Next Article in Journal
Mapping Tools for Open Source Intelligence with Cyber Kill Chain for Adversarial Aware Security
Next Article in Special Issue
Applied Mathematics for 5th Generation (5G) and beyond Communication Systems
Previous Article in Journal
Fuzzy Fusion of Stereo Vision, Odometer, and GPS for Tracking Land Vehicles
Previous Article in Special Issue
Performance Analysis of Regularized Convex Relaxation for Complex-Valued Data Detection
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Collision-Based Window-Scaled Back-Off Mechanism for Dense Channel Resource Allocation in Future Wi-Fi

1
Department of Electrical Engineering, Bahria University, Islamabad 44000, Pakistan
2
Department of Computer Science, Bahria University, Islamabad 44000, Pakistan
3
School of Optical Engineering, Sejong University, Seoul 05006, Korea
4
School of Intelligent Mechatronics Engineering, Sejong University, Seoul 05006, Korea
*
Authors to whom correspondence should be addressed.
Mathematics 2022, 10(12), 2053; https://doi.org/10.3390/math10122053
Submission received: 25 March 2022 / Revised: 25 May 2022 / Accepted: 27 May 2022 / Published: 14 June 2022

Abstract

:
Wireless local area networks (WLANs), known as Wi-Fi, are widely deployed to meet the enhanced needs of data-centric internet applications, such as wireless docking, unified communications, cloud computing, interactive multimedia gaming, progressive streaming, support of wearable devices, up-link broadcasts and cellular offloading. Wi-Fi networks typically adopt the Distributed Coordination Function (DCF)-based Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA), which uses the Binary Exponential Back-off (BEB) algorithm at the MAC layer mechanism to access channel resources. Currently deployed Wi-Fi networks face huge challenges towards efficient channel access for denser environments due to the blind exponential increase/decrease of a contention window ( C W ) procedure that is inefficient for a higher number of contending stations. Several modifications and amendments have been proposed to improve the performance of the MAC layer channel access based on a fixed or variable C W size. However, a more realistic network density-based channel resource allocation solution is still missing. An efficient channel resource allocation is one of the most critical challenges for future highly dense WLANs, such as High-Efficiency WLAN (HEW). In this paper, we propose a Channel Collision-based Window Scaled Back-off (CWSB) mechanism for channel resource allocation in HEW. In our proposed CWSB, all contending stations select an optimized C W size for each back-off stage for collided or successfully transmitted data frames. We affirm the performance of the proposed CWSB mechanism with the help of an Iterative Discrete Time Markov Chain (I-DTMC) model. This paper evaluates the performance of our proposed CWSB mechanism in HEW Wi-Fi networks using an NS3 simulator in terms of the normalized throughput and channel access delay compared to the state-of-the-art BEB and a recently proposed mechanism.

1. Introduction

Technology evolution, user needs and the impact of COVID-19 have significantly enhanced global data requirements because of work-from-home [1], online education, smart cities, security surveillance [2], online health services [3], vehicular networks and e-business approaches. Cisco Visual Networking Index (Cisco VNI) 2017–2022 [4] reported that global mobile data traffic will increase by seven fold by 2022.
Future Wi-Fi services demand support for both high data rate and dense user support [5] with scenarios, such as sports stadium, airport, train station, exhibition hall, dense wireless office, dense apartment building, dense urban street and pico-cell street deployment. The need for an efficient PHY and MAC layer protocols becomes most important for future Wi-Fi networks to meet with the aforementioned future services. The Institute for Electrical and Electronics Engineers (IEEE) defines 802.11a, 11b, 11g, 11n, 11ac and 802.11ax as Wi-Fi standards for wireless local area network (WLAN) communications.
In 2014 [6], an IEEE 802.11 working group (WG) approved the development of a new WLAN standard, IEEE 802.11ax, also known as 6th Generation (6G) Wi-Fi network. The IEEE 802.11ax task group (TG ax) intends to improve the efficiency for dense user scenarios along with high data rates and termed it as a High-Efficiency WLAN (HEW) network. In Wi-Fi 6, the contending devices, also called stations use Enhanced Distributed Channel Access with Best Effort (EDCA-BE) for medium access. The EDCA-BE MAC protocol is similar to DCF based on carrier sense multiple access with a collision avoidance (CSMA/CA) mechanism, which adopts a traditional Binary Exponential Back-off (BEB) algorithm for the medium contention.
The BEB follows a blind exponential increase and decrease of back-off window and that is inefficient for highly dense HEW networks [7] due to a limited size of contention window ( C W ) size. In EDCA-BE MAC protocol, each contending station selects a random back-off value from the initial C W ( C W m i n ) , and its value is doubled (exponentially increased) after each unsuccessful transmission until it reaches a given maximum value C W m a x .
Each contending station may experience a maximum number of consecutive collisions that shows the maximum number of transmission stages (m). Therefore, at the maximum value of m, the back-off window size no longer doubles, stays at its maximum value and is given by C W m a x = C W m i n × 2 m . The C W size reverts to its initial minimum value C W m i n after every successful transmission or after the maximum number of re-transmissions is reached (data packet is dropped at this level).
In the case of a dense network, the process of resetting C W size to its minimum value C W m i n after each successful data-transmission may encounter more collisions due to the small C W size for large numbers of contending stations, which directly impacts the overall network performance. Similarly, in a small network, exponentially increasing the value of C W for avoiding collisions causes unnecessarily long delays. Hence, the performance of BEB mainly depends on the C W adjustment and back-off strategy [8], which is not designed for HEW requirements.
Several BEB modifications have been proposed to calculate the optimal C W size to improve the network performance in terms of higher throughput and lower access delay. These modifications are mainly categorized as fixed or adaptive C W adjustment schemes. Fixed C W schemes use different predefined incremental factors to adjust the C W size to improve the network performance, for example, Exponential Increase Exponential Decrease (EIED) [8,9], Exponential Increase Linear Decrease (EILD) [10], Multiplicative Increase Multiplicative Decrease (MIMD) and Smart Exponential Threshold Linear (SETL) [11], whereas the adaptive C W adjustment schemes dynamically adjust the C W size in accordance with the network conditions, such as the total number of active stations.
However, such schemes require that an active station must collect the channel-state information using various methods and coordinate with neighboring stations to reduce the transmission collisions and enhance the network throughput.
To the best of our knowledge, the Channel Observation-based Scaled Back-off mechanism (COSB) was the first effort to scale the back-off window for HEW dense networks [12]. The COSB mechanism observes the channel conditions to measure the collision probability that helps to control the C W size following a CSMA/CA-based EDCA-BE MAC protocol for dense users. An analytical modeling also presented using Recursive Discrete Time Markov Chain (R-DTMC) model to satisfy the validity of COSB in terms of the throughput and access delay. COSB gives a detailed picture of HEW and improves the network efficiency in terms of higher throughout and lower access delay with reference to BEB.
However, in COSB, the recently collided stations are forced to stay at a higher back-off stage (larger C W size) without knowing the number of contending stations or network density. This results in low throughput and higher delay values.
In this paper, we deduced that the last transmissions are the main causes of reduced network throughput, and they also increase the channel collision probability towards a denser network. In this paper, we propose a channel collision-based window-scaled back-off (CWSB) mechanism to optimize the C W considering the last transmission. In CWSB, each contending station for its ith transmission perceives the medium for the total back-off period to calculate the channel condition collision probability p c c . Furthermore, the CWSB quantizes the slot times into σ , where the value of p c c is based on the perceived slot times between two consecutive back off stages. In addition, while considering CWSB, the current back-off stage b i does not come to zero or one step reversed (meaning its earlier or previous back-off stage) after a successful transmission compared to BEB and COSB, respectively.
The remaining of the paper is organized as follows: the next section describes the working principals of the MAC protocol. Section 3 discusses the literature review, Section 4 explains our proposed model, and Section 5 presents our results and discussions of this paper. Finally, Section 6 concludes our proposed mechanism.

