We propose a novel workload-dependent queuing model for a wireless router link which employs active queue management (AQM) and is offered with a number of persistent Transmission Control Protocol (TCP) flows. As opposed to existing work that focus only on the average queue occupancy as the performance metric of interest, the proposed analytical method obtains the more information-bearing steady-state queue occupancy distribution of the wireless AQM link. Simulations are performed to demonstrate the accuracy of the proposed model in both wireline and wireless scenarios. With the intention of maximizing TCP throughput, this analytical method is used to obtain guidelines for setting the target wireless packet error rate (PER) for a PER-based traffic-agnostic link adaptation scheme.
The online version of this article (doi:10.1186/1687-1499-2014-67) contains supplementary material, which is available to authorized users.
Competing interests
The authors declare that they have no competing interests.
1 Introduction
Transmission Control Protocol (TCP), along with User Datagram Protocol (UDP), has been the most dominant transport protocol used in the Internet today. The traditional technique of using buffer management based on tail drop at wireline router links carrying TCP traffic leads to the so-called ‘full queues’ and ‘lock-out’ problems described in [1]. The full queues problem refers to the buffer being full most of the time, introducing large queuing delays which in turn impact adversely the TCP level throughput. The lock-out problem refers to a situation in which a single or a few flows monopolize the queue space while starving others as a result of synchronization or other timing effects. To avoid the full queues problem, active queue management (AQM) mechanisms drop packets before the queue becomes full [1]. Typically, the AQM drop decision is probabilistic on certain queue parameters to mitigate the lock-out problem [1]. For various AQM mechanisms proposed in the literature, we refer the reader to [1‐5]. More recently, Adams [6] presents a comprehensive survey of AQM along with an elaborate classification and comparison of its proposed variants and its use in the wireless context. Lakkakorpi et al. [7] conclude that the standards-based Worldwide Interoperability for Microwave Access (WiMAX) technology can indeed benefit from AQM in reducing its downlink latency, and we use the WiMAX physical layer in the numerical experiments of this paper.
An analytical expression, the so-called PFTK formula, is provided for the steady-state throughput of a persistent or long-lived TCP flow (i.e., a flow with a large amount of data to send such as FTP transfers) as a function of its packet loss rate and the round-trip time (RTT) in [8]. The PFTK formula takes into account both the fast retransmit mechanism of TCP Reno and the effect of TCP timeout on throughput. For a related study on a simpler TCP throughput expression which ignores certain features of TCP, the so-called square-root formula, see [9]. Lassila et al. [10] further integrate the square-root model with a generalized processor sharing model to analyze non-persistent TCP flows as well. Using fixed-point iterations, the PFTK formula can be used to approximate the absolute throughput of a TCP flow sharing an AQM router link with other TCP flows and also in a network of AQM routers with persistent and dynamic traffic scenarios [11]. However, the focus in [11] is the mean queue occupancy in router links, not the queue occupancy distribution. For related work on how to approximate the flow-level TCP throughput when the flows share a network of AQM routers using an M/M/1/K model, we also refer the reader to [12].
Advertisement
In wireline router links, errors due to transmission are negligible. However, in wireless router links, packet errors due to transmission are inevitable. Therefore, in addition to congestion losses stemming from AQM drops, we also have non-congestion (or wireless) losses arising due to channel errors. TCP suffers substantially from non-congestion losses since it responds to all losses by invoking congestion control and avoidance algorithms which results in degraded end-to-end performance on paths with lossy links [13]. A comparison of different approaches for improving TCP performance over wireless links is provided in [13]. Barakat and Altman [14] use the square-root formula to analytically study the interaction between TCP and the amount of forward error correction (FEC) to be used in wireless links. This study is then extended to the interaction of TCP and automatic repeat request with selective repeat (ARQ-SR), and in-order delivery of packets to the IP layer, using the PFTK formula. Optimal design and analysis of hybrid FEC/ARQ schemes in TCP context is also studied in [15] and [16] with Rayleigh fading. In these studies, the AQM mechanism is not taken into consideration. A recent work in [17] studies an AQM-controlled wireless link with FEC and ARQ using fixed-point approximations and the PFTK formula in an M/M/1/K setting. One of the goals of this paper is to introduce a novel queuing model for AQM-controlled wireless links with the specific goal of obtaining the steady-state queue occupancy distribution.
