12
IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 60, NO. 9, SEPTEMBER 2012 2623 EARC: Enhanced Adaptation of Link Rate and Contention Window for IEEE 802.11 Multi-Rate Wireless Networks Ting-Yu Lin, Ching-Yi Tsai, and Kun-Ru Wu Abstract—IEEE 802.11 wireless network supports multiple link rates at the physical layer. Each link rate is associated with a certain required Signal-to-Interference-and-Noise Ratio (SINR) threshold for successfully decoding received packets. On transmission failures, the 802.11 DCF performs a binary exponential backoff mechanism to discourage channel access attempts, hoping to reduce congestion. When traditional link adaptation is applied, both rate reduction and binary backoff represent double penalties for this wireless link, which may cause overly conservative transmission attempts. On the other hand, once transmission succeeds, 802.11 DCF resets the backoff contention window to the minimum value to encourage channel access attempts. At the same time, traditional link adaptation may also decide to increase the data rate, which leads to overly aggressive transmission attempts. We observe this improper interaction of link rate and backoff mechanism that harms the 802.11 system performance, due to separate consideration of those two parameters. In this paper, we propose to jointly adapt the rate and backoff parameters. Specifically, an E nhanced A daptation of link R ate and C ontention window, abbreviated as EARC, is devised. EARC is a closed-loop (receiver-assisted) link rate adaptation protocol that jointly considers the backoff mechanism. With only one extra byte carried by the DATA packet, EARC incurs little controlling overhead despite its receiver-assisted nature. Moreover, since SINR information commonly utilized by receiver-assisted protocols is not precisely supported in real devices, we introduce a rate selection reference (RSR) table empirically derived by constantly monitoring the environmental energy level and reception behavior. The RSR table then guides the receiver to select the best sustainable rate for the transmitter. Simulation results demonstrate the RSR table is a practical option for making the rate decision, and the proposed EARC approach is effective in maintaining high system throughput, compared to other link adaptation algorithms. Index Terms—Link adaptation, contention resolution, ARF, BEB, IEEE 802.11, multi-rate. I. BACKGROUND I EEE 802.11 plays an important role in wireless commu- nications. Due to the development of various modulation techniques and coding schemes, multiple transmission rates are now supported by 802.11 physical layers. For example, Paper approved by B. Sikdar, the Editor for Wireless Packet Access and Cross-Layer Design of the IEEE Communications Society. Manuscript received March 6, 2011; revised January 9 and February 15, 2012. The authors are with the Institute of Communications Engineering, Na- tional Chiao Tung University (e-mail: [email protected]). T.Y. Lin is the corresponding author. This research was co-sponsored in part by the NSC of Taiwan under grant number 99-2221-E-009-006, and in part by the MoE Program Aiming for the Top University and Elite Research Center Development Plan (ATU Plan). Digital Object Identifier 10.1109/TCOMM.2012.071312.110145 802.11b provides 4 data rates (1, 2, 5.5 and 11 Mbps), while 802.11a/g provides 8 rate options (6, 9, 12, 18, 24, 36, 48 and 54 Mbps). Higher transmission rate means higher potential throughput, because it shortens the transmission time in one transmission attempt. However, higher data rate also implies higher packet corruption probability for receiver re- quires higher Signal-to-Interference-and-Noise Ratio (SINR) to successfully decode packets. If the SINR perceived at the receiver is lower than required SINR threshold, the signal may not be decoded correctly. Each data rate is associated with a certain SINR threshold. The method of selecting an appropriate link rate for trans- mitting/retransmitting packets is generally comprehended as the link (rate) adaptation mechanism. Various rate-adaptive algorithms have been proposed [1]–[14]. The most commonly used rate adaptation technique is perhaps auto-rate fallback (ARF), which is widely implemented in present wireless devices [6]. Based on ARF, in the literature, plenty of rate- adaptive mechanisms have been proposed to improve the ARF performance [1], [3], [5], [7], [8], [10], [12], [15], [16]. Rate adaptation can also be combined with tuning other physical parameters such as power or carrier sense threshold [1], [9]. In general, rate-adaptive schemes can be classified into two categories: open-loop and closed-loop approaches. Open-loop approaches perform rate adaptations based on the information of whether ACK message is successfully returned or not, which we call implicit feedback. ARF is such an open-loop strategy that makes the rate adaptation decision based on ACK information [6]. Adaptive Thresholds (AT) mechanism is an enhanced version of ARF, which dynamically tunes the rate upshift and downshift parameters based on link-layer measurements [15]. On the other hand, closed-loop approaches require the receiver to gather extra information such as SINR statistic and inform the sender via control messages, called explicit feedback. Consequently, closed-loop approaches may result in better rate predictions, at the expense of controlling overhead. A representative mechanism in this category is the receiver-based auto-rate (RBAR) protocol [4]. ARF with COLLIE (AC) is another closed-loop approach, which tries to improve the ARF performance by distinguishing collision- based packet losses from packet failures due to weak signal according to metrics provided by the receiver [16]. The above rate adaptation mechanisms do not take the 802.11 backoff algorithm into consideration. When the rate and backoff con- tention window (CW) adjustments are performed separately, 0090-6778/10$25.00 c 2012 IEEE

IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 60, … · Contention Window for IEEE 802.11 Multi-Rate ... mechanism in 802.11 standard, and five rate adaptation works: ARF, AT, AC,

Embed Size (px)

Citation preview

IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 60, NO. 9, SEPTEMBER 2012 2623

EARC: Enhanced Adaptation of Link Rate andContention Window for IEEE 802.11 Multi-Rate

Wireless NetworksTing-Yu Lin, Ching-Yi Tsai, and Kun-Ru Wu

Abstract—IEEE 802.11 wireless network supports multiplelink rates at the physical layer. Each link rate is associatedwith a certain required Signal-to-Interference-and-Noise Ratio(SINR) threshold for successfully decoding received packets.On transmission failures, the 802.11 DCF performs a binaryexponential backoff mechanism to discourage channel accessattempts, hoping to reduce congestion. When traditional linkadaptation is applied, both rate reduction and binary backoffrepresent double penalties for this wireless link, which maycause overly conservative transmission attempts. On the otherhand, once transmission succeeds, 802.11 DCF resets the backoffcontention window to the minimum value to encourage channelaccess attempts. At the same time, traditional link adaptationmay also decide to increase the data rate, which leads to overlyaggressive transmission attempts. We observe this improperinteraction of link rate and backoff mechanism that harmsthe 802.11 system performance, due to separate considerationof those two parameters. In this paper, we propose to jointlyadapt the rate and backoff parameters. Specifically, an EnhancedAdaptation of link Rate and Contention window, abbreviatedas EARC, is devised. EARC is a closed-loop (receiver-assisted)link rate adaptation protocol that jointly considers the backoffmechanism. With only one extra byte carried by the DATApacket, EARC incurs little controlling overhead despite itsreceiver-assisted nature. Moreover, since SINR informationcommonly utilized by receiver-assisted protocols is not preciselysupported in real devices, we introduce a rate selection reference(RSR) table empirically derived by constantly monitoring theenvironmental energy level and reception behavior. The RSRtable then guides the receiver to select the best sustainable ratefor the transmitter. Simulation results demonstrate the RSRtable is a practical option for making the rate decision, and theproposed EARC approach is effective in maintaining high systemthroughput, compared to other link adaptation algorithms.

Index Terms—Link adaptation, contention resolution, ARF,BEB, IEEE 802.11, multi-rate.

I. BACKGROUND

IEEE 802.11 plays an important role in wireless commu-nications. Due to the development of various modulation

techniques and coding schemes, multiple transmission ratesare now supported by 802.11 physical layers. For example,

Paper approved by B. Sikdar, the Editor for Wireless Packet Accessand Cross-Layer Design of the IEEE Communications Society. Manuscriptreceived March 6, 2011; revised January 9 and February 15, 2012.

The authors are with the Institute of Communications Engineering, Na-tional Chiao Tung University (e-mail: [email protected]). T.Y. Lin is thecorresponding author.

This research was co-sponsored in part by the NSC of Taiwan under grantnumber 99-2221-E-009-006, and in part by the MoE Program Aiming for theTop University and Elite Research Center Development Plan (ATU Plan).

