Analytical Study of the Distance Change on IEEE 802.11ah Standard using Markov Chain Model


  • Doan Perdana Telkom University
  • Amirah Amaliah Sakhrul Telkom University
  • Bayu Erfianto Telkom University
  • Abdul Aziz Marwan Telkom University


This research proposed a model of Enhanced Distributed Channel Access (EDCA) scheme which is one of the techniques used in reducing collision and usually prioritized due to its contention window to determine the impact of distance change on the IEEE 802.11 ah standard. The proposed model was analyzed using the Markov Chain approach to determine the effect of distance change on collisions levels while the numerical were simulated using MATLAB. Moreover, the Markov chain solution was used to evaluate parameters such as throughput, energy consumption, and delay. The results showed the increment in RAW slot duration and the distance change for each station can reduce the performance on the standard and the scenario when the RAW slot duration was changed by 50 ms performed better than 100 ms and 250 ms.

Author Biography

Doan Perdana, Telkom University

Doan Perdana received his B.Sc. and M.Sc. Degrees in Telecommunication Engineering, from the Institute of Technology Telkom in 2004 and 2012, respectively. He completed his Ph.D. in Electrical Engineering Department, University of Indonesia. His research interest includes Communication Networks, Telecommunication System and Computer Engineering.


E. Khowov et al, “Enabling the IoT with Wi-Fi HaLow - Performance Evaluation of Restricted Access Window,” IEEE Access, vol. 4, 2016.

D. Perdana, S. Hafidzah, and B. Erfianto, “Analytical Study on IEEE 802.11ah Standard Impact of Hidden Node,” Int. J. of Intelligent and Systems, vol. 14, no. 3, pp. 139–147, 2021.

R. N. A. Muktiarto, D. Perdana, and R. M. Negara, “Perform-ance analysis of mobility impact on IEEE 802.11ah standard with traffic pattern scheme,” Int. J. Secure, vol. 10, no. 1, pp. 139–147, 2018.

S. Prasetya, B. Rahmat, and E. Susanto, “Quality of service improvement with 802.11 e EDCA scheme using enhanced adaptive contention window algorithm,” in 2015 IEEE International Conference on Communication, Networks and Satellite (COMNESTAT), pp. 80–85, 2015.

A. Oktaviana, D. Perdana, and R. M. Negara, “Performance Analysis on IEEE 802.11ah Standard with Enhanced Distributed Channel Access Mechanism,” CommIT (Communication and Information Technology) Journal, vol. 12, no. 1, pp. 35, 2018.

M. Krajčí, “Markov chain algorithms for canonical ensemble simulation,” Computer Physics Communications, vol. 42, no. 1, pp. 29–35, 1986.

M. A. Charsooghi, E. A. Akhlaghi, S. Tavaddod, and H. R. Khalesifard, “A MATLAB program to calculate translational and rotational diffusion coefficients of a single particle,” Computer Physics Communications, vol. 182, no. 2, pp. 400–408, 2011.

D. Mani and A. Mahendran, “Availability Modelling of Fault Tolerant Cloud Computing System,” International Journal of Intelligent Engineering and Systems, vol. 10, no. 1, pp. 154–165, 2017.

Y. Wang, K. K. Chai, Y. Chen, J. Schormans, “Energy Efficient Window Control Scheme for IEEE 802.11ah (Wi-Fi HaLow) Based Networks,” J. of Electrical Engineering, vol. 5, no. 5, 2017.

L. Tian, S. Deronne, S. Latré, and J. Famaey, “Implementation and Validation of an IEEE 802.11ah Module for ns-3,” in Proceedings of the Workshop on ns-3 - WNS3 ’16, pp. 49–56, 2016.

R. F. Malik and I. Mustofa, “Separated Operation State pada Medium Access Control di Jaringan IEEE 802.11ac,” Transmisi: Jurnal Ilmiah Teknik Elektro, vol. 21, no. 2, pp. 43–50, 2019.

M. Qutab-ud-din, “Enhancements and Challenges In IEEE 802.11 ah-A Sub-Gigahertz Wi-Fi For IoT Applications,” 2015.

A. Thalengala, H. Anitha, and T. Girisha, “Effect of time-domain windowing on isolated speech recognition system performance,” International Journal of Electronics and Telecommunications, pp. 161–166, 2022.

R. Hoffmann, “Markov Model of Cyber Attack Life Cycle Triggered by Software Vulnerability,” International Journal of Electronics and Telecommunications, pp. 67, 2021.

P. C. Jain and S. Taneeru, “Performance Evaluation of IEEE 802.11ah Protocol in Wireless Area Network,” in 2016 International Conference on Micro-Electronics and Telecommunication Engineering (ICMETE), pp. 578–583, 2016.

S. G. Yoon, J. O. Seo, and S. Bahk, “Regrouping algorithm to alle- viate the hidden node problem in 802.11ah networks,” Computer Networks, vol. 105, pp. 22–32, 2016.

L. Xin and D. Starobinski, “Mitigation of cascading denial of service attacks on Wi-Fi networks,” in 2018 IEEE Conference on Communications and Network Security (CNS), pp. 1–9 2018.

L. Tian, “Optimization-Oriented RAW Modeling of IEEE 802.11ah Heterogeneous Networks,” IEEE Internet of Things Journal, vol. 6, no. 6, pp. 10597–10609, 2019.

M. Qutab-Ud-Din, A. Hazmi, B. Badihi, A. Larmo, J. Torsner, and M. Valkama, “Performance analysis of iot-enabling ieee 802.11ah technology and its raw mechanism with non-cross slot boundary holding schemes,” in 2015 IEEE 16th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp. 1–6 2015.

P. Reddy and R. Babu, “An Evolutionary Secure Energy Efficient Routing Protocol in Internet of Things,” International Journal of Intelligent Engineering and Systems, vol. 10, no. 3, pp. 337–346, 2017.

I. Iala, I. Dbibih, and O. Zytoune, “Adaptive Duty-Cycle Scheme Based on a New Prediction Mechanism for Energy Optimization over IEEE 802.15.4 Wireless Network,” International Journal of Intelligent Engineering and Systems, vol. 11, no. 5, pp. 105–113, 2018.

L. Tian, J. Famaey, and S. Latre, “Evaluation of the IEEE 802.11 ah restricted access window mechanism for dense IoT networks,” in 2016 IEEE 17th international symposium on a world of wireless, mobile and multimedia networks (WoWMoM), 2016, pp. 1–9.

W. Yin, P. Hu, W. Wang, J. Wen, and H. Zhou, “FASUS: A fast association mechanism for 802.11 ah networks,” Computer Networks, vol. 175, pp. 107–287, 2020.

P. Campos, A. Hernandez-Solana, and A. Valdovinos-Bardaji, “Analysis of hidden node problem in LTE networks deployed in unlicensed spectrum,” Computer Networks, vol. 177, pp. 107–280, 2020.

E. D. N. Ndih, S. Cherkaoui, and I. Dayoub, “Analytic Modeling of the Coexistence of IEEE 802.15. 4 and IEEE 802.11 in Saturation Conditions,” IEEE Communications Letters, vol. 19, no. 11, pp. 1981–1984, 2015.

A. Sljivo et al., “Performance evaluation of IEEE 802.11 ah networks with high-throughput bidirectional traffic,” Sensors, vol. 18, no. 2, p. 325, 2018.

B. Rajkumar and G. Narsimha, “Secure Light Weight Encryption Protocol for MANET,” International Journal of Intelligent Engineering and Systems, vol. 10, no. 3, pp. 58–65, 2017.

IEEE 802 LAN/MAN Standards Committee and others, “IEEE Standard for Information technology-Telecommunication and information exchange between systems-Local and metropolitan area networks-Specific requirements Part11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment1: Radio

Resource Measurement of Wireless LANs,” ieee std 802.11ahTM-2016, 2016.

J. C. Araiza Leon, “Evaluation of IEEE 802.11 ah Technology for Wireless Sensor Network Applications,” 2015.

A. Abu-Khadrah, Z. Zakaria, M. Othman, and M. S. I. M. Zin, “Using Markov Chain Model to Evaluate the Performance of EDCA Protocol Under Saturation and Non-Saturation Conditions,” International Review on Computers and Software (IRECOS), vol. 10, no. 3, pp. 315, 2015.

X. Li and W. F. Northrop, “A Markov Chain-based quantitative study of angular distribution of photons through turbid slabs via isotropic light scattering,” Computer Physics Communications, vol. 201, pp. 77–84, 2016.

M. Sheng, J.-D. Li, and Y. Shi, “Performance Analysis of IEEE802. 11 under Distribution Coordination Function,” ACTA ELECTONICA SINICA, vol. 32, no. S1, pp. 148, 2004.

S. Ray, D. Starobinski, and J. B. Carruthers, “Performance of wireless networks with hidden nodes: a queuing-theoretic analysis,” Computer Communications, vol. 28, no. 10, pp. 1179–1192, 2005.

L. Xin, D. Starobinski, and G. Noubir, “Cascading denial of service attacks on Wi-Fi networks,” in 2016 IEEE Conference on Communications and Network Security (CNS), pp. 91–99, 2016.

Q. T. Ngo, D. N. Minh Dang, Q. Le-Trung, and D. K. Lam, “A Novel Directional MAC in Restricted Access Window for IEEE 802.11ah Networks,” in 2019 26th International Conference on Telecommunications (ICT), pp. 167–171, 2019.

P. Zhong, J. Shi, Y. Zhuang, H. Chen, and X. Hong, “A Generalized Markov Chain Model for IEEE 802.11 Distributed Coordination

Function,” KSII Transactions on Internet and Information Systems (TIIS), vol. 6, no. 2, pp. 664–682, 2012.

C. E. Weng and H. C. Chen, “The performance evaluation of IEEE 802.11 DCF using Markov chain model for wireless LANs,” Computer Standards & Interfaces, vol. 44, pp. 144–149, 2016.

M. Shafiq et al., “Multiple Access Control for Cognitive Radio-Based IEEE 802.11ah Networks,” Sensors, vol. 18, no. 7, pp. 2043, 2018.

S. M. Soares and M. M. Carvalho, “Throughput Analytical Modeling of IEEE 802.11ah Wireless Networks,” in 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC), pp. 1–4, 2019.

L. M. Feeney and M. Nilsson, “Investigating the energy consumption of a wireless network interface in an ad hoc networking environment,” in Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No. 01CH37213), pp. 1548–1557, 2001.

S. Fadilah, A. Shibghatullah, Z. Abas, M. Abd Wahab, M. Helmy, and W. Hashim, “Performance Analysis for Wireless G (IEEE 802.11G) and Wireless N (IEEE 802.11N) in Outdoor Environment,” ARPN Journal Engineering and Applied Sciences, vol. 9, pp. 1725–1731, 2014.

M. Elkotob and K. Andersson, “Analysis and measurement of session setup delay and jitter in VoWLAN using composite metrics,” in Proceedings of the 7th International Conference on Mobile and Ubiquitous Multimedia, pp. 190–197, 2008.

O. Raeesi, J. Pirskanen, A. Hazmi, T. Levanen, and M. Valkama, “Performance evaluation of IEEE 802.11ah and its restricted access window mechanism,” in 2014 IEEE International Conference on Communications Workshops (ICC), pp. 460–466, 2014.