Analytical Study of the Distance Change on IEEE 802.11ah Standard using Markov Chain Model
Abstract
This research proposed a model of Enhanced Distributed Channel Access (EDCA) scheme which is one of the techniques used in reducing collision and usually prioritized due to its contention window to determine the impact of distance change on the IEEE 802.11 ah standard. The proposed model was analyzed using the Markov Chain approach to determine the effect of distance change on collisions levels while the numerical were simulated using MATLAB. Moreover, the Markov chain solution was used to evaluate parameters such as throughput, energy consumption, and delay. The results showed the increment in RAW slot duration and the distance change for each station can reduce the performance on the standard and the scenario when the RAW slot duration was changed by 50 ms performed better than 100 ms and 250 ms.References
E. Khowov et al, “Enabling the IoT with Wi-Fi HaLow - Performance Evaluation of Restricted Access Window,” IEEE Access, vol. 4, 2016.
D. Perdana, S. Hafidzah, and B. Erfianto, “Analytical Study on IEEE 802.11ah Standard Impact of Hidden Node,” Int. J. of Intelligent and Systems, vol. 14, no. 3, pp. 139–147, 2021.
R. N. A. Muktiarto, D. Perdana, and R. M. Negara, “Perform-ance analysis of mobility impact on IEEE 802.11ah standard with traffic pattern scheme,” Int. J. Secure, vol. 10, no. 1, pp. 139–147, 2018.
S. Prasetya, B. Rahmat, and E. Susanto, “Quality of service improvement with 802.11 e EDCA scheme using enhanced adaptive contention window algorithm,” in 2015 IEEE International Conference on Communication, Networks and Satellite (COMNESTAT), pp. 80–85, 2015.
https://doi.org/10.1109/COMNETSAT.2015.7434292
A. Oktaviana, D. Perdana, and R. M. Negara, “Performance Analysis on IEEE 802.11ah Standard with Enhanced Distributed Channel Access Mechanism,” CommIT (Communication and Information Technology) Journal, vol. 12, no. 1, pp. 35, 2018.
https://doi.org/10.21512/commit.v12i1.3908
M. Krajčí, “Markov chain algorithms for canonical ensemble simulation,” Computer Physics Communications, vol. 42, no. 1, pp. 29–35, 1986.
https://doi.org/10.1016/0010-4655(86)90227-4
M. A. Charsooghi, E. A. Akhlaghi, S. Tavaddod, and H. R. Khalesifard, “A MATLAB program to calculate translational and rotational diffusion coefficients of a single particle,” Computer Physics Communications, vol. 182, no. 2, pp. 400–408, 2011.
https://doi.org/10.1016/j.cpc.2010.09.017
D. Mani and A. Mahendran, “Availability Modelling of Fault Tolerant Cloud Computing System,” International Journal of Intelligent Engineering and Systems, vol. 10, no. 1, pp. 154–165, 2017.
Y. Wang, K. K. Chai, Y. Chen, J. Schormans, “Energy Efficient Window Control Scheme for IEEE 802.11ah (Wi-Fi HaLow) Based Networks,” J. of Electrical Engineering, vol. 5, no. 5, 2017.
https://doi.org/10.17265/2328-2223/2017.05.003
L. Tian, S. Deronne, S. Latré, and J. Famaey, “Implementation and Validation of an IEEE 802.11ah Module for ns-3,” in Proceedings of the Workshop on ns-3 - WNS3 ’16, pp. 49–56, 2016.
https://doi.org/10.1145/2915371.2915372
R. F. Malik and I. Mustofa, “Separated Operation State pada Medium Access Control di Jaringan IEEE 802.11ac,” Transmisi: Jurnal Ilmiah Teknik Elektro, vol. 21, no. 2, pp. 43–50, 2019.
M. Qutab-ud-din, “Enhancements and Challenges In IEEE 802.11 ah-A Sub-Gigahertz Wi-Fi For IoT Applications,” 2015.
A. Thalengala, H. Anitha, and T. Girisha, “Effect of time-domain windowing on isolated speech recognition system performance,” International Journal of Electronics and Telecommunications, pp. 161–166, 2022.
R. Hoffmann, “Markov Model of Cyber Attack Life Cycle Triggered by Software Vulnerability,” International Journal of Electronics and Telecommunications, pp. 67, 2021.
P. C. Jain and S. Taneeru, “Performance Evaluation of IEEE 802.11ah Protocol in Wireless Area Network,” in 2016 International Conference on Micro-Electronics and Telecommunication Engineering (ICMETE), pp. 578–583, 2016.
https://doi.org/10.1109/ICMETE.2016.23
S. G. Yoon, J. O. Seo, and S. Bahk, “Regrouping algorithm to alle- viate the hidden node problem in 802.11ah networks,” Computer Networks, vol. 105, pp. 22–32, 2016.
L. Xin and D. Starobinski, “Mitigation of cascading denial of service attacks on Wi-Fi networks,” in 2018 IEEE Conference on Communications and Network Security (CNS), pp. 1–9 2018.
