Open Access

Performance analysis of IEEE 802.11ac wireless backhaul networks in saturated conditions

  • Ruizhi Liao1,
  • Boris Bellalta1Email author,
  • Jaume Barcelo1,
  • Victor Valls1 and
  • Miquel Oliver1
EURASIP Journal on Wireless Communications and Networking20132013:226

https://doi.org/10.1186/1687-1499-2013-226

Received: 21 January 2013

Accepted: 26 August 2013

Published: 10 September 2013

Abstract

According to the ongoing IEEE 802.11ac amendment, the wireless network is about to embrace the gigabit-per-second raw data rate. Compared with previous IEEE standards, this significant performance improvement can be attributed to the novel physical and medium access control (MAC) features, such as multi-user multiple-input multiple-output transmissions, the frame aggregation, and the channel bonding. In this paper, we first briefly survey the main features of IEEE 802.11ac, and then, we evaluate these new features in a fully connected wireless mesh network using an analytic model and simulations. More specifically, the performance of the MAC scheme defined by IEEE 802.11ac, which employs the explicit compressed feedback (ECFB) mechanism for the channel sounding, is evaluated. In addition, we propose an extended request-to-send/clear-to-send scheme that integrates the ECFB operation to compare with the IEEE 802.11ac-defined one in saturated conditions. The comparison of the two MAC schemes is conducted through three spatial stream allocation algorithms. A simple but accurate analytical model is derived for the two MAC schemes, the results of which are validated with simulations. The observations of the results not only reveal the importance of spatial stream allocations but also provide insight into how the newly introduced features could affect the performance of IEEE 802.11ac-based wireless mesh networks.

Keywords

IEEE 802.11ac Wireless mesh backhaul networks MAC MU-MIMO Saturation throughput

1 Introduction

IEEE 802.11 [1] is the de facto standard of the widely deployed wireless local area networks (WLANs). Since its debut in 1997, it comes a way from megabits per second to the upcoming gigabits per second [2], which was achieved by the cable technology not long ago. The currently ongoing IEEE 802.11ac amendment [3] aims to provide an aggregated multi-station throughput of at least 1 gigabit per second in the 5-GHz band. This performance improvement, compared to IEEE 802.11n [4], is obtained by introducing novel physical layer (PHY) and medium access control layer (MAC) features, including (1) wider channel bandwidths, (2) a higher modulation scheme, (3) downlink multi-user multiple-input multiple-output (MU-MIMO) transmissions, and (4) a compulsory frame aggregation mechanism. IEEE 802.11ac also introduces other novel features, e.g., the TXOP Sharing, while we only focus on those tightly related to this paper.

Some previous work has investigated the performance of IEEE 802.11ac focusing on one of the features. In [5], Redieteab et al. utilize a PHY and MAC cross-layer simulation platform to explore the impact of the training interval on the system performance. The results show that a frequent training process helps to increase the throughput in spite of the associated overhead. In [6], Cha et al. compare the performance of a downlink MU-MIMO scheme with a space-time block coding-based frame aggregation scheme. The authors claim that the MU-MIMO scheme produces a higher throughput than the other if transmitted frames are of similar length. In [7], Ong et al. compare the MAC throughput of IEEE 802.11ac with that of IEEE 802.11n over different frame aggregation schemes. The results suggest that a hybrid scheme of aggregated MAC protocol data unit (A-MPDU) and aggregated MAC service data unit (A-MSDU) yields the best performance. In [8], Bellalta et al. present a frame aggregation scheme for IEEE 802.11ac WLANs and evaluate its performance in non-saturated conditions. The results show that both the number of active nodes and the queueing length have significant impacts on the system performance. In [9], Nojima et al. measure the performance of a MU-MIMO WLAN system in a realistic channel, where two linear precoding schemes, channel inversion (CI) and block diagonalization (BD), are applied and compared. From the results, the authors conclude that the BD precoding scheme is more effective than the CI.

Bianchi in [10] considers a legacy IEEE 802.11 network using the distributed coordination function and derives the prominent saturation throughput analytical model for both basic access and request-to-send/clear-to-send (RTS/CTS) schemes. This saturation throughput analytic model is extended to support the MU-MIMO transmission and conformed to IEEE 802.11ac parameters in this paper. Regarding MU-MIMO transmissions in WLANs, Li et al. propose an integrated MU-MAC protocol that includes both multi-packet transmission (MPT) and multi-packet reception (MPR) in [11], where the perfect channel state information (CSI) is assumed to be obtained by the RTS/CTS training. The authors claim that the integration of MPT and MPR can obtain a significant performance improvement in terms of the number of supported nodes. Some related performance evaluation on MPT, MPR, or a combination of MPT and MPR schemes for wireless networks can be found in [1214].

In this paper, we capture the most important features of IEEE 802.11ac (e.g., MU-MIMO, the channel sounding interval, the number of antennas, the size of aggregated frames, and the channel bandwidth) to get insight into how these parameters can affect the system performance. The considered scenario is a fully connected wireless mesh network (fully connected means that all nodes are directly connected), which is targeted by the IEEE 802.11ac usage models [15]. As can be seen in Figure 1, mesh nodes are equipped with two interfaces: an IEEE 802.11ac, which is used to communicate with mesh nodes, and an IEEE 802.11n, which is used to communicate with the associated stations of each WLAN. In this paper, we focus on the performance analysis of the wireless mesh backhaul network, assuming that all the mesh nodes have the same number of antennas, which enables the transmission of multiple frames to the same or different destinations.
Figure 1

A wireless mesh backhaul network and associated WLANs.

