Abstract
IEEE 802.11 network deployments are ubiquitous and provide connectivity to millions of users. Interference that originates from other technologies, like simple Radio Frequency (RF) equipment, severely degrades the performance of those networks. To effectively manage wireless networks, the interference needs to be modeled and predicted. The current state of the art models are insufficient to model performance correctly. In this letter, we describe the interference as an interrupted Poisson process and use a decomposition approach to predict the latency of an interfered client from the latency of a non-interfered client. This novel approach allows for fast and easy prediction of latency in an interfered network. The results show that our method gets as close as 6% of the real value.
You have full access to this open access chapter, Download conference paper PDF
Similar content being viewed by others
Keywords
1 Introduction
Since the beginning of IEEE 802.11 networks, interference from overlapping networks degrades the performance, especially in large and dense deployments [3, 10]. The main reason for this degradation is the Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) Listen-Before-Talk (LBT) protocol of IEEE 802.11. It uses Carrier Sense (CS) and Energy Detection (ED) to detect whether the channel is busy and defers from sending when it is. A failed attempt results in an increased random back-off and in the end to a dropped packet. With recent technologies, the spectrum of IEEE 802.11 becomes severely crowded, which has an impact on the performance, especially when they do not adhere to an LBT protocol. Many daily appliances with RF capabilities like baby phones, television screens, or microphones, can have an impact [5, 11, 14]. The more such appliances are employed, for example at a concert, the more impact they have. However, also Long-Term Evolution (LTE) in the unlicensed band can lead to up to 98% throughput loss if no LBT protocol is employed [1, 6]. This severe performance degradation makes network management increasingly difficult and a solution to predict latency depending on the interference is needed.
Several studies analyzed the latency of IEEE 802.11 networks. Initially, the focus was throughput, but soon it became broader and included latency, jitter, packet loss, and error-prone channels as well [2, 7, 8, 13]. The main component of all of these works is the Markov chain to model the IEEE 802.11 back-off mechanism. While this allows for an accurate representation thereof, it also makes computation slow as it is needed to solve it numerically. These works all lack to assess the impact of non-IEEE 802.11 interference though, which can have a significant impact [4]. The base performance, however, or the one obtained from a real setup without interference, can be used to calculate the performance when interference is present.
In this article, we propose a fast and accurate analytical model that can predict the latency with an interfering source present from latency when no interfering source is present. We use an interrupted Poisson process as a model for the interfering source. Taking into account three characteristics of the IEEE Medium Access Control (MAC), we can accurately describe the latency in such a system. Our measurement results show that the latency we observe correlates with the latency of our prediction. This is especially useful when deploying wireless networks in challenging environments like large concerts or conferences.
2 Characterizing an Interfering Source
To correctly model the interfering source, we take an on/off process with exponentially distributed on and off periods as a basis. The interruptions of the medium access by the interfering source, which generates energy above the ED threshold, occurs according to a Poisson process with rate \(\nu \). Different sources can be modeled in this form, for example, a microwave oven or baby phone [12]. We assume that during an ongoing interruption no new interruptions occur. The variable u denotes the random variable representing the length of the interruptions. We assume that u is exponentially distributed with mean E[u]. With the Poisson assumption in mind, the average time that the interfering source is inactive is given by \(\frac{1}{\nu }\). In contrast, the fraction of the time the interfering source is active is given by:
3 Modeling Latency
3.1 Description of the Latency Components
An interfering source has three major effects on the operation of the IEEE 802.11 MAC protocol.
The first is based on the ED function of an IEEE 802.11 station which senses for energy on the channel before it tries to send a packet. When the interfering source becomes active, the station detects energy on the channel and defers from transmitting a packet for E[u] seconds on average.
Next, when the interfering source becomes active at the time a packet is being transmitted, the packet collides with the signal of the interfering source and is lost. Not only a re-transmission of the packet is the result, but it also adds additional latency in the form of a doubled contention window for the next back-off phase.
Third, stations with a packet at the head of the queue during the time the interfering source is active will sense the medium busy. As soon as the interfering source stops transmitting, the stations will enter in a back-off phase. If a station is in the back-off phase during the activity of the interfering source, it has to stop the process and needs to wait until the medium is considered free again.