2. DCF-Based Channel-Access Mechanism in Current WLANs

The IEEE 802.11 defines DCF as a mandatory and point coordination function (PCF) as an optional MAC protocol for Wi-Fi networks. In addition, the PCF belongs to a centralized access scheme that offers contention-free channel access. However, PCF has limitations due to its complexity for dense user applications. In a WLAN network, a MAC protocol ensures high efficient multi user operation. For a multi-user MAC protocol (MU-MAC) technology, both the access point (AP) and stations obey certain rules to transmit data concurrently from AP to/from stations. Mostly, the available network resources for MAC protocol are accessed via the time domain, space domain or frequency domain.
Conventionally, IEEE 802.11 adopts the CSMA/CA mechanism of the DCF procedure as its MAC protocol to access the shared medium [13]. Before each transmission, a clear channel access assessment (CCA) procedure determines the channel condition if it is in ideal state or busy. In addition, DCF minimizes the collision probability for data being transmitted from other stations by using the BEB algorithm and several control frame or sub frames, such as Distributed Inter-Frame Space (DIFS), Request to Send (RTS), Short Inter-Frame Space (SIFS), Clear to Send (CTS) and acknowledgment (ACK).
Figure 1 shows how a DCF adopts CSMS/CA with BEB algorithm for two-way handshaking (basic access mechanism) and four-way handshaking (RTS/CTS access mechanism) to deal with hidden terminal problems. In the RTS/CTS DCF mechanism, the contending stations send an RTS frame and wait to receive a CTS frame prior to each data frame transmission as shown in Figure 1b.
In a DCF, each contending station employs BEB and a deferral mechanism that helps to distinguish each transmission time to reduce the collision probabilities. In addition, the contending stations choose randomly discrete back-off slots in the range of ( 0 , C W 1 ) before accessing the channel. The DCF enables the BEB algorithm if the channel is sensed idle for a period of DIFS, while the remaining stations set network allocation vector (NAV) to avoid the collisions.
During the exponential back-off rules, each contending station decrements one from the back-off counter if the channel is sensed idle, freezes back-off counter when it detects a transmission on the channel and reactivates the back-off counter process when the channel is sensed idle again for a period of DIFS. Finally, the contending station proceeds the transmission when the back-off counter reaches zero, and the receiver sends back an ACK frame immediately (with a difference of short period SIFS) after the successful reception of the data.
Further, if assumed to have the perfect channel sensing mechanism by each contending station, the transmission may collide if two (or more) stations proceed (data or RTS) transmission within the same slot time as shown in Figure 2a,b, respectively.
In addition, DCF employs three types of frames with the name of control frame, management frame and data/QoS data frame. These physical frames need inter–frame space time interval to obtain the medium access without collision. Normally, control frames follow the previous frame after SIFS whereas data/management frames wait for DIFS/AIFS (including QoS) before they back off in C W .

