 Research
 Open access
 Published:
NeighborsAware Proportional Fair scheduling for future wireless networks with mixed MAC protocols
EURASIP Journal on Wireless Communications and Networking volume 2017, Article number: 93 (2017)
Abstract
In this paper, we consider a beyond5G scenario, where two types of users, denoted as scheduled and uncoordinated nodes, coexist on the same set of radio resources for sending data to a base station. Scheduled nodes rely solely on a centralized scheduler within the base station for the assignment of resources, while uncoordinated nodes use an unslotted Carrier Sense Multiple Access (CSMA) protocol for channel access. We propose and evaluate through simulations: (a) a novel centralized resource scheduling algorithm, called NeighborsAware Proportional Fair (NPF) and (b) a novel packet length adaptation algorithm, called ChannelAware (CA) Packet Length Adaptation algorithm for the scheduled nodes. The NPF algorithm considers the uplink channel state conditions and the number of uncoordinated nodes neighboring each scheduled node in the aggregate scheduling metric, in order to maximize packet transmission success probability. The CA algorithm provides an additional degree of freedom for improving the performance, thanks to the fact that scheduled nodes with lower number of hidden terminals, i.e., having higher packet capture probability, are assigned longer packet transmission opportunities. We consider two benchmark schemes: Proportional Fair (PF) algorithm, as a resource scheduling algorithm, and a discrete uniform distribution (DUD) scheme for packet lengths distribution. Simulation results show that the proposed schemes can result in significant gain in terms of network goodput, without compromising fairness, with respect to two benchmark solutions taken from the literature.
1 Background
In future wireless systems, such as 5G and beyond, the current dominating humancentric communication systems will be complemented by a tremendous increase in the number of smart devices, i.e., things, equipped with radio devices, possibly sensors, and uniquely addressable [1]. This will result in explosion of wireless traffic volume [2] and consequently exponential growth in demand of radio spectrum. However, the radio spectrum resource will remain limited, and thus, efficient radio resource utilization techniques, such as advanced medium access control (MAC) schemes, will be of paramount importance.
Based on the above motivation, we envision a novel scenario, where some users (hereafter denoted as scheduled nodes), synchronized and coordinated by a base station (BS), coexist on the same set of radio resources with some other users (hereafter denoted as uncoordinated nodes), asynchronous with the BS and among them. As shown in Fig. 1, scheduled nodes could be user equipment (i.e., cellular users), while uncoordinated nodes could be things of the Internet of Things (IoT) paradigm, i.e., cars, machines, buildings [3].
In wireless networks, MAC protocols are classified into two main groups: contentionbased and contentionfree. Contentionbased protocols are distributed in nature and suffer from packet collisions. Nodes whose packets collide could perform a random backoff before attempting to access the channel again for retransmission of lost packets. Such protocols include ALOHA [4], slotted ALOHA [5], and Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) family of protocols [6]. On the other hand, contentionfree protocols are mainly coordinated in nature involving a centralized master entity which allocates orthogonal or nonorthogonal resources to network users, using some policies defined by the scheduling algorithm. Radio resources assigned to users can either be in time, frequency, space, code, or combination of more than one resource dimension. The conventional scheduling algorithms include RoundRobin (RR), Earliest Deadline First (EDF) [7], Maximum Throughput (MT), and Proportional Fair (PF) [8]. Each scheduling algorithm aims at maximizing/minimizing some network performance metrics such as fairness, sum throughput, power consumption, latency, etc., subject to some constraints.
In this paper, we consider the uplink scenario illustrated in Fig. 2, where scheduled nodes and uncoordinated nodes transmit to a common base station using different MAC protocols. Uncoordinated nodes use an unslotted CSMA/CA protocol, while scheduled nodes rely on a centralized scheduling algorithm running at the BS. The main goal of our paper is to address the problem of centralized resource scheduling algorithm for scheduled nodes sharing the same channel with the uncoordinated nodes. In order to allow coexistence between scheduled and uncoordinated nodes, we impose scheduled nodes to occupy only a fraction of the slots assigned by the base station, leaving portions of a frame available for possible access by uncoordinated nodes (see Section 3.1 for details). With this coexistence mechanism, collisions between the scheduled and the uncoordinated nodes may occur when uncoordinated node(s) (i) fail(s) to “hear” scheduled transmission in progress due to the hidden terminal problem and start concurrent transmissions and (ii) transmit(s) long packets that overlap the portion of slot assigned to scheduled nodes. In order to reduce these collisions, we propose and evaluate through simulations a novel scheduling algorithm, called NeighborAware Proportional Fair (NPF), which takes into account both channel state conditions and the number of uncoordinated nodes neighboring each scheduled node in the aggregate scheduling metric. To maximize packet delivery rate of the scheduled nodes, NPF prioritizes users with larger subsets of uncoordinated neighbors and good channel conditions. In fact, good uplink channel conditions result in higher packet capture probability, thanks to larger values of the signaltointerference ratio. Similarly, a large subset of neighbors for a given scheduled node results in high transmission success probability, because all the uncoordinated nodes in the subset can sense the scheduled transmissions in progress and refrain from accessing the channel.