Digital Object Identifier 10.1109/TCOMM.2012.071312.110145

802.11b provides 4 data rates (1, 2, 5.5 and 11 Mbps),while 802.11a/g provides 8 rate options (6, 9, 12, 18, 24,36, 48 and 54 Mbps). Higher transmission rate means higherpotential throughput, because it shortens the transmission timein one transmission attempt. However, higher data rate alsoimplies higher packet corruption probability for receiver re-quires higher Signal-to-Interference-and-Noise Ratio (SINR)to successfully decode packets. If the SINR perceived at thereceiver is lower than required SINR threshold, the signalmay not be decoded correctly.

Each data rate is associated with a certain SINR threshold.The method of selecting an appropriate link rate for trans-mitting/retransmitting packets is generally comprehended asthe link (rate) adaptation mechanism. Various rate-adaptivealgorithms have been proposed [1]–[14]. The most commonlyused rate adaptation technique is perhaps auto-rate fallback(ARF), which is widely implemented in present wirelessdevices [6]. Based on ARF, in the literature, plenty of rate-adaptive mechanisms have been proposed to improve the ARFperformance [1], [3], [5], [7], [8], [10], [12], [15], [16]. Rateadaptation can also be combined with tuning other physicalparameters such as power or carrier sense threshold [1], [9].

In general, rate-adaptive schemes can be classified into twocategories: open-loop and closed-loop approaches. Open-loopapproaches perform rate adaptations based on the informationof whether ACK message is successfully returned or not,which we call implicit feedback. ARF is such an open-loopstrategy that makes the rate adaptation decision based onACK information [6]. Adaptive Thresholds (AT) mechanismis an enhanced version of ARF, which dynamically tunesthe rate upshift and downshift parameters based on link-layermeasurements [15]. On the other hand, closed-loop approachesrequire the receiver to gather extra information such as SINRstatistic and inform the sender via control messages, calledexplicit feedback. Consequently, closed-loop approaches mayresult in better rate predictions, at the expense of controllingoverhead. A representative mechanism in this category isthe receiver-based auto-rate (RBAR) protocol [4]. ARF withCOLLIE (AC) is another closed-loop approach, which triesto improve the ARF performance by distinguishing collision-based packet losses from packet failures due to weak signalaccording to metrics provided by the receiver [16]. The aboverate adaptation mechanisms do not take the 802.11 backoffalgorithm into consideration. When the rate and backoff con-tention window (CW) adjustments are performed separately,

0090-6778/10$25.00 c© 2012 IEEE

2624 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 60, NO. 9, SEPTEMBER 2012

transmission attempts could be made overly conservative oraggressive. Observing this adverse effect on system through-put, authors in [17] propose a joint adaptation of link rateand contention window protocol, named ARC, to address theproblem. ARC is an open-loop approach that tries to exerciselink adaptations by firstly considering if a proper backoff win-dow has been reached. In symmetric environments (withouthidden terminals), ARC performs well, since the transmitter-estimated backoff window adequately reflects the contentionstatus at the receiver. However, in asymmetric environments(where hidden terminals present), ARC performance degradesdue to both the inaccurate backoff window and lack of receiverfeedback on a proper transmit rate. In addition, since ARC optsto tune contention window (CW) before rate, when the channelcondition suddenly becomes good or bad at the receiver, ARCcannot react quickly enough. Several CW adjustments mayoccur in ARC before reaching a suitable rate and backoffsetting.

In this paper, we propose a closed-loop rate adaptivescheme, entitled EARC (Enhanced Adaptation of link Rateand Contention window), that incorporates the backoff CWadjustment. Though sharing the similar concept of jointlyadapting link rate and CW parameters, EARC operates dif-ferently from ARC. First, with receiver feedback, EARC isable to react to rate changes (due to improved or deterioratedchannel condition at the receiver) more quickly than ARC.Second, the transmitter-estimated CW value in EARC can beadjusted based on receiver feedback, further giving EARC thecapability of maintaining remarkable system performance evenin asymmetric settings (where transmitter and receiver havedistinct medium congestion views).

The remainder of this paper is organized as follows. InSection II, we review the binary exponential backoff (BEB)mechanism in 802.11 standard, and five rate adaptation works:ARF, AT, AC, RBAR, and ARC. Section III details our EARCprotocol. Extensive simulation results and comparisons withother major multi-rate algorithms are provided in Section IV.Section V validates the EARC performance through math-ematical analysis. Finally, in Section VI, we conclude thispaper.

II. PRELIMINARIES

A. Back-off Mechanism in 802.11 Standard (BEB)

802.11 standard defines two types of media access mech-anisms: the Point Coordinate Function (PCF) and the Dis-tributed Coordinate Function (DCF). PCF is a centralizedpolling-based MAC mechanism, which provides contention-free and time-bounded services. On the other hand, DCF isbased on CSMA/CA, mandating stations carrier sense thechannel media before transmitting packets. In DCF, everystation has a backoff contention window (CW) for collisionavoidance. Specifically, at the first transmission attempt, CWis set to the minimum value (cwmin). A station generatesa backoff timer uniformly from [0, CW-1], and then startsto count down. When the timer counts down to zero, thestation gets the privilege to access the channel. On unsuc-cessful transmission (ACK not returned), a binary exponentialbackoff (BEB) mechanism is used to relieve the contention

Immediate access when medium is idle DIFS Contention

Window

Slot Time

Defer Access Select slot and decrement backoff as long as medium is idle

DIFS BusyMedium

PIFSDIFS

SIFS Backoff Window Next Frame

Fig. 1. IEEE 802.11 MAC mechanism.

level. In particular, the station has to double its CW sizeuntil CW reaches the maximum CW (cwmax) value. Onsuccessful transmission (ACK returned), DCF resets CW backto cwmin. As several previous works have pointed out, theBEB mechanism in 802.11 DCF does not adapt to the wirelessenvironment wisely [18]–[22]. The 802.11 MAC operationsare illustrated in Fig. 1.

B. Auto-rate Fallback (ARF)

ARF is the most widely implemented rate-adaptive scheme.It was originally used in WaveLAN-II devices, one of theearly 802.11 products [6]. The key algorithm of ARF is thatsender attempts to upgrade its transmission rate after suc-cessfully receiving 10 consecutive ACK frames, whereas thesender switches to a lower rate if it encounters 2 consecutiveunsuccessful transmissions (i.e., missing ACK frames or thesender waits longer than timeout). If there is no traffic thathas been sent for the present time, then station transmitspacket with the highest possible rate. Although ARF is easy toimplement, it has one attendant drawback: ARF can not workefficiently under stable or fluctuated channel conditions. Thatis, either it will constantly try to upgrade the transmissionrate (which SINR cannot support), leading to unnecessarypacket collisions, or can not react quickly enough to matchthe fluctuated channel conditions.

C. Adaptive Thresholds (AT)

Observing the problem of using fixed up/down-thresholdswithout considering time-varying wireless channel characteris-tics and the impact of link-layer collisions, AT aims to enhancethe performance of ARF rate adaptation protocol [15]. Sinceframe collisions cannot be easily distinguished from channelerrors according to missing IEEE 802.11 ACKs, chancesare the ARF rate control usually results in unnecessary ratedownshifts when channel noise is actually low. To improve theresponsiveness of channel variations and mitigate the impactof transmission failures induced by link-layer collisions, theauthors in [15] propose a run-time adaptive algorithm todynamically adjust the up/down-thresholds in ARF based onlink-layer measurements. The design philosophy behind ATis to discourage rate downshifts (by setting a higher valuefor down-threshold) when the number of contending stationsincreases and reduce rate upshifts (by using a higher value forup-threshold) when contention decreases.

D. ARF with COLLIE (AC)

Also targeting on improving ARF performance, AC intendsto exercise wireless packet loss diagnosis so that transmission

LIN et al.: EARC: ENHANCED ADAPTATION OF LINK RATE AND CONTENTION WINDOW FOR IEEE 802.11 MULTI-RATE WIRELESS NETWORKS 2625

failures caused by link-layer collisions or channel errors (weaksignal) can be distinguished [16]. AC statistically analyzesreceived data through a combination of various metrics suchas bit-level and symbol-level error patterns and received signalstrength. When the packet loss is diagnosed as an eventcaused by collision, AC adjusts the contention window (CW)parameter according to the binary exponential backoff (BEB)algorithm used in 802.11 DCF. On the other hand, when thepacket loss is determined due to weak signal, AC triggersARF rate control mechanism. The essential operation of ACgreatly depends on the AP module’s capability of identifyingthe true cause of a packet loss and invoking the correct methodof adaptation in real-time, which incurs significant per-packetoverhead and considerable bandwidth waste when inaccuratediagnosis takes place.

