Next Article in Journal
Magnetite-Silica Core/Shell Nanostructures: From Surface Functionalization towards Biomedical Applications—A Review
Previous Article in Journal
Thermal Performance of Cryogenic Micro-Pin Fin Coolers with Two-Phase Liquid Nitrogen Flows
Previous Article in Special Issue
Transmission Delay-Based Uplink Multi-User Scheduling in IEEE 802.11ax Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Improving Spatial Reuse of Wireless LAN Uplink Using BSS Color and Proximity Information

Department of Computer Science and Engineering, Sogang University, Seoul 04107, Korea
*
Author to whom correspondence should be addressed.
Appl. Sci. 2021, 11(22), 11074; https://doi.org/10.3390/app112211074
Submission received: 28 October 2021 / Revised: 16 November 2021 / Accepted: 17 November 2021 / Published: 22 November 2021
(This article belongs to the Special Issue Next-Generation Wireless Network Protocol Design)

Abstract

:
With the density of wireless networks increasing rapidly, one of the major goals in next-generation wireless LANs (Local Area Networks) is to support a very dense network with a large number of closely deployed APs (Access Points) and crowded users. However, the CSMA (Carrier-Sense Multiple Access)-based medium access control of current wireless network systems suffers from significantly degraded performance when the network becomes dense. Recent WLAN (Wireless Local Area Networks) standards include measures for increasing spatial reuse such as BSS (Basic Service Set) coloring, but the schemes based on BSS coloring such as OBSS/PD (Overlapping BSS/Preamble Detection) have limitations in improving spatial reuse. In this paper, we propose a spatial reuse method for uplink which can utilize BSS color and proximity information to improve the efficiency of carrier sensing and thus spatial reuse. Specifically, through the BSS color and the proximity information, a node receiving a preamble can figure out how far the receiver of the ongoing traffic is located. This information is used to determine whether the node should aggressively start transmitting or defer its transmission to protect the ongoing transmission. Simulation results show that the proposed method outperforms existing methods in terms of throughput and fairness.

1. Introduction

In recent years, WLANs have become an essential part of everyday life in most places. The density of users has grown at a fast rate, because most people use phones, pads, laptops, and other devices that connect to WLANs whenever available, mostly while indoors. The traffic demand of each user is also rapidly increasing due to applications such as video streaming, video conferencing, and automatic backup services. On the other hand, the density of WLAN APs has also increased in recent years. We can easily find tens of WLAN APs accessible from a single indoor location. The cost of WLAN APs has become cheap enough to equip many APs in a room in order to support users in a crowded place. However, deploying more APs does not translate into providing more bandwidth, because the available bandwidth is decided by the frequency spectrum, not the density of APs. To support the ever-increasing traffic demand, an efficient use of frequency resource is very important.
The earlier versions of the IEEE 802.11 WLAN standard did not pay much attention to supporting dense scenarios due to natural reasons. The DCF (Distributed Coordination Function), which is the fundamental medium access control protocol of WLANs, suffers from significantly degraded performance in dense environments due to collisions and hidden/exposed terminal effects. In the latest and upcoming versions of the standard such as IEEE 802.11ax and 802.11be, efficient utilization of the medium is gaining much attention due to increased traffic demand and network density [1,2]. The goal of efficient channel utilization is to maximize “spatial reuse”, or number of parallel transmissions in a given area.
IEEE 802.11ax, the most recent WLAN standard, incorporates a feature called BSS coloring [3], as well as two spatial reuse methods called OBSS/PD and PSR (Parameterized Spatial Reuse) [4]. Although these mechanisms can help increase spatial reuse and thus improve the overall performance in dense environment, they have their limitations as discussed in the next section.
In this paper, we propose a method called PSC-UL (Proximity-based Sensitivity Control for UL) which uses BSS color and proximity information to dynamically control the carrier sense threshold of the nodes. In addition to differentiating between intra- and inter-BSS communication, the idea of PSC-UL is to locate the position of OBSS AP using the BSS color. Furthermore, proximity information is used to predict the position of the transmitting STA. Using this information, a node receiving a preamble can estimate whether its transmission can take place in parallel to the ongoing transmission. This method leads to a more accurate decision compared to OBSS/PD and PSR, and thus can improve spatial reuse further. Simulation results show that the proposed method achieves increased UL throughput compared to existing methods such as OBSS/PD, both for STAs close to the APs as well as STAs in the edge of their BSSes. Packet delivery ratio is also improved, showing that the proximity information can be used to more accurately determine whether a node can successfully transmit a packet in parallel to the ongoing transmission. In the following are the contributions of this paper.
  • We show that the BSS color can be used to predict the location of other APs, which can be used to estimate the interference received by the other AP when the node transmits a packet. Furthermore, we introduce the “proximity information” that can be included in the preamble. This proximity information together with the BSS color can be used to determine whether a node receiving the preamble can start a parallel transmission or not.
  • We propose a new method called PSC-UL that uses the BSS color and proximity information to dynamically control carrier sense threshold of the STAs. The proposed method improves spatial reuse for UL communications.
  • We conduct extensive simulations to evaluate performance of the proposed method under various environments and parameters, comparing with other existing methods such as OBSS/PD, PSR and Dual-CST [5].
The rest of the paper is organized as follows. In Section 2, we survey existing work on improving the efficiency of WLANs and discuss how the proposed scheme is different from other methods. In Section 3, we present the proposed method PSC-UL in detail with example scenarios to illustrate its operation. In Section 4, we evaluate performance of the proposed method comparing with other state-of-the-art mechanisms. Finally, in Section 5, we conclude the paper with remarks for possible future work.

