An Admission Control Algorithm for Isochronous and Asynchronous Traffic in IEEE 802.11ad MAC (2403.09819v1)
Abstract: Due to availability of large amount of bandwidth in the 60 GHz band and support of contention-free channel access called Service Period (SP), the IEEE 802.11ad/ay Wi-Fi standard is well suited for low latency and high data rate applications. IEEE 802.11ad supports two types of SP user traffic: isochronous and asynchronous. These user traffic need guaranteed SP duration before their respective deadlines. Hence, admission control plays an important role in an IEEE 802.11ad system. In an earlier work, we studied admission control and scheduling of isochronous and asynchronous traffic in an IEEE 802.11ad system, but we assumed the asynchronous requests to be periodic to keep the algorithm simple. That assumption resulted in overallocation of resource and potential degradation of performance. In this paper, we present an admission control algorithm which does not make such assumption and yet still maintains a linear run time complexity and allocates resources to the requests in a proportional fair manner. We provide arguments to establish correctness of the algorithm in terms of guaranteeing SP allocation to the requests before their respective deadlines.
- “Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications,” 802.11 Working Group of the LAN/MAN Standards Committee of the IEEE Computer Society, Dec. 2016.
- A. Sahoo, W. Gao, T. Ropitault, and N. Golmie, “Admission control and scheduling of isochronous traffic in ieee 802.11 ad mac,” in Proceedings of the 24th International ACM Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, 2021, pp. 125–134.
- A. Sahoo, W. Gao, T. Ropitault and N. Golmie, “Admission control and scheduling of isochronous traffic with guard time in IEEE 802.11ad MAC,” IEEE Transactions on Mobile Computing, pp. 1–10, 2022, doi:10.1109/TMC.2022.3207969.
- A. Sahoo, P. Tian, T. Ropitault, S. Blandino, and N. Golmie, “Admission control and scheduling of isochronous and asynchronous traffic in ieee 802.11 ad mac,” in 2023 IEEE 97th Vehicular Technology Conference (VTC2023-Spring). IEEE, 2023, pp. 1–7.
- C. L. Liu and J. W. Layland, “Scheduling Algorithms for Multiprogramming in a Hard-Real-Time Environment,” Journal of the Association for Computing Machinery, vol. 20, no. 1, pp. 46–61, January 1973.
- K. Jeffay, D. F. Stanat and C. U. Martel, “On Non-Preemptive Scheduling of Periodic and Sporadic Tasks,” in IEEE Real-Time Systems Symposium (RTSS), December 1991, pp. 129–139.
- S. R. Thuel and J. P. Lehoczky, “Algorithms for Scheduling Hard Aperiodic Tasks in Fixed-Priority Systems Using Slack Stealing,” in RTSS, 1994, pp. 22–33.
- H. Chetto and M. Chetto, “Some Results of the Earliest Deadline Scheduling Algorithm,” IEEE Transactions on software engineering, vol. 15, no. 10, pp. 1261–1269, 1989.
- Q. Chen, J. Tang, D. T. C. Wong, X. Peng, and Y. Zhang, “Directional Cooperative MAC Protocol Design and Performance Analysis for IEEE 802.11ad WLANs,” IEEE Transactions on Vehicular Technology, vol. 62, no. 6, pp. 2667–2677, 2013.
- C. Pielli, T. Ropitault, N. Golmie, and M. Zorzi, “An Analytical Model for CBAP Allocations in IEEE 802.11ad,” IEEE Transactions on Communications, 2020.
- C. Hemanth and T. Venkatesh, “Performance Analysis of Service Periods (SP) of the IEEE 802.11ad Hybrid MAC Protocol,” IEEE Transactions on Mobile Computing, vol. 15, no. 5, pp. 1224–1236, 2015.
- E. Khorov, A. Ivanov, A. Lyakhov, and V. Zankin, “Mathematical Model for Scheduling in IEEE 802.11ad Networks,” in 2016 9th IFIP Wireless and Mobile Networking Conference (WMNC). IEEE, 2016, pp. 153–160.
- M. Lecci, M. Drago, A. Zanella, and M. Zorzi, “Exploiting scheduled access features of mmwave wlans for periodic traffic sources,” in 2021 19th Mediterranean Communication and Computer Networking Conference (MedComNet). IEEE, 2021, pp. 1–8.
- T. Azzino, T. Ropitault, and M. Zorzi, “Scheduling the Data Transmission Interval in IEEE 802.11ad: A Reinforcement Learning Approach,” in 2020 International Conference on Computing, Networking and Communications (ICNC). IEEE, 2020, pp. 602–607.