The contributions of the paper are the following: (1) A brief survey of the novel IEEE 802.11ac features that are closely related to the performance analysis of this paper is presented. (2) The procedure of the IEEE 802.11ac-defined basic access scheme is illustrated. For comparison purposes, an extended RTS/CTS scheme that integrates the channel sounding protocol to support the MU-MIMO transmission is proposed. (3) A saturation throughput analytic model for both schemes is derived, the results of which are verified with those of the simulation. (4) Three spatial stream allocation algorithms are designed to compare the performance of the two MAC schemes by increasing the number of nodes, the number of antennas, the size of A-MPDU, and the channel bandwidth, with special attention being paid to the impact of the training process on the system performance.

In what follows, the basic access scheme defined by IEEE 802.11ac and the extended RTS/CTS scheme proposed by us are named as MU-Basic and MU-RTS/CTS, respectively. The rest of the paper is organized as follows. First, Section 2 surveys the main characteristics of IEEE 802.11ac. Then, Section 3 explains how the MU-Basic and the MU-RTS/CTS protocols work. After that, Section 4 presents the spatial stream allocation algorithms, the analytic model, and the simulation results. Finally, Section 5 concludes the paper and looks into the open research challenges.

2 IEEE 802.11ac

This section briefly surveys the upcoming amendment - IEEE 802.11ac, including the PHY layer and the MAC layer enhancements. This review does not go through every aspect of IEEE 802.11ac but focuses on those techniques and parameters which are needed to understand how the IEEE 802.11ac-based protocols work and how they could affect the system performance. A summary of IEEE 802.11ac main characteristics is shown in Table 1.
Table 1

IEEE 802.11ac parameters

Parameters

Values

Spectrum

5 GHz

Max number of simultaneous receiving nodes

4

Max number of simultaneous streams to a node/all nodes

4/8

Aggregation scheme

A-MPDU, A-MPDU of A-MSDU

Maximum A-MPDU size

1,048,575 bytes

Channel sounding(CSI feedback)

ECFB training protocol (optional)

Modulation schemes

BPSK, QPSK, 16-QAM, 64-QAM,

 

256-QAM (optional)

Channel bandwidth

20, 40, and 80 MHz,

 

160 and 80 + 80 MHz (optional)

Guard interval

0.8 μ s,

 

0.4 μ s (optional)

Forward error correction

Binary convolutional coding,

 

Low-density parity check (optional)

Bandwidth indication

CTS,

 

RTS (optional)

2.1 IEEE 802.11ac main features

2.1.1 Wider channel bandwidth

Compared to the legacy standard, IEEE 802.11ac operates exclusively in the 5-GHz band, which avoids interferences from many legacy devices as well as household appliances that operate at 2.4 GHz. In addition, there are more non-overlapping channels at 5 GHz, which can be bonded together to obtain wider channels. IEEE 802.11ac adds 80- and 160-MHz (optional) channels into its specification, where the 80-MHz channel is formed by combining two adjacent 40-MHz channels, and the 160-MHz channel is built up by combining two adjacent or non-adjacent 80-MHz channels [16].

2.1.2 Higher modulation and coding scheme

The 64-quadrature amplitude modulation (QAM) with 5/6 coding rate is the highest modulation and coding scheme (MCS) employed in IEEE 802.11n, which is extended to 256-QAM in IEEE 802.11ac. With 256-QAM, each symbol can carry eight information bits, increasing the number of transmitted bits per hertz. However, 256-QAM requires a higher signal-to-noise ratio at the receiving end in order to keep a low-bit error probability compared with other modulation schemes included in IEEE 802.11ac [17].

2.1.3 CSI Feedback for multi-user beamforming

IEEE 802.11ac utilizes a channel sounding protocol called explicit compressed feedback (ECFB, as shown in Figure 2) to obtain the required CSI for multi-user beamforming [16, 18]. The ECFB protocol works as follows. The beamformer first sends a null data packet announcement (NDPA) to initiate the training process, which includes the addresses of the targeted nodes. After a short interframe space (SIFS) interval, the beamformer will send a null data packet (NDP), where a set of training sequences that are known by both the beamformer and the beamformees will be included into the very high throughput long training field (VHT-LTF). The node that is identified as the first responder in the NDPA utilizes the training sequence in the NDP to estimate the channel and compresses the measured channel information, which is then fed back in a VHT compressed beamforming frame. The volume of the CSI feedback depends on the number of antennas and sub-carriers. Other nodes who are addressed in the NDPA will respond if they are explicitly polled. With these replied VHT compressed beamforming frames, the beamformer can calculate the weight and precisely steer each beam to the targeted receiver. For the detailed structure of NDPA, NDP, VHT compressed beamforming frame, and Poll, readers can refer to [3, 4].
Figure 2

An example of the ECFB of three beamformees.

2.1.4 Spatial multiplexing

A maximum number of four spatial streams is defined in IEEE 802.11n for the point-to-point communication mode (single-user MIMO). IEEE 802.11ac extends this maximum number from four to eight. In order to restrict the MU-MIMO transmission to a manageable scale, IEEE 802.11ac specifies the two following rules to the eight spatial streams: (1) The maximum number of simultaneous beams directed to different nodes is four, which means that the maximum number of simultaneous receivers of a MU-MIMO transmission is four. (2) The maximum number of simultaneous spatial streams inside a beam towards a node is four, which means that the maximum number of spatial streams that each receiver can have is also four [16, 17].