2. Related Work

From the early days of IEEE 802.11 WLAN, it was well known that the performance of WLAN degrades significantly in dense scenarios, mainly due to the fact that its medium access control method, DCF, is based on CSMA/CA (Carrier-Sense Multiple Access/Collision Avoidance). As collision avoidance is based on random backoff, the probability of collision increases with node density, leading to packet loss and frequent retransmissions. Furthermore, the fact that carrier sensing is done by the transmitter leads to the hidden and the exposed problems, resulting in further performance loss and unequal share of channel bandwidth between the nodes [6].
Naturally, a significant research effort was made to improve the spectral efficiency of DCF. One of the goals was to find an optimal CST for the nodes, because using a fixed CST is the problem that leads to hidden and exposed terminal problems [7]. For example, Jiang et al. [8] studied the conditions for setting the CST to eliminate hidden terminals. However, such CST can increase exposed terminal that result in wasted channel bandwidth. Nakahira et al. [9] proposed a centralized method for controlling CST. The proposed algorithm measures SINR at the stations when two neighboring APs transmit in parallel and adjusts CST based on the information in order to increase number of parallel transmissions. Chakraborty et al. [10] proposed a method where hidden and exposed terminals are identified through RTS (Request-To-Send) and CTS (Clear-To-Send) packets. Specifically, if a node overhears and RTS but not the corresponding CTS, the node thinks that the RTS sender is an exposed terminal and transmits its packet concurrently.
Vutukuru et al. [11] proposed a method where each node maintains a CMAP (Conflict Map) which records which nodes should not transmit together. The CMAP is constructed by observing packet collisions and exchanging messages with neighbor nodes and is used along with the carrier sensing to avoid hidden and exposed terminal problems. Chau et al. [12] proposed a method for dynamically adapting its CST. If a node cannot transmit for a long time, it increases CST to mitigate the exposed terminal problem. On the other hand, if the node fails to receive ACK (Acknowledgement) multiple times, it decreases CST to mitigate hidden terminal problem. Hosseinabadi et al. [13] proposed Concurrent-MAC, where a transmitting node can select one of its neighboring nodes as a “privileged node” which can transmit a packet concurrently. In order to do so, information on who can transmit in parallel is collected by a central coordinator and disseminated throughout the nodes.
Eliab et al. [14] proposed G-DCF, where nodes form groups in a distributed manner if they can successfully transmit in parallel. Once one of the nodes transmits a packet, it triggers other nodes in the group to transmit their packets together. So et al. [5] proposed a method where two CSTs are used instead of one. When a node transmits a packet, it includes an “advertised CST” in the preamble, which should be obeyed by the neighbors to protect the ongoing transmission. Nodes hearing the preamble use their own CST as well as the advertised CST to determine whether to transmit or not. The CSTs are dynamically chosen to protect the transmissions by estimating the SNR (Signal-to-Noise Ratio) at the receivers. Although this method uses dynamic CST to improve spatial reuse, the method is still conservative in choosing CSTs because it assumes that the transmitters are in the closest position to the other receivers. The CST are chosen so that the packets can be received even in the worst case.
When developing the most recent standard, IEEE 802.11ax, spatial reuse has gained significant attention, due to its potential of considerably improving perceived quality of service [1]. One of the earlier proposals was DSC (Dynamic Sensitivity Control) [15], which selects CST based on the proximity between the sender and the receiver. Specifically, a node close to its AP uses a high CST so that it transmits aggressively, while a node far away from its AP uses a low CST so that it transmits conservatively. Evaluation of DSC shows that while it can increase throughput, DSC can causes severe unfairness among nodes; nodes closer to their APs get much larger share of the channel bandwidth, while nodes far away from their APs can be starved [16,17,18,19,20]. Many proposals were proposed aiming to address the problem of DSC. For example, Afaqui et al. [21] proposed a method where edge nodes that experience high FER (Frame Error Rate) use RTS/CTS to protect their packets from hidden terminals. Ropitault et al. [22] propose a technique where both transmit power and CST are adjusted based on ETX (Expected Transmission Count). A node with high ETX increases transmit power and CST to increase SNR as well as transmission opportunity.
Through these efforts, two spatial reuse schemes were included in the IEEE 802.11ax standard: OBSS/PD and PSR. In OBSS/PD, a node can use different CST depending on whether the ongoing communication is an intra-BSS or inter-BSS communication. For an intra-BSS communication, the node uses the default CST, or C S T m i n (e.g., −82 dBm). However, for an inter-BSS communication, the node can increase the CST up to C S T m a x (e.g., −62 dBm). However, when the node increases CST, it should also use a lower transmit power in order to protect the ongoing communication. Equation (1) is used to find the upper bound of the CST for inter-BSS communications. In the equation, T X _ P W R r e f is the maximum transmit power, whereas T X _ P W R is the reduced transmit power to protect the ongoing transmission. The allowable CST region according to the transmit power is shown in Figure 1.
C S T max ( C S T m i n , min ( C S T m a x , C S T m i n + ( T X _ P W R r e f T X _ P W R ) ) )
In order to distinguish inter-BSS communications from intra-BSS communications, each BSS chooses a BSS color (an integer), and a node includes the BSS color in the preamble of the packet. OBSS/PD is shown to achieve higher throughput compared to the legacy scheme with fixed CST [23]. However, as OBSS/PD still relies on channel status measured at the transmitter, it suffers from hidden and exposed terminals similar to the legacy scheme.
PSR is another method for spatial reuse. It can be used when uplink communication is scheduled by a trigger frame sent from the AP. In the trigger frame, the AP includes a PSR value which is calculated as in Equation (2). In Equation (2), I A P m a x is the acceptable interference level calculated as in Equation (3). In Equation (3), U L _ T a r g e t _ R S S I is the expected receive power of the UL packet, set by the AP and included in the trigger frame. Furthermore, m i n _ S N R _ M C S is the minimum SNR required for receiving the highest MCS (Modulation and Coding Scheme) among the scheduled UL traffic with less than 10% PER (Packet Error Rate).
P S R = T X _ P W R A P + I A P m a x
I A P m a x = U L _ T a r g e t _ R S S I m i n _ S N R _ M C S m a r g i n
When a node receives a trigger frame from an AP that the node is not associated with, it looks at the PSR value and checks whether it can transmit concurrently with the scheduled UL traffic of the other BSS. Specifically, the node estimates the interference it will cause at the other AP and determines whether the UL packet will be successfully received at the AP even if the node transmits concurrently. If the estimated interference is less than the acceptable interference level at the AP, the node ignores the UL traffic that follows the trigger frame and transmits its packet after counting the backoff counter to zero. Rodrigues et al. [24] show that PSR has advantages over the legacy scheme, especially in reducing packet latency of uplink traffic [24]. However, as PSR only protects the UL traffic by advertising the PSR value, the node transmitting concurrently with the UL traffic may fail to send the packet if its receiver is close to the node sending uplink traffic [25]. In our proposed method, a node considers the SNR at both receivers when deciding to transmit a packet concurrently or defer its transmission.
There are other schemes that try to improve spatial reuse under various assumptions. For example, Murakami et al. [26] proposed a CST control scheme based on node locations, assuming nodes know their locations through devices like GPS. Furthermore, Adere et al. [27] proposed a scheme using directional antennas, while Wang et al. [28] proposed a method that requires devices with full-duplex capability.
With the recent advance of artificial intelligence, machine learning techniques were applied to the problem of spatial reuse. Jamil et al. [29] proposed a centralized approach where a central coordinator collects information and runs a neural network to find the best transmit power and CST to use. Wilhelmi et al. [30,31] proposed a distributed method where each node runs multi-armed bandits to find the best channel and transmit power. The authors showed that each node acting in a selfish way can still result in better spatial reuse as a system. Wang et al. [32] proposed an approach where a single user dynamically selects the best channel to transmit its packet among many available channels. The user uses a DQN (Deep Q Network) to learn the optimal policy of selecting the channel without knowing the system statistics. Naparstek et al. [33] extended this work to address the environment where multiple nodes are running DQN to select the best channel, while there are other nodes running different protocols like TDMA and ALOHA.
Yu et al. [34] proposed a method called DLMA (Deep reinforcement Learning Multiple Access), which replaces CSMA for channel access in a single wireless LAN. Instead of measuring channel status as in CSMA, DLMA uses ACK feedbacks to determine when to transmit its packet. Ak et al. [35] proposed a two-scale method for controlling CST using MLP (Multi-Layer Perceptron). While the local scale control is used to adjust CST to reduce interference and increase parallel transmissions, the global scale control is used to improve fairness among nodes. Yin et al. [36] proposed a scheme where interferers are recognized based on reinforcement learning and decisions to transmit concurrently are made accordingly. Reinforcement learning techniques are used for topics other than spatial reuse, such as channel bonding, network monitoring, and link configuration. These works are summarized in the survey paper by Szott et al. [37].
Finally, note that rate control is an important factor that needs to be considered when nodes dynamically select parameters like CST and transmit power. If a node finds out that the SNR at the receiver is not high enough for a certain MCS level, it can choose to wait or send the packet using a lower MCS level. Huang et al. [38] proposed a rate adaptation scheme where nodes transmitting in parallel adjust their MCS levels so that the colliding packets are safely received at their receivers. Krotov et al. [39] proposed a rate control algorithm that can be used with IEEE 802.11ax spatial reuse features. In our paper, we do not consider rate control and assume nodes use a fixed MCS level. Further improvements may be possible by applying rate control with the proposed method, and we leave this issue as a future work.

