000Load (change in sequence number)S c o r e Fig.4.Trace completeness visualization for Portland PDX traces [13].1 10 100 1000 10000Load (change in sequence number)S c o r e 1 10 100 1000 10000Load (change in sequence number)S c o r e 1 10 100 1000 10000Load (change in sequence number)S c o r e Fig.5.Trace completeness visualization for IETF 2005conference traces [9].5.2Case studiesWe analyzed the completeness of several traces obtained from CRAWDAD using the T-Fi visualization.We show two sets of traces:the Portland PDX VWave dataset and traces collected during the 2005IETF meeting.Monitors from these traces may have captured unintended traffic from outside sources.The T-Fi plots shown in Figs.4and 5are filtered to show only the BSS with the highest traffic.Portland PDX traces show how specialized 802.11monitor equipment can improve trace quality.Phillips et al.[13]used a VeriWave WT20commercial wireless monitor to capture their traces.VeriWave has a hardware radio inter-connect to provide real time merging with 1microsecond synchronization accu-racy.UG has the best combination of high score and load.UG’s T-Fi plot has a wide shaded region scoring 1covering load values 1to 40.This trace is close to complete and contains both high and low load epochs;Fig.3(left)represents a comparatively incomplete trace.The pioneer trace (Fig.4center)was captured from an outdoor courtyard.Even with powerful monitor hardware,the monitor missed many packets in the pioneer trace.The trace contains a wide range of load values (1to 50)but rarely scored above 0.5in higher load epochs.Evidently,the pioneer trace is missing packets independently of the load.We believe the clients and AP captured by the trace were out of range or the monitor was receiving interfered signals.The psu-cs T-Fi plot (Fig.4right)has few dark-colored regions,indicating that there was low load on the network.-800-600-400-200 0 200 400 600 800250 300 350C l o c k d i f f e r e n c e (m i c r o s e c ) 1 Beacon interval (50msec)Idle-800-600-400-200 0 200 400 600 800 1000 1050 1100C l o c k d i f f e r e n c e (m i c r o s e c ) 1 Beacon interval (50msec)Busy Fig.6.Difference in monitor timestamps and beacon timestamps for the Sigcomm’04“chi”trace (top left),with the load shown (bottom left).A controlled experiment with 50msec beacon intervals without load (middle)and with (right).IETF 2005traces exhibit high score variability under any given load.A load that scores consistently is represented in a T-Fi plot by a column that has only a few dark bars close together.This can be seen at sequence number change 40on the T-Fi plot of “chan 6ple”in Fig.5.If the score varies greatly for a sequence number change the column will consist of similar colored bars;“chan 1day”shows this behavior between sequence number changes 10and 40.The traces captured during the plenary sessions are of higher quality than the day sessions,showing the apparent effects of mobility on trace completeness.T-Fi plots of the day traces in Figure 5do not score as highly as the plenary trace.For example,the plenary session traces score higher in high bandwidth epochs.We posit that the day traces scored lower in high bandwidth epochs because clients are mobile during the day.During the plenary sessions,the meeting participants were likely to be stationary more often than in the day traces.6Timestamp AccuracyThe accuracy of a trace’s timestamps is important for many applications;merg-ing algorithms [5,10],for instance,use monitor and beacon timestamps to form a single,coherent view of the wireless network as viewed from potentially many monitors.A common assumption in these algorithms is that the difference be-tween a monitor’s timestamp—stamped in the kernel or the device itself—and the AP’s timestamp—included in the beacon packet—is predictable and consis-tent on at least the order of beacon intervals (100msec).We test this hypothesis by observing the difference between monitor times-tamp and beacon timestamp over time throughout a trace.For the Sigcomm’04trace (Fig.6left),we plot the clock difference (top)and the load in number of packets captured (bottom).The clock difference is not consistent from one bea-con interval to the next,indicating that there is clock skew at the monitor and/or the AP.To see whether the clock difference was at least consistent within a given beacon interval,we collected our own trace using the MeshTest testbed [6]with a beacon interval of 50msec.When no clients are sending data (Fig.6middle),the clock difference does change between normal(100msec)beacon intervals,but in what appears,in this case at least,to be a predictable manner.However,when a client is sending(Fig.6right),the clock changes are not predictable,again indicating a correlation of clock difference with load.These results show that the common assumption underlying known merging algorithms is false.The question remains whether this is sufficient to cause a mis-ordering of packets.Though we have observed mis-orderings from Wit[10], it is unclear whether this is due to an algorithmic error or simply a bug in Wit. Nonetheless,we propose as a sanity check that merging algorithms ensure proper sequence number order(not necessarily strictly increasing:§7).7DiscussionWe considered the problem of quantifying wireless tracefidelity and evaluated a scoring method,proposed the T-Fi visualization,and presented an analysis of clock accuracy in wireless traces.Wireless tracefidelity applies when choosing, improving,or inferring gaps in wireless traces.Choosing a trace.Researchers will choose traces from a repository like CRAWDAD based primarily on the type of data in the trace,for example mo-bility or traffic type.However,we expectfidelity to decide which trace—or subset of the trace—to use.Improving traces.Measuring tracefidelity need not be strictly a post-mortem analysis;rather,researchers ought to measure thefidelity of their mea-surements during their measurement,so that they may,for example,move their monitors.An interesting and important area of future work is to develop tools to aid in the active capture of wireless traces,so that researchers can ensure high-fidelity traces in unique hotspots such as a conference.We conclude with lessons we learned about merging and processing wireless traces in the process of working with as many traces as we could collect.Update tools in accordance with new specs.Tools to measure thefi-delity of wireless traces must be updated frequently,as new802.11specs are de-ployed.The802.11e QoS amendment introduced a new sequence number space for QoS in mid-2006.This did not turn up in our initial testing on the Sig-comm’04trace,but did in the Portland traces(late2006),and we had to adjust our tool accordingly.Account for vendor-specific behavior.Some vendors introduce behav-ior not specified in802.11,and this may make the trace appear to be of lower fidelity.We observed that the Cisco access point in the Sigcomm’04trace as-signed sequence numbers to broadcast and multicast packets,then transmitted the packets after others were sent,causing some sequence numbers to appear out of order.To account for this,we allowed these packets to appear out of order in sequence number.Acknowledgements.We thank Justin McCann and the anonymous reviewers for their helpful comments,Brenton Walker and Charles Clancy for allowing us to use the MeshTest testbed,and Ratul Mahajan for supporting Wit. References1. D.Aguayo,J.Bicket,S.Biswas,G.Judd,and R.Morris.Link-level measurementsfrom an802.11b mesh network.In SIGCOMM,2004.2.ANSI/IEEE.Std802.11,1999.3.S.Biswas and R.Morris.Opportunistic routing in multi-hop wireless networks.InSIGCOMM,2005.4.Y.-C.Cheng,M.Afanasyev,P.Verkaik,P.Benk¨o,J.Chiang,A.C.Snoeren,S.Sav-age,and G.M.Voelker.Automating cross-layer diagnosis of enterprise wireless networks.In SIGCOMM,2007.5.Y.