5.1. Considered Scenario and Simulation Setup
To evaluate the performance of CAC and DAC, we consider a Wi-Fi HaLow network with an AP and M STAs (hereinafter referred to as saturated STAs) transmitting data in the saturated mode, i.e., they always have data frames in their queues. The saturated STAs are connected to the AP at the beginning of the experiment. In a given time instant, N STAs (hereinafter referred to as new STAs) appear and start link set-up to the AP. By default, while N is variable from 100 to 8000.
The AP uses one of the described authentication control protocols to limit the contention of the new STAs.
Small Area: the saturated STAs and the new STAs are located close to the AP and to each other, i.e., they can clearly sense each other;
Large Area: the saturated STAs and the new STAs are located in a wide range around the AP; thus, the central STAs sense each other, while the edge STAs cannot sense the STAs on the opposite edge;
Two Groups: the AP can sense saturated STAs and new STAs, but saturated STAs are hidden from the new STAs.
We measure the link set-up time from the appearance of the group of new STAs until the end of association for the last STA. For that, we implement the described scenario in the ns-3 simulator [
14]. The network operates in a 1 MHz channel at a fixed rate of 600 kbps. In the Small Area case, all STAs are spread uniformly within a circle with 30
radius around the AP. In the Large Area case, all STAs are spread uniformly within a circle with 200
radius around the AP. In the Two Groups case, saturated STAs are spread uniformly within a
box at a distance of 200
from the AP, and new STAs are spread uniformly within a
box at a distance of 200
from the AP on the diametrically opposite side. Thus, we guarantee that all the STAs can receive frames from the AP, the AP can receive frames from all the STAs, but STAs of different types do not sense each other.
At the start of the simulation, saturated STAs associate to the AP, and after successful association starts transmitting saturated data flows using EDCA. A random delay from 1 to 5 after all saturated STAs are associated with the AP, new STAs appear and start associating to the AP.
The AP broadcasts beacons with a period of
ms, and the
at STAs is set to
ms. It should be noted that regardless of
, once the STA starts transmission of a frame, it does not drop the frame until the frame is either transmitted or the retry limit is reached. It means that the frame generated at the beginning of a beacon-interval can still be transmitted during the next
, which is an important issue touched upon in
Section 5.2.
5.2. Evaluation of Distributed Authentication Control
To evaluate the performance of DAC in the described scenario, we consider different values of its parameters, looking for the set of parameters that minimizes the link set-up time for the new STAs.
Firstly, we vary the
parameter with fixed
and
in the Small Area case.
Figure 5 shows the dependency of link set-up time on the number of new STAs. According to the obtained results, the optimal value of
depends on the number of new STAs. When the number of new STAs is small, they can associate at the first attempt and the association lasts for
on average. Thus, the use of large
is redundant and just increases the association time. At the same time, in the case of numerous new STAs, the first authentication attempts are mostly unsuccessful if
is low, which results in new authentication attempts and increases the link set-up time. Selection of high
increases the success probability of the first authentication attempt.
Secondly, we vary the
parameter with fixed
and
(see
Figure 6). As one can see, the variance of
has almost no effect on the link set-up time. This is caused by the fact that the STA does not necessarily transmit its
during the chosen ACS. At the beginning of its ACS, the STA just generates its
and starts the procedure of random channel access. However, if the channel is busy or in case of collisions, the STA can defer the actual transmission of
past the end of its ACS or even beyond its
. As the result, transmission attempts are not localized within their corresponding ACSs but are spread in time regardless of the
value.
In the Large Area case, the STAs in different parts of the network do not hear each other. It increases the frame collision rate, and, consequently, link set-up time (see
Figure 7). Another effect is that the discrepancy between the curves with different parameters becomes less significant because the collisions with new STAs and with saturated STAs have a similar impact on the link set-up time.
If the saturated STAs are hidden from the new STAs, the link set-up time becomes higher than in the Small Area case but lower than in the Large Area case (see
Figure 8). The collision rate of
and
is higher than in the Small Area case, which explains increased link set-up time. At the same time, since new STAs do not sense saturated STAs, they spend less time waiting for the channel to become idle, which results in link set-up time lower than in the Large Area case. In addition, a relative increase of link set-up time is higher for small numbers of new STAs because collisions make the STAs double their
more often.
In summary, the optimal value for depends on the number of contending STAs, which is typically unknown at the beginning of the link set-up process. Moreover, since the impact of on link set-up time is stronger for the small number of contending STAs, should be rather small, e.g., 8 or 16. At the same time, the performance of the protocol almost does not depend on .
5.3. Comparison of Authentication Control Protocols
In this section, we compare the performance of CAC and DAC.
Figure 5 presents the dependency of the average link set-up time for a group on new STAs on the number of STAs in the Small Area case. Here, we show the link set-up time for CAC when our algorithm—described in
Section 2.4—is used (curve “CAC, new”), and compare it with an old version of our algorithm, presented in [
6] (curve “CAC, old”) and with Oracle, which is an idealistic solution corresponding to the case when the AP a priori knows the number of STAs that are connecting to it and sets up the authentication threshold accordingly. In other words, the results of the Oracle algorithm can be considered as a lower bound for the link set-up time. As one can see, CAC with the threshold control algorithm described in
Section 2.4 is almost twice as efficient as DAC in terms of link set-up time and is very close to the Oracle solution.
In the Large Area case, we obtain a similar dependency, but the link set-up time becomes higher for all the considered protocols (see
Figure 8). Moreover, the gap between the CAC and DAC link set-up time becomes more significant.