3. Proposed Method

3.1. Idea Overview

The main idea behind the proposed method is to estimate SNR at the receivers assuming the transmissions take place in parallel. While currently the BSS color is used to distinguish between intra-BSS frames and inter-BSS frames, we further use the BSS color to estimate where the inter-BSS AP is located. Furthermore, nodes include proximity information in the preamble which indicates how far the transmitter is located from its AP. Using this information, a node receiving a preamble can predict whether the packets will be successfully received at the receivers if the node concurrently transmits its packet.
When a node receives a preamble from another node, it has to decide whether it should defer its transmission by pausing the backoff countdown, or ignore the ongoing transmission, continue the backoff countdown, and potentially transmit its packet in parallel with the ongoing transmission. In the legacy scheme, a fixed threshold of −82 dBm is used to determine this, regardless of if the preamble belongs to an intra-BSS frame or an inter-BSS frame. In a dense network, this approach creates a lot of hidden and exposed terminals and leads to inefficient channel usage.
In OBSS/PD, a node can find out whether the preamble belongs to an inter-BSS frame by checking the BSS color. Even if the RSSI (Received Signal Strength Indicator) exceeds −82 dBm, the node can still transmit provided that it reduces its transmit power. This approach may allow exposed terminals to concurrently transmit packets and increase spectrum efficiency. However, still neither of the concurrently transmitted packets is guaranteed to be received at the receiver, because the decision is based on channel status of the transmitter.
In PSR, the AP protects the UL packets by broadcasting acceptable interference level to the inter-BSS nodes through trigger frames. However, the inter-BSS node transmitting concurrently does not know whether its packet will be successfully received at the receiver. It is possible that if its receiver is close to the transmitter of the ongoing communication, the packet may get lost due to low SNR. The key is that before a node decides to transmit its packet concurrently with the ongoing transmission, it must make sure both packets will have sufficient SNR at their respective receivers. The challenge is that while the location of a stationary AP can be estimated through beacons, the location of a mobile STA is hard to track.
We first consider the hidden terminal scenario described in Figure 2. In the scenario, node A is associated to AP1, and node B is associated to AP2. Node A begins to transmit its packet to AP1, and its preamble is heard by node B. However, because the distance between node A and B is great, the received power at node B is lower than −82 dBm. With the legacy DCF, node B can transmit in parallel and cause collision at AP1. OBSS/PD also cannot avoid this problem. Suppose node B receives node A’s preamble at −72 dBm. Even if node B reduces its transmit power by 10 dB, it can be close enough to AP1 so that there is still a collision at AP1.
When node B receives node A’s preamble, it should transmit its packet in parallel only if it is certain that the ongoing transmission will not be lost. Node B needs to estimate the SNR at AP1. As APs transmit beacons periodically, node B can predict the interference level at AP1, assuming there is no other source of interference. What node B does not know is the signal level at AP1. This cannot be known to node B unless node A gives the information to node B. In other words, node A must provide the “proximity information” that indicates how far node A is from AP1. For example, node B knows that the received power from AP1 to B is −70 dBm. (Here we assume that all APs and stations are transmitting at the same transmit power.) If node A “tells” node B that the received power from AP1 to A is −50 dBm, node B knows that the SNR at AP1 will be approximately 20 dB if both node A and node B transmits. If that SNR is not enough to receive A’s packet, node B must defer its transmission.
Next, we consider the exposed terminal scenario described in Figure 3. Similar to the previous scenario, node A is associated to AP1 and node B is associated to AP2. Node A begins to transmit its packet to AP1, and its preamble is heard by node B. As node B is close to node A, the received power at node B can be above the CST. In legacy DCF, node B unnecessarily defers its transmission, although both packets can be successfully received at their respected receivers.
In PSR, if AP1 sends a trigger frame to schedule UL transmission, node B can find out the acceptable interference level at AP1 using the PSR value in the preamble. Thus, node B can transmit its packet if node B’s interference at AP1 is expected to be lower than the acceptable interference level. However, PSR cannot guarantee that node B’s transmission will be successfully received at AP2. Suppose AP2 was in a location close to node A, as in Figure 4. In this scenario, node B should actually defer its transmission, but transmits aggressively according to PSR and fails.
When node B transmits its packet in parallel with node A, node B should be confident that its transmission is successfully received at AP2. The signal level at AP2 can be predicted because B is receiving beacons from AP2. Predicting the interference level at AP2 is not trivial, because we do not know how far node A is from AP2. Although node A may know the proximity between itself and AP2 through beacons, it is impractical for node A to include proximity information with non-associated APs in the preamble. We need to estimate the interference level with other information.
As APs are mostly stationary, an AP can keep track of the proximity between itself and other neighboring APs. For example, in Figure 3 or Figure 4, AP2 maintains a neighbor table, where it records the average RSSI for its neighboring APs. The RSSI can be obtained by listening to the beacons. Furthermore, AP2 sends the table to node B, so that it knows the proximity between AP2 and AP1. When node B receives preamble from node A, it can estimate the distance between node A and AP2 using the proximity between AP2 and AP1, as well as the proximity between node A and AP1.
Let us denote the distance between AP1 and AP2 as d 12 , and the distance between node A and AP1 as d 1 A . Then, the distance between node A and AP2, d 2 A , is less than or equal to d 12 d 1 A . The placement of nodes in Figure 3 is the worst case, where d 2 A = d 12 d 1 A . Using this information, we estimate the interference level at AP2 and determine whether node B can transmit concurrently with node A. As we do not know exactly where node A is located in vicinity of AP1, we consider the worst case and assume that node A is in the position closest to AP2, in order to avoid collisions caused by the hidden terminal problem.
We summarize the idea of the proposed method with the scenario shown in Figure 5. In the scenario, node A is transmitting its packet to AP1, and its preamble is received by node B. Node B needs to decide whether it can transmit its packet concurrently with node A. In order to do so, node B needs to find out the following values.
  • S 1 : received power of the signal from node A to AP1.
  • I 1 : received power of the interference from node B to AP1.
  • S 2 : received power of the signal from node B to AP2.
  • I 2 : received power of the interference from node A to AP2.
Figure 5. A scenario illustrating how a node determines concurrent transmission in the proposed method.
Figure 5. A scenario illustrating how a node determines concurrent transmission in the proposed method.
Applsci 11 11074 g005
Among the four values, S 2 and I 1 are directly known to node B, because node B is receiving beacons from AP2 and AP1. S 1 is also known to node B, because node A includes the proximity information in the preamble which indicates the received power of the signal from AP1.
In order to estimate I 2 , we use the triangle inequality to estimate the “distance” between node A and AP2. Note that the concept of distance we use here is a notion of signal attenuation, rather than the exact physical distance. If there is an obstacle between the transmitter and the receiver, the distance between the two points will be estimated longer than the actual physical distance. When maintaining RSSI obtained from beacons, weighted moving average is used to smooth out variations caused from multi-path fading. According to triangle inequality, the following inequalities hold:
d 2 A + d A B d 2 B
d 2 A + d 2 B d A B
d 2 A + d 12 d 1 A
d 2 A + d 1 A d 12
Combining these equations, we get the minimum distance between node A and AP2, which can be used to estimate I 2 .
d 2 A max ( | d A B d 2 B | , | d 12 d 1 A | )
d A B , d 2 B , d 12 , and d 1 A are all obtainable through BSS color, proximity information, and neighbor tables maintained at APs and STAs. Next, we describe the details on how the proposed method is designed and implemented.

3.2. Protocol Details

In this section, we describe the details of the proposed method, PSC-UL. This method is used to improve spatial reuse of uplink traffic. In other words, when a UL transmission is in place, a station in a different BSS can use the method to transmit its packet in parallel. It does not mean that downlink traffic cannot co-exist in the same channel. DL (Downlink) traffic may co-exist, but its cannot benefit from proximity information to start a concurrent transmission, unless APs maintain proximity information of stations in its own BSS as well as other neighboring BSSes.

3.2.1. Neighbor Table

In PSC-UL, APs and stations maintain neighbor tables where the RSSI of neighboring APs are stored. An example neighbor table is shown in Table 1. The neighbor table stores the RSSI of neighboring APs, measured using beacons sent from the APs. Each entry of the table stores BSSID, BSS color, and the RSSI value. The RSSI value of each AP is updated using EMA (Exponential Moving Average) as shown in Equation (9). In the equation, R t is the average RSSI at time t, S t is the RSSI sampled from a beacon at time t, and α is a value between 0 and 1.
R t = α · S t + ( 1 α ) · R t 1
In Table 1a, node B has four entries in its neighbor table, including its associated AP, AP2. In Table 1b, AP2 has four entries from which it can receive beacons. While AP4 (BSSID: 00:00:00:00:00:04) appears in the neighbor table of AP2, it is too far from node B such that node B cannot hear its beacon. Periodically, an AP sends its neighbor table to all the associated stations. Thus, the stations have two neighbor tables: one that stores RSSI of APs measured at the node, and one that stores RSSI of APs measured at its AP.

