SlideShare a Scribd company logo
1 of 8
Alexander KrotovEvgeny Khorov Andrey Lyakhov
IEEE International Conference on Communications -Workshop on 5G & Beyond - EnablingTechnologies and Applications. London, UK, June, 2015
Swarm of sensor STAs
High collision rate
State-of-the-art wireless networks (e.g. Wi-Fi)
do not support swarms of sensors involved into
Internet of things interaction
Evgeny Khorov, Alexander Krotov, Andrey Lyakhov. Modelling MachineType Communication in IEEE 802.11ah Networks 2
802.11ah Restricted access window
Key Idea:
to divide STAs into small groups and spread their access
attempts over a long period of time
To support IoT scenarios, IEEE 802 is developing a novel
amendment to theWi-Fi standard: IEEE 802.11ah.
Among other modifications, it describes RAW, new channel
access method, which allows the AP to allocate some time
interval called RAW slot to a group of STAs.
Inside each RAW slot, the STAs use legacy EDCA channel
access
𝐶𝑊𝑖
i
15 31 63
127
511
255
1023
0 1 2 3 4 5 6 7
54 213
σ Data
ACK
SIFS
AIFS
Backoff
Empty slot
Successful slot
Select
backoff
[0, 𝐶𝑊0]
RAW start
Data
AckTimeout
Collision slot
Select new
backoff
[0, 𝐶𝑊𝑖]
Collision
EDCA
𝑁
𝑀
RAW
Scenario
Let the AP select a group of M sensor STAs and estimate that N of M STAs have data.
More precisely, let each of N STAs have one data frame at the beginning of the RAW slot.
What length of the RAW slot is enough?
Task
For a given duration of the RAW slot find the probability that:
A. Marked STA successfully transmits its frame;
B. All N STAs successfully transmit their frames.
How to choose values of RAW parameters?
General Problem
• No hidden stations
• Frames are not corrupted due to noise
• Lengths of all frames are equal
Stations are working
synchronously
Assumptions
𝑷𝒓 𝑻𝑿, 𝒕, 𝒓 =
1
CW0
, 𝑟 = 0, 𝑡 < 𝐶𝑊0
0, 𝑟 = 0, 𝑡 ≥ 𝐶𝑊0
1
CWr 𝑖=𝑡−𝑊𝑟
𝑡−1
𝑃𝑟(𝐶, 𝑖, 𝑟 − 1) r > 0
1
𝐶𝑊𝑟
…
𝐶𝑊𝑟
𝑟 > 0
1
𝐶𝑊0
…
𝐶𝑊0
𝑟 = 0
Probability of transmission in slot 𝒕 after 𝑟 retries:
𝑷𝒓 𝒕, 𝒓 =
1 −
𝑖=0
𝑡−1
Pr 𝑇𝑋, 𝑖, 𝑟 , 𝑟 = 0
𝑖=0
𝑡−1
Pr 𝐶, 𝑖, 𝑟 − 1 −
𝑖=0
𝑡−1
Pr 𝑇𝑋, 𝑖, 𝑟 , 𝑟 > 0
Attempt 𝑟 − 1 failed Attempt 𝑟 has not occurred
Probability of reaching slot 𝒕 with retry counter 𝒓:
For 𝑵 → ∞ each transmission attempt leads to a collision: 𝑷𝒓 𝑪, 𝒕, 𝒓 = 𝑷𝒓(𝑻𝑿, 𝒕, 𝒓)
Trick: Since 𝑷𝒓(𝑻𝑿|𝒕, 𝒓) almost does not depend on 𝑵, use 𝑷𝒓 𝑪, 𝒕, 𝒓 = 𝑷𝒓(𝑻𝑿, 𝒕, 𝒓) for any value of 𝑵
