2,593 research outputs found
Survey and Performance Evaluation of the Upcoming Next Generation WLAN Standard - IEEE 802.11ax
With the ever-increasing demand for wireless traffic and quality of serives
(QoS), wireless local area networks (WLANs) have developed into one of the most
dominant wireless networks that fully influence human life. As the most widely
used WLANs standard, Institute of Electrical and Electronics Engineers (IEEE)
802.11 will release the upcoming next generation WLANs standard amendment: IEEE
802.11ax. This article comprehensively surveys and analyzes the application
scenarios, technical requirements, standardization process, key technologies,
and performance evaluations of IEEE 802.11ax. Starting from the technical
objectives and requirements of IEEE 802.11ax, this article pays special
attention to high-dense deployment scenarios. After that, the key technologies
of IEEE 802.11ax, including the physical layer (PHY) enhancements, multi-user
(MU) medium access control (MU-MAC), spatial reuse (SR), and power efficiency
are discussed in detail, covering both standardization technologies as well as
the latest academic studies. Furthermore, performance requirements of IEEE
802.11ax are evaluated via a newly proposed systems and link-level integrated
simulation platform (SLISP). Simulations results confirm that IEEE 802.11ax
significantly improves the user experience in high-density deployment, while
successfully achieves the average per user throughput requirement in project
authorization request (PAR) by four times compared to the legacy IEEE 802.11.
Finally, potential advancement beyond IEEE 802.11ax are discussed to complete
this holistic study on the latest IEEE 802.11ax. To the best of our knowledge,
this article is the first study to directly investigate and analyze the latest
stable version of IEEE 802.11ax, and the first work to thoroughly and deeply
evaluate the compliance of the performance requirements of IEEE 802.11ax.Comment: 155 pages, 53 figure
How Does Multiple-Packet Reception Capability Scale the Performance of Wireless Local Area Networks?
Thanks to its simplicity and cost efficiency, wireless local area network
(WLAN) enjoys unique advantages in providing high-speed and low-cost wireless
services in hot spots and indoor environments. Traditional WLAN
medium-access-control (MAC) protocols assume that only one station can transmit
at a time: simultaneous transmissions of more than one station cause the
destruction of all packets involved. By exploiting recent advances in PHY-layer
multiuser detection (MUD) techniques, it is possible for a receiver to receive
multiple packets simultaneously. This paper argues that such multipacket
reception (MPR) capability can greatly enhance the capacity of future WLANs. In
addition, the paper provides the MAC-layer and PHY-layer designs needed to
achieve the improved capacity. First, to demonstrate MPR as a powerful
capacity-enhancement technique, we prove a "super-linearity" result, which
states that the system throughput per unit cost increases as the MPR capability
increases. Second, we show that the commonly deployed binary exponential
backoff (BEB) algorithm in today's WLAN MAC may not be optimal in an MPR
system, and that the optimal backoff factor increases with the MPR capability,
the number of packets that can be received simultaneously. Third, based on the
above insights, we design a joint MAC-PHY layer protocol for an IEEE
802.11-like WLAN that incorporates advanced PHY-layer signal processing
techniques to implement MPR
CSMA/CA Bottleneck Remediation in Saturation Mode with New Backoff Strategy
Many modern wireless networks integrate carrier sense mul-tiple
access/collision avoidance (CSMA/CA) with exponential backoff as medium access
control (MAC) technique. In order to decrease the MAC overhead and the
collision probability, we propose in this paper a new backoff strategy leading
to better saturation throughput and access de-lay performance comparing to the
classical protocol. We investigate the CSMA/CA with RTS/CTS technique, and we
show that our strategy reaches better saturation throughput and access delay
especially in dense networks. This proposed strategy distributes users over all
the backoff stages to solve the bottleneck problem present in the first backoff
stage. Finally, we analyze our strategy and we compare it to the classical one
modeled by Markov chain. Analytical and simulation results show the improvment
in term of saturation throughput. Cumulative density func-tion (CDF) of the
access delay illustrates the important gain obtained by the proposed strategy
Power Interference Modeling for CSMA/CA based Networks using Directional Antenna
In IEEE 802.11 based wireless networks adding more access points does not
always guarantee an increase of network capacity. In some cases, additional
access points may contribute to degrade the aggregated network throughput as
more interference is introduced.
