Introduction
With IEEE 802.11 wireless LANs (WLANs) being widely deployed worldwide, its channel efficiency has received growing concern. The 802.11 networks perform the time-domain contention. In 802.11, each user must wait for a random time, before packet transmission. When multiple users are simultaneously backing off, the channel must remain idle, naturally leading to under-utilization. It has been shown in [1] that more than 30% reduction in throughput due to the time wasted in back-off operators.
Recently, Sen et al. [2] first proposed a time to frequency (T2F) protocol to improve the channel efficiency of wireless LANs. In T2F, users employ OFDM subcarriers to perform channel contention in the frequency domain, instead of the time domain. T2F arbitrates channel contention in two slots. In slot 1, each user signals on one subcarrier randomly chosen from a pool of subcarriers, and listens to this subcarrier pool at the same time by employing a second antenna. Then each user checks all subcarriers to determine the winners, who signal on the smallest subcarrier. In slot 2, the winners perform the 2nd-round frequency-domain contention for further arbitration. Finally, the winner in slot 2 transmits a packet in the next slot. By limiting the channel-contention time to two slots, T2F shortens the contention time greatly and hence improve the channel efficiency, compared to the 802.11.
T2F has attracted a great deal of attention [3]–[8], [10], [11] since it has been proposed. Among them, [3]–[5] are the most relevant to this study. Feng et al. [3] proposed a novel MAC design called REPICK. REPICK partitions all OFDM subcarriers into two groups: identification subcarriers (each of which is assigned to a unique user) and contention subcarriers (which are used by all users for channel contention). By allowing users to simultaneously transmit ACK over identification subcarriers and contend for channel over contention subcarriers like T2F, REPICK can exclude the DIFS time and significantly reduce the random backoff time, and the ACK transmission time in conventional 802.11 networks. Sen et al. [4] proposed Back2F protocol. Back2F extended T2F by creating backoff operations in the frequency domain. Like T2F, each user in Back2F first randomly picks a subcarrier from a specified range to contend for the channel, and then start the transmission, where the subcarrier chosen by a user is regarded as the current backoff value of the user. However, unlike T2F, after the transmission is finished, all other users will continue contending for the channel using the updated backoff value (rather than re-choosing a new subcarrier randomly), where the updated backoff value of a user is the result that its chosen subcarrier number subtracts the minimum subcarrier number in the last contention.
However, in the above related work, each user uniformly selects a subcarrier from the same subcarrier pool. As a result, each user has the same channel access opportunity. However, in reality, different applications have different quality of service (QoS) requirements. For example, a voice packet should have a more stringent delay requirement than a data packet and therefore should be assigned a higher transmission opportunity. Clearly, T2F, B2F and REPICK cannot fulfill the QoS requirements of real-time applications.
Recently, prioritized frequency-domain contention scheme [5] has been proposed. The authors in [5] proposed a scheme called WiFi-BA. WiFi-BA introduces a binary-mapping scheme to make collision detection in frequency domain, and a bitwise-arbitration (BA) mechanism to contend for channel. What WiFi-BA provides is absolute priority, where high-priority (HP) users will occupy all available bandwidth for immediate transmission, thereby starving low-priority (LP) users. In addition, WiFi-BA cannot completely exclude collisions (for example, a collision will occur when more than one user selects the same random value in binary mapping scheme) and the low-priority users often need several slots to contend for channel.
Instead of providing absolute priority, in this paper, we propose a novel weighted frequency-domain contention (WFC) scheme to provide relative priority (where HP and LP users coexist and share the total available bandwidth with different proportions). Our contributions are summarized as follows.
In the design, WFC makes signification modifications in the two-slot contention process.
In slot 1, WFC allows HP and LP users, respectively, to choose subcarriers from [1,
] and [S ,F+1 ], whereL , and they delimit the range of the selectable subcarriers. Through suitably setting different values ofF\leq S\leq L andS , WFC can provide general and fine-grained priority differentiations. For example, whenF andS=L , WFC reduces to T2F.F=0 In slot 2, the winners in slot 1 enter the second round contention. In this paper, we adopt a signature-assisted method to detect all these winners (which is feasible because the number of winners is not too large as shown in Fig. 8). This enables us to exclude collisions totally. In contrast, most existing schemes (such as WiFi-BA and T2F) still adopted the similar frequency-contention scheme as that in slot 1, and therefore there might exist collisions in slot 2.
