Fair and efficient resource allocation in IEEE 802.11ah WLAN with heterogeneous data rates

Fair and efficient resource allocation in IEEE 802.11ah WLAN with heterogeneous data rates

Computer Communications 151 (2020) 154–164 Contents lists available at ScienceDirect Computer Communications journal homepage: www.elsevier.com/loca...

894KB Sizes 0 Downloads 23 Views

Computer Communications 151 (2020) 154–164

Contents lists available at ScienceDirect

Computer Communications journal homepage: www.elsevier.com/locate/comcom

Fair and efficient resource allocation in IEEE 802.11ah WLAN with heterogeneous data rates U. Sangeetha βˆ—, A.V. Babu Department of Electronics and Communication Engineering, National Institute of Technology, Calicut, Kerala, India

ARTICLE

INFO

Keywords: IEEE 802.11ah Throughput Restricted access window Data rate based grouping Wireless LAN

ABSTRACT For dense wireless LANs (WLANs), IEEE 802.11ah has specified restricted access window (RAW) as the channel access scheme. Here the competing stations (STAs) are divided into groups and STAs belonging to each group attempt to access the channel during their designated RAW slot by invoking the distributed coordination function (DCF) protocol. This paper describes an analytical model to evaluate the throughput performance of IEEE 802.11ah WLAN, when STAs use distinct data rates and the RAW mechanism is implemented for medium sharing. When STAs are grouped randomly (i.e., without considering their data rates), a group will contain STAs operating at distinct data rates. Since all these STAs simultaneously contend for channel access based on DCF protocol, the throughput of high data rate STAs are down-equalized to that of lower data rate STAs; thus the aggregate network throughput is degraded significantly. To resolve the resulting performance anomaly problem, we consider data rate based grouping where STAs operating at the same data rate are grouped together. We describe an algorithm for implementing data rate based grouping at the access point (AP). Further, we describe an analytical procedure to find the network throughput under data rate based grouping. Through numerical and experimental investigations, we establish that data rate based grouping can significantly improve the aggregate network throughput performance, as compared to the conventional random grouping strategy. Further, we use Jain’s fairness index (JFI) to establish that data rate based grouping can also provide fair resource allocation among the STAs operating at distinct data rates, by ensuring that all the competing STAs in the network achieve throughput proportional to their data rates.

1. Introduction IEEE 802.11ah specifies the physical (PHY) and medium access control (MAC) layer protocols for the implementation of sub-1 GHz wireless LAN (WLAN) for machine-to-machine (M2M) and Internet of Things (IoT) applications involving a large number of connected devices or stations (STAs) [1]. In the legacy 802.11 based WLANs, STAs use either distributed coordination function (DCF) or enhanced distributed channel access (EDCA) protocol for getting the channel access. Notice that the DCF/EDCA protocols are based on the carrier sense multiple access-collision avoidance (CSMA-CA) mechanism. When the legacy DCF/EDCA protocol is used in dense WLAN scenarios, all the STAs having frames in their MAC queue ready for transmission, compete simultaneously for channel access, which leads to very high collision probability. This ultimately leads to significant reduction of network throughput [2]. To reduce the level of contention among the competing STAs in a dense WLAN scenario, IEEE 802.11ah has specified a novel channel access scheme that utilizes the notion of restricted access window (RAW). The RAW duration consists of many number of RAW slots and

during each RAW slot, a group of STAs will attempt to get channel access by using the DCF/EDCA protocol. During this time slot, the remaining STAs belonging to other groups remain idle. Within each beacon interval, multiple RAWs are present as can be seen in Fig. 1, where each RAW consists of many RAW slots. By limiting the channel contention to relatively lower number of STAs during a particular RAW slot, the RAW-based channel access scheme supported by 802.11ah MAC is anticipated to significantly enhance the channel access efficiency and scalability of IEEE 802.11ah dense WLANs. Further, at the PHY layer, 802.11ah has specified the use of various modulation coding schemes (MCS) such that the STAs can operate at distinct data rates depending on the applications handled; furthermore, 802.11ah standard specifies that each STA has to support rate adaptation as well [1]. In the legacy WLANs, where STAs use DCF/EDCA protocol, all the STAs within the cell (i.e., basic service set) are allowed to access the medium simultaneously. Each STA will choose a backoff (BO) counter, whose initial value is uniformly distributed in the interval (0, π‘Š0 βˆ’ 1). The BO counter will be decremented whenever the channel is sensed as idle and would be frozen when the channel is sensed as busy.

βˆ— Corresponding author. E-mail addresses: [email protected] (U. Sangeetha), [email protected] (A.V. Babu).

https://doi.org/10.1016/j.comcom.2019.12.043 Received 7 September 2019; Received in revised form 15 November 2019; Accepted 23 December 2019 Available online 7 January 2020 0140-3664/Β© 2020 Elsevier B.V. All rights reserved.

U. Sangeetha and A.V. Babu

Computer Communications 151 (2020) 154–164

with the help of simulation studies. An analytical model for finding the non-saturation/saturation throughput of 802.11ah WLAN under the RAW-based channel access mechanism has been presented in [8], assuming that STAs use homogeneous data rates. Here the authors assume that the STAs, which defer their transmission at the end of a given RAW slot (i.e., due to non-availability of sufficient time for completing the frame transmission in the current RAW slot) will renew their BO parameters (i.e; BO counter value and BO stage when STA is deferred) at the beginning of the next designated RAW slot. In [9], the authors describe an analytical model to evaluate the MAC layer performance of differentiated services in IEEE 802.11ah WLAN under the RAW-based scheme. In [10], the authors describe an analytical model to evaluate the throughput of IEEE 802.11ah WLAN under the RAW mechanism and present detailed results for idle probability, backoff time and frame transmission probability. In these papers, all the STAs in the WLAN are assumed to operate at the same data rate. Recently, several authors have proposed efficient schemes for forming groups, (i.e; STA groups) in IEEE 802.11ah WLAN to improve the network performance [11–15]. In [11], the authors propose an algorithm for finding the optimal RAW parameters for forming STA groups, considering heterogeneous traffic characteristics at each node. In [12], the authors propose a traffic-adaptive RAW optimization algorithm for real time STA grouping. Here the RAW parameters such as the number of groups, the number of STAs per group etc., are adapted according to the current traffic conditions. The authors of [13] propose an efficient algorithm, which can be used to adapt the RAW parameters for improving the energy efficiency of uplink communications in 802.11ah WLANs. In [14], the authors propose a load-balanced STA grouping algorithm for improving the channel utilization efficiency of each group of STAs in 802.11ah WLANs. A sector-based STA grouping scheme has been proposed in [15] to improve the efficiency of channel access in IEEE 802.11ah based IoT networks. Apart from the above papers, some researchers have focused on proposing modifications for the legacy 802.11ah MAC protocol. In [16], the authors have proposed a Quality of Service (QoS)-aware priority grouping and RAW scheduling algorithm for IEEE 802.11ah based networks. Hybrid, contention reservation MAC protocol has been proposed in [17] to realize energy efficient uplink communication in IEEE 802.11ah WLANs. In [18], the authors study an enhancement for the RAW scheme by including a reservation slot to ensure that the QoS requirements of the applications are satisfied. Detailed literature survey has shown that the existing research papers on the performance evaluation of IEEE 802.11ah WLAN under the RAW mechanism assume that all the competing STAs use the same data rate for transmitting the frames. The STAs may use distinct data rates either due to the implementation of suitable rate adaptation protocols at the data link layer or depending on the application handled by the STA. In such scenarios, a group will contain STAs operating at distinct data rates. The objective of this work is to develop an analytical model for finding the throughput performance of IEEE 802.11ah WLAN when STAs employ distinct data rates for frame transmission under the RAWbased medium sharing approach. First of all, we assume that the STAs are grouped randomly, i.e., grouping is done by randomly picking the STAs. In this case, a group may contain STAs operating at distinct data rates. During the RAW slot assigned to this group, the STAs within the group will contend together for getting the transmission opportunity. In this scenario, the STAs operating at lower data rates will occupy the medium for a longer time as compared to STAs operating at higher data rates. This degrades the overall throughput of the group as well as that of the network. Further, the throughput of the high data rate STA is significantly reduced and becomes almost equal to that of the low data rate STAs (assuming that all of them use same MAC parameters). To resolve this performance anomaly problem, we consider data rate based grouping, i.e., STAs using the same data rate are grouped together. Here, all the STAs within a given group will be operating at the same data rate. They all will compete together for getting the

Fig. 1. RAW based channel access scheme [1].