While AQM focuses on buffer management addressing the full queues and lock-out problems, link adaptation (LA) adapts the transmission parameters of the wireless system to changing channel conditions with the intention of increasing the spectral efficiency of the wireless transmission system [18]. The key parameters to adapt are the modulation and coding levels also known as adaptive modulation and coding (AMC), transmission power, spreading factors, etc., or a hybrid of the above. One of the topics we study in the current paper is AMC-based LA without power control for which in real implementations, the values for the transmission parameters are quantized and grouped together into a finite set of modulation and coding schemes (MCSs). The basic goal of an LA algorithm is to choose the best possible MCS over varying channel conditions [18], whereas the main principle is to use in this decision a certain channel state information (CSI) representative of the quality of the wireless channel. CSI may be in the form of SNR or signal-to-noise-plus-interference ratio (SINR) that is available from the physical layer [18]. Additionally, the wireless channel is assumed to match a particular stochastic model, whichever suits, to indirectly obtain packet error rate (PER) which is crucial for MCS selection [19]. Mapping estimated SNR values to MCSs, however, presents a challenge in multipath fading channels for which the performance of a given MCS of interest may exhibit significant variation across different channel models. It is shown in [20] and [21] that the average throughput can be significantly increased if the MCS selection is based on an accurate prediction of PER to be expected for the current channel conditions. However, to obtain a reliable estimate of PER, a large number of packets need to be transmitted, making the adaptation relatively slower when compared to SNR-based LA [18].
In this paper, we study a wireless link which can be viewed as the downlink of a cellular wireless network comprising a base station (BS) serving a number of mobile stations (MSs) or a wireless link between two routers. We assume that the wireless link employs AQM and is offered with a fixed number N of long-lived TCP Reno flows in one direction, all using a fixed packet size L. TCP ACK packets are transmitted in the other direction with priority given to ACK traffic so that delay and losses for ACK traffic can safely be neglected. For the downlink scenario, data flows from the network to MSs which send their ACK packets in the other direction and the uplink data traffic is not considered. Such wireless links are categorized as infrastructure type in [6], and they are identified as potential bottleneck links due to possible bandwidth mismatch between the wireless and wired domains. In accordance with this observation, we assume in this paper that all flows are either bottlenecked at this particular link or the bottleneck bandwidth of the flows are fixed and known in advance. Propagation delays, fixed part of the RTT, of individual flows are allowed to be arbitrary. An MCS is used to serve the packets waiting in the queue, and errored packets are not retransmitted, i.e, ARQ or hybrid ARQ (HARQ) mechanisms are not in action. We address the PER-based LA problem of choosing the best possible MCS to maximize the total throughput of TCP flows. PER-based LA comprises the following three components: (i) PER estimation, (ii) determination of the target PER or a range of target PERs, and (iii) the LA algorithm. In this paper, we address the second component and we study the target PER that needs to be maintained by a PER-based LA algorithm to maximize the overall throughput of the TCP flows that share the wireless link. To explain, a low target PER leads to a situation in which losses are mostly due to AQM drops, but since the service rate of the queue would be relatively limited to achieve a low PER, reduced TCP level throughput is inevitable. On the other hand, a high target PER increases the queue service rate, but it becomes quite possible that the queue would occasionally be empty due to substantial wireless losses stemming from TCP reaction to such losses. Note that TCP throughput optimization is shown to be dependent not only on PER but also on traffic-related parameters such as the number of TCP flows and their RTT values. However, estimating the number of active TCP connections and their RTT values is computationally difficult to implement. In this paper, we study only traffic-agnostic PER-based LA.
The two main contributions of this paper are presented below:
Advertisement
We introduce a novel workload-dependent M/D/1 queuing model for an AQM-controlled wireless link with Bernoulli packet losses using the PFTK formula taking into account both the fast retransmit mechanism of TCP Reno and the effect of TCP timeout on throughput to obtain the entire queue occupancy distribution. In most existing work, the focus has been on the mean queue occupancy as well as the average packet loss probability due to congestion, and moreover, fixed packet sizes are generally not taken into account. The proposed model is validated by ns-3 [22] simulations. The following are the main features of the proposed model: (i) The proposed model provides a good match with simulations even in the vicinity of empty queues as opposed to other existing models. The ‘empty queues’ scenario is particularly important when an MCS is used with high wireless loss rates, and TCP sources throttle back relatively aggressively in a way that they cannot keep the queue full all the time. (ii) Some of existing models suffer when the workload-dependent AQM packet drop probability is discontinuous with respect to the workload, whereas the performance of our proposed method is insensitive to such behavior. (iii) The proposed method can further be used in the analysis of quality of service (QoS) differentiation mechanisms relying on per-class buffer management such as weighted random early detection (WRED) [23, 24].
We present a novel cross-layer framework based on the proposed queuing model to obtain a range of target PERs that needs to be maintained by a traffic-agnostic PER-based LA scheme for TCP throughput optimization. By being traffic-agnostic, optimality is shown to be sacrificed but the proposed range of target PERs allows one to obtain robust TCP performance for a wide range of traffic parameters including the number of TCP flows, their RTTs, etc. In this description, a robust policy refers to one that does not deviate much from an optimal policy that requires a priori information about the underlying traffic parameters. For the cross-layer framework, we use the IEEE 802.16e Wireless-Metropolitan Area Network (MAN) Orthogonal Frequency Division Multiplexing Access (OFDMA) Physical (PHY) air interface as the underlying PHY layer technology, but the framework allows other technologies to be used [25].