E. Receiver-based Auto-rate (RBAR)

RBAR is a receiver-based rate-adaptation mechanism [4],which makes the rate adaptation decision based on channelquality estimated at the receiver and informs the sender viaRTS/CTS handshaking mechanism. In RBAR, receiver utilizesRTS packet to obtain the RSSI information, and then selectsan appropriate data rate provided in CTS to inform the sender.The rate handshaking is confirmed by another ReservationSubHeader (RSH) control message from the sender. Two maindrawbacks exist in the RBAR protocol. One is the controllingoverhead caused by rate negotiation on a per-packet basis. Theother is the fact that RSSI estimation is not precisely supportedin most wireless devices, reducing the practical feasibility ofRBAR protocol.

F. Adaptation of Link Rate and Contention Window (ARC)

ARC is an open-loop rate adaptation protocol that jointlyconsiders the contention window adjustment [17]. The ARCprotocol estimates the optimal contention window (optCW )based on Cali’s approximation methods. On transmissionsuccesses (failures), the current contention window size cwp iscompared with optCW . If cwp > optCW (cwp < optCW ),then cwp is decreased (increased) to perform more aggressive(conservative) transmission attempts while leaving the linkrate R unchanged. Otherwise, R is upgraded (reduced) tothe next higher (lower) rate. Due to its open-loop nature andtuning contention window first, ARC may encounter severaltransmission failures before reaching a proper backoff and ratesetting. In addition, the transmitter-estimated optCW in ARCdoes not always reflect the contention level at the receiverunder asymmetric networking environments.

III. OUR EARC PROTOCOL

In this section, we present the operation details of theproposed EARC protocol. Section III-A points out the problemof separately tuning link rate and contention window. Sec-tion III-B provides an overview of EARC protocol, and weelaborate on the EARC-related algorithms in Section III-C.

tx

Fig. 2. DATA and ACK packet formats used in our EARC protocol (theshaded areas are specifically utilized by the EARC algorithm).

A. Problem Statement

In wireless networks, successful data reception is mainlydependent on the Signal-to-Interference-and-Noise Ratio(SINR) at the receiver. IEEE 802.11 supports multiple linkrates at the physical layer. Each link rate is associated with acertain required SINR threshold for successfully decoding re-ceived packets. Collectively, we define the sum of interferenceand noise power (N + I) as the accumulated environmentalenergy E. Suppose no power adjustment exists, apparentlySINR is solely affected by the environmental power level E.Traditional link rate adaptation approaches try to reduce thetransmit rate (hence lower SINR threshold is required) ontransmission failures (potentially due to increased E), whereasupgrade the transmit rate (hence higher SINR thresholdis required) on successful transmissions (potentially due todecreased E). The accumulated environmental power levelE in some sense indicates the medium congestion status. In802.11, on transmission failures, the DCF performs a binaryexponential backoff mechanism to discourage channel accessattempts. When traditional link adaptation is applied, bothrate reduction and binary backoff represent double penaltiesfor this wireless link, which may cause overly conservativetransmission attempts. On the other hand, once transmissionsucceeds, 802.11 DCF resets the backoff contention windowto the minimum value to encourage channel access attempts.At the same time, traditional link adaptation may also decideto increase the data rate, which leads to overly aggressivetransmission attempts. We observe this improper interactionof link rate and backoff mechanism that harms the 802.11system performance, due to separate consideration of thosetwo parameters.

B. Protocol Overview

Motivated by the above observations, rather than indepen-dently dealing with the two parameters, we propose to jointlyconsider the link rate and contention window adaptations ina unified framework. In particular, a closed-loop (receiver-assisted) link rate adaptation strategy that also takes contentionwindow adjustment into account, entitled EARC, is developedto improve IEEE 802.11 system capacity. As reviewed inSection II-A, 802.11 DCF is essentially a CSMA scheme,

2626 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 60, NO. 9, SEPTEMBER 2012

TABLE IoptCW ESTIMATION FOR IEEE 802.11B

M pr1opt optCW r1 pr2opt optCW r2 pr3opt optCW r3 pr4opt optCW r4

10 0.0112 177 0.0155 128 0.0243 81 0.0320 6115 0.0074 271 0.0102 196 0.0159 125 0.0210 9420 0.0055 364 0.0076 263 0.0119 168 0.0157 12725 0.0044 458 0.0060 331 0.0094 211 0.0125 15930 0.0036 551 0.0050 398 0.0078 254 0.0104 19135 0.0031 645 0.0043 466 0.0067 297 0.0089 22440 0.0027 738 0.0037 533 0.0059 340 0.0078 256

which mandates a station sense (detect) the wireless channelbefore attempting to transmit. Only when the sensed (detected)energy is below carrier-sense threshold does a station prepareto carry out its access attempt. EARC taps into this charac-teristic and lets each station constantly keep track of detectedenergy levels. In this manner, the environmental energy levelE (as mentioned in Section III-A) can be obtained based onrecent energy statistics averaged in a certain time interval1. Forsome communication pair tx (transmitter) and rx (receiver),define Etx and Erx as the environmental energy level atthe transmitter and receiver, respectively. By comparing Erx

to Etx, a receiver is able to infer the medium congestiondifference between the two sides, further utilized to assist inrate selection and contention window adjustment. This energyinformation is only approximate, yet useful for resolving theproblem of asymmetric (different) congestion views compre-hended by tx and rx. Therefore, we propose to piggyback theEtx information in DATA packet, as shown in Fig. 2, so thatour EARC algorithm at the receiver can utilize this informationto perform contention window tuning for the transmitter. Feed-back from the receiver is then carried by the ACK packet backto the transmitter. Rather than creating extra overhead, EARCuses the reserved fields (5 bits in total) in PLCP header to carrythe feedback, as depicted in Fig. 2. On acquiring the feedbackfrom receiver, our EARC algorithm at the transmitter altersthe transmit rate or contention window size accordingly. Whenperforming rate and contention window (CW) adaptations atthe receiver, EARC first estimates whether the current transmitrate is the best sustainable choice under the latest observedenvironmental energy Erx. A new rate will be suggested ifthe current rate is not the best one. Otherwise, EARC moveson to evaluate whether the CW needs to be adjusted, basedon the difference of Etx and Erx. Details on related EARCalgorithms are immediately provided in Section III-C.

C. EARC Algorithms

Suppose R different rates are supported at the physicallayer, denoted as rate r1, r2, . . . , rR (in the order of increas-ing rate). Initially, the transmitter uses an estimated optimalcontention window (optCW rR) for the highest supportedrate rR, and transmits DATA at this rate after the backoff

1Note that the environmental energy level for a node (obtainable from thedevice RSSI reading) means the accumulated power strength (transmissionenergies produced by both successful and lost/corrupted packets over awireless channel) contributed by surrounding activities (including collisionevents that lead to lost/corrupted packets) in this node’s neighborhood.

mechanism completes. The estimation of optCW ri for sometransmit rate ri is based on an extended model of Cali’sanalytical approximations [18], presented in Section III-C1.When DATA packet arrives at the receiver, necessary EARCoperations are described in Section III-C2. On the other hand,Section III-C3 details the EARC reactions to both cases(whether the transmission succeeds or fails) at the transmitter.