Furthermore, we propose a novel ChannelAware (CA) Packet Length Adaptation algorithm for the scheduled nodes, which serves as an additional degree of freedom for improving network performance. The CA algorithm is based on the following observation: there exists a circular area centered at the BS and having radius equal to the half of the sensing range (see the gray area in Fig. 2), where the uncoordinated nodes can sense any scheduled transmission from the area and refrain from accessing the channel. This area is denoted hereafter as Hidden Neighbor Free (HNF), and nodes within it are assigned an opportunity to transmit longer packets, because they can experience lower interference. Therefore, CA algorithm logically partitions the scheduled nodes into two sets: those which suffer from the hidden terminal problem (i.e., nodes outside the HNF region), using a discrete uniform distribution (DUD) scheme for packets lengths and nodes not having hidden terminals (i.e., nodes in the HNF region) allowed to transmit longer packets.
This paper is an extension of our previous work reported in [9]. As main differences w.r.t. [9], we underline the following: (1) we propose here a novel packet length adaptation algorithm, i.e., CA algorithm not included in [9]; (2) we made some modifications to the resource scheduling algorithm, NPF; and (3) we consider here more different performance metrics, evaluating in details NPF with different packet length adaptation schemes, and different system parameters.
In summary, the contribution of the paper includes the following:

We study a new problem where scheduled nodes coexist on the same pool of radio resources with uncoordinated nodes.

We propose a novel centralized resource scheduling algorithm, called NPF, which takes into account the relative channel quality metric, and the relative neighborhood metric accounting for the presence of uncoordinated nodes in the cell.

We propose a novel packet length adaptation algorithm, called CA algorithm.
Performance of NPF and CA are evaluated via simulations and compared with benchmark solutions, based on Proportional Fair and discrete uniform distribution scheme for packets lengths. The impact of CSMA parameters (e.g., Clear Channel Assessment (CCA) threshold and backoff exponent (BE)) on the protocols, is also evaluated.
The rest of the paper is organized as follows: Section 2 discusses related literature, Section 3 describes the system model, Section 4 describes the benchmark and the proposed scheduling algorithms, Section 5 describes the packet length adaptation schemes, Section 6 reports numerical results and, finally, Section 7 provides the conclusion.
2 Related works
2.1 Coexistence of heterogeneous MAC schemes
In the past, a lot of research studies have been done on the coexistence of heterogeneous access schemes. However, this topic continues to attract increasing interests from the scientific and industrial communities because of its promising potential in IoT and beyond5G networks. Authors in [10] classify the coexistence schemes into two main classes: mediated and autonomous coexistence. In mediated class, there is a network entity which serves as mediator between the coexisting networks to facilitate fair coexistence and mitigate collisions. The mediator also helps to ensure tight synchronization and coordination of the involved networks. This type of coexistence is applicable when two or more timedivision multiplexing (TDM) systems share a common channel. On the other hand, autonomous coexistence does not need any coordination of the involved networks. In this class, we have TDM vs. CSMA and CSMA vs. CSMA networks. In our paper, we are concerned with TDM vs. CSMA coexistence.
The 3rd Generation Partnership Project (3GPP) proposes two main mechanisms for ensuring fair coexistence of LTE with WiFi and other technologies in the unlicensed spectrum: Listen Before Talk (LBT) and Carrier Sensing and Adaptive Transmission (CSAT) [11]. LBT is a random access scheme based on carrier sensing and backoff rules similar to WiFi. On the other hand, CSAT is a TDMbased scheduled scheme which is used by LTEU small cell when no clear channel is found after longterm carrier sensing. The scheme defines a time (duty) cycle where the BS transmits in a fraction of the cycle and remains silent in the remaining duration. Therefore, when CSAT is used, TDMbased nodes (LTE network) coexist with random accessbased nodes (WiFi or other technologies) on the same channel. The scope of these works is different from our work because (1) CSAT addresses coexistence in downlink LTEU small cell, while our work is focused on an uplink scenario which is more challenging due to effects of hidden terminal problem and especially when the network has to cope with high traffic demands and (2) our work focuses on the design of a scheduling algorithm for the scheduled nodes, while in 3GPP standards, details of scheduling algorithms are not provided because it is a vendorspecific problem [12]. Furthermore, the existing traditional scheduling algorithms for radio networks may not be appropriate to be applied directly in the scenario, since they were never designed with coexistence problem in mind.