This paper characterizes the power interference in CSMA/CA based networks
consisting of nodes using directional antenna. The severity of the interference
is quantized via an improved form of the Attacking Case metric as the original
form of this metric was developed for nodes using omnidirectional antenna.
The proposed metric is attractive because it considers nodes using
directional or omnidirectional antenna, and it enables the quantization of
interference in wireless networks using multiple transmission power schemes.
The improved Attacking Case metric is useful to study the aggregated throughput
of IEEE 802.11 based networks; reducing Attacking Case probably results in an
increase of aggregated throughput. This reduction can be implemented using
strategies such as directional antenna, transmit power control, or both.Comment: Submitted to Elsevier's Journal of Computer Communications, 40 pages,
17 figures and 25 reference
Stochastic Approximation Algorithm for Optimal Throughput Performance of Wireless LANs
Throughput improvement of the Wireless LANs has been a constant area of
research. Most of the work in this area, focuses on designing throughput
optimal schemes for fully connected networks (no hidden nodes). But, we
demonstrate that the proposed schemes, though perform optimally in fully
connected network, achieve significantly lesser throughput even than that of
standard IEEE 802.11 in a network with hidden nodes. This motivates the need
for designing schemes that provide near optimal performance even when hidden
nodes are present. The primary reason for the failure of existing protocols in
the presence of hidden nodes is that these protocols are based on the model
developed by Bianchi. However this model does not hold when hidden nodes exist.
Moreover, analyzing networks with hidden nodes is still an open problem. Thus,
designing throughput optimal schemes in networks with hidden nodes is
particularly challenging. The novelty of our approach is that it is not based
on any underlying mathematical model, rather it directly tunes the control
variables so as to maximize the throughput. We demonstrate that this model
independent approach achieves maximum throughput in networks with hidden
terminals as well. Apart from this major contribution, we present stochastic
approximation based algorithms for achieving weighted fairness in a connected
networks. We also present a throughput optimal exponential backoff based random
access algorithm. We demonstrate that the exponential backoff based scheme may
outperform an optimal p-persistent scheme in networks with hidden terminals.
This demonstrates the merit of exponential backoff based random access schemes
which was deemed unnecessary by results shown by Bianchi.Comment: 16 pages, 13 figure
VoIP over Multiple IEEE 802.11 Wireless LANs
Prior work indicates that 802.11 is extremely inefficient for VoIP transport.
Only 12 and 60 VoIP sessions can be supported in an 802.11b and an 802.11g
WLAN, respectively. This paper shows that the bad news does not stop there.
When there are multiple WLANs in the vicinity of each other, the already-low
VoIP capacity can be further eroded in a significant manner. For example, in a
5-by-5, 25-cell multi-WLAN network, the VoIP capacities for 802.11b and 802.11g
are only 1.63 and 10.34 sessions per AP, respectively. This paper investigates
several solutions to improve the VoIP capacity. Based on a conflict graph
model, we propose a clique-analytical call-admission scheme, which increases
the VoIP capacity by 52% and 37% in 802.11b and 802.11g respectively. If all
the three orthogonal frequency channels available in 11b and 11g are used, the
capacity can be nearly tripled by the call-admission scheme. This paper also
proposes for the first time the use of coarse-grained time-division multiple
access (CoTDMA) in conjunction with the basic 802.11 CSMA to eliminate the
performance-degrading exposed-node and hidden-node problems. We find that
CoTDMA can further increase the VoIP capacity in the multi-WLAN scenario by an
additional 35%
-persistant CSMA: a radio-channel access protocol
This paper presents an algorithm that improves channel-access statistics for
wireless medium. The proposed modification of the standard CSMA algorithm is
analytically shown to yield better results and simulation results are given to
support this claim
IEEE 802.11ay based mmWave WLANs: Design Challenges and Solutions