-C.Cheng,J.Bellardo,P.Benk¨o,J.Chiang,A.C.Snoeren,G.M.Voelker,andS.Savage.Jigsaw:Solving the puzzle of enterprise802.11analysis.In SIGCOMM, 2006.6.T.Clancy and B.Walker.MeshTest:Laboratory-based wireless testbed for largetopologies.In TridentCom,2007.7.CRAWDAD Website./.8. A.Haeberlen,A.Mislove,A.Post,and P.Druschel.Fallacies in evaluating decen-tralized systems.In IPTPS,2006.9. A.Jardosh,K.N.Ramachandran,K.C.Almeroth,and E.Belding.CRAW-DAD data set ucsb/ietf2005(v.2005-10-19).Downloaded from http://crawdad.cs./ucsb/ietf2005,Oct.2005.10.R.Mahajan,M.Rodrig,D.Wetherall,and J.Zahorjan.Analyzing the MAC-levelbehavior of wireless networks in the wild.In SIGCOMM,2006.11.W.Navidi and T.Camp.Stationary distributions for random waypoint models.IEEE Transactions on Mobile Computing,3(1),2004.12.V.Paxson.Strategies for sound Internet measurement.In IMC,2004.13. C.Phillips and S.Singh.CRAWDAD data set pdx/vwave(v.2007-08-13).Down-loaded from /pdx/vwave,Aug.2007.14.M.Rodrig,C.Reis,R.Mahajan,D.Wetherall,and J.Zahorjan.Measurement-based characterization of802.11in a hotspot setting.In E-WIND,2005.15.M.Rodrig,C.Reis,R.Mahajan,D.Wetherall,J.Zahorjan,and zowska.CRAWDAD data set uw/sigcomm2004(v.2006-10-17).Downloaded from http: ///uw/sigcomm2004,Oct.2006.16.J.Yeo,S.Banerjee,and A.Agrawala.Measuring traffic on the wireless medium:Experience and pitfalls.Technical report,CS-TR4421,University of Maryland, College Park.Available at /1903/124,Dec.2002.17.J.Yeo,M.Youssef,and A.Agrawala.A framework for wireless LAN monitoringand its applications.In WiSE,2004.18.J.Yoon,M.Liu,and B.Noble.Random waypoint considered harmful.In INFO-COM,2003.。
ieee.802.11p的工作原理
ieee.802.11p的工作原理IEEE 802.11p是一种无线通信标准,也被称为Wireless Access in Vehicular Environments(WAVE),它主要应用于车辆与车辆之间的通信,也被视为一种短距离的无线接入技术。
以下是对其工作原理的简要介绍:1. 物理层(Physical Layer):这是IEEE 802.11p协议的最底层,主要负责处理无线信号的发送和接收。
它包括调制、扩频、解扩频、混频等操作,以将数据转化为适合无线传输的信号。
2. 数据链路层(Data Link Layer):这一层包括逻辑链路控制子层(LLC)和媒体访问控制子层(MAC)。
LLC子层负责处理错误检测和修复,以及数据序列的重排。
MAC子层则负责管理无线信道的访问,包括信道分配、流量控制和多路复用等。
3. 网络层(Network Layer):这一层主要负责处理数据包的路由选择和转发。
它使用IP协议进行数据包的封装和解析,并通过无线路由器或其他网络设备将数据包从一个网络转发到另一个网络。
4. 传输层(Transport Layer):这一层主要负责提供端到端的通信服务,包括数据包的分段、重组、错误控制和流量控制等。
通常使用TCP或UDP协议。
5. 应用层(Application Layer):这是最顶层,它根据应用程序的不同需求,提供各种应用协议。
例如,在车辆间通信中,可能会使用交通安全应用协议、导航应用协议等。
在通信过程中,IEEE 802.11p使用直序扩频(DSSS)或者跳频扩频(FHSS)方式发送数据,接收端则通过对应的方式接收和解码数据。
此外,为了确保通信的可靠性,IEEE 802.11p还支持多种重传机制,例如自动重传请求(ARQ)和前向纠错(FEC)。
IEEE 802.11p是一种非常有效的短距离无线通信技术,尤其适用于车辆间的高速移动通信环境。
然而,由于其工作原理涉及到复杂的编码和解码过程,以及多个层次的协议处理,因此在实际应用中需要针对具体场景进行优化和调整。
Principles of IEEE 802.11s
Principles of IEEE802.11sGuido R.Hiertz∗,Sebastian Max∗,Rui Zhao∗,Dee Denteneer†,Lars Berlemann‡∗Chair of Communication Networks,Faculty6,RWTH Aachen University,Aachen,Germany†Philips,Eindhoven,The Netherlands‡Swisscom,Bern,SwitzerlandAbstract—In2003,interests in the Institute of Electronics and Electrical Engineering(IEEE)802.11Working Group(WG)led to the formation of Task Group(TG)“S”.802.11s develops a Wireless Mesh Network(WMN)amendment.Unlike existing Mesh products,802.11s forms a transparent802broadcast domain that supports any higher layer protocols.Therefore, 802.11s provides frame forwarding and path selection at layer-2. 802.11i describes a security concept for stations that associate with an Access Point(AP).However,in a Mesh Basic Service Set(BSS)devices need to mutually authenticate to provide integrity of the network.Thus,802.11s adds additional elements to the concepts of802.11i.While traditional Wireless Local Area Networks(WLANs)are AP centred an802.11Mesh is fully distributed.Hence,802.11s considers extensions to the Medium Access Control(MAC)too.The authors have contributed to the standardization of802.11s since2003.As constant participants we give insight to draft1.02 of TG“s”and provide an outlook to future evolution of802.11’s first Mesh standard.Index Terms—IEEE802.11s,IEEE802.11,Wireless Mesh Network,Mesh BSS,WLANI.I NTRODUCTIONWireless Local Area Networks(WLANs)have become ubiquitous.As soon as802.11n becomes afinale amendment, data rates up to600Mb/s will be available.However,transmis-sion range becomes a limiting factor as channels are limited to 20MHz resp.40MHz and transmission power may not exceed 100mW.In case of802.11,dense deployment of Access Points (APs)is needed to meet customer’s expectations of ubiquitous wireless connectivity at high speed.To interconnect,APs rely on afixed backbone.While APs are cheap,the sufficient de-ployment of the wired infrastructure is expensive.To overcome the cost barrier,APs need to interconnect wirelessly[1],[2]. In802.11,amendment“s”describes the necessary functions to form a Wireless Mesh Network(WMN).While in beginning the project was restricted to APs only,the latest change to its Project Authorization Request(PAR)makes802.11s much moreflexible.In the following,we provide an introduction to 802.11s and its latest trends.A.OutlineThis paper bases on[3]that is approved as revision2007 of802.11.Among others,it incorporates the amendments 802.11e(support for Quality of Service)and802.11i(security enhancements).Section II introduces the802.11architecture and the amendments of802.11s[4].Section III describes Medium Access Control(MAC)in802.11s.Due to limited space,the authors cannot present simulation results[5].How-ever,we explain in detail why the current scheme limits performance to a low degree.Thesefindings are in accordance with simulation results presented at the802.11Working Group (WG)meeting in September2006.In section IV resp.V we explain synchronization and power saving concepts.In section VI we introduce the security concepts of802.11i and the necessary changes for802.11 Mesh.Link management and path selection are introduced in section VII and VIII.An outlook and conclusion is given in section IX.II.802.11A RCHITECTUREIn802.11[3],the most basic entity is a station.Any device that satisfies the requirement of an802.11conformant Medium Access Control(MAC)and Physical Layer(PHY) may be denoted as station.A station with extended capabilities that is the central device for other stations of a Wireless Local Area Network(WLAN)is named Access Point(AP). Wireless stations authenticate and associate with an AP to get access to the network.Thus,the AP and its associated stations form a star topology.In802.11,this topology is called an infrastructure Basic Service Set(BSS).In addition,an Independent Basic Service Set(IBSS)is formed without an AP.802.11generically defines the BSS as a set of stations that have successfully joined.In the following we focus on the infrastructure BSS as it is the most often used type of deployment.In it,stations rely on the AP for communication. Each station has at least a link to the AP to be able to participate in the BSS.In802.11the term link is defined from the MAC layer’s point of view.A single physical path over the Wireless Medium(WM)describes the802.11link that enables two stations to exchange MAC Service Data Units(MSDUs). Despite the optional unacknowledged mode of802.11e,in 802.11every successfully received MSDU is acknowledged. As the Acknowledgment(ACK)is a short frame that is usually sent at a robust Modulation and Coding Scheme(MCS),its Packet Error Rate(PER)is much smaller than the acknowl-edged frame.Hence,in wireless communication successful transmission of a data frame from station A to station B does not guarantee the reverse[6].However,although not explicitly stated802.11assumes all links to be bidirectional.As the infrastructure BSS forms a wireless single-hop net-work where all participating stations send and receive frames via the AP,the AP operates as relay between them.WithFigure 1.Here,A wants to communicate with B.It sends out an ARP request to resolve B’s MAC address.Both 802.3segments are transparently interconnected via a Mesh BSS.MPs C,I and W are co-located with a portal.They bridge the non-802.11and the 802.11s segment.The spanning tree protocol seamlessly works over 802.11s to avoid looping.The Mesh BSS also connects APs L,R and S to