1) optCW Estimation: For analytical tractability, theauthors in [18] consider a p-persistent version of 802.11DCF, where p = 1

E[B]+1 and E[B] is the average backoffslots. Parameter p is appropriately termed as the attemptprobability. Define the protocol capacity ρ =

mri

tv, where

mri is the packet (message) transmission time at rateri and tv is the virtual transmission time (time betweentwo consecutive successful transmissions, as illustratedin Fig. 3). Denote E[Nc] as the expected number ofcollisions, E[Coll], E[Idle], and E[Succ] as the expectedtime durations of each collision, idle period, and successfultransmission, respectively. Now we can express tv as follows,

][][)1][()][(][

][][])([ 11

SuccEIdleENEtttCollENE

SuccEIdleEtttCollIdleEt

cDIFSACKSIFSc

N

N

iACKSIFSDIFSiiv c

c

where tDIFS , tSIFS , and tACK represent the time durationsof 802.11 DIFS, SIFS, and ACK transmission separately.For some transmit rate ri, E[Coll] and E[Succ] can beapproximated as E[Coll] = mri (packet transmission time)and E[Succ] = mri + tSIFS + tACK + tDIFS (neglectingpropagation delay). Suppose there are M active nodesin the transmission neighborhood, based on probabilitycomputations, E[Nc] and E[Idle] can be derived as

E[Nc] =1− (1− p)M

Mp(1− p)M−1− 1, (1)

E[Idle] =(1− p)M

1− (1− p)M× tslot, (2)

where tslot is the slot time.Our ultimate goal is to minimize virtual transmission time

tv , such that the protocol capacity ρ can be maximized. As il-lustrated in Fig. 3 (right), tv is a function of attempt probabilityp, and the optimal p (priopt) at rate ri for some given M existsat the transitional point (bottom) of tv curve. The results from[18] suggest that an optimal transmission attempt probability(priopt) at rate ri can be obtained by observing number of idleslots and active nodes (M ) within the transmission range.Recall that attempt probability p = 1

E[B]+1 , where E[B] is

LIN et al.: EARC: ENHANCED ADAPTATION OF LINK RATE AND CONTENTION WINDOW FOR IEEE 802.11 MULTI-RATE WIRELESS NETWORKS 2627

SuccessfulTransmission

Virt

ual T

rans

mis

sion

Tim

et v

Attempt Probability p

DIFS

IdleIdle

DIFS

CollisionCollision

Idle

Virtual Transmission Time tv

Fig. 3. Definition of the virtual transmission time in p-persistent IEEE 802.11 protocol, and resultant virtual transmission time from different attemptprobability settings under various numbers of active nodes all using transmission rate at 1 Mbps.

the average backoff slots. Suppose E[CW ] is the expectedcontention window size, hence E[B] = E[CW ]−1

2 . Now theattempt probability can be re-formulated as p = 2

E[CW ]+1 ,or equivalently E[CW ] = 2

p − 1. Consequently, for someobtained priopt, the corresponding optimal contention windowsize (optCW ri) can be approximated as

optCW ri =2

priopt− 1. (3)

We run several simulation experiments to estimate theoptCW ri for various numbers of active nodes under four802.11b rates based on this method in ns-2 simulator. Table Ishows some of the results, where r1 = 1 Mbps, r2 = 2 Mbps,r3 = 5.5 Mbps, and r4 = 11 Mbps.

2) Receiver Operations: Given the Etx information carriedby DATA packet and Erx measured at the receiver, EARCdetermines how to adjust the rate and backoff parameters.Recall the ACK packet format shown in Fig. 2. Three EARC-related fields (reserved bits in PLCP header) are defined:EARC Rate Flag, EARC CW Flag, and EARC Control.If EARC algorithm at the receiver concludes that the currenttransmit rate is not the best one, then EARC Rate Flag is settrue, and EARC Control contains the suggested rate (totally8 rates can be represented given 3 bits in EARC Control).If there is no need to adjust the rate, EARC Rate Flag isset false, and EARC algorithm moves on to evaluate whetherthe backoff parameter (CW size) should be adjusted. If theperceived environmental energy level Erx measured at thereceiver is different from transmitter-measured Etx, indicatingasymmetric (inconsistent) contention views, EARC sets CWFlag true and provides suggested CW adjustment quantity inEARC Control field. Otherwise, EARC CW Flag is set false,and the value of EARC Control becomes meaningless (neitherrate nor CW need be adjusted). Below we describe the specificprocess of configuring the three fields executed by EARCalgorithm at the receiver.

In order to select the best sustainable rate, we introduce aRate Selection Reference (RSR) table. Since the SINR valueis not practically obtainable by current hardware functionality,EARC at the receiver does not perform the rate selection

Erx

Erx

-10

Fig. 4. Illustration of obtaining sensed energy level Erx and the empiricallyderived rate selection reference (RSR) table (subject to changes as channelcondition varies) at the receiver.

using SINR2. Instead, the receiver maintains a rate selectionreference (RSR) table, illustrated in Fig. 4 (bottom), whichis empirically constructed based on recent reception behavior.The RSR is essentially a table that indicates the best suggestedrates for different ranges of receiver-measured environmentalenergy levels (Erx). In the example of Fig. 4, Erx is obtainedfrom 10 sampling values of detected energy averaged in thelatest 0.5-second time interval, which turns out to be 2.28e-10Watt. Given the Erx value, EARC algorithm at the receiverconcludes that 5.5 Mbps is the best rate to use.

The initial RSR table can be constructed experimentally. Inour approach, we set up a nominal environment containing atransmission pair with communication distance of 80 meters.By fixing the transmit power at 9.947e-2 Watt, we raise theenvironmental noise/interference power from 0 to 6e-10 Wattin the simulator. Given frames (packets) of size equal to 1000bytes sent continuously at four different transmission rates,

2On receipt of a packet, the RSSI (Received Signal Strength Indicator)reading provided by off-shelf IEEE 802.11-based wireless modules containsaccumulated energy level (S+N+I). We are unable to discern the differencebetween received signal strength (S) and interference/noise power level (N+I)from the RSSI reading, making SINR (ratio) value difficult/unrealistic toobtain [23], [24].

2628 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 60, NO. 9, SEPTEMBER 2012

1.5 3.3 4.2

00.10.20.30.40.50.60.70.80.9

1

0.63 1.03 1.43 1.83 2.23 2.63 3.03 3.43 3.83 4.23 4.63 5.03Detected Energy Level (e-10 Watt)

Fram

e Er

ror R

ate

00.010.020.030.040.050.060.070.080.09

0.1

0.63 1.03 1.43 1.83 2.23 2.63 3.03 3.43 3.83 4.23 4.63 5.03

Detected Energy Level (e-10 Watt)

Fram

e Er

ror R

ate11 Mbps

5.5 Mbps

2 Mbps

1 Mbps

11 Mbps

5.5 Mbps

2 Mbps

1 Mbps

FER Threshold

FER = 0.0769

close-up

Fig. 5. Relationship of FER against environmental energy level (left) and identifying corresponding energy thresholds in RSR table (right).

the corresponding frame error rate (FER) can be computedat each sampling point with pre-configured noise power level.After combining these measurements and applying appropriateinterpolation method, the relationship between FER and envi-ronmental energy level can be quantified, as shown in Fig. 5(left). In order to sustain a bit error rate (BER) below 1.0e-5,or equivalently FER under 0.07693, as specified in the IEEE802.11 standard, we identify the corresponding three energythresholds for the four rates: 1.5e-10, 3.3e-10, and 4.2e-10Watt, as illustrated in Fig. 5 (right). The result implies thatwhen the detected energy level is over a certain threshold,the next lower rate should be used to ensure a BER below1.0e-5. Consequently, the RSR table as displayed in Fig. 4is generated. Note that the RSR table is subject to changesas the receiver learns and updates by monitoring recent re-ceiving activities from some specific transmitter. Initially, areceiver uses the same default RSR table for all transmitters.Then as time advances, those RSR tables are evolved andcustomized through receiver’s learning mechanism. By con-stantly measuring/sampling environmental energy levels andrecording reception activities into RSR table at the receiver, wetactfully avoid using SINR to infer the best rate. Although theempirically constructed RSR table may not be always accuratein determining a rate, such inaccuracy is allowed and tolerablesince rate is not the only parameter in EARC adaptationalgorithm. Certain imprecision in rate prediction can actuallybe fixed by tuning the corresponding CW parameter properly.As we can observe from our simulations (in Section IV), theRSR table indeed provides a good rate selection reference.