Evgeny Khorov, Alexander Krotov, Andrey Lyakhov. Modelling MachineType Communication in IEEE 802.11ah Networks 4
Let us number EDCA virtual slots inside RAW: t.
Probability of transmitting in slot 𝒕 if STA reached it with retry counter 𝒓: 𝐏𝐫 𝑻𝑿|𝒕, 𝒓 =
𝑷𝒓(𝑻𝑿, 𝒕, 𝒓)
𝑷𝒓(𝒕, 𝒓)
A. the marked STA successfully transmits its frame
Transition Processes
𝑡
𝑡 + 1
c s r
c+1
c+1
r+1
s+1
c s r
absorbing states
𝜋 𝑒
𝜋 𝑐
+
𝜋 𝑐
−
𝜋 𝑠
−𝜋 𝑠
+
Empty slot
Collision without marked STA
Collision with marked STA
Successful transmission
of another STA
Markov chain A Markov chain B
…
absorbing
states
c
s
c
s
c+1
s
c
s+1
c=1
N
𝜋 𝑒
𝜋 𝑐
𝜋 𝑠
c=0
N
…
𝜋 𝑒 𝑡, 𝑐, 𝑠 = (1 − 𝑝) 𝑁−𝑠
𝜋 𝑠 𝑡, 𝑐, 𝑠 = 𝑁 − 𝑠 𝑝(1 − 𝑝) 𝑁−𝑠−1
𝜋 𝑐 𝑡, 𝑐, 𝑠 = 1 − 𝜋 𝑒 − 𝜋 𝑠
𝜋 𝑒
− 𝑡, 𝑐, 𝑠, 𝑟 = 𝜋 𝑒
′ 𝑡, 𝑐, 𝑠 1 − Pr 𝑇𝑋 𝑡, 𝑟
𝜋 𝑠
− 𝑡, 𝑐, 𝑠, 𝑟 = 𝜋 𝑠
′(𝑡, 𝑐, 𝑠)(1 − Pr 𝑇𝑋 𝑡, 𝑟 )
𝜋 𝑐
− 𝑡, 𝑐, 𝑠, 𝑟 = 𝜋 𝑐
′ 𝑡, 𝑐, 𝑠 1 − Pr 𝑇𝑋 𝑡, 𝑟
𝜋 𝑠
+
𝑡, 𝑐, 𝑠, 𝑟 = Pr 𝑇𝑋 𝑡, 𝑟 𝜋 𝑒
′
𝑡, 𝑐, 𝑠
𝜋 𝑐
+ 𝑡, 𝑐, 𝑠, 𝑟 = Pr 𝑇𝑋 𝑡, 𝑟 (1 − 𝜋 𝑒
′ 𝑡, 𝑐, 𝑠
Let
𝜋 𝑒
′
= (1 − 𝑝) 𝑁−𝑠−1
𝜋 𝑠
′ = 𝑁 − 𝑠 − 1 𝑝(1 − 𝑝) 𝑁−𝑠−2
𝜋 𝑐
′
= 1 − 𝜋 𝑒
′
𝑡, 𝑐, 𝑠 − 𝜋 𝑠
′
(𝑡, 𝑐, 𝑠)
𝑝 = Pr 𝑇𝑋 𝑡, 𝑐, 𝑠 =
𝑟=0
𝑐
Pr 𝑇𝑋 𝑡, 𝑟 Pr(𝑡, 𝑐, 𝑠, 𝑟)
𝑟=0
𝑐
Pr(𝑡, 𝑐, 𝑠, 𝑟)
Transmission attempt probability for non-marked STA:
Evgeny Khorov, Alexander Krotov, Andrey Lyakhov. Modelling MachineType Communication in IEEE 802.11ah Networks
Tasks: For :a given RAW slot duration find the probability that
B. all N STAs successfully transmit their frames
+: marked STA transmits
-: marked STA does not transmit
𝑐: number of collisions
𝑠: number of successful slots
𝑟: retry counter
𝑡
𝑡 + 1
6
PDF
CDF
Evgeny Khorov, Alexander Krotov, Andrey Lyakhov. Modelling MachineType Communication in IEEE 802.11ah Networks 6
Numerical Results
Probability that the marked STA successfully transmits its frame Probability that all N STAs successfully transmit their frames.
By the beginning of the RAW slot
each of 1000 STAs has
a packet with probability 0.3
Evgeny Khorov, Alexander Krotov, Andrey Lyakhov. Modelling MachineType Communication in IEEE 802.11ah Networks 7
For N stations
Solution:
Split stations into several groups
Splitting into 50 groups minimizes channel time
in this scenario
Slot duration ~20 ms
Required RAW slot duration
Required delivery probability: 0.9
For N=Bin(M=1000, p=0.3) stations
More than 1 second
(exceeds protocol limit)
This paper
An example of usage of this model
The model can be also applied to study and manage many new mechanisms developed in .11ah and described in
8