The duration of time between two consecutive decrements of the BO counter is a random variable as it may contain an idle slot, a successful transmission slot or a collision slot. Once the BO counter value becomes zero, the STA is allowed to transmit the frame over the medium. If the frame is received correctly, the destination STA transmits an ACK frame. Upon receiving the ACK, the sender initiates a new transmission procedure for the next frame in the MAC layer queue. Non-receipt of ACK frame leads to STA repeating the frame transmission attempts till the retry limit is reached, after which the frame is discarded [2]. Compared to the legacy DCF/EDCA protocol employed in 802.11 WLANs, the RAW mechanism specified by 802.11ah has certain distinct features. Under the RAW-based channel access mechanism, the STAs in 802.11ah WLAN that use DCF/EDCA protocol, are restricted to access the medium during the RAW slot allotted to them. Accordingly, the STA within a group that undergoes the BO counter decrement process during the designated RAW slot, has to verify that sufficient time is available in the current RAW slot for completing the frame transmission [1]. If the residual time in the current RAW slot is not enough, the STAs have to defer their attempt and wait till the next designated RAW slot arrives. In this case, the STAs will reset the current value of the BO counter and restarts it at the beginning of the next designated RAW slot. In particular, when the next designated RAW slot begins, the STA creates a new BO function and initializes the BO counter with a random integer value drawn from the uniform distribution over the interval (0, π‘Š0 βˆ’ 1). Further, 802.11ah specifies two methods to handle the handover of RAW slots among two distinct groups of STAs. With non-cross slot boundary (i.e., NCSB), frame transmission of the STAs are not allowed to cross the boundary of the designated RAW slot allotted to them during a given slot, while for the cross slot boundary case (i.e., CSB), an on-going transmission is allowed to cross the RAW slot boundary; but STAs in the group cannot start a new transmission in the RAW slot allocated to the other group [1]. Owing to these important differences, it is very essential to develop an analytical model to study the performance of 802.11ah WLANs, where STAs having heterogeneous data rates use RAW-based channel access scheme. 1.1. Related work Recently, a few authors have made attempts to evaluate the effectiveness of RAW-based channel access scheme through analytical/simulation studies, in the context of IEEE 802.11ah WLANs [3– 10]. In [3] the authors evaluate the saturation throughput of WLAN under RAW-based channel access scheme with NCSB, while in [4], the authors propose that the RAW size need to be selected according to the group size for improving the network throughput. In [5], the authors propose an algorithm to find the optimal size for the RAW slot as a function of network size. In [6], the authors describe a mean value based analysis for assessing the performance of group synchronized DCF in the context of 802.11ah WLAN. The authors of [7] have evaluated the impact of RAW size on network performance 155

U. Sangeetha and A.V. Babu

Computer Communications 151 (2020) 154–164

transmission opportunity during the RAW slot assigned to them. The proposed strategy can ensure equal channel access opportunity for all the STAs in the network, irrespective of their data rates. With the help of analytical and simulation studies, we establish that the aggregate throughput of the network can be significantly improved under the data rate based grouping as compared to the random grouping method. 1.2. Contributions The main contributions of the paper are outlined as follows: β€’ We develop an analytical model to evaluate the saturation throughput of IEEE 802.11ah WLAN under the RAW-based channel access scheme assuming non-cross slot boundary case. The analytical model is a modification of the Markov chain based models of [2,19] which takes into account: (i) STAs operating at distinct data rates within a group and (ii) the distinct features of 802.11ah RAW-based MAC protocol. Here, we consider both random grouping as well as data rate based grouping. With the help of analytical and simulation studies, we establish that the aggregate throughput of the network can be improved under data rate grouping as compared to the random grouping. Further, it is established that data rate grouping improves the throughput of high data rate STAs, without penalizing the low data rate STAs. β€’ We present an algorithm that describes the procedure for realizing data rate based grouping in 802.11ah WLAN. β€’ We use the Jain’s fairness index (JFI) to evaluate the fairness in resource allocation among the STAs operating at distinct data rates. Under the conventional random grouping method, STAs within a given group operating at distinct data rates compete against each other for getting the channel access. Due to this, they all achieve the same throughput. Thus random grouping provides highly unfair resource allocation among STAs of distinct data rates. With the help of JFI, we establish that the data rate based grouping ensures fair resource allocation among STAs operating at distinct data rates. The rest of the paper is organized as follows: Sections 2 and 3 describe analytical models for network throughput under random grouping and data rate based grouping respectively. The algorithm for data rate based grouping is described in Section 3. The numerical and simulation results are described in Section 4. The paper is concluded in Section 5.

Xiao [20] with appropriate modifications to suit the distinct features of 802.11ah MAC protocol. At time t, the BO stage and the BO counter of the tagged STA are represented as {𝑆𝑖(π‘š) (𝑑)} and {𝐡𝑖(π‘š) (𝑑)} respectively. Assuming the frame collision to be Bernoulli, {𝑆𝑖(π‘š) (𝑑)𝐡𝑖(π‘š) (𝑑)} can be modelled as a discrete time Markov Chain (DTMC) [2]; Fig. 2. shows the state transitions associated with the DTMC. Let π‘Šπ‘–,0 be the min(π‘š) imum contention window of group 𝑖 STAs; further let 𝑝(π‘š) 𝑐,𝑖 and πœπ‘– respectively are the collision and transmission attempt probabilities of the tagged group 𝑖 STA operating at data rate 𝑅𝑖(π‘š) . We assume that NCSB is employed; thus group i STAs are allowed to access the medium for duration 𝑇𝑖 ; however they are not allowed to cross the RAW slot boundary. When DCF protocol is used, a competing STA will transmit the frame when its BO counter becomes zero. However, in 802.11ah supported RAW-based scheme, a STA intending to transmit a frame, after counting down to zero, must ensure that the remaining time available in the current RAW slot is sufficient for a frame transaction with the AP. Now the RAW slot duration for group i, 𝑇𝑖 is given by [1]. 𝑇𝑖 = π‘‡π‘Ž,𝑖 + π‘‡β„Ž + 𝑇𝑔

(1)

where π‘‡π‘Ž,𝑖 is the free access period; π‘‡β„Ž and 𝑇𝑔 represent the holding time and the guard time respectively. The guard time ensures that a frame transmission initiated during the current RAW slot 𝑇𝑖 does not cross the RAW slot boundary. During the holding period, the STAs within the group remain idle by freezing their BO counters, knowing that the current RAW slot will elapse sooner [1]. STA sense the The probability that the tagged group i, rate 𝑅(π‘š) 𝑖 ) is given medium as busy during the BO decrementing procedure (𝑝(π‘š) 𝑏,𝑖 by ( )𝑛(𝑒) ( )𝑛(π‘š) βˆ’1 (π‘š) 𝑀 𝑝𝑏,𝑖 = 1 βˆ’ 𝛱𝑒=1 1 βˆ’ πœπ‘–(𝑒) 𝑖 1 βˆ’ πœπ‘–(π‘š) 𝑖

(2)

π‘’β‰ π‘š

The BO counter is frozen with probability (𝑝(π‘š) ) either when the 𝑓 ,𝑖 ) or medium is observed to be busy (that occurs with probability 𝑝(π‘š) 𝑏,𝑖 when the access time of the designated RAW slot (π‘‡π‘Ž,𝑖 ) has expired (with probability equal to unity), and is given by ( ( ) ) π‘‡π‘Ž,𝑖 (π‘š) 𝑇𝑅 βˆ’ π‘‡π‘Ž,𝑖 = 𝑝𝑓(π‘š) + 𝑝 (3) ,𝑖 𝑏,𝑖 𝑇𝑅 𝑇𝑅 As seen in Fig. 2, the decrementing of the BO counter occurs with ), when the BO counter value y lies in the range the probability (1 βˆ’ 𝑝(π‘š) 𝑓 ,𝑖 (2, π‘Šπ‘–π‘₯βˆ’1 ); π‘₯ = 1, ..𝐿. However, after counting down to unity, the BO counter gets decremented to zero if and only if the tagged STA finds the residual time in the current RAW slot to be sufficient enough for a frame transaction with the AP. Otherwise, the STA enters a defer state (π‘š) as shown in Fig. 2. The STA will 𝐷π‘₯ π‘₯ ∈ (0, 𝐿) with probability 𝑝0,𝑖

2. Analytical model for network throughput under random grouping of stations

continue to be in the defer state 𝐷π‘₯ π‘₯ ∈ (0, 𝐿) with probability 𝑝(π‘š) . 1,𝑖 However, as soon as the next designated RAW slot for group 𝑖 STAs arrive, the tagged STA resets the current BO counter to zero and starts a new BO counter decrementing cycle. For this, it selects the BO counter value uniformly within the range [0, π‘Šπ‘–,0 βˆ’ 1] as shown in Fig. 2. Let us assume that the remaining time available in the current RAW slot is uniformly distributed over (0, π‘‡π‘Ž,𝑖 ). The defer probability 𝑝(π‘š) is 0,𝑖 the probability that the residual time in the current RAW slot is not sufficient for a successful frame transmission from rate 𝑅(π‘š) STA. Thus 𝑖

In this section, we present an analytical model to find the throughput of IEEE 802.11ah WLAN with STAs operating with heterogeneous data rates under the RAW-based scheme. Consider a fully connected WLAN that operates according to 802.11ah specifications with N number of STAs uniformly distributed around the access point (AP). Here we assume that the STAs are grouped randomly without considering parameters such as the data rates. Further, assume that no hidden STAs are present in the network and a centralized grouping strategy has been followed with 𝑁 STAs divided into 𝐾 groups; there are 𝑛𝑖 STAs per 𝐾 𝑛 = 𝑁. Let 𝑇 be the duration of one RAW, which group such that 𝛴𝑖=1 𝑖 𝑅 is divided into 𝐾 RAW slots. Assume that duration of the RAW slot assigned to group i STAs is equal to 𝑇𝑖 . Each STA in group 𝑖 can operate (π‘š) at distinct data rates 𝑅(π‘š) STAs operating at 𝑖 , π‘š = 1, … , 𝑀; there are 𝑛𝑖 (π‘š) (π‘š) 𝑀 rate 𝑅𝑖 bits per sec (bps) such that π›΄π‘š=1 𝑛𝑖 = 𝑛𝑖 . The STAs belonging to group 𝑖 contend for channel access during 𝑇𝑖 by following the DCF protocol. To evaluate the throughput of the groups and that of the network, we consider a tagged group 𝑖 STA operating with data rate 𝑅(π‘š) 𝑖 (𝑖 = 1, 2, … , 𝐾; π‘š = 1, 2, ..𝑀). To develop the analytical model for throughput under RAW mechanism, we rely on the model proposed by Y.