3. Related Research Work

The resource (spectrum) management or channel access always persist the most challenging issue in IEEE 802.11-based WLAN networks. In this section, we categorize related research work into three sub sections; DCF limitations, fixed C W adjustment schemes and adaptive C W adjustment schemes.
(1) DCF limitations: Bianchi [7], presents a simple, yet precise analytical model to calculate saturated throughput for the DCF mechanism using BEB algorithm. According to Bianchi, considering the BEB algorithm, a data frame transmission (successful or collided) majorly depends upon the values: (i) C W size (W), (ii) collision probability p, (iii) transmission probability τ and (iv) number of n contending stations [14]. Below, Equation (1) indicates the value of probability τ that a contending station transmits a data frame specific to a randomly chosen slot time. However, normally, τ depends on W and p, which is still unknown, and thus we have the following major equations.
τ = i = 0 m b i , 0 = b 0 , 0 1 p = 2 ( 1 2 p ) ( 1 p ) ( 1 2 p ) ( W + 1 ) + p W ( 1 ( 2 p ) m )
For Equation (2), to obtain the value of p regarding a contending station, it is sufficient to account for the probability of a transmission collided in a slot time for at least one of the remaining ( n 1 ) stations. Moreover, each contending station transmits a data frame with probability p for a steady state. This is shown in Equation (2).
p = 1 ( 1 τ ) n 1
Further, Equations (1) and (2) belong to a nonlinear system for two unknown τ and p values that can be calculated using mathematical techniques. In fact, for the calculation of τ , we invert Equation (2) to obtain Equation (3).
τ ( p ) = 1 ( 1 p ) 1 / ( n 1 )
In order to prove that the system holds a unique solution due to continuous and monotonic values, we can rewrite the two equations as follows τ ( p ) , generally,
τ ( ρ ) = 2 ( 1 + W + ρ W i m 1 ( 2 ρ ) i )
For continuous and monotonic decreasing: consider τ ( 0 ) and place in the above equation the τ ( 0 ) = 2 ( 1 + W ) and reduce up to τ ( 1 ) = 2 ( 1 + 2 m W ) ) for continuous and monotonic increasing on the interval [0, 1]. Further, place τ ( 0 ) = 0 and τ ( 1 ) = 1 from the above equation, which prove the uniqueness of the solutions τ ( 0 ) > τ ( 0 ) and τ ( 1 ) < τ ( 1 ) .
The above equations help us to compute the collision probability for various number of contending stations following the BEB algorithm. The BEB shows poor network performance in terms of high collisions and low throughput—particularly for a high number of contending stations. Eventually, due to the blind increase and decrease in C W for collision avoidance result in higher collisions and unnecessary delays for data transmissions, respectively.
Thus, currently BEB-based deployed Wi-Fi MAC protocol could not support better efficiency for dense environments. To address this issue, a series of modification has been conducted to BEB-based on CSMA/CA to improve the MAC layer performance considering fixed or variable adaptive C W size. Based on C W adjustments schemes in WLANS, the related works are further classified into two major categories.
(2) Fixed CW Adjustment Schemes: First, we discuss several well-known proposed algorithms towards fixed C W adjustment schemes, such as EIED, EILD, MILD, ECA and ECA-H as summarized in Table 1. The CSMA/CA based C W optimization work comes with the name of the EIED back-off algorithm that exponentially increases or decreases C W size by back-off factor r I = 2 and r D = 2 after each collision or successful transmission, respectively [15].
In EIED, r I and r D are fractional powers of 2, adopted to achieve improved network performance; however, the constant values of r I and r D make the EIED algorithm inefficient for dense networks. The MILD applies two different and constant factors to adjust the C W size—for instance, C W is multiplied by 1.5 in the case of transmission failure (or collided) and is decreased by one in the case of successful transmissions.
In addition, the enhanced collision avoidance (ECA) modified the standard BEB algorithm in terms of resetting the C W value to its C W m i n after each successful data frame transmission [16,17]. In [16], ECA uses a deterministic back-off value ( V = 16 ) after a successful transmission to enhance the throughput in an ad hoc network. In addition, the [17] adopts the same principal to maximize the fairness efficiency.
Similarly, such approaches can be deployed for radio resource management in wireless networks [18]. The aforementioned approaches are easy to implement and support collision-free transmission up to deterministic values. However, the performance gain was observed to be limited with a number of contenders larger than the value of V. Furthermore, the ECA-H (hysteresis) is a modified version of CSMA/ECA that increases the network throughput for a large number of contending stations [19].
Consequently, the ECA-H mechanism enhanced network performance with efficient utilization of available bandwidth [20]. The ECA-H comes at the cost of complex implementation and reduction in long-term fairness. In summary, fixed C W adjustment algorithms use constant multiplying factors for both transmissions (successful or failed), the network performance degraded for dense networks due to increased collision probability and reduced aggregated throughput.
(3) Adaptive CW Adjustment Schemes: Secondly, we studied the adaptive C W algorithms that adjust the C W dynamically according to the number of active contenders or traffic load. The idle sense optimal access method improves the network throughput and fairness [21], an Adaptive Back-off Algorithm for Contention Window (ABA-CW) enhances the system performance [22], and in [23], the authors proposed a QoS-based adaptive C W back-off algorithm for performance improvements.
However, these methods need to account for the active number station for C W adjustment that limits the performance of the DCF mechanism. Further, Ref. [24] proposed a global-view-based adaptive contention window (GV-ACW) MAC protocol to reduce latency and improve alternative energy harvesting for a sensor network The GV-ACW scheme optimizes the C W size relaying on near and far sink areas while data forwarding.
In [25], a cognitive back-off (CB) mechanism was proposed that optimized C W size only for successful transmissions. The CB provides an analytical improved saturation throughput analysis. In [26], they proposed an AP-based window synchronization where AP shares the optimal C W size with active and passive probe scanning by the stations. Hence, Table 1 gives brief details on related work for the C W optimization for conventional and future dense IEEE 802.11 WLAN networks.
To the best of our knowledge, COSB was the first effort to scale the back-off window size towards HEW dense networks [12]. The proposed COSB mechanism observes the channel condition to measure the collision probability that helps to scale the back-off C W size following CSMA/CA based EDCA(BE) MAC protocol. An analytical model also presented used the R-DTMC model to satisfy the validity of COSB in terms of the throughput and access delay.
COSB gives a detailed picture of HEW and improves the network efficiency in terms of higher throughout and lower access delay with reference to BEB. On the other hand, more specifically, the stations that have recently failed to transmit the data frame or access the channel due to consecutive re-transmission attempts are forced to stay at a higher back-off stage without knowing the number of contending stations or the network density. Since HEW networks are rapidly growing towards denser application, such schemes need more proficient modification to enhance the network efficiency in terms of higher throughput, lower access delay and good fairness metrics.
Table 1. Summary of related work.
Table 1. Summary of related work.
RefMAC ProtocolAssociated Work (Scheme)Used Formulas (in Case of)Contributions
[7]CSMA/CABEB1. Transmission Collided.
CW = min ((2 i ( C W m i n + 1)) − 1, C W m a x ).
2. Transmission Succeeded
CW = C W m i n .
Low Collision for sparse network
and degraded throughput for
dense network
[16,17,19,20]CSMA/ECA/ECA-HDeterministic back-off
mechanism.
C W = min ((2 i ( C W m i n + 1 ) ) 1 , C W m a x ) . k = [ C W m i n ] 2 + 1 High throughput and low channel
fairness for dense users
[15]EIEDEIED back-off
algorithm.
C W = min (( r I ( C W m i n + 1 ) ) − 1, C W m a x ) C W = min ( ( ( C W m i n + 1 ) / r D ) 1 , C W m i n ) Reduced delay but constant
parameters
[25]CBCB algorithm. C W = min ((2 i ( C W m i n + 1 ) ( ρ c k + 1 ) 1 ) , C W m a x ) C W m i n Throughput improved
use constant multiplying factor
[26]AP-based CWActive and passive
probe scanning.
C W = ( C W ) 2 × n 1 C W = ( C W ) 2 × n 1 Good fairness reduced performance
due to fixed multiplying rule
[12]COSBCW optimization
according to p o b s .
C W = min [2 b i + 1 × W m i n × ω ρ o b s , W m a x ] C W = min [2 b i + 1 × W m i n × ω ρ o b s ,   W m i n ]Higher throughput and
low fairness for dense users
This workCWSBCW optimization
according to p c c .
CW = [(2 b i + 1 × λ ( 1 + p c c ) , W m a x )]CW = [(2 b i + 1 × λ ( 1 + p c c ) , W m i n )]Higher throughput and low channel access
delay for dense users.