More Related Content

What's hot

Tpr star tree
Tpr star treeTpr star tree
Tpr star tree
Win Yu
 

What's hot (13)

18103010 algorithm complexity (iterative)
18103010 algorithm complexity (iterative)18103010 algorithm complexity (iterative)
18103010 algorithm complexity (iterative)
 
(Kpi summer school 2015) theano tutorial part2
(Kpi summer school 2015) theano tutorial part2(Kpi summer school 2015) theano tutorial part2
(Kpi summer school 2015) theano tutorial part2
 
A Simple Communication System Design Lab #4 with MATLAB Simulink
A Simple Communication System Design Lab #4 with MATLAB SimulinkA Simple Communication System Design Lab #4 with MATLAB Simulink
A Simple Communication System Design Lab #4 with MATLAB Simulink
 
A Simple Communication System Design Lab #1 with MATLAB Simulink
A Simple Communication System Design Lab #1 with MATLAB Simulink A Simple Communication System Design Lab #1 with MATLAB Simulink
A Simple Communication System Design Lab #1 with MATLAB Simulink
 
MODELS 2019: Querying and annotating model histories with time-aware patterns
MODELS 2019: Querying and annotating model histories with time-aware patternsMODELS 2019: Querying and annotating model histories with time-aware patterns
MODELS 2019: Querying and annotating model histories with time-aware patterns
 
"Speech recognition" - Hidden Markov Models @ Papers We Love Bucharest
"Speech recognition" - Hidden Markov Models @ Papers We Love Bucharest"Speech recognition" - Hidden Markov Models @ Papers We Love Bucharest
"Speech recognition" - Hidden Markov Models @ Papers We Love Bucharest
 
A Simple Communication System Design Lab #2 with MATLAB Simulink
A Simple Communication System Design Lab #2 with MATLAB SimulinkA Simple Communication System Design Lab #2 with MATLAB Simulink
A Simple Communication System Design Lab #2 with MATLAB Simulink
 
Algorithm Complexity & Big-O Analysis
Algorithm Complexity & Big-O AnalysisAlgorithm Complexity & Big-O Analysis
Algorithm Complexity & Big-O Analysis
 
Concurrency and Python - PyCon MY 2015
Concurrency and Python - PyCon MY 2015Concurrency and Python - PyCon MY 2015
Concurrency and Python - PyCon MY 2015
 
Nicpaper2009
Nicpaper2009Nicpaper2009
Nicpaper2009
 
Tpr star tree
Tpr star treeTpr star tree
Tpr star tree
 
M Tech New Syllabus(2012)
M Tech New Syllabus(2012)M Tech New Syllabus(2012)
M Tech New Syllabus(2012)
 
A Simple Communication System Design Lab #3 with MATLAB Simulink
A Simple Communication System Design Lab #3 with MATLAB SimulinkA Simple Communication System Design Lab #3 with MATLAB Simulink
A Simple Communication System Design Lab #3 with MATLAB Simulink
 

Viewers also liked

Viewers also liked (19)

LTE Advanced Pro and M2M software development capabilities
LTE Advanced Pro and M2M software development capabilitiesLTE Advanced Pro and M2M software development capabilities
LTE Advanced Pro and M2M software development capabilities
 
M2M One & M2M Connectivity - Developing a Cellular IoT or M2M Solution in Aus...
M2M One & M2M Connectivity - Developing a Cellular IoT or M2M Solution in Aus...M2M One & M2M Connectivity - Developing a Cellular IoT or M2M Solution in Aus...
M2M One & M2M Connectivity - Developing a Cellular IoT or M2M Solution in Aus...
 