𝑇

(π‘š)

(π‘š) we set 𝑝(π‘š) = 𝑇𝑠 ; 𝑇𝑠(π‘š) ≀ π‘‡π‘Ž,𝑖 and 𝑝0,𝑖 = 1; 𝑇𝑠(π‘š) > π‘‡π‘Ž,𝑖 ; where 𝑇𝑠(π‘š) 0,𝑖 π‘Ž,𝑖 is the time required for the successful transmission of a frame from rate 𝑅(π‘š) STA. Thus the probability of BO counter decrementing from 𝑖 unity to zero is (1 βˆ’ 𝑝(π‘š) )(1 βˆ’ 𝑝(π‘š) ) β‰Š 1 βˆ’ 𝑝(π‘š) βˆ’ 𝑝(π‘š) , as shown in Fig. 2. 𝑓 ,𝑖 𝑓 ,𝑖 0,𝑖 0,𝑖 The corresponding one-step transition probabilities are represented as follows: { (1 βˆ’ 𝑝𝑓(π‘š) ); 𝑦 ∈ [2, π‘Šπ‘–,π‘₯ βˆ’ 1], π‘₯ ∈ [0, 𝐿] ,𝑖 𝑃 (π‘₯, 𝑦 βˆ’ 1|π‘₯, 𝑦) = (4) (π‘š) (1 βˆ’ 𝑝𝑓 ,𝑖 βˆ’ 𝑝(π‘š) ); 𝑦 = 1 0,𝑖

where π‘Šπ‘–,π‘₯ = 2π‘₯ π‘Šπ‘–,0 , π‘₯ = 1, 2, … , 𝐿 βˆ’ 1 with 𝐿 selected such that π‘Šπ‘–,π‘šπ‘Žπ‘₯ = 2𝐿 π‘Šπ‘–,0 . Further, we set 𝐿 as the retry limit as well. Now 156

U. Sangeetha and A.V. Babu

Computer Communications 151 (2020) 154–164

Fig. 2. Frame transmission procedure under DCF: Markov Chain model for group 𝑖, rate 𝑅(π‘š) STA. 𝑖

= 1βˆ’ referring to Fig. 2, 𝑝(π‘š) 1,𝑖 duration of one RAW.

𝑇𝑖 𝑇𝑅

= and 𝑝(π‘š) 2,𝑖

𝑇𝑖 , 𝑇𝑅

where 𝑇𝑅 is the total

While (5a) represents the BO counter freezing probability, (5b) is the probability of tagged STA entering the next BO stage after it encounters a collision, and (5c) is the probability that the STA enters the BO stage 0 after a successful transmission. Further, (5d)–(5f) represent the transitions associated with the deferring of STA, while in BO stage π‘₯. Here (5d) represents the transition associated with deferring of STA, i.e; the STA after counting down to unity, checks for the availability of sufficient residual time in the current RAW slot for completing the transmission. If enough time is available and the channel is also sensed as idle, it will count down to zero so that STA can transmit immediately, before another STA occupies the channel. If sufficient time is not available, the STA enters the defer state with probability 𝑝(π‘š) . Furthermore, (5e) represents the probability that the tagged STA 0,𝑖 remains in the defer state and (5f) represents the probability that the STA, on finding that the next designated RAW slot for the group to which it belongs has arrived, resets the BO counter and begins a new BO counter decrementing cycle. After resetting, it selects the BO counter value to be uniformly in the range (0, π‘Šπ‘–,0 βˆ’ 1).

According to the DCF protocol, the tagged STA will enter the transmission state once the BO counter becomes zero. Successful transmission is inferred from the reception of ACK frame at the STA. In case collision happens, the STA enters the next BO stage and restarts the BO counter decrementing process. If the transmission is unsuccessful even after 𝐿 attempts, the frame is dropped from the MAC queue. More details of the DCF protocol can be seen in [2]. Various other one-step transition probabilities are as given below. 𝑃 (π‘₯, 𝑦|π‘₯, 𝑦) = 𝑝(π‘š) ; 𝑓 ,𝑖 𝑃 (π‘₯, 𝑦|π‘₯ βˆ’ 1, 0) = {

𝑦 ∈ [0, π‘Šπ‘–,π‘₯ βˆ’ 1], 𝑝(π‘š) 𝑐,𝑖

π‘Šπ‘–,π‘₯

;

π‘₯ ∈ [0, 𝐿]

𝑦 ∈ [0, π‘Šπ‘–,π‘₯ βˆ’ 1],

π‘₯ ∈ [1, 𝐿]

(5a) (5b)

(π‘š)

(1βˆ’π‘π‘,𝑖 ) π‘Šπ‘–,0

𝑃 (0, 𝑦|π‘₯, 0) =

;

1 ; π‘Šπ‘–,0

𝑦 ∈ [0, π‘Šπ‘–,0 βˆ’ 1],

π‘₯ ∈ [0, 𝐿 βˆ’ 1]

𝑦 ∈ [0, π‘Šπ‘–,0 βˆ’ 1],

π‘₯=𝐿

(5c)

𝑃 (𝐷π‘₯ |π‘₯, 1) = 𝑝(π‘š) , 0,𝑖

π‘₯ ∈ [0, 𝐿]

(5d)

𝑝(π‘š) , 1,𝑖 (π‘š) 𝑝2,𝑖

π‘₯ ∈ [0, 𝐿]

(5e)

𝑃 (𝐷π‘₯ |𝐷π‘₯ ) = 𝑃 (0, 𝑦|𝐷π‘₯ ) =

π‘Šπ‘–,0

,

π‘₯ ∈ [0, 𝐿], 𝑦 = (0, π‘Šπ‘–,0βˆ’1 )

2.1. Finding the transmission attempt probability Let πœ‹π‘–(π‘š) (π‘₯, 𝑦) = limπ‘‘β†’βˆž 𝑃 {𝑆𝑖(π‘š) (𝑑) = π‘₯, 𝐡𝑖(π‘š) (𝑑) = 𝑦} be the steady state probability distribution of the DTMC corresponding to tagged group i rate 𝑅𝑖(π‘š) STA. Further, let πœ‹π‘–(π‘š) (𝐷π‘₯ ) be the steady state probability of

(5f)

157

U. Sangeetha and A.V. Babu

Computer Communications 151 (2020) 154–164

The conditional probability of successful transmission of tagged STA is

the tagged STA entering the defer stage 𝐷π‘₯ ; (π‘₯ = 0, ..𝐿). The following relations can be obtained from Fig. 2. π‘₯ (π‘š) πœ‹π‘–(π‘š) (π‘₯, 0) = (𝑝(π‘š) π‘₯ ∈ (1, 𝐿) 𝑐,𝑖 ) πœ‹π‘– (0, 0); ) (π‘š) π‘₯ (π‘š) ( (𝑝 ) πœ‹π‘– (0, 0) π‘Šπ‘–,π‘₯ βˆ’ 1 𝑐,𝑖 πœ‹π‘–(π‘š) (π‘₯, 𝑦) = ; π‘Šπ‘–,π‘₯ 1 βˆ’ 𝑝(π‘š) 𝑓 ,𝑖

( )𝑛(π‘š) βˆ’1 ( )𝑛(𝑒) 𝑖 (π‘š) 𝑀 1 βˆ’ 𝜏 (𝑒) 𝑖 𝑛(π‘š) 1 βˆ’ πœπ‘–(π‘š) 𝛱𝑒=1 𝑖 πœπ‘– 𝑖

(6a)

𝐿 ( 1 βˆ’ 𝑝(π‘š) ) βˆ‘ 𝑐,𝑖

π‘Šπ‘–,0

πœ‹π‘–(π‘š) (π‘₯, 0) +

π‘₯=0

𝐿 𝑝(π‘š) 2,𝑖 βˆ‘

π‘Šπ‘–,0

𝐿 (π‘Šβˆ‘ 𝑖,π‘₯ βˆ’1) βˆ‘ π‘₯=0

πœ‹π‘–(π‘š) (π‘₯, 𝑦) +

π‘˜=2

𝐿 βˆ‘ 1 βˆ‘

( )𝑛(π‘š) (π‘š) 𝑖 𝑝(π‘š) π‘‘π‘Ÿ,𝑖 = 1 βˆ’ 1 βˆ’ πœπ‘–

π‘₯=0

π‘₯ ∈ [0, 𝐿]

π‘₯=0 𝑦=0

𝐿 βˆ‘

πœ‹π‘–(π‘š) (𝐷π‘₯ ) = 1

2.2. Finding the network throughput

(6d)

Under random grouping (RG), the throughput of rate 𝑅(π‘š) STAs be𝑖 longing to group 𝑖 is the average number of bits successfully transferred per second and is calculated as follows: ] [ (π‘š) 𝐸[𝑋] 𝑝𝑠,𝑖 𝑝(π‘š) π‘‘π‘Ÿ,𝑖 π‘ˆπ‘–(π‘š),𝑅𝐺 = (12) 𝐸[𝜎]

(6e)

(6f)

𝑀 π‘ˆ (π‘š) The total throughput of group 𝑖 STAs is given by π‘ˆπ‘–π‘…πΊ = π›΄π‘š=1 𝑖 𝑅𝐺 ) and the aggregate network throughput under random grouping (π‘ˆπ‘‘π‘œπ‘‘ is given as

π‘₯=0

Notice that (6f) represents the normalization condition for steady state probabilities of the DTMC. Now πœ‹π‘–(π‘š) (0, 0) can be obtained as follows, after combining and simplifying (6a)–(6f): πœ‹π‘–(π‘š) (0, 0)

1 = 𝐴1 + 𝐴2 + 𝐴3 + 𝐴4 + 𝐴5

𝑅𝐺 π‘ˆπ‘‘π‘œπ‘‘ =

(7a)

(7b) 1 βˆ’ 𝑝(π‘š) 𝑐,𝑖 [ (1 βˆ’ 𝑝(π‘š) )𝐿+1 π‘Š 2𝐿 (2 βˆ’ 𝑝(π‘š) ) βˆ’ [(1 βˆ’ 𝑝(π‘š) )(2𝐿+1 βˆ’ (𝑝(π‘š) )𝐿+1 )] ] 𝑖,0 𝑐,𝑖 𝑐,𝑖 𝑐,𝑖 𝑐,𝑖 (π‘š) 𝐿 (1 βˆ’ 𝑝(π‘š) 𝑐,𝑖 )π‘Šπ‘–,0 2 (2 βˆ’ 𝑝𝑐,𝑖 )