form a single ESS.Thus,J,K,O,P,Q and U can roam inside the ESA.the help of the Distribution Service (DS)multiple APs may interconnect their BSSs to form an Extended Service Set (ESS).802.11calls the total area covered by all interconnected BSSs the Extended Service Area (ESA).Within the ESA stations may roam from one AP to another.To form an ESS,APs use the Distribution System Service (DSS).The AP relies on the Distribution System Medium (DSM)to provide the DSS.At present,the DSM is a non-802.11network.It may be either a logical entity that exists within in the AP or it is typically based on an 802.3Local Area Network (LAN)segment.Even when in mutual communication range,APs do not use the WM to exchange frames.Today’s AP are usually collocated with a portal,since the latter provides the integration service that delivers MSDUs to non-802.11networks.The portal allows the AP to access the 802.3LAN that builds the DSM.Through the DS,the ESS appears as a single logical network to the Logical Link Control (LLC)layer.Thus,the DSS enables handover within the ESS and seamless frame forwarding between APs,portals and stations.To allow for addressing stations within a different BSS,802.11provides up to four address fields to the AP:•The Source Address (SA)holds the MAC address of the station that generates a frame•The ultimate and final receiver’s address is denoted in the Destination Address (DA)field•When an AP forwards a frame,Transmitter Address (TA)holds its own MAC address•The AP uses the Receiver Address (RA)field to indicate the next intended receiver in the ESS.A.Mesh BSS extensions to the 802.11architecture802.11s [4]defines the Mesh.The basic element in 802.11s is the Mesh Point (MP).Unlike any other 802.11entity,MPs may exchange frames over multiple wireless hops.Thus,MPslargest support in 802.11Task Group (TG)s.Following the 802.11definition of a Basic Service Set (BSS),a set of MPs is referred to a Mesh BSS.802.11states that “Membership in a BSS does not imply that wireless communication with all other members of the BSS is possible.”The same is valid for a Mesh BSS.However,with multi-hop connections members of the Mesh BSS may be able to communicate as long as a Mesh Path exists between them.More precisely,if MP A becomes an element of the set of MPs that is formed,when beginning with the set of MP B’s peer MPs,for every element of the set each element’s set of peer MPs is added until no new element can be added,MP A and MP can exchange MAC Service Data Units (MSDUs).Thus,the concatenated set of Mesh Links (MLs)defines a Mesh Path.An MP may establish a ML with any candidate peer MP in its neighborhood.While the neighborhood includes any MP to which an 802.11link exists,a candidate peer MP has additional credentials and properties in common.Accordingly,an MP to which an ML has been established is denoted as a peer MP.To set up an ML,two MPs perform the 802.11s peer link management protocol over the 802.11link.1)Mesh header field:Unlike Wireless Mesh Networks (WMNs)based on [7],802.11s transparently supports any higher layer protocols.Furthermore,it seamlessly integrates in the Institute of Electronics and Electrical Engineering (IEEE)802set of standards.Thus,the Mesh BSS must support all kinds of unicast,multicast and broadcast traffic,see Fig.1.Therefore,802.11s introduces the Mesh header field.It in-cludes four or sixteen octets.The first octet holds the Mesh Flags field.Its first bit indicates the presence the presence of Address Extension (AE).All other bits are reserved.The second octet defines the Mesh Time to Live (TTL).To avoid frames from endless looping,every MP that forwards a frame decrements the counter.As the 802.11sequence control field is set per hop,octets three and four provide Mesh End-to-End (E2E)sequence numbering.When flooding frames,MPs use the Mesh E2E Sequence number field to avoid unnecessary retransmissions.Furthermore,the ultimate receiver of a frame uses the E2E sequence field to eliminate duplicates.With the AE flag being set,an MP uses the six-address scheme.The additional address fields identify certain inter-All802.l1Coordination Functions(CFs)base on Listen Before Talk(LBT)that is known as Carrier Sense Multiple Access(CSMA).In802.11,the Clear Channel Assessment (CCA)combines the input of two Carrier Sense(CS)mecha-nisms:•Physical Carrier Sense(P-CS)and•Virtual Carrier Sense(V-CS).A.Physical Carrier SensingWith P-CS every station senses the Wireless Medium(WM) for energy.Energy exceeding one or more thresholds is interpreted as busy channel condition.Thus,the station will not try to initiate a frame exchange.The concrete threshold value depends on the802.11Physical Layer(PHY)layer. B.Virtual Carrier SensingV-CS informs stations about planned transmissions.All stations that are not in power-save mode,constantly monitor the WM.Stations retrieve reservation information from any frame they decode.802.11frames provide the reservation information in their Durationfield.If present,stations set their Network Allocation Vector(NA V)to the according value.The NA V works as a count-down timer.As long as the timer has a value different than zero,P-CS indicates a busy WM.The value of the NA V may be updated at any time.Thus,NA V duration may be prolonged or foreshortened.1)The hidden station problem:In wireless communication,a device A that is close to a device B that receives data from device C is denoted as hidden if A’s P-CS cannot detect C’s transmission.Then,C is likely to cause interference at B thus interrupting the frame exchange.To mitigate802.11’s hidden station problem,an optional handshakemanually set threshold and depending on thethe Request To Send/Clear To Sendprepends a frame exchange.Both,Requestand Clear To Send(CTS),are short control transmission duration hardly depends on theCoding Scheme(MCS).To maximize theirthey are transmitted using the lowest MCS.Infield,RTS and CTS indicate the duration offrame exchange.Thus,all stationsleast one of the handshake frames refrain fromC.Collision AvoidanceIn contrast to wired networks,in wirelessCollision Detection(CD)is not feasible.Avoidance(CA)must be implemented.As partstarting a transmission each Station(STA)procedure.It has to keep sensing the WM forrandom time after detecting the WM asminimum duration called Arbitration Interframe Space(AIFS). The duration of AIFS depends on an MAC Service Data Unit (CW)indicates the upper bound of this interval.Its initial minimum value is called CWmin and depends on an MSDU’s priority too.The value of CW doubles after each unsuccessful transmission to diminish the probability of collision of a retransmission.Each successful transmission resets the the size of the CW to its initial size of CWmin.Whenever the WM remains idle for the duration of one aSlot,a STA decrements its slot counter by one.If the WM is determined busy before the counter reaches zero,the slot counter is frozen.The STA has to wait for the WM being idle for AIFS again,before resuming to decrement the slot counter.If the counter reaches zero the STA is allowed to initiate its transmission.D.802.11–Coordination FunctionsWhile the Distributed Coordination Function(DCF)sup-ports no prioritization,Enhanced Distributed Channel Access (EDCA)forms a superset that enables for different medium access priorities.Furthermore,with EDCA stations may send multiple frames after contention.The amount of MSDUs is bound by the Transmission Opportunity(TXOP)limit.In conjunction with Block Acknowledgment(ACK)[8],EDCA operates more efficiently than DCF.E.Medium Access Control in802.11sEDCA is the mandatory CF in802.11s.A Mesh specific CF is described in section III-E2.1)Problems with EDCA in Wireless Mesh Networks: To circumvent the hidden station problem,WLANs use the RTS/CTS handshake.However as factory default,all today’s Wireless Fidelity(Wi-Fi)products’RTS/CTS threshold is set to its maximum value.Almost always,the setting is not user-[9].