Another approach widely studied in literature to address spectrum sharing and coexistence is the cognitive radio [13]. With cognitive radio network (CRN), nodes are classified into two categories: primary (licensed) users and secondary (cognitive) users. The secondary users opportunistically access underutilized spectrum licensed to incumbent systems [14]. Authors in [10] study the problem of heterogeneous coexistence between TDM and CSMA networks in TV White Space (TVWS) spectrum and address hidden terminal problem with a beacon transmission mechanism. Centralized scheduling in cognitive radio networks is studied in [15, 16]. Our work is different because in our scenario, neither the scheduled nor the uncoordinated nodes rely on cognitive radio principles to enhance coexistence.
The IEEE 802.15.4 MAC provides an option for a TDMA mode which operates without carrier sensing. Authors in [17] study the problem of coexistence between ZigBee with TDMA MAC and WiFi. The work proposes a new paradigm which relies on busy tone signals to enhance the mutual observability between ZigBee and WiFi in order to improve on coexistence. The TimeSlotted Channel Hopping (TSCH) protocol proposed in IEEE802.15.4e standard is expected to coexist with random access schemes used by other technologies in the unlicensed bands [18]. TSCHbased devices can mitigate interference and fading through channel hopping technique. Traffic Aware Scheduling algorithm for reliable lowpower multihop IEEE 802.15.4e networks is studied in [19]. The authors propose a new scheme based on graph theory method of matching and coloring. The probabilistic TDMA (PTDMA) [20] and ZMAC [21] protocols are hybrid access schemes which combine features of both TDMA and CSMA. They are designed with the flexibility to switch between CSMA and TDMA based on the state of contention in the network. According to these schemes, each node in the network is assigned a time slot to transmit but it could capture the channel on any other slot after performing CSMA procedure. Similarly, authors in [22] propose a hybrid MAC protocol for heterogeneous MachinetoMachine (M2M) networks which combine features of contentionbased and TDMA schemes. A spectrumaware clusterbased energyefficient routing hybrid scheme is discussed in [23]. In this scheme, the TDMA and CSMA operate on different channels.
In summary, to the best knowledge of the authors, the NPF is the first uplink centralised algorithm to address the problem of scheduling competing scheduled users accounting for the effects of the uncoordinated users in the aggregate scheduling metric.
2.2 Packet length adaptation
The literature on packet length adaptation schemes is extensive, especially in 802.11 WLANs [24, 25]. However, very few works exploit packet size adaptation in a heterogeneous coexistence of scheduled and uncoordinated users on the same channel to enhance the performance of one or both of the user groups involved. Furthermore, most of the existing works account only for channel errors which occur due to the timevarying SNR on links and neglect the effects of hidden terminals. In [26, 27], authors propose a lossbased packet length adaptation algorithm for IEEE.802.11 WLANs with hidden terminals operating in a timevarying wireless channel. The authors have shown that accounting for the effect of hidden terminals in the packet loss models can improve the throughput significantly. In [28], authors consider IEEE.802.11b WLAN under interference from IEEE 802.15.4 network. The authors demonstrate that packet length optimization can result in improved throughput in the presence of interference. Dynamic packet size optimization and channel selection for cognitive radio sensor networks is studied in [29]. Finally, [30] studies frame aggregation schemes in 802.11n WLAN with channel errors and proposes optimal frame size adaptation algorithm.
In our work, we propose a new packet length adaptation scheme, denoted as CA, for the scheduled nodes which takes advantage of the capture effect phenomenon to improve on goodput of the scheduled nodes. According to the operation of the algorithm, scheduled nodes within the HNF region are assigned the maximum possible packet size, while those outside the HNF region are assigned packet lengths according to discrete uniform distribution of packet sizes with a goal of maximizing goodput by minimizing collision losses. Therefore, with this scheme, in each slot, the fraction of time for exclusive transmission by uncoordinated nodes is affected and, in fact, it varies depending on which scheduled node is transmitting.
3 The system model
3.1 Reference scenario and radio resources
We consider an uplink scenario in a single square cell of side S, consisting of K scheduled nodes, M uncoordinated nodes, and a single BS placed in the center of the cell. All nodes are randomly and uniformly distributed within the cell as shown in Fig. 2.
Radio resources are in the form of time division multiple access (TDMA) slots (hereafter referred as slots). In particular, time is divided into frames, composed of T slots, each subdivided into t equally sized subslots (see Fig. 3). When a scheduled node is assigned a TDMA slot to transmit, its transmissions begin at the boundary of that slot and occupy the channel only for a fraction of the slot, leaving the remaining fraction for possible uncoordinated node transmissions. Therefore, with this paradigm, a scheduled node can only access the channel in the first part of the slot, while an uncoordinated node is not restricted and accesses the channel depending on the CSMA/CA protocol.
3.2 Traffic model
All nodes generate packets according to a Poisson arrival process with arrival rate λ [bytes/frame]. Regarding the packet length, uncoordinated nodes transmit equal length packets of L bytes, while scheduled nodes are allowed to transmit packet sizes determined according to the packet length adaptation schemes described in Section 5.