In the analysis, we propose a theoretical framework to study the throughput and the proportional fairness of WFC. With this framework, we can evaluate the system performance, and optimize the settings of the design parameters S and F, and achieve proportional fairness. In contrast, the most previous works (such as T2F, B2F, and WiFi-BA) just evaluate their design via simulation.
In the simulation, we run extensive experiments to study how the system performance varies with the user number and various design parameters. These experiments verify that our theoretical model is very accurate.
The rest of this paper is organized as follows. Section II outlines the T2F protocol. Section III presents the proposed WFC protocol. Section IV theoretically analyzes the performance of WFC. Section V presents simulation results to validate the accuracy of the proposed model. Section VI concludes this paper. In addition, Table 1 lists all used notations.
T2F
In this section, we present the basic ideas and the drawbacks of T2F [2].
A. Basic Ideas
T2F is a scheme that provides fair channel access via frequency-domain contention for WLANs.
In T2F, each user has two antennas: one for regular data transmission and another for listening to the channel. T2F uses the OFDM-based physical layer techniques. In OFDM, the whole channel is divided into
Consider a star-topology WLAN illustrated in Fig. 1, where each user,
In R1, each user signals on one subcarrier (via the transmission antenna) randomly chosen from a pool of subcarriers, and at the same time listens to this subcarrier pool via the listening antenna. T2F users treat the subcarriers as integer numbers. Then each user can determine the winners, who signal on the smallest subcarrier. In the example of Fig. 2, in R1, U1 and U4 select No.5 subcarrier, U3 and U2 select No.8 and No.11 subcarriers, respectively. Then U1 and U4 win because their selected subcarrier is the minimum.
In R2, the users choosing the smallest subcarrier perform the frequency-domain contention in the same way as R1 contention, and then transmit data in the ascending order of the chosen subcarriers. In the example of Fig. 2, in R2, U1 and U4 select No. 4 and No. 8 subcarriers, respectively. After that, U1 and U4 transmit data sequentially.
B. Drawbacks
In T2F, each user uniformly selects a subcarrier from the same subcarrier pool. Therefore, each user has the same channel access opportunity. However, in reality, different applications have different QoS requirements. For example, a voice packet should have more stringent delay requirement than a data packet and therefore should be assigned a higher transmission opportunity. Clearly, T2F cannot fulfill the QoS requirements of real-time applications. In addition, T2F cannot exclude the collisions fully. For example, if more than one user enters R2 and chooses the same subcarrier, this will cause collisions in data transmission.
The Proposed WFC
In this section, we present the weighted frequency-domain contention (WFC). We first make an overview of the WFC protocol in Subsection A, then, present its contention process in Subsections B and C.
A. Overview of WFC
WFC is an amendment of T2F. In T2F, it provides the same service for every contention user. In contrast, WFC would provide weighted services for different users based on their different demands. In this paper, we consider a one-hop star-topology WLAN where each user can hear each other as shown in Fig. 3, and assume that the system has two priority classes: high-priority (HP) class and low-priority (LP) class. In WFC, HP users have higher channel access probabilities than LP users.
Like T2F, in WFC, each user has two antennas (one for transmission and the other for listening signals), and performs the frequency-domain contention. As illustrated in Fig. 4, when a user wants to transmit data, it first senses the channel for a DIFS time, and then enters a two-round contention process consisting of R1 and R2, and chooses the winners. At last, the winners transmit data.
However, unlike T2F, we assume that each user is assigned to a unique signature. Each signature is associated with a sequence number, and is known to all users. WFC has the following key differences in the R1 and R2 contention stages.
1) Difference in R1
In WFC, different users signal on different subcarrier pools (i.e., different subcarrier ranges). As a result, different users will have different channel access opportunities. For example, assume that U1 and U2 are HP users, whereas U3 and U4 are LP users. Fig. 4 illustrates that the HP users (i.e., U1 and U2) can select a random subcarrier in subcarrier pool [1], [10], while the LP users (i.e., U3 and U4) choose in [4,
2) Difference in R2
Our purpose is to schedule multiple data transmissions upon one contention. Therefore, we aim at detecting all winners in R1 (which is feasible because the number of winners is not too large as shown in Fig. 8). In R2, while sending its signature on the whole channel, each user also executes correlation to detect all transmitted signatures, and then determines the transmission order by the sequence numbers of these signatures. For example, in Fig. 4, we assume that U1 first transmits, and then U4 transmits, according to the associated sequence number.