3.2 Computing Average Latency in a System with Interference
We will first take the unavailability of the medium and the increased CW into account. Consider an IEEE 802.11 network with N stations, which are equally loaded. We model a station as a finite capacity single server queue with Poisson input with rate \(\lambda \) where the service time equals the sum of the IEEE 802.11 access latency and the transmission time itself. We will model the activity of the interfering source as service interrupts. Computing the latency in this M/M/1/K queue with service interruptions will result in the average packet latency of a station.
For a random variable d, we denote D(t) its cumulative distribution, respectively \(D^{*}(s)\) its Laplace-Stieltjes Transform (LST). E[d] denotes its mean value. The service time of a packet consists of two major parts, access latency and the transmission time of the packet itself. The service time is denoted by \(b_{ni}\), respectively \(b_{wi}\), in the system without interference, respectively the system with interference. Let b denote the transmission time of a packet. We make the additional assumption that both \(b_{ni}\) and \(b_{wi}\) are exponentially distributed. This turns the model of a station in a system with and without interference into an M/M/1/K queue. Let \(d_{ni}\) and \(d_{wi}\) be the packet latency respectively in the system without interference and in the system with interference.
First, we derive a formula for the LST of the service time in a system with interference \(B^{*}_{wi}(s)\), as a function of the LST of the packet latency in a system without interference \(B^{*}_{ni}(s)\). We follow reasoning similar to the one by Fiems et al., where the service interruptions are the active periods of the interfering source [9]. We consider three cases, depending on the start of the first time the interfering source becomes active after a packet starts its service in relation to the different components of this service time.
First case: the interfering source does not become active during the service time. In this case, the service time in the system with interference is the same as the service time in a system without interference.
Second case: the interfering source becomes active during the access latency of a packet. In this case, the time the interfering source is active needs to be added to the service time in a system without interference.
Third case: the interfering source becomes active during the transmission time of a packet. In this case, not only the time the interfering source is active needs to be added to the service time, but also an additional time since the MAC protocol reacts on this interrupt of the transmission by doubling the contention window. Let a be the random variable representing the additional access latency of a packet whose transmission was interrupted by the interfering source. Note that this case includes the added latency of the paused back-off mechanism when a packet is at the head of the queue.
Assume that the service time in the system without interference is given by x.
-
1.
No interrupt by the interfering source occurs during the service time, which happens with probability \(e^{-\nu x}\). In this case
$$\begin{aligned} B^{*}_{wi}(s|x) = e^{-(\nu +s)x} \end{aligned}$$(2)where \(B^{*}_{wi}(s|x)\) denotes the LST of \(b_{wi}\), given that the service time in the system without interference is x.
-
2.
An interrupt by the interfering source occurs during the access latency (i.e., during \([0,x-b[\)). This happens with probability \(1 - e^{-\nu (x-b)}\). In this case
$$\begin{aligned} B^{*}_{wi}(s|x) = \frac{\nu }{\nu + s} \cdot V^{*}(s) \cdot B^{*}_{wi}(s) \cdot (1 - e^{-(\nu + s)(x - b)}) \end{aligned}$$(3) -
3.
An interrupt by the interfering source occurs during the transmission time (i.e., during \([x - b,x[\)). This happens with probability \(e^{-\nu (x - b)} - e^{-\nu b}\). In this case
$$\begin{aligned} B^{*}_{wi}(s|x) = \frac{\nu }{\nu + s} \cdot V^{*}(s) \cdot A^{*}(s) \cdot B^{*}_{wi}(s) \cdot (e^{-(\nu +s)(x-b)} - e^{-(\nu +s)x}) \end{aligned}$$(4)
Combining the three cases, we obtain
Integrating over all possible service times x leads to
Since
we obtain that
Given the assumption that \(b_{ni}\) is exponentially distributed, we obtain
Let us compute E[a]. The probability that the interfering source becomes active while a packet is being transmitted is given by
with b being the time needed to transmit a packet.
Hence, the probability that the interfering source becomes active during each of the consecutive i re-transmissions of a packet and not during the \((i+1)\)th is given by
Assuming \(CW_{min} = 63\), \(CW_{max} = 1023\) and for the 5th and 6th re-transmission \(CW = 1023\), the value of E[a] is given by
To take the increased latency of the paused back-off mechanism into account when the packet is at the head of the queue we consider the behavior of stations when the interfering source becomes active similar to their behavior when other stations transmit packets. Therefore, we express the activity of the interference source in terms of packet transmissions. The fraction of the time the interference source is active is given by \(p_{a}\). Let \(n_{if}\) be the number of packets per second that could be sent during an active period of the interference source. Then
with c being the transmission time of an acknowledgment. For the latency computation with interference, the packet arrival rate is given by
and will be used to derive the performance measures for the system with interference.