HARQ/ARQ techniques for which the errored packets at the receiver are retransmitted by the transmitter until either they are successfully decoded or a retransmission limit is reached are not considered in this paper. From TCP perspective, they prove to be powerful techniques to combat with multipath fading in wireless channels at the expense of increased delay and jitter caused by random retransmissions. Out-of-order packet delivery is another natural consequence of HARQ/ARQ which can be detrimental to TCP throughput if left uncompensated at the receiver [26]. Out-of-order packets force TCP receivers to send duplicate ACKs to TCP transmitters as if the missing packets have been lost which in turn throttles back the transmitter’s packet injection rate to the network. To cope with out-of-order packet arrivals, wireless receivers optionally resequence the arriving packets from the air interface before their delivery to the network [27]. For the analysis of TCP performance over links deploying HARQ/ARQ, one should additionally model the complex effects of the retransmission delays as well as resequencing delays. TCP modeling for AQM-controlled links with HARQ/ARQ is left for future research.
The paper is organized as follows. In Section 2, the workload-dependent queuing model for an AQM-controlled wireless link with Bernoulli wireless packet losses is presented. In Section 3, the model is validated in both wireline and wireless scenarios using simulations. Section 4 addresses the framework we introduce using the proposed queuing model to obtain the target PER for TCP throughput optimization for a wide range of scenarios. We conclude in the final section.
2 Analytical model
2.1 Workload-dependent M/G/1 queue
The following description of workload-dependent M/G/1 queues and the accompanying notation is based on [28]. We consider a Markovian workload process in which the server drains the queue according to a workload-dependent service rate function r(x) (in units of bps) where x denotes the current workload (in units of bits) in the queue. On the other hand, the packet arrivals to the queue are governed by a Poisson process with a workload-dependent intensity function λ(x). We assume r(0) = 0, r(x) is strictly positive, left-continuous, and has a strictly positive right limit on (0,∞). Each arrival increases the workload by the job size (in units of bits) whose cumulative distribution function (CDF) is denoted by B(·) with mean job size β. Under the condition , the workload process is ergodic and possesses a stationary probability density function (PDF) denoted by v(x),x>0. The workload process may also have a probability mass (atom) at zero denoted by V(0). It is shown in [28] that the steady-state workload density v(·) satisfies the following integro-differential equation for x>0:
(1)
where the function defined as and in case , 0<x<∞, then (1) has a non-zero atom V(0) at x = 0. A closed form solution to (1) for the workload-dependent M/M/1 queue is given in [28]. For persistent TCP flows, packet sizes are generally fixed rather than being variable for a given flow. Therefore, the specific case of the workload-dependent M/D/1 queue and a numerical solution for finding the stationary density v(x) is crucial for TCP modeling which is described next. For this purpose, we fix the deterministic packet length to L bits. The buffer occupancy is then discretized with a discretization interval Δ such that l = L/Δ>>1 is an integer. We then define vi = v(iΔ) for i>0 and discretize the integro-differential equation (1) to obtain
(2)
Note that the identity (2) enables us to calculate vi as a weighted sum of vj’s for j<i which lends itself to an iterative procedure. We propose to set V(0) = 1 and iteratively calculate vi for 1≤i≤K as in (2) for some large choice of K. Note that K should be chosen such that should be small enough to yield an acceptable approximation error. Finally, we first define and then normalize as follows:
(3)
2.2 Equation-based TCP model
In line with the majority of the existing work on TCP modeling, we propose to use the so-called PFTK TCP model of [8] to relate the throughput of a TCP flow to the packet loss rate seen by the flow. For details, we refer the reader to [8]. Let p, λ, and T0 denote the packet loss rate, packet send rate, and the retransmission timeout parameter of a TCP source, respectively. In our model, we use the following relationship used in the implementation of TCP in [22]:
(4)
where RTT and σRTT are the smoothed estimates for the round-trip time (RTT) and its standard deviation, respectively, and T0,min is a minimum limit imposed on the timeout parameter. Let Wu denote the random variable associated with the unconstrained window size of the TCP source. Also, let Wmax = W/L and b denote the maximum window size in units of packets and the number of packets to wait before sending a cumulative ACK packet by the TCP receiver, respectively, where W is the receiver’s buffer size. Padhye et al. [8] propose the following equation for the TCP send rate λ if the TCP flow is exposed to a packet loss rate of p:
(5)
where
(6)
(7)
and
(8)
Throughout our numerical studies, we fix T0,min = 0.2 s as in [29], b = 2, L = 1,500 bytes (unless otherwise stated), and W = 64 Kbytes. With these, the equation (5) provides a closed-form expression for the TCP send rate λ in terms of p, RTT, and σRTT.