(2) (1) (1) (2) (2) (2) (1) (1) (1) 𝐸[𝜎] = (1 βˆ’ π‘π‘‘π‘Ÿ,𝑖 )𝜎0 + 𝑝(1) π‘‘π‘Ÿ,𝑖 𝑝𝑠,𝑖 𝑇𝑠 + π‘π‘‘π‘Ÿ,𝑖 𝑝𝑠,𝑖 𝑇𝑠 + π‘π‘‘π‘Ÿ,𝑖 (1 βˆ’ 𝑝𝑠,𝑖 )(1 βˆ’ π‘π‘‘π‘Ÿ,𝑖 )𝑇𝑐

(7c)

𝐴3 =

𝐴4 =

𝐴5 =

[

(1) (2) (1) (2) (1) (2) (2) +𝑝(2) π‘‘π‘Ÿ,𝑖 (1 βˆ’ 𝑝𝑠,𝑖 )(1 βˆ’ π‘π‘‘π‘Ÿ,𝑖 )𝑇𝑐 + π‘π‘‘π‘Ÿ,𝑖 π‘π‘‘π‘Ÿ,𝑖 π‘šπ‘Žπ‘₯(𝑇𝑐 , 𝑇𝑐 )

(14)

[ (1 βˆ’ 2𝑝(π‘š) )𝐿+1

3𝑝(π‘š) 𝑐,𝑖 𝑐,𝑖 π‘Šπ‘–,0 2𝑝(π‘š) 𝐡1 βˆ’ 𝑐,𝑖 (π‘š) (π‘š) 2 1 βˆ’ 𝑝𝑓 ,𝑖 1 βˆ’ 2𝑝𝑐,𝑖 ( 2𝐿+1 βˆ’ (𝑝(π‘š) )𝐿+1 )]] 𝑝(π‘š) 𝑐,𝑖 𝑐,𝑖 (7d) + 𝐿 2 π‘Šπ‘–,0 2 βˆ’ 𝑝(π‘š) 𝑐,𝑖 𝐿+1 𝑝(π‘š) 𝛽 [ (1 βˆ’ 𝑝(π‘š) 𝑐,𝑖 ) 0,𝑖 0 + 𝑝(π‘š) 𝑐,𝑖 𝐴1 π‘Šπ‘–,0 π‘Šπ‘–,0 (π‘š) 𝐿 (π‘š) 𝐿 ] 𝛽0 (π‘Šπ‘–,0 βˆ’ 1) 1 𝑝𝑐,𝑖 (2 βˆ’ (𝑝𝑐,𝑖 ) ) βˆ’ ( )+ (7e) 2 π‘Šπ‘–,0 𝐿 π‘Šπ‘–,0 (2 βˆ’ 𝑝(π‘š) 𝑐,𝑖 )2 (π‘š) 𝐿 [ [ ( 2𝐿 βˆ’ (𝑝(π‘š) )𝐿 )]] 𝑝(π‘š) 𝑝(π‘š) π‘Šπ‘–,0 βˆ’ 1 𝑐,𝑖 𝑐,𝑖 (1 βˆ’ (𝑝𝑐,𝑖 ) ) 𝑐,𝑖 1 𝑝(π‘š) 𝛽 ( )+ βˆ’ 0,𝑖 0 (π‘š) (π‘š) π‘Šπ‘–,0 π‘Šπ‘–,0 2𝐿 (2 βˆ’ 𝑝(π‘š) ) 𝑝2,𝑖 1 βˆ’ 𝑝𝑐,𝑖 𝑐,𝑖 1

where (1 βˆ’ π‘π‘‘π‘Ÿ,𝑖 ) is the probability that the medium is empty, i.e.; there are no transmissions from STAs belonging to group 𝑖, which occurs with (𝑒) 𝑀 (1 βˆ’ 𝜏 (𝑒) )𝑛𝑖 . Further, 𝑇 (π‘š) and 𝑇 (π‘š) , (π‘š = 1, 2) are given probability 𝛱𝑒=1 𝑠 𝑐 𝑖 by (π‘š) 𝑇𝑠(π‘š) = 𝑇𝑅𝑇 𝑆 + 3𝑇𝑆𝐼𝐹 𝑆 + 𝑇𝐢𝑇 𝑆 + 𝑇𝐻(π‘š) + 𝑇𝐸[𝑋] + 𝑇𝐴𝐢𝐾 + 3𝛿

𝑇𝑐(π‘š) = 𝑇𝑅𝑇 𝑆 + 𝑇𝐷𝐼𝐹 𝑆 + 𝛿

Here 𝛽0 = 1βˆ•(1 βˆ’ 𝑝(π‘š) βˆ’ 𝑝(π‘š) ) and the transmission attempt probability 𝑓 ,𝑖 0,𝑖 for group 𝑖, rate 𝑅(π‘š) STA is given by 𝑖 𝐿 βˆ‘ π‘₯=0

πœ‹π‘–(π‘š) (π‘₯, 0) =

𝐿+1 1 βˆ’ (𝑝(π‘š) 𝑐,𝑖 )

1 βˆ’ 𝑝(π‘š) 𝑐,𝑖

πœ‹π‘–(π‘š) (0, 0)

(15)

(π‘š) Here 𝛿 is the propagation delay; 𝑇𝑅𝑇 𝑆 , 𝑇𝐢𝑇 𝑆 , 𝑇𝐻(π‘š) , 𝑇𝐸[𝑋] and 𝑇𝐴𝐢𝐾 are the time durations corresponding to the transmission of RTS, CTS, frame header, frame payload and ACK respectively; 𝑇𝐷𝐼𝐹 𝑆 , 𝑇𝑆𝐼𝐹 𝑆 are the durations of SIFS and DIFS time periods. To find the throughput using (12) and (13), we need to determine various probabilities. First (π‘š) of all, πœπ‘–(π‘š) , 𝑝(π‘š) 𝑐,𝑖 and 𝑝𝑠,𝑖 , which are given by (7)–(10), along with relevant equations for 𝑝𝑓(π‘š) , 𝑝(π‘š) , 𝑝(π‘š) , 𝑝(π‘š) and 𝑝(π‘š) form a system ,𝑖 𝑏,𝑖 0,𝑖 1,𝑖 2,𝑖 of non-linear equations that can be numerically solved to find the (π‘š) (π‘š) probabilities πœπ‘–(π‘š) , 𝑝(π‘š) 𝑐,𝑖 , π‘π‘‘π‘Ÿ,𝑖 , 𝑝𝑠,𝑖 etc., which are required for finding the throughput. We use the Levenberg–Marquardt algorithm [21,22], which is a combination of steepest descent and Gauss–Newton method to solve the system of linear equations. After finding these probabilities, the throughput can be determined using (12)–(15).

(7f)

πœπ‘–(π‘š) =

(13)

𝑇𝑅

In (12), 𝐸[𝑋] is the average frame size and 𝐸[𝜎] is the average duration of the slot time, which is computed as follows. Let 𝜎0 be the duration of the empty slot time; 𝑇𝑠(π‘š) represents the average time the channel is sensed busy due to successful transmission of rate 𝑅𝑖(π‘š) STA; 𝑇𝑐(π‘š) be the average time the channel is sensed as busy due to transmission failure of rate 𝑅(π‘š) STA. Assuming that STAs within group 𝑖 can operate at two 𝑖 (2) distinct data rates 𝑅(1) 𝑖 and 𝑅𝑖 (bps), 𝐸[𝜎] is given by

𝐿+1 (1 βˆ’ 𝑝(π‘š) 𝑐,𝑖 )

𝐴2 = 𝛽0

𝐾 βˆ‘ π‘ˆπ‘–π‘…πΊ 𝑇𝑖 𝑖=1

where parameters 𝐴1 –𝐴5 are defined as follows: 𝐴1 =

(11)

(6c)

0,𝑖

πœ‹π‘–(π‘š) (π‘₯, 𝑦) +

(10)

(π‘š) where 𝑝(π‘š) π‘‘π‘Ÿ,𝑖 is the probability that at least one STA with rate 𝑅𝑖 belonging to group 𝑖 transmits in a given slot time, which is given by

πœ‹π‘–(π‘š) (𝐷π‘₯ );

𝑦 ∈ (0, π‘Šπ‘–,0 βˆ’ 1) ( ) (π‘š) (π‘š) π‘Šπ‘–,π‘₯ βˆ’ 1 (𝑝𝑐,𝑖 )π‘₯ πœ‹π‘– (0, 0) πœ‹π‘–(π‘š) (π‘₯, 1) = ; π‘₯ ∈ (0, 𝐿) π‘Šπ‘–,π‘₯ 1 βˆ’ 𝑝(π‘š) βˆ’ 𝑝(π‘š) 𝑓 ,𝑖 0,𝑖 ) (π‘š) (π‘š) ( π‘Šπ‘–,π‘₯ βˆ’ 1 (𝑝𝑐,𝑖 )π‘₯ πœ‹π‘– (0, 0) ( (π‘š) (π‘š) ) 𝑝0,𝑖 βˆ•(𝑝2,𝑖 ) ; πœ‹π‘–(π‘š) (𝐷π‘₯ ) = π‘Šπ‘–,π‘₯ 1 βˆ’ 𝑝(π‘š) βˆ’ 𝑝(π‘š) 𝑓 ,𝑖

𝑝(π‘š) π‘‘π‘Ÿ,𝑖

π‘₯ ∈ (0, 𝐿), 𝑦 = (2, π‘Šπ‘–,π‘₯ βˆ’ 1) (6b)

πœ‹π‘–(π‘š) (0, 𝑦) =

π‘’β‰ π‘š

𝑝(π‘š) 𝑠,𝑖 =

(8)

The probability that the tagged group 𝑖, rate 𝑅(π‘š) STA suffers collision 𝑖 is [ ] (𝑒) (π‘š) (𝑒) ( ( (𝑒) )𝑛𝑖 ( (π‘š) (π‘š) )𝑛𝑖 βˆ’1 𝑀 (𝑒) )𝑛𝑖 π‘šβˆ’1 𝑝𝑐,𝑖 = 1 βˆ’ 𝛱𝑒=1 1 βˆ’ πœπ‘– 1 βˆ’ πœπ‘– 𝛱𝑒=π‘š+1 1 βˆ’ πœπ‘– (9)

3. Analytical model for network throughput under data rate based grouping In this section, we present a simple algorithm for realizing the data rate based grouping in IEEE 802.11ah WLAN. After this, we present an 158

U. Sangeetha and A.V. Babu

Computer Communications 151 (2020) 154–164

analytical model to find the throughput of the group as well as that of the network under data rate based grouping, based on the analytical model described in Section 2. Here the STAs operating at the same data rate are grouped together.