2.2 IEEE 802.11ac PHY frame format

Figure 3 shows the structure of the IEEE 802.11ac PHY frame, where PLCP and PPDU stand for physical layer convergence protocol and PLCP protocol data unit, respectively. A service field and a tail field are appended to the A-MPDU before being processed by the PHY layer. The PHY header starts with a preamble that includes three legacy fields [3]: the legacy short training field (L-STF), the legacy long training field (L-LTF), and the legacy signal field (L-SIG). L-STF and L-LTF have functions such as detecting signal, synchronization, and frequency offset estimation. L-SIG contains information about the data rate and the length of the transmitted frame. These legacy fields are kept for the backward compatibility.
Figure 3

PHY frame format of IEEE 802.11ac.

The following VHT fields are introduced by IEEE 802.11ac to assist the novel PHY and MAC features in obtaining the required information [3, 7]. VHT-SIG-A consists of two orthogonal frequency division multiplexing (OFDM) symbols: VHT-SIG-A1 and VHT-SIG-A2, each containing 24 bits. Note that there is a group identifier (Group-ID) field in VHT-SIG-A1, which is utilized to notify those nodes about the following MU-MIMO transmission. VHT-STF is a short training field that is used to compute the transmission power assigned to that transmission. VHT-LTF allows a receiver to estimate the MIMO channel by containing a training sequence that is known by both the transmitting and the receiving nodes. IEEE 802.11ac supports up to eight VHT-LTF fields, each of which contains an orthogonal training sequence. In order to precisely estimate the MIMO channel, the number of VHT-LTF fields should be equal to or higher than the number of transmitted spatial streams. The VHT-SIG-B field contains the length of data and the MCS used for each beam.

2.3 IEEE 802.11ac MAC enhancements

2.3.1 A-MPDU

IEEE 802.11n introduces the A-MSDU and the A-MPDU frame aggregation schemes to improve the MAC efficiency. MSDUs who share a common MAC header are aggregated into an A-MSDU, which is then encapsulated into an MPDU. Multiple MPDUs with different MAC headers are aggregated into an A-MPDU. In IEEE 802.11ac, the maximum size of A-MSDU and A-MPDU has been increased to 11,406 and 1,048,575 bytes, respectively, and all frames are required to be transmitted as the format of A-MPDU even if there is only one MPDU [3, 16].

2.3.2 Group-ID

Group-ID is a field defined in VHT-SIG-A1 to signal a group of selected receivers. More specifically, the Group-ID field is utilized by a receiving node to decide if it is targeted in the followed MU-MIMO transmission. Depending on whether a node is targeted, it will either check the user position field (a field defined in VHT-SIG-A1) to identify the spatial streams that correspond to itself or will not process the rest of the PPDU [3]. Although Group-ID is specified in the frame of the PHY layer, it actually benefits the MAC layer because the control frame (e.g., RTS) or the MAC header of data frames does not need to be extended to accommodate multiple receivers’ addresses.

2.4 IEEE 802.11ac data rate

In IEEE 802.11ac, the data rate is R data = N DBPS T symbol , where NDBPS is the number of data bits per OFDM symbol and Tsymbol is the symbol duration. NDBPS is determined by the number of data sub-carriers (Ndsc) and MCS, while Tsymbol is determined by the employed bandwidth and the guard interval (GI).

An example to calculate the maximum data rate of a single spatial stream is shown as follows. In a scenario where the channel bandwidth is 160 MHz and GI is 0.4 μ s, there will be 468 data sub-carriers out of 512 OFDM sub-carriers; each OFDM symbol of a sub-carrier can carry up to 8·5/6 information bits if a 256-QAM with 5/6 coding rate is employed. The total number of data bits in a symbol, NDBPS, equals 468·8·5/6= 3,120 bits/symbol. The symbol duration, Tsymbol, is equal to 512/160 μ s + 0.4 μ s =3.6 μ s. Then the maximum single-stream data rate is obtained: N DBPS T symbol 866.7 Mbps.

3 MU-MIMO MAC protocols for IEEE 802.11ac

In this section, the IEEE 802.11ac-defined basic access scheme (MU-Basic) and the proposed one (MU-RTS/CTS) are introduced, both of which are based on the IEEE 802.11 enhanced distributed channel access (EDCA).

3.1 MU-Basic

A node running in the MU-Basic scheme switches between two modes: the ECFB training (CSI mode) and the multi-user data transmission (data mode). The ECFB training is periodically (T2-CSI-Req) performed by each node to obtain the required CSI from its neighbors. T2-CSI-Req is the interval between two CSI requests of a node. The operations of ECFB have been described in Section 2.1. This section focuses on the multi-user data transmission.

The MU-Basic scheme is based on EDCA, with the difference that a node who wins the channel is able to send frames to multiple receivers. After the channel has been idle for an arbitration inter frame space (AIFS), a back-off (BO) starts to count down. As soon as a node’s BO first reaches zero, it simultaneously transmits multiple A-MPDUs. If all frames are successfully received, the receiving nodes will send block ACKs (B-ACKs) sequentially. Note that a node has a unique BO no matter whether it is in the CSI mode or in the data mode, which is to say that if the node switches to the CSI mode in the middle of the data mode’s BO countdown process, it will utilize the ongoing BO for the ECFB frames.

