Collision chain mitigation and hidden device-aware grouping in large-scale IEEE 802.11ah networks

A new IEEE standard for large-scale wireless connectivity in IoT and M2M applications, called IEEE 802.11ah, has recently been introduced. A single access point (AP) of 802.11ah can provide connectivity to a large number of devices (up to 8192) with the communication range of up to 1źkm. Due to such a large coverage area with a large number of connected devices, however, the hidden node problem of 802.11ah networks is severer than typical Wi-Fi networks. Especially, we observe that frequent occurrences of a collision chain results in significant deterioration of network performance even with the group-based access restriction mechanism of 802.11ah. To solve this problem, we propose a collision chain mitigation scheme that detects and interrupts a collision chain, lets a smaller number of devices contend thereafter and also provide the information from which a carrier-sensitivity table is constructed by AP. Although the proposed scheme mitigates performance deterioration due to a collision chain when occurred, collision chains still occur. So, we propose a grouping algorithm which can perform both initial grouping and regrouping from existing groups based on the carrier-sensitivity table constructed by the mitigation scheme so that only a negligible number of hidden devices remain in each group and the root cause of collision chain is obviated. Our simulation study shows that the mitigation scheme alone makes network throughput comparable to the case of no hidden devices and its combination with the grouping algorithm improves throughput performance over the 8-group case of the conventional mechanism by up to 146%.

[1]  Seung-Woo Seo,et al.  New Hidden Station Detection Scheme for Adaptive RTS/CTS Exchange in IEEE 802.11 WLANs , 2007, IEICE Trans. Commun..

[2]  Woo-Yong Choi Clustering Algorithm for Hidden Node Problem In Infrastructure Mode IEEE 802.11 Wireless LANs , 2008, 2008 10th International Conference on Advanced Communication Technology.

[3]  Philip Levis,et al.  Achieving single channel, full duplex wireless communication , 2010, MobiCom.

[4]  Edward W. Knightly,et al.  802.11ec: Collision Avoidance Without Control Messages , 2014, IEEE/ACM Trans. Netw..

[5]  Dina Katabi,et al.  Zigzag decoding: combating hidden terminals in wireless networks , 2008, SIGCOMM '08.

[6]  Yue Yang,et al.  Grouping-Based MAC Protocols for EV Charging Data Transmission in Smart Metering Network , 2014, IEEE Journal on Selected Areas in Communications.

[7]  Masahiro Morikura,et al.  IEEE 802.11ah Based M2M Networks Employing Virtual Grouping and Power Saving Methods , 2013, 2013 IEEE 78th Vehicular Technology Conference (VTC Fall).

[8]  Jaume Barceló,et al.  IEEE 802.11AH: the WiFi approach for M2M communications , 2014, IEEE Wireless Communications.

[9]  J. Morris Chang,et al.  Group-Based Medium Access Control for IEEE 802.11n Wireless LANs , 2013, IEEE Transactions on Mobile Computing.

[10]  Tae-Jin Lee,et al.  Enhancement of IEEE 802.11ah MAC for M2M Communications , 2014, IEEE Communications Letters.

[11]  Fu-Yi Hung,et al.  Performance analysis of the IEEE 802.11 DCF in the presence of the hidden stations , 2010, Comput. Networks.

[12]  Masahiro Morikura,et al.  IEEE 802.11ah Based M2M Networks Employing Virtual Grouping and Power Saving Methods , 2013 .

[13]  Seung-Woo Seo,et al.  Novel collision detection scheme and its applications for IEEE 802.11 wireless LANs , 2007, Comput. Commun..

[14]  Youngsoo Kim,et al.  A novel hidden station detection mechanism in IEEE 802.11 WLAN , 2006, IEEE Communications Letters.

[15]  William A. Arbaugh,et al.  Towards Scalable MAC Design for High-Speed Wireless LANs , 2007, EURASIP J. Wirel. Commun. Netw..