3.3 Channel and packet capture models
Let P _{T} and P _{R} denote the transmit and received powers, respectively, then P _{R} is given by:
where P _{L} is the pathloss between the transmitter and the receiver. If we let i be a network node connected to the base station, then i is affected by the pathloss, \(P_{\mathrm {L_{i}}}\), according to the following model
where k _{0} is the pathloss at 1 m given by \(20\log _{10}\frac {4\pi }{\lambda }\), where λ is the wavelength and k _{1}=10·η, being η the propagation pathloss exponent dependent on the environment, and d(i,BS) is the distance between user i and the base station. In linear scale, γ _{ i } is an exponentially distributed component with unit mean, accounting for Rayleigh fading effect on the link.
We assume that a packet is correctly received if the conditions given below are satisfied: 1) No physical layer (PHY) issues are present. For a given packet of interest, we first compute the packet error probability, p _{e}, due to PHY layer, assuming that no forward error correction is applied, which is given by
where l is the number of bits transmitted (i.e., l=L∗8) and BER is the bit error rate, which depends on the modulation scheme used. In our model, we adopt a Quadrature Phase Shift Keying (QPSK) modulation, and hence,
where erfc is the complementary error function and SNR is the signaltonoise ratio in linear units, given by
where P _{n} is the noise power. The PHY layer issues happens with probability p _{e}.
2) If no PHY layer issues are present, then we check if SIR≥α for the entire duration of packet transmission, where α is the protection ratio (also denoted as capture threshold) and SIR is the signaltointerference ratio metric.
Finally, we assume that an uncoordinated node i is a neighbor of a scheduled node j if i can “hear” transmissions of j, that is, P _{R}≥CCA_{thr}, where CCA_{thr} is the Clear Channel Assessment (CCA) threshold. Let \(\mathcal {N}_{j_{n}}=\{1,2,...,n_{j}\}\) denote the subset of all uncoordinated nodes neighboring j. The properties of \(\mathcal {N}_{j_{n}}\), i.e., cardinality of the subset and its elements change according to the coherence time of the channel because of Rayleigh fading effect on links. Therefore, \(\mathcal {N}_{j_{n}}\) has a minimum and a maximum cardinality of 0 and M, respectively.
3.4 The CSMA/CA protocol
It is out of scope of this paper to propose a new CSMA/CA protocol; therefore, we consider the protocol, whose flowchart is reported in Fig. 4. Before transmission, the contending nodes sense the channel to ascertain whether it is busy or idle: the channel is ascertained to be busy if the level of sensed power in the channel is above a certain CCA threshold, CCA_{thr}. At the beginning of the backoff process for a given node, the node selects randomly and uniformly a backoff delay time from the contention window as
where \(\mathcal {U}\) denotes uniform distribution and BE is the backoff exponent set to a fixed value (see Table 1). As in the case of many CSMA/CA protocols, we impose a maximum number of backoff stages, NB_{max}, after which the channel access attempt is considered to have failed. Finally, retransmissions of lost packets are not considered.
4 Scheduling algorithms
We first describe the benchmark protocol considered in this paper, that is Proportional Fair, and then we report our proposed solution.
4.1 Benchmark algorithm: Proportional Fair
Wireless networks are characterized by timevarying channel conditions, which are independent for different users. The Proportional Fair algorithm is designed to take advantage of multiuser diversity, while maintaining comparable longterm throughput for all users. Let R _{ j }(s) denote the instantaneous data rate that user j can achieve at time instant s and T _{ j }(s) be the average throughput for user j up to time slot s. The proportional fair scheduler selects the user, denoted as j ^{∗}, with the best relative channel quality according to the metric R _{ j }(s)/T _{ j }(s) for transmission. The average throughput T _{ j }(s) for all the users is updated as:
where 0≤β≤1 and 1/β is the averaging time window [31]. By changing, β the scheduler can trade off between the throughput of the system and temporal fairness among the users. In this paper, R _{ j } is computed according to the normalized Shannon capacity formula as log2(1+SNR).
4.2 Proposed algorithm: NeighborsAware Proportional Fair
We modify the PF algorithm encapsulating into the scheduling metric the number of uncoordinated nodes neighboring each scheduled node. At time instant s, our proposed algorithm NPF selects the user, denoted as j ^{∗}, with the largest aggregate scheduling metric given as:
where ρ≥0 is an optimization constant used by the scheduler to emphasize or deemphasize relative neighborhood metric Ω _{ j } during scheduling. For ρ=0, the algorithm turns to be the PF algorithm. For higher values of ρ, the term 1/Ω _{ j }(s) becomes predominant. For a given scheduled node j and with perfect knowledge of the number of its uncoordinated neighbors (n _{ j }(s)) at time instant s, Ω _{ j }(s) is given by:
where M is the total number of uncoordinated nodes deployed in the cell and b is an arbitrarily small positive constant.
5 Packet length distribution schemes
We first describe the benchmark packet length distribution considered in this paper, and then we report our proposed solution.