[12]CSOnE,cannot E does not respond as it detects a busy WM.Similar,F cannot initiate frame exchange with D.Spatial frequency reuse is limited to a low degree.the other hand,it prevents concurrent transmissions.As in Wireless Mesh Networks(WMNs)the amount of elements in each station’s set of neighbors’neighbors is larger than the amount of elements in the set of neighbors,by a single transmission many stations become exposed.These stations could reuse the WM for independent frame exchanges without causing interference.However,sensitive P-CS restricts the possibilities for spatial frequency reuse.Therefore,the exposed station problem becomes severe and EDCA achieves poor performance in Mesh BSS.In a WMN,a station is very likely to be blocked due to CCA.Stations outside the blocked area sense an idle WM. If they have frames to be transmitted to a station inside the blocked area,they do not receive a reply.As EDCA has been developed for single hop Wireless Local Area Network (WLAN),stations interpret the absence of a response frame (ACK to data,CTS to RTS etc.)as a transmission failure. Thus,they double their Contention Window,increase a frame’s retry counter and perform an additional backoff to resend the frame.As stations cannot detect their neighbors’availability, in a Mesh Basic Service Set(BSS)large idle gaps exist due to the unpredictable medium access.Thus,EDCA severely limits the performance.Fig.3shows a unidirectional exampleflow.2)Extensions to the Medium Access Control in802.11s: 802.11s defines an optional congestion control mechanism that works as a back-pressure scheme.It mitigates some problems of Enhanced Distributed Channel Access(EDCA)in Wireless Mesh Networks(WMNs).However based on the Wi-Mesh Alliance(WiMA)proposal,802.11s provides an optional Coordination Function(CF).With Mesh Deterministic Access (MDA),Mesh Points(MPs)become aware of the difficult radio environment.MDA capable MPs extend the802.11con-cept of medium reservation.While the802.11Virtual Carrier Sense(V-CS)provides instantaneous medium reservation after successful contention,MDA separates the negotiation process from medium reservation.Thus,MDA’s reservation based medium access works similar to the Distributed Reservation Protocol(DRP)defined in[13].With MDA a Mesh Basic Service Set(BSS)wide periodic superframe ing MDA Opportunity(MDAOP)setup messages,an MDA ca-pable MP negotiates with its neighbor MPs on the reservation of multiples of32µs time slots.As each MDA capable MP maintains and broadcasts in its beacon frames1)a list of all MDAOPs during which it is a transmitter orreceiver,and2)a list of neighboring MDAOPs(interference report), neighboring MPs are able to avoid to set-up overlapping MDA reservations.Once an MP obtains an MDAOP,it performs Clear Channel Assessment(CCA)and accesses the Wireless Medium(WM)with highest priority.Neighboring MPs refrain from channel access during that period.Fig.4shows a full MDA set-up and frame exchange sequence.IV.B EACON FRAMES&S YNCHRONIZATIONIn802.11,at Target Beacon Transmission Time(TBTT)the Access Point(AP)transmits a beacon frame as soon as it senses an idle Wireless Medium(WM).In the beacon,the Beacon Intervalfield informs stations about the amount of Time Units(TUs)(1024µs)between two TBTTs.Stations set their clock to the value of the Timestampfield that is a copy of the AP’s Timing Synchronization Function(TSF)when the beacon was sent.A.Synchronization in802.11sIn802.11s,synchronization is optional.At present,802.11s extends the standard beacon frame by additional Information Elements(IEs)that provide routing messages for example. In802.11,APs schedule beacons exactly at TBTT:TBTT= TSF(mod dot11BeaonPeriod).To avoid beacon collisions,1)Mesh Points(MPs)shall not synchronize their TSF and2)may use Mesh Beacon Collision Avoidance(MBCA). Due to thefirst measure,each MP announces a SelfTBTToffset value in its beacon.The value indicates an MP’s shift to the global time.MPs use the announced SelfTBTToffset and the beacon timestamp,to calculate the common Mesh TSF.If it calculates a Mesh TSF in advance of its own time,the MP adapts its local Mesh TSF.The achievable accuracy is sufficiently high enough to enable Mesh Deterministic Access (MDA).With MBCA,MPs sometimes delay transmission of their beacon frame.Thus,they can determine if neighboring MPs have similar TBTT.Furthermore,each MP provides the beacon timing IE.It informs about TBTT of other MPs.An MP may use this information tofind a time for its beacon that is less prone tointerference.Figure3.In this scenario,station are placed equidistant.Each station can solely exchange frames with its immediate neighbor.P-CS is assumed to be less than twice the reception range.Although trafficflows from station n to station n+4only,V-CS(RTS/CTS handshake)cannot prevent collisions.send data to B.If the WM access WM during its MDAOP.Security Framework(MLs)not Mesh Paths.(E2E)security.As distributed in nature,802.11sby a key hierarchy.(PSK)or an MasterAuthentication Serverthe Mesh DistributorKey(KDK).Theand management.Thefor mutual authenticationall keys cannot exceedto be periodicallyMesh Basic Service(MKD)and oneMP may implementpath selection protocols being implemented in an MP,only one is active in a Mesh BSS at any time.Any MPs must implement the Hybrid Wireless Mesh Protocol(HWMP).It relies on three different MAC Management protocol data units (MMPDUs):•Path Request(PREQ),•Path Error(PERR)and•Path Reply(PREP).Whenever an MP receives a path message that is to be forwarded,it adds the airtime cost c a to the current path metric.Furthermore,the MP decrements the path message’s Time to Live(TTL)field that is independent from the Mesh Medium Access Control(MAC)header TTL.HWMP operates in three different modes:•The on demand driven path selection scheme operates similar to Ad-hoc On-demand Distance Vector(AODV) defined in the Internet Engineering Task Force(IETF) Mobile Ad-hoc Networks(MANET)working group.•When building a tree,a specific MP in the Mesh Wireless Local Area Network(WLAN)becomes the root MP.It proactively sends–PREQ messages to maintain paths between all MPsand the root,or–Root Announcement(RANN)messages that enableMPs to build a path to the root on-demand.•Null path selection indicates that the MP does not forward frames.AODV and the tree-based modes may be used simultaneously. AODV is well described in[14],[15].With HWMP’s tree-based concepts,the root MP sends a broadcast PREQ message. If the PREQ contains•a more recent sequence number,or•a better metric to the root and the sequence number is similar to previously received PREQ messagesan MP updates its path table.Depending on the root MP’s PREQ,an MP must or may reply with PREP frame.Once the root MP receives the PREP,a bidirectional Mesh path is established.To accelerate the process,intermediate MPs may inform the root MP.In contrast to PREQ,the RANN sent by the root MP solely updates each MP how tofind the root.The Mesh path is still subject to be set-up on demand.IX.C ONCLUSIONS&O UTLOOK802.11s provides a mature framework for Wireless Mesh Networks(WMNs).The security and path selection mecha-nisms are robust and well developed.However,the standard Medium Access Control(MAC)in802.11s cannot deal with the difficult radio environment and thus limits the performance to a low degree.The optional Mesh Deterministic Access (MDA)is a promising step forward towards a Mesh aware medium access scheme.Future designs need to consider spatial frequency reuse that provides further performance enhancement.Our current work will be presented in future publications.It provides simulation results and insight to the performance of802.11s.R EFERENCES[1]G.R.Hiertz,S.Max, E.Weiß,L.Berlemann, D.Denteneer,and S.Mangold,“Mesh Technology enabling Ubiquitous Wireless Networks,”in Proceedings of the2nd Annual International Wireless Internet Conference(WICON),Boston,USA,Aug.2006,Invited Paper, p.11.