4. Collision-Based Window-Scaled Back-Off Mechanism—(CWSB)

In this paper, we propose a channel collision-based window-scaled back-off (CWSB) mechanism that mainly enhance network performance in terms of throughput and delay for dense users. The CWSB improves the network efficiency in terms of high throughput and lower delay by observing channel collisions during the channel access mechanism specific to saturated environments. An analytical model named as Iterative Discrete Time Markove Chain (I-DTMC) testifies the performance evaluation of the CWSB mechanism.
In proposed CWSB, each contending station continuously senses the medium after the medium sensed as idle for a distributed inter-frame space (DIFS), all the contending stations start to the back-off procedure by selecting a random back-off value d as shown in Figure 3. For each contending station, immediately following an idle DIFS, the total back-off time is slotted into observed slot times μ . During the back-off procedure, the slot time size is set equal to the time needed at any contending station n to detect the transmission of a data frame from any other n 1 stations.
Further, the duration of μ is either a constant slot time σ for an idle period or it could be a variable slot time for a busy (successful or collided) transmission period. During the back-off procedure as the channel is sensed idle during σ , the d is decremented by one. Similarly, the back-off process is frozen while the channel is sensed as busy, and the station continuously senses the channel to access the medium. If the channel is again sensed for a DIFS period, d is resumed.
Eventually, the contending station transmits a data frame after d approaches zero. Moreover, successful or collided transmission depends upon reception of the ACK frame. The case of the ACK frame not receiving the transmission is considered as collided or failed.
Each contending station individual computes the channel conditional collision probability p c c , which is defined as the probability that a transmission by a contending station collided. Furthermore, the CWSB quantizes the slot times into σ , where the value of p c c is based on the perceived slot times between two consecutive back off stages.
A contending station upgrades p c c from D number of perceived slot times ( D p s t ) of the back-off stage b i at the ith transmission as
p c c = N b + N c + N s D p s t N c
where D p s t = N i + N b + N c + N s where N i means the ideal slot time, N b is the busy slot time, N c is the slot time for collided transmission, and N s is the slot time for successful transmission.
For example, in Figure 3, station-1 randomly chooses back-off counter value d = 8 for its ith transmission at b i stage. Since station-1 perceived eight idle slot times ( N i ), two busy periods ( N b ) and one collision period ( N c ). Thus, D p s t = 8 + 2 + 1 = 11 and p c c = 2 + 1 11 1 = 0.27 for the next stage b i + 1 , while, in the case of a successful transmission, N c = 0 and N s = 1.
Furthermore, when a transmitted data frame experiences collision, the value of current contention window W b i of back-off stage b i at the ith transmission is actively optimised (stepped up) according to the p c c values and when a data frame is successfully transmitted, the current contention window W b i of back-off stage b i at the ith transmission is also actively optimised (stepped down).
For BEB, b i describes the number of back-off stages, where i ( 0 , m ) owns an integer value (from 0 up to 5) for the increase or decrease process. However, in the case of CWSB, the current back-off stage b i does not come to zero or one step reversed after a successful transmission compared to BEB and COSB as shown in Figure 4, respectively. Moreover, the back-off stage b i in CWSB at the ith transmission adopts the below property towards increasing or decreasing for the next stage b i + 1 , and thus:
b i + 1 = m i n ( b i + 1 , u p t o m ) , i t h T x n c o l l i d e d a t b i s t a g e m i n ( b i 2 , u p t o 0 ) , i t h T x n s u c c e s s f u l a t b i s t a g e
Figure 4 reveals that the current back-off stage b i does not come ( i i ) to zero or one step reversed after a successful transmission as per BEB and COSB, respectively. Since the current back-off stage for each contending station shows the count of collided or successful data transmissions, it helps to optimize the size of C W more efficiently. The back-off stage b i after, increment or decrement results in optimize (stepped up or stepped down) of the current C W i , respectively. The optimization of C W operates as follows for a contending station.
W b i + 1 = ( 2 b i + 1 × λ ( 1 + p c c ) , W m a x ) , i t h T x n c o l l i d e d a t b i s t a g e ( 2 b i + 1 × λ ( 1 + p c c ) , W m i n ) , i t h T x n s u c c e s s f u l a t b i s t a g e
where λ acts as a constant value to optimise the C W size and is assigned a value as λ = W m i n .
Furthermore, Figure 5 describes the major functional comparison of BEB, COSB and CWSB. The working principal of the proposed algorithm is explained in the left highlighted blocks.
As shown in left blocks of Figure 5, first, in our proposed CWSB, all contending stations for each ith transmission perceived the medium for the total back-off period to calculate the channel condition collision probability ( p c c ). Secondly, the next back-off stage ( b i + 1 ) value is obtained based on last collided or successful data transmission. Lastly, the optimized window size is computed for next back-off stage based on p c c and b i + 1 values.

5. Mathematical Modelling of Proposed Algorithm

This section describes a detailed analytical analysis to validate CWSB, the proposed mechanism significantly improves HEW network performances in terms of higher throughput and lower access delay.
Further, the following assumptions are assumed [7], (i) the network has fixed number of contending stations with nonempty queue for data frame transmissions for each calculation, (ii) no hidden stations impacted, (iii) no capture effect, (iv) channel condition is perfect and packet drop is only due to collision during channel contending and data frame transmissions. The analysis of proposed mechanism has been explained in three parts in order to optimize the window size for next back-off stage.
First, CWSB computes channel collision conditional probability ( p c c ) for each contending station, individually. Secondly, the next back-off stage b i + 1 value is obtained based on collided or successful data transmissions. Similarly, the optimized window size ( W o p t ) is computed for next back-off stage based on ( p c c ) and b i + 1 values.
Further, the Iterative Discrete Time Markov Chain (I-DTMC) model implies probability functions along stochastic process to explains the behaviour of each contending station for back-off stages and back-off counter [27], respectively. In addition, the transmission probability τ is derived for each station while receiving the acknowledgement frame.
Hence, normalized throughput is observed as a function of successful transmission in a specific slot time. Finally, the access delay and fairness depend upon the transmission probability τ and the selection of W o p t , respectively.

Iterative Discrete Time Markov Chain (I-DTMC) Model

In the I-DTMC model, the transition probabilities are expressed as follows.
  • During the channel contending process, the contending station freezes its back-off counter ( c ) when a contending station senses that the channel or medium is busy,
    P { ( b , c ) | ( b , c ) } = p b , b [ 0 , m ] , c [ 1 , W i 1 ] .
  • During the channel contending process, the contending station decrements its back-off counter, when the station senses that the channel is idle,
    P { ( b , c ) | ( b , c + 1 ) } = 1 , b [ 0 , m ] , c [ 0 , W b 2 ] .
  • In the case of a successful data frame transmission at stage 0, station remains at stage 0,
    P { ( 0 , c ) | ( 0 , 0 ) } = 1 p c c W 0 , c [ 0 , W 0 1 ] .
  • In the case of failed transmission at b i stage, the contending station increments the current C W size and moves towards the next back-off stage from b 1 to b, as in Equation (11).
    P { ( b , c ) | ( b 1 , 0 ) } = p c c W b , b [ 0 , m ] , c [ 0 , W b 1 ]
  • In the case of successful data frame transmission, the contending station steps down the current C W and decrements its back-off stage from b to b 1 for the next transmission attempt, as Equation (12).
    P { ( b 1 , c ) | ( b , 0 ) } = 1 p c c W b 1 , b [ 0 , m ] , c [ 0 , W b 1 ]
  • In the case of unsuccessful transmission at m 1 stage, the contending station moves to the maximum stage m with probability,
    P { ( m , c ) | ( m 1 , 0 ) } = p c c W m , b [ 0 , m ] , c [ 0 , W m 1 ]
  • In the case of unsuccessful data frame transmission at the maximum stage m, the contending station remains at the mth stage.
    P { ( m , c ) | ( m , 0 ) } = p c c W m , b [ 0 , m ] , c [ 0 , W m 1 ]
Further, let us assume that, S b , c = lim t P { α ( t ) = b , β ( ( t ) = c ) } is the stationary distribution of the I-DTMC model. Figure 6 shows that it is easy to determine a solution in terms of the transition probability for each state. First, note that:
s 1 , 0 = γ × s 0 , 0
where γ = p c c ( 1 p c c ) ; therefore, the aforementioned equation can be written as, s b , 0 = γ × s b 1 , 0 , similarly s b 1 , 0 = γ × s b 2 , 0 up to s 1 , 0 = γ × s 0 , 0 . Therefore, we can extract as
s b , 0 = γ b × s 0 , 0 ( 0 < b < m )
for the m − 1 stage
s m 1 , 0 = γ m 1 × s m , 0
and thus by the relations for the m stage, we can write
s m , 0 = γ m × s m , 0
Further, a general normalization equation is as follows.
b = 0 m × c = 0 W b 1 s b , c = 1
The above equation follows the chain regularities,
s b , c = W b 1 W c × ( 1 p c c ) × s b + 1 , 0 i f b = 0 ( 1 p c c ) × s b + 1 , 0 + p c c × s b 1 , 0 i f 0 < b < m p c c × ( s m 1 , 0 ) + p c c × ( s m , 0 ) i f b = m
The iterative characteristic of state transitions probabilities can be written as
b = 0 m 1 × γ b × s b , 0 + m × s m , 0 = s 0 , 0 ( 1 γ m m γ m ( 1 γ ) ) ( 1 γ ) 2
where γ b = 1 γ m 1 γ , s b , 0 = s 0 , 0 1 γ , s m , 0 = γ m × s 0 , 0 1 γ , we will find Equation (22), after simplifying the above Equations from (15), (16) and (20), (21)
s b , c = ( W b c ) ( b + 1 ) W b × s b , 0 , b [ 0 , m ] , c [ 0 , W b 1 ]
By solving Equations (15)–(22), where all the values of s b , c in I-DTMC model are presented as dependencies of s 0 , 0 and p c c . Similarly, the value of s 0 , 0 was finally calculated by normalizing the states of I-DTMC as follows.
b = 0 m 1 ( b + 1 ) × s b , c c = 0 W b 1 W b c W b + m × ( W m c ) W m s m , 0 = 1
s 0 , 0 2 W o p t ( 1 ( 2 γ ) m m ( 2 γ ) m ( 1 2 γ ) ) ( 1 2 γ ) 2 + ( 1 γ m m γ m ( 1 γ ) ) ( 1 γ ) 2 = 1
In order to normalize Equation (24), we assume W o p t = λ ( 1 + p c c ) , where λ is equal to W m i n ; thus, after taking mathematical steps we have
s 0 , 0 = 2 ( 1 γ 2 ) ( 1 γ m ) ( 1 γ m m γ m ( 1 γ ) ) × 1 ( ( 1 2 γ ) ( 1 γ m ) ( W o p t + 1 ) + γ W o p t ( 1 γ ) ( 1 ( 2 γ ) m ) )
Hence, a transmission occurs only when d reaches zero regardless the number of back-off stages. The probability τ that a contending station transmits a data frame in a random chosen slot time is represented as in Equation (26),
τ = s 0 , 0 ( 1 γ m m γ m ( 1 γ ) ) ( 1 γ ) 2
Further, in adding the value of s 0 , 0 to the above equation, we obtain the final τ for CWSB.
τ = 2 [ 1 + W o p t + ( W o p t × γ × b = 0 m 1 ( 2 γ ) b ) ]
The two non-linear equations can be determined together using numerical techniques to find the values of τ and p. In addition, ρ and p c c are replaceable for practical calculations, and the value lies between 0 and a maximum of 1.
However, in general, τ depends upon the value of p c c , which is always unknown until the contending station perceived channel slots during contending process. Due to the steady state, each contending station transmits a data frame with probability τ and p c c , and subsequently, the probabilities p and p b are expressed as follows,
p c c = 1 ( 1 τ ) n 1
p b = 1 ( 1 τ ) n
where p b means the collision probability for a busy slot time.