𝑝(π‘š) 𝑠 =

Here, we present an algorithm for data rate based grouping in 802.11ah WLAN. Algorithm 1 describes the procedure for implementing data rate based grouping. During the network initialization phase, the AP broadcasts beacon frames with information elements. Association of the STAs with the AP is carried out by listening to the beacon information. The PLCP (i.e; PHY layer convergence protocol) header of the association request frame includes information about the data rates of the STAs. Thus the AP collects the information regarding the data rates of the STAs, and thus it can form groups according to the data rate. Define 𝐴(π‘š) as an array associated with rate 𝑅(π‘š) STAs. A tagged STA is appended to this array if it transmits at rate 𝑅(π‘š) . Assume that M such arrays are formed corresponding to rates 𝑅(π‘š) ; π‘š = 1, ..𝑀. Once the association procedure is over, the AP assigns 13-bit association identifier (AID) to every STA within group π‘š(π‘š = 1, … , 𝑀), where the last ⌈(π‘™π‘œπ‘”2 𝑀)βŒ‰ LSB bits uniquely represent the ID of group π‘š. After the procedure is finished, the AP transmits RAW parameter set (RPS) down streams, which include information such as the number of groups and the corresponding data rates. Notice that the proposed procedure for data rate based grouping can be realized without any major modifications to IEEE 802.11ah specifications.

πœ‹ (π‘š) (0, 0) =

𝐡1 =

(20a)

𝐿+1 (1 βˆ’ 𝑝(π‘š) 𝑐 )

𝐡2 = 𝛼0

(20b) 1 βˆ’ 𝑝𝑐(π‘š) [ 𝐿+1 π‘Š 2(𝐿) (2 βˆ’ 𝑝(π‘š) ) βˆ’ [(1 βˆ’ 𝑝(π‘š) )(2𝐿+1 ) βˆ’ (𝑝(π‘š) )𝐿+1 ] ] (1 βˆ’ 𝑝(π‘š) 𝑐 ) 𝑐 𝑐 𝑐 0 (π‘š) 𝐿 (1 βˆ’ 𝑝(π‘š) 𝑐 )π‘Š0 2 (2 βˆ’ 𝑝𝑐 )

(20c)

𝐡3 =

[

[

𝐿+1 (1 βˆ’ 2𝑝(π‘š) 𝑐 ) βˆ’ (π‘š) (π‘š) 1 βˆ’ 𝑝𝑓 1 βˆ’ 2𝑝𝑐 ( 𝐿+1 𝐿+1 )]] 𝑝(π‘š) (2 ) βˆ’ (𝑝(π‘š) 𝑐 ) + 𝐿𝑐 2 π‘Š0 2 βˆ’ 𝑝(π‘š) 𝑐

1

π‘Š0 2𝑝𝑐(π‘š)

3𝑝𝑐(π‘š) 𝐡1 2

[ (π‘š) (1 βˆ’ 𝑝𝑐(π‘š) )𝐿+1 𝑝0 𝛼0 (π‘š) + 𝑝𝑐 𝐡1 π‘Š0 π‘Š0 ( (π‘š) 𝐿 ] (π‘š) 𝐿 ) 𝛼 (π‘Š βˆ’ 1) 1 𝑝𝑐 (2 βˆ’ (𝑝𝑐 ) ) + 0 0 βˆ’ π‘Š0 π‘Š02 (2 βˆ’ 𝑝𝑐(π‘š) )2𝐿 [( ) [ (π‘š) 𝐿 π‘Š0 βˆ’ 1 𝑝 (1 βˆ’ (𝑝(π‘š) 1 𝑐 ) ) 𝐡5 = 𝑝(π‘š) 𝛼0 + 𝑐 0 π‘Š0 𝑝(π‘š) 1 βˆ’ 𝑝(π‘š) 𝑐 2 (π‘š) ( 𝐿 (π‘š) 𝐿 )]] 𝑝𝑐 2 βˆ’ (𝑝𝑐 ) βˆ’ π‘Š0 2𝐿 (2 βˆ’ 𝑝(π‘š) ) 𝑐

(20d)

𝐡4 =

(20e)

(20f)

Here 𝛼0 = 1βˆ•(1 βˆ’ 𝑝(π‘š) βˆ’ 𝑝(π‘š) ) and 𝑝(π‘š) , 𝑝(π‘š) , 𝑝2(π‘š) are the probabilities 𝑓 0 0 1 associated with the deferring of STAs belonging to group π‘š, when the BO counter values reach unity, as described in Section 2. The transmission attempt probability of group π‘š STA can be determined as follows:

(16)

𝜏 (π‘š) =

𝑝(π‘š) π‘‘π‘Ÿ

𝐿 βˆ‘ π‘₯=0

where is the probability that at least one STA within group π‘š transmit the frame and 𝑝(π‘š) is the probability that this transmission is 𝑠 (π‘š) successful. Now 𝑝(π‘š) and 𝑝 are given by 𝑠 π‘‘π‘Ÿ (π‘š)

1 𝐡1 + 𝐡2 + 𝐡3 + 𝐡4 + 𝐡5

where the parameters 𝐡1 to 𝐡5 are defined as:

Here, we describe an analytical model to find the throughput of the network under data rate based grouping strategy. Consider 802.11ah WLAN, where STAs are configured to operate at distinct data rates. Assume that the STAs in the network can operate at M distinct data rates, 𝑅(π‘š) (π‘š = 1, 2, … , 𝑀). Suppose we consider a grouping method for the STAs in the network, in which each STA operating with the same data rate are grouped together. Thus there can be at most M groups in the network; all the STAs in a given group π‘š operate at the same data rate 𝑅(π‘š) , π‘š = 1, 2, … , 𝑀. Let there be 𝑛(π‘š) STAs per group so that 𝑀 𝑛(π‘š) = 𝑁, where N is the total number of STAs in the network. Let π›΄π‘š=1 𝑇𝑅 be the total RAW duration available within a beacon interval and it is assumed that 𝑇 (π‘š) is the RAW slot duration allotted to group π‘š such 𝑀 𝑇 (π‘š) = 𝑇 . The saturation throughput of group π‘š under data that π›΄π‘š=1 𝑅 rate grouping (DRG) is computed as follows:

(π‘š) 𝑛 𝑝(π‘š) ) π‘‘π‘Ÿ = 1 βˆ’ (1 βˆ’ 𝜏

(19)

To determine the frame transmission probability corresponding to STAs belonging to group π‘š, the DTMC model shown in Fig. 2 can be used with appropriate modifications. Let {𝑆 (π‘š) (𝑑), 𝐡 (π‘š) (𝑑)} be the twotuple that represents the BO stage and the BO counter of the tagged group π‘š STA undergoing the DCF protocol. Now the RAW slot duration allotted to group π‘š is 𝑇 (π‘š) = π‘‡π‘Ž(π‘š) + π‘‡β„Ž + 𝑇𝑔 , as given in (1). The DTMC model applicable for the tagged STA can be solved as in Section 2. Let πœ‹ (π‘š) (π‘₯, 𝑦) == limπ‘‘β†’βˆž 𝑃 {𝑆 (π‘š) (𝑑) = π‘₯, 𝐡 (π‘š) (𝑑) = 𝑦} be the steady state probability distribution of the DTMC corresponding to a STA within group π‘š. Analytical equation for πœ‹ (π‘š) (π‘₯, 𝑦) can be derived by following the steps described in Section 2. The following expression can be obtained for πœ‹ (π‘š) (0, 0);which is the steady state probability of reaching the state (0,0):

3.2. Throughput calculation under data rate based grouping

𝐸[𝜎 (π‘š) ]

(π‘š) βˆ’1

𝜏 (π‘š)

Initially, AP creates M arrays with index 1 to M Initialize arrays 𝐴(π‘š) π‘š = 1..𝑀 as empty ; for k = 1 to N do if π‘ π‘˜ transmits with rate 𝑅(π‘š) then 𝑖𝑛𝑑𝑒π‘₯π‘π‘‘π‘Ÿ = index(𝑅(π‘š) ) Choose array 𝐴(π‘š) pointed by 𝑖𝑛𝑑𝑒π‘₯π‘π‘‘π‘Ÿ 𝐴(π‘š) <- {𝐴(π‘š) ,π‘ π‘˜ } end if end for STAs in 𝐴(π‘š) forms group 𝐺(π‘š) AP assigns 13-bit AID for STA within group π‘š (m=1,.M) Set Group ID as last ⌈(π‘™π‘œπ‘”2 𝑀)βŒ‰ LSB-bit of AID of every STA is unique to the corresponding group.