[Online].Available:nets.rwth-aachen.de[2]G.R.Hiertz,S.Max,T.Junge,L.Berlemann,D.Denteneer,S.Mangold,and B.Walke,“Wireless Mesh Networks in the IEEE LMSC,”in Proceedings of the Global Mobile Congress2006,Beijing,China,Oct.2006,p.6.[Online].Available:nets.rwth-aachen.de [3]Draft Standard for Information Technology-Telecommunications andInformation Exchange Between Systems-LAN/MAN Specific Re-quirements-Part11:Wireless Medium Access Control(MAC)and physical layer(PHY)specifications,IEEE Unapproved draft P802.11-REVma/D9.0,Rev.of IEEE Std802.11-1999,Mar.2007.[4]Draft Standard for Information Technology-Telecommunications andInformation Exchange Between Systems-LAN/MAN Specific Require-ments-Part11:Wireless Medium Access Control(MAC)and physical layer(PHY)specifications:Amendment:ESS Mesh Networking,IEEE Unapproved draft P802.11s/D1.02,Mar.2007.[5]G.Hiertz,T.Junge,S.Max,Y.Zang,L.Stibor,and D.Denteneer,“Mesh Deterministic Access(MDA)-Optional IEEE802.11s MAC scheme-Simulation Results(IEEE802.11TGs submission),”Online, IEEE Computer Society,Melbourne,Victoria,Australia,p.31,Sep 2006.[Online].Available:nets.rwth-aachen.de[6] D.Kotz,C.Newport,and C.Elliott,“The mistaken axioms of wireless-network research,”Darmouth College Computer Science,Tech.Rep.TR2003-467,Jul.2003.[7]“Mobile Ad-hoc Networks(MANET)Working Group,”The InternetEngineering Task Force(IETF).[Online].Available:http://www.ietf.org/html.charters/manet-charter.html[8]G.R.Hiertz,L.Stibor,J.Habetha,E.Weiß,and S.Mangold,“Through-put and Delay Performance of IEEE802.11e Wireless LAN with Block Acknowledgments,”in Proceedings of11th European Wireless Conference2005,vol.1,Nicosia,Cyprus,Apr.2005,pp.246–252. [9] A.P.Jardosh,K.N.Ramachandran,K. C.Almeroth,and E.M.Belding-Royer,“Understanding Congestion in IEEE802.11b Wireless Networks,”in Proceedings of the IMC’05,2005Internet Measurement Conference,ACM ENIX,Oct.2005,pp.279–292.[Online].Available:/events/imc05/tech/jardosh.html[10]J.Bicket,D.Aguayo,S.Biswas,and R.Morris,“Architecture andEvaluation of an Unplanned802.11b Mesh Network,”in MobiCom’05: Proceedings of the11th annual international conference on Mobile com-puting and networking,Association for Computing Machinery Special Interest Group on Mobility of Systems,Users,Data and Computing.New York,NY,USA:ACM Press,2005,pp.31–42.[11]G.Anastasi,M.Conti,and M.Gregori,“IEEE802.11Ad Hoc Networks:Protocols,Performance and Open Issues,”in Mobile Ad Hoc Networking, S.Basagni,M.Conti,S.Giordano,and I.Stojmenovic,Eds.Wiley, Aug.2004,p.480.[12]G.Anastasi,E.Borgia,M.Conti,and E.Gregori,“Wi-fiin ad hocmode:a measurement study,”in Pervasive Computing and Communi-cations,2004.PerCom2004.Proceedings of the Second IEEE Annual Conference on,2004,pp.145–154.[13]International Standard ISO/IEC26907,Information technology–Telecommunications and information exchange between systems–High Rate Ultra Wideband PHY and MAC Standard,International Organization for Standardization(ISO),International Engineering Consortium(IEC)International Standard ISO/IEC26907:2007(E),Rev.First edition,Mar.2007.[Online].Available:/ ittf/PubliclyAvailableStandards/c043900_ISO_IEC_26907_2007(E).zip [14] C.Perkins, E.Belding-Royer,and S.Das,Ad hoc On-DemandDistance Vector(AODV)Routing,Online,IETF Std.3561,Jul.2003, experimental.[Online].Available:/html/rfc3561 [15] C.E.Perkins and E.M.Royer,“Ad-hoc on demand distance vectorrouting,”in Proceedings of the2nd IEEE Workshop on Mobile Com-puting Systems and Applications.New Orleans,LA:IEEE,February 1999,pp.90–100.。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
Runtime Optimization of IEEE802.11Wireless LANs PerformanceLuciano Bononi,Marco Conti,and Enrico GregoriAbstract—IEEE802.11is the standard for Wireless Local Area Networks(WLANs)promoted by the Institute of Electrical and Electronics Engineers.Wireless technologies in the LAN environment are becoming increasingly important and the IEEE802.11is the most mature technology to date.Previous works have pointed out that the standard protocol can be very inefficient and that an appropriate tuning of its congestion control mechanism(i.e.,the backoff algorithm)can drive the IEEE802.11protocol close to its optimal behavior.To perform this tuning,a station must have exact knowledge of the network contention level;unfortunately,in a real case,a station cannot have exact knowledge of the network contention level(i.e.,number of active stations and length of the message transmitted on the channel),but it,at most,can estimate it.This paper presents and evaluates a distributed mechanism for contention control in IEEE802.11Wireless LANs.Our mechanism,named Asymptotically Optimal Backoff(AOB),dynamically adapts the backoff window size to the current network contention level and guarantees that an IEEE802.11WLAN asymptotically achieves its optimal channel utilization.The AOB mechanism measures the network contention level by using two simple estimates:the slot utilization and the average size of transmitted frames.These estimates are simple and can be obtained by exploiting information that is already available in the standard protocol.AOB can be used to extend the standard802.11access mechanism without requiring any additional hardware.The performance of the IEEE802.11protocol,with and without the AOB mechanism,is investigated in the paper through simulation.Simulation results indicate that our mechanism is very effective,robust,and has traffic differentiation potentialities.Index Terms—Wireless LAN(WLAN),IEEE802.11,multiple access protocol(MAC),protocol capacity,performance analysis.æ1I NTRODUCTIONF OR decades,Ethernet has been the predominant networktechnology for supporting distributed computing.In recent years,the proliferation of portable and laptop computers has led to the development of the wireless LAN(WLAN)technology([28],[43]).The success of WLANs is connected to the development of networking products that can provide wireless network access at a competitive price.A major factor in achieving this goal is the availability of appropriate networking standards.IEEE Standard802.11defines a Medium Access Control(MAC) and Physical Layer(PHY)specification for a wireless local area network to provide wireless connectivity for fixed, portable,and moving stations within a local area[42].Two different approaches can be followed in the implementation of a WLAN:an infrastructure-based ap-proach or an ad hoc networking one([18],[25],[50]). Infrastructure-based802.11WLANs are currently widely used,while the use of IEEE802.11-based ad hoc networks is an open research issue([3],[21]).Since the wireless links will continue to have signifi-cantly lower capacity than wired links,the WLAN conges-tion is more problematic than in wired networks.In WLANs,the medium access control(MAC)protocol is the main element that manages congestion situations that may occur inside the network.For this reason,in this paper,we focus on the efficiency of the IEEE802.11MAC protocol and we propose a solution for increasing both protocol efficiency and protocol’s ability to react to congestion conditions.The IEEE802.11access scheme incorporates two access methods:Distributed Coordination Function(DCF)for asynchronous,contention-based,distributed access to the channel and Point Coordination Function(PCF)for centra-lized,contention-free access([42],[50]).PCF is intended to support real-time services(by using a centralized polling mechanism),but is not generally supported by current cards. Hereafter,we will concentrate our study on DCF only.The DCF is based on a Carrier Sensing Multiple Access protocol with Collision Avoidance,CSMA/CA,see,for example,([19],[38],[53]).The CSMA/CA protocol is typically adopted in a wireless environment due to its reliability, flexibility,and robustness.However,the performance of a WLAN based on the CSMA/CA protocol may be degraded by the presence of hidden terminals[54].A pair of