6. Normalized Throughput Analysis

This section describes a detailed analysis towards a major research goal, the calculation of the network throughput. We assume that Φ defines the normalized throughput of the network and can be calculated as the fraction of time the accessed channel is used to successfully transmit mean payload bits by contending station, a general equation is
Φ = E [ m e a n p a y l o a d t r a n s m i t t e d i n a s l o t t i m e ] E [ t o t a l l e n g t h o f a s l o t t i m e ]
To compute Φ , let τ t p have the probability when at least a (data/control) frame transmission occurs during the examined slot time. Moreover, as the network has n number of contending stations for contending the medium or channel and as each station transmits a data frame with transmission probability τ , the transmission probability τ t p can be defined as.
τ t p = 1 ( 1 τ ) n
Similarly, if τ s u c defines the probability for a particular contending station that transmits a data frame in the considered slot time with a successful transmission probability, then τ s u c can be computed as
τ s u c = n τ ( 1 τ ) n 1 τ t p
Moreover, to compute the value of Φ in terms of a real deployed network can be found as follows,
Φ = ( E [ P ] × τ t p × τ s u c ) T s u c × τ t p τ s u c + ( 1 τ t p ) σ + τ t p ( 1 τ s u c ) T c
where we assume that all stations have the average identical data frame payload as E [ P ] , and then E [ P ]  ×  τ t p  ×  τ s u c is the slot time to transmit average data payload successfully, since τ t p  ×  τ s u c shows the probability for a successful data frame transmission in a given slot time.
Moreover, the lower part of the above equation is related to the average length of a particular slot time, where (i) ( 1 τ t p ) σ means that transmission has not occurred in a slot time, (ii) ( τ t p  ×  τ s u c ) belongs to a successfully transmitted data frame, and (iii) τ t p ( 1 τ s u c ) shows the collision for a transmitted data frame.
In addition, T s u c and T c shows the average time when the communication channel is sensed as busy due to successful and collided transmissions. To evaluate the analytical approach, the values of E [ P ] , T s u c , T c and idle slot time σ adopt the same time unit. Similarly, ( D F ) h d r = P H Y h d r + M A C h d r defines the time a station takes in transmitting the header of a data frame, and δ represents the propagation delay, whereas S I F S stands for short inter-frame space, and ACK is the time when an acknowledgment is received after a successful data frame transmission. Thus, the value of T s u c and T c can be obtained for the basic DCF mechanism as shown in Figure 7.
T s u c = D F h d r + E [ P ] + S I F S + 2 δ + A C K + D I F S
T c = D F h d r + E [ P ] + S I F S + δ
Similarly, DCF with RTS/CTS can be written as follows, where collision can appear in the RTS frame.
T s u c R T S / C T S = R T S + C T S + D F h d r + E [ P ] + 3 S I F S + 4 δ + A C K + D I F S
T c R T S / C T S = R T S + δ + D I F S
More specifically, the exact values of T s u c and T c depend upon the IEEE 802.11 standard.
Further, the authors in [28,29] emphasized considering the impact of hidden nodes for up-link and down-link throughput calculation in the case of a dense network. A fake collision algorithm proposed in [29] allowed a source node more transmission opportunities in the case of more hidden nodes than in the BEB algorithm. Bianchi [7] recommended adopting the RTS/CTS mode in the presence of hidden nodes. Hence, the CWSB mechanism also follows the BEB algorithm to reduce the impact of hidden nodes. A detailed analysis is out of scope for this work.

7. Results and Discussions

The proposed CWSB mechanism was simulated using the ns3 simulator (https://www.nsnam.org/releases/ns-3-34/ (accessed on 30 September 2021)), version 3.34. Further, we also assumed that PHY channel conditions were perfect with no impairments, no neighbour capture, and we focused the performances of the MAC layer. Table 2 summarizes the notations and network parameters used in this analysis. Further, a full-buffer traffic model was supposed for the APs and the connected stations, i.e., they always have a data frame for transmissions. A residential indoor scenario was considered for the evaluation defined by [30] IEEE TGax document. Multiple access points were deployed for network connectivity as shown in Figure 8.

