17 research outputs found

    A Feasibility Analysis of the Use of IEEE 802.11ah to extend 4G Network Coverage

    Get PDF
    The 4G LTE network has been launched in many countries including Indonesia, and all telecommunications operators are competing to expand their service coverage. Due to various reasons, there are a lot of areas that remains uncovered by the 4G LTE network. With the increase in cellular traffic, operators must continue to improve their service coverage. One of the scenarios to expand the service coverage is by offloading the traffic to a more cost-effective 802.11ah network in which one 802.11ah access point can serve thousands of mobile devices and support the Machine-to-Machine (M2M)/Internet of Things (IoT) communication. This study simulates the effect of the number of nodes on MCS performance evaluation of the 802.11ah protocol. The simulation is conducted by utilizing NS3 software to evaluate the throughput, delay, packet delivery ratio and energy consumption. This study also simulates 802.11ah coverage prediction to expand the LTE networks by utilizing Atoll Radio Planning Software. The results show that the performance obtained by varying the number of nodes/users from 100 to 1000 nodes is technically acceptable. In addition, the service coverage of 802.11ah network can solve the problem of blank spot area

    Reliable and Efficient Access for Alarm-initiated and Regular M2M Traffic in IEEE 802.11ah Systems

    Get PDF
    EEE 802.11ah is a novel WiFi-based protocol, aiming to provide an access solution for the machine-to-machine (M2M) communications. In this paper, we propose an adaptive access mechanism that can be seamlessly incorporated into IEEE 802.11ah protocol operation and that supports all potential M2M reporting regimes, which are periodic, on-demand We show that it is possible to both efficiently and reliably resolve all reporting stations in the cell, within the limits of the allowed deadlines. As a side result, we also provide a rationale for modeling the inter-arrival time in alarm events by using the Beta distribution, a model that is considered in the 3GPP standardization.Comment: Appeared in IEEE IoT Journal, October 201

    Energy-aware Restricted Access Window control with retransmission scheme for IEEE 802.11ah (Wi-Fi HaLow) based networks

    Get PDF
    Restricted Access Window (RAW) has been introduced to IEEE 802.11ah MAC layer to decrease collision probability. However, the inappropriate application of RAW for different groups of devices would increase uplink energy consumption and decrease data rate. In this paper, we study an energy efficient RAW optimization problem for IEEE 802.11ah based uplink communications. We first present a novel retransmission scheme that utilizes the next empty slot to retransmit for collided devices, and formulate the problem based on overall energy consumption and the data rate of each RAW by applying probability theory and Markov Chain. Then, we derive the energy efficiency of the uplink transmission. Last but not the least, an energy-aware window control algorithm to adapt the RAW size is proposed to optimize the energy efficiency by identifying the number of slots in each RAW for different group scales. Simulation results show that our proposed algorithm outperforms existing RAW on uplink energy efficiency and delivery ratio

    Optimization-oriented RAW modeling of IEEE 802.11ah heterogeneous networks

    Get PDF
    © 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.The new medium access method of IEEE 802.11ah, called Restricted Access Window (RAW), divides stations into different groups, and only allows stations in the same group to access the channel simultaneously, in order to reduce collisions and thus achieve better performance (e.g., throughput). However, the existing station grouping strategies only support homogeneous scenarios where all stations use the same modulation and coding scheme (MCS) and packet size. A surrogate model is an efficient mathematical model that represents the behavior of a complex system, trained with a limited set of labeled input-output data samples. In this paper, we present a surrogate model that can accurately predict RAW performance under a given Restricted Access Window (RAW) configuration in heterogeneous networks. Different from the homogeneous scenario, heterogeneous networks are defined by a large number of parameters, leading to an enormous design space, i.e., the order of 1017 possible data points. This is too big to achieve feasible training convergence. In this paper, we present a novel training methodology that leads to a new design space with highly reduced size, i.e., the order of 105 data points. The surrogate model converges when less than 6000 labeled data points are used for training, which is only a tiny portion of the whole design space. The results show that, the relative error between model prediction and simulation results is less than 0.1 for 95% of the data points, in the areas of the design space studied. Its low complexity and high precision make the proposed model a valuable tool to develop real-time RAW optimization algorithms for heterogeneous IEEE 802.11ah networks.Postprint (author's final draft

    Sub-GHz LPWAN network coexistence, management and virtualization : an overview and open research challenges

    Get PDF
    The IoT domain is characterized by many applications that require low-bandwidth communications over a long range, at a low cost and at low power. Low power wide area networks (LPWANs) fulfill these requirements by using sub-GHz radio frequencies (typically 433 or 868 MHz) with typical transmission ranges in the order of 1 up to 50 km. As a result, a single base station can cover large areas and can support high numbers of connected devices (> 1000 per base station). Notorious initiatives in this domain are LoRa, Sigfox and the upcoming IEEE 802.11ah (or "HaLow") standard. Although these new technologies have the potential to significantly impact many IoT deployments, the current market is very fragmented and many challenges exists related to deployment, scalability, management and coexistence aspects, making adoption of these technologies difficult for many companies. To remedy this, this paper proposes a conceptual framework to improve the performance of LPWAN networks through in-network optimization, cross-technology coexistence and cooperation and virtualization of management functions. In addition, the paper gives an overview of state of the art solutions and identifies open challenges for each of these aspects

    Reconfigurable and traffic-aware MAC design for virtualized wireless networks via reinforcement learning

    Get PDF
    In this paper, we present a reconfigurable MAC scheme where the partition between contention-free and contention-based regimes in each frame is adaptive to the network status leveraging reinforcement learning. In particular, to support a virtualized wireless network consisting of multiple slices, each having heterogeneous and unsaturated devices, the proposed scheme aims to configure the partition for maximizing network throughput while maintaining the slice reservations. Applying complementary geometric programming (CGP) and monomial approximations, an iterative algorithm is developed to find the optimal solution. For a large number of devices, a scalable algorithm with lower computational complexity is also proposed. The partitioning algorithm requires the knowledge of the device traffic statistics. In the absence of such knowledge, we develop a learning algorithm employing Thompson sampling to acquire packet arrival probabilities of devices. Furthermore, we model the problem as a thresholding multi-armed bandit (TMAB) and propose a threshold-based reconfigurable MAC algorithm, which is proved to achieve the optimal regret bound

    An analytical model for the aggregate throughput of IEEE 802.11ah networks under the restricted access window mechanism

    Get PDF
    The IEEE 802.11ah is an amendment to the IEEE 802.11 standard to support the growth of the Internet of Things (IoT). One of its main novelties is the restricted access window (RAW), which is a channel access feature designed to reduce channel contention by dividing stations into RAW groups. Each RAW group is further divided into RAW slots, and stations only attempt channel access during the RAW slot they were assigned to. In this paper, we propose a discrete-time Markov chain model to evaluate the average aggregate throughput of IEEE 802.11ah networks using the RAW mechanism under saturated traffic and ideal channel conditions. The proposed analytical model describes the behavior of an active station within its assigned RAW slot. A key aspect of the model is the consideration of the event of RAW slot time completion during a station’s backoff operation. We study the average aggregate network throughput for various numbers of RAW slots and stations in the network. The numerical results derived from our analytical model are compared to computer simulations based on an IEEE 802.11ah model developed for the ns-3 simulator by other researchers, and its performance is also compared to two other analytical models proposed in the literature. The presented results indicate that the proposed analytical model reaches the closest agreement with independently-derived computer simulations
    corecore