1. Introduction
As the most popular Internet access method,
IEEE 802.11 protocols in
Wireless Local-Area Networks (WLANs) have been applied in various scenarios, such as the
Internet of Things (IoT) and
Wireless Sensor Networks, as well as densely populated user areas like offices or schools, due to their versatility, convenience, and cost-effectiveness [
1,
2,
3]. In WLANs, a host connects wirelessly with an access point (AP), providing greater extensibility and flexibility compared to wired LANs [
4].
As the number of users and devices grows, the congestion on WLANs increases under the limited number of available channels. Consequently, the issue of dense WLAN environments has been raised to address the challenges of APs in supporting a large number of users. To avoid performance degradation, the network configuration of a WLAN, including the number and coverage of active APs, their channel assignments, locations, and transmission power, should be properly optimized according to traffic demands [
5,
6].
Considering the need to reduce the cost of aging devices and power consumption, particularly in IoT application systems demanding long lifespans and low-cost deployments, an increasing number of researchers have conducted studies on
efficient energy-saving wireless network design methods [
7]. These methods include energy-efficient resource allocation [
8,
9] and
Media Access Control (MAC) protocol improvements [
10]. Their goal is to extend the operational lifespans of IoT devices, reduce overall power usage, and ensure cost-effective and sustainable networks over time.
To address energy-saving issues and performance optimizations in dense network environments, we previously proposed the
active AP configuration algorithm using dual interfaces [
11]. This algorithm enables dynamic optimization of the network configuration by activating or deactivating AP devices while considering the AP setup optimization regarding the channel assignment and the host association. This study computes the total transmission capacity potentially available in the network. Then, it determines whether the minimum throughput constraint is satisfied on average and optimizes the number of activating APs using a
local search method.
However, when multiple hosts are associated with the same AP and are located at different distances from it, the issue of the throughput
unfairness or
insufficiency will arise due to the interference among them. A host enjoys higher received signal strength (RSS) when it is located closer to its AP compared to one situated farther away [
12]. Therefore, the
throughput unfairness/insufficiency problem may appear among the hosts and, due to this advantage of RSS, the result will be a larger
TCP congestion window size and a higher
modulation and coding scheme (MCS) at the transmitting packets, which will create higher throughput.
To solve this problem, we have studied the
throughput request satisfaction method [
13,
14]. It calculates the channel occupancy time and the
target throughput for each associated host from the measured
single throughput and
concurrent throughput for it. The
single throughput is measured when only one host is communicating with the AP. The
concurrent throughput is measured when all the hosts are communicating with the APs. By controlling the outgoing data rates at the AP using
traffic shaping at the
target throughput, the fair or requested throughput is achieved for each host.
In the previous active AP configuration algorithm, only the average throughput among the hosts associated with the same AP is satisfied. If a host is far from the AP, it may not achieve the required minimum throughput. To overcome this deficiency, in this paper, we enhance the enhanced active AP algorithm by incorporating the throughput request satisfaction method. This enhancement consists of the following steps:
Applying the previous active AP configuration algorithm to find the network configuration. The
single throughput and
concurrent throughput for every host is estimated by the
throughput estimation model [
15].
Calculate the target throughput for the fair throughput to every host using the throughput request satisfaction method.
If this target throughput does not satisfy the minimum host throughput, the tentative minimum host throughput is increased by a constant, and the active AP configuration is applied in step 1.
Our design of an energy-efficient WLAN fair throughput allocation algorithm can be achieved by exploring network symmetry and the fairness of resource allocation. This can improve network efficiency by optimizing resource utilization, reducing energy consumption, and ensuring fair access among different devices. The contributions of this proposal for energy saving are summarized as follows:
The number of active APs consuming energy is minimized by the active AP configuration algorithm.
Under the adoption of dual interface devices for APs, our algorithm can both find the minimum number of active APs and allow any host to enjoy the minimum throughput.
The enhanced algorithm can achieve fair throughput allocation and satisfy the minimum throughput constraint among the hosts. Meanwhile, the number of active APs will not increase in most cases.
For evaluations, we verified the validity of the proposal through simulations using the
WIMNET simulator [
16] and through experiments using the testbed system where a
Raspberry Pi 4B with dual interfaces was used for the AP. For every channel of the AP,
channel bonding is used, since it basically provides higher throughput [
17,
18]. In both evaluations, four network topology cases were considered. The results from the simulations show that the
minimum throughput constraint was satisfied in every case by the proposal where all the hosts associated with the same AP enjoy the same throughput. Then, the results from the experiments show that it was satisfied in all cases. Thus, the validity and effectiveness of the proposal are confirmed.