To compute the average packet latency in a system with interference \(E[d_{wi}]\), given the average packet latency in the system without interference \(E[d_{ni}]\), using the relationship between \(E[b_{wi}]\) and \(E[b_{ni}]\) as established above, assume that the number of stations N and the packet arrival rate \(\lambda \) are given. Let K be the length of the MAC queue in a station. The random variables \(l_{ni}\) and \(l_{wi}\) denote the number of packets in a station without and with interference. Let
respectively,
be the load of a station without, respectively, with interference. Assume that we know the average latency \(E[d_{ni}]\) of a packet in a system without interference and that a station in the system without interference is modeled as an M/M/1/K queue. Given Little’s law, the average number of packets in the station is given by
where
is the effective packet arrival rate in the system without interference.
Then, the average number of packets, \(E[l_{ni}]\), is also given by the formula
From Eqs. 17 and 19 we derive the value of \(\rho _{ni}\). This leads to
Now it is possible to compute \(E[b_{wi}]\) using Eq. 9. Once \(E[b_{wi}]\) is known, it is possible to compute
Using Eq. 19 for the system with interference, we derive \(E[l_{wi}]\) and applying Little’s formula leads to the average latency in a system with interference
with
4 Results
4.1 Experimental Setup
For our experimental study, the w-ilab.tFootnote 1 lab facility, a large-scale emulation platform with wireless nodes allowing extensive experiments, has been used. Configurations of 15, 20, and 25 stations on the 5 GHz band with IEEE 802.11a were used. All stations are connected to a single access point (AP), and a test includes transmitting packets for 60 s with a repetition of 5 times for each configuration. To generate interference according to the previously defined model in Sect. 2, we installed a Software Defined Radio (SDR).
Two modes of interference occurrence were used in the experiment: low occurrence with \(\frac{1}{\nu }\) equal to \(9 \cdot 10^{-4}\) s and high occurrence with \(\frac{1}{\nu }\) equal to \(1.8 \cdot 10^{-4}\) s. The duration of interference E[u] was set to three different modes: low (\(9\cdot 10^{-5}\) s), medium (\(4.5 \cdot 10^{-4}\) s), and high (\(9 \cdot 10^{-4}\) s). The packets have a size of 1500 bytes and are sent at a fixed bit rate of 54 Mbps. The sending rate of packets per second had a minimum of 25 and a maximum of 200 packets per second with an interval of 25 packets per second. A continuous packet source was used to generate packets on the MAC layer according to a Poisson process. The queue length is given by \(K=64\).
4.2 Validation
There are two significant elements to assess the accuracy of the model, the saturation point and the maximum average latency when the system is saturated. Saturation is the state when the maximum capacity of the wireless network is reached and depends on the number of stations, the number of packets per station, and the characteristics of the interfering source. Note that, as we only have measurement results with steps of 25 packets per second, interpolation was used when applying Eq. 17.
Low Occurrence. Figures 1, 2, and 3 present the graphs for 15, 20, and 25 stations and \(1/\nu = 9 \cdot 10^{-4}\) s. In 8 out of 9 cases the saturation point is accurately matched. Only in the case of 15 stations and with the shortest duration was the saturation point predicted too early. The latency prediction at saturation is within 6–7% of the average latency, while a higher number of stations leads to higher accuracy.
High Occurrence. Figures 4, 5, and 6 show similar results for \(1/\nu = 4.5 \cdot 10^{-4}\) s. The saturation point is accurately matched in 8 out of 9 cases, again except for 15 stations and the shortest duration, and the accuracy of the latency at saturation is within 13–50%. The high duration is an outlier with any number of station. The airtime usage of the interfering source amounts to 83% of the available airtime. The difficulty of prediction stems from the low amount of successful packets, as can be seen by the confidence interval.
The results show that the accuracy is high and that our proposed method can be used in further network management.
5 Conclusion
In this article, we developed an analytical model that allows predicting the average latency a station of an IEEE 802.11 network experiences in the presence of an interfering source assuming that the latency without interference is known. Three characteristics drive this model: the time the medium is busy during the activity of the interfering source, the interruption and increased CW of a station, and the additional latency of a station that has a packet ready to transmit when the source becomes active. We demonstrated the accuracy of our model using real-life measurements. The accuracy of the model increases with the number of stations, which is especially crucial for dense deployments.