stations is referred to as being hidden from each other if a station cannot hear the transmission from the other station.This event makes the carrier sensing unreliable as a station wrongly senses that the wireless medium has been idle while the other (hidden)station is transmitting.To avoid the hidden terminal problem,the CSMA/CA protocols are extended with a virtual carrier sensing mechanism,named Request To Send (RTS)/Clear To Send(CTS).This mechanism has been studied extensively;several variations and analyses of the RTS/CTS scheme can be found in the literature,see,for example,([4], [31],[29],[32]).IEEE802.11includes an optional RTS/CTS mechanism.In this work,we do not explicitly consider the RTS/CTS mechanism.The results presented hereafter always refer to the data transmission using the basic access only.A.L.Bononi is with the Department of Computer Science,University ofBologna,Mura Anteo Zamboni,7,40127Bologna,Italy.E-mail:bononi@cs.unibo.it..M.Conti and E.Gregori are with the National Research Council(CNR),IIT Institute,Via G.Moruzzi,1,56124Pisa,Italy.E-mail:{marco.conti,enrico.gregori}@r.it.Manuscript received14Mar.2001;revised5Aug.2002;accepted29May2003.For information on obtaining reprints of this article,please send e-mail to:tpds@,and reference IEEECS Log Number113793.1045-9219/04/$17.00ß2004IEEE Published by the IEEE Computer Societymethodology for analyzing the optimal tuning of the backoff algorithm when a portion of the traffic is transmitted using the RTS/CTS mechanism can be found,for example,in([6], [13]).In addition,recent simulation and experimental results indicate that phenomena occurring at the physical layer make the effectiveness of the RTS/CTS mechanism arguable since the hidden station phenomenon rarely occurs([56],[11],[23]).The relevance of the IEEE802.11standard has generated extensive literature on its MAC protocol.A complete survey of the IEEE802.11literature is out of the scope of this paper.Below,we will show the main research areas together with some related references.Simulation studies of the IEEE802.11protocol performance are presented in([62] [2]).IEEE802.11analytical models are proposed and evaluated in([5],[6],[16],[17],[20],[59],[60]).The use of the PCF access method for supporting real-time applica-tions is investigated in([26],[57]).The optimization of the DCF mechanism from the power-saving standpoint is investigated in([7],[44]).Recently,considerable research activity has concentrated on supporting service differentia-tion on the IEEE802.11DCF access method(e.g.,[49],[58], [1],[47]),and on the use of IEEE802.11for constructing multihop ad hoc networks([63],[64]).In this paper,we propose and evaluate a mechanism, Asymptotically Optimal Backoff(AOB),for improving the efficiency of the IEEE802.11standard protocol.In the literature,it is extensively recognized that the backoff algorithm plays a crucial role in achieving a high aggregated throughput and a fair allocation of the channel to the stations,see[4].To meet this target,the backoff value should reflect the actual level of contention for the media. The IEEE802.11adopts a binary exponential backoff protocol([42],[36],[38])which does not always adequately guarantee the best time-spreading of the users’access for the current congestion level.Each station,to transmit a frame,accesses the channel within a random self-defined amount of time whose average length depends on the number of collisions previously experienced by the station for that frame.When the network is congested,for each transmitted frame,a station must experience several collisions to increase the backoff window size,thus achieving a time spreading of the transmission attempts that is adequate for the current congestion level.No experience from the previous transmitted frame is exploited.On the other hand,our AOB mechanism extends the binary exponential backoff algorithm of IEEE802.11to guarantee that the backoff interval always reflects the current congestion level of the system(in the standard backoff,any new transmission assumes a low congestion level in the system).Our mechanism forces the network stations to adopt a backoff window size that maximizes the channel utilization1for the current network condition. There are two main factors that reduce the channel utilization:collisions and idle periods(introduced by the spreading of accesses).As these two factors are conflicting (i.e.,reducing one causes an increase of the other),the optimal tuning of the backoff algorithm is approximately achieved by equating these two costs([15],[16],[30]).Since these costs change dynamically(depending on the network load),the backoff should adapt to congestion variations in the system.Unfortunately,in a real case,a station does not have an exact knowledge of the network and load configurations,but,at most,can estimate them.The most promising direction for improving backoff protocols is to obtain information of the network status through channel observation([34],[37],[45]).A great amount of work has been done on studying the information that can be obtained by observing the system’s parameters([33],[48],[55]).Our work follows the same direction of feedback-based proto-cols,but provides original contributions as it is based on an analytical characterization of the optimal channel utilization and uses a very simple feedback signal:slot utilization.Several authors have investigated the enhancement of the IEEE802.11backoff protocol to increase its performance. In[61],given the Binary Exponential Backoff scheme adopted by the Standard,heuristic solutions have been proposed for a better time spread of the transmission attempts.In([5],[6],[15],[16],[17]),feedback-based mechanisms have been proposed for adapting the station backoff to the network congestion and maximizing channel utilization.Recently,these mechanisms have been general-ized to achieve both optimal channel utilization and weighted fairness in an IEEE802.11network with traffic streams belonging to different classes[47].All the feedback-based mechanisms cited above are based on analytic models of an IEEE802.11network.These models provide the optimal setting of the backoff parameters for achieving the maximum channel utilization.Unfortunately,these methods require an estimation of the number of users in the system that could prove expensive,difficult to obtain, and subject to significant error,especially in high contention situations[17].The AOB mechanism proposed in this paper goes a step further:1.By exploiting the analytical characterization of theoptimal IEEE802.11channel utilization presented in[16],we show that the optimal value is almostindependent of the network configuration(numberof active stations)and,hence,the maximum channelutilization can be obtained without any knowledgeof the number of active stations.2.The AOB mechanism tunes the backoff parameters tothe network contention level by using two simple andlow-cost load estimates(obtained by the informationprovided by the carrier sensing mechanism):slotutilization and average size of transmitted frames.3.AOB extends the standard802.11access mechanismwithout requiring any additional hardware. Specifically,AOB schedules the frames’transmission accord-ing to the IEEE802.11backoff algorithm,but adds an additional level of control before a transmission is enabled.A transmission already enabled by the standard backoff algorithm is postponed by AOB in a probabilistic way.The probability of postponing a transmission depends on the network congestion level and is equal to one if the channel utilization tends to exceed the optimal value.The postponed transmission is rescheduled as in the case of a collision,i.e., the transmission is delayed by a further backoff interval.In this paper,via simulation,we have extensively evaluated the performance of the IEEE802.11access scheme,with and without the AOB mechanism.The IEEE 802.11performance has been