The remainder of this paper is structured as follows.
Section 2 introduces the literature review.
Section 3 introduces the preliminary work of this study.
Section 4 proposes the enhanced active AP configuration algorithm using the throughput request satisfaction method for an energy-efficient WLAN.
Section 5 evaluates the proposal through simulations and experiments. Finally,
Section 6 concludes this paper with future work.
3. Preliminary Work
In this section, we discuss our preliminary work related to this study. In addition, we review our previous active AP configuration algorithm and the throughput request satisfaction method, and we demonstrate an analysis of potential throughput insufficiency and fairness issues that may arise with hosts in the previous algorithm.
3.1. Throughput Estimation Model
First, we introduce the throughput estimation model, which provides the foundation for throughput calculations in algorithm simulations. This model estimates the throughput between an AP and a host in a WLAN network.
3.1.1. Received Signal Strength Estimation
In our study, we use the
log-distance path-loss model to estimate the received signal strength at the destination node [
33]. The
Euclidean distance d (in meters) for each link or the AP/host pair is determined using the following formula:
where
and
represent the
x and
y coordinates of the access point, and
and
represent the
x and
y coordinates of the user host, respectively.
Then, the estimated received signal strength, denoted as
(in
), at the host is as follows:
In this paper, we define
as the received signal strength from the access point (AP) to the host when they are one meter apart with no obstacles in between. The path loss exponent is represented by
. The variable
indicates the count of type
k obstacles or walls along the path between the AP and the host, while
denotes the signal attenuation in dBm for each obstacle type
k (with a range from 1 to 6). It is important to note that a building can have multiple types of walls. In this study, we consider six different types of obstacles:
for corridor walls,
for partition walls,
for intervening walls,
for glass walls,
for elevator walls, and
for doors, as noted in previous studies [
11].
3.1.2. Throughput Estimation
Based on the RSS calculation, we established a functional relationship between RSS and throughput using experimental data. This estimation can provide us with the
single throughput in the subsequent calculation of the channel occupancy time. Through curve fitting, we derived the following
sigmoid function equation:
where
represents the estimated throughput (Mbps), and
is the received signal strength (
) at the
position. The parameters
a,
b, and
c represent the constants obtained from the parameter fitting with real-world measurement results. The parameter values for
a,
b,
c,
, and
in the throughput estimation model will be optimized by the
parameter optimization tool.
3.1.3. Throughput Reduction Factor
To account for the decrease in throughput caused by interference among hosts connected to the same AP, the concept of a
throughput reduction factor was introduced. This factor enhances the precision of the
concurrent throughput estimation under simultaneous communication [
34]. The equation is as follows:
where
represents the concurrent throughput of the host
,
is the estimated single throughput between
and
,
is the
throughput reduction factor, and
m is the number of hosts associated with the AP. Additionally,
was empirically derived as the contention factor, which is given as follows:
3.1.4. Parameter Optimization
The throughput estimation model relies on several parameters that significantly affect the accuracy of the estimation results. To optimize these parameters, we employ a parameter optimization tool that utilizes a
local search method. This method combines a
tabu table with a
hill-climbing function to effectively prevent convergence to a local minimum [
35].
To better demonstrate the improvements of our enhanced algorithm compared to previous studies, we utilized the same conditions as described in the previous paper. Consequently, the parameters of the throughput estimation model are consistent with those in Ref. [
11]. The experimental scenarios and the parameters of the throughput estimation model will be introduced in
Section 5.3.
3.2. Active AP Configuration Algorithm
The active AP configuration algorithm finds the optimal selection of the active APs and their host associations. The objective of the algorithm is to minimize the number of active APs that ensure that the minimum host throughput constraint is satisfied. To further reduce it, each AP is assumed to be equipped with dual interfaces.
3.2.1. Formulation
The formulation of the previous AP activation optimization problem is given as follows [
11]:
Inputs:
APs’ information (position, quantities);
Hosts’ information (position, quantities);
Estimated single throughput for each and pair: ;
Minimum throughput for the association: S;
Number of orthogonal channels (OCs) for each interface: C;
Minimum host throughput: G;
Available total throughput: .
Outputs:
A collection of active APs equipped with dual interfaces;
A group of hosts connected to each interface at every active AP;
The channel assigned to each interface at every active AP.
Objectives:
denotes the count of active access points (APs) equipped with dual interfaces that must be minimized while adhering to the minimum host throughput constraint:
Adhering to the first objective, maximize the
minimum average host throughput :
where
represents the average host throughput for
that is given by:
where
represents the link speed between
and
(
), calculated by Equation (
5).