Suppose the current transmit rate is ri and receiver sug-gested rate is rj . If ri is not equal to rj , then the receiver setsEARC Rate Flag true, and corresponding 3-bit EARC Control,defined as b1b2b3, with value(b1b2b3) = j − 1. On the otherhand, if ri = rj , meaning that the best rate is already in use,the receiver then looks at the energy difference Ediff betweenErx and Etx. Define Ediff = Erx−Etx

Etx. Generally speaking,

rate adaptation is effective in resolving the collisions due toconcurrent transmissions (with transmitters locating outside ofeach other’s carrier-sense range), but ineffective in reducingcollisions due to simultaneous transmissions (inside carrier-sense range). The latter can be alleviated by increasing thecontention window size to discourage transmission attempts in

3FER = 1 − (1 − 1.0e − 5)8000 = 0.0769, given BER = 1.0e − 5 andframe size of 1000 bytes.

the collision zone. Thus contention window tuning is also crit-ical for system performance. As presented in Section III-C1,an optimal contention window (optCW ri) at rate ri can beapproximated based on Cali’s analytical model. However, thetransmitter-estimated optCW ri does not necessarily reflectthe contention status at the receiver. As a result, the receiverutilizes Ediff to assist in tuning transmitter’s CW value to fur-ther increase the transmission success probability. Specifically,when Ediff is positive, indicating energy (contention) levelat the receiver is higher than that at the transmitter, the CWvalue should be increased to reduce contention. In contrast,when Ediff is negative, implying contention level is lower atthe receiver than that at the transmitter, the CW value can bedecreased to encourage more aggressive transmission attempts.Consequently, the receiver sets EARC CW Flag true and thefirst bit (b1) of EARC Control as follows,

b1 =

{1 if Ediff > 00 if Ediff < 0

}. (4)

Next, we utilize the rest two bits (b2b3) of EARC Con-trol to indicate the CW adjustment quantity for transmit-ter. Suppose K values can be represented (in our caseK = 22 = 4 given two bits b2b3 are available).We define K boundaries (0, 1

K , 2K , . . . , K−1

K ) for possibleEdiff values. When |Ediff | lies between any two bound-aries or beyond the largest boundary, the receiver con-figures the value of b2b3 in EARC Control as follows,

otherwise1

)10(&&)1(if)( 32

K

KkK

kEKkkbbvalue diff

Table II summarizes all possible cases of Ediff and corre-sponding settings on EARC CW Flag and EARC Control bitswhen EARC Rate Flag is set false.

We provide the pseudocode for receiver EARC operations inAlgorithm 1. Based on the values of EARC Rate Flag, EARCCW Flag, and EARC Control contained in ACK packet, thetransmitter is able to perform the rate and contention windowadjustment accordingly.

3) Transmitter Operations: Once the ACK packetsuccessfully returns from the receiver, the transmitter firstchecks if EARC Rate Flag is set true. If yes, rate and CWare configured to rb+1 and optCW rb+1 respectively, whereb = value(b1b2b3). If EARC Rate Flag is set false, thentransmit rate remains at ri, and the transmitter moves on to

LIN et al.: EARC: ENHANCED ADAPTATION OF LINK RATE AND CONTENTION WINDOW FOR IEEE 802.11 MULTI-RATE WIRELESS NETWORKS 2629

TABLE IIALL CASES OF Ediff AND CORRESPONDING EARC CW FLAG AND

CONTROL BITS WHEN RATE FLAG = false

b 1 b 2 b 3

0 < Ediff 25% 0 0 25% < Ediff 50% 0 1 50% < Ediff 75% 1 0 75% < Ediff 1 1 -25% Ediff < 0 0 0 -50% Ediff < -25% 0 1 -75% Ediff < -50% 1 0 Ediff < -75% 1 1

Ediff = 0 false

0

true

don't care

1

EARC ControlPossible Cases EARC CW Flag

Algorithm 1 EARC Algorithm at Receiver1: while (DATA packet transmitted at rate ri received) do2: Look up the RSR table and decide a best sustainable rate rj

based on Erx;3: if (i != j) then4: EARC Rate Flag set to true;5: Set value(b1b2b3) = j − 1 in the EARC Control field;6: else7: EARC Rate Flag set to false;8: Compare Erx with Etx and calculate Ediff ;9: if (Ediff == 0) then

10: EARC CW Flag set to false;11: else12: EARC CW Flag set to true;13: if (Ediff < 0) then14: Set b1 = 0; // to decrease CW15: else16: Set b1 = 1; // to increase CW17: if (( k

K< |Ediff | ≤ k+1

K) && (0 ≤ k < K − 1)) then

18: Set value(b2b3) = k;19: else20: Set value(b2b3) = K − 1;21: Return ACK packet back to transmitter;

check the EARC CW Flag. If EARC CW Flag is also false,then the present CW value, denoted cwp, remains. Otherwise,the transmitter should adjust the CW value by setting

= + ( ) + = + ( )( ( ) + ) =

where 2·value(b2b3)+12K is basically the middle value of two

boundaries that |Ediff | lies between, and α is a weighingfactor in the range of [0, 1). The use of α allows us theflexibility of bounding CW tuning within a reasonable range,avoiding too aggressive reduction in CW value. For example,if α = 0.5, the CW reduction quantity will never exceedhalf of the optimal contention window size (optCW ri) atrate ri. On the other hand, from cwp formulation, we canobserve that the increased CW value will never exceed twiceof optCW ri . In this manner, we limit the CW adjustment toavoid too drastic changes.

If, unfortunately, ACK does not return (or DATA packetsimply fails to reach the receiver), the transmitter has noreceiver feedback to assist in the rate and CW adaptation.In this case, the transmitter compares cwp with optCW ri ,

and increases cwp to optCW ri if cwp < optCW ri , lettingrate stay at ri. The design rationale is trying to impose alarger backoff window on future transmission, hoping the nexttransmission can succeed without the need to decrease rate.However, if cwp ≥ optCW ri , then the transmitter shoulddecrease rate to the next lower one (or maintain the rate ifit is already the lowest). Meanwhile, cwp is set to the optimalCW value at the lower rate.

Algorithm 2 summarizes EARC operations at the transmit-ter. Note that the feedback from the receiver takes effect onthe next DATA packet (including retransmitted packet) to besent by the transmitter within a certain time interval (timeout).In case the next DATA packet arrives after timeout expires,the corresponding rate and CW settings become invalid, andthe transmitter resets transmit rate to the default rate rR (thehighest supported rate) and CW at optCW rR .

Algorithm 2 EARC Algorithm at Transmitter After DATAHas Been Sent to Receiver Using Rate ri

1: Suppose cwp is the current CW setting for this particularreceiver;

2: if (ACK returned) then3: if (EARC Rate Flag == true) then4: Obtain b = value(b1b2b3);5: Set rnext = rb+1;6: Set cwp = optCW rb+1 ;7: else8: Set rnext = ri;9: if (EARC CW Flag == true) then

10: switch (b1b2b3)11: case 100: Set cwp = optCW ri×(1 + 12.5%);12: case 101: Set cwp = optCW ri×(1 + 37.5%);13: case 110: Set cwp = optCW ri×(1 + 62.5%);14: case 111: Set cwp = optCW ri×(1 + 87.5%);15: case 000: Set cwp = optCW ri×(α + (1 - α)(1-12.5%));16: case 001: Set cwp = optCW ri×(α + (1 - α)(1-37.5%));17: case 010: Set cwp = optCW ri×(α + (1 - α)(1-62.5%));18: case 011: Set cwp = optCW ri×(α + (1 - α)(1-87.5%));19: else20: if (cwp < optCW ri) then21: Set cwp = optCW ri ;22: Set rnext = ri;23: else24: if (i > 1) then25: Set rnext = ri−1;26: Set cwp = optCW ri−1 ;27: else28: Set rnext = ri;29: Set cwp = optCW ri ;30: if (next DATA packet destined for this particular receiver arrives

before timeout expires) then31: Pick up the backoff timer from [0, cwp-1] and starts to count

down;32: Transmit the DATA packet at rate rnext;33: else34: Pick up the backoff timer from [0, optCW rR-1] and starts to

count down; // rR is the highest supported rate35: Transmit the DATA packet at rate rR;

IV. SIMULATION RESULTS

In this section, we run simulations in the ns-2 simulator(version 2.34). We add our EARC module in the dei80211mrlibrary that supports 802.11b multi-rate PHY. Four link ratesare available: 1, 2, 5.5, and 11 Mbps. Friis radio propagation

2630 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 60, NO. 9, SEPTEMBER 2012