(π‘š) 𝑝(π‘š) π‘‘π‘Ÿ 𝑝𝑠 𝐸[𝑋]

(18)

𝑝(π‘š) π‘‘π‘Ÿ

(π‘š) 𝑛 𝑝(π‘š) ) 𝑐 = 1 βˆ’ (1 βˆ’ 𝜏

Algorithm 1 Procedure for data rate based grouping

π‘ˆ (π‘š),𝐷𝑅𝐺 =

𝑛(π‘š) 𝜏 (π‘š) (1 βˆ’ 𝜏 (π‘š) )

where 𝜏 (π‘š) (π‘š = 1, 2, … , 𝑀) is the transmission attempt probability of a tagged STA belonging to group m, which is computed as follows. Consider STAs belonging to group m, which operate with data rate 𝑅(π‘š) (π‘š = 1, 2, … , 𝑀). Let π‘Š0 be the minimum CW of STAs belonging to group m. During the allocated RAW slot duration 𝑇 (π‘š) , STAs belonging to group m compete for channel access based on the DCF protocol. Simultaneous transmissions by two STAs within a group π‘š will lead to collisions. Let 𝑝(π‘š) be the conditional collision probability experienced 𝑐 by the tagged STA belonging to group m, which is given by

3.1. Algorithm for data rate based grouping

1: 2: 3: 4: 5: 6: 7: 8: 9: 10: 11: 12:

𝑛(π‘š) βˆ’1

πœ‹ (π‘š) (π‘₯, 0) =

𝐿+1 1 βˆ’ (𝑝(π‘š) 𝑐 )

1 βˆ’ 𝑝(π‘š) 𝑐

πœ‹ (π‘š) (0, 0)

(21)

In (22), 𝑝(π‘š) is the BO counter freezing probability which is given by 𝑓 𝑝(π‘š) = 𝑓

(17) 159

(

) ( ) 𝑇𝑅 βˆ’ π‘‡π‘Ž(π‘š) π‘‡π‘Ž(π‘š) (π‘š) 𝑝𝑏 + 𝑇𝑅 𝑇𝑅

(22)

U. Sangeetha and A.V. Babu

Computer Communications 151 (2020) 154–164

(𝑖 = 1, ..𝐾; π‘š = 1, ..𝑀). Define the normalized throughput of rate 𝑅(π‘š) 𝑖

Table 1 System parameters [1].

STAs belonging to group 𝑖 as 𝑦𝑖(π‘š),𝑅𝐺 =

Parameters

Value

Packet payload (bytes) MAC header 𝑇𝑃 𝐿𝐢𝑃 RTS (bytes) CTS (bytes) 𝑇𝑆𝐼𝐹 𝑆 𝑇𝐷𝐼𝐹 𝑆 Slot time (𝜎0 ) πΆπ‘Šπ‘šπ‘–π‘› πΆπ‘Šπ‘šπ‘Žπ‘₯ ACK (bytes) Propagation Loss Model Modulation coding schemes

768, 512 224 bits 20 ΞΌs 20 14 160 ΞΌs 264 ΞΌs 52 ΞΌs 16 1024 14 Outdoor, macro [3] MCS0, MCS1, MCS2, MCS4, MCS7, MCS9

𝑝(π‘š) , 𝑝(π‘š) , 𝑝(π‘š) and 𝑝(π‘š) . We use [21,22] to solve the system of linear 𝑏 0 2 1 equations. Once 𝜏 (π‘š) and 𝑝(π‘š) are known, various probabilities such as 𝑐 (π‘š) 𝑝(π‘š) etc. can be determined and π‘ˆ (π‘š),𝐷𝑅𝐺 can be calculated by π‘‘π‘Ÿ , 𝑝𝑠 using (16), provided 𝐸[𝜎 (π‘š) ] is known. Now 𝐸[𝜎 (π‘š) ] is the average slot duration relating to the DCF protocol used by the STAs within group m for channel access. Since all the STAs within group m use the same data rate, 𝐸[𝜎 (π‘š) ] can be determined as follows: (23)

𝑇𝑐(π‘š)

where and are given by (15). Finally, the aggregate network 𝐷𝑅𝐺 ) is given by throughput under data rate based grouping (i.e; π‘ˆπ‘‘π‘œπ‘‘ 𝐷𝑅𝐺 π‘ˆπ‘‘π‘œπ‘‘ =

𝑀 βˆ‘ π‘š=1

π‘ˆ (π‘š),𝐷𝑅𝐺 𝑇 (π‘š) 𝑇𝑅

Notice that 𝐹𝐽 = 1 iff 𝑦(π‘š),𝐷𝑅𝐺 = 𝑦 βˆ€ π‘š = 1, ..𝑀, which implies that each STA belonging to rate 𝑅(π‘š) will get a throughput proportional to its data rate. Thus we compare the fairness in resource allocation among the STAs of distinct data rates under random grouping as well as data rate based grouping scheme. Next, we present the performance evaluation results. First of all, we assume that the STAs can operate at any one of the two data rates, i.e; 600 kbps and 2.4 Mbps. Let us assume that K = 2 and each group contains equal number of STAs. We consider distinct values of N as well. Table 2 shows the throughput of the group as well as the aggregate throughput of the network under RG and DRG. The percentage improvement of aggregate throughput can also be seen in Table 2. Table 3 shows the results for the three data rates case with STAs operating at any one of the three data rates, 600 kbps, 2.7 Mbps and 4 Mbps. All the MAC layer parameters are assumed to be the same for all the STAs in the network regardless of their data rates. The results show that the aggregate throughput of the network improves significantly when the DRG scheme is employed. The reason for this behaviour can be explained as follows: In random grouping, a group will contain STAs operating at distinct data rates. A lower rate STA will compete for channel access with a higher rate STA within the same group. Once a lower rate STA wins the channel, it occupies the channel for a longer time as compared with a higher data rate STA. Thus the throughput performance of the group is dominated by the lower data rate STAs. The aggregate throughput of the network also gets degraded significantly under random grouping. When data rate based grouping is employed, all the STAs within a group operate at the same data rate. Thus the issue of lower data rate STAs occupying the channel for a longer time, when competing with higher rate STA can be avoided. Thus the throughput performance of each group depends on the data rate at which each STA within the group operate. Accordingly, the aggregate throughput improves under data rate based grouping. Results in Tables 2 and 3 further show that under RG, all the groups in the network achieve the same throughput. This happens owing to the

(24)

4. Numerical and simulation results In this section, we present the analytical and simulation results for the throughput performance of 802.11ah WLAN with heterogeneous data rates. The analytical results, which are obtained from the mathematical models of sections 2 and 3 are validated by conducting extensive simulations using network simulator version 3 (NS3) [23]. The RAW based channel access protocol has been simulated according to the PHY and MAC layer parameters of 802.11ah standard. The system parameters used for the analysis as well as simulations are listed in Table 1. An infrastructure based basic service set (BSS) has been simulated with one AP and N number of STAs, which are uniformly distributed around the AP. Uplink data transfer has been assumed with RTS/CTS scheme. We ignore the impact of hidden nodes on the analysis of network throughput. The total RAW duration has been selected as 500 ms and it is divided equally among the groups in the network. Notice that the duration of RAW has been selected such that at least one frame transaction can be ensured within a group, when the number of groups (K) is equal to 256. We consider data rate based grouping and random (i.e; data rate independent) grouping for the performance evaluation of the network throughput. In addition to the evaluation of network throughput, we evaluate the fairness in resource allocation among the STAs under random grouping and data rate based grouping strategies. Here we are trying to compare the fairness in resource allocation among the STAs of distinct data rates. In random grouping, each group contains STAs operating at distinct data rates. Recall that π‘ˆπ‘–(π‘š),𝑅𝐺 is the throughput of rate 𝑅(π‘š) 𝑖 STAs belonging to group 𝑖 under random grouping. Let 𝑒(π‘š),𝑅𝐺 = 𝑖

. We use the following

The above calculation assumes that all the STAs in group 𝑖 use the same frame size and keep all the MAC layer parameters to be the same regardless of their data rate. A resource allocation is fair if and only if 𝐹𝐽 ,𝑖 = 1, which implies that 𝑦𝑖(π‘š),𝑅𝐺 = 𝑦𝑖 βˆ€ π‘š = 1, ..𝑀, i.e.; all the STAs in the group achieve equal normalized throughput, normalized with reference to their data rate. The motivation for choosing normalized throughput as the metric for evaluating the fairness of resource allocation can be explained as follows. We are considering a heterogeneous environment in which each group contains STAs with distinct data rates 𝑅𝑖(π‘š) , π‘š = 1...𝑀. In this scenario, the resource allocation is fair if each STA gets a throughput proportional to its data rate. As mentioned before, 𝐹𝐽 ,𝑖 = 1 iff 𝑦(π‘š),𝑅𝐺 = 𝑦𝑖 βˆ€ π‘š = 1, ..𝑀. Thus fair resource allocation 𝑖 implies that throughput of each STA will become proportional to its data rate. We evaluate the fairness of resource allocation under data rate based grouping scheme as well. In this case, each group contains STAs operating at the same data rate. Let π‘ˆ (π‘š) and 𝑒(π‘š) be the total and perSTA throughput corresponding to group π‘š (π‘š = 1, ..𝑀). Further, let (π‘š),𝐷𝑅𝐺 𝑦(π‘š),𝐷𝑅𝐺 = 𝑒 𝑅(π‘š) be the normalized throughput of STAs belonging to (π‘š) rate 𝑅 , in group π‘š. The Jain’s fairness index is defined as βˆ‘ (π‘š),𝐷𝑅𝐺 )2 ( 𝑀 π‘š=1 𝑦 𝐹𝐽 = (26) 2 βˆ‘ (π‘š),𝐷𝑅𝐺 ) 𝑀 𝑀 π‘š=1 (𝑦

(π‘š)

𝑇𝑠(π‘š)

(π‘š)