In the following subsections, we will detail the R1 and R2 contention stages.
B. Weighted Frequency-Domain Contention in R1
We assume that the whole channel is divided into
As shown in Fig. 5, in R1, we let the HP and LP users, respectively, uniformly choose subcarrier from subcarrier pool [1,
WFC assigns different channel access probabilities to different priority classes, but it does not exclude the collision - multiple users simultaneously choose the same “minimum” subcarrier (namely, there are multiple winners). For example, in Fig. 4, both U1 and U4 choose subcarrier 5, which is the minimum subcarrier among all chosen subcarriers. Once collisions happen, multiple winners must enter R2 for further contention resolution.
C. Signature-Assisted Contention Resolution in R2
WFC introduces a signature set (e.g.
1) Signature Sending
Each R1 winner transmits its assigned signature on the transmission antenna, and at the same time, it keeps sensing on its listening antenna.
2) Signature Detection
Each winner uses \begin{equation} corr_{i} (L_{S} )=\sum \limits _{k=1}^{L_{S}} {s_{i}^{\ast } (k)y(k+\Delta )} /\sum \limits _{k=1}^{L_{S}} {\left |{ {s_{i} (k)} }\right |^{2}} \end{equation}
3) Data Transmission
After the signature detection, each winner knows how many users will transmit in R2, which is first transmitted and which is then transmitted by the transmission order (mapped from the corresponding signature).Taking Fig. 6 as an example, winners in R1, say U1 and U4, enter R2 and contend for the channel. According to the transmission order, U1 first transmits and U4 then transmits.
4) Signatures Detection With Similar SNRs
In a typical WLAN, each user is near to each other. Therefore, when all winners in R1 (whose population is not too large as shown in Fig. 8) transmit their respective signatures in R2, each of them will receive these signatures with similar SNRs. This makes the accurate signature detection feasible. In WLAN environments, similar methods of simultaneously detecting all collided nodes via signatures have already been used in related work [8], [9].
Performance Analysis
In this section, we develop a theoretical model to analyze the WFC throughput and study how to achieve the proportional fairness in saturation operation (where each user always has packets to transmit).
In this model, we consider a one-hop WLAN consisting of one AP,
A. Throughput
In the following, we first express the per-user throughput and the total system throughput, and then calculate relevant parameters.
Per-user throughput: In WFC, the DATA transmission time can be divided into a series of transmission periods. As shown in the bottom-subfigure in Fig. 6, each transmission period consists of a DIFS interval,
Define the throughput of one type-\begin{equation} \Gamma _{I} =P_{I} \times \frac {L_{DATA}}{T_{DATA} \times E(\xi )+T_{R1} +T_{R2} +T_{DIFS}} \end{equation}
Total system throughput: The total system throughput,\begin{equation} \Gamma =m\Gamma _{H} +n\Gamma _{L} \end{equation}
1) Calculation of P_{I}
To calculate
The case of
In short, the successful transmission probabilities, \begin{align} P_{H}=&P(user~1~win~absolutely\,in~[1,~F]) \notag \\&+\,P(user~1~win~in~[F+1,~S]) \notag \\=&\sum \limits _{i=1}^{F} {f_{H} +f_{H} \sum \limits _{i=F+1}^{S} {(L+1-i)f_{L}}} \\ P_{L}=&P(user~2~win~in~[F+1,~S]) \notag \\=&f_{L} \sum \limits _{i=F+1}^{S} {(S+1-i)f_{H}} \end{align}
The case of \begin{align}&\hspace {-1.2pc}P_{H} (m,n,F,S,L)\notag \\=&P(a~tagged~HP~user~wins~in~[1,~F]) \notag \\&+\,P(a~tagged~HP~user~wins~in~[F+1,~S]) \notag \\=&f_{H} \left({\sum \limits _{i=1}^{F} {(S+1-i)f_{H}} }\right)^{m-1} \notag \\&+\sum \limits _{i=F+1}^{S} {(((S+1-i)f_{H} )^{m-1}\times ((L+1-i)f_{L} )^{n})}\qquad \\&\hspace {-1.2pc}P_{L} (m,n,F,S,L)\notag \\=&P(a~tagged~LP~user~wins~in~[F+1,~S]) \notag \\=&f_{L} \sum \limits _{i=F+1}^{S} {(((S+1-i)f_{H} )^{m}\times ((L+1-i)f_{L} )^{n-1})} \end{align}