200m

200m

9

10

5

7

6

8

13

2

4

19

2015

17

16

18

11

1312

14

29

30

25

272628

21 2322

24

39 4035

37

36

3831 33

32

34

49

50

45

47

46

48

41 43

42

44

59

60

55

57

56

58

51

5352 54

69

70

65 67

66 6861

63

62

64

79 80

75

77

76

78

7173

72

74

0

0.5

1

1.5

2

2.5

3

3.5

4

10 15 20 25 30 35 40

Number of Flows

Agg

rega

te T

hrou

ghpu

t (M

bps)

EARC ARC RBAR

BEB (11 Mbps) BEB (5.5 Mbps)ARF

AC

AT

Fig. 6. Performance comparison in a symmetric environment.

model is used. CBR traffic (sending rate = 1 Mbps) isgenerated with packet size of 1000 bytes. Transmit poweris fixed at 9.947e-2 Watt. We let every node randomly starttransmission within the time range from 0 to 0.2 seconds toreduce initial collisions. MAC parameters cwmin = 32 andcwmax = 1024 are used. Total simulation time is 20 seconds.Each statistic is obtained from the average of 20 experiments.For comparison purpose, we also implement BEB (with fixedrate at 11 and 5.5 Mbps respectively), ARF, AT, AC, RBAR,and ARC mechanisms. For BEB, ARF, AT, AC, and RBAR,the default binary exponential backoff is used as the CWadjustment strategy. Except for BEB, which has link rate fixedat 11 and 5.5 Mbps, all mechanisms set their starting link rateat 11 Mbps.

A. Symmetric Environment

Fig. 6 (upper) depicts the simulation environment, wherenodes are randomly placed in a 200x200 square-meter rectan-gular area. A maximum of 40 traffic flows are generated withthe average communication distance at 80 meters. In this en-vironment, the contention level at the transmitter is consistentwith that comprehended by the receiver (most of the time),to which we refer as a symmetric environment. Fig. 6 (lower)shows the system throughput against number of flows for dif-ferent approaches performed in this symmetric environment.We observe that our EARC outperforms other strategies, whileBEB (11 Mbps) produces the worst performance. ARF and

ARF-based approaches (AT and AC) perform slightly betterthan BEB. By jointly adjusting the rate and CW parameters,ARC yields the second best aggregate throughput. Due to itsopen-loop nature (without receiver feedback), ARC is unableto react to the varying channel as quickly as EARC does. Onthe other hand, although RBAR incorporates receiver feedbackto assist in rate selection, the system throughput achieved byRBAR is not as high as EARC due to the controlling overheadand binary exponential backoff mechanism used by RBAR.This result demonstrates the importance of designing the rateand CW parameters in a unified framework at the cost ofmoderate controlling overhead (only one extra byte to carryEtx in our EARC design). Consequently, EARC improvesthe performance of ARC and RBAR by 5.7% and 15.6% inaverage. Compared to ARF (the most commonly implementedrate adaptation mechanism in real devices), EARC producessystem throughput around 2.2 times that achieved by ARF-based mechanisms.

In order to have a better understanding of the detailed linkrate and CW adaptation process, we provide the link rateutilization and CW statistics, for the case of 40 flows, in Fig. 7.From the statistics, we observe that EARC and ARC use moreCW values, while CW used by other strategies only takes ona few values due to binary exponential backoff mechanism.Except for BEB (11 and 5.5 Mbps), all four rates are used.Interestingly, for EARC and RBAR, the largest proportion ofrate setting is both at 2 Mbps, despite that the rate selectionmechanisms adopted by RBAR and EARC are different. InRBAR, the best rate is selected based on SINR value, whichis obtainable in simulator but not accurately supported bycurrent hardware. In contrast, EARC decides on the bestsustainable rate according to the RSR table derived from realreception history, which is practically implementable. Thisresult implies that the RSR table introduced in EARC doesgood judgement without the need to obtain SINR, and thusrepresents a promising option for rate determination. For ARC,the most used rate is 11 Mbps (the highest rate) due to itsprotocol nature of always tuning CW before rate. For ARF,the majority of rate setting is at 1 Mbps (the lowest rate).Due to the protocol nature of ARF, it is easier to decreaserate (on 2 consecutive failures) than to increase rate (on 10consecutive successes). Consequently, it becomes harder forARF to bounce back to a higher rate in heavily contendedenvironment. AT improves this drawback by adaptively usinga smaller up-threshold in a contended environment (actuallythe down-threshold tends to remain larger than up-thresholdwhen the number of contending stations is over 10), leadingto the most used rate set at the highest 11 Mbps. However, theimprovement over ARF is quite limited, since it is not alwaysadvantageous to transmit at fast rates when the contention ishigh. Instead, by using lower rates and setting appropriate CWvalues, many collisions between contending stations can beeffectively resolved (as in the strategy adopted by our EARC).For AC, the highest 11 Mbps and the lowest 1 Mbps are usedwith comparatively equal probability. By distinguishing thepacket loss causes and taking corresponding actions (tuningCW or rate parameters), AC performs better than ARF butin an insignificant way due to its considerable per-packetdiagnosis overhead. Moreover, when the judgement of packet

LIN et al.: EARC: ENHANCED ADAPTATION OF LINK RATE AND CONTENTION WINDOW FOR IEEE 802.11 MULTI-RATE WIRELESS NETWORKS 2631

100%

100%

CW Statistics

Link Rate Utilization

0%

10%

20%

30%

40%

50%

60%

70%

80%

90%

100%

EARC0%

10%

20%

30%

40%

50%

60%

70%

80%

90%

100%

ARC

0%

10%

20%

30%

40%

50%

60%

70%

80%

90%

RBAR

1 Mbps2 Mbps5.5 Mbps11 Mbps

0%

10%

20%

30%

40%

50%

60%

70%

80%

90%

100%

BEB (11 Mbps)0%

10%

20%

30%

40%

50%

60%

70%

80%

90%

100%

0%

10%

20%

30%

40%

50%

60%

70%

80%

90%

100%

EARC

144 176 191 208233 240 256 276299 318 340 433467 480 499 533599 637 732 738866 999

0%

10%

20%

30%

40%

50%

60%

70%

80%

90%

100%

ARC

32 42 52 62 7282 92 102 112 122132 142 152 162 172182 192 202 212 222232 242 252 262 272282 292 302 312 322332 342 352 362 372382 392 402 412 422432 442 452 462 472482 492 502 512 522532 542 552 562 572582 592 602 612 622632 642 652 662 672682 692 702

0%

10%

20%

30%

40%

50%

60%

70%

80%

90%

RBAR

10245122561286432

0%

10%

20%

30%

40%

50%

60%

70%

80%

90%

100%

BEB (11 Mbps)

10245122561286432

0%

10%

20%

30%

40%

50%

60%

70%

80%

90%

100%

BEB (5.5 Mbps)

10245122561286432

0%

10%

20%

30%

40%

50%

60%

70%

80%

90%

100%

ARF

10245122561286432

100%

0%

10%

20%

30%

40%

50%

60%

70%

80%

90%

AT

10245122561286432

0%

10%

20%

30%

40%

50%

60%

70%

80%

90%

100%

AC

10245122561286432

0%

10%

20%

30%

40%

50%

60%

70%

80%

90%

100%

AC0%

10%

20%

30%

40%

50%

60%

70%

80%

90%

100%

AT0%

10%

20%

30%

40%

50%

60%

70%

80%

90%

100%

ARF BEB (5.5 Mbps)

Fig. 7. Investigation of CW settings and link rate utilization when 40 flows are randomly generated in a symmetric environment.

loss causes turns out to be incorrect, extra resource penaltypaid by AC is costly and cannot be ignored. The aboveobservations reveal that the rate or CW parameter alone isincapable of handling various failure sources. Both parametersshould work cooperatively in order to push the system capacitylimit.

B. Asymmetric Environment

Now we conduct another set of simulations in an asym-metric environment. Specifically, if hidden terminals exist inthe network, the observed contention status at the transmitteris different from that at the receiver, to which we referas the asymmetric environment. Such inconsistent contentioncomprehension can invalidate the transmitter-estimated CWsetting. In Fig. 8, we create two types of asymmetric environ-ments to reflect different contention levels perceived by thetransmitter and receiver. We randomly generate 20 flows insuch an environment. With inconsistent views, T20R30 is usedto express the perceived numbers of active nodes at the trans-mitter and receiver are 20 and 30, respectively. Six differentconfigurations of the 20 flows are experimented. Fig. 9 showsthe system throughput produced by different strategies underthe six flow configurations. EARC still performs the best, butARC degrades due to its inability of properly handling theasymmetric condition, where receiver feedback is essential.