IoT Seminar (Jan. 2016) - (9) kenneth lowe - fast track your lwm2m developmen...
IoT Seminar (Jan. 2016) - (9) kenneth lowe - fast track your lwm2m developmen...IoT Seminar (Jan. 2016) - (9) kenneth lowe - fast track your lwm2m developmen...
IoT Seminar (Jan. 2016) - (9) kenneth lowe - fast track your lwm2m developmen...
 
Haystack Integration of NFC and DASH7
Haystack Integration of NFC and DASH7Haystack Integration of NFC and DASH7
Haystack Integration of NFC and DASH7
 
4G LTE Device Management for Accelerated Wireless Broadband
 4G LTE Device Management for Accelerated Wireless Broadband 4G LTE Device Management for Accelerated Wireless Broadband
4G LTE Device Management for Accelerated Wireless Broadband
 
IoT Seminar (Jan. 2016) - (4) friedhelm rodermund - lwm2m and lpwa
IoT Seminar (Jan. 2016) - (4) friedhelm rodermund - lwm2m and lpwaIoT Seminar (Jan. 2016) - (4) friedhelm rodermund - lwm2m and lpwa
IoT Seminar (Jan. 2016) - (4) friedhelm rodermund - lwm2m and lpwa
 
Supelec M2M IoT course 1 - introduction - Part 1/2 - 2012
Supelec  M2M IoT course 1 - introduction - Part 1/2 - 2012Supelec  M2M IoT course 1 - introduction - Part 1/2 - 2012
Supelec M2M IoT course 1 - introduction - Part 1/2 - 2012
 
An Overview of LoRA, Sigfox, and IEEE 802.11ah
An Overview of LoRA, Sigfox, and IEEE 802.11ahAn Overview of LoRA, Sigfox, and IEEE 802.11ah
An Overview of LoRA, Sigfox, and IEEE 802.11ah
 
M2M communications
M2M communicationsM2M communications
M2M communications
 
IoT in LTE
IoT in LTEIoT in LTE
IoT in LTE
 
Diversifying cellular for massive IoT
Diversifying cellular for massive IoTDiversifying cellular for massive IoT
Diversifying cellular for massive IoT
 
Bringing Better Networking to LTE IoT
Bringing Better Networking to LTE IoTBringing Better Networking to LTE IoT
Bringing Better Networking to LTE IoT
 
IoT Standards_ALICON_SE_2017_02_25_Rev_D
IoT Standards_ALICON_SE_2017_02_25_Rev_DIoT Standards_ALICON_SE_2017_02_25_Rev_D
IoT Standards_ALICON_SE_2017_02_25_Rev_D
 
Paving the path to Narrowband 5G with LTE IoT
Paving the path to Narrowband 5G with LTE IoTPaving the path to Narrowband 5G with LTE IoT
Paving the path to Narrowband 5G with LTE IoT
 
LoRa and NB-IoT
LoRa and NB-IoT LoRa and NB-IoT
LoRa and NB-IoT
 
Iot launch
Iot launchIot launch
Iot launch
 
An introduction to M2M / IoT technologies
An introduction to M2M / IoT technologiesAn introduction to M2M / IoT technologies
An introduction to M2M / IoT technologies
 
Ericsson m2 m_iot_networked society_final
Ericsson m2 m_iot_networked society_finalEricsson m2 m_iot_networked society_final
Ericsson m2 m_iot_networked society_final
 
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gInternet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
 

Similar to Modelling Machine Type Communication in IEEE 802.11ah Networks

Machine Learning and Stochastic Geometry: Statistical Frameworks Against Unce...
Machine Learning and Stochastic Geometry: Statistical Frameworks Against Unce...Machine Learning and Stochastic Geometry: Statistical Frameworks Against Unce...
Machine Learning and Stochastic Geometry: Statistical Frameworks Against Unce...
Koji Yamamoto
 

Similar to Modelling Machine Type Communication in IEEE 802.11ah Networks (20)

Alternative cryptocurrencies
Alternative cryptocurrencies Alternative cryptocurrencies
Alternative cryptocurrencies
 
Alternative cryptocurrencies
Alternative cryptocurrenciesAlternative cryptocurrencies
Alternative cryptocurrencies
 
SCOR: Constraint Programming-based Northbound Interface for SDN
SCOR: Constraint Programming-based Northbound Interface for SDNSCOR: Constraint Programming-based Northbound Interface for SDN
SCOR: Constraint Programming-based Northbound Interface for SDN
 
Massive MIMO for Cooperative Network Application
Massive MIMO for Cooperative Network ApplicationMassive MIMO for Cooperative Network Application
Massive MIMO for Cooperative Network Application
 
Brief Introduction About Topological Interference Management (TIM)
Brief Introduction About Topological Interference Management (TIM)Brief Introduction About Topological Interference Management (TIM)
Brief Introduction About Topological Interference Management (TIM)
 
Side Channel Attacks on AES
Side Channel Attacks on AESSide Channel Attacks on AES
Side Channel Attacks on AES
 
How do you configure your LTE-U eNodeB to fairly coexist with Wi-Fi?
How do you configure your LTE-U eNodeB to fairly coexist with Wi-Fi?How do you configure your LTE-U eNodeB to fairly coexist with Wi-Fi?
How do you configure your LTE-U eNodeB to fairly coexist with Wi-Fi?
 
Cycle’s topological optimizations and the iterative decoding problem on gener...
Cycle’s topological optimizations and the iterative decoding problem on gener...Cycle’s topological optimizations and the iterative decoding problem on gener...
Cycle’s topological optimizations and the iterative decoding problem on gener...
 
Nural network ER.Abhishek k. upadhyay
Nural network  ER.Abhishek k. upadhyayNural network  ER.Abhishek k. upadhyay
Nural network ER.Abhishek k. upadhyay
 
Deep learning study 2
Deep learning study 2Deep learning study 2
Deep learning study 2
 
Lecture set 4
Lecture set 4Lecture set 4
Lecture set 4
 
Minimizing Hidden Node Problem in Vehicular Ad-hoc Network (VANET)
Minimizing Hidden Node Problem in Vehicular Ad-hoc Network (VANET)Minimizing Hidden Node Problem in Vehicular Ad-hoc Network (VANET)
Minimizing Hidden Node Problem in Vehicular Ad-hoc Network (VANET)
 
Path recommender rec tour
Path recommender   rec tourPath recommender   rec tour
Path recommender rec tour
 
A compact zero knowledge proof to restrict message space in homomorphic encry...
A compact zero knowledge proof to restrict message space in homomorphic encry...A compact zero knowledge proof to restrict message space in homomorphic encry...
A compact zero knowledge proof to restrict message space in homomorphic encry...
 
Class 16: Making Loops
Class 16: Making LoopsClass 16: Making Loops
Class 16: Making Loops
 
AILABS - Lecture Series - Is AI the New Electricity? Topic:- Classification a...
AILABS - Lecture Series - Is AI the New Electricity? Topic:- Classification a...AILABS - Lecture Series - Is AI the New Electricity? Topic:- Classification a...
AILABS - Lecture Series - Is AI the New Electricity? Topic:- Classification a...
 
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream CiphersMultiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
 
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream CiphersMultiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
 
Linkedin_PowerPoint
Linkedin_PowerPointLinkedin_PowerPoint
Linkedin_PowerPoint
 
Machine Learning and Stochastic Geometry: Statistical Frameworks Against Unce...
Machine Learning and Stochastic Geometry: Statistical Frameworks Against Unce...Machine Learning and Stochastic Geometry: Statistical Frameworks Against Unce...
Machine Learning and Stochastic Geometry: Statistical Frameworks Against Unce...
 

Recently uploaded

1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
AldoGarca30
 
Query optimization and processing for advanced database systems
Query optimization and processing for advanced database systemsQuery optimization and processing for advanced database systems
Query optimization and processing for advanced database systems
meharikiros2
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
pritamlangde
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 

Recently uploaded (20)

HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth Reinforcement
 
Query optimization and processing for advanced database systems
Query optimization and processing for advanced database systemsQuery optimization and processing for advanced database systems
Query optimization and processing for advanced database systems
 
Electromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxElectromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptx
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
 
Worksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxWorksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptx
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptx
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Introduction to Geographic Information Systems
Introduction to Geographic Information SystemsIntroduction to Geographic Information Systems
Introduction to Geographic Information Systems
 
Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)
 
Signal Processing and Linear System Analysis
Signal Processing and Linear System AnalysisSignal Processing and Linear System Analysis
Signal Processing and Linear System Analysis
 
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesLinux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
 

Modelling Machine Type Communication in IEEE 802.11ah Networks

  • 1. Alexander KrotovEvgeny Khorov Andrey Lyakhov IEEE International Conference on Communications -Workshop on 5G & Beyond - EnablingTechnologies and Applications. London, UK, June, 2015
  • 2. Swarm of sensor STAs High collision rate State-of-the-art wireless networks (e.g. Wi-Fi) do not support swarms of sensors involved into Internet of things interaction Evgeny Khorov, Alexander Krotov, Andrey Lyakhov. Modelling MachineType Communication in IEEE 802.11ah Networks 2 802.11ah Restricted access window Key Idea: to divide STAs into small groups and spread their access attempts over a long period of time To support IoT scenarios, IEEE 802 is developing a novel amendment to theWi-Fi standard: IEEE 802.11ah. Among other modifications, it describes RAW, new channel access method, which allows the AP to allocate some time interval called RAW slot to a group of STAs. Inside each RAW slot, the STAs use legacy EDCA channel access 𝐶𝑊𝑖 i 15 31 63 127 511 255 1023 0 1 2 3 4 5 6 7 54 213 σ Data ACK SIFS AIFS Backoff Empty slot Successful slot Select backoff [0, 𝐶𝑊0] RAW start Data AckTimeout Collision slot Select new backoff [0, 𝐶𝑊𝑖] Collision EDCA