3.2.2. Proximity Information

When a node transmits a UL packet to its AP, it includes the proximity information in the preamble, along with the BSS color. The proximity information is basically the RSSI of the associated AP, measured from the node. Suppose node A receives beacons from AP1 at an average RSSI of −40 dBm. Then, −40 dBm is the proximity information node A includes in the preamble of its packets.
The proximity information should be included in the signal field of the preamble, such as HE-SIG-A (High-Efficiency SIG-A) of 802.11ax. In HE-SIG-A, 6 bits are allocated for BSS color, which allows up to 64 unique colors for representing a BSS. The proximity information can be encoded into 4 bits, similar to the Spatial Reuse field in the HE TB PPDU (HE Trigger-Based PLCP Protocol Data Unit) which is used for sending PSR values. An example field encoding for proximity information is shown in Table 2. Using more bits allows sending a fine-grained proximity information which can increase spatial reuse, but at the same time increases the overhead of sending more bits in the preamble. For example, in Table 2, the proximity information is encoded in steps of 4 dB. To encode the proximity information, the RSSI of the AP is quantized to a lower value. For example, if RSSI of the AP is −74 dBm, then the proximity information field is set so ‘2’, which means −76 dBm.

3.2.3. Protocol Operation

To describe the operation of PSC-UL, we consider the scenario in Figure 5. In the scenario, node A transmits a packet to AP1, which is also received by node B. We assume that node A and AP1 are using BSS color 1, while node B and AP2 are using BSS color 2. By reading the BSS color field in the preamble, node B finds out that the packet belongs to a different BSS. Node B needs to decide whether it should pause the backoff countdown or continue. If it continues to countdown the backoff counter, node B may transmit if packet concurrently with the ongoing transmission.
First, node B reads the proximity information field also in the preamble. If the proximity information is unknown (value 0 in the field), then it means node B cannot use the PSC-UL method for parallel transmission. This may be because the ongoing communication is a downlink traffic, or PSC-UL is disallowed by operator decisions. If the proximity information field is some other encoded value, node B decodes the value. We denote the decoded value as P 1 A . Suppose in our scenario that P 1 A is −40 dBm. Now, from node B’s neighbor table, we read the average RSSI of the beacon from AP1 to node B. This value is P 1 B , and suppose it is −76 dBm in our scenario. We check whether Equation (10) is true. In the equation, S N R m i n is the minimum SNR for successfully receiving the packet, and m is the margin. If Equation (10) is false, node B decides the channel is busy and pauses its backoff. If Equation (10) is true, then we continue. In our example scenario, S N R m i n is 23 dB and m is 5 dB, which makes the equation true. It means that when node B transmits its packet concurrently, AP1 can still successfully receive the packet sent by node A.
P 1 A P 1 B S N R m i n + m
Now, we need to check whether the packet sent by node B will be successfully received by AP2. To do that, we need to check whether Equation (11) is true. In the equation, P 2 B can be obtained by reading node B’s neighbor table. Suppose P 2 B is −44 dBm.
P 2 B P 2 A S N R m i n + m
To calculate P 2 A , we need to known the pathloss between node A and AP2, and we do this by estimating the distance between node A and AP2, d 2 A . We consider two cases: In the first case, we estimate the distance between AP1 and AP2 ( d 12 ), as well as the distance between node A and AP1 ( d 1 A ). As we do not exactly know where node A is located, we consider the worst case and assume that node A is on the line between AP1 and AP2, which puts node A in the closest position to AP2. Then, the distance between node A and AP2 is d 12 d 1 A .
We estimate the distance from RSSI using a pathloss model. Specifically, we use a log-distance model which is frequently used for indoor environment. Equation (12) shows the equation for calculating pathloss from distance using the log-distance model. In the equation, P L is the pathloss, P L 0 is the reference pathloss, d is the distance between the source and the destination, and d 0 is the reference distance. Furthermore, γ is the pathloss exponent and X g is a random variable that models channel variations such as fast fading. We set X g to zero, and use the margin parameter to account for channel variations.
P L = P L 0 + 10 γ l o g 10 d d 0 + X g
Using Equation (12), we can calculate the distance if we know the pathloss, as in Equation (13).
d = d 0 × 10 P L P L 0 10 γ
Using Equation (13), we convert P 12 and P 1 A to d 12 and d 1 A . We can obtain P 12 from the neighbor table of AP2 which is periodically sent to node B. Furthermore, we can obtain P 1 A through proximity information. Once we get d 12 and d 1 A , we estimate d 2 A as Equation (14), which is the worst case in terms of interference at AP2.
d 2 A = d 12 d 1 A
Once we get d 2 A , we convert it back to pathloss P 2 A using Equation (12). Then, by subtracting the pathloss from transmit power, we get P 2 A . Finally, we can use Equation (11) to determine whether the packet transmitted from node B will be successfully received at AP2. If Equation (11) is true, then AP2 can successfully receive the packet from node B. If Equation (11) is false, then AP2 will not have sufficient SNR to receive the packet from node B.
In the second case, we estimate d 2 A using the distance between two senders ( d A B ) and the distance between node B and AP2 ( d 2 B ). In this case, the worst case would be when AP2 is located on the line connecting node A and node B. Then, the distance between node A and AP2 is d A B d 2 B . Similar to the previous case, we convert P A B and P 2 B to d A B and d 2 B . P A B can be obtained by measuring signal strength of the packet from node A, and P 2 B can be obtained from B’s neighbor table. We convert these values to distances using the pathloss model, estimate the worst-case distance d 2 A using Equation (15), and convert the value back to pathloss to get P 2 A . In this case as well, we can use Equation (11) to determine whether AP2 can successfully receive the packet from node B.
d 2 A = d A B d 2 B
In summary, when node B receives preamble from node A, node B calculates d 2 A according to Equations (14) and (15). Then, according to Equation (8), we choose the final d 2 A as the maximum of the two. Then, we convert d 2 A into the P 2 A and apply Equation (11) to determine whether the packet transmitted by node B will be successfully received at AP2. If Equation (11) is true, the node B can continue its backoff countdown and transmit concurrently with the ongoing communication. If Equation (11) is false, node B must pause its backoff and defer its transmission. The whole process of the proposed scheme is described as a flow diagram in Figure 6.
In the beginning of the section, we assumed that the nodes transmit packets at the same transmit power. However, it is possible that a user station could reduce the transmit power in order to reduce interference or other reasons such as energy conservation. In this case, the transmit power must be taken into account when calculating the interference at the receivers. In the proposed scheme, the only term affected by the transmit power of the user station is d A B , which is the distance between the two user stations. All the other distances are calculated from RSSIs measured from beacons that are transmitted using a fixed transmit power. In order to correctly estimate d A B , node B needs to know the transmit power of node A.
There are two ways to address this problem. First, node A encodes its transmit power into the preamble, similar to the proximity information. This will require several bits in the preamble, which is an overhead. An alternative is to just assume that node A is transmitting at the maximum transmit power. Then, the calculation of d A B will result in a larger value when node A is transmitting at a reduced power. In turn, d 2 A will be estimated as a larger value, and P 2 A will be estimated as a smaller value. As node A is transmitting at a reduced power, P 2 A will actually be smaller than when node A is transmitting at the maximum power. Although estimation errors will increase because pathloss is a nonlinear function, we do not need to explicitly send transmit power in the preamble in this scheme.
When calculating SNR in Equations (10) and (11), we use the margin parameter m to account for channel variation due to fading, as well as errors made from the pathloss model. A large margin makes nodes conservative, which reduces collisions but at the same time reduces parallel transmissions. On the other hand, a small margin makes nodes more aggressive, which increases parallel transmissions but also collisions. In the simulations, we study the impact of margin on the protocol performance. There are methods to improve the accuracy of a pathloss model, such as tuning the pathloss exponent to better reflect the current environment [40]. With a more accurate model we may choose a smaller margin and further improve the protocol performance. It is out of scope of this paper and left as a future work.