References
Abinader, F.M., et al.: Enabling the coexistence of LTE and Wi-Fi in unlicensed bands. IEEE Commun. Mag. 52(11), 54–61 (2014)
Bianchi, G.: IEEE 802.11-saturation throughput analysis. IEEE Commun. Lett. 2(12), 318–320 (1998)
Biswas, S., Bicket, J., Wong, E., Musaloiu-E, R., Bhartia, A., Aguayo, D.: Large-scale measurements of wireless network behavior. In: Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication - SIGCOMM 2015, pp. 153–165 (2015)
Bosch, P., Latré, S., Blondia, C.: Latency modelling in IEEE 802.11 systems with non-IEEE 802.11 interfering source. In: 2018 14th International Conference on Network and Service Management (CNSM) (Cnsm), pp. 275–279 (2018)
Bosch, P., Wyffels, J., Braem, B., Latré, S.: How is your event Wi-Fi doing? Performance measurements of large-scale and dense IEEE 802.11n/ac networks. In: Proceedings of the IM 2017–2017 IFIP/IEEE International Symposium on Integrated Network and Service Management, pp. 701–707, No. Im (2017)
Cavalcante, A.M., et al.: Performance evaluation of LTE and Wi-Fi coexistence in unlicensed bands. In: 2013 IEEE 77th Vehicular Technology Conference (VTC Spring), pp. 1–6, No. April 2015 (2013)
Daneshgaran, F., Laddomada, M., Mesiti, F., Mondin, M.: Unsaturated throughput analysis of IEEE 802.11 in presence of non ideal transmission channel and capture effects. IEEE Trans. Wireless Commun. 7(4), 1276–1286 (2008)
Felemban, E., Ekici, E.: Single hop IEEE 802.11 DCF analysis revisited: accurate modeling of channel access delay and throughput for saturated and unsaturated traffic cases. IEEE Trans. Wireless Commun. 10(10), 3256–3266 (2011)
Fiems, D., Maertens, T., Bruneel, H.: Queueing systems with different types of server interruptions. Eur. J. Oper. Res. 188(3), 838–845 (2008)
Fuxjäger, P., Valerio, D., Ricciato, F.: The myth of non-overlapping channels: interference measurements in IEEE 802.11. In: 2007 Fourth Annual Conference on Wireless on Demand Network Systems and Services, WONS 2007, pp. 1–8 (2007)
Gollakota, S., Adib, F., Katabi, D., Seshan, S.: Clearing the RF smog: making 802.11 robust to cross-technology interference. In: Proceedings of the ACM SIGCOMM 2011 Conference on SIGCOMM - SIGCOMM 2011, p. 170 (2011)
Kanemoto, H., Miyamoto, S., Morinaga, N.: Statistical model of microwave oven interference and optimum reception. In: 1998 IEEE International Conference on Communications, ICC 1998, Conference Record, Affiliated with SUPERCOMM 1998 (Cat. No. 98CH36220), vol. 3, pp. 1660–1664 (1998)
Raptis, P., Vitsas, V., Paparrizos, K.: Packet delay metrics for IEEE 802.11 distributed coordination function. Mob. Netw. Appl. 14(6), 772–781 (2009)
Rayanchu, S., Patro, A., Banerjee, S.: Airshark: detecting non-WiFi RF devices using commodity WiFi hardware. In: Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference - IMC 2011, p. 137 (2011)
Acknowledgment
Patrick Bosch is funded by FWO, a fund for fundamental scientific research, and the Flemish Government, under grant number 1S56616N.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 IFIP International Federation for Information Processing
About this paper
Cite this paper
Bosch, P., Latré, S., Blondia, C. (2019). IEEE 802.11 Latency Modeling with Non-IEEE 802.11 Interfering Source. In: Di Felice, M., Natalizio, E., Bruno, R., Kassler, A. (eds) Wired/Wireless Internet Communications. WWIC 2019. Lecture Notes in Computer Science(), vol 11618. Springer, Cham. https://doi.org/10.1007/978-3-030-30523-9_4
Download citation
DOI: https://doi.org/10.1007/978-3-030-30523-9_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-30522-2
Online ISBN: 978-3-030-30523-9
eBook Packages: Computer ScienceComputer Science (R0)