investigated both in steady-state and under transient conditions.Furthermore,we also1.In the literature,the maximum channel utilization is called protocol capacity;see[22].For this reason,hereafter,maximum channel utilization and protocol capacity are used interchangeably.investigate the mechanism robustness to errors and its potential for traffic differentiation.The work is organized as follows:In Section2,we present a brief explanation of the IEEE802.11standard,and we sketch the critical aspects connected to the contention level of the system.In Section3,we present a simple mechanism to extend the IEEE802.11standard and,in Section4,we discuss its tuning.In Sections5,6,and7,the AOB performance is deeply investigated through simula-tion.Section8discusses an AOB potential for traffic differentiation.Conclusions and future research are out-lined in Section9.2IEEE802.11In this section,we only sketch the portions of the IEEE802.11 standard that are relevant for this paper.A detailed description can be found in([42],[13],[27]).The IEEE802.11standard defines a MAC layer and a Physical Layer for WLANs.The basic access method in the IEEE802.11MAC protocol is the Distributed Coordination Function(DCF),which is a Carrier Sense Multiple Access with Collision Avoidance(CSMA/CA)MAC protocol.Besides the DCF,the IEEE802.11also incorporates an alternative access method known as the Point Coordination Function(PCF)—an access method that is similar to a polling system and uses a point coordinator to determine which station has the right to transmit.The DCF requires that every station,before transmitting, perform a carrier sensing activity to determine the state of the channel(idle or busy).If the medium is found to be idle for an interval exceeding the Distributed InterFrame Space(DIFS),the station continues with its transmission.If the medium is busy, the transmission is deferred until the ongoing transmission concludes.When the channel becomes idle,a Collision Avoidance mechanism is adopted.The IEEE802.11Collision Avoidance mechanism is a Binary Exponential Backoff scheme ([42],[36],[38],[39]).According to this mechanism,a station selects a random interval,called a backoff interval,that is used to initialize a backoff counter.When the channel is idle,the length of the time is measured in constant units(Slot_Time) indicated as slots in the following.The backoff interval is an integer number of slots and its value is uniformly chosen in the interval(0,CW_Size-1),where CW_Size,in each station is a local parameter defining the current station Contention Window size.Specifically,the backoff value is defined by the following expression[42]:Backo ff Counter¼INT RndðÞÁCW SizeðÞ; where Rnd()is a function that returns pseudorandom numbers uniformly distributed in[0,1).The backoff counter is decreased as long as the channel is sensed to be idle,stopped when a transmission is detected on the channel,and reactivated when the channel is sensed to be idle again for more than a DIFS.A station transmits when its backoff counter reaches zero.The Binary Exponential Backoff is characterized by the expression giving the dependency of the CW_Size parameter by the number of unsuccessful transmission attempts(N_A)already performed for a given frame.In[42],it is defined that the first transmission attempt for a given frame is performed adopting CW_Size equal to the minimum value CW_Size_min(assuming low contention). After each unsuccessful(re)transmission of the same frame,the station doubles CW_Size until it reaches the maximum value fixed by the standard,i.e.,CW_Size_MAX,as follows: CW SizeðN AÞ¼min CS Size MAX;CW Size minÁ2ðN AÀ1Þ: Positive acknowledgments are employed to ascertain a successful transmission.This is accomplished by the receiver(immediately following the reception of the data frame),which initiates the transmission of an acknowl-edgment frame(ACK)after a time interval Short InterFrame Space(SIFS),which is less than DIFS.If the transmission generates a collision,2the CW_Size parameter is doubled for the new scheduling of the retransmission attempt,thus further reducing contention.The increase of the CW_Size parameter value after a collision is the reaction that the IEEE802.11standard DCF provides to make the access mechanism adaptive to channel conditions.In[8],by analyzing the behavior of the IEEE 802.11DCF mechanism,it was shown that the channel utilization is negatively affected by the increase of the contention level.This occurs because1)the increase in the CW_Size is obtained at the cost of a collision,and2)after a successful transmission,no memory of the actual contention level is maintained.3L OW-C OST D YNAMIC T UNING OF THEB ACKOFF W INDOW S IZEThe drawbacks of the IEEE802.11backoff algorithm, explained in the previous section,indicate a direction for improving the performance of a random access scheme by exploiting the information on the current network conges-tion level that is already available at the MAC level. Specifically,the utilization rate of the slots(Slot Utilization) observed on the channel by each station is used as a simple and effective estimate of the channel congestion level.The estimated Slot Utilization must be frequently updated.For this reason,in[9],it was proposed that an estimate be updated by each station in every Backoff interval,i.e.,the defer phase that precedes a transmission attempt.A simple and intuitive definition of the slot utilization ðS UÞis then given by:S U¼Num Busy SlotsNum Available Slots;where:.Num_Busy_Slots,hereafter referred to as busy slots,is the number of slots in the backoff interval in whichone or more stations start a transmission attempt.Atransmission attempt can be either a successfultransmission or a collision;and.Num_Available_Slots is the total number of slots available for transmission in the backoff interval,i.e.,the sum of idle and busy slots.In the IEEE802.11standard mechanism,every station performs a Carrier Sensing activity and,thus,the proposed S_U estimate is simple to obtain.The information required to estimate S_U is already available to an IEEE802.11 station and no additional hardware is required.The current S_U estimate can be used by each station (before trying a“blind”transmission)to evaluate the2.A collision is assumed whenever the ACK from the receiver is missing.opportunity to either perform or defer the scheduled transmission attempt.In other words,if a station knows that the probability of a successful transmission is low,it should defer its transmission attempt.This can be achieved in an IEEE 802.11network by exploiting the DCC mechan-ism proposed in [9].According to DCC,each IEEE 802.11station performs an additional control (beyond carrier sensing and backoff algorithm)before any transmission attempt.This control is based on a new parameter,named Probability of Transmission P_T(...),whose value depends on the current contention level of the channel,i.e.,S_U .The heuristic formula proposed in [9]for P_T (...)is:P T S U;N A ðÞ¼1ÀS U N A ;where,by definition,S U assumes values in the interval [0,1],and N_A is the number of attempts already performed by the station for the transmission of the current frame.3The N_A parameter is used to partition the set of active stations in such a way that each stations’subset is associated with a different level of privilege to access the channel.Stations that have performed several unsuccessful attempts have the highest transmission privilege [9].The P_T parameter allows filtering the transmission attempts.When,according to the standard protocol,a station is authorized to transmit (backoff counter is equal to zero and channel is idle)in the protocol extended with the Probability of Transmission,a station will perform a real transmission with probability P_T ;otherwise (i.e.,with probability 1-P_T )the transmission is rescheduled as a collision would have occurred,i.e.,a new backoff interval is sampled.To