In this paper, the bitmap field of B-ACK is set to be a variable to account for the number of aggregated MPDUs (Nf) in each A-MPDU. The frame fields of B-ACK are shown in Table 2.
Table 2

Frame fields of B-ACK

2 bytes

2 bytes

6 bytes

6 bytes

2 bytes

2 bytes

[N f /8] bytes

4 bytes

Frame

Duration

Receiver

Transmitter

B-ACK

Starting

B-ACK

Frame

control

 

address

address

control

sequence

bitmap

check

     

control

 

sequence

An example of a successful MU-Basic transmission is illustrated in Figure 4. Initially the channel is assumed busy (B) in Figures 4, 5, and 6. Suppose node 1 wins the channel contention and simultaneously transmits two A-MPDUs, one is directed to node 2 and the other is directed to node 4. After the successful reception of the A-MPDUs, nodes 2 and 4 send the B-ACK sequentially.
Figure 4

A successful transmission of the MU-Basic scheme.

Figure 5

Collisions in the MU-Basic scheme. (a) Collisions between multiple NDPAs. (b) Collisions between multiple data frames.

Figure 6

The MU-RTS/CTS scheme. (a) A successful transmission of the MU-RTS/CTS scheme. (b) Collisions between RTSs.

If collisions occur, as illustrated in Figure 5, no frames can be received successfully, where the dashed frames mean that these frames would be there if the transmission was successful (no collisions). ECFB-EIFS and MUBasic-EIFS represent the extended inter frame space (EIFS) for each case, examples of the calculation of which can be found in [19, 20].

3.2 MU-RTS/CTS

The MU-RTS/CTS scheme is proposed as an alternative to MU-Basic, where the ECFB training protocol is integrated into the RTS and MU-CTS handshaking process. More specifically, the training sequence is included into the VHT-LTF field of the RTS control frame. The nodes who are targeted in the Group-ID field will estimate the channel and feed back the measured CSI through MU-CTSs to the RTS sender. The frame fields of MU-CTS are shown in Table 3. The channel information field contains the measured CSI, which has the same size as that of the VHT compressed beamforming frame, and is equal to M·Ndsc·8 bits, where M is the number of antennas of each node, Ndsc is the number of data sub-carriers, and 8 is the number of bits required to estimate the channel gain of each data sub-carrier.
Table 3

Frame fields of MU-CTS

2 bytes

2 bytes

6 bytes

M · N dsc bytes

4 bytes

Frame

Duration

Receiver

Channel

Frame check

control

 

address

information

sequence

The benefits of employing the MU-RTS/CTS scheme are as follows: (1) It eliminates the need to periodically execute the ECFB protocol. (2) It reduces the collision time because the length of RTS is much shorter than that of A-MPDU. (3) The data sender can also obtain CSI by estimating the training sequence included in MU-CTSs, which enables it to receive B-ACKs in parallel, therefore further reducing temporal overheads.

The MU-RTS/CTS scheme works as illustrated in Figure 6a. Suppose that node 1 initiates the transmission by sending an RTS, in which the targeted nodes are mapped in the Group-ID field, and the training sequence is added in the VHT-LTF field of the PHY preamble. The targeted nodes will estimate the channel, include the measured CSI into the channel information field of MU-CTS, and send it back in the same order as indicated in the Group-ID field. With these MU-CTSs that include the required CSI, node 1 is able to create multiple beams towards the selected destinations. In order to take benefits of receiving multiple B-ACKs in parallel, node 1 will also measure the channel from the training sequence of the MU-CTS’s VHT-LTF field. If collisions happen, as shown in Figure 6b, MU-RTS/CTS-EIFS, which is set according to the MU-CTS timer, will make all nodes recover from collisions at the same time [19, 20].

4 Saturation throughput analysis and simulation results

The considered wireless mesh backhaul network is shown in Figure 7. There are n identical mesh nodes, each of which is equipped with M antennas. All these nodes are within the transmitting range of each other, hence forming a fully connected mesh network. A single transmission rate is used for both control frames and data frames. An error-free channel is considered.
Figure 7

A wireless mesh backhaul network.

All nodes are saturated and transmit fixed length frames of L bits. Frames destined to the same node are assembled into an A-MPDU, which will be assigned to a beam. Each beam contains one or more spatial streams. The A-MPDU payload is served by the spatial streams of a beam; therefore, the transmission duration of a beam with more spatial streams is shorter than that of a beam with fewer spatial streams. In order to make all beams of a transmission have the same duration, we assume that a node assigns the same number of spatial streams to different beams in each transmission.

4.1 Spatial stream allocation algorithms

Three spatial stream allocation schemes are designed to investigate whether it is better to employ more beams or more spatial streams in MU-MIMO transmissions. The algorithms seek the maximum product of the number of beams (Nb) and the number of spatial streams (Ns), which can be formulated as Equation 1. Ns,i=Ns,j is the constraint that all beams have to contain the same number of spatial streams, where i and j refer to any pair of beams.
Maximize N b · N s Subject to N b min ( M , min ( n 1 , 4 ) ) N s min ( M , 4 ) N b · N s min ( M , 8 ) N s , i = N s , j
(1)
The three algorithms are as follows:
  1. 1.

    Stream-greedy algorithm. It tries to maximize the number of spatial streams assigned to a beam, taking into account that the maximum number is 4. The duration of a transmission is reduced if more spatial streams are assigned to a beam. Therefore, nodes will be able to transmit more frequently, which is expected to improve the network performance. Note that this scheme only parallelizes the payload of A-MPDU over the spatial streams, but not the protocol overheads, such as control frames (e.g., RTS and B-ACK) and the PHY header.