𝑅𝑖

Jain’s fairness index to measure the fairness in resource allocation under random grouping [24]: (βˆ‘π‘€ (π‘š),𝑅𝐺 )2 π‘š=1 𝑦𝑖 (25) 𝐹𝐽 ,𝑖 = 2 βˆ‘π‘€ 𝑀 π‘š=1 (𝑦𝑖(π‘š),𝑅𝐺 )

where 𝑝(π‘š) = 1 βˆ’ (1 βˆ’ 𝜏 (π‘š) )𝑛 . is the probability with which STAs 𝑏 belonging to group π‘š will sense the channel as busy. Now (19)–(21) can be solved numerically to determine 𝜏 (π‘š) and 𝑝(π‘š) for a given set 𝑐 of parameters such as 𝐿, π‘Š0 , 𝑛(π‘š) etc. However, solving (19)–(21) simultaneously requires knowledge of other probabilities such as 𝑝𝑓(π‘š) ,

(π‘š) (π‘š) (π‘š) π‘š) (π‘š) 𝐸[𝜎 (π‘š) ] = (1 βˆ’ 𝑝(π‘š) + 𝑝(π‘š) π‘‘π‘Ÿ )𝜎0 + π‘π‘‘π‘Ÿ 𝑝𝑠 𝑇𝑠 π‘‘π‘Ÿ (1 βˆ’ 𝑝𝑠 )𝑇𝑐

(π‘š),𝑅𝐺

𝑒𝑖

(π‘š),𝑅𝐺

π‘ˆπ‘–

(π‘š)

𝑛𝑖

be the per-STA throughput of rate 𝑅(π‘š) STAs belonging to group 𝑖 𝑖 160

U. Sangeetha and A.V. Babu

Computer Communications 151 (2020) 154–164

Table 2 Saturation throughput (kbps): Random grouping scheme (RG) vs Data rate based grouping scheme (DRG) (𝑅(1) = 600 kbps, 𝑅(2) = 2.4 Mbps, K = 2, E[X] = 768 bytes). Random Grouping (RG) No: of rate 𝑅(π‘š) (π‘š = 1, 2) (2) STAs in group 2 (1) 𝑛2 , 𝑛(2) 2

Total no: of STAs in the network (N)

No: of rate 𝑅(π‘š) (π‘š = 1, 2) (1) STAs in group 1 (1) 𝑛1 , 𝑛(2) 1

Total throughput of group 1 (π‘ˆ1𝑅𝐺 ) Analysis

Simulation

80 160 180 240

20,20 40,40 45,45 60,60

738.55 736.12 730.14 728.92

737.40 735.67 729.14 727.45

Total throughput of group 2 (π‘ˆ2𝑅𝐺 )

Aggregate throughput 𝑅𝐺 (π‘ˆπ‘‘π‘œπ‘‘ )

Analysis

Simulation

Analysis

Simulation

20,20 40,40 45,45 60,60

738.55 736.12 730.14 728.92

737.40 735.67 729.14 727.45

738.55 736.12 730.14 728.92

737.40 735.67 729.14 727.45

No: of rate 𝑅(2) STAs in group 2 𝑛(2)

Total throughput of group 2 (π‘ˆ (2),𝐷𝑅𝐺 ) Analysis

Simulation

Analysis

Simulation

40 60 90 120

1610.80 1603.20 1594.40 1587.2

1609.10 1602.24 1593.60 1586.30

1054.70 1050.30 1045.40 1041.11

1053.23 1049.80 1044.40 1040.69

Data rate based grouping (DRG) Total no: of STAs in the network (N)

No: of rate 𝑅(1) STAs in group 1 𝑛(1)

80 120 180 240

40 60 90 120

Total throughput of group 1 (π‘ˆ (1),𝐷𝑅𝐺 ) Analysis

Simulation

498.54 497.41 496.10 495.01

496.99 496.87 495.23 494.89

Aggregate throughput 𝐷𝑅𝐺 π‘ˆπ‘‘π‘œπ‘‘

Percentage improvement aggregate throughput: Random grouping vs Data rate based grouping scheme for three data rates No: of STAs (N)

80

120

180

240

𝐷𝑅𝐺 𝑅𝐺 βˆ’ π‘ˆπ‘‘π‘œπ‘‘ ( π‘ˆπ‘‘π‘œπ‘‘ ) *100 𝑅𝐺 π‘ˆπ‘‘π‘œπ‘‘

42.80%

42.60%

43.18%

42.83%

fact that the number of STAs operating with distinct data rates and the total number of STAs in each group, are assumed to be equal. Further, the MAC layer parameters such as the minimum contention window and frame size of all the STAs are assumed to be equal. Furthermore, we assume the RAW slot durations assigned to each group to be equal. Under these conditions, the DCF protocol provides throughput based fairness [2]. Another important observation is that, under DRG, throughput of group 1 is observed to be lower as compared to the throughput obtained under RG, as can be seen in Tables 2 and 3. Recall that, under DRG, the group 1 will contain STAs operating at the same data rate. Accordingly, when DRG is employed the throughput performance of each group depends on the data rate to which it belongs. In Tables 2 and 3, group 1 under DRG corresponds to a lower data rate group; thus the throughput of group 1 is observed to be lower under DRG, as compared to that obtained under RG. However, notice that group 1 does not suffer throughput degradation under DRG. In fact, the per-STA throughput of a tagged STA belonging to group 1 under DRG is the same as the throughput that it will achieve in a single rate WLAN with 𝑛(1) STAs operating at data rate 𝑅(1) . Thus the throughput of lower data rate STAs (i.e; lower data rate group) is not penalized under DRG. Figs. 3 and 4 show the results for the aggregate throughput (under RG and DRG) for the two data rate and the three data rate cases respectively. Here we consider distinct values for the number of groups (K) in the network. Results show that DRG improves the aggregate throughput significantly as compared to RG. Further, increase of K improves the aggregate throughput. As K increases, the number of STAs within each group reduces. Consequently the level of contention is reduced within each group, leading to enhancement of throughput. Figs. 5 and 6 respectively show the aggregate throughput variation against frame size for the two-data rate and the three data rate cases. The results show that aggregate throughput increases as the frame size is increased. Table 4 shows the comparison of JFI under RG and DRG for distinct values of N and K. We repeat the calculations of the throughput achieved under RG and DRG, for distinct values of N and K. The normalized throughputs achieved by each STA corresponding to distinct data rates are calculated. The JFI is determined as described in the initial part of this section. The results confirm that DRG leads to fair resource allocation among the STAs operating at distinct data rates as the JFI has been observed to be higher as compared to the

Fig. 3. Aggregate throughput vs no: of STAs [𝑅(1) = 600 kbps, 𝑅(2) = 1.2 Mbps, E[X] = 512 bytes].

Fig. 4. Aggregate throughput vs no: of STAs [𝑅(1) = 600 kbps, 𝑅(2) = 2.4 Mbps, 𝑅(3) = 3.6 Mbps, E[X] = 768 bytes].

161

U. Sangeetha and A.V. Babu

Table 3 Saturation throughput (kbps): Random grouping scheme (RG) vs Data rate grouping (DRG) (𝑅(1) = 600 kbps, 𝑅(2) = 2.7 Mbps, 𝑅(3) = 4 Mbps, K = 3, E[X] = 768 bytes). Random Grouping (RG) Total no: of STAs in the network (N)

No: of rate 𝑅(π‘š) (π‘š = (1) 1, 2, 3) STAs in group 1 𝑛(1) , 𝑛(2) , 𝑛(3) 1 1 1

Total throughput of group 1 𝑅𝐺 (π‘ˆ(1) ) Analysis

Simulation

180 270 360 450

20, 30, 40, 50,

1045.05 1040.43 1034.70 1030.92

1043.90 1039.34 1033.27 1029.67

20, 30, 40, 50,

20 30 40 50

No: of rate 𝑅(π‘š) (π‘š = (2) 1, 2, 3) STAs in group 2 𝑛(1) , 𝑛(2) , 𝑛(3) 2 2 2 20, 30, 40, 50,

20, 30, 40, 50,

20 30 40 50

Total throughput of group 2 𝑅𝐺 (π‘ˆ(2) ) Analysis

Simulation

1045.05 1040.43 1034.70 1030.92

1043.90 1039.34 1033.27 1029.67

No: of rate 𝑅(π‘š) (π‘š = (3) 1, 2, 3) STAs in group 3 𝑛(1) , 𝑛(2) , 𝑛(3) 3 3 3

Total throughput of group 3 𝑅𝐺 (π‘ˆ(3) ) Analysis

Simulation

Analysis

Simulation

20, 30, 40, 50,

1045.05 1040.43 1034.70 1030.92

1043.90 1039.34 1033.27 1029.67

1045.05 1040.43 1034.70 1030.92

1043.90 1039.34 1033.27 1029.67

20, 30, 40, 50,

20 30 40 50

Aggregate throughput 𝑅𝐺 (π‘ˆπ‘‘π‘œπ‘‘ )

162

Data rate based grouping (DRG) Total no: of STAs in the network (N)

No: of rate 𝑅(1) STAs in group 1 𝑛(1)

180 270 360 450

60 90 120 150

No: of rate 𝑅(2) STAs in group 2 𝑛(2)

Total throughput of group 1 (π‘ˆ (1) , 𝐷𝑅𝐺) Analysis

Simulation

497.39 496.07 495.01 494.10

496.78 495.78 494.80 493.32

60 90 120 150

Total throughput of group 2 (π‘ˆ (2) , 𝐷𝑅𝐺) Analysis

Simulation

1747.10 1736.80 1728.40 1721.20

1746.34 1735.45 1727.72 1720.56

No: of rate 𝑅(3) STAs in group 3 𝑛(3)

Total throughput of group3 (π‘ˆ (3) , 𝐷𝑅𝐺)

Aggregate throughput 𝐷𝑅𝐺 π‘ˆπ‘‘π‘œπ‘‘

Analysis

Simulation

Analysis

Simulation

60 90 120 150

2278.80 2262.20 2248.70 2237.78

2276.56 2261.80 2247.43 2235.80

1507.56 1497.70 1490.80 1484.13

1506.36 1497.67 1489.90 1483.22

Percentage improvement aggregate throughput: Random grouping vs Data rate based grouping scheme for three data rates 180