2.3 Active queue management
Active queue management (AQM) refers to a set of buffer management disciplines that are used in routers by which packets are dropped long before the queue reaches its full capacity [5]. AQM disciplines maintain a shorter average queue length than their drop tail counterparts which drop packets only when the queue capacity is full. Moreover, typical AQM schemes probabilistically drop packets to mitigate synchronization of TCP sources sharing the link. One of the pioneering AQM schemes is random early detection (RED) [2] for which an arriving packet is probabilistically dropped as a function of the average queue occupancy that is obtained by applying an autoregressive filter to the queue occupancy time series data. The packet drop rate of RED scheme is linear with respect to the average queue occupancy in a certain regime of the queue defined by certain thresholds. Performance of RED is known to exhibit considerable variation with respect to the particular choices for these thresholds [30]. As a remedy, the so-called gentle variant of RED, called GRED, is proposed to make RED less sensitive to the choice of these parameters [31]. Moreover, stochastic modeling of the autoregressive filtering operation used in such RED-like schemes is generally known to be difficult and costly [32, 33]. We therefore propose to use early random detection (ERD) [3] for which an arriving packet is dropped with probability p(x) when the instantaneous queue length takes the value x. The gentle variant of the ERD discipline we study in this paper refers to the particular choice of p(x) as follows:
(9)
In this paper, thmin and thmax are set to 30L and 90L, respectively, in units of bits, and pmax is set to 0.1.
2.4 Proposed model
We envision a wireless router link that is offered with persistent TCP flows with the following assumptions:
N persistent TCP flows share the wireless link using first-in-first-out (FIFO) queuing.
All flows use the same packet size L.
Incoming packets from the TCP flows are dropped according to the specific ERD AQM scheme given in (9) with the drop decision depending solely on the instantaneous queue occupancy x.
The link serves the waiting packets in the queue with a fixed transmission rate rm dictated by the underlying MCS. We assume M different physical layer MCSs denoted by MCSm, m∈{0,...,M-1} that are supported by the link’s air interface. For this study, we will be given a fixed MCSm and SNR level denoted by SNRs, s∈{0,...,S-1}, and we will assume that transmitted packets are errored at the receiver with a probability denoted by PERm,s. Lost packets are not retransmitted, and loss events are assumed to be independent and identically distributed (iid) following the Bernoulli wireless loss model.
Flow i, i∈{0,...,N-1} is exposed to
– an average packet loss probability accounting for losses generated by both the ERD scheme and wireless transmission.
– an instantaneous workload-dependent queuing delay D(x) = x/rm at the router when the instantaneous queue occupancy takes the value x. Without loss of generality, DT = L/rm and DF account for the transmission and one-way framing delays, respectively, the latter including other processing delays of any wireless communication system. DF is multiplied by a factor of 2 to account for both forward and reverse (TCP ACK messages) path delays.
Queuing and transmission delays as well as the error rates of the TCP ACK packets are assumed to be negligibly small and will be ignored by the analytical model assuming that TCP ACK prioritization is deployed [34] and enhanced wireless protection is established in the reverse path of the flows [35].
In addition to the delay encountered at the router, each flow has an additional fixed round-trip delay denoted by RTT0,i, i∈{0,..,N-1} taking into account the propagation delays of all links on the path of the flow.
We assume that either all flows are bottlenecked at the particular wireless link of interest or their bottleneck bandwidths at other links are known in advance and they remain unaffected by the dynamics of the wireless link. Packet error rates on other links are assumed to be negligible. We therefore do not attempt to model networks of AQM router links but rather focus on a single AQM link.
The packet send process for each flow is Poisson with intensity λi which will be shown to depend on the instantaneous queue occupancy x in our proposed model. We note that the Poisson assumption has successfully been used for TCP modeling in previous studies [17].
All TCP flows use the same minimum timeout parameter T0,min.