     
  2. 2.

    Beam-greedy algorithm. It tries to maximize the number of parallel beams, taking into account that the maximum number is 4. This scheme tries to increase the number of nodes that can simultaneously receive A-MPDUs, which makes the transmission more efficient as the PHY headers are also transmitted in parallel. However, the channel will remain busy for a longer period because the duration of each transmission is longer, thus reducing the frequency that nodes can transmit new frames.

     
  3. 3.

    Stream-independent algorithm. It considers that each spatial stream is independent and responsible for transmitting an A-MPDU, regardless of whether A-MPDUs are destined to different nodes or to the same node. Therefore, N b≤min(M,min(n−1,4)) reduces to N b≤min(M,n−1). This ideal scheduler aims to further extend the advantages of the Beam-greedy algorithm by removing the limitation on the number of beams that can be simultaneously transmitted.

     

An example to obtain the solution for each algorithm is as follows. In a scenario where M=6 and n=8, the maximum value of Nb·Ns is 6 according to Equation 1. Three solutions are therefore obtained: solution 1, Nb=2, Ns=3; solution 2, Nb=3, Ns=2; and solution 3, Nb=6, Ns=1. Based on the characteristics of the scheduling algorithms, each one chooses a solution. In other words, the Stream-greedy chooses solution 1, the Beam-greedy takes solution 2, while the Stream-independent goes for solution 3.

4.2 Saturation throughput analysis

In order to simplify the analysis for the MU-Basic scheme, we assume that a slot is previously assigned to either the ECFB training part or the data transmission. Therefore, only collisions among data transmissions or collisions among NDPA frames are counted. γ is used to refer to the probability that one slot is allocated for ECFB, and 1−γ to refer to the probability that one slot is allocated for data transmissions.

Regardless of whether the MU-Basic scheme or the MU-RTS/CTS scheme is used, nodes will start a random back-off counter to compete for accessing the channel if it has been idle for AIFS. Then, each node decreases its random back-off counter by one if the channel is detected as free; otherwise, it freezes the counter. In the latter case, the frozen counter will be reused in the next channel access contention. That is to say, in between each decrement of the back-off counter, a node could observe the channel in either an empty state (no transmission activities) or a busy state (a successful transmission or collisions). Therefore, a slot time could be a constant value σ if the channel is empty, Ts if there is a successful transmission, or Tc if there are collisions.

Let the transmission probability of each node in a randomly chosen slot be τ. Then, the probability that the channel is empty, pe, is given in Equation 2, which is the probability that no node transmits in that slot.
p e = ( 1 τ ) n
(2)
The probability that a slot contains a successful transmission, ps, is based on the fact that there are n nodes and only one single node transmits.
p s = n 1 τ ( 1 τ ) n 1 = ( 1 τ ) n 1
(3)
Thus, the collision probability in a slot, pc, is obtained as follows:
p c = 1 p e p s .
(4)
The saturation throughput S, as shown in Equation 5, is expressed as the ratio of the frame payload successfully transmitted in a slot and the average duration of a slot, where γ is the probability that a slot is labeled as ECFB, Nf is the number of frames in each A-MPDU, and Nb is the number of parallel beams towards multiple nodes. L is the length of a data frame. Tdata,s and Tdata,c represent the duration of a successful data transmission and the duration of collisions between data transmissions (Tcsi,s and Tcsi,c have similar definition for ECFB frames). Note that Equation 5 can be transformed to Bianchi’s model if γ equals zero, which means that the ECFB protocol is disabled or the MU-RTS/CTS scheme is in operation.
S = ( 1 γ ) · p s · N f · N b · L γ · ( p s T csi,s + p c T csi,c ) + ( 1 γ ) · ( p s T data,s + p c T data,c ) + p e σ
(5)
τ, as given in Equation 6, is the sum of the probability that the back-off counter reaches zero, no matter which stage the back-off is in, where m is the maximum back-off stage.
τ = 2 ( 1 2 p ) ( 1 2 p ) ( CW min + 1 ) + p CW min ( 1 ( 2 p ) m )
(6)
p is the conditional collision probability for a node that transmits a frame, and in that slot, at least one of the n−1 nodes is also transmitting.
p = 1 ( 1 τ ) n 1
(7)
γ can be derived through a given T2-CSI-Req value as follows:
  1. 1.

    The total number of slots in T 2-CSI-Req is N slots = T 2-CSI-Req E [ T slot ] , where E[T slot] is the average slot duration (the denominator of Equation 5).

     
  2. 2.

    The average number of slots in the CSI mode during T 2-CSI-Req is γ·N slots·(p e+p c)+n, where n represents the number of successful ECFB transmissions, one for each node, observed in every T 2-CSI-Req interval.