4. Performance Evaluation

4.1. Simulation Setup

We have evaluated the performance of PSC-UL using a simulator implemented in Python. In the default setting, a 100 m × 100 m simulation area is divided into 100 cells, where an AP is placed at the center of each cell. One-hundred user stations are randomly deployed in the area, and each station associates with the closest AP. The simulation environment is illustrated in Figure 7. We assume that all user stations are backlogged with packets to send to the AP, so they contend for the channel constantly. We use UDP (User Datagram Protocol) traffic with 1472 bytes of packet size, and the MCS is set so that the link speed is 65 Mbps for 20 MHz channels. We use the log-distance model as the pathloss model. In the model, the reference distance d 0 is 1 m, the reference pathloss ( P L 0 ) is 46.67 dB, and the pathloss exponent ( γ ) is 3. The transmit power is set to 25 dBm for both APs and stations, and the noise floor is set to −93.97 dBm. The minimum SNR required for successfully receiving a packet is set to 23 dBm, and we use 5 dB as margin, unless otherwise specified.
We use six metrics to evaluate the performance. The first metric is ‘network throughput’, which indicates the number of data bits successfully transferred in the network per second. With the same environment and configuration parameters, a method with higher spatial reuse will achieve higher throughput. However, just measuring the network throughput may mislead the results, because high throughput can also be achieved by having a small number of nodes dominate the channel and starving all other nodes. A notion of fairness should also be measured. For that we use ‘bottom 50% throughput’ and ‘bottom 25% throughput’. For these metrics, we sort the node throughput in the ascending order, and select 50% and 25% of the nodes with the least throughput. Then, we aggregate their throughput to obtain the results. If a method achieve a high network throughput but a low bottom 50% or bottom 25% throughput, it means the method is favoring only a few nodes in the network while starving all others. We also measure Jain’s fairness index, which is a more direct metric used to measure fairness of a system. The equation for Jain’s fairness index is shown in Equation (16). In the equation, x i is the throughput of node i, and n is the total number of nodes.
J ( x 1 , x 2 , , x n ) = ( i = 1 n x i ) 2 n × i = 1 n x i 2
As the fifth metric, we measure the ‘non-starvation ratio’, which is the percentage of nodes that transmitted at least one packet successfully during the simulation time, which can be another indication of fairness. Finally, we measure the ‘packet delivery ratio’. Packet delivery ratio reveals how aggressively nodes transmitted their packets. If a method has a low delivery ratio, it means a lot of collisions occurred due to aggressive transmissions.
Using these evaluation metrics, we compare the performance of five different methods. The first method, “legacy” is the original 802.11 DCF with fixed CST. The default CST is set to −82 dBm. The second method is “OBSS/PD”, where a node may decide to transmit with a lower transmit power when the sensed interference is between C S T m i n and C S T m a x . In the simulations, C S T m i n is −82 dBm and C S T m a x is −62 dBm. The third method is “Dual-CST”, which is a method proposed in [5] and uses “advertised CST” in addition to the original CST. The fourth method is “PSR”, where an AP advertises acceptable interference in the preamble, and a node in a different BSS may choose to transmit if its interference will not exceed the acceptable interference level at the AP. In PSR, we set U L _ T a r g e t _ R S S I to −32 dBm. (OBSS/PD, PSR, and Dual-CST were discussed earlier in the related work section.) Finally, “PSC-UL” is the proposed method.
To obtain each point in the graphs, we ran 100 simulations with different topology and different random number generator seeds, and averaged the results.

4.2. Simulation Results

4.2.1. Varying Number of Nodes

In the first experiment, we have varied the number of user stations in the network to study the impact of node density on the protocol performance. The number of stations was varied from 20 to 200. The results are shown in Figure 8.
In Figure 8a, we can see that the PSR achieves the highest total throughput, followed by PSC-UL. PSC-UL achieves higher throughput compared to Legacy, OBSS/PD, and Dual-CST. As the number of stations increases, the difference of throughput between PSR, PSC-UL, and the other three methods increases, meaning that PSR and PSC-UL find more opportunities for parallel transmission compared to other methods. Although PSR achieves higher total throughput compared to PSC-UL, PSR suffers from significant unfairness, as can be observed from the other graphs. Figure 8b,c shows bottom 50% throughput and bottom 25% throughput. As the number of stations increase, these values decrease for all methods. Especially for PSR, almost no throughput is gained for bottom 50% nodes. This is also reflected in Figure 8d,e, which shows the Jain’s fairness index and non-starvation ratio. While the fairness index of PSC-UL is similar to Dual-CST, a much lower fairness index is achieved by PSR and OBSS/PD.
This occurs because the fairness index is low for SNR, as shown in Figure 8e; too many nodes are starved. PSR is designed so that the spatial reuse opportunity is taken only when the on-going communication can be protected. It does not guarantee that the parallel communication will succeed. Naturally, nodes that are far away from their APs tend to lose packets in parallel transmission, while nodes close to their APs have their packets successfully received. This is because OBSS/PD has low fairness index as can be seen in Figure 8f, which shows the delivery ratio. With OBSS/PD, nodes attempt to transmit their packets too aggressively, which results in a lot of packet losses due to collision. PSC-UL shows lower fairness index compared to Legacy. This is due to the fact that in PSC-UL, stations that are in proximity to their APs gain more throughput compared to Legacy, while the throughput of stations that are far from their APs is comparable to Legacy. It is natural that stations that have higher SNR margin at their receivers have higher chance of initiating a parallel transmission.
To take a deeper look, we have plotted the throughput of each node, sorted in the ascending order of throughput. Figure 9a,b shows the result of simulations using the default configuration. They are the same graph, except that the range of the y-axis was adjusted in Figure 9b to get a better look at nodes with lower throughput. We can see that the throughput of all methods except PSR starts to grow at similar times. Furthermore, the throughput of PSC-UL grows faster than other protocols. On the other hand, the throughput of PSR stays near zero until index 60, and then starts to grow. This is consistent with the earlier observation that a lot of stations are starved in PSR.

4.2.2. Varying Number of APs

In the second experiment, we have varied the number of APs in the network while keeping the number of stations fixed. The area size is also fixed to 100 m × 100 m. Thus, when the number of APs is increased, the average distance between a station and its AP decreases. The number of APs is varied from 16 to 169. The results are shown in Figure 10.
The total throughput shown in Figure 10a shows a similar trend to the previous experiment. In this case, the throughput increases with number of APs because more parallel transmission can be initiated when the distance between a station and its associated AP is shorter. The PSR and PSC-UL increase the gap with other methods as the number of APs grow larger, because they use a more fine-grained information to determine whether parallel transmission will be successful. Similar to the previous experiment, the PSR achieves higher total throughput compared to PSC-UL, but its fairness and non-starvation ratio are much lower than PSC-UL.
When the number of APs becomes large, we can observe that the bottom 25% throughput as well as the non-starvation ratio of PSC-UL is lower than other compared methods except PSR. This means that stations at the edge experience very low throughput and some may even starve. This is because when PSC-UL estimates SNR at the receivers, only the two potentially parallel transmissions are considered. If there exists additional interference at the receivers, the SNR can become lower than expected, and to the point where packet losses occur. One solution to address this problem is to control the margin parameter based on density. A larger margin value can be used for a very dense network to account for additional interference. We use a fixed margin in this paper, and finding the optimal margin for the environment is left as a future work.

4.2.3. Varying Area Size

In the previous experiment, we have increased the number of APs while keeping the area size fixed. In the third experiment, we vary the area size while keeping the number of APs and stations fixed. It is true that both changing the number of APs and changing the area size affect the cell size. The difference is that with fixed number of stations, increasing the number of APs lead to smaller number of stations per cell, and vice versa. On the other hand, increasing area size while keeping the number of APs and number of user stations fixed will only increase the average distance between user stations and their associated APs, while keeping the number of user stations per cell the same.
In this experiment, the area size is varied from 25 m × 25 m to 250 m × 250 m. As we increase the area size, the size of each cell increases, meaning that the average distance from a station to an AP will be longer. The result is shown in Figure 11. In the figure, the X-axis is the edge length, which is the length of an edge in the square-shaped area.
When the area is very small, the spatial reuse opportunity is rare, and therefore the throughput is low. As the area size increases to some extent, the network throughput increases because more parallel transmission can take place in the area. However, if the area becomes larger while the number of APs is fixed, the average distance between a station and its associated AP increases. Because of that, the acceptable interference level at the receivers decreases, and the throughput starts to decrease as shown in Figure 11a.
The pattern is different for OBSS/PD. The total throughput continues to increase, while the fairness measures start to drop rapidly, as shown in Figure 11b–e. This is because OBSS/PD does not consider SNR at the receiver, but only uses signal strength measured at the sender to determine whether a node should start a concurrent transmission. When the distance between nodes increases, nodes tend to transmit more aggressively in OBSS/PD. As a result, nodes at the edge fail to have their packets received, while the nodes closer to their APs enjoy successful communication.
For PSC-UL, similar observations can be made in this experiment. It achieves higher total throughput than compared methods except for PSR, which shows a higher throughput than PSC-UL. However, PSC-UL achieves significantly higher measures in terms of bottom 50% and 25% throughput, Jain’s fairness index, and non-starvation ratio. The performance of PSC-UL is steady with increased area size, unlike OBSS/PD and PSR.