The central idea of this paper is to use the PFTK TCP model given in (5) to write λi as a function of the single independent parameter x so that the stationary queue density can be obtained by solving the workload-dependent M/D/1 queue described in Section 2.1. For this purpose, let the workload-dependent round-trip delay of flow i be denoted by RTTi(x) which can be expressed as the sum of the following components:
(10)
Furthermore, let T0,i(x) denote the workload-dependent timeout parameter for flow i which can be expressed via (4) as
(11)
where σRTT,i stands for the standard deviation of the router queuing delay for flow i. The overall rate of packets that are admitted into the queue denoted by λ(x) can then be written as
(12)
where
(13)
is the rate of packets belonging to individual flow i that is admitted into the queue. In our proposed model, λi(x) is the send rate of flow i when the queue occupancy takes the value x, and we propose to use the PFTK TCP model (5) to write λi(x) with RTT and T0 being replaced with their per-flow based workload-dependent counterparts RTTi(x) and T0,i(x), respectively, and p being replaced with its per-flow counterpart which is the average packet loss probability for flow i. We put λi,max as an upper bound on λi(x) representing the maximum send rate imposed on flow i by the links it traverses other than the one under analysis. λi,max is assumed to be known and set to ∞ throughout this paper unless otherwise stated. We note that the delay terms in (5) are taken as a function of the instantaneous queue occupancy x, whereas the loss probability term is obtained by averaging out over all possible values of x. We also studied alternative formulations for which the loss probability term is allowed to depend on x which produced much less favorable results and are therefore not given in this study. We plug (12) into (1) and employ B(x) = 1 for x≥L and zero otherwise. Moreover, for a given MCSm, we set r(x) = rm which then leads us to the framework of the workload-dependent M/D/1 queuing with fixed service speed. Since p(x) = 1 and thus λ(x) = 0 for x≥2thmax bits, the condition on for a stationary solution v(x) with an atom at zero can be shown to be satisfied for this particular model. Since the stationary density v(x) = 0 for x>xmax = (2thmax+L), we set K = xmax/Δ in our numerical examples where Δ = 1 bit unless otherwise stated.
Let and denote the average packet arrival and acceptance rates, respectively, into the queue from flow i. We can then write by queue-averaging arguments the following two identities:
(14)
(15)
Assuming AQM and wireless packet losses to be independent from each other, the average packet loss probability for flow i stemming from both ERD buffer management and wireless losses, denoted by , can be written as follows:
(16)
where , average packet loss probability for flow i stemming only from ERD, is obtained via queue averaging:
(17)
Furthermore, let denote the average queuing delay in the router seen by flow i. Then, we can write
(18)
Consequently,
(19)
If we know the workload-dependent intensity of packet arrivals λ(x), then we can find the stationary density v(x) and the atom at zero V(0) with the algorithm outlined before. However, λ(x) depends on RTTi(x) and T0,i(x), the latter depending on σRTT,i for all i. Moreover, λ(x) depends on . Recognizing that σRTT,i and can be obtained provided v(x) and V(0) are available, we propose a fixed-point algorithm for obtaining the stationary density of the queue occupancy. For this purpose, we define and to denote the estimates for the corresponding quantities at iteration k. At iteration k + 1, λ(x) is obtained using and . Via the solution of the workload-dependent M/D/1 queue with intensity function λ(x), we obtain v(x) and V(0). The new values of σRTT,i and are obtained at this iteration using the identities (19) and (16), respectively, but exponentially smoothed with smoothing parameters α1 and α2, respectively, to obtain and . Iterations continue until the following two conditions are simultaneously satisfied:
(20)
for some normalized tolerance parameters ε1 and ε2. For numerical experimentation with the fixed-point algorithm, we fix ε1 = ε2 = 0.01, α1 = 0.7, and α2 = 0.9. We finalize this section by expressing the aggregate TCP throughput, the key parameter to be studied in our numerical examples, as .
3 Model validation
The so-called proposed analysis method of this paper is validated using the ns-3 network simulator [22] for both wireline and wireless scenarios. We use the dumb-bell topology involving N TCP Reno flows in Figure 1 in our simulations. The ingress link for flow i,0≤i<N, has capacity rR and one-way propagation delay , whereas the egress link for the same flow has capacity rL and one-way propagation delay DL. The central link in the middle is the wireless bottleneck link with one-way propagation delay DF using an MCSm yielding a capacity rm and a wireless loss rate PERm,s at SNR level SNRs. TCP flow statistics are obtained using the FlowMonitor which is a monitoring framework developed for ns-3 [36]. The RateErrorModel class of ns-3 is used whenever a non-zero PERm,s is to be simulated. In ns-3, it is more appropriate to probe queue occupancy in units of packets as opposed to the unfinished work density v(x) obtained through the workload-dependent M/G/1 queuing model. Therefore, for the sake of comparing our results to those obtained by ns-3, we approximate the steady-state queue occupancy probability mass function (PMF) in units of packets denoted by uk as follows:
(21)
×
where δ(·) denotes the Dirac-delta function. Simulations are terminated after 5 min, but the first 30 s corresponding to transients are ignored. Each simulation is repeated ten times unless otherwise stated, and the average results are reported together with the associated confidence intervals computed for 95% confidence level.