better understand the relationship between the P_T definition and the network congestion level,we can observe Fig.1.In Fig.1,we show the P_T curves (for users with different N_A )with respect to the estimated S_U values.Assuming S_U is close to zero,we can observe that each station,independently of its number of performed attempts,obtains a Probability of Transmission (P_T )close to 1.This means that the proposed mechanism has no effect on the system and each user performs its accesses as in the standard access scheme,without any additional contention control.This point is significant as it implies the absence ofoverhead introduced in low-load conditions.The differ-ences in the users’behavior as a function of their levels of privilege (related to the value of the N_A parameter)appear when the slot utilization grows.For example,assuming a slot utilization close to 1,say 0.8,we observe that the stations with the highest N_A value obtain a Probability of Transmission close to 1,while stations at the first transmis-sion attempt transmit with a probability equal to 0.2.It is worth noting a property of the DCC mechanism:The slot utilization of the channel never reaches the value 1.Assuming S_U is close to or equal to 1,the DCC mechanism reduces the Probabilities of Transmission for all stations close to zero,thus reducing the network contention level.This effect is due to the P_T definition and,in particular,to the explicit presence of the upper bound 1for the slot utilization estimate.The DCC choice to use 1as the asymptotic limit for the S_U is heuristic and does not guarantee the maximum channel utilization.To achieve the maximum channel utilization,we need to know the optimal congestion level,i.e.,the optimal upper bound for the S_U value (opt_S_U).It is worth noting that,if opt_S_U is known,the P_T mechanism can be easily tuned to guarantee that maximum channel utilization is achieved.Intuitively,if the slot-utilization boundary value (i.e.,the value one for DCC)is replaced by the opt_S_U value,we reduce all the probabilities of transmission to zero in correspondence with slot utilization values greater than or equal to the opt_S_U .This can be achieved by generalizing the definition for the Probability of Transmission:P T opt S U;S U;N A ðÞ¼1Àmin 1;S U opt S UNA:ð1ÞSpecifically,by applying this definition of the transmission probability,we obtain the P_T curves shown in Fig.2.These curves were obtained by applying the generalized P_T definition with opt_S_U =0.80.As expected,the curves indicate the effectiveness of the generalized P_T definition to limit S_U to the opt_S_U value.The generalized Probability of Transmission provides an effective tool for controlling the congestion inside an IEEE 802.11WLAN in an optimal way,provided that the opt_S_U value is known.In the following,we will present a simple mechanism to set the opt_S_U value.Our mechanism is named Asymptoti-cally Optimal Backoff as it guarantees that the optimal utilization is asymptotically achieved,i.e.,for large M values.3.Atthe first transmission attempt,N Ais equal to 1.Fig.1.DCC probability of transmission.Fig.2.Generalized probability of transmission.4A SYMPTOTICALLY O PTIMAL B ACKOFF(AOB) M ECHANISMThe aim of the AOB mechanism is to dynamically tune the backoff window size to achieve the theoretical capacity limit of the IEEE802.11protocol.The AOB mechanism is simpler, more robust,and has lower costs and overhead introduced than the contention mechanisms proposed in[16],[17]. Specifically,the AOB mechanism requires no estimate of the number M of active stations.An accurate M estimate may be very difficult to obtain because M may be highly variable in WLANs.In this section,we exploit the results obtained from the analysis of the theoretical capacity limits of the IEEE802.11 protocol to develop the AOB mechanism.For this reason, below,we briefly summarize the results derived in[16].In [16],to study the protocol capacity,a p-persistent IEEE 802.11protocol was defined.This protocol differs from the standard protocol only in the selection of the backoff interval.Instead of the binary exponential backoff used in the standard,the backoff interval of the p-persistent IEEE 802.11protocol is sampled from a geometric distribution with parameter p.Specifically,at the beginning of an empty slot,a station transmits(in that slot)with a probability p, while it defers the transmission with a probability1-p and then repeats the procedure at the next empty slot.4Hence, in this protocol,the average backoff time is completely identified by the p value.By setting p¼1=ðE½B þ1Þ(where E½B is the average backoff time of the standard protocol5), the p-persistent IEEE802.11model provides an accurate approximation(at least from a capacity analysis standpoint) of the IEEE802.11protocol behavior[16].The IEEE802.11p-persistent model is a useful and simple tool for analytically estimating the protocol capacity in a network with a finite number,M,of stations operating in asymptotic conditions.Furthermore,to simplify the discussion,hereafter we assume that stations transmit messages whose lengths are a geometrically distributed (with parameter q)number of slots.By denoting with t slot the length of a slot,the average message length, m,is: m¼t slot=ð1ÀqÞ.By exploiting the p-persistent model,in[16],a closed analytical formula for the channel utilization, ,is derived¼ m=fðM;p;qÞ:ð2ÞBy noting that fðÞis a function of the protocol and traffic parameters,it results that,for a fixed network and traffic configuration(i.e.,constant M and q),the maximum channel utilization corresponds to the p value,p min,that minimizes fðÞ.Due to the correspondence(from the capacity stand-point)between the standard protocol and the p-persistent one,the IEEE802.11maximum channel utilization is closely approximated by adopting,in the standard protocol,a contention window whose average size is identified by the optimal p value,i.e.,E½CW ¼2=p minÀ1.The previous analysis shows that the IEEE802.11 theoretical capacity is identified by p min.Hereafter,we will show the relationship between p min and the opt_S_U value of the AOB mechanism.To this end,we will further elaborate the capacity analysis presented in[16].4.1Theoretical Capacity Limits:An Invariant Figure Results presented in this section(see Table1)point out that the increase in the number of active stations has an almost negligible impact on the theoretical capacity bounds,while the average payload size(indicated as MFS in the following)greatly affects the optimal utilization level.Results presented in Table1are numerically derived by computing the optimal p value,i.e.,p min,according to formulas presented in[16].Specifically,in this table,we report,for various network and traffic configurations (defined by the(M,q)couples),the p min values derived analytically as explained before.In this table,we also report for each configuration the value MÁp min.It is worth noting that,while p min is highly affected by the M value,given a q-value,the product MÁp min is almost constant.Specifically,results indicate that,for a given message length,the product MÁp min has an asymptotic value with respect to M.Furthermore,when M!4,the MÁp min values are very close to the asymptotic value. This is the reason for calling MÁp min an invariant figure, i.e.,for a given MFS,it is almost constant.Hereafter,we will analytically investigate the rationale behind the MÁp min quasi-constant value(for a given MFS). To perform this analysis,instead of the exact p min derivation presented in[16](it is too complex for our purpose),we approximate p min with the p value that satisfies the following relationship:E½Coll ¼E½Idle p Át slot;ð3ÞOptimal pValues4.On the other hand,in the standard protocol,a station transmits in theempty slot selected uniformly inside the current contention window.5.Note that E½B ¼ðE½CW À1Þ=2,where E½CW is the average contention window.。