Although having receiver feedback, performance achieved byRBAR is limited by its communication overhead and lack ofincorporating appropriate CW adjustment. Collectively, EARCperforms better than ARC and RBAR by around 21%, andhas the potential to improve the performance of ARF-basedapproaches by 1.8 times in average.

From the above simulations, we also observe that the jointCW adjustment effectively maintains rate stability, preventingunnecessary rate fluctuations. Specifically, if the mediumcongestion level can be reduced by imposing a larger backoffwindow on transmissions, then there may be no need todecrease the link rate. Conversely, if there is extra interferencethat may be tolerated, a smaller backoff window can be usedto encourage more transmission activities while keeping therate intact.

V. MATHEMATICAL ANALYSIS

We build a Markov chain model to evaluate the EARCperformance4. Similar methodology has been used by [25]–[29]. However, those works deal with CW and link rateindependently. In [25], [28], the authors analyze the fixed rate

4In the current work, we assume a relatively static environment. We willinvestigate the mobility-incurred channel dynamics issues when developingour future performance enhancement protocols and report possible interestingfindings in a subsequent paper.

2632 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 60, NO. 9, SEPTEMBER 2012

R

R

R

R

R

R

RR

R

R

R R

R

R

R

R

R

R

R

250m

250m

R

T

TT

T

T

T T

T

T

T

T

T

T

T

T

T

T

TTT

250m

250m

RT

R

R R R

R

RR

R R

R

R

RR

R

R

R

R

RR

TT

T

TT

T

T

T

T

T

TTTT

T

T

T

TT

Fig. 8. Asymmetric environments with more contending stations at thetransmitter (upper) and more contending stations at the receiver (lower).

802.11 DCF throughput, whereas authors in [26], [27], [29]study the DCF performance under multi-rate environments.Due to the jointly adaptation of link rate and DCF CW size inEARC protocol, we basically extend the Markov chain modelfrom [25] to consider both parameters in transition states. Weinvestigate an IEEE 802.11b network with four rates: 1, 2,5.5, and 11 Mbps, denoted as r1, r2, r3, and r4 respectively.Suppose n contending stations exist in the network, andeach station always has a packet ready for transmission.Define ri, optCW ri and ri, cwp as the states with link rateri (Mbps) using contention window sizes set at optCW ri andcwp (where p = 0, 1, . . . , 7 indicating eight CW adjustmentpossibilities in EARC) respectively. Fig. 10 illustrates thesimplified Markov chain model on EARC operations (withdetailed backoff counting down process omitted).

Let bri,optCW ri and bri,cwp (where p = 0, 1, . . . , 7) denotethe probabilities of states ri, optCW ri and ri, cwp, whereasprisucc, prifail, and pritimeout denote the transition probabilitiesof transmission success, transmission failure, and timeoutevent when using rate ri, respectively. Then we have

0

0.5

1

1.5

2

2.5

3

3.5

T20R30 T20R35 T20R40 T30R20 T35R20 T40R20

Agg

rega

te T

hrou

ghpu

t (M

bps)

EARC ARC RBAR

BEB (11 Mbps) BEB (5.5 Mbps)ARF

AC

AT

Fig. 9. Throughput performance in an asymmetric environment.

r2, cwpfor p {4, 5, 6, 7}

r1, cwpfor p {4, 5, 6, 7}r1, optCWr1

Rate Flag = true

r3, optCWr

r2, optCWr2

r4, optCWr

Rate Flag = false

Rate Flag = true

4

ACK not returnedACK returned(Rate Flag = true)

timeout(invalid rate and CW settings)

ACK returned(Rate Flag = false, CW Flag = true)

Rat

e Fl

ag =

fals

e

Rate Flag = false

Rate Flag = false

3

r4, cwpfor p {0, 1, 2, 3}

r4, cwpfor p {4, 5, 6, 7}

Rate Flag = true

r1, cwpfor p {0, 1, 2, 3}

r2, cwpfor p {0, 1, 2, 3}

Rat

e Fl

ag =

fals

e

r3, cwpfor p {4, 5, 6, 7}

r3, cwpfor p {0, 1, 2, 3}

Fig. 10. EARC operations expressed by the Markov chain model (withdetailed backoff counting down process omitted).

LIN et al.: EARC: ENHANCED ADAPTATION OF LINK RATE AND CONTENTION WINDOW FOR IEEE 802.11 MULTI-RATE WIRELESS NETWORKS 2633

Suppose ptx denotes the probability that a station attemptstransmission and pritx denotes the conditional probability thatrate ri is used given the transmission attempt is commit-ted in an observed time slot. Define ptr as the probabil-ity that at least one transmission attempt occurs in thatslot, which can be expressed as ptr = 1 − (1 − ptx)

n

(recall that n contending stations exist). Then we have

Next, we formulate failure probability prifailby variables ptx, pritx, and ptr as follows

To obtain the equilibrium state probabilities,we apply the Jacobi Method by initially set-ting bri,optCW ri = optCW ri

∑4i=1

(optCW ri+

∑7p=0 cw

rip

) ,

bri,cwrip

=cw

rip

∑4i=1

(optCW ri+

∑7p=0 cw

rip

) , and ptx, pritx as

We assume that user traffic arrives constantly and thus theprobability pritimeout of timeout event approaches zero for alldata rates. During the Jacobi solving process, variables ptx,pritx, ptr, prisucc, and prifail keep being updated in each iterationuntil the convergence condition is met.

After solving the equations and obtaining the values forall variables, we can derive the theoretic system capacityρ = m

tv, where tv is the virtual transmission time and m is the

average data bits successfully transmitted in tv. Assume linkpropagation delay is negligible. Let tIDLE , tSIFS , tDIFS ,and tPLCP denote the durations of a time slot, SIFS, DIFS,and physical-layer overhead, whereas LAPP , LMPDU , andLACK indicate the lengths of application payload bits, MACprotocol data unit, and ACK frame, respectively. Define T ri

succ

as the average time a station spends in a successful trans-

TABLE IIIPARAMETER SETTINGS IN OUR ANALYSIS AND COMPARISON OF

THEORETIC BOUNDS AND SIMULATIVE RESULTS

Parameter Value r1/r2/r3/r4/rACK 1/2/5.5/11/1 Mbps

tIDLE/tDIFS/tSIFS/tPLCP 20/50/10/192 sec LAPP/LMPDU/LACK 8000/8448/112 bits

# flows Analytic (Mbps) Simulative (Mbps) 10 3.7974 3.5010 15 3.7801 3.4173 20 3.7691 3.3236 25 3.7710 3.3205 30 3.7707 3.2992 35 3.7657 3.2731 40 3.7661 3.2171

mission using rate ri, whereas T rifail as the time spent in a

collision with the slowest station using rate ri. Then we have

where rACK is the basic rate used to transmit the ACKframe and To = tSIFS + tPLCP + LACK

rACKwhich indicates

the time spent waiting for accessing the channel again.Hence we have Tsucc (duration of a transmission success)=

∑4i=1 p

risucc × T ri

succ and Tfail (duration of a failure)=

∑4i=1 p

rifail × T ri

fail.Consequently, we obtain the system throughput ρ expressed

by

Table III summarizes the parameter settings adopted inour analytic calculations and throughput comparison to thesimulative achievements in a symmetric environment (withnumber of active flows growing from 10 up to 40). The resultsdemonstrate that the simulative data are quite consistent withanalytic predictions, hence validating the EARC performance.

VI. CONCLUSION

We propose a practical EARC protocol for tuning therate and backoff parameters in an IEEE 802.11 multi-rateenvironment. By utilizing reserved bits in 802.11 PLCP headerand one extra byte carried in DATA packet, EARC incurs littlecommunication overhead despite its closed-loop (receiver-assisted) nature. Instead of trying to obtain the SINR value(which is not practically obtainable), EARC decides on thebest rate according to an empirically derived rate selectionreference (RSR) table at the receiver. Furthermore, the receiveralso assists in tuning the transmitter-estimated optimal con-tention window. With proper interaction of the two parameters,

2634 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 60, NO. 9, SEPTEMBER 2012

our simulation results show that the proposed EARC protocoleffectively improves the IEEE 802.11 system performancethrough its unified design intelligence.