We compare the proposed analysis method with the one presented in [11] which is referred to as the fixed-point method for the wireline scenario for which we set PERm,s = 0. The method fixed-point pursues a similar approach to the proposed in relating the TCP throughput to the queue occupancy by the PFTK formula, but it uses a fluid model to obtain only the average queue occupancy, not its distribution. Moreover, fixed-point does not take wireless losses into account. We set (rL,rm,rR) = (1,000, 10, 1,000) Mbps, ensuring that the central link is the bottleneck link. In Figure 2, the PMF uk is obtained using proposed, fixed-point, and ns-3 simulations for scenario A which refers to ms and depicted for three different values of N. In Figure 3, the PMF uk is depicted for scenario B which refers to ms again for three values of N. It is clear that the method proposed matches the PMF obtained by ns-3 simulations in both shape and magnitude especially for smaller number of flows. The deviation from the simulation results for larger number of flows is probably due to the fact that the instantaneous queuing delay is used in our workload-dependent queuing model although in actual TCP implementations, this information would be slightly delayed. Consequently, proposed improves upon fixed-point as far as the queue occupancy PMF is concerned.
×
×
For scenario B, we now set N = 10 and rL = 0.9 Mbps (corresponding to λi,max = rL/L of proposed), for which the numerical results are given in Figure 4. We also increase the number of ns-3 simulations to 120 to obtain more reasonable confidence intervals. In this case, fixed-point ends up with an always-empty queue, whereas the proposed captures the actual PMF acceptably well. In particular, the probability mass at zero V(0) is found to be 0.1000188, 1, and 0.0999987, using proposed, fixed-point, and simulations, respectively. In a network of queues, it is likely that most of the links will be operating at an empty queue regime. We believe that the PMF-capturing capability of proposed in the empty-queue regime will be crucial in the analysis of such systems.
×
For the final validation example in the wireless context, we study scenario C which refers to ms employing non-zero PERm,s. Queue occupancy PMF results using proposed and simulations are provided in Figures 5, 6, and 7 for PERm,s being equal to 0.1, 0.01, and 0.001, respectively, each for three values of N, i.e., N = 1,4,16. For N = 4 and PERm,s = 0.01 in Figure 6, the number of simulations is again set to 120 in order to increase the reliability of simulations. The simulation PMF appears to be captured well by the proposed analysis method for a wide range of packet error rates. For N = 1 and PERm,s = 0.001, ns-3 simulations show a peak which is caused by alternating on and off times during which the queue is on and off, respectively, and the Poisson assumption does not hold as well as the other cases. However, the general shape of the PMF is still captured for this challenging scenario.
×
×
×
4 Cross-layer framework
The physical layer Wireless-MAN OFDMA PHY specifies a cellular system comprising a base station (BS) and attached mobile stations (MSs) [25]. In this section, we perform cross-layer analysis of the IEEE 802.16 Wireless-MAN OFDMA PHY air interface which can also alternatively be used for a point-to-point (PTP) wireless link [37, 38]. We study this wireless link carrying long-lived TCP traffic flows for different values of N, RTT0,i, and SNRs and for two different wireless channel models. This analysis suits well to the OFDM-based air interfaces which became viable for PTP wireless links [39, 40] while also being applicable to the downlink of a cellular system with FIFO queuing.
We run physical layer simulations with Coded Modulation Library (CML) to obtain the PERm,s values for given MCSm and SNRs[41]. For this purpose, we choose the MCSs that use convolutional turbo codes (CTC). There exist 32 MCSs for CTC out of which M = 8 are enumerated in Table 1 for use in the current paper which differ according to their modulation order Vm (i.e., the number of points in the constellation diagram), code rate Rm, and forward error correction (FEC) block length km. Assuming FEC block error events of a packet to be iid Bernoulli distributed, PERm,s can be derived from the FEC block error rate FERm,s as follows:
(22)
Table 1
Modulation and coding schemes of IEEE 802.16 to be used in this study
m
Vm
Rm
km(bytes)
0
4
1/2
60
1
4
3/4
54
2
16
1/2
60
3
16
3/4
54
4
64
1/2
54
5
64
2/3
48
6
64
3/4
54
7
64
5/6
60
On the other hand, the FERm,s values in (22) can be obtained using CML. For the sake of completeness, we present all FERm,s vs SNRs curves in Figures 8 and 9 for the additive white Gaussian noise (AWGN) and International Telecommunication Union (ITU) Vehicular-A channels, respectively, the latter corresponding to an MS with a velocity of 90 km/h, which is referred to as ITU-A channel for the rest of the paper [42]. SNR ranges of [0 dB, 22 dB] and [0 dB, 40 dB] are sampled with a resolution of 0.5 and 2 dB to obtain the corresponding SNRs values for AWGN and ITU-A channels, respectively. At least 107 FEC blocks are decoded to reach the FEC block error rates shown. Once the PERm,s values are obtained, they are fed into the workload-dependent M/D/1 queuing model to estimate the aggregate TCP throughput for given MCSm and SNRs.