5.1 Benchmark scheme: discrete uniform distribution
The benchmark packet length selection algorithm is based on a discrete uniform distribution of packet lengths. In this scheme, a scheduled node selects a packet length, L, to transmit according to
where L _{min} and L _{max} are the minimum and maximum possible packet sizes in bytes supported, respectively. The difference between two consecutive packet sizes in the ordered set is a fixed constant Δ L which is set to L _{min} in the rest of this paper.
5.2 Proposed scheme: ChannelAware Packet Length Adaptation
In collisionprone CSMAbased wireless networks with hidden terminals, packet length adaptation schemes can play an important role in mitigating the effects of collisions. Losses of long packets due to collisions can result in significant waste of network radio spectrum and energy [32]. The probability of packet collisions and hence losses due to the presence of hidden terminals increases with packet size. This can be attributed to the fact that when the packet length increases, the set of hidden terminals for a given node has to remain silent for a longer time in order to avoid collisions. Similarly, as the number of hidden terminals increases, the chance of collision and losses increases due to the increased average number of transmissions from the set of hidden terminals. In such a condition, small packets transmission are favorable, but if not carefully optimized based on the wireless channel conditions, it can result in low network throughput and channel under utilization.
The CA algorithm is a packet length adaptation algorithm for the scheduled nodes which aims at achieving high throughput by assigning long packet transmission opportunities to those scheduled nodes within the HNF area (see Fig. 2). The HFN area is a circle, centered at the BS, and whose radius, R _{HNF}, is given by:
where \(\tilde {R}_{\mathrm {s}}\) is the approximated carrier sensing range in meters, computed by adding a fading margin, γ _{f}:
where k _{0} and k _{1} assume the same meaning as in Eq. (2).
A scheduled node j belongs to the HNF area if the SNR measured at the base station (SNR_{ j }) is greater than a given threshold (ξ), i.e.,
where ξ is the SNR threshold in dB given by:
and P _{n} is the noise power in dBm. Therefore, if the link quality of a given node j is high such that SNR_{ j }≥ξ, the node is considered to belong to the HNF area regardless of its physical location in the cell. Within the HNF area, almost all uncoordinated nodes in the region can sense any ongoing scheduled transmission within the region and refrain from accessing the channel. Moreover, the packet capture success probability of the scheduled nodes in the region is very high even in the presence of concurrent uncoordinated transmission(s) from outside the HNF area. The CA algorithm runs within the BS to determine appropriate packet lengths for the scheduled nodes: nodes in the HNF area are assigned maximum allowable packet length, L _{max}, while those outside the HNF area are assigned packet lengths randomly and uniformly distributed between L _{min} and L _{max}, according to the DUD algorithm.
6 Results and discussion
6.1 Simulator and parameters
A C++ simulator implementing the algorithms and the system model described above has been used. We simulate a square cell of length 1 km, a single BS placed at the center of the cell, and variable number of scheduled and uncoordinated nodes which are randomly and uniformly distributed in the cell. We assume that all nodes have omnidirectional antennas. We consider a single frequency channel partitioned into time frames with each frame consisting of 10 equal slots. Each slot is further subdivided into 200 equal subslots of 80 μ s duration. Within each subslot, only 10 B of traffic can be transmitted. The pathloss is computed as given by the pathloss model in Eq. (2) with k _{0} and k _{1} set to 40.7 dB and 30, respectively. For both types of nodes, the traffic arrival rate is set to 500 B per frame. Uncoordinated nodes always transmit packets of fixed length set to 50 subslots (i.e., 500 B), while scheduled nodes transmit either fixedlength or variablelength packets depending on whether the packet adaptation algorithm is used or not. The resource scheduling algorithm runs at the beginning of each new frame. Each scheduled node requesting for resources is assigned a maximum of one slot per frame. The parameters of the CSMA/CA protocol and other default parameters used in this simulation are summarized in Table 1. A single simulation consists of 1000 frames. Results are averaged over 10 different simulation scenarios, characterized by different nodes’ positions in the area.
6.2 Performance metrics

1.
Jain Index (JI), given as
$$ \mathrm{Jain\: Index} =\bigg(\sum_{j=1}^{K} x_{j}\bigg)^{2} / \bigg(K\sum_{j=1}^{K} x_{j}^{2}\bigg) $$(15)where x _{ j } is the average number of radio resource units, i.e., slots, allocated to user j within an interval of 1000 frames.

2.
Packet delivery rate (PDR) is given by:
$$ \text{PDR}=\mathrm{\frac{n{o}\: of\: successful\: packets}{no\: of\: transmitted\: packets}}*100 $$(16) 
3.
Blocking rate (BR): if we let U _{ A } be the number of unsuccessful channel access attempts and T _{ A } be the total number of channel access attempts, where a channel access attempt is unsuccessful if a node fails to capture the channel after reaching maximum allowable retries, then BR is then given by:
$$ \text{BR}=\frac{U_{A}}{T_{A}}*100 $$(17)BR estimates the level of inhibition in the access to the channel suffered by CSMAbased nodes.