Throughput and Delay Analysis

To evaluate the performance of CWSB, the simulation and analytical results are compared with the state-of-the-art BEB and one of the related contention window scaling algorithm term as COSB. Figure 9 describes the performance of BEB in terms of the throughput, which is severely degraded due to its blind increase and decrease of C W size. The COSB scales the contention window by decrementing one after each successful transmission instead of C W to C W m i n to reduce the channel collision probability, while it takes more time to reach its initial back-off stage. More specifically for dense users, most of the stations remain at a higher contention window and have low accessing rights to access the channel. The performance of COSB is also limited for a higher number of contending stations. CWSB provides increased throughput and a shorter delay for an increased number of contending stations (up to 75 contending stations instead of 50 stations).
Initially, the performance of the proposed mechanism is slightly better than COSB until 40 contending stations, whereas CWSB shows performance enhancement due to an efficient channel collision-based window-scaled back-off mechanism for dense users. Figure 9 illustrates that the CSWB also reduced the average delay for data frame transmissions due to optimal scaling of the contention window size specifically for denser networks.
Furthermore, Figure 9 also represents that the analytical model of CWSB is accurate due to the analytical results (CWSB-Ana) being closely matched with the simulation results (CWSB-Sim) for improved normalised throughput and lower average delay calculations. This minor difference between the analytical analysis and simulation results is due to several reasons, such as (i) the calculation of τ and p c c belonging to a non-linear system. In addition, (ii) T s u c also accounts for the value of several parameters ( D F h d r , E [ P ] , S I F S , 2 δ , A C K and D I F S ) as mentioned in Equation (35).
Further, Figure 10 reveals the normalised throughput and average delay for an unsaturated traffic environment with a varying number of contending stations and varying the offered load (packets/s). Figure 10 also shows that the normalised throughput increases linearly with the traffic arrival rate at first for all mechanisms (BEB, COSB and CWSB) until saturation is obtained for approximately 15 contending stations, whereas the throughput performance starts to decrease badly for BEB and slightly for COSB, while CWSB provides enhanced throughput towards an increased number of contending stations. In addition, Figure 10 also shows a similar behaviour for the reduced average delay towards the considered protocols.
Figure 11 presents the normalised throughput performance under an unsaturated environment for various offered loads that considered 10 and 30 contending stations. Figure 10 also reveals that the throughput of CWSB depends on the number of contending stations or the saturation of the network. Although, for fewer number of users (i.e., 10 contending stations), the normalised throughput had same results until the offered load increased and more stations transmitted the data. However, Figure 10 also shows the degraded performance of BEB, when the number of contending stations increased up to n = 30. In this scenario, the COSB performed better than BEB, whereas CWSB had enhanced throughput even for a higher number of contending stations along with a higher load.
Figure 8 shows an indoor dense scenario building of five floors, where each floor has 20 apartments, and each floor has one AP. Further, it is necessary to consider that all contending stations (from station-1 to station-n) are placed at fixed positions for each AP, and the topology is assumed to be static. In a floor layout, 20 APs are installed, and all contending stations follow the CWSB mechanism for transmission opportunities as shown in Figure 3. Furthermore, Figure 12 shows the performance of CWSB considering the scalability for the increased number of APs (we show the performance of AP-1 to AP-5). Figure 8 reflects a grid topology where corner APs (AP1- and AP-2) show a slightly higher normalized throughput and low average delay (with respect to AP-3, AP-4 and AP-5 where fewer contending stations face a higher probability of collision due to the nodes of the neighbouring APs).
In COSB, the C W size of some contending stations increases and suffers from a fairness issue due to repeatedly operating at higher back-off stages or C W size, and a few fortunate contending stations can operate at a lower back-off stage or smaller C W size. Further, under COSB, once the contending station reaches a higher back-off stage, it has to deliver several successful data frames to return to the lower back-off stage or smaller C W size, which seems challenging due to the high probability in a dense network. The proposed CWSB brings better fairness to the contending stations because every contending station has more opportunities to return to the lower back-off stage or smaller C W size.
Figure 13 shows the throughput comparison of BEB, COSB and CWSB for indoor residential dense scenarios. Performance logs reveal that the CWSB mechanism optimizes C W to improve the throughput and reduce collision probabilities compared to BEB and COSB, respectively. Further, CWSB provides better channel access opportunities to the contending stations in a dense environment due to the optimized window-scaled back-off mechanism.
Per-station throughput evaluation metrics are suggested by 11ax TG, such as (i) at the 5th percentile (the minimum throughput of stations measured at the cell edge), (ii) at the 50th percentile (average throughput of stations measured in the simulation) and (iii) at the 90th percentile of per-station throughput (top performance throughput of stations at the cell centre of BSS or a deployed HEW network). Per-station performance at the 50th percentile throughput of CWSB is shown in Figure 14 for various numbers of contending stations.

8. Conclusions

Wireless local area networks (WLANs), known as Wi-Fi, are widely deployed to meet the enhanced needs of data-centric internet applications, such as wireless docking, unified communications, cloud computing, interactive multimedia gaming, progressive streaming, support of wearable devices, up-link broadcasts and cellular offloading. The Wi-Fi network adopts Distributed Coordination Function (DCF)-based Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA), which uses the Binary Exponential Back-off (BEB) algorithm at the MAC layer mechanism to access channel resources.
Currently deployed Wi-Fi networks face huge challenges towards efficient channel access for denser environments due to the blind exponential increase/decrease of a contention window ( C W ) procedure that is inefficient for a higher number of contending stations. Several modifications and amendments have been proposed to improve the performance of the MAC layer channel access based on a fixed or variable C W size. However, a more realistic network density-based channel resource allocation solution is still missing.
An efficient channel resource allocation is one of the most critical challenges for future highly dense WLANs, such as High-Efficiency WLAN (HEW). In this paper, we proposed a Channel Collision-based Window-Scaled Back-off (CWSB) mechanism for channel resource allocation in HEW. In our proposed CWSB, all contending stations select an optimized C W size for each back-off stage for collided or successfully transmitted data frames.
We affirmed the performance of the proposed CWSB mechanism with the help of an Iterative Discrete Time Markov Chain (I-DTMC) model. This paper evaluated the performance of our proposed CWSB mechanism in HEW Wi-Fi networks using an NS3 simulator in terms of the normalized throughput and channel access delay compared to the state-of-the-art BEB and a recently proposed mechanism. Hence, simulation results show that the CWSB provides improved throughput and shorter delay for an increased number of contending stations (up to 75 contending stations instead of 50 stations) and was improved for denser networks in terms of the throughput and access delay.
The CWSB focused on improvements of the throughput and average access delay for dense networks, and future work should aim the scheduling and resource allocation for dense users to improve the fairness and area throughput as network metrics.