4.2.4. Varying Margin

In PSC-UL as well as other methods like PSR and Dual-CST, a margin parameter is used to account for estimation errors. In the fourth experiment, we have varied the margin parameter to study its effect on protocol performance. Legacy and OBSS/PD do not use the margin parameter, so their values are constant regardless of the parameter. The margin is varied from 0 dB to 10 dB. The results are in Figure 12.
In Figure 12a, we can observe that the total throughput is reduced as we increase the margin. Increasing the margin means that the nodes transmit more conservatively, and they take the concurrent transmission opportunity only when the expected SNR at the receiver is well above the required value. With the same margin value, PSR achieves higher throughput compared to PSC-UL, which was also reflected in other experiments. However, here we can see that the peak values for the total throughput of PSR and PSC-UL are similar, achieved with different margin values. The fairness measures are improved when the margin value increases because conservative transmissions reduce collisions from hidden terminals, which is harmful for fairness. For PSR, however, the fairness measures are still much lower than other methods even with high margin values as shown in Figure 12b–e.
In summary, PSC-UL can improve the network performance by increasing parallel transmissions. While other methods like OBSS/PD and PSR can also increase spatial reuse, these methods do not fully consider if the concurrent transmissions will be successfully received at their receivers. Therefore, lots of collisions occur which can lead to throughput degradation and unfairness. In PSC-UL, a node decides to transmit concurrently after estimating SNR at the receiver of both the ongoing transmission and the potential concurrent transmission. To estimate SNR at the receivers, nodes maintain neighbor tables that contain RSSI of APs, and include proximity information in the preamble. The experiment results show that the proposed method can significantly improve throughput over the legacy method, and shows better performance characteristics compared to other spatial reuse methods.

5. Conclusions and Future Work

In this paper, we proposed a spatial reuse method for uplink communication in wireless LANs. The proposed method, PSC-UL, allows concurrent transmissions when the estimated SNR at the receiver is sufficient to receive both the packets. In order to estimate the SNR, APs and stations maintain RSSI of neighboring APs. An AP periodically sends its neighbor table to its associated stations, so that a station has both its neighbor table and the neighbor table of the AP. When a node transmits a packet, it includes its BSS color and proximity information in the preamble. The proximity information is an indication of the distance between the transmitter and its destination AP. When a node in a different BSS receives this preamble, it uses the BSS color, the proximity information, and its neighbor tables to determine whether both packets will be successfully received at the receivers if the node chooses to transmit concurrently. If either of the packets is expected to be lost, the node pauses backoff and defers its transmission. Simulation results have shown that PSC-UL achieves a considerable amount of throughput improvement using legacy, OBSS/PD, and Dual-CST methods without causing significant unfairness as in PSR.
While the proposed method has merit, many limitations exist that need further research. First, the proposed method can only be used with UL traffic. The major reason for this is that it is difficult to estimate SNR at the receiver if the receiver is a user station. An AP cannot keep track of all user stations in the vicinity because the user stations are mobile and they do not send out beacons. Still, improving spatial reuse for DL traffic is very important. Achieving high spatial reuse for DL may require cooperation between APs, which is an important feature in the upcoming standard, IEEE 802.11be. Second, we assumed that MCS levels were fixed. However, a node may choose to send a packet using a lower MCS level if the SNR at the receiver is expected to be low. Concurrently sending a packet at a lower rate can increase the throughput by allowing more parallel transmissions, but at the same time can degrade the throughput by having lower rate transmissions occupy the channel. A spatial reuse method combined with rate control is an important topic for future study. Third, we only considered a single channel in this paper. In practice, multiple channels exist, and APs and stations can be assigned channels in a way that the spatial reuse of each channel is maximized. A spatial reuse method combined with channel assignment is another interesting topic for further study. Fourth, machine learning approaches can be used to obtain optimal parameter values, such as margin, adequate for the environment. We plan to pursue these problems in the near future.

Author Contributions

Conceptualization, H.K. and J.S.; methodology, H.K. and J.S.; software, H.K.; validation, H.K. and J.S.; writing—original draft preparation, H.K. and J.S.; visualization, H.K.; supervision, J.S. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by the NRF (National Research Foundation) of Korea under grant no. 2019R1A2C1005881.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
ACKAcknowledgment
APAccess Point
BSSBasic Service Set
CACollision Avoidance
CCAClear Channel Assessment
CMAPConflict Map
CSMACarrier Sense Multiple Access
CSMA/CACarrier Sense Multiple Access/Collision Avoidance
CSTCarrier Sense Threshold
CTSClear-To-Send
DCFDistributed Coordination Function
DLDownlink
DLMADeep reinforcement Learning Multiple Access
DQNDeep Q Network
DSCDynamic Sensitivity Control
EMAExponential Moving Average
ETXExpected Transmission Count
FERFrame Error Rate
HEHigh Efficiency
LANLocal Area Network
MCSModulation and Coding Scheme
MLPMulti-Layer Perceptron
MU-MIMOMulti-User Multiple Input Multiple Output
NRFNational Research Foundation
OBSSOverlapping BSS
OBSS/PDOverlapping BSS/Preamble Detection
PPDUPLCP Protocol Data Unit
PSC-ULProximity-based Sensitivity Control for UL
PSRParameterized Spatial Reuse
RUResource Unit
PERPacket Error Rate
RSSIReceived Signal Strength Indicator
RTSRequest-To-Send
SNRSignal-to-Noise Ratio
STAStation
TBTrigger-Based
TFTrigger Frame
UDPUser Datagram Protocol
ULUplink
WLANWireless Local Area Networks