     
  3. 3.
    Lastly, the probability of ECFB, i.e., the probability that the channel is in the CSI mode, is γ = γ · N slots · ( p e + p c ) + n N slots , which can be simplified to Equation 8. It shows that the probability of being in the CSI mode can be represented as the number of successful slots in the CSI mode divided by the total number of successful slots in T 2-CSI-Req.
    γ = n p s · N slots
    (8)
     
Equations 5, 6, 7, and 8 present a nonlinear system, which can be resolved using the iterative numerical technique as used in [10, 21]. If we replace a slot duration of Equation 5 with the corresponding item as shown in Equations 9 and 10, the saturation throughput S is valid for either the MU-Basic scheme or the MU-RTS/CTS scheme.
T data,c MU-Basic = T A-MPDU + SIFS + T B-ACK + AIFS + σ T csi,c MU-Basic = T NDPA + SIFS + T NDP + SIFS + T BF-Feedback + AIFS + σ T data,c MU-RTS/CTS = T RTS + SIFS + T MU-CTS + AIFS + σ
(9)
T data,s MU-Basic = T A-MPDU + N b · ( SIFS + T B-ACK ) + AIFS + σ T csi,s MU-Basic = T NDPA + T NDP + ( n 1 ) · T BF-Feedback + ( n 2 ) · T Poll + ( 2 n 2 ) · SIFS + AIFS + σ T data,s MU-RTS/CTS = T RTS + SIFS + N b · ( T MU-CTS + SIFS ) + T A-MPDU + SIFS + T B-ACK + AIFS + σ
(10)
The duration of each frame transmission can be calculated as shown in Equation 11, where TVHT(M)=(36+M·4) μ s are the duration of the IEEE 802.11ac PHY preamble (the number of VHT-LTF is proportional to the number of antenna M). Ns is the number of spatial streams in each beam. Lservice, Ltail, and Ldelimiter are the length of the service field, the tail field, and the MPDU delimiter. LMAC is a MAC header that will be added to the calculation if it is a data frame. NDBPS and Tsymbol are the number of data bits in a symbol and the symbol duration. LRTS, LMU-CTS, and LB-ACK are the length of RTS, MU-CTS, and B-ACK, respectively. The detailed calculation of the frame duration can be found in [8].
T A-MPDU = T VHT ( M ) + L service + N f · ( L MAC + L + L delimiter ) + L tail N s · N DBPS T symbol T RTS = T VHT ( M ) + L service + L RTS + L tail N DBPS T symbol T MU-CTS = T VHT ( M ) + L service + L MU-CTS + L tail N DBPS T symbol T B-ACK = T VHT ( M ) + L service + L B-ACK + L tail N DBPS T symbol
(11)

4.3 Performance results

The parameters considered for the performance evaluation of MU-Basic and MU-RTS/CTS are shown in Table 4. A simulator has been developed in C++ using the Component Oriented Simulation Toolkit library [22]. Results obtained by the simulations are compared with those of the analytical model.
Table 4

System parameters

Parameters

Values

Channel bandwidth

160 MHz

Modulation and coding scheme

256-QAM with 5/6

Guard interval

0.8 μ s

Frame length (L)

20,000 bits

MAC header (LMAC)

272 bits

MPDU delimiter (Ldelimiter)

32 bits

Service bits (Lservice)

16 bits

Tail bits (Ltail)

6 bits

RTS

160 bits

MU-CTS

112+(M·Ndsc·8) bits

B-ACK

192+Nf/8·8 bits

NDPA

152+n·16 bits

NDP

36+M·4 μ s

VHT compressed beamforming frame

40+(M·Ndsc·8) bits

Poll

168 bits

Slot time (σ)

9 μ s

SIFS and AIFS

16 and 34 μ s

CWmin and CWmax

16 and 1,024

Maximum back-off stage (m)

6

Figure 8 shows the system throughput against the interval between two CSI requests (T2-CSI-Req). The results clearly show that the system (MU-Basic) obtains a higher throughput if the CSI is less frequently updated. The throughput of the MU-RTS/CTS scheme is not affected by increasing T2-CSI-Req because the channel sounding process is integrated into the RTS and MU-CTS exchanges.
Figure 8

Throughput against T 2-CSI-Req . (a) n = 5. (b) n = 10.

Note that the results of analytical model and simulations for the MU-RTS/CTS scheme match very well, while there are some gaps for the MU-Basic scheme. It is because, in the MU-Basic scheme, we leave collisions between ECFB frames and data frames out of the analytical model to simplify the calculation; however, these collisions are counted in the simulation to resemble the real scenario. Therefore, the analytical results of MU-Basic are slightly more optimistic than those of simulations. It is also observed that the results (the analytical and simulations) of the Stream-greedy algorithm match better than the other two algorithms, which is because the channel sees a lower percentage of γ if the Stream-greedy algorithm is running (the more streams, the shorter data transmission duration and the more data slots in T2-CSI-Req), therefore reducing the impact of the assumption of the analytical model compared to the two other algorithms.

As shown in Figure 8, the system throughput of MU-Basic increases as the CSI updates less frequently (lower γ). In a slow-mobility scenario (e.g., the maximum Doppler shift is 12 Hz), the coherence time of a 5-GHz channel is in the range of 50 to 80 ms [23, 24]. Therefore, we set T2-CSI-Req to 80 ms in the following simulations.

Figure 9 shows the throughput against the number of nodes, where Nf=64, M=8, and T2-CSI-Req=80 ms. The results show that the Beam-greedy scheme outperforms the Stream-greedy, although the ideal Stream-independent scheme performs best. The throughput of all schemes decreases as the number of nodes increases. However, the decreasing rate of the MU-Basic scheme is higher than that of the MU-RTS/CTS. The reason is that collisions occur more frequently as the number of nodes increases; however, the collision time of the MU-RTS/CTS scheme is less than that of the MU-Basic scheme as RTS is much shorter than the data frame in length. The other hint from Figure 9 is that the size of the IEEE 802.11ac wireless mesh network could be heavily limited if the MU-Basic scheme is adopted due to the CSI overhead.
Figure 9

Throughput against n .