4.
Network goodput (NG) is given by:
$$ \text{NG}=\frac{\mathrm{correctly\: received\: bits\: in} \: N\: \text{frames}}{\mathrm{time\: duration\: for}\: N\: \text{frames}} $$where at the numerator, we have the sum of the number of bits correctly received at the BS when transmitted by the K scheduled nodes (NG for scheduled nodes) or by the M uncoordinated nodes (NG for uncoordinated nodes).

5.
Channel Utilization Index (CUI) is given by:
$$ \text{CUI}=\frac{\mathrm{Aggregate \:Goodput}}{\mathrm{Bit\: Rate}} $$where aggregate goodput is the total network goodput (i.e., sum of the network goodput of scheduled nodes and uncoordinated nodes).
6.3 Results with fixedlength packets
In this subsection, we compare results obtained for the NPF algorithm and the benchmark algorithm, Proportional Fair, obtained by setting ρ=0 in the NPF algorithm. Packet length adaptation scheme is not applied; therefore, both the scheduled and the uncoordinated nodes transmit packets of fixed length.
Figure 5 shows the packet delivery rate for the scheduled nodes versus ρ for different number of uncoordinated nodes. From the figure, it is evident that NPF algorithm achieves up to 35% gain compared with PF algorithm in all cases. Furthermore, the PDR increases with ρ and decreases when increasing the number of uncoordinated nodes, M. The former trend is due to the fact that, for higher values of ρ, the scheduler selects the nodes with the largest value of 1/Ω _{ j } (i.e., having the largest number of neighbors, n _{ j }), which results in minimizing collision loss probability. The latter trend is attributed to the fact that packet collisions rise when increasing M.
Figure 6 shows the impact of packet length on packet delivery rate. The PDR of scheduled nodes increases by decreasing packet length because of lower collisions probability.
Figures 7 and 8 show the impact of CSMA parameters (BE and CCA threshold) on the scheduler. As can be seen, the performance of NPF compared to the PF algorithm improves with decreasing CCA_{thr}. For example, in the case of CCA_{thr} equal to −90 dBm, the gap between NPF and PF algorithms in terms of PDR can be up to 50%. Furthermore, as a general trend for all the cases, packet delivery rate of the scheduled nodes increases when decreasing CCA_{thr} and increasing BE because (a) decreasing CCA_{thr} results in lower average number of hidden neighbors per scheduled node and (b) increasing BE spreads the channel access time for the uncoordinated nodes in a larger time window, hence reduces losses.
6.4 Results with CA and DUD schemes
In this subsection, we provide results obtained when applying CA and DUD packet length adaptation schemes together with the NPF resource allocation algorithm.
Figure 9 shows the network goodput for scheduled and uncoordinated nodes when varying ρ, for different values of CCA_{thr}. This metric increases with ρ for scheduled nodes, demonstrating that the term 1/Ω _{ j }(s) in Eq. (8) strongly impacts the goodput. On the other hand, when increasing ρ, larger priority is given to scheduled nodes having more neighbors, resulting in having more uncoordinated nodes refrained from accessing the channel. Therefore, NG for uncoordinated nodes decreases with ρ. This is demonstrated also in Fig. 10, where the blocking rate for uncoordinated nodes is shown as a function of ρ: as expected, BR increases with ρ.
With reference to the comparison between CA and DUD packet length algorithms, in Fig. 9, we can see that CA always improves the goodput for scheduled nodes because of the effect of transmitting longer packets. On the other hand, CA worsens performance for uncoordinated nodes, since it gives more priority in the access to the channel (i.e., longer packets) to scheduled nodes. As shown in Fig. 10, in fact, the blocking rate for uncoordinated nodes increases when using CA.
Similar results/behaviors can be seen also in Fig. 11 showing the effects of using NPF and CA on the packet delivery rate: PDR for scheduled nodes increases with ρ, while it decreases for uncoordinated nodes. In the figure, we can also see that, as expected, the packet delivery rate of both scheduled and uncoordinated nodes decreases with increasing the number of uncoordinated nodes, due to larger collision rate.
Figure 9 also shows the notable improvement of the goodput that can be reached when using NPF w.r.t. to the case of PF (ρ=0), when CA is used; this improvement is much larger than the worsening obtained for uncoordinated nodes. This is demonstrated also in Fig. 12, where the overall channel utilization index as a function of ρ is shown. As can be seen, both the use of NPF and CA improve the channel utilization.
Regarding the impact of the CCA_{thr}, in Fig. 12, it is shown that the channel utilization increase by decreasing the CCA threshold, since scheduled nodes may “hear” more uncoordinated nodes. This results again in increasing the blocking rate for uncoordinated node, shown in Fig. 10.