Adhering to the two objectives, minimize the
total interfered communication time for channel assignments:
where
represents the total communication time of
,
represents the interference from APs at
, and
is the channel assigned to
.
Constraints:
Minimum host throughput: Each host must achieve an average throughput of at least G when all hosts are communicating simultaneously.
Total throughput: The combined throughput of all hosts must not exceed the available total throughput .
Channel assignment: Every interface of an AP must be allocated a channel.
3.2.2. Algorithm Procedure
The
active AP configuration algorithm is divided into the following three steps, and the pseudocode can be found in
Appendix A:
First Step: In this initial phase, the algorithm identifies the active APs equipped with dual interfaces and determines their host connections. The objective is to reduce
while enhancing
[
36].
- (1)
Preprocessing: The algorithm begins with the input of AP and host locations. AP locations are manually selected within the network, considering factors such as electrical power supply, coverage, and user demands. The throughput for every possible AP/host pair is then estimated using the throughput estimation model outlined in Equation (
3). Additionally, the
802.11n interface of an AP is initially selected as the candidate interface for any host.
- (2)
Initial Solution Generation: A
greedy algorithm is used to calculate the initial solution
[
37].
- (3)
Host Association Improvement:
Host Reassociation for Maximum Throughput: Reassign each host to the interface of the AP that provides the highest throughput, as determined by Equation (
5), from among the available AP interfaces. Compute the cost function
at this stage and set it as the best-found cost function,
.
Identify Lowest Throughput Interface: Find the interface of the AP that offers the lowest throughput to its host using Equation (
7). Create a list of
modifiable hosts associated with this interface that can connect to other AP interfaces.
Random Reassociation of Modifiable Hosts: Select one host at random from the modifiable hosts list and reassign it to a different active AP interface at random. Compute the new cost function .
Update Best Cost Function: If is greater than , replace with it and keep the new AP–host association. If not, revert to the previous association and maintain .
- (4)
AP Selection Optimization: This phase aims to optimize the number of active dual-interface APs and the associations between APs and hosts. The goal is to reduce both
and
metrics further using the
local search method as described in [
38].
- (5)
Link Speed Normalization: The fairness criterion is applied if the total expected bandwidth exceeds . Subsequently, the link speed is normalized.
- (6)
Termination Check: For each active AP, if either of its two interfaces is found to be inactive, the interface should be activated, followed by executing the host association improvement phase. The algorithm will move to the second phase if the minimum throughput requirement for the host is fulfilled. If this requirement is not satisfied, the algorithm will then proceed to the AP selection optimization phase.
Second Phase: In the second phase, a channel is assigned to each active AP interface to minimize .
- (1)
Preprocessing: Illustrate the network’s interference and delay conditions using a graphical representation.
- (2)
Interfered AP Set Generation: Identify the set of interfering AP interfaces for each AP interface.
- (3)
Initial Solution Construction: Utilize a greedy algorithm to determine the initial solution.
- (4)
Solution Enhancement via Simulated Annealing: Employ the probabilistic optimization method, Simulated Annealing (SA), to progressively refine solutions. In this approach, SA is applied to optimize the channel assignment for each interface of every active AP, thereby improving network performance. The SA process is conducted at a fixed temperature for a predetermined number of iterations , with both and specified as algorithm parameters.
Third Phase: The third phase balances the loads across different channels to minimize .
- (1)
Initialization: Set all AP flags to 0 (OFF). This flag is used to ensure that each AP is processed only once.
- (2)
AP Selection: Choose an AP currently marked as OFF and reassign its connected host to a different AP that uses another channel.
- (3)
Host Selection: From the chosen AP, select one connected host for the AP reassignment process.
- (4)
Application of Change: Finally, assign the host to a new AP.
3.3. Throughput Request Satisfaction Method
To address the issue of throughput unfairness and insufficiency among multiple hosts communicating simultaneously in a WLAN, the throughput request satisfaction method has been studied [
13,
14]. This approach employs three different types of throughput:
Single Throughput: The single throughput is determined when the corresponding host is the sole device communicating with the AP. This essentially reflects the maximum throughput achievable by the host in the absence of interference from other WLAN hosts.
Concurrent Throughput: The concurrent throughput is assessed when all hosts are communicating with their respective APs simultaneously within the WLAN. This measurement indicates the actual throughput of the host when subject to interference from other WLAN hosts.
Target Throughput: The target throughput for each host is computed on the basis that the total channel occupancy time, or cycle length, remains constant, even when the concurrent throughput is substituted with the target throughput.