References

  1. Bellalta, B. IEEE 802.11ax: High-efficiency WLANs. IEEE Wirel. Commun. 2016, 23, 38–46. [Google Scholar] [CrossRef] [Green Version]
  2. Deng, C.; Fang, X.; Han, X.; Wang, X.; Yan, L.; He, R.; Long, Y.; Guo, Y. IEEE 802.11be Wi-Fi 7: New Challenges and Opportunities. IEEE Commun. Surv. Tutor. 2020, 22, 2136–2166. [Google Scholar] [CrossRef]
  3. Adame, T.; Bel, A.; Bellalta, B.; Barcelo, J.; Oliver, M. IEEE 802.11AH: The WiFi approach for M2M communications. IEEE Wirel. Commun. 2014, 21, 144–152. [Google Scholar] [CrossRef] [Green Version]
  4. Wilhelmi, F.; Barrachina-Munoz, S.; Cano, C.; Selinis, I.; Bellalta, B. Spatial Reuse in IEEE 802.11ax WLANs. Comput. Commun. 2021, 170, 65–83. [Google Scholar] [CrossRef]
  5. So, J.; Lee, J. Dynamic Carrier-Sense Threshold Selection for Improving Spatial Reuse in Dense Wireless LANs. Appl. Sci. 2019, 9, 3591. [Google Scholar] [CrossRef] [Green Version]
  6. Tsertou, A.; Laurenson, D.I. Revisiting the Hidden Terminal Problem in a CSMA/CA Wireless Network. IEEE Trans. Mob. Comput. 2008, 7, 817–831. [Google Scholar] [CrossRef]
  7. Yang, X.; Vaidya, N. On physical carrier sensing in wireless ad hoc networks. In Proceedings of the IEEE Conference on Computer Communications (INFOCOM), Miami, FL, USA, 13–17 March 2005. [Google Scholar]
  8. Jiang, L.B.; Liew, S.C. Improving Throughput and Fairness by Reducing Exposed and Hidden Nodes in 802.11 Networks. IEEE Trans. Mob. Comput. 2007, 7, 34–49. [Google Scholar] [CrossRef]
  9. Nakahira, T.; Ishihara, K.; Asai, Y.; Takatori, Y.; Kudo, R.; Mizoguchi, M. Centralized control of carrier sense threshold and channel bandwidth in high-density WLANs. In Proceedings of the Asia-Pacific Microwave Conference (APMC), Sendai, Japan, 14–17 November 2014. [Google Scholar]
  10. Chakraborty, S.; Nandi, S.; Chattopadhyay, S. Alleviating Hidden and Exposed Nodes in High-Throughput Wireless Mesh Networks. IEEE Trans. Wirel. Commun. 2015, 15, 928–937. [Google Scholar] [CrossRef]
  11. Vutukuru, M.; Jamieson, K.; Balakrishnan, H. Harnessing Exposed Terminals in Wireless Networks. In Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI 08), San Francisco, CA, USA, 16–18 April 2008. [Google Scholar]
  12. Chau, C.K.; Ho, I.W.H.; Situ, Z.; Liew, S.C.; Zhang, J. Effective Static and Adaptive Carrier Sensing for Dense Wireless CSMA Networks. IEEE Trans. Mob. Comput. 2017, 16, 355–366. [Google Scholar] [CrossRef] [Green Version]
  13. Hosseinabadi, G.; Vaidya, N. Concurrent-MAC: Increasing concurrent transmissions in dense wireless LANs. In Proceedings of the International Conference on Computing, Networking and Communications (ICNC), Kauai, HI, USA, 15–18 February 2016. [Google Scholar]
  14. Eliab, A.; Kim, Y.; Lee, J.; Lee, J.G.; So, J. G-DCF: Improving System Spectral Efficiency through Concurrent Transmissions in Wireless LANs. Wirel. Commun. Mob. Comput. 2019, 2019, 5427573. [Google Scholar] [CrossRef]
  15. Selinis, I.; Filo, M.; Vahid, S.; Rodriguez, J.; Tafazolli, R. Evaluation of the DSC algorithm and the BSS color scheme in dense cellular-like IEEE 802.11ax deployments. In Proceedings of the IEEE Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), Valencia, Spain, 4–8 September 2016. [Google Scholar]
  16. Tayamon, S.; Wikstrom, G.; Moreno, K.P.; Soder, J.; Wang, Y.; Mestanov, F. Analysis of the potential for increased spectral reuse in wireless LAN. In Proceedings of the IEEE Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), Hong Kong, China, 30 August–2 September 2015. [Google Scholar]
  17. Kulkarni, P.; Cao, F. Taming the densification challenge in next generation wireless LANs: An investigation into the use of dynamic sensitivity control. In Proceedings of the IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Abu Dhabi, United Arab Emirates, 19–21 October 2015. [Google Scholar]
  18. Mvulla, J.; Park, E.C.; Adnan, M.; Son, J.H. Analysis of asymmetric hidden node problem in IEEE 802.11ax heterogeneous WLANs. In Proceedings of the International Conference on Information and Communication Technology Convergence (ICTC), Jeju Island, Korea, 28–30 October 2015. [Google Scholar]
  19. Zhong, Z.; Cao, F.; Kulkarni, P.; Fan, Z. Promise and perils of Dynamic Sensitivity control in IEEE 802.11ax WLANs. In Proceedings of the International Symposium on Wireless Communication Systems (ISWCS), Poznan, Poland, 20–23 September 2016. [Google Scholar]
  20. Afaqui, M.S.; Garcia-Villegas, E.; Lopez-Aguilera, E.; Smith, G.; Camps, D. Evaluation of dynamic sensitivity control algorithm for IEEE 802.11ax. In Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), New Orleans, LA, USA, 9–12 March 2015. [Google Scholar]
  21. Afaqui, M.S.; Garcia-Villegas, E.; Lopez-Auguilera, E. Dynamic sensitivity control algorithm leveraging adaptive RTS/CTS for IEEE 802.11ax. In Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), Doha, Qatar, 3–6 April 2016. [Google Scholar]
  22. Ropitault, T.; Golmie, N. ETP algorithm: Increasing spatial reuse in wireless LANs dense environment using ETX. In Proceedings of the IEEE Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), Montreal, QC, Canada, 8–13 October 2017. [Google Scholar]
  23. Wilhelmi, F.; Barrachina-Munoz, S.; Bellalta, B. On the Performance of the Spatial Reuse Operation in IEEE 802.11ax WLANs. In Proceedings of the IEEE Conference on Standards for Communications and Networking (CSCN), Granada, Spain, 28–30 October 2019. [Google Scholar]
  24. De Carvalho Rodrigues, E.; Garcia-Rodriguez, A.; Giordano, L.G.; Geraci, G. On the Latency of IEEE 802.11ax WLANs with Parameterized Spatial Reuse. arXiv 2020, arXiv:2008.07482. [Google Scholar]
  25. Garcia-Rodriguez, A.; Lopez-Perez, D.; Galati-Giordano, L.; Geraci, G. IEEE 802.11be: Wi-Fi 7 Strikes Back. IEEE Commun. Mag. 2021, 59, 102–108. [Google Scholar] [CrossRef]
  26. Murakami, K.; Ito, T.; Ishihara, S. Improving the spatial reuse of IEEE 802.11 WLAN by adaptive carrier sense threshold of access points based on node positions. In Proceedings of the International Conference on Mobile Computing and Ubiquitous Networking (ICMU), Hokkaido, Japan, 20–22 January 2015. [Google Scholar]
  27. Adere, K.; Murthy, G.R. Solving the hidden and exposed terminal problems using directional-antenna based MAC protocol for wireless sensor networks. In Proceedings of the International Conference on Wireless and Optical Communications Networks (WOCN), Colombo, Sri Lanka, 6–8 September 2010. [Google Scholar]
  28. Wang, L.; Wu, K.; Hamdi, M. Combating Hidden and Exposed Terminal Problems in Wireless Networks. IEEE Trans. Wirel. Commun. 2012, 11, 4204–4213. [Google Scholar] [CrossRef]
  29. Jamil, I.; Cariou, L.; Helard, J.F. Novel learning-based spatial reuse optimization in dense WLAN deployments. EURASIP J. Wirel. Commun. Netw. 2016, 2016, 184. [Google Scholar] [CrossRef] [Green Version]
  30. Wilhelmi, F.; Cano, C.; Neu, G.; Bellalta, B. Collaborative Spatial Reuse in wireless networks via selfish Multi-Armed Bandits. Ad Hoc Netw. 2019, 88, 129–141. [Google Scholar] [CrossRef] [Green Version]
  31. Wilhelmi, F.; Barrachina-Munoz, S.; Bellalta, B.; Cano, C.; Jonsson, A.; Neu, G. Potential and pitfalls of Multi-Armed Bandits for decentralized Spatial Reuse in WLANs. J. Netw. Comput. Appl. 2019, 127, 26–42. [Google Scholar] [CrossRef] [Green Version]