We conclude by showing in Fig. 13 the Jain index for NPF with CA and DUD algorithms as a function of ρ, for different values of the CCA threshold. In all cases there exists an optimum value of ρ maximizing the Jain Index. In fact, when ρ is low, the scheduling metric is mainly affected by the first term of Eq. (8), while the term 1/Ω _{ j } only introduces an additional randomness into the scheduling algorithm, resulting in increasing fairness when ρ increases. When ρ becomes large, the impact of the second term in Eq. (8) is predominant and a further increasing of ρ results in lower Jain Index, since the NPF algorithm tends to unfairly treat nodes. NPF, in fact, gives more priority to scheduled nodes with a larger set of neighbors. Moreover, the optimal value of Jain Index shifts to the right with decreasing CCA_{thr}: when decreasing the CCA threshold, the sensing area of nodes increases, reducing border effects and resulting in larger fairness. Moreover, we can note that when ρ is lower than the optimum value, CA is slightly better than DUD, due to the randomness introduced by the CA algorithm on the NPF algorithm. While for large values of ρ, the trend reverses and NPF with DUD outperforms CA because CA introduces additional disparity in resource allocation.
Finally, note that by properly setting the value of ρ, NPF allows the improvement also of fairness w.r.t. the PF algorithm.
7 Conclusions
This paper presents a novel centralized scheduling algorithm for resource assignment for a scenario where scheduled nodes coexist on the same pool of radio resources with uncoordinated nodes. Through simulations, we have demonstrated that the NPF algorithm outperforms the benchmark algorithm, that is proportional fair, in terms of network goodput, packet delivery rate, and channel utilization, without compromising fairness. Moreover, we have proposed a ChannelAware Packet Length Adaptation algorithm, which allows to further improve the network goodput when compared to the discrete uniform distribution packet length selection scheme. Finally, we have shown the effect of different CSMA parameters, as the backoff exponent and the CCA threshold. Results show that the performance improvement of NPF algorithm in terms of Jain Index and channel utilization, compared to PF algorithm, increases with decreasing CCA_{thr}. In conclusion, by properly setting ρ, NPF with CA can achieve, with respect to PF with DUD, a gain of 800% in terms of network goodput for scheduled nodes, 133% in terms of channel utilization, and 50% in terms of Jain Index.
References
A Osseiran, F Boccardi, V Braun, K Kusume, P Marsch, M Maternia, O Queseth, M Schellmann, H Schotten, H Taoka, H Tullberg, MA Uusitalo, B Timus, M Fallgren, Scenarios for 5G mobile and wireless communications: the vision of the METIS project. IEEE Commun. Mag. 52(5), 26–35 (2014).
Cisco, Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update 20152020. White Paper (2016).
Q Wu, G Ding, Y Xu, S Feng, Z Du, J Wang, K Long, Cognitive internet of things: a new paradigm beyond connection. IEEE Internet Things J. 1(2), 129–143 (2014).
N Abramson, in Proceedings of the November 1719, 1970, Fall Joint Computer Conference, AFIPS ’70 (Fall). The aloha system: another alternative for computer communications (ACMNew York, 1970), pp. 281–285.
LG Roberts, Aloha packet system with and without slots and capture. SIGCOMM Comput. Commun. Rev. 5(2), 28–42 (1975).
Y Wang, JJ GarciaLunaAceves, in 10th IEEE International Conference on Network Protocols, 2002. Proceedings. Performance of collision avoidance protocols in singlechannel ad hoc networks (IEEEParis, 2002), pp. 68–77. 10921648.
Q Pang, A Bigloo, VCM Leung, C Scholefield, in WCNC. Service Scheduling for General Packet Radio Service Classes, (1999).
C Wengerter, J Ohlhorst, AGE von Elbwart, in 2005 IEEE 61st Vehicular Technology Conference, 3. Fairness and throughput analysis for generalized proportional fair frequency scheduling in OFDMA (IEEEStockholm, 2005), pp. 1903–1907.
CJ Katila, MD Abrignani, R Verdone, in International Conference on Cognitive Radio Oriented Wireless Networks, Grenoble, France, May 30  June 1, 2016, Proceedings. Neighboursaware proportional fair scheduler for future wireless networks (Springer International PublishingCham, 2016), pp. 142–153.
C Ghosh, S Roy, D Cavalcanti, Coexistence challenges for heterogeneous cognitive wireless networks in tv white spaces. IEEE Wirel. Commun. 18(4), 22–31 (2011).
C Cano, DJ Leith, in 2016 IEEE International Conference on Communications (ICC). Unlicensed LTE/WiFi coexistence: is LBT inherently fairer than CSAT? (2016), pp. 1–6.
C Cano, D LopezPerez, H Claussen, DJ Leith, Using LTE in unlicensed bands: potential benefits and coexistence issues. IEEE Commun. Mag. 54(12), 116–123 (2016).
J Mitola, GQ Maguire, Cognitive radio: making software radios more personal. IEEE Pers. Commun. 6(4), 13–18 (1999).