Author Contributions

Conceptualization, A.R. and F.B.H.; methodology, A.R., F.B.H. and A.H.; software, A.R. and J.T.; validation, A.R. and J.T.; formal analysis, A.R. and A.H.; investigation, A.R.; resources, F.B.H.; data curation, A.R.; writing—original draft preparation, A.R.; writing—review and editing, A.R., F.B.H. and A.H.; visualization, A.R.; supervision, F.B.H.; publication funding acquisition, A.H. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

The authors would like to thank the Sejong University Research Department for collaborative work towards the publication of this research article.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
APAccess Point
BSSBase Service Set
BOBack-Off Counter
BEBBinary Exponential Back-off
CSCarrier Sense
CSMA/CACarrier Sense Multiple Access with Collision Avoidance
CWContention Window
CTSClear-to-Send
DIFSDCF Inter-Frame Space
DCFDistributed Coordination Function
EDCAEnhanced Distributed Channel Access
ECAEnhanced Collision Avoidance
HEWHigh-Efficiency WLANs
I-DTMCIterative Discrete Markov Chain model
MACMedium Access Control
MU-RTSMulti-User Request-to-Send
MU-CTSMulti-User Clear-to-Send
NAVNetwork Allocation Vector
RTSRequest-to-Send
stationStation
SIFSShort Inter-Frame Space
TXOPTransmission Opportunity
TFTrigger Frame
WLANWireless Local Area Network
p c c Channel collision probability
τ t p Transmission probability
W o p t Window optimization
τ s u c Successful transmission probability
δ Propagation delay