L. Tian, “Optimization-Oriented RAW Modeling of IEEE 802.11ah Heterogeneous Networks,” IEEE Internet of Things Journal, vol. 6, no. 6, pp. 10597–10609, 2019.
https://doi.org/10.1109/JIOT.2019.2940251
M. Qutab-Ud-Din, A. Hazmi, B. Badihi, A. Larmo, J. Torsner, and M. Valkama, “Performance analysis of iot-enabling ieee 802.11ah technology and its raw mechanism with non-cross slot boundary holding schemes,” in 2015 IEEE 16th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp. 1–6 2015.
P. Reddy and R. Babu, “An Evolutionary Secure Energy Efficient Routing Protocol in Internet of Things,” International Journal of Intelligent Engineering and Systems, vol. 10, no. 3, pp. 337–346, 2017.
https://doi.org/10.22266/ijies2017.0630.38
I. Iala, I. Dbibih, and O. Zytoune, “Adaptive Duty-Cycle Scheme Based on a New Prediction Mechanism for Energy Optimization over IEEE 802.15.4 Wireless Network,” International Journal of Intelligent Engineering and Systems, vol. 11, no. 5, pp. 105–113, 2018.
https://doi.org/10.22266/ijies2018.1031.10
L. Tian, J. Famaey, and S. Latre, “Evaluation of the IEEE 802.11 ah restricted access window mechanism for dense IoT networks,” in 2016 IEEE 17th international symposium on a world of wireless, mobile and multimedia networks (WoWMoM), 2016, pp. 1–9.
W. Yin, P. Hu, W. Wang, J. Wen, and H. Zhou, “FASUS: A fast association mechanism for 802.11 ah networks,” Computer Networks, vol. 175, pp. 107–287, 2020.
P. Campos, A. Hernandez-Solana, and A. Valdovinos-Bardaji, “Analysis of hidden node problem in LTE networks deployed in unlicensed spectrum,” Computer Networks, vol. 177, pp. 107–280, 2020.
E. D. N. Ndih, S. Cherkaoui, and I. Dayoub, “Analytic Modeling of the Coexistence of IEEE 802.15. 4 and IEEE 802.11 in Saturation Conditions,” IEEE Communications Letters, vol. 19, no. 11, pp. 1981–1984, 2015.
A. Sljivo et al., “Performance evaluation of IEEE 802.11 ah networks with high-throughput bidirectional traffic,” Sensors, vol. 18, no. 2, p. 325, 2018.
B. Rajkumar and G. Narsimha, “Secure Light Weight Encryption Protocol for MANET,” International Journal of Intelligent Engineering and Systems, vol. 10, no. 3, pp. 58–65, 2017.
https://doi.org/10.22266/ijies2017.0630.07
IEEE 802 LAN/MAN Standards Committee and others, “IEEE Standard for Information technology-Telecommunication and information exchange between systems-Local and metropolitan area networks-Specific requirements Part11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment1: Radio
Resource Measurement of Wireless LANs,” ieee std 802.11ahTM-2016, 2016.
J. C. Araiza Leon, “Evaluation of IEEE 802.11 ah Technology for Wireless Sensor Network Applications,” 2015.
A. Abu-Khadrah, Z. Zakaria, M. Othman, and M. S. I. M. Zin, “Using Markov Chain Model to Evaluate the Performance of EDCA Protocol Under Saturation and Non-Saturation Conditions,” International Review on Computers and Software (IRECOS), vol. 10, no. 3, pp. 315, 2015.
https://doi.org/10.15866/irecos.v10i3.5700
X. Li and W. F. Northrop, “A Markov Chain-based quantitative study of angular distribution of photons through turbid slabs via isotropic light scattering,” Computer Physics Communications, vol. 201, pp. 77–84, 2016.
https://doi.org/10.1016/j.cpc.2015.12.020
M. Sheng, J.-D. Li, and Y. Shi, “Performance Analysis of IEEE802. 11 under Distribution Coordination Function,” ACTA ELECTONICA SINICA, vol. 32, no. S1, pp. 148, 2004.
S. Ray, D. Starobinski, and J. B. Carruthers, “Performance of wireless networks with hidden nodes: a queuing-theoretic analysis,” Computer Communications, vol. 28, no. 10, pp. 1179–1192, 2005. https://doi.org/10.1016/j.comcom.2004.07.024
L. Xin, D. Starobinski, and G. Noubir, “Cascading denial of service attacks on Wi-Fi networks,” in 2016 IEEE Conference on Communications and Network Security (CNS), pp. 91–99, 2016.
Q. T. Ngo, D. N. Minh Dang, Q. Le-Trung, and D. K. Lam, “A Novel Directional MAC in Restricted Access Window for IEEE 802.11ah Networks,” in 2019 26th International Conference on Telecommunications (ICT), pp. 167–171, 2019.
https://doi.org/10.1109/ICT.2019.8798775
P. Zhong, J. Shi, Y. Zhuang, H. Chen, and X. Hong, “A Generalized Markov Chain Model for IEEE 802.11 Distributed Coordination
Function,” KSII Transactions on Internet and Information Systems (TIIS), vol. 6, no. 2, pp. 664–682, 2012.