×
×
For the sake of fairness in throughput comparisons between different MCSs, L in (22) is set to the least common multiple of the km values for m∈{0,..,M-1}, which is equal to 2,160 bytes to avoid padding for any MCSm. Discretization interval Δ of the queue is set to 9.6 bits for this section which amounts to the packet size L divided by 1,800. Time division duplex (TDD) mode as specified by WiMAX [43] dictates 35 downlink (DL) OFDM symbols, each having 768 data subcarriers for a channel bandwidth of 10 MHz [25] within a TDD frame duration of 5 ms, resulting in an average PHY rate of r = 5.376×106 subcarriers/s. Based on these parameters, the raw bit rate rm of the IEEE 802.16 Wireless-MAN OFDMA PHY air interface can be calculated in bps as follows:
(23)
In order to account for transmission, framing, and processing delays of the system, DT + 2DF is set to 5 ms. For the remaining set of parameters, we study scenarios for both AWGN and ITU-A channels spanning a wide range of N, RTT0,i, and SNRs values where s∈{smin,..,S-1} and smin is such that for each channel type. In particular, we study two groups of scenarios having fixed and uniformly spaced RTT0,i denoted by SFN,F and SUN,F, respectively, where N∈{1,4,16} and F∈{1,5,10,20,40,80,120,160} ms. In scenario SFN,F, there are N long-lived TCP flows and all flows have the same RTT0,i of F ms. On the other hand, in scenario SUN,F, there are again N flows but each with a different RTT0,i. For N = 4, flow i, 0≤i≤3, has its RTT0,i set to 2(i + 1)F/5, leading to an average fixed RTT of F ms. For example, in SU4,10, flows have individual fixed RTT values of 4, 8, 12, and 16 ms, with an average of 10 ms. For N = 16, each RTT0,i value for the N = 4 case is further mapped to four different fixed RTTs in a similar fashion to obtain the same average fixed RTT of F ms. For example, in SU16,10, flows have individual fixed RTT values of 1.6, 3.2, 4.8, 6.4, 3.2, 6.4, 9.6, 12.8, 4.8, 9.6, 14.4, 19.2, 6.4, 12.8, 19.2, and 25.6 ms, again with an average of 10 ms. Note that scenarios represented by SF1,F and SU1,F are identical, thus leading to an overall of 40 unique scenarios.
In the first example, we study the particular scenarios SFN,160 for different values of N by solving the proposed queuing model and calculating the aggregate TCP throughput for each MCSm, N, and SNRs for the AWGN channel. We present the optimal MCS index, denoted by m∗, leading to the highest aggregate TCP throughput in Figure 10 as a function of the channel SNR for all values of N. We observe that as N increases, the benefit of increasing the spectral efficiency by choosing a higher order MCS outweighs the penalty of increasing wireless loss rate at certain SNR values. It is therefore clear that the optimal decision on MCS relies on a priori knowledge on the number of TCP flows sharing the link. Obtaining the optimum MCS in an online setting requires the estimation of N and RTT0,i which is generally known to be difficult. As a remedy, we propose the so-called traffic-agnostic link adaptation (TAGLA) scheme which does not require the estimation of traffic parameters but takes into consideration only the spectral efficiency and FER values of the MCSs that its physical layer has to offer. In particular, TAGLA chooses the MCS with the highest spectral efficiency whose resulting PERm,s≤thPER for a threshold parameter thPER. In case of plurality of such MCSs with the same spectral efficiency, TAGLA chooses the one with the lowest PER. At the limiting cases thPER = 0 and thPER = 1, TAGLA resorts to MCS0 and MCS7, respectively, regardless of the SNRs value. The TAGLA scheme only requires a mapping between the target PER values and the FER values to be continuously fed back by the PHY layer. Choice of the target PER parameter thPER is then crucial for the performance of the TAGLA scheme which we now study.
×
Averaging the results of the proposed model over all possible SNR values we study, the average aggregate TCP throughput as a function of these 40 scenarios is depicted in Figures 11 and 12 for various values of the thPER parameter and for both channel models. The optimum aggregate TCP throughput obtained by choosing the best possible MCS, given SNRs, N, and RTT0,i, is also averaged in the same way and presented as a benchmark. The scenarios are indexed with a parameter called idx as shown in Tables 2 and 3, for increasing throughput of the so-called optimum policy in AWGN and ITU-A channels, respectively. Low values of idx, corresponding to relatively low values for N and large values for RTT0,i, are representative of situations in which the TCP flows cannot keep the queue always full. In such cases, the throughput is lower and the penalty of using larger values of thPER is apparent. Conversely, large values for idx are indicative of a situation in which TCP can keep the queue full all the time despite wireless losses, and the optimum policy is to use the MCS with the best spectral efficiency but with larger wireless loss rates. This observation remains intact for both channel models.