  32. Wang, S.; Liu, H.; Gomes, P.H.; Krishnamachari, B. Deep Reinforcement Learning for Dynamic Multichannel Access in Wireless Networks. IEEE Trans. Cogn. Commun. Netw. 2018, 4, 257–265. [Google Scholar] [CrossRef] [Green Version]
  33. Naparstek, O.; Cohen, K. Deep Multi-User Reinforcement Learning for Distributed Dynamic Spectrum Access. IEEE Trans. Wirel. Commun. 2019, 18, 310–323. [Google Scholar] [CrossRef] [Green Version]
  34. Yu, Y.; Wang, T.; Liew, S.C. Deep-Reinforcement Learning Multiple Access for Heterogeneous Wireless Networks. IEEE J. Sel. Areas Commun. 2019, 37, 1277–1290. [Google Scholar] [CrossRef] [Green Version]
  35. Ak, E.; Canberk, B. FSC: Two-Scale AI-Driven Fair Sensitivity Control for 802.11ax Networks. In Proceedings of the GLOBECOM 2020—2020 IEEE Global Communications Conference, Taipei, Taiwan, 7–11 December 2020; pp. 1–6. [Google Scholar] [CrossRef]
  36. Yin, B.; Yamamoto, K.; Nishio, T.; Morikura, M.; Abeysekera, H. Learning-Based Spatial Reuse for WLANs With Early Identification of Interfering Transmitters. IEEE Trans. Cogn. Commun. Netw. 2020, 6, 151–164. [Google Scholar] [CrossRef]
  37. Szott, S.; Kosek-Szott, K.; Gawłowicz, P.; Gómez, J.T.; Bellalta, B.; Zubow, A.; Dressler, F. WiFi Meets ML: A Survey on Improving IEEE 802.11 Performance with Machine Learning. arXiv 2021, arXiv:2109.04786. [Google Scholar]
  38. Huang, J.; Xing, G.; Zhou, G. Unleashing exposed terminals in enterprise WLANs: A rate adaptation approach. In Proceedings of the IEEE Conference on Computer Communications (INFOCOM), Toronto, ON, Canada, 27 April–2 May 2014. [Google Scholar]
  39. Krotov, A.; Kiryanov, A.; Khorov, E. Rate Control With Spatial Reuse for Wi-Fi 6 Dense Deployments. IEEE Access 2020, 8, 168898–168909. [Google Scholar] [CrossRef]
  40. Wojcicki, P.; Zientarski, T.; Charytanowicz, M.; Lukasik, E. Estimation of the Path-Loss Exponent by Bayesian Filtering Method. Sensors 2021, 21, 1934. [Google Scholar] [CrossRef]
Figure 1. CST selection with transmit power control in the OBSS/PD method.
Figure 1. CST selection with transmit power control in the OBSS/PD method.
Applsci 11 11074 g001
Figure 2. A hidden terminal scenario. Node B is hidden to node A, and the packet at AP1 is lost when both node A and B transmit together.
Figure 2. A hidden terminal scenario. Node B is hidden to node A, and the packet at AP1 is lost when both node A and B transmit together.
Applsci 11 11074 g002
Figure 3. An exposed terminal scenario. Node A is exposed to node B, so node B unnecessarily defers its packet even both transmissions can take place in parallel.
Figure 3. An exposed terminal scenario. Node A is exposed to node B, so node B unnecessarily defers its packet even both transmissions can take place in parallel.
Applsci 11 11074 g003
Figure 4. A scenario where node B transmits in parallel with node A according to PSR, but node B’s packet is lost due to low SNR at AP2.
Figure 4. A scenario where node B transmits in parallel with node A according to PSR, but node B’s packet is lost due to low SNR at AP2.
Applsci 11 11074 g004
Figure 6. A flow diagram illustrating the operation of the proposed method.
Figure 6. A flow diagram illustrating the operation of the proposed method.
Applsci 11 11074 g006
Figure 7. The default simulation environment. One-hundred APs are placed in a 100 m × 100 m area, and 100 user stations are randomly deployed inside the area.
Figure 7. The default simulation environment. One-hundred APs are placed in a 100 m × 100 m area, and 100 user stations are randomly deployed inside the area.
Applsci 11 11074 g007
Figure 8. Performance of methods varying number of nodes. (a) Total throughput; (b) Bottom 50% throughput; (c) Bottom 25% throughput; (d) Fairness; (e) Non-starvation Ratio; (f) Delivery Ratio.
Figure 8. Performance of methods varying number of nodes. (a) Total throughput; (b) Bottom 50% throughput; (c) Bottom 25% throughput; (d) Fairness; (e) Non-starvation Ratio; (f) Delivery Ratio.
Applsci 11 11074 g008aApplsci 11 11074 g008b
Figure 9. Sorted node throughput. Panel (a) is the full graph whereas panel (b) is a partial graph where the y-axis is from 0 to 3 Mbps.
Figure 9. Sorted node throughput. Panel (a) is the full graph whereas panel (b) is a partial graph where the y-axis is from 0 to 3 Mbps.
Applsci 11 11074 g009
Figure 10. Performance of methods varying number of APs. (a) Total throughput; (b) Bottom 50% throughput; (c) Bottom 25% throughput; (d) Fairness; (e) Non-starvation Ratio; (f) Delivery Ratio.
Figure 10. Performance of methods varying number of APs. (a) Total throughput; (b) Bottom 50% throughput; (c) Bottom 25% throughput; (d) Fairness; (e) Non-starvation Ratio; (f) Delivery Ratio.
Applsci 11 11074 g010
Figure 11. Performance of methods varying area size. (a) Total throughput; (b) Bottom 50% throughput; (c) Bottom 25% throughput; (d) Fairness; (e) Non-starvation Ratio; (f) Delivery Ratio.
Figure 11. Performance of methods varying area size. (a) Total throughput; (b) Bottom 50% throughput; (c) Bottom 25% throughput; (d) Fairness; (e) Non-starvation Ratio; (f) Delivery Ratio.
Applsci 11 11074 g011aApplsci 11 11074 g011b
Figure 12. Performance of methods varying margin. (a) Total throughput; (b) Bottom 50% throughput; (c) Bottom 25% throughput; (d) Fairness; (e) Non-starvation Ratio; (f) Delivery Ratio.
Figure 12. Performance of methods varying margin. (a) Total throughput; (b) Bottom 50% throughput; (c) Bottom 25% throughput; (d) Fairness; (e) Non-starvation Ratio; (f) Delivery Ratio.
Applsci 11 11074 g012aApplsci 11 11074 g012b
Table 1. Neighbor table of node B and AP2. APs periodically send its neighbor table to the stations, so node A will have both the tables. (a) Neighbor table of B. (b) Neighbor table of AP2.
Table 1. Neighbor table of node B and AP2. APs periodically send its neighbor table to the stations, so node A will have both the tables. (a) Neighbor table of B. (b) Neighbor table of AP2.
(a)(b)
Neighbor_Table of BNeighbor_Table of AP2
BSSIDColorRSSIBSSIDColorRSSI
00:00:00:00:00:011−7600:00:00:00:00:011−72
00:00:00:00:00:022−4400:00:00:00:00:033−63
00:00:00:00:00:033−6800:00:00:00:00:044−88
00:00:00:00:00:055−8700:00:00:00:00:055−83
Table 2. Proximity information field encoding. The RSSI of the AP is quantized to a lower value.
Table 2. Proximity information field encoding. The RSSI of the AP is quantized to a lower value.
ValueMeaningValueMeaning
0PI_UNKNOWN8PI = −52 dBm
1PI ≤ −80 dBm9PI = −48 dBm
2PI = −76 dBm10PI = −44 dBm
3PI = −72 dBm11PI = −40 dBm
4PI = −68 dBm12PI = −36 dBm
5PI= −64 dBm13PI = −32 dBm
6PI = −60 dBm14PI = −28 dBm
7PI = −56 dBm15PI ≥ −24 dBm
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Kim, H.; So, J. Improving Spatial Reuse of Wireless LAN Uplink Using BSS Color and Proximity Information. Appl. Sci. 2021, 11, 11074. https://doi.org/10.3390/app112211074

AMA Style

Kim H, So J. Improving Spatial Reuse of Wireless LAN Uplink Using BSS Color and Proximity Information. Applied Sciences. 2021; 11(22):11074. https://doi.org/10.3390/app112211074

Chicago/Turabian Style

Kim, Hyerin, and Jungmin So. 2021. "Improving Spatial Reuse of Wireless LAN Uplink Using BSS Color and Proximity Information" Applied Sciences 11, no. 22: 11074. https://doi.org/10.3390/app112211074

APA Style

Kim, H., & So, J. (2021). Improving Spatial Reuse of Wireless LAN Uplink Using BSS Color and Proximity Information. Applied Sciences, 11(22), 11074. https://doi.org/10.3390/app112211074

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop