Skip to main content

ATRAS: adaptive MAC protocol for efficient and fair coexistence between radio over fiber-based and CSMA/CA-based WLANs

Abstract

In this paper, we propose a medium access control (MAC) protocol to allow a radio over fiber-based wireless local area network (RoF-based WLAN) to coexist with legacy carrier sense multiple access with collision avoidance (CSMA/CA)-based WLANs. In RoF-based WLANs, there are long propagation delays between access points (APs) and stations (STAs). When an RoF-based WLAN uses the conventional CSMA/CA protocol and coexists with legacy WLANs, the propagation delay causes unexpected frame collisions and unfairness between the RoF-based WLAN and legacy WLANs. The proposed protocol reduces unexpected frame collisions and improves fairness between the RoF-based WLAN and legacy WLANs in environments where they coexist. It is only necessary to apply the proposed protocol to the AP in the RoF-based WLAN (RoF AP); there is no need to modify STAs, which is an advantage of the protocol. In the proposed scheme, the RoF AP transmits frames during the transmission and reception of frames in the legacy WLAN, such that the frame transmitted by the AP arrives at a destination STA one short interframe space (SIFS) period after the channel became idle, and thus the RoF AP’s frames do not collide with other frames. As a result, the proposed method decreases the likelihood of frame collisions and increases the throughput of the RoF-based WLAN. In addition, the proposed method provides adaptive adjustment of the transmission probability, which enables the RoF-based WLAN and the legacy WLANs to fairly share wireless channels. The proposed protocol has been investigated for IEEE 802.11a/b/g WLANs. Numerical analysis and simulation evaluations show that the proposed scheme increases the TCP throughput of the RoF-based WLAN up to the same level as that in legacy WLANs.

1 Introduction

Wireless communication is becoming increasingly common, and many wireless standards are now available for wireless local area networks (WLANs). Accordingly, network operators must prepare dedicated wireless access points (APs) for each system, every time a new wireless standard emerges. Existing WLAN standards, such as IEEE 802.11b/g/a/n/ac, are utilized in the 2.4 and 5 GHz bands. Moreover, owing to increasing demand for more capacity, WLAN standards using the millimeter-wave (mmWave) band, such as IEEE 802.11ad and IEEE 802.11ay using 60 GHz, are actively being discussed for the provision of broadband wireless access [1]. In addition, the demand for Internet of Things (IoT) applications has drawn attention to sub-1 GHz wireless standards, such as IEEE 802.15.4 [2]. The upcoming IEEE 802.11ah standard has the potential to serve wide-area and low-cost wireless networks for IoT devices [3].

Access networks are required to support various communication standards with different physical (PHY) and medium access control (MAC) layer parameters by a single AP. Network function virtualization (NFV) is a promising method with which to economically realize such flexible wireless access networks [4].

One of the key enablers of NFV for wireless access networks is radio over fiber (RoF) technology. In wireless systems with RoF technology, only radio frequency (RF) units connected to a central office are located in remote areas and the central office operates the PHY signal processing and MAC functionality [59]. The RF units, which are connected to the central office via an optical fiber, convert the optical signals to electrical signals before transmitting them over the radio channel, and vice versa. Using RoF for wireless systems enables the centralization of the wireless signal processing functions that are currently performed by each AP. The benefit of this approach is that WLANs or wireless personal area networks (WPANs) are able to support any wireless standard by only changing the processing functions at the central office.

An RoF-based access architecture for integrating multiple wireless systems was discussed in [8, 9]. However, the integration of the conventional carrier sense multiple access with collision avoidance (CSMA/CA)-based wireless standard with an RoF-based architecture requires research because the long propagation delays in the optical fiber links may cause the CSMA/CA protocol to behave unexpectedly, resulting in a decrease in the system throughput. When designing a MAC protocol for RoF-based WLANs, it is important to take into account backward compatibility with IEEE 802.11 standard to cover existing devices. Moreover, it is also important to take into account how best to support coexistence with legacy CSMA/CA-based systems. WLANs are used widely and many APs are densely deployed. The dense environment is typical for apartment buildings and offices. Because of the limited number of orthogonal frequency channels in 2.4 and 5 GHz band, situations where the neighboring WLANs utilizing the same channel can occur. This paper focuses on a MAC layer solution for IEEE 802.11 WLANs that employ an RoF architecture (RoF-based WLAN) and addresses the coexistence problems between the RoF-based and legacy WLANs.

In WLANs that have an RoF-based architecture, delays longer than one half of a slot time cause unexpected frame collision patterns and increase the probability of frame collisions when the WLAN operates using a conventional MAC protocol. In order to solve the severe frame collision problems caused by large propagation delays, several alternative MAC protocols have been proposed [1012]. For example, Deronne et al. proposed a method for optimizing the slot time value so that unexpected collisions do not occur [10]. However, the use of large slot times increases the overhead, which decreases the system throughput. Moreover, if an RoF-based WLAN coexists with legacy WLANs, the RoF-based WLAN stations that use a large slot time are only able to transmit a few DATA frames because their slot time is much larger than that of the legacy WLAN stations. Other schemes described in [11, 12] improve the throughput of RoF-based WLANs by using the frame aggregation and BlockACK mechanisms. However, these schemes do not solve the frame collision problems caused by long propagation delay because frame aggregation does not reduce the number of frame collisions, not to mention that there are still open issues concerning the coexistence of RoF and legacy WLANs.

In this paper, we propose a new MAC protocol for an AP, called “advanced transmission for RoF-based WLAN system” scheme. The ATRAS scheme has been investigated for IEEE 802.11a/b/g WLANs. The ATRAS scheme solves the unfairness and TCP throughput degradation problems by increasing the number of transmission opportunities for an AP in RoF-based WLANs (RoF AP). Furthermore, the ATRAS scheme is able to control the throughput performance of an RoF-based WLAN by changing the transmission probability of the RoF AP. We also provide a mathematical throughput model of the coexistence environment, as well as an adaptive transmission probability control scheme for the RoF AP using the ATRAS scheme.

The contributions of this paper are as follows: (1) a design for an adaptive MAC protocol for RoF APs that enables fair and efficient coexistence without modification of the STAs and legacy WLANs; as far as we know, there is no MAC protocol suitable for the coexistence environment, (2) a mathematical throughput model of the proposed scheme and parameters determined based on the throughput model, and (3) numerical evaluations using the network simulator QualNet [13].

This paper is organized as follows. Section 2 introduces a system model of the coexistence environment and provides a problem statement. Section 3 describes related works. In Section 4, we describe how the proposed MAC protocol improves the throughput of an RoF-based WLAN, and then introduce a mathematical throughput model of the same. Section 5 shows the results of numerical evaluations performed by computer simulations, and our conclusions provided in Section 6.

2 RoF-based WLAN

2.1 System model

In this paper, we consider an environment where an RoF-based WLAN coexists with legacy WLANs, as shown in Fig. 1. The IEEE 802.11 standard is used for the WLANs and the WLANs are operated in the same frequency channel in the 2.4 or 5 GHz band.

Fig. 1
figure 1

Coexistence of RoF-based WLAN and legacy WLANs. Legacy APs and STAs, RoF STAs, and RF unit of RoF AP are deployed densely

The WLAN STAs associated with the legacy AP are denoted as legacy STAs, while the WLAN STAs associated with the RoF AP are denoted as RoF STAs. Furthermore, we define “local nodes” as the legacy APs, legacy STAs, and RoF STAs. All STAs operate according to the IEEE 802.11 standard MAC protocol [14].

The RoF AP in the RoF-based WLAN consists of an RF module in a premises of the customer and a processing unit located at a central office. The RF module is composed of an antenna, an amplifier, an analog-to-digital (AD)/digital-to-analog (DA) converter, and an interface circuit, and is connected to a centralized processing unit via an optical fiber. The processing unit handles the PHY and MAC functions for an AP. In this system, the frames transmitted by an STA are received by the RF module, and then amplified, down-converted, digitized, and converted into optical signals before being transmitted through the optical fiber to the processing unit located at the central office. We assume that distance between the RF module of the RoF AP and the other nodes is several meters to several hundred meters and the propagation delay of wireless signal is negligible.

It should be noted that there is a non-negligible propagation delay δ RoF between the processing unit and STAs due to the presence of the optical links. In Japan, most telephone subscribers are located within 5 km of a telecommunication office. In order to accommodate most customers, our simulation assumed a maximum fiber length of 10 km, which corresponds to a one-way propagation delay of 50 μs. This delay can be derived from the refractive index of single-mode optical fiber, i.e., 1.5 [15].

2.2 Delay-induced issues on CSMA/CA

In this section, we discuss some of the issues that impair the throughput of RoF-based WLANs and degrade the fairness between an RoF-based WLAN and legacy WLANs in environments where they coexist.

2.2.1 Increase in collision between frames transmitted by RoF AP and local nodes

In the RoF-based WLAN, frames transmitted by the RoF AP or STAs are received after δ RoF. The long propagation delay causes a large displacement in the carrier-sense timing at the receive side. This phenomenon causes the carrier-sense mechanism to underperform, causes unexpected collisions, and increases the probability of collisions.

In the RoF-based WLAN, frames transmitted in different slot times could collide while collisions between frames only occur if multiple nodes transmit in the same slot time in an ordinary WLAN with a small propagation delay. Figure 2 depicts a frame collision event between an RoF AP and local nodes. In the figure, a local node transmits an ACK frame, and after the ACK frame transmission, an RoF AP transmits a DATA frame based on a conventional distributed coordination function (DCF) in the kth slot time. The frames transmitted by the RoF AP in the kth slot time could collide with a frame transmitted by a local node in the kth and other slot times, the (k+1)th or (k+2)th slot time in the figure. In the (k+3)th slot time, local nodes can detect signal transmitted by the RoF AP, thus local nodes suspend their transmission. This phenomenon increases the frame collision probability.

Fig. 2
figure 2

Frame collision between RoF AP and local nodes

When TCP downlink traffic is the dominant type of traffic in the RoF-based and legacy WLANs, TCP-DATA frames transmitted by the RoF AP could suffer from the frame collisions. Accordingly, this severely degrades the TCP throughput performance of the RoF-based WLAN.

2.2.2 ACK frame collision

In a conventional DCF, acknowledge (ACK) frames never collide with other frames because the ACK frames are transmitted after the short interframe space (SIFS) period. However, the ACK frames may collide with other frames in the RoF-based WLAN owing to the long propagation delays.

Figure 3 illustrates a collision between an ACK frame from an RoF AP and a frame transmitted by a local node, where the RoF AP replies ACK frame to an RoF STA and a local node transmits a DATA frame before the ACK is received by the RoF STA, which collides with the ACK frame. Although local nodes wait for a network allocation vector (NAV) period indicated in the DATA frame transmitted by the RoF STA before transmitting their frames, long propagation delays cause the NAV period to expire and the local noses could transmit frames before the RoF STA receives the ACK frame from the RoF AP. The ACK collision increases the number of retransmission in the RoF-based WLAN and degrades the throughput performance of the RoF-based WLAN.

Fig. 3
figure 3

ACK frame collision. An ACK frame transmitted by an RoF AP collides with a DATA frame transmitted by a local node

3 Related works

3.1 Slot time adjustment scheme

One method to address this problem is to optimize the slot time value to account for the propagation delay. Deronne et al. proposed a method for optimizing the slot time value of RoF-based WLANs [10]. The original slot time value σ is defined in the IEEE 802.11 standard [14] as aCCATime+aRxTxTurnaroundTime+aAirPropagationTime+aMACProcessingDelay, where aCCATime is the time required to determine the state of the channel, aRxTxTurnaroundTime is the time required to change from receive to transmit, aAirPropagationTime is the roundtrip air propagation time, and aMACProcessingDelay is the time needed for computations in the MAC layer. In [10], the slot time value was adapted according to the following formula: Slottime=σ+2(δ RoF−4.5 μs). Adapting the slot time value decreases the number of unexpected frame collisions mentioned in Section 2.2.1 since the carrier-sense mechanism still functions normally.

However, extending the slot time increases the overhead duration in CSMA/CA, which leads to unfairness between an RoF-based WLAN and a legacy WLAN. For example, when the propagation delay is 50 μs, the slot time value must be greater than 100 μs, which is 11 times longer than the original slot time of 9 μs in the IEEE 802.11a standard [14]. Moreover, when an RoF-based WLAN uses an extended slot time value but a coexisting legacy WLAN employs the usual slot time, the nodes in the RoF-based WLAN are not able to transmit enough frames because their backoff period is much longer than that in the legacy WLAN, as shown in Fig. 4. This results in serious throughput degradation in the RoF-based WLAN.

Fig. 4
figure 4

Backoff time in slot time adjustment scheme. Backoff time of the RoF-based WLAN becomes much larger than that of the legacy WLAN

3.2 Piggy back access scheme

In our previous work [16], we presented a transmission scheme to increase the number of successful RoF AP frame transmissions by applying a piggy back access (PBA) scheme [17] to an RoF AP in an environment where only RoF-based WLANs exist. In that case, the RoF AP transmits a DATA frame after a SIFS period instead of after a DIFS period plus the backoff time when the RoF AP is transmitting an ACK frame to an STA. The RoF STA receives the DATA frame one SIFS period after the RoF STA received the ACK frame so that the RoF AP’s DATA frame does not collide.

This PBA scheme works well in a bidirectional traffic scenario where RoF STAs frequently transmit frames; however, since TCP downlink traffic is dominant in actual wireless Internet access [18], where STAs do not have full buffer traffic, the throughput performance of the PBA scheme may decrease in a real-world wireless Internet access environment.

3.3 NAV extension method

To solve the ACK frame collision problem in Section 2.2.2, we also proposed extending the NAV period by using the request-to-send (RTS)/ clear-to-send (CTS) procedure for an RoF-based WLAN [16], as illustrated in Fig. 5. When an RoF AP receives an RTS frame, the RoF AP replies with a CTS frame that includes the extended NAV duration. Specifically, the NAV duration value of the CTS frame transmitted by the RoF AP T exNAV is defined as T exNAV=T NAV,st+3δ RoF, where T NAV,st is the conventional NAV duration of a CTS frame defined in the IEEE 802.11a standard [14]. This method prevents ACK frame collisions and is backwards compatible.

Fig. 5
figure 5

NAV extension method in an RoF-based WLAN. A CTS frame transmitted by the RoF AP extends NAV at STAs

3.4 Collision avoidance using TDMA fashion

Collision free MAC protocols exploiting a TDMA fashion have been studied to solve collision problems in WLANs [1925]. In these protocol, there are periods to transmit frames in a TDMA fashion, where APs and STAs can transmit frames without collision. Allocating TDMA timeslots to RoF APs taking into account the large delay could avoid delay induced collisions. However, these approaches require major modifications to a MAC protocol of the STAs, which means that conventional devices can not be used in the WLANs using the protocol exploiting a TDMA fashion. Our protocol focuses on RoF-based WLAN with backward compatibility with IEEE 802.11 standard, where existing WLAN devices are available. Therefore, these approaches exploiting TDMA are not suitable for our target application.

4 Proposed scheme (ATRAS)

In this section, we describe the proposed ATRAS method and its application only to the RoF AP. In this method, we assume that the RoF STAs use the conventional DCF procedure except with respect to the values of an ACK timeout interval and a CTS timeout interval. To prevent frame transmission failure due to timeout, it is necessary to extend the ACK and CTS timeout intervals of the RoF STAs. The timeout interval T timeout should be set to the value obtained from T timeout=T st+2δ RoF, where T st is a conventional timeout interval used in IEEE 802.11. The values of the ACK and CTS timeout intervals can be changed by setting or updating driver software [26, 27].

In this section, we describe the transmission procedures of the RoF AP in the ATRAS scheme and the theoretical model of the total throughput for UDP bidirectional full buffer traffic. We also explain the adaptive control scheme employing the transmission probability α (0<α≤1), the initial value of which is derived from the theoretical throughput model.

4.1 Basic procedure of the ATRAS scheme

In order to solve the RoF AP frame collision problem shown in Fig. 2 in the environment where an RoF-based WLAN and legacy WLANs coexist, we propose the ATRAS scheme. The procedures in the ATRAS scheme are performed when the RoF AP overhears a CTS frame transmitted by a node in a legacy WLAN, or when the RoF AP overhears a DATA frame transmitted by a node in a legacy WLAN not using RTS/CTS. Figure 6 depicts the ATRAS scheme when a legacy WLAN uses RTS/CTS. The following sections explain and evaluate the proposed scheme for a case where legacy WLANs use RTS/CTS. The RoF AP receiving a CTS frame transmitted by a legacy STA sets a virtual channel busy period, the duration T b of which is defined as T b=T NAV−2δ RoF, where T NAV is the duration of the NAV period. The virtual channel busy period is introduced to avoid collision between frames transmitted by a local node and the RoF AP. If the RoF AP transmits a frame in the virtual channel busy period, the frame collides with a frame transmitted by a local node. The RoF AP transmits its DATA frame SIFS period after the virtual channel busy period with the probability α, which is introduced to control throughput of the RoF AP. DATA frames transmitted by the RoF AP using the ATRAS scheme are received by local nodes SIFS period after the channel actually becomes idle. Therefore, the frame collision mentioned in Section 2.2.1 does not occur.

Fig. 6
figure 6

Transmission procedure of ATRAS scheme when RTS/CTS is used in legacy WLANs. The frame transmission of the RoF AP is triggered by CTS frame transmitted by a legacy STA

The parameter α represents the frame transmission probability, and the WLAN operator at the central office can control the downlink throughput of the RoF-based WLAN by adjusting this probability so that the channel is fairly shared with the RoF-based WLAN and the legacy WLAN. Introducing transmission probability to control throughput is commonly used approach in WLANs [28]. With the probability α, the RoF AP transmits its DATA frame SIFS period after the virtual channel busy period when the RoF AP receives a CTS frame from a legacy AP or STA. With the probability (1−α), the RoF AP does not set a virtual channel busy period but waits for its NAV period T NAV. We will describe the method to adjust the probability in Section 4.3.

The number of transmission opportunities for the RoF AP using the ATRAS scheme depends on α and the traffic volume of the legacy WLANs. When the traffic of the legacy WLANs is low, the RoF AP is not able to obtain many transmission opportunities by the ATRAS scheme. Using backoff or/and piggyback access scheme with the ATRAS scheme could increase transmission opportunity of the RoF AP. For example, it is conceivable that the RoF AP could measure the traffic volume of the legacy WLANs by overhearing frames transmitted by them and determine a certain threshold value, and when the traffic volume exceeded the threshold value, the RoF AP would use the ATRAS scheme. However, such a protocol design of adaptive usage of multiple medium access schemes is out of focus of this paper and we would like to include it to our future work.

4.2 Theoretical throughput model

We now develop a total throughput model for legacy WLANs and an RoF-based WLAN with the proposed scheme when they coexist. For simplicity, we provide a theoretical model for UDP bidirectional full buffer traffic, and we determine the initial value of α in the presence of TCP traffic by using an approximated model based on UDP bidirectional full buffer traffic, the details of which are described in the next section. Our model is an extension of a well-known analytical model for conventional WLANs [29].

The theoretical system throughput was derived for a conventional WLAN in [29]:

$$\begin{array}{*{20}l} S=\ \frac{P_{\mathrm{s}}P_{\text{tr}}\mathrm{E}[P]}{(1-P_{\text{tr}})\sigma +P_{\text{tr}}P_{\mathrm{s}}T_{\mathrm{s}}+P_{\text{tr}}(1-P_{\mathrm{s}})T_{\mathrm{c}}}, \end{array} $$
(1)

where P s and P tr are the probability of successful transmission, and the probability of transmission, respectively, E[P] is the average packet payload size of the DATA frames, σ is the slot time size, and T s and T c are the average periods during which the channel is busy due to the successful transmission and collision of frames, respectively.

$$\begin{array}{*{20}l} T_{\mathrm{s}}=&\ T_{\text{RTS}}+\text{SIFS}+\delta+T_{\text{CTS}}+\text{SIFS}+\delta\\ &+ T_{\text{DATA}}+\text{SIFS}+\delta+T_{\text{ACK}}+\delta+\text{DIFS}, \end{array} $$
(2)
$$\begin{array}{*{20}l} T_{\mathrm{c}}=&\ T_{\text{RTS}}+\text{EIFS}, \end{array} $$
(3)

where T RTS, T CTS, T DATA, and T ACK are the required periods for transmitting an RTS frame, a CTS frame, a DATA frame, and an ACK frame, respectively, SIFS, DIFS, and EIFS are the SIFS period, the DIFS period, and the extended inter frame space (EIFS) period defined in [14], respectively, and δ is the one-way propagation delay in the WLAN.

Based on (1)–(3), we formulate the total system throughput S R+L in an environment in which an RoF-based WLAN using the ATRAS scheme coexists with a legacy WLAN, as follows:

$$\begin{array}{*{20}l} S^{\mathrm{R+L}}=\ \frac{P_{\mathrm{s}}P_{\text{tr}}(1+\alpha')\mathrm{E}[\!P]}{(1-P_{\text{tr}})\sigma +P_{\text{tr}}P_{\mathrm{s}}T^{\mathrm{R+L}}_{\mathrm{s}}+P_{\text{tr}}(1-P_{\mathrm{s}})T^{\mathrm{R+L}}_{\mathrm{c}}}, \end{array} $$
(4)
$$\begin{array}{*{20}l} T^{\mathrm{R+L}}_{\mathrm{s}}=&\ T_{\text{RTS}}+\text{SIFS}+T_{\text{delay}}+T_{\text{CTS}}+\text{SIFS}\\ &+ T_{\text{delay}}+T_{\text{DATA}}+\text{SIFS}+T_{\text{delay}}\\ &+ T_{\text{ACK}}+T_{\text{delay}}+\text{DIFS}+T_{\text{AP}}, \end{array} $$
(5)
$$\begin{array}{*{20}l} T_{\text{AP}}=&\ \alpha'(\mathit{SIFS}+T_{\text{DATA}}+\text{SIFS}+T_{\text{ACK}}), \end{array} $$
(6)
$$\begin{array}{*{20}l} T^{\mathrm{R+L}}_{\mathrm{c}}=&\ T_{\mathrm{c}}=T_{\text{RTS}}+\text{EIFS}. \end{array} $$
(7)

In contrast to the conventional model, the term α is added into (4), where α is the ratio between the number of additional frame transmissions that use the ATRAS scheme and the number of frame transmissions that use the backoff procedure, as follows:

$$\begin{array}{*{20}l} \alpha'=\ \frac{N^{\mathrm{L}}_{\mathrm{A}}+N^{\mathrm{L}}_{\mathrm{S}}}{N^{\mathrm{L}}_{\mathrm{A}}+N^{\mathrm{L}}_{\mathrm{S}}+N^{\mathrm{R}}_{\mathrm{S}}}\alpha, \end{array} $$
(8)

where \(N^{\mathrm {R}}_{\mathrm {S}}\), \(N^{\mathrm {L}}_{\mathrm {A}}\), and \(N^{\mathrm {L}}_{\mathrm {S}}\) are the numbers of RoF STAs, legacy APs, and legacy STAs, respectively. The RoF AP transmits a DATA frame only when it overhears that a CTS frame has been transmitted by a legacy AP or STA. Thus, the larger ratio of the legacy AP and STAs to the RoF STAs increases the throughput of the RoF AP. When the number of legacy nodes is small, α should be large to obtain large throughput in the RoF AP.

Moreover, in (5), T AP is the time required for the transmission from the RoF AP, as shown in Fig. 6, and T delay is the average propagation delay for frames transmitted in the RoF and legacy WLANs. T delay is calculated using the following equation:

$$\begin{array}{*{20}l} T_{\text{delay}}= \frac{(N^{\mathrm{R}}-1)}{N}\delta_{\text{RoF}}+\frac{N^{\mathrm{L}}}{N}\delta, \end{array} $$
(9)

where N is the total number of local nodes, N R is the total number of RoF APs and RoF STAs, and N L is the total number of legacy APs and STAs, i.e., \(N=N^{\mathrm {L}}_{\mathrm {A}}+N^{\mathrm {L}}_{\mathrm {S}}+N^{\mathrm {R}}_{\mathrm {S}}\), N R=NAR+NSR, where \(N^{\mathrm {R}}_{\mathrm {A}}\) is the number of RoF APs, and N L=NAL+NSL.

In the ATRAS scheme, the RoF AP does not transmit DATA or RTS frames using the backoff procedure but only transmits DATA frames using the ATRAS scheme. In addition, the frames transmitted by the RoF AP do not collide with other frames from local nodes. Therefore, the AP’s transmissions do not affect the procedures in the local nodes in the DCF, and P s and P tr can be obtained by using the method that was described in [29]. The total system throughput can be calculated using (4)–(9).

4.3 Adaptive transmission probability control

The throughput of an RoF AP can be controlled by adjusting the transmission probability α. We control α such that the throughput of the RoF-based WLAN and legacy WLAN converge to the same value in full buffer traffic conditions. In this section, we describe the decision procedure to determine α. In this procedure, the initial value of α is determined based on the analytical throughput model; however, the initial value deviates from the optimal value because of traffic fluctuations. Thus, the proposed procedure adaptively adjusts the value of α after the initial setup.

4.3.1 Objective of the adaptive control

The objective of the adaptive transmission probability control is that the throughput of an RoF-based WLAN and a legacy WLAN converge to the same amount. We therefore consider the following minimization problem:

$$\begin{array}{*{20}l} \begin{aligned} & \underset{\alpha}{\text{minimize}} \quad |S^{R}-S^{L}|\\ & \text{subject to} \quad 0\leq\alpha\leq1. \end{aligned} \end{array} $$
(10)

S R and S L are the throughput of the RoF-based WLAN and legacy WLAN, respectively. From (4), the throughput of an RoF AP \(S^{R}_{A}\) can be derived from the following equation:

$$\begin{array}{*{20}l} S^{\mathrm{R}}_{\mathrm{A}}=\ \frac{P_{\mathrm{s}}P_{\text{tr}}\alpha'\mathrm{E}[\!P]}{(1-P_{\text{tr}})\sigma +P_{\text{tr}}P_{\mathrm{s}}T^{\mathrm{R+L}}_{\mathrm{s}}+P_{\text{tr}}(1-P_{\mathrm{s}})T^{\mathrm{R+L}}_{\mathrm{c}}}. \end{array} $$
(11)

The total throughput of the local nodes can be calculated by subtracting \(S^{\mathrm {R}}_{\mathrm {A}}\) from the total system throughput S R+L. When the local nodes have the same number of transmission opportunities, the average throughput s i of local node i is shown in (12).

$$\begin{array}{*{20}l} s_{i}=\left(S^{\mathrm{R+L}}-S^{\mathrm{R}}_{\mathrm{A}}\right)/N. \end{array} $$
(12)

Therefore, the values of S R and S L can be derived from:

$$\begin{array}{*{20}l} S^{\mathrm{R}}&= S^{\mathrm{R}}_{\mathrm{A}}+\sum_{i \in N^{\mathrm{R}}_{\mathrm{S}}}s_{i}, \end{array} $$
(13)
$$\begin{array}{*{20}l} S^{\mathrm{L}}&= \sum_{i \in N^{\mathrm{L}}}s_{i}, \end{array} $$
(14)

where S R is a summation of the throughput of RoF AP derived from (11) and the throughput of RoF STAs, each of which is derived from (12), and S L is a summation of throughput of legacy AP and STAs, each of which is also derived from (12).

4.3.2 Initial value of α

Here, we attempt to find an initial value of α : α 0 based on (10) for the case of UDP and TCP traffic.

4.3.2.1 α 0 under UDP traffic:

To accomplish our objective of adaptive control based on (10), we need to determine α 0 by solving the following equation:

$$\begin{array}{*{20}l} |S^{\mathrm{R}}-S^{\mathrm{L}}|=0. \end{array} $$
(15)

If the above equation is satisfied, then the throughput of the RoF and legacy WLANs are identical. By solving (15) using (8) and (11)–(14), we obtain

$$\begin{array}{*{20}l} \alpha_{0}=\ \frac{N^{\mathrm{L}}_{\mathrm{A}}+N^{\mathrm{L}}_{\mathrm{S}}-N^{\mathrm{R}}_{\mathrm{S}}}{N^{\mathrm{L}}_{\mathrm{A}}+N^{\mathrm{L}}_{\mathrm{S}}}. \end{array} $$
(16)

Accordingly, α 0 is determined by the number of local nodes sending UDP traffic. Since 1≥α≥0, when \(N^{\mathrm {L}}_{\mathrm {A}}+N^{\mathrm {L}}_{\mathrm {S}} \leq N^{\mathrm {R}}_{\mathrm {S}}\), (15) cannot be satisfied. In the case, the number of RoF STAs should be limited or other fairness criteria should be selected, which is beyond the scope of this paper.

4.3.2.2 α 0 under TCP traffic:

Bruno et al. reported that TCP traffic results in very low contention in a WLAN because of the TCP flow control algorithm [30]. In the presence of persistent TCP upload and download connections, the average number of STAs that compete for transmission has an upper bound of less than two on average, regardless of the total number of STAs in a WLAN. Based on this result, we can assume that the number of STAs competing for transmission in the RoF-based WLAN is equal to that in the legacy WLAN, NSR= NSL. Thus, the estimated value of α satisfying (15), which should be used for initial value of α, is obtained from (16) as

$$\begin{array}{*{20}l} \alpha_{0}= \frac{N^{\mathrm{L}}_{\mathrm{A}}}{N^{\mathrm{L}}_{\mathrm{A}}+N^{\mathrm{L}}_{\mathrm{S}}}, \end{array} $$
(17)

which is a ratio of the number of legacy APs to the total number of nodes in the legacy WLANs. Since CSMA/CA allows each contending node to obtain the same amount of transmission opportunity and the ATRAS scheme is triggered by frames transmitted by legacy nodes, the RoF AP using the ATRAS scheme can obtain α C(NAL+NSL) transmission opportunity, where C is a transmission opportunity obtained by a node. Thus, when using α 0 obtained from (17), the RoF AP obtains \(C N^{\mathrm {L}}_{\mathrm {A}}\) transmission opportunity, which is equal to the total number of transmission opportunity obtained by legacy APs.

4.3.3 Adaptive control procedure by α

We now describe the adaptive control procedure and α. The term α t+1, which represents the value of α at time t+1(t≥1), can be derived as follows:

$$\begin{array}{*{20}l} \alpha_{t+1} &= \alpha_{t}-\Delta \alpha_{t}, \end{array} $$
(18)
$$\begin{array}{*{20}l} \Delta \alpha_{t} &= \frac{A}{1+\mathrm{e}^{-g(S^{\mathrm{R}}(t) -S^{\mathrm{L}}(t))}}-\frac{A}{2}, \end{array} $$
(19)

where Δ α t refers to a variation of α. (19) uses the sigmoid function [31]; S R(t) and S L(t) represent the estimated throughput of an RoF and legacy WLAN from t−1 to t, the units of S R(t) and S L(t) are bit/s, g indicates the gain of the sigmoid function, and A is a constant that determines the range of Δ α t , i.e., −A/2<Δ α t <A/2. The throughput of both WLANs can be estimated by the RoF AP, which overhears the frame headers and counts the frames transmitted in each WLAN. The RoF AP regularly updates the value of α using (18) and (19) based on the estimated throughput. The details of this procedure are given in Algorithm 1.

We now explain how to determine the value of g. When |S R(t)−S L(t)| is an infinitesimal value, then |Δ α t | should be 0. The wireless throughput may fluctuate for various reasons, and thus we do not want to change α in response to small throughput fluctuations. If we presume that the throughput fluctuations are less than 1 kbit/s, we set g to a value, such as 10−5 so that \(\mathrm {e}^{-g\cdot 10^{3}}\simeq 1\). In contrast, when |S R(t)−S L(t)| is large, |Δ α t | should be set to a large value in order to quickly approach the target value.

In this context, A determines the range of Δ α t (−A/2<Δ α t <A/2). The value of A should be selected so as to satisfy |A|<2 because 0<α<1. The optimal value of A depends on g, the number of nodes in the RoF and legacy WLAN, and the traffic offered to each node. In this paper, the optimal value of A was determined empirically based on the simulation results.

Since the RoF AP changes the transmission probability based on the measured throughput values, even when the number of users changes, it is possible to control the system such that the throughputs of the RoF WLAN and legacy WLAN are equal. In an asymmetric system configuration, such as an unequal number of users in the RoF WLAN and legacy WLAN, fairness is improved by changing the control target to the ratio of the number of users.

5 Performance evaluation

5.1 Simulation setup

We evaluated the performance of the ATRAS scheme using the network simulator QualNet [13], which is a reliable simulator used in many literature to evaluate wireless network performance. The simulation model consisted of an RoF-based WLAN and a legacy WLAN, and each had an AP with nine associated STAs, i.e., NAR=NAL=1 and NSR=NSL=9. These WLANs were operated based on the IEEE 802.11a standard and the PHY/MAC parameters shown in Table 1. We also assumed that there were no hidden nodes. We employed the TCP SACK algorithm using a delayed ACK and the Nagle Algorithm, and FTP was chosen as the application protocol. The maximum segment size was 146 bytes, and the sending/receiving buffer size was 64 Kbytes. The ACK/CTS timeout value T timeout was defined as T timeout=T st+2δ RoF. The maximum optical fiber length was simulated at 10 km, which corresponded to a δ RoF of 50 μs. The propagation delay between the local nodes δ was negligibly small, so δ was set to zero.

Table 1 PHY/MAC parameters

In the ATRAS scheme, the RoF STAs and legacy WLAN nodes transmitted frames using the RTS/CTS exchange protocol, and the RoF-based WLAN employed the NAV extension method mentioned in Section 3.3 to solve the ACK frame collision problem in 2.2.2. In the PBA scheme, the RoF AP transmitted the DATA frames using the PBA scheme instead of the ATRAS scheme. In the conventional scheme, the local nodes and RoF AP transmitted frames using the standard CSMA/CA protocol with the RTS/CTS exchange option, and the RoF-based WLAN employed the NAV extension method. In the slot time adjustment scheme, the RoF-based WLAN used an extended slot time and the legacy WLAN used the standard slot time defined in the IEEE 802.11a standard. The extended slot time was 2δ RoF+4μs.

5.2 Simulation and numerical results

We evaluated the performance of the MAC and transport layers. In the MAC layer performance evaluation, we considered UDP bidirectional full buffer traffic and confirmed that the theoretical throughput performance was in good agreement with the simulation results. We also compared the frame collision probability in the MAC layer performance evaluation. When evaluating the performance of the transport layer, we compared the performance of the ATRAS scheme with that of the conventional CSMA/CA scheme, slot time adjustment scheme, and the PBA scheme with TCP downlink traffic.

5.2.1 MAC-layer performance

Figure 7 shows the total system throughput of the RoF-based WLAN and legacy WLAN as a function of the propagation delay δ RoF with α=1. When α=1, the RoF AP transmits a frame every time the RoF AP overhears a CTS frame transmitted by a legacy AP or a legacy STA. The ATRAS scheme achieved a higher throughput than the conventional scheme. In the both schemes, the total throughput decreases as the propagation delay δ RoF increases since the required time to exchange frames in RoF-based WLAN increases. In addition to the throughput degradation, increase in frame collision degrades throughput in the conventional scheme, which is the reason why the throughput gain of the proposed scheme increases as δ RoF increases.

Fig. 7
figure 7

Total system throughput vs. δ RoF with UDP bidirectional full buffer traffic when α=1

Figure 8 shows the total system throughput as a function of transmission probability α, where δ RoF=50 μs. The ATRAS scheme can control the throughput of the RoF-based WLAN by adjusting α. Moreover, in both of the figures, the simulation results of the ATRAS scheme are in agreement with the theoretical values.

Fig. 8
figure 8

Total system throughput vs. α with UDP bidirectional full buffer traffic when δ RoF=50 μs

Figure 9 shows the collision probability of frames as a function of the propagation delay δ RoF when α=1 in the ATRAS scheme. Since the RoF WLAN with slot time adjustment scheme cannot transmit frames when δ RoF is longer than 26.7 μs due to long DIFS and backoff, the collision probability of the RoF WLAN with slot time adjustment is not shown in the figure. When the ATRAS scheme is used, the collision probability of the RoF WLAN does not increase as δ RoF increases, while the probabilities in the other schemes increase. The average collision probability of both WLANs also increases in the scheme other than the ATRAS scheme as δ RoF increases. This is because the frame collision due to delay mentioned in Section 2.2.1 occurs frequently when δ RoF is long. In the ATRAS scheme, the RoF AP can transmit frames without collision, which enables WLANs to maintain lower collision probability when δ RoF is long.

Fig. 9
figure 9

Collision probability of the RoF WLAN and legacy WLAN when α=1

5.2.2 Transport layer performance

In this scenario, we considered the TCP downlink traffic in both the RoF and legacy WLANs. First, we evaluated the convergence of α with the adaptive control scheme. We determined the gain of the sigmoid function g and the constant value A in (19). The update of α was performed every time the RoF AP received 100,000 TCP-DATA packets transmitted by the legacy AP and legacy STAs. As we discussed in 4.3.3, g was set to g=10−6 in the simulation.

Figure 10 shows the time dependence of α parameterized by A. The horizontal axis indicates a number of updates to α. In the cases where A=2 and A=0.5, the value of α fluctuated owing to the large value of A. On the other hand, if we set the value of A to be small, such as A=0.05, then α converged slowly. Based on these simulation results, we set A=0.1.

Fig. 10
figure 10

Time transition of α parameterized by A when δ RoF=50 μs

Next, we evaluated the convergence time of α with the adaptive control scheme in order to clarify the effectiveness of our initial value determination. As was mentioned above, we set g=10−6 and A=0.1 in (19). From (17), α 0 was set to 0.45 in this scenario. We compared the proposed scheme to a scheme where α 0=0.

Figure 11 shows the Jain’s fairness index [32], which is defined as

$$\begin{array}{*{20}l} F=\,\frac{\left(\sum_{i=1}^{n}\theta_{i}\right)^{2}}{n\sum_{i=1}^{n}\theta_{i}^{2}}, \end{array} $$
(20)
Fig. 11
figure 11

Fairness index of TCP downlink flow

where n is the total number of downlink flows in the RoF and legacy WLANs, and θ i is the TCP throughput of the ith connection. As shown in Fig. 11, the fairness index is close to one as a result of using the proposed adaptive control procedure. Moreover, it takes less time to achieve fairness by using the initial value α 0=0.45 derived from (17) as compared to the time required when α 0=0.

Next, we compared the throughput of the ATRAS scheme with that of the conventional CSMA/CA scheme, the slot time adjustment scheme, and the PBA scheme. Figures 12 and 13 show the system throughput of each WLAN and the fairness index based on the value of δ RoF. The ATRAS scheme was able to increase the throughput of the RoF-based WLAN and achieve fairness regardless of the δ RoF value. This is because the ATRAS scheme gives collision-free transmission opportunity to the RoF AP, and the adaptive transmission probability control adjusts α to increase the throughput of the RoF AP up to the same level as the legacy WLAN. Moreover, the total system throughput in the proposed scheme was higher than in the other schemes because the number of frame collisions caused by the propagation delay was reduced. Using the CSMA/CA scheme, the throughput of the RoF-based WLAN decreased and the fairness index also decreased as the δ RoF increased. When the RoF-based WLAN used the slot time adjustment scheme, the throughput of the RoF-based WLAN approached zero if δ RoF≥10 μs. This is because the nodes in the RoF-based WLAN have much longer backoff periods than those in the legacy WLAN, which means that they cannot transmit enough frames for the reasons described in Section 3.1. The use of the PBA scheme was able to improve the throughput of the RoF-based WLAN compared to the throughput in the conventional CSMA/CA scheme, because the RoF AP was able to transmit its frames using both the CSMA/CA and PBA schemes. The throughput of the RoF-based WLAN, however, decreased based on δ RoF as a consequence of the increase in frame collisions.

Fig. 12
figure 12

Total throughput of the RoF-based WLAN and legacy WLAN

Fig. 13
figure 13

Fairness Index when the RoF AP used each scheme

6 Conclusions

In this paper, we proposed the ATRAS scheme to reduce unexpected frame collisions and improve fairness between an RoF-based WLAN and legacy WLANs in a coexisting environment. The ATRAS scheme enables the RoF AP to transmit its frames in advance so that the frames do not collide with other frames, and the adaptive transmission probability control is able to achieve fairness between the RoF-based WLAN and legacy WLANs. Our simulation and numerical results demonstrated the performance of the proposed scheme, which are highlighted as follows: The proposed scheme increases MAC layer throughput by 12.7–24.6% and decreases frame collision probability compared to the conventional scheme. The proposed adaptive transmission probability control converges quickly within a few updates. The proposed scheme increases the TCP throughput of the RoF-based WLAN up to the same level as that in the legacy WLAN and achieves fairness regardless of propagation delay.

Our future work includes applying the proposed protocol to environments where IEEE 802.11n/ac is used for WLANs or where multiple RoF-based WLANs and legacy WLANs coexist and extending the proposed protocol to use multiple medium access schemes adaptively as mentioned in Section 4.1.

References

  1. SK Yong, C-C Chong, An overview of multigigabit wireless through millimeter wave technology: potentials and technical challenges. EURASIP J. Wirel. Commun. Netw.2007(1), 1–10 (2006).

    Google Scholar 

  2. JA Gutierrez, M Naeve, E Callaway, M Bourgeois, V Mitter, B Heile, IEEE 802.15. 4: a developing standard for low-power low-cost wireless personal area networks. IEEE Netw.15(5), 12–19 (2001).

    Article  Google Scholar 

  3. E Khorov, A Lyakhov, A Krotov, A Guschin, A survey on IEEE 802.11 ah: an enabling networking technology for smart cities. Comput. Commun.58:, 53–69 (2015).

    Article  Google Scholar 

  4. R Riggio, A Bradai, D Harutyunyan, T Rasheed, T Ahmed, Scheduling wireless virtual networks functions. IEEE Trans. Netw. Serv. Manag.13(2), 240–252 (2016).

    Article  Google Scholar 

  5. H Al-Raweshidy, S Komaki, Radio over fiber technologies for mobile communications networks (Artech House, London, 2002).

    Google Scholar 

  6. L Maksymiuk, M Kowalczyk, J Siuzdak, Multimode fiber passive optical network for IEEE 802.11 signal distribution. J. Opt. Commun. Netw.6(8), 743–753 (2014).