×
×
Table 2
Scenarios SFN,Fand SUN,Findexed by increasing throughput of optimum policy for the AWGN channel
idx
Scenario
idx
Scenario
1
SF1,160
21
SU16,160
2
SF1,120
22
SF4,10
3
SF1,80
23
SU4,10
4
SF1,40
24
SF16,80
5
SF4,160
25
SU16,120
6
SU4,160
26
SF4,5
7
SF4,120
27
SU4,5
8
SF1,20
28
SF4,1
9
SU4,120
29
SU4,1
10
SF4,80
30
SU16,80
11
SF1,10
31
SF16,40
12
SU4,80
32
SU16,40
13
SF1,5
33
SF16,20
14
SF4,40
34
SU16,20
15
SF1,1
35
SF16,10
16
SU4,40
36
SU16,10
17
SF16,160
37
SF16,5
18
SF4,20
38
SU16,5
19
SU4,20
39
SF16,1
20
SF16,120
40
SU16,1
Table 3
Scenarios SFN,Fand SUN,Findexed by increasing throughput of optimum policy for the ITU-A channel
idx
Scenario
idx
Scenario
1
SF1,160
21
SU16,160
2
SF1,120
22
SF4,10
3
SF1,80
23
SU4,10
4
SF1,40
24
SU16,120
5
SF4,160
25
SF16,80
6
SU4,160
26
SF4,5
7
SF4,120
27
SU4,5
8
SF1,20
28
SF4,1
9
SU4,120
29
SU4,1
10
SF4,80
30
SU16,80
11
SF1,10
31
SF16,40
12
SU4,80
32
SU16,40
13
SF1,5
33
SF16,20
14
SF4,40
34
SU16,20
15
SF1,1
35
SF16,10
16
SF16,160
36
SU16,10
17
SU4,40
37
SF16,5
18
SF16,120
38
SU16,5
19
SF4,20
39
SF16,1
20
SU4,20
40
SU16,1
In order to assess the sensitivity of throughput to thPER in different scenario settings, we form two groups among the scenarios studied so far, namely Glow and Ghigh, by partitioning the range of idx into subsets [ 1,..,15] and [ 26,..,40], respectively. We also let Gall represent the group of all scenarios with idx∈ [ 1,..,40]. First, we normalize the throughput of TAGLA with that of optimum policy for each SNRs and idx to avoid a bias favoring MCSs with high spectral efficiency. Then, we average the normalized throughput values over SNRs and idx within the ranges of each group to obtain the average normalized aggregate TCP throughput shown in Figures 13 and 14 for AWGN and ITU-A channels, respectively. The choice of thPER = 5×10-3 turns out to be a robust operating point for the three groups resulting in at most 4% and 12% performance penalties with respect to the optimum policy for AWGN and ITU-A channels, respectively. Targeting higher (lower) wireless loss rates has a negative impact on the TCP throughput especially for Glow (Ghigh). The reduction in TCP throughput around the proposed thPER value is more pronounced for the ITU-A channel which can be accounted for its relatively flat FER vs SNR curves shown in Figure 9. For a given SNR, FER values of the ITU-A channel are relatively closer to each other on the average. For this reason, the performance of TAGLA is more sensitive to the choice of thPER for this multipath fading channel model. The TAGLA scheme appears to have a potential for improvement provided that the threshold parameter thPER could be adaptively changed based on an estimation of the underlying traffic parameters which is left for future research.
×
×
5 Conclusions
In this study, we develop a novel workload-dependent queuing model for AQM-controlled wireless routers carrying persistent TCP flows. One of the contributions of this model is in its ability to capture the entire queue occupancy distribution as opposed to simpler performance measures of interest such as the mean queue length. The proposed queuing model is validated using ns-3 simulations in both wireline and wireless scenarios. This analytical method is then used to obtain guidelines for setting the target wireless packet error rate (PER) for a PER-based traffic-agnostic link adaptation scheme. Assuming wireless channel SNR to be uniformly distributed over the presented ranges of interest and packet losses to be concentrated on the wireless link (i.e., wireline losses are negligible), we show that targeting a PER around 5×10-3 irrespective of the underlying traffic parameters provides robust and acceptable average TCP performance for a wide range of scenarios and for the given AQM setting. Future work will consist of the study of traffic-aware link adaptation policies and HARQ/ARQ techniques in more depth for TCP throughput optimization in wireless links.
Acknowledgments
This work is supported in part by the Science and Research Council of Turkey (Tübitak) under project grant EEEAG-111E106.
Open AccessThis article is distributed under the terms of the Creative Commons Attribution 2.0 International License (https://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Competing interests
The authors declare that they have no competing interests.