Figure 10 shows the throughput against M, where Nf=64, T2-CSI-Req=80 ms, and n=5 and 10. The throughput of the Stream-independent scheme always increases with M and outperforms the other schemes. It is because the Stream-independent scheme not only transmits data in parallel but also transmits overheads concurrently. The system throughput of Stream-greedy and Beam-greedy increases in the following ranges: M=2 to M=4, M=5 to M=6, and M=7 to M=8. This is due to the increase of Ns and Nb, which either decreases the transmission duration or increases the number of simultaneously transmitted A-MPDUs. The system throughput of Stream-greedy and Beam-greedy slightly decreases in the ranges of M=4 to M=5 and M=6 to M=7, which is because Ns and Nb do not increase there, while the CSI overhead increases proportionally to M.
Figure 10

Throughput against M . (a) n = 5. (b) n = 10.

Figure 11 shows the throughput against Nf, where M=8, T2-CSI-Req=80 ms, and n=5 and 10. It clearly shows that the system throughput increases as Nf becomes larger. At the points where Nf is large, the performance of the MU-RTS/CTS scheme exceeds that of the MU-Basic, which is because the RTS and MU-CTS exchanging process is more effective in case of collisions, given that the extra overheads of MU-RTS/CTS are compensated by the shorter collision duration.
Figure 11

Throughput against N f . (a) n = 5. (b) n = 10.

Figure 12 shows the throughput against the channel bandwidth, where M=8, T2-CSI-Req=80 ms, Nf=64, n=5 and 10. It shows that the system throughput increases if a wider channel bandwidth is used; however, the increase is not linear with the channel bandwidth. It is due to the increase of CSI overheads (i.e., the size of the CSI feedback increases with the channel bandwidth), as well as the constant PHY header duration (as described in Section 2.2). An effective way to compensate the growth of overheads is to increase Nf together with the bandwidth, which reveals that the system parameters have to be jointly considered to maximize the system performance.
Figure 12

Throughput against bandwidth. (a) n = 5. (b) n = 10.

5 Conclusions

In this paper, a simple but accurate analytical model is presented for IEEE 802.11ac wireless mesh backhaul networks in saturated conditions. The IEEE 802.11ac-defined basic access scheme and proposed MU-RTS/CTS scheme are evaluated and compared through three spatial stream allocation algorithms by analytical model and simulations. The results show that MU-RTS/CTS is more efficient than MU-Basic as the number of nodes and the size of A-MPDU increase. Regarding the spatial stream allocation algorithms, the Beam-greedy algorithm outperforms the Stream-greedy, but the ideal Stream-independent algorithm provides the best performance.

From the presented results, it is clear that the novel PHY and MAC features introduced by IEEE 802.11ac, such as the downlink MU-MIMO, the frame aggregation, and the channel bonding, are able to provide significant performance gains. However, the results also point out the importance of the spatial stream allocation algorithm and the high overheads introduced by the CSI acquisition procedure. The wireless mesh network may not work well in some scenarios where the number of nodes is high and CSI is updated frequently if MU-MIMO transmissions are considered.

Using this paper as a basis, there are several open research challenges that can be considered in the future work:
  1. 1.

    Scheduling scheme. An adaptive scheduling algorithm that is able to jointly consider several important parameters would play a significant role in improving the system performance. As hinted from the above results, these factors include the spatial stream/frame allocation, the number of nodes/antennas, the size of A-MPDU, the channel bandwidth, the queueing state, and the interference conditions. Besides, it also needs to take the following points into account: minimizing the frequency of channel sounding, maximizing the system throughput, and not being unfair to the active nodes.

     
  2. 2.

    Multi-packet reception (MPR). In this paper, we proposed an MU-RTS/CTS scheme that allows a node to simultaneously transmit frames to multiple nodes. However, MPR (i.e., simultaneous transmissions from multiple nodes to one node), which is able to reduce the collision probability and therefore improve the system performance, has not been considered. Normally, MPR requires synchronization among distributed nodes, which makes the MU-RTS/CTS handshaking process a better candidate than the MU-Basic to be extended to support MPR.

     
  3. 3.

    Non-saturated conditions. In non-saturated conditions, the ECFB channel sounding policy should be redesigned to reduce overheads. The easiest option is to make on-demand CSI request to some specified nodes only when the transmitter has frames directed to them, while a more complex option can be a node caching the obtained CSI for a predefined time and only requesting for the CSI updates if the node has frames to send and the cached CSI is outdated.

     
  4. 4.

    Multi-hop mesh networks. The hidden nodes have to be taken into account in a multi-hop wireless mesh network. In addition, the MAC and routing protocols need to be jointly considered due to the fact that there are multiple destinations in a single MU-MIMO transmission.

     

Declarations

Acknowledgements

The authors would like to thank the editors and the anonymous reviewers for their valuable feedbacks in improving the paper. This work was partially supported by the Spanish and the Catalan governments, through the projects CISNETS (TEC2012-32354) and AGAUR SGR2009-617, respectively.