Note that, when
2) Calculation of E(\xi )
In this section, we calculate
On one hand, the total system throughput is the sum of each user’s throughput. Let \begin{align} \Gamma=&m\times \Gamma _{H} +n\times \Gamma _{L} \notag \\=&(m\times P_{H} +n\times P_{L} )\notag \\&\times \frac {L_{DATA}}{T_{DATA} \times E(\xi )+T_{R1} +T_{R2} +T_{DIFS}} \end{align}
On the other hand, the total system throughput can be expressed as the ratio of the average data length to the average transmission period. Since \begin{equation} \Gamma =\frac {L_{DATA} \times E(\xi )}{T_{DATA} \times E(\xi )+T_{R1} +T_{R2} +T_{DIFS}} \end{equation}
Combining (8) and (9), we have \begin{align}&\hspace {-1.2pc}E(\xi )\notag \\=&m\times P_{H} +n\times P_{L} \notag \\=&m\times f_{H} \Big (\sum \limits _{i=1}^{F} {\prod \limits _{j=2}^{m} { \left (S+1-i \right )f_{H}}} \notag \\&+\sum \limits _{i=F+1}^{S} \left (\prod \limits _{j=2}^{m} {(S+1-i)f_{H} \times \prod \limits _{k=1}^{n} {(L+1-i)f_{L}}} \right ) \Big ) \notag \\&+\,n\times f_{L} \sum \limits _{i=F+1}^{S} \left (\prod \limits _{j=1}^{m} {(S+1-i)f_{H} \times \prod \limits _{k=2}^{n} {(L+1-i)f_{L}}} \right )\notag \\ {}\end{align}
B. Proportional Fairness
In our model, HP and LP users can, respectively, choose subcarriers from [1,
From (6) and (7), we have \begin{align} \gamma=&\frac {\Gamma _{H} (m,n,F,S,L)}{\Gamma _{L} (m,n,F,S,L)} \notag \\=&\frac {\sum \limits _{i=1}^{F} \!{(S\!+\!1\!-\!i)^{m-1}} \!+\!f_{L}^{n}\sum \limits _{i=F\!+\!1}^{S} {((S\!+\!1\!-\!i)^{m-1}\!\times \! (L\!+\!1\!-\!i)^{n})}}{f_{L}^{n}\!\sum \limits _{i=F+1}^{S}\! {((S+1-i)^{m}\times (L+1-i)^{n-1})}}\notag \\ {}\end{align}
Simulation Verification
In this section, we verify the accuracy of the proposed WFC model in a single-hop star-topology. For verification, we develop a simulator based on C++ language. The simulator is developed by using eclipse CDT and based on the simulation frameworks in [12]. In the framework, we replace the contention process in CSMA/CA by frequency-domain contention. The default parameter settings are shown in Table 2. Each simulation run lasts 200 seconds. In all figures, the labels “ana” and “sim”, respectively, denote the theoretical and simulation results.
A. E(\xi
) Verification
In this section, we verify the accuracy of E(
B. Throughput Verification
In this section, we verify the system throughput and per-user throughput, where L is set to 52.
Fig. 9 plots the system throughput, where the theoretical results is plotted by (3),
Fig. 10 plots per-user throughput when F, S, n and m respectively change, where the theoretical result is plotted by (2), as shown in Fig. 10(a)–10(d).
Per-user throughput in each class when (a) F varies, (b) S varies, (c) n varies, (d) m varies.
Fig. 10 (a) plots the per-user throughput when
Fig. 10 (b) plots the per-user throughput when
Fig. 10 (c) plots the per-user throughput when n varies from 2 to 20. In this figure, we set
Fig. 10 (d) plots the per-user throughput when
C. Proportional Fairness
In this section, we verify the accuracy of our proportional-fairness model. We first present the theoretical and simulation results of the proportional ratio
Fig. 11 (a) plots the value of
Similarly, Fig. 11 (b) plots the value of
Table 3 compares the target value of
Conclusion
In this paper, we propose WFC, a novel weighted frequency-domain contention scheme. WFC provides priority differentiation by limiting OFDM subcarrier access ranges in frequency-domain contention, and resolves collision by signature differentiation. We then analyze the throughput and proportional fairness of WFC. Finally, we verify the accuracy of the proposal theoretical model via extensive simulations.