270

360

450

𝐷𝑅𝐺 𝑅𝐺 βˆ’ π‘ˆπ‘‘π‘œπ‘‘ ( π‘ˆπ‘‘π‘œπ‘‘ ) *100 𝑅𝐺 π‘ˆπ‘‘π‘œπ‘‘

44.26%

43.95%

42.65%

42.02%

Computer Communications 151 (2020) 154–164

No: of STAs (N)

U. Sangeetha and A.V. Babu

Computer Communications 151 (2020) 154–164

5. Conclusion In this paper, an analytical model was proposed to find the saturation throughput of IEEE 802.11ah wireless LAN under the restricted access window (RAW) based channel access scheme, assuming that stations (STAs) operate at distinct data rates. Two strategies were considered for STA grouping, i.e., conventional random grouping and data rate based grouping. In the former case, the STAs within a group can operate at distinct data rates while under data rate based grouping, all the STAs within a group will operate at the same data rate. A simple procedure to implement data rate grouping was described. We have used the network simulator (NS3) to investigate the effectiveness of the considered grouping schemes in a WLAN scenario that follows 802.11ah PHY and MAC layer specifications. We have also compared the results obtained from the developed mathematical model against the simulation results. It was observed that data rate based grouping can provide significant improvement in aggregate network throughput as compared to the conventional random grouping scheme when STAs employ heterogeneous data rates for transmission. Further, it was shown that data rate based grouping scheme can ensure fair resource allocation among the competing STAs, i.e., all the competing STAs in the network achieve throughput proportional to their data rates.

Fig. 5. Aggregate throughput vs packet payload size [𝑅(1) = 600 kbps, 𝑅(2) = 2.4 Mbps, N = 320].

Declaration of competing interest The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper. CRediT authorship contribution statement U. Sangeetha: Conceptualization, Methodology, Software, Validation, Formal analysis, Investigation, Resources, Data curation, Writing original draft. A.V. Babu: Conceptualization, Methodology, Validation, Formal analysis, Investigation, Writing - review & editing, Supervision. Acknowledgement Fig. 6. Aggregate throughput vs packet payload size [𝑅(1) = 600 kbps, 𝑅(2) = 2.7 Mbps, 𝑅(3) = 4 Mbps, N = 300].

Authors would like to thank Department of Science and Technology, Government of India for supporting this work under the FIST scheme No. SR/FST/ET-I/2017/68.

Table 4 Comparison of Jain’s fairness index (WLAN with two data rates: 𝑅(1) = 600 kbps, 𝑅(2) = 2.4 Mbps). Total no: of STAs (N)

K = 2

80 120 180 240

References

Jain’s fairness index K = 4

K = 8

RG

DRG

RG

DRG

RG

DRG

0.74 0.74 0.74 0.74

0.99 0.99 0.99 0.99

0.74 0.74 0.74 0.74

0.99 0.99 0.99 0.99

0.76 0.73 0.77 0.76

0.99 0.99 0.99 0.99

[1] IEEE standard for information technology–telecommunications and information exchange between systems - local and metropolitan area networks–specific requirements - part 11: Wireless LAN medium access Control (MAC) and physical layer (PHY) specifications amendment 2: Sub 1 GHz License Exempt Operation, IEEE Std 802.11ah-2016 (Amendment to IEEE Std 802.11-2016, as amended by IEEE Std 802.11ai-2016), 2017, pp. 1–594. [2] G. Bianchi, Performance analysis of the IEEE 802.11 distributed coordination function, IEEE J. Sel. Areas Commun. 18 (3) (2000) 535–547. [3] A. Hazmi, B. Badihi, A. Larmo, J. Torsner, M. Valkama, et al., Performance analysis of IoT-enabling IEEE 802.11 ah technology and its RAW mechanism with non-cross slot boundary holding schemes, in: 2015 IEEE 16th International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM, IEEE, 2015, pp. 1–6. [4] N. Nawaz, M. Hafeez, S. Zaidi, D. McLernon, M. Ghogho, Throughput enhancement of restricted access window for uniform grouping scheme in IEEE 802.11 ah, in: 2017 IEEE International Conference on Communications, ICC, IEEE, 2017, pp. 1–7. [5] C.W. Park, D. Hwang, T.-J. Lee, Enhancement of IEEE 802.11ah MAC for M2M communications, IEEE Commun. Lett. 18 (7) (2014) 1151–1154. [6] L. Zheng, M. Ni, L. Cai, J. Pan, C. Ghosh, K. Doppler, Performance analysis of group-synchronized DCF for dense IEEE 802.11 networks, IEEE Trans. Wirel. Commun. 13 (11) (2014) 6180–6192. [7] L. Tian, J. Famaey, S. LatrΓ©, Evaluation of the IEEE 802.11ah restricted access window mechanism for dense IoT networks, in: 2016 IEEE 17th International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM, Coimbra, Portugal, June, 2016, pp. 1–9.

values obtained for the RG case. Under RG, when lower rate STAs compete with higher rate STAs, channel is occupied for a larger time period by the lower rate STA. Thus the effective throughput of higher data rate STA becomes almost equal to that of lower rate STA. Under DRG, we avoid channel contention among lower and higher data rate STAs by grouping them separately in distinct groups. Thus each STA will achieve a throughput which is proportional to its data rate. Hence we propose that, when STAs use distinct data rates in IEEE 802.11ah WLAN, data rate based grouping method has to be employed to ensure fair and efficient resource allocation among the competing STAs. 163

U. Sangeetha and A.V. Babu

Computer Communications 151 (2020) 154–164 [16] N. Ahmed, D. De, M.I. Hussain, A QoS-aware MAC protocol for IEEE 802.11 ahbased Internet of Things, in: 2018 Fifteenth International Conference on Wireless and Optical Communications Networks, WOCN, Kolkata, India, June, pp. 1–5. [17] L. Beltramelli, P. Osterberg, U. Jennehag, M. Gidlund, Hybrid MAC mechanism for energy efficient communication in IEEE 802.11 ah, in: 2017 IEEE International Conference on Industrial Technology, ICIT, IEEE, Toronto, Canada, 2017, pp. 1295–1300. [18] J. Kim, I. Yeom, QoS enhanced channel access in IEEE 802.11 ah networks, in: 2017 17th International Symposium on Communications and Information Technologies, ISCIT, IEEE, Cairns, Australia, 2017, pp. 1–6. [19] E. Ziouva, T. Antonakopoulos, CSMA/CA performance under high traffic conditions: throughput and delay analysis, Comput. Commun. 25 (3) (2002) 313–321. [20] Y. Xiao, Performance analysis of priority schemes for IEEE 802.11 and IEEE 802.11e wireless LANs, IEEE Trans. Wirel. Commun. 4 (4) (2005) 1506–1515. [21] K. Levenberg, A method for the solution of certain non-linear problems in least squares, Q. Appl. Math. 2 (2) (1944) 164–168. [22] D.W. Marquardt, An algorithm for least-squares estimation of nonlinear parameters, J. Soc. Ind. Appl. Math. 11 (2) (1963) 431–441. [23] Nsnam.org, The ns-3 network simulator, 2018, https://www.nsnam.org/, (Accessed 23 January 2018). [24] R.K. Jain, D.-M.W. Chiu, W.R. Hawe, A Quantitative Measure of Fairness and Discrimination, Eastern Research Laboratory, Digital Equipment Corporation, Hudson, MA, 1984.

[8] U. Sangeetha, A.V. Babu, Performance analysis of IEEE 802.11 ah wireless local area network under the restricted access window-based mechanism, Int. J. Commun. Syst. 32 (4) (2019) e3888. [9] Z. Ali, J. Misic, V.B. Misic, Performance evaluation of heterogeneous IoT nodes with differentiated QoS in IEEE 802.11 ah RAW mechanism, IEEE Trans. Veh. Technol. 68 (4) (2019) 3905–3918. [10] M.Z. Ali, J. MiΕ‘iΔ‡, V. Misic, Efficiency of restricted access window scheme of IEEE 802.11ah under non-ideal channel condition, in: IEEE International Conference on Green Computing and Communications, Halifax, Canada, June, 2018. [11] L. Tian, M. Mehari, S. Santi, S. LatrΓ©, E. De Poorter, J. Famaey, IEEE 802.11ah restricted access window surrogate model for real-time station grouping, in: 2018 IEEE 19th International Symposium on β€˜β€˜A World of Wireless, Mobile and Multimedia Networks’’, WoWMoM, Chania, Greece, 2018, pp. 14–22, http: //dx.doi.org/10.1109/WoWMoM.2018.8449738. [12] L. Tian, E. Khorov, S. Latre, J. Famaey, Real-time station grouping under dynamic traffic for IEEE 802.11 ah, Sensors 17 (7) (2017) 1559. [13] Y. Wang, K.K. Chai, Y. Chen, J. Schormans, J. Loo, Energy-aware Restricted Access Window control with retransmission scheme for IEEE 802.11ah (Wi-Fi HaLow) based networks, in: 2017 13th Annual Conference on Wireless onDemand Network Systems and Services, WONS, Jackson, WY, USA, Feb, 2017, pp. 69–76. [14] T. Chang, C. Lin, K.C. Lin, W. Chen, Load-balanced sensor grouping for IEEE 802.11ah networks, in: 2015 IEEE Global Communications Conference, GLOBECOM, San Diego, CA, USA, Dec, 2015, pp. 1–6. [15] S. Bhandari, S.K. Sharma, X. Wang, Device grouping for fast and efficient channel access in IEEE 802.11ah based IoT networks, in: 2018 IEEE International Conference on Communications Workshops, ICC Workshops, IEEE, Kansas City, MO, USA, 2018, pp. 1–6.

164