Authors’ Affiliations

(1)
NeTS Research Group, Department of Information and Communication Technologies, Universitat Pompeu Fabra

References

  1. IEEE 802.11-2012: Wireless LAN Medium Access Control and Physical Layer Specifications. IEEE Standards. Piscataway: IEEE; 2012.Google Scholar
  2. Hiertz GR, Denteneer D, Stibor L, Zang Y, Costa XP, Walke B: The IEEE 802.11 universe. IEEE Commun. Mag 2010, 48: 62-70.View ArticleGoogle Scholar
  3. WG802.11-Wireless LAN Working Group: IEEE P802.11ac Draft 5.0: Enhancements for Very High Throughput for Operation in Bands Below 6 GHz. IEEE Ongoing Project. Piscataway: IEEE; 2013.Google Scholar
  4. IEEE 802.11n-2009: Amendment 5: Enhancements for Higher Throughput. IEEE Amendment. Piscataway: IEEE; 2009.Google Scholar
  5. Redieteab G, Cariou L, Christin P, Helard J-F: PHY+MAC channel sounding interval analysis for IEEE 802.11ac MU-MIMO. In 2012 International Symposium on Wireless Communication Systems. Piscataway: IEEE,; 2012:1054-1058.View ArticleGoogle Scholar
  6. Cha J, Jin H, Jung BC, Sung DK: Performance comparison of downlink user multiplexing schemes in IEEE 802.11ac: MU-MIMO vs. frame aggregation. In 2012 IEEE Wireless Communications and Networking Conference. Piscataway: IEEE; 2012:1514-1519.View ArticleGoogle Scholar
  7. Ong EH, Kneckt J, Alanen O, Chang Z, Huovinen T, Nihtila T: IEEE 802.11ac: enhancements for very high throughput WLANs. In 2011 IEEE International Symposium on Personal, Indoor and Mobile Radio Communications. Piscataway: IEEE; 2011:849-853.Google Scholar
  8. Bellalta B, Barcelo J, Staehle D, Vinel A, Oliver M: On the performance of packet aggregation in IEEE 802.11ac MU-MIMO WLANs. IEEE Commun. Lett 2012, 16: 1588-1591.View ArticleGoogle Scholar
  9. Nojima D, Lanante L, Nagao Y, Kurosaki M, Ochi H: Performance evaluation for multi-user MIMO IEEE 802.11ac wireless LAN system. In 2012 International Conference on Advanced Communication Technology. Piscataway: IEEE; 2012:804-808.Google Scholar
  10. Bianchi G: Performance analysis of the IEEE 802.11 distributed coordination function. IEEE J. Selected Areas Commun 2000, 18: 535-547.View ArticleGoogle Scholar
  11. Li H, Attar A, Leung VCM: Multi-user medium access control in wireless local area network. In 2010 IEEE Wireless Communications and Networking Conference. Piscataway: IEEE; 2010:1-6.Google Scholar
  12. Zhang Z, Yang Y, Zhao M: Enhancing downlink performance in wireless networks by simultaneous multiple packet transmission. IEEE Trans. Comput 2009, 58: 706-718.MathSciNetView ArticleGoogle Scholar
  13. Zheng PX, Zhang YJ, Liew SC: Multipacket reception in wireless local area networks. In 2006 IEEE International Conference on Communications. Piscataway: IEEE; 2006:3670-3675.View ArticleGoogle Scholar
  14. Zhang J, Lee HN: Throughput enhancement with a modified 802.11 MAC protocol with multi-user detection support. AEUE-Int J. Electron. Commun 2008, 62: 365-373. 10.1016/j.aeue.2007.05.007View ArticleGoogle Scholar
  15. de Vegt R: IEEE 802.11ac usage model document (2009),. . Accessed 25 June 201 https://mentor.ieee.org/802.11/dcn/09/11-09-0161-02-00ac-802-11ac-usage-model-document.ppt
  16. Cisco: 802.11ac: The Fifth Generation of Wi-Fi. Technical white paper. San Jose: Cisco; 2012.Google Scholar
  17. Ward L: 802.11ac Technology Introduction. Technical white paper. Munich: Rohde & Schwarz; 2012.Google Scholar
  18. Perahia E, Stacey R: Next Generation Wireless LANs: Throughput, Robustness, and Reliability in 802.11n. Cambridge: Cambridge University Press; 2008.View ArticleGoogle Scholar
  19. Liao R, Bellalta B, Cano C, Miquel M: DCF/DSDMA: enhanced DCF with SDMA downlink transmissions for WLANs. In 2011 Baltic Congress on Future Internet Communications. Piscataway: IEEE; 2011:96-102.View ArticleGoogle Scholar
  20. Liao R, Bellalta B, Miquel M: DCF/USDMA: enhanced DCF for uplink SDMA transmissions in WLANs. In 2012 International Wireless Communications and Mobile Computing Conference. Piscataway: IEEE; 2012:263-268.Google Scholar
  21. Kumar A, Altman E, Miorandi D, Goyal M: New insights from a fixed-point analysis of single cell IEEE 802.11 WLANs. IEEE/ACM Trans. Netw 2007, 15: 588-601.View ArticleGoogle Scholar
  22. Chen G, Szymanski BK: Component Oriented Simulation Toolkit (2004),. . Accessed 25 June 2013 http://www.ita.cs.rpi.edu/cost.html
  23. Hwang CS, Cioffi JM: Opportunistic CSMA/CA for achieving multi-user diversity in wireless LAN. IEEE Trans. Wireless Commun 2009, 8: 2972-2982.View ArticleGoogle Scholar
  24. Kivinen J, Zhao X, Vainikainen P: Empirical characterization of wideband indoor radio channel at 5.3 GHz. IEEE Trans. Antennas Propagation 2001, 49: 1192-1203.View ArticleGoogle Scholar

Copyright

© Liao et al.; licensee Springer. 2013

This article is published under license to BioMed Central Ltd. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.