REFERENCES

[1] A. Akella, G. Judd, S. Seshan, and P. Steenkiste, “Self-management inchaotic wireless deployments,” in Proc. 2005 ACM MobiCom.

[2] J. C. Bicket, “Bit-rate selection in wireless networks,” Master’s thesis,Massachusetts Institute of Technology, Feb. 2005.

[3] C.-C. Chen, H. Luo, E. Seo, N. H. Vaidya, and X. Wang, “Rate-adaptive framing for interfered wireless networks,” in Proc. 2007 IEEEINFOCOM, pp. 1325–1333.

[4] G. Hollan, N. Vaidya, and P. Bahl, “A rate-adaptive MAC protocol formulti-hop wireless networks,” in Proc. 2001 ACM MobiCom, pp. 236–251.

[5] G. Judd and P. Steenkiste, “Using emulation to understand and improvewireless networks and applications,” in Proc. 2005 USENIX NSDI.

[6] A. Kamerman and L. Monteban, “WaveLAN-II: a high-performancewireless LAN for the unlicensed band,” Bell Labs Tech. J., vol. 2, no. 2,pp. 118–133, 1997.

[7] J. Kim, S. Kim, S. Choi, and D. Qiao, “CARA: collision-aware rateadaptation for IEEE 802.11 WLANs,” in Proc. 2006 IEEE INFOCOM,pp. 1–11.

[8] M. Lacage, M. H. Manshaei, and T. Turletti, “IEEE 802.11 rateadaptation: a practical approach,” in Proc. 2004 ACM MSWiM.

[9] T.-Y. Lin and J. C. Hou, “Interplay of spatial reuse and SINR-determineddata rates on CSMA/CA-based, multi-hop, multi-rate wireless net-works,” in Proc. 2007 IEEE INFOCOM, pp. 803–811.

[10] D. Qiao and S. Choi, “Fast-responsive link adaptation for IEEE 802.11WLANs,” in Proc. 2005 IEEE ICC, pp. 3583–3588.

[11] B. Sadeghi, V. Kanodia, A. Sabharwal, and E. Knightly, “Opportunisticmedia access for multirate ad hoc networks,” in Proc. 2002 ACMMobiCom, Sept. 2002.

[12] Y. Xi, B.-S. Kim, J.-B. Wei, and Q.-Y. Huang, “Adaptive multirate autorate fallback protocol for IEEE 802.11 WLANs,” in Proc. 2006 IEEEMILCOM, pp. 1–7.

[13] Q. Xia and M. Hamdi, “Smart sender: a practical rate adaptationalgorithm for multirate IEEE 802.11 WLANs,” IEEE Trans. WirelessCommun., vol. 7, no. 5, pp. 1764–1775, May 2008.

[14] H.-Y. Wong, H. Yang, S. Lu, and V. Bharghavan, “Robust rate adaptationfor 802.11 wireless networks,” in Proc. 2006 ACM MobiCom, pp. 146–157.

[15] J. Choi, J. Na, K. Park, and C.-K. Kim, “Adaptive optimization of rateadaptation algorithms in multi-rate WLANs,” in Proc. 2007 IEEE ICNP,pp. 144–153.

[16] S. Rayanchu, A. Mishra, D. Agrawal, S. Saha, and S. Banerjee,“Diagnosing wireless packet losses in 802.11: separating collision fromweak signal,” in Proc. 2008 IEEE INFOCOM, pp. 735–743.

[17] A.-C. Li, T.-Y. Lin, and C.-Y. Tsai, “ARC: joint adaptation of link rateand contention window for IEEE 802.11 multi-rate wireless networks,”in Proc. 2009 IEEE SECON, pp. 1–9.

[18] F. Cali, M. Conti, and E. Gregori, “Dynamic tuning of the IEEE 802.11protocol to achieve a theoretical throughput limit,” IEEE/ACM Trans.Netw., vol. 8, no. 6, pp. 785–799, Dec. 2000.

[19] D.-J. Deng, C.-H. Ke, H.-H. Chen, and Y.-M. Huang, “Contentionwindow optimization for IEEE 802.11 DCF access control,” IEEE Trans.Wireless Commun., vol. 7, no. 12, pp. 5129–5135, Dec. 2008.

[20] Y. Kwon, Y. Fang, and H. Latchman, “A novel MAC protocol with fastcollision resolution for wireless LANs,” in Proc. 2003 IEEE INFOCOM,pp. 853–862.

[21] C. Wang, B. Li, and L. Li, “A new collision resolution mechanismto enhance the performance of IEEE 802.11 DCF,” IEEE Trans. Veh.Technol., vol. 53, no. 4, pp. 1235–1246, July 2004.

[22] S.-R. Ye and Y.-C. Tseng, “A multi-chain backoff mechanism for IEEE802.11 WLANs,” IEEE Trans. Veh. Technol., vol. 55, no. 5, pp. 1613–1620, Sep. 2006.

[23] D. Aguayo, J. Bicket, S. Biswas, G. Judd, and R. Morris, “Link-level measurements from an 802.11b mesh network,” ACM SIGCOMMComput. Commun. Rev., vol. 34, no. 4, pp. 121–132, Aug. 2004.

[24] A. Vlavianos, L. Law, I. Broustis, S. Krishnamurthy, and M. Faloutsos,“Assessing link quality in IEEE 802.11 wireless networks: which is theright metric?” in Proc. 2008 IEEE PIMRC, pp. 1–6.

[25] G. Bianchi, “Performance analysis of the IEEE 802.11 distributedcoordination function,” IEEE J. Sel. Areas Commun., vol. 18, no. 3,pp. 535–547, Mar. 2000.

[26] W. Chu and Y.-C. Tseng, “Performance analysis of IEEE 802.11 DCFin a multi-rate WLAN,” IEICE Trans. Commun., vol. E90-B, no. 10,pp. 2836–2844, Oct. 2007.

[27] H. Park and C.-K. Kim, “Performance analysis of multi-rate IEEE802.11 WLANs with channel error,” in Proc. 2007 IEEE ICACT, pp.1479–1481.

[28] D. Qiao, S. Choi, and K. G. Shin, “Goodput analysis and link adaptationfor IEEE 802.11a wireless LANs,” IEEE Trans. Mobile Comput., vol. 1,pp. 278–292, Oct. 2002.

[29] G. Sharma, A. Ganesh, and P. Key, “Performance analysis of contentionbased medium access control protocols,” IEEE Trans. Inf. Theory,vol. 55, no. 4, pp. 1665–1682, Apr. 2009.

Ting-Yu Lin ([email protected]) obtained herPh.D. degree in Computer Science and InformationEngineering (CSIE) from the National Chiao TungUniversity, Taiwan. When she graduated, she wasrecipient of The Phi Tau Phi Scholastic Honoraward. From Jun. 2003 to Feb. 2004, Dr. Lin wasaffiliated with Massachusetts Institute of Technol-ogy (MIT) as a research scientist. She worked forIndustrial Technology Research Institute of Taiwanfrom Mar. 2004 to Aug. 2005 as a software engineer.Afterwards, she joined the University of Illinois at

Urbana-Champaign (UIUC) as a postdoctoral research associate in the periodof Sept. 2005 to Aug. 2006 under both the government and universitysponsorship. She is currently an assistant professor with the Department ofElectrical Engineering, Institute of Communications Engineering, NationalChiao Tung University of Taiwan. Her research interests include wirelesscommunications, mobile computing, WLANs/WPANs, wireless sensor/meshnetworking, and green computing. Dr. Lin is a member of ACM and IEEE.

Ching-Yi Tsai ([email protected]) re-ceived her M.S. degree in Communications Engi-neering from the National Chiao Tung University,Hsinchu, Taiwan, in October 2010. She is currentlyworking as a software engineer at Wistron NeWebCorporation. Her research interests include wirelessnetworking and performance optimization.

Kun-Ru Wu ([email protected]) receivedhis B.S. degree in Electrical Engineering from theNational Chung Hsing University, Taichung, Taiwan,in June 2007. He is currently a Ph.D. student withthe Institute of Communications Engineering at Na-tional Chiao Tung University, Hsinchu, Taiwan. Hisresearch interests include wireless mesh networksand linux-based system prototyping. He is a studentmember of IEEE.