Millimeter-wave (mmWave) with large spectrum available is considered as the
most promising frequency band for future wireless communications. The IEEE
802.11ad and IEEE 802.11ay operating on 60 GHz mmWave are the two most expected
wireless local area network (WLAN) technologies for ultra-high-speed
communications. For the IEEE 802.11ay standard still under development, there
are plenty of proposals from companies and researchers who are involved with
the IEEE 802.11ay task group. In this survey, we conduct a comprehensive review
on the medium access control layer (MAC) related issues for the IEEE 802.11ay,
some cross-layer between physical layer (PHY) and MAC technologies are also
included. We start with MAC related technologies in the IEEE 802.11ad and
discuss design challenges on mmWave communications, leading to some MAC related
technologies for the IEEE 802.11ay. We then elaborate on important design
issues for IEEE 802.11ay. Specifically, we review the channel bonding and
aggregation for the IEEE 802.11ay, and point out the major differences between
the two technologies. Then, we describe channel access and channel allocation
in the IEEE 802.11ay, including spatial sharing and interference mitigation
technologies. After that, we present an in-depth survey on beamforming training
(BFT), beam tracking, single-user multiple-input-multiple-output (SU-MIMO)
beamforming and multi-user multiple-input-multiple-output (MU-MIMO)
beamforming. Finally, we discuss some open design issues and future research
directions for mmWave WLANs. We hope that this paper provides a good
introduction to this exciting research area for future wireless systems.Comment: 27 pages, 33 figures. Accepted for publication in IEEE Communications
Surveys and Tutorial
An Algorithm to Improve Performance over Multihop Wireless Mesh Network
Transmission Control Protocol (TCP) is the dominant reliable transport
protocol utilized in the Internet. Improving the performance of TCP associated
with the presence of multi-hop is one of the research challenges in wireless
mesh networks. Wireless mesh networks have large round trip time variations and
these variations are dependent on the number of hops. In wireless mesh network,
when congestion loss and wireless loss are co-existed the number of packets
dropped increases and will have adverse effects on TCP and its congestion
control mechanism which leads to low throughput. Here we have designed a new
TCP scheme for multi-hop wireless mesh networks, by modifying the sender side
congestion control functionality of TCP NewReno, which is tuned towards
improving the performance of TCP. The simulation results show that TCP SAC has
higher performance than TCP NewReno, Reno, Sack and Vegas in multi-hop wireless
mesh networks.Comment: Pages: 05 Figures: 0
Joint Spatial Multiplexing and Transmit Diversity in MIMO Ad Hoc Networks
This paper investigates the performance of MIMO ad hoc networks that employ
transmit diversity, as delivered by the Alamouti scheme, and/or spatial
multiplexing, according to the Vertical Bell Labs Layered Space-Time system
(V-BLAST). Both techniques are implemented in a discrete-event network
simulator by focusing on their overall effect on the resulting
signal-to-interference-plus-noise ratio (SINR) at the intended receiver. Unlike
previous works that have studied fully-connected scenarios or have assumed
simple abstractions to represent MIMO behavior, this paper evaluates MIMO ad
hoc networks that are not fully connected by taking into account the effects of
multiple antennas on the clear channel assessment (CCA) mechanism of CSMA-like
medium access control (MAC) protocols. In addition to presenting a performance
evaluation of ad hoc networks operating according to each individual MIMO
scheme, this paper proposes simple modifications to the IEEE 802.11 DCF MAC to
allow the joint operation of both MIMO techniques. Hence, each pair of nodes is
allowed to select the best MIMO configuration for the impending data transfer.
The joint operation is based on three operation modes that are selected based
on the estimated SINR at the intended receiver and its comparision with a set
of threshold values. The performance of ad hoc networks operating with the
joint MIMO scheme is compared with their operation using each individual MIMO
scheme and the standard SISO IEEE 802.11. Performance results are presented
based on MAC-level throughput per node, delay, and fairness under saturated
traffic conditions.Comment: 16 page
- …