H Li, Z Han, in 2010 IEEE Wireless Communication and Networking Conference. Competitive spectrum access in cognitive radio networks: graphical game and learning (IEEESydney, 2010), pp. 1–6.
S Bayhan, F Alagoz, Scheduling in centralized cognitive radio networks for energy efficiency. IEEE Trans. Veh. Technol. 62(2), 582–595 (2013).
L Liu, X Jin, G Min, K Li, in 2012 IEEE 14th International Conference on High Performance Computing and Communication 2012 IEEE 9th International Conference on Embedded Software and Systems. A comprehensive analytical model of cognitive radio networks employing centralized scheduling mechanism (IEEELiverpool, 2012), pp. 1179–1184.
X Zhang, KG Shin, in Proceedings of the Twelfth ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc ’11. Enabling coexistence of heterogeneous wireless systems: case for ZigBee and WiFi (ACMNew York, 2011), pp. 6:1–6:11.
C Cano, DJ Leith, A GarciaSaavedra, P Serrano, Fair coexistence of scheduled and random access wireless networks: unlicensed LTE/WiFi.CoRR. abs/1605.00409 (2016). http://arxiv.org/abs/1605.00409.
MR Palattella, N Accettura, M Dohler, LA Grieco, G Boggia, in 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications  (PIMRC). Traffic aware scheduling algorithm for reliable lowpower multihop ieee 802.15.4e networks (IEEESydney, 2012), pp. 327–332.
A Ephremides, OA Mowafi, Analysis of a hybrid access scheme for buffered usersprobabilistic time division. IEEE Trans. Softw. Eng. SE8(1), 52–61 (1982).
I Rhee, A Warrier, M Aia, J Min, ML Sichitiu, ZMAC: a hybrid MAC for wireless sensor networks. IEEE/ACM Trans. Netw. 16(3), 511–524 (2008).
Y Liu, C Yuen, X Cao, NU Hassan, J Chen, Design of a scalable hybrid MAC protocol for heterogeneous M2M networks. IEEE Internet Things J. 1(1), 99–111 (2014).
GA Shah, OB Akan, in 2013 IEEE International Conference on Communications (ICC). Spectrumaware clusterbased routing for cognitive radio sensor networks (IEEEBudapest, 2013), pp. 2885–2889.
F Zheng, J Nelson, in 2008 IEEE International Conference on Communications. Adaptive design for the packet length of IEEE 802.11n networks (IEEEBeijing, 2008), pp. 2490–2495.
MC Vuran, IF Akyildiz, in INFOCOM 2008. The 27th Conference on Computer Communications. IEEE. Crosslayer packet size optimization for wireless terrestrial, underwater, and underground sensor networks (IEEEPhoenix, 2008).
MN Krishnan, S Pollin, A Zakhor, in GLOBECOM. Local estimation of probabilities of direct and staggered collisions in 802.11 WLANs (IEEEHonolulu, 2009).
W Song, MN Krishnan, A Zakhor, in Multimedia Signal Processing, 2009. MMSP ’09. IEEE International Workshop on. Adaptive packetization for errorprone transmission over 802.11 WLANs with hidden terminals (IEEERio De Janeiro, 2009), pp. 1–6.
DG Yoon, SY Shin, JH Park, HS Park, WH Kwon, Performance Analysis of IEEE 802.11b Under Multiple IEEE 802.15.4 Interferences (Springer Berlin Heidelberg, Berlin, 2007).
A Jamal, CK Tham, WC Wong, Dynamic packet size optimization and channel selection for cognitive radio sensor networks. IEEE Trans. Cognitive Commun. Netw. 1(4), 394–405 (2015).
Y Lin, VWS Wong, in IEEE Globecom 2006. Wsn011: frame aggregation and optimal frame size adaptation for IEEE 802.11n WLANs (IEEESan Francisco, 2006), pp. 1–6.
J Yang, Z Yifan, W Ying, Z Ping, in Global Telecommunications Conference, 2004. GLOBECOM ’04. IEEE. Average rate updating mechanism in proportional fair scheduler for HDR. volume 6 (IEEEDallas, 2004), pp. 3464–3466.
JI Choi, M Jain, MA Kazandjieva, P Levis, in Proceedings of the 18th IEEE International Conference on Network Protocols (ICNP). Granting Silence to Avoid Wireless Collisions (IEEEKyoto, 2010).
Funding
This work was funded by the Department of Electrical, Electronics and Information Engineering, University of Bologna in Italy.
Authors’ contributions
All authors contributed to the work. All authors read and approved the final manuscript.
Competing interests
The authors declare that they have no competing interests.
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
About this article
Cite this article
Katila, C., Buratti, C., Abrignani, M. et al. NeighborsAware Proportional Fair scheduling for future wireless networks with mixed MAC protocols. J Wireless Com Network 2017, 93 (2017). https://doi.org/10.1186/s1363801708756
Received:
Accepted:
Published:
DOI: https://doi.org/10.1186/s1363801708756