  • 3. 𝑁 𝑀 RAW Scenario Let the AP select a group of M sensor STAs and estimate that N of M STAs have data. More precisely, let each of N STAs have one data frame at the beginning of the RAW slot. What length of the RAW slot is enough? Task For a given duration of the RAW slot find the probability that: A. Marked STA successfully transmits its frame; B. All N STAs successfully transmit their frames. How to choose values of RAW parameters? General Problem • No hidden stations • Frames are not corrupted due to noise • Lengths of all frames are equal Stations are working synchronously Assumptions
  • 4. 𝑷𝒓 𝑻𝑿, 𝒕, 𝒓 = 1 CW0 , 𝑟 = 0, 𝑡 < 𝐶𝑊0 0, 𝑟 = 0, 𝑡 ≥ 𝐶𝑊0 1 CWr 𝑖=𝑡−𝑊𝑟 𝑡−1 𝑃𝑟(𝐶, 𝑖, 𝑟 − 1) r > 0 1 𝐶𝑊𝑟 … 𝐶𝑊𝑟 𝑟 > 0 1 𝐶𝑊0 … 𝐶𝑊0 𝑟 = 0 Probability of transmission in slot 𝒕 after 𝑟 retries: 𝑷𝒓 𝒕, 𝒓 = 1 − 𝑖=0 𝑡−1 Pr 𝑇𝑋, 𝑖, 𝑟 , 𝑟 = 0 𝑖=0 𝑡−1 Pr 𝐶, 𝑖, 𝑟 − 1 − 𝑖=0 𝑡−1 Pr 𝑇𝑋, 𝑖, 𝑟 , 𝑟 > 0 Attempt 𝑟 − 1 failed Attempt 𝑟 has not occurred Probability of reaching slot 𝒕 with retry counter 𝒓: For 𝑵 → ∞ each transmission attempt leads to a collision: 𝑷𝒓 𝑪, 𝒕, 𝒓 = 𝑷𝒓(𝑻𝑿, 𝒕, 𝒓) Trick: Since 𝑷𝒓(𝑻𝑿|𝒕, 𝒓) almost does not depend on 𝑵, use 𝑷𝒓 𝑪, 𝒕, 𝒓 = 𝑷𝒓(𝑻𝑿, 𝒕, 𝒓) for any value of 𝑵 Evgeny Khorov, Alexander Krotov, Andrey Lyakhov. Modelling MachineType Communication in IEEE 802.11ah Networks 4 Let us number EDCA virtual slots inside RAW: t. Probability of transmitting in slot 𝒕 if STA reached it with retry counter 𝒓: 𝐏𝐫 𝑻𝑿|𝒕, 𝒓 = 𝑷𝒓(𝑻𝑿, 𝒕, 𝒓) 𝑷𝒓(𝒕, 𝒓)
  • 5. A. the marked STA successfully transmits its frame Transition Processes 𝑡 𝑡 + 1 c s r c+1 c+1 r+1 s+1 c s r absorbing states 𝜋 𝑒 𝜋 𝑐 + 𝜋 𝑐 − 𝜋 𝑠 −𝜋 𝑠 + Empty slot Collision without marked STA Collision with marked STA Successful transmission of another STA Markov chain A Markov chain B … absorbing states c s c s c+1 s c s+1 c=1 N 𝜋 𝑒 𝜋 𝑐 𝜋 𝑠 c=0 N … 𝜋 𝑒 𝑡, 𝑐, 𝑠 = (1 − 𝑝) 𝑁−𝑠 𝜋 𝑠 𝑡, 𝑐, 𝑠 = 𝑁 − 𝑠 𝑝(1 − 𝑝) 𝑁−𝑠−1 𝜋 𝑐 𝑡, 𝑐, 𝑠 = 1 − 𝜋 𝑒 − 𝜋 𝑠 𝜋 𝑒 − 𝑡, 𝑐, 𝑠, 𝑟 = 𝜋 𝑒 ′ 𝑡, 𝑐, 𝑠 1 − Pr 𝑇𝑋 𝑡, 𝑟 𝜋 𝑠 − 𝑡, 𝑐, 𝑠, 𝑟 = 𝜋 𝑠 ′(𝑡, 𝑐, 𝑠)(1 − Pr 𝑇𝑋 𝑡, 𝑟 ) 𝜋 𝑐 − 𝑡, 𝑐, 𝑠, 𝑟 = 𝜋 𝑐 ′ 𝑡, 𝑐, 𝑠 1 − Pr 𝑇𝑋 𝑡, 𝑟 𝜋 𝑠 + 𝑡, 𝑐, 𝑠, 𝑟 = Pr 𝑇𝑋 𝑡, 𝑟 𝜋 𝑒 ′ 𝑡, 𝑐, 𝑠 𝜋 𝑐 + 𝑡, 𝑐, 𝑠, 𝑟 = Pr 𝑇𝑋 𝑡, 𝑟 (1 − 𝜋 𝑒 ′ 𝑡, 𝑐, 𝑠 Let 𝜋 𝑒 ′ = (1 − 𝑝) 𝑁−𝑠−1 𝜋 𝑠 ′ = 𝑁 − 𝑠 − 1 𝑝(1 − 𝑝) 𝑁−𝑠−2 𝜋 𝑐 ′ = 1 − 𝜋 𝑒 ′ 𝑡, 𝑐, 𝑠 − 𝜋 𝑠 ′ (𝑡, 𝑐, 𝑠) 𝑝 = Pr 𝑇𝑋 𝑡, 𝑐, 𝑠 = 𝑟=0 𝑐 Pr 𝑇𝑋 𝑡, 𝑟 Pr