References

  1. Feldmann, A.; Gasser, O.; Lichtblau, F.; Pujol, E.; Poese, I.; Dietzel, C.; Wagner, D.; Wichtlhuber, M.; Tapiador, J.; Vallina-Rodriguez, N.; et al. Implications of the COVID-19 Pandemic on the Internet Traffic. In Proceedings of the Broadband Coverage in Germany; 15th ITG-Symposium, Online, 2–3 March 2021; VDE: Berlin, Germany, 2021; pp. 1–5. [Google Scholar]
  2. Fraga-Lamas, P.; Fernández-Caramés, T.M.; Suárez-Albela, M.; Castedo, L.; González-López, M. A review on internet of things for defense and public safety. Sensors 2016, 16, 1644. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  3. Mora, H.; Gil, D.; Terol, R.M.; Azorín, J.; Szymanski, J. An IoT-based computational framework for healthcare monitoring in mobile environments. Sensors 2017, 17, 2302. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  4. Cisco, S. Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2017–2022; Cisco Public Information: San Jose, CA, USA, 2017. [Google Scholar]
  5. Laurent, C. Usage models for IEEE 802.11 High Efficiency WLAN Study Group (HEW SG)–Liaison with WFA. 2013. Available online: https://www.ieee802.org/11/Reports/hew_update.htm (accessed on 5 September 2021).
  6. Aboul-Magd, O. IEEE 802.11 HEW SG Proposed CSD. 2015. Available online: https://mentor.ieee.org/802.11/dcn/15/11-15-0978-01-0000-september-2015-wg-closing-report.pptx (accessed on 5 September 2021).
  7. Bianchi, G. Performance analysis of the IEEE 802.11 distributed coordination function. IEEE J. Sel. Areas Commun. 2000, 18, 535–547. [Google Scholar] [CrossRef]
  8. Cali, F.; Conti, M.; Gregori, E. Dynamic tuning of the IEEE 802.11 protocol to achieve a theoretical throughput limit. IEEE/ACM Trans. Netw. 2000, 8, 785–799. [Google Scholar] [CrossRef] [Green Version]
  9. Song, N.O.; Kwak, B.J.; Song, J.; Miller, M. Enhancement of IEEE 802.11 distributed coordination function with exponential increase exponential decrease backoff algorithm. In Proceedings of the 57th IEEE Semiannual Vehicular Technology Conference, 2003. VTC 2003-Spring, Jeju, Korea, 22–25 April 2003; Volume 4, pp. 2775–2778. [Google Scholar]
  10. Li, T.; Tang, T.; Chang, C. A new backoff algorithm for IEEE 802.11 distributed coordination function. In Proceedings of the 2009 Sixth IEEE International Conference on Fuzzy Systems and Knowledge Discovery, Tianjin, China, 14–16 August 2009; Volume 3, pp. 455–459. [Google Scholar]
  11. Ke, C.H.; Wei, C.C.; Lin, K.W.; Ding, J.W. A smart exponential-threshold-linear backoff mechanism for IEEE 802.11 WLANs. Int. J. Commun. Syst. 2011, 24, 1033–1048. [Google Scholar] [CrossRef]
  12. Ali, R.; Shahin, N.; Kim, Y.T.; Kim, B.S.; Kim, S. Channel observation-based scaled backoff mechanism for high-efficiency WLANs. Electron. Lett. 2018, 54, 663–665. [Google Scholar] [CrossRef]
  13. Supplement to IEEE Standard for Information Technology Telecommunications and Information Exchange between Systems Local and Metropolitan Area Networks Specific Requirements. Part 11: Wireless LAN Media Access Control (MAC) and Physical Layer (PHY) Specifications. 2009. Available online: https://standards.ieee.org/ieee/802.11/10548/ (accessed on 10 September 2021).
  14. Medepalli, K.; Tobagi, F.A. Towards performance modeling of IEEE 802.11 based wireless networks: A unified framework and its applications. In Proceedings of the IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications, Barcelona, Spain, 23–29 April 2006; pp. 1–12. [Google Scholar]
  15. Ye, C.; Li, Y.; Reznik, A. Performance analysis of exponential increase exponential decrease back-off algorithm. In Proceedings of the 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, Miami, FL, USA, 6–10 December 2010; pp. 1–6. [Google Scholar]
  16. Barcelo, J.; Bellalta, B.; Sfairopoulou, A.; Cano, C.; Oliver, M. CSMA with enhanced collision avoidance: A performance assessment. In Proceedings of the VTC Spring 2009-IEEE 69th Vehicular Technology Conference, Barcelona, Spain, 26–29 April 2009; pp. 1–5. [Google Scholar]
  17. Barcelo, J.; Toledo, A.L.; Cano, C.; Oliver, M. Fairness and convergence of CSMA with enhanced collision avoidance (ECA). In Proceedings of the 2010 IEEE International Conference on Communications, Cape Town, South Africa, 23–27 May 2010; pp. 1–6. [Google Scholar]
  18. Martorell, G.; Riera-Palou, F.; Femenias, G.; Barcelo, J.; Bellalta, B. On the performance evaluation of CSMA/E2CA protocol with open loop ARF-based adaptive modulation and coding. In Proceedings of the European Wireless 2012, 18th European Wireless Conference, Poznan, Poland, 18–20 April 2012; VDE: Berlin, Germany, 2012; pp. 1–8. [Google Scholar]
  19. Sanabria-Russo, L.; Faridi, A.; Bellalta, B.; Barcelo, J.; Oliver, M. Future evolution of CSMA protocols for the IEEE 802.11 standard. In Proceedings of the 2013 IEEE International Conference on Communications Workshops (ICC), Budapest, Hungary, 9–13 June 2013; pp. 1274–1279. [Google Scholar]
  20. Sanabria-Russo, L.; Barcelo, J.; Bellalta, B.; Gringoli, F. A high efficiency MAC protocol for WLANs: Providing fairness in dense scenarios. IEEE/ACM Trans. Netw. 2016, 25, 492–505. [Google Scholar] [CrossRef]
  21. Heusse, M.; Rousseau, F.; Guillier, R.; Duda, A. Idle sense: An optimal access method for high throughput and fairness in rate diverse wireless LANs. In Proceedings of the 2005 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Philadelphia, PA, USA, 22–26 August 2005; pp. 121–132. [Google Scholar]
  22. Syed, I.; Roh, B.H. Adaptive backoff algorithm for contention window for dense IEEE 802.11 WLANs. Mob. Inf. Syst. 2016, 2016, 8967281. [Google Scholar] [CrossRef]
  23. Syed, I.; Shin, S.H.; Roh, B.H.; Adnan, M. Performance improvement of QoS-enabled WLANs using adaptive contention window backoff algorithm. IEEE Syst. J. 2017, 12, 3260–3270. [Google Scholar] [CrossRef]
  24. Li, F.; Huang, G.; Yang, Q.; Xie, M. Adaptive contention window MAC protocol in a global view for emerging trends networks. IEEE Access 2021, 9, 18402–18423. [Google Scholar] [CrossRef]
  25. Shahin, N.; Ali, R.; Kim, S.W.; Kim, Y.T. Cognitive backoff mechanism for IEEE802. 11ax high-efficiency WLANs. J. Commun. Netw. 2019, 21, 158–167. [Google Scholar] [CrossRef]
  26. Lee, J.L.; Kyung, Y. AP-based CW Synchronization Scheme in IEEE 802.11 WLANs. JOIV Int. J. Inform. Vis. 2021, 5, 194–199. [Google Scholar] [CrossRef]
  27. Ali, R.; Zikria, Y.B.; Amin, F.; Kim, B.S.; Kim, S.W. I-DTMC: An integrated-discrete time Markov chain model for performance analysis in future WLANs. In Proceedings of the 2017 IEEE 42nd Conference on Local Computer Networks Workshops (LCN Workshops), Singapore, 9 October 2017; pp. 160–164. [Google Scholar]
  28. Hwang, L.J.; Sheu, S.T.; Shih, Y.Y.; Cheng, Y.C. Grouping strategy for solving hidden node problem in IEEE 802.15. 4 LR-WPAN. In Proceedings of the First IEEE International Conference on Wireless Internet (WICON’05), Washington, DC, USA, 10–15 July 2005; pp. 26–32. [Google Scholar]
  29. Lee, M.W.; Hwang, G.; Roy, S. Performance modeling and analysis of IEEE 802.11 wireless networks with hidden nodes. In Proceedings of the 16th ACM International Conference on Modeling, Analysis & Simulation of Wireless and Mobile Systems, Barcelona, Spain, 3–8 November 2013; pp. 135–142. [Google Scholar]
  30. Abul-Magd, O. 802.11 HEW SG Proposed PAR. Available online: https://mentor.ieee.org/802.11/dcn/14/11-14-0165-01-0hew802-11-hew-sg-proposed-par.docx (accessed on 15 September 2021).
Figure 1. DCF channel-access-mechanism for the IEEE 802.11 (a) DCF Basic and (b) DCF RTS/CTS transmission procedure.
Figure 1. DCF channel-access-mechanism for the IEEE 802.11 (a) DCF Basic and (b) DCF RTS/CTS transmission procedure.
Mathematics 10 02053 g001
Figure 2. Successful and collided transmissions in the IEEE 802.11 (a) DCF Basic and (b) DCF RTS/CTS Channel-Access Mechanism.
Figure 2. Successful and collided transmissions in the IEEE 802.11 (a) DCF Basic and (b) DCF RTS/CTS Channel-Access Mechanism.
Mathematics 10 02053 g002
Figure 3. CWSB mechanism during the back-off procedure.
Figure 3. CWSB mechanism during the back-off procedure.
Mathematics 10 02053 g003
Figure 4. Back-off stage mechanism after collision/successful transmission; (a) back-off stage increment/reset in BEB; (b) back-off stage increment/reset in COSB; and (c) back-off stage increment/reset in the proposed mechanism CWSB.
Figure 4. Back-off stage mechanism after collision/successful transmission; (a) back-off stage increment/reset in BEB; (b) back-off stage increment/reset in COSB; and (c) back-off stage increment/reset in the proposed mechanism CWSB.
Mathematics 10 02053 g004
Figure 5. Flow chart comparison of BEB, COSB and the proposed CWSB algorithm.
Figure 5. Flow chart comparison of BEB, COSB and the proposed CWSB algorithm.
Mathematics 10 02053 g005
Figure 6. Iterative discrete time Markov chain (I-DTMC) model for the channel collision-based window-scaled back-off (CWSB) mechanism.
Figure 6. Iterative discrete time Markov chain (I-DTMC) model for the channel collision-based window-scaled back-off (CWSB) mechanism.
Mathematics 10 02053 g006
Figure 7. T s and T c calculations for the (a) basic and (b) SU/MU RTS/CTS access mechanism.
Figure 7. T s and T c calculations for the (a) basic and (b) SU/MU RTS/CTS access mechanism.
Mathematics 10 02053 g007
Figure 8. Multiple AP topology for a residential scenario.
Figure 8. Multiple AP topology for a residential scenario.
Mathematics 10 02053 g008
Figure 9. Calculated normalised throughput and average delay under a saturated traffic environment.
Figure 9. Calculated normalised throughput and average delay under a saturated traffic environment.
Mathematics 10 02053 g009
Figure 10. Calculated normalised throughput and average delay under an unsaturated traffic environment.
Figure 10. Calculated normalised throughput and average delay under an unsaturated traffic environment.
Mathematics 10 02053 g010
Figure 11. Normalised throughput under an unsaturated traffic environment.
Figure 11. Normalised throughput under an unsaturated traffic environment.
Mathematics 10 02053 g011
Figure 12. Scalability analysis of the CWSB mechanism for multiple APs.
Figure 12. Scalability analysis of the CWSB mechanism for multiple APs.
Mathematics 10 02053 g012
Figure 13. Throughput comparison of BEB, COSB and CWSB for an indoor residential scenario.
Figure 13. Throughput comparison of BEB, COSB and CWSB for an indoor residential scenario.
Mathematics 10 02053 g013
Figure 14. Per-station 50th percentile throughput for CWSB.
Figure 14. Per-station 50th percentile throughput for CWSB.
Mathematics 10 02053 g014
Table 2. Revised simulation parameters.
Table 2. Revised simulation parameters.
ParametersValues
MAC ProtocolEDCA-BE (CSMA/CA)-based
Channel BW20 MHz
Operating Frequency5 GHz
Contending Stations5 to 75
Payload size1472 bytes
C W m i n 32
C W m a x 1024
slot time9 ms
Simulation time100–400 s
Distance from Access Point5/15 m
Propagation loss modelLogDistancePropagation
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Rehman, A.; Hussain, F.B.; Tanveer, J.; Haider, A. Collision-Based Window-Scaled Back-Off Mechanism for Dense Channel Resource Allocation in Future Wi-Fi. Mathematics 2022, 10, 2053. https://doi.org/10.3390/math10122053

AMA Style

Rehman A, Hussain FB, Tanveer J, Haider A. Collision-Based Window-Scaled Back-Off Mechanism for Dense Channel Resource Allocation in Future Wi-Fi. Mathematics. 2022; 10(12):2053. https://doi.org/10.3390/math10122053

Chicago/Turabian Style

Rehman, Abdul, Faisal Bashir Hussain, Jawad Tanveer, and Amir Haider. 2022. "Collision-Based Window-Scaled Back-Off Mechanism for Dense Channel Resource Allocation in Future Wi-Fi" Mathematics 10, no. 12: 2053. https://doi.org/10.3390/math10122053

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop