Advertisement

Wireless Personal Communications

, Volume 105, Issue 1, pp 293–311 | Cite as

MAC Layer Approaches for Mitigating the Spectrum Underutilization Due to Overlapping BSS Problem in WLAN

  • Yi GuoEmail author
  • I-Tai Lu
  • Juan Fang
  • Gang Liu
  • Jianhua Ge
Article
  • 33 Downloads

Abstract

Overlapping basic service set (OBSS) interferences cause significant reductions in the network throughput as seen at the medium access control (MAC) layer. When the frequency bands of multiple OBSSs are partially overlapped, the reduction of throughput are worsened because in addition to the OBSS interference problem there arises the OBSS-induced spectrum underutilization problem which has not been addressed so far. In this paper, two complementary contention-based MAC layer schemes are proposed to solve the OBSS-induced spectrum underutilization problem by setting up a virtual-primary channel for contention. The proposed time-limited (TL) scheme is designed for transmitting long data packets, which is suitable for applications requiring high throughputs. In contrast, the multi-contention (MC) scheme is designed for transmitting short data packets, which is suitable for applications requiring short delays. By efficiently exploiting the OBSS-induced underutilized spectrum, simulation results verify that the proposed TL scheme can increase the throughput greatly and the proposed MC scheme can reduce the delay for short data packets significantly.

Keywords

WLAN OBSS Virtual-primary channel Time-limited (TL) Multi-contention (MC) 

Notes

Acknowledgements

This work was supported in part by the Important National Science & Technology Specific Projects (2013ZX03003013-005).

References

  1. 1.
    Goswami, S., Sarmah, K., Sarma, A., Sarma, K. K., & Baruah, S. (2017). Design of a CSRR based compact microstrip antenna for image rejection in RF down-converter based WLAN receivers. AEU: International Journal of Electronics and Communications, 74, 128–134.Google Scholar
  2. 2.
    Gautam, A. K., Bisht, A., & Kanaujia, B. K. (2016). A wideband antenna with defected ground plane for WLAN/WiMAX applications. AEU: International Journal of Electronics and Communications, 70(3), 354–358.Google Scholar
  3. 3.
    Ansal, K. A., & Shanmuganantham, T. (2015). A novel CB ACS-fed dual band antenna with truncated ground plane for 2.4/5 GHz WLAN application. AEU: International Journal of Electronics and Communications, 69(10), 1506–1513.Google Scholar
  4. 4.
    Hu, S., Li, J., & Pan, G. (2014). Performance and fairness enhancement in IEEE 802.11 WLAN networks. AEU: International Journal of Electronics and Communications, 68(7), 667–675.Google Scholar
  5. 5.
    Monteiro, T. L., Pellenz, M. E., Penna, M. C., Enembreck, F., & Pujolle, G. (2012). Channel allocation algorithms for WLANs using distributed optimization. AEU: International Journal of Electronics and Communications, 66(6), 480–490.Google Scholar
  6. 6.
    Zheng, Y., Shi, T., Xu, X., et al. (2017). Research on WLAN planning problem based on optimization models and multi-agent algorithm. In IEEE international conference on cybernetics and intelligent systems (CIS) and IEEE conference on robotics, automation and mechatronics (RAM) (pp. 249–254).Google Scholar
  7. 7.
    Soni, G., & Verma, C. (2017). Performance investigation of the WLAN link using QAM and QPSK based on vector signal transceiver 5644R. In 7th international conference on communication systems and network technologies (CSNT) (pp. 34–37).Google Scholar
  8. 8.
    Lepaja, A., Maraj, A., et al. (2018). The impact of the security mechanisms in the throughput of the WLAN networks. In 7th Mediterranean conference on embedded computing (MECO) (pp. 1–5).Google Scholar
  9. 9.
    Jovičić, K., Koprivica, M., et al. (2017). Experimental analysis of electromagnetic radiation originating from 802.11a/g WLAN devices. In 25th telecommunication forum (TELFOR) (pp. 1–4).Google Scholar
  10. 10.
    Gebreyohannes, F. T., Frapp, A., & Kaiser, A. (2016). A configurable transmitter architecture for IEEE 802.11ac and 802.11ad standards. IEEE Transactions on Circuits and Systems II: Express Briefs, 63(1), 9–13.CrossRefGoogle Scholar
  11. 11.
    Chung, C., Jung, Y., & Kim, J. (2015). Saturation throughput analysis of IEEE 802.11ac TXOP sharing mode. Electronics Letters, 51(25), 2164–2166.CrossRefGoogle Scholar
  12. 12.
    Hu, Z., & Wen, X. (2015). Modeling the TXOP sharing mechanism of IEEE 802.11ac enhanced distributed channel access in non-saturated conditions. IEEE Communications Letters, 19(9), 1576–1579.CrossRefGoogle Scholar
  13. 13.
    Aajami, M., & Suk, J. B. (2015). Optimal TXOP sharing in IEEE 802.11ac. IEEE Communications Letters, 19(7), 1141–1144.CrossRefGoogle Scholar
  14. 14.
    Yuxia, L., & Wong, V. W. S. (2006). Saturation throughput of IEEE 802.11e EDCA based on mean value analysis. In Wireless communications and networking conference.Google Scholar
  15. 15.
    Hyunduk, K., Gwangzeen, K., Kim, L., et al. (2013). Overlapping BSS interference mitigation among WLAN systems. In 2013 international conference on ICT convergence (ICTC) (pp. 913–917).Google Scholar
  16. 16.
    Bo, H., Lusheng, J., Seungjoon, L., et al. (2009). Channel access throttling for overlapping BSS management. In IEEE international conference on communications, 2009 (ICC ‘09) (pp. 1–6).Google Scholar
  17. 17.
    Wu, J., & Jiang, T. (2014). A novel scheme to ease the problem of OBSS networks based on admission control and TPC. In 14th international symposium on communications and information technologies (ISCIT) (pp. 588–592).Google Scholar
  18. 18.
    Yin, Y., & Jiang, T. (2014). A new admission control scheme/or the overlapping BSS issues in the 802.11 WLANS. In 14th international symposium on communications and information technologies (ISCIT) (pp. 583–587).Google Scholar
  19. 19.
    Kang, H., Ko, G., Kim, I., et al. (2014). Interference mitigation among neighbor APs using 802.19.1 coexistence service: Information service vs. management service. In 2014 international conference on information and communication technology convergence (ICTC) (pp. 711–716).Google Scholar
  20. 20.
    Han, Q., Yang, B., et al. (2014). Multi-leader multi-follower game based power control for downlink heterogeneous networks. In 2014 33rd Chinese control conference (CCC) (pp. 5486–5491).Google Scholar
  21. 21.
    Abinader, F. M., Almeida, E. P. L., C houdhury, S., et al. (2014). Performance evaluation of IEEE 802.11n WLAN in dense deployment scenarios. In IEEE 80th vehicular technology conference (VTC fall) (pp. 1–5).Google Scholar
  22. 22.
    Ropitault, T. (2018). Evaluation of RTOT algorithm: A first implementation of OBSS_PD-based SR method for IEEE 802.11ax. In IEEE 15th annual consumer communications & networking conference (CCNC) (pp. 1–7).Google Scholar
  23. 23.
    Kanda, M., Katto, J., & Murase, T. (2016). Enhancement of HCCA utilizing capture effect to support high QoS and DCF friendliness. In IEEE 13th annual consumer communications & networking conference (CCNC) (pp. 335–338).Google Scholar
  24. 24.
    IEEE Std 802.11ac™-2013, “IEEE standard for information technology: Telecommunications and information exchange between systems local and metropolitan area networks specific requirements, Part 11: Wireless LAN medium access control (MAC) and physical layer (PHY) specifications amendment 4: Enhancements for very high throughput for operation in bands below 6 GHz”, December 11, 2013.Google Scholar
  25. 25.
    Stelter, A. (2013). Efficient access to extended channel bandwidth in wireless LAN. Electronics Letters, 49(21), 1356–1358.CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  • Yi Guo
    • 1
    Email author
  • I-Tai Lu
    • 2
  • Juan Fang
    • 2
  • Gang Liu
    • 1
  • Jianhua Ge
    • 1
  1. 1.ISN National Key LaboratoryXidian UniversityXi’anChina
  2. 2.Department of Electrical and Computer EngineeringNew York University Polytechnic School of Engineering, Metrotech CenterBrooklynUSA

Personalised recommendations