The single throughput and the concurrent throughput are derived from measurements. Then, the target throughput is obtained from them. Finally, the target throughput is set as the data rate in traffic shaping with the PI control.
3.3.1. Channel Occupancy Time
To determine the appropriate target throughput for each host, the channel occupancy time is calculated based on the measured single throughput and concurrent throughput.
For the
i-th host
, the channel occupancy time can be estimated by the ratio
. When all hosts communicate simultaneously, each host’s channel occupancy time can be represented as
, …,
, and their sum will be a constant for the data transmission cycle. If
is replaced with
, the total remains constant. Therefore, we derive the following equation:
where
represents the
single throughput,
represents the
concurrent throughput, and
is the target throughput we demand.
3.3.2. Target Throughput for Fairness Allocation
In the
fairness throughput allocation scenario, all the communicating hosts should be assigned the equal
target throughput. Thus, the
fairness target throughput for host
satisfies:
. To transmit
(Mbit) data through the
link, the channel occupancy time can be calculated as follows:
where
S represents the single throughput,
C is the concurrent throughput, and
F is the calculated fairness target throughput for each host.
3.3.3. Traffic Shaping
To realize the control of actual throughput, we deployed the
traffic shaping method.
Traffic shaping manages network bandwidth through the scheduling, policing, shaping, and classification of traffic. In Linux, this can be achieved using the
tc command, which includes queuing discipline (
), classes, and filters [
39].
We utilized the classful HTB (Hierarchical Token Bucket) qdisc to regulate traffic at a specified data rate, . The HTB employs token buckets to distribute traffic across different classes, governed by two parameters: ceil and data rate. These parameters define the allocated and maximum bandwidth, respectively. In this study, we set both parameters to identical values to maintain the desired quality of service across various traffic classes.
3.3.4. PI Controller of Rate and Ceil Parameters
In the field of
traffic shaping, the
tc command controlling the data rate parameter
can only determine the maximum upper limit for a host’s traffic. However, it cannot always guarantee that the actual throughput satisfies the target throughput. To this end, the
PI (Proportional-Integral) feedback control mechanism is utilized. For each time step
m (60 s in this paper), by calculating the error space
between the measured actual throughput and the target, under the proper adjustment of the proportional gain and the integral gain, the size of the input
data rate of the system is effectively selected, so that the actual throughput is as close as possible to the target. The equation is as follows:
where
represents the actual throughput result at each time step
m, and
and
represent the parameters of
P-control gain and
I-control gain, respectively. In this paper,
and
are used, which have been experimentally adjusted in real-world situations where they can quickly and accurately control
to meet the desired target.
3.4. Limitations of the Active AP Configuration Algorithm
In the previous active AP configuration algorithm, only the average throughput among the hosts associated with the same AP can satisfy the minimum host throughput constraint. If there is a host located far from the AP, this host may not satisfy this constraint, since the throughput difference from other hosts located near the AP can be large.
This problem must be solved in this paper by introducing the throughput request satisfaction method to these hosts. With this method, the target throughput is introduced to them. If it does not satisfy the given initial minimum host throughput G for the constraint (5 Mbps in evaluations of this paper), the active AP configuration is reconstructed by applying the algorithm with the increased tentative minimum host throughput that is introduced to increase the number of active APs. Then, the target throughput is recalculated and checked in the enhanced active AP configuration algorithm in this paper, which will be presented in the next section.
6. Conclusions
In this paper, we presented the enhanced active AP configuration algorithm by incorporating the throughput request satisfaction method to control the actual throughput at the fair target throughput for every host by applying traffic shaping at the AP. This is an extension of the previous active AP configuration algorithm that addresses the issue of part of the host suffering from insufficient and unfair concurrent throughput.
To address this issue, we deployed dual-interface device support for higher access capacity and reduced the number of APs; in addition, the throughput control phase provided the actual throughput of each host. It calculates the target throughput from the single and concurrent throughput of each host. If it does not satisfy the required throughput, the tentative minimum throughput is increased by the throughput constraint update, and the active AP configuration and the target throughput are recalculated.
For evaluations, in four topology cases with five APs and 10 hosts, we conducted simulations using the WIMNET simulator and experiments using the testbed system with Raspberry Pi 4B for APs. The results show that the proposal always achieved the required minimum throughput in simulations and in experiments and, at the same time, the number of activated APs has obviously been reduced to only one or two. Thus, the validity and effectiveness of our proposal were confirmed. In future work, we will further enhance the algorithm by considering the transmission power control at the AP and evaluate it using different protocols such as 802.11ax in various network scenarios.