In the Two Groups case (see
Figure 8), the link set-up time is higher than in the Small Area case but lower than in the Large Area case. The reason for such a difference is explained in
Section 5.2.
Let us explain why CAC is much more efficient than DAC when the number of STAs is high. In case of collisions, the DAC doubles , therefore the time interval over which the STAs’ transmission attempts are spread is also doubled. Unlike EDCA, such deferral time is not shortened if the channel is idle. Thus, having occasionally several collisions in a row, the STA may significantly increase its link set-up time. Apart from that, the link set-up time for DAC significantly fluctuates from run to run.
Another important issue of DAC is the collision accumulation effect, which happens as follows. If is too low, the first authentication attempts of most STAs are unsuccessful. These STAs make new attempts in a twice wider , but this interval intersects with the interval where the other STAs make their first transmission attempt. As a result, the collision probability for retries does not immediately decrease and is finally increased too much.
At the same time, when CAC is used with our authentication threshold control algorithm, the time interval and the protocol parameters are set up adaptively, in accordance with the estimated number of connecting STAs. This is why CAC allows obtaining a link set-up time close to the optimal.
We also show the results for the Large Area and Two Groups cases, when the frame body capture effect is enabled. Capture effect is a phenomenon observed in some receivers [
18], when an STA receiving two partially overlapping frames switches to a stronger one even if it is already receiving the weaker one. In our simulation, we considered that the switch happens if the power difference at the receiver is at least 10 dB. As shown in
Figure 9 and
Figure 10, with capture effect enabled, the difference between CAC and DAC increases even more. The reason for such a behavior is that, with capture effect present, the success rate for the saturated STAs rises, which in its turn makes their traffic more intensive and increases interference and collision rate for the edge new STAs. The DAC reacts to higher collision rate by increasing the average
, which yields longer link set-up. At the same time, the CAC adapts to the collision rate and the channel occupancy and thus provides faster link set-up.
The new version of the threshold control algorithm outperforms the old one. It provides lower link set-up time, which becomes very close to the Oracle solution, and is also more stable, i.e., it has a lower variance of the link set-up time. To explain this difference, we need to highlight again the changes we have introduced to the algorithm and consider the plots in
Figure 11. They show the time dependencies of the number of STAs associated with the AP and the size of the AP queue, CAC threshold, and CAC
value for the old and new threshold control algorithms and for the DAC protocol. The CAC results are provided for several runs to highlight the difference between the algorithms. For the CAC protocol, the number of associated STAs grows almost linearly with time, and, for most runs, the results for the new and old algorithm are the same. When the new STAs appear, the AP queue suddenly grows, but later it is kept at a relatively low length. The CAC up algorithm quickly finds a suitable value for
and for the most time keeps it constant. Thus, the threshold grows linearly. However, in some runs (e.g., run 3), the old algorithm underestimates the optimal
, and, although lower
yields lower average queue size, it also yields slower growth of threshold and, as a consequence, slower link set-up time. On the contrary, the new algorithm tunes
if the queue has been empty for several
in a row. In the considered run, the algorithm firstly underestimates the optimal
during the learning mode, but later in the working mode increases
in several steps and reaches a value close to optimal.
The plots also show that the DAC protocol quickly associates most STAs, but for a small portion of STAs the link set-up time is high because they make unsuccessful authentication attempts, increase their and make new authentication attempts after waiting for the deferral which is the higher the more unsuccessful attempts the STA has made.
To explain another feature of the new algorithm for the CAC protocol, we consider a situation when the new STAs arrive in two groups. Specifically, after the saturated STAs connect to the AP, a group of 2000 new STAs appears and starts associating with the AP. Later, when half of them are associated, 2000 more STAs appear and start associating too. In such a scenario, the second group of new STAs arrives while the CAC authentication threshold control algorithm is in the working mode. As shown in
Figure 12, in such a case, the old version of our algorithm shows poor performance because, as soon as the second group appears, the AP experiences sudden significant increase of the queue size, freezes its threshold and waits until the queue becomes empty, which means that it waits until the STAs resolve their collisions according to bare EDCA. On the contrary, the new algorithm detects that the queue has become too long and switches back to the learning mode, drops the threshold and estimates a new
, thus helping the STAs to authenticate and associate without unnecessary collisions. Later, when the threshold reaches the value it had before the drop, the algorithm recalculated the
because the new
should correspond to a higher number of STAs. The effect of such a recalculation can be seen at the queue size plot, so the queue size for “CAC, new” after 200 s (when it reaches the old threshold value) is lower than the queue size for “CAC, old” after 700 s (when it unfreezes the threshold).
The changes made to the algorithm improve its ability to adapt to the number of devices in the network and decrease the link set-up time almost twofold. The new algorithm can work well even if the devices arrive in more than two groups because the algorithm maintains a history of old threshold and values used in the working mode and recalculates the every time it reaches them. The algorithm forgets the history only if it reaches the maximal threshold value and the queue is free, which indicates that all the STAs have set up the link with the AP.
It should be noted that, in this scenario, for most STAs, the DAC provides a lower link set-up time than the old CAC authentication threshold algorithm because the new STAs randomize the when they start their authentication attempts. However, the DAC still suffers from the fact that a small number of STAs have very high link set-up time. In addition, it is less efficient than our new algorithm.
To sum up, since DAC does not require any additional algorithms, it is much easier in implementation. However, its ability to adapt to the current situation in the network is rather limited. With the standard default parameters (, , ), it provides the link set-up time up to four times higher than the theoretically lower bound.
At the same time, with our authentication threshold control algorithm, the link set-up time for CAC grows almost linearly and is rather close to the theoretical lower bound. The designed algorithm is robust to the changing number of associating STAs.