    Article  Google Scholar 

  7. D Novak, RB Waterhouse, A Nirmalathas, C Lim, PA Gamage, TR Clark, ML Dennis, JA Nanzer, Radio-over-fiber technologies for emerging wireless systems. IEEE J. Quantum Electron.52(1), 1–11 (2016).

    Article  Google Scholar 

  8. M Zhu, L Zhang, J Wang, L Cheng, C Liu, G-K Chang, Radio-over-fiber access architecture for integrated broadband wireless services. J. Light. Technol.31(23), 3614–3620 (2013).

    Article  Google Scholar 

  9. J Beas, G Castanón, I Aldaya, A Aragón-Zavala, G Campuzano, Millimeter-wave frequency radio over fiber systems: a survey. IEEE Commun. Surv. Tutor.15(4), 1593–1619 (2013).

    Article  Google Scholar 

  10. S Deronne, V Moeyaert, S Bette, in Proc. IEEE SCVT. Analysis of the MAC performances in 802.11g radio-over-fiber systems (Ghent, Belgium, 2011), pp. 1–5.

  11. S Deronne, V Moeyaert, S Bette, in Proc. ONDM. WiFi transmission in radio-over-fiber systems: performance of the IEEE 802.11n aggregation mechanism (Brest, France, 2013), pp. 167–172.

  12. S Zhang, D Franklin, in Proc. IEEE ICCC. Feasibility study on the implementation of IEEE 802.11 on cloud-based radio over fibre architecture (Sydney, Australia, 2014), pp. 2891–2896.

  13. QualNet. http://web.scalable-networks.com/qualnet-network-simulator-software. Accessed 7 July 2017.

  14. IEEE Std. IEEE Standard for Information technology–Telecommunications and information exchange between systems Local and metropolitan area networks–Specific requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, in IEEE Std 802.11-2016, pp.1–3534, doi:10.1109/IEEESTD.2016.7786995. http://ieeexplore.ieee.org/document/7786995/.

  15. GP Agrawal, Nonlinear fiber optics (Academic press, Massachusetts, 2007).

    MATH  Google Scholar 

  16. T Nishio, K Funabiki, M Morikura, K Yamamoto, D Murayama, K Nakahira, MAC protocol for improving throughput and balancing uplink/downlink throughput for wireless local area networks with long propagation delays. IEICE Trans. Commun.E100.B(5), 874–883 (2017).

    Article  Google Scholar 

  17. Z Zeng, Y Gao, K Tan, PR Kumar, in Proc. IEEE INFOCOM. CHAIN: introducing minimum controlled coordination into random access MAC (Shanghai, China, 2011), pp. 2669–2677.

  18. F Wamser, R Pries, D Staehle, K Heck, P Tran-Gia, Traffic characterization of a residential wireless internet access. Telecommun. Syst.48(1-2), 5–17 (2011).

    Article  Google Scholar 

  19. Q Wei, I Aad, L Scalia, J Widmer, P Hofmann, L Loyola, E-MAC: an elastic MAC layer for IEEE 802.11 networks. Wirel. Commun. Mob. Comput.13(4), 393–409 (2013).

    Article  Google Scholar 

  20. Y Khan, M Derakhshani, S Parsaeefard, T Le-Ngoc, in Proc. IEEE Globecom Workshops. Self-organizing TDMA MAC protocol for effective capacity improvement in IEEE 802.11 WLANs (California, 2015), pp. 1–6.

  21. G Jakllari, M Neufeld, R Ramanathan, in Proc. IEEE MASS. A framework for frameless tdma using slot chains (Nevada, 2012), pp. 56–64.

  22. P Djukic, P Mohapatra, Soft-TDMAC: a software-based 802.11 overlay TDMA MAC with microsecond synchronization. IEEE Trans. Mob. Comput.11(3), 478–491 (2012).

    Article  Google Scholar 

  23. M Tuysuz, HA Mantar, A beacon-based collision-free channel access scheme for IEEE 802.11 WLANs. Wirel. Pers. Commun.75(1), 155–177 (2014).

    Article  Google Scholar 

  24. MF Tuysuz, HA Mantar, Exploiting the channel using uninterrupted collision-free MAC adaptation over IEEE 802.11 WLANs. Wirel. Commun. Mob. Comput.15(5), 889–909 (2015).

    Article  Google Scholar 

  25. J Barcelo, B Bellalta, C Cano, M Oliver, in Proc. Eunice Open European Summer School. Learning-BEB: avoiding collisions in wlans (Brest, France, 2008), pp. 1–8.

  26. NetComm Wireless HS1200N. http://www.netcommwireless.com/sites/default/files/HS1200N-User-Manual.pdf. Accessed 7 July 2017.

  27. ath, 9k driver. https://wireless.wiki.kernel.org/en/users/drivers/ath9k. Accessed 7 July 2017.

  28. M Derakhshani, T Le-Ngoc, in Proc. IEEE Globecom. Adaptive access control of CSMA/CA in wireless lans for throughput improvement (Georgia, USA, 2013), pp. 2951–2955.

  29. G Bianchi, Performance analysis of the IEEE 802.11 distributed coordination function. IEEE J. Sel. Areas Commun.18(3), 535–547 (2000).

    Article  MathSciNet  Google Scholar 

  30. R Bruno, M Conti, E Gregori, in Proc. ACM MSWiM. Performance modelling and measurements of TCP transfer throughput in 802.11-based WLAN (Malaga, Spain, 2006), pp. 4–11.

  31. WA Little, The existence of persistent states in the brain (Science & Business Media, US, 1974).

    Book  MATH  Google Scholar 

  32. R Jain, D-M Chiu, WR Hawe, A quantitative measure of fairness and discrimination for resource allocation in shared computer system. DEC Research Report TR-301 (1984). https://jwcn-eurasipjournals.springeropen.com/articles/10.1186/s13638-015-0340-3.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kaito Funabiki.

Ethics declarations

Competing interests

The authors declare that they have no competing interests.

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License(http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Funabiki, K., Nishio, T., Morikura, M. et al. ATRAS: adaptive MAC protocol for efficient and fair coexistence between radio over fiber-based and CSMA/CA-based WLANs. J Wireless Com Network 2017, 129 (2017). https://doi.org/10.1186/s13638-017-0907-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1186/s13638-017-0907-2

Keywords