C. E. Weng and H. C. Chen, “The performance evaluation of IEEE 802.11 DCF using Markov chain model for wireless LANs,” Computer Standards & Interfaces, vol. 44, pp. 144–149, 2016.
https://doi.org/10.1016/j.csi.2015.09.002
M. Shafiq et al., “Multiple Access Control for Cognitive Radio-Based IEEE 802.11ah Networks,” Sensors, vol. 18, no. 7, pp. 2043, 2018.
https://doi.org/10.3390/s18072043
S. M. Soares and M. M. Carvalho, “Throughput Analytical Modeling of IEEE 802.11ah Wireless Networks,” in 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC), pp. 1–4, 2019.
https://doi.org/10.1109/CCNC.2019.8651805
L. M. Feeney and M. Nilsson, “Investigating the energy consumption of a wireless network interface in an ad hoc networking environment,” in Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No. 01CH37213), pp. 1548–1557, 2001.
S. Fadilah, A. Shibghatullah, Z. Abas, M. Abd Wahab, M. Helmy, and W. Hashim, “Performance Analysis for Wireless G (IEEE 802.11G) and Wireless N (IEEE 802.11N) in Outdoor Environment,” ARPN Journal Engineering and Applied Sciences, vol. 9, pp. 1725–1731, 2014.
M. Elkotob and K. Andersson, “Analysis and measurement of session setup delay and jitter in VoWLAN using composite metrics,” in Proceedings of the 7th International Conference on Mobile and Ubiquitous Multimedia, pp. 190–197, 2008.
O. Raeesi, J. Pirskanen, A. Hazmi, T. Levanen, and M. Valkama, “Performance evaluation of IEEE 802.11ah and its restricted access window mechanism,” in 2014 IEEE International Conference on Communications Workshops (ICC), pp. 460–466, 2014.
Downloads
Published
Issue
Section
License
Copyright (c) 2023 International Journal of Electronics and Telecommunications
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
1. License
The non-commercial use of the article will be governed by the Creative Commons Attribution license as currently displayed on https://creativecommons.org/licenses/by/4.0/.
2. Author’s Warranties
The author warrants that the article is original, written by stated author/s, has not been published before, contains no unlawful statements, does not infringe the rights of others, is subject to copyright that is vested exclusively in the author and free of any third party rights, and that any necessary written permissions to quote from other sources have been obtained by the author/s. The undersigned also warrants that the manuscript (or its essential substance) has not been published other than as an abstract or doctorate thesis and has not been submitted for consideration elsewhere, for print, electronic or digital publication.
3. User Rights
Under the Creative Commons Attribution license, the author(s) and users are free to share (copy, distribute and transmit the contribution) under the following conditions: 1. they must attribute the contribution in the manner specified by the author or licensor, 2. they may alter, transform, or build upon this work, 3. they may use this contribution for commercial purposes.
4. Rights of Authors
Authors retain the following rights:
- copyright, and other proprietary rights relating to the article, such as patent rights,
- the right to use the substance of the article in own future works, including lectures and books,
- the right to reproduce the article for own purposes, provided the copies are not offered for sale,
- the right to self-archive the article
- the right to supervision over the integrity of the content of the work and its fair use.
5. Co-Authorship
If the article was prepared jointly with other authors, the signatory of this form warrants that he/she has been authorized by all co-authors to sign this agreement on their behalf, and agrees to inform his/her co-authors of the terms of this agreement.
6. Termination
This agreement can be terminated by the author or the Journal Owner upon two months’ notice where the other party has materially breached this agreement and failed to remedy such breach within a month of being given the terminating party’s notice requesting such breach to be remedied. No breach or violation of this agreement will cause this agreement or any license granted in it to terminate automatically or affect the definition of the Journal Owner. The author and the Journal Owner may agree to terminate this agreement at any time. This agreement or any license granted in it cannot be terminated otherwise than in accordance with this section 6. This License shall remain in effect throughout the term of copyright in the Work and may not be revoked without the express written consent of both parties.
7. Royalties
This agreement entitles the author to no royalties or other fees. To such extent as legally permissible, the author waives his or her right to collect royalties relative to the article in respect of any use of the article by the Journal Owner or its sublicensee.
8. Miscellaneous
The Journal Owner will publish the article (or have it published) in the Journal if the article’s editorial process is successfully completed and the Journal Owner or its sublicensee has become obligated to have the article published. Where such obligation depends on the payment of a fee, it shall not be deemed to exist until such time as that fee is paid. The Journal Owner may conform the article to a style of punctuation, spelling, capitalization and usage that it deems appropriate. The Journal Owner will be allowed to sublicense the rights that are licensed to it under this agreement. This agreement will be governed by the laws of Poland.
By signing this License, Author(s) warrant(s) that they have the full power to enter into this agreement. This License shall remain in effect throughout the term of copyright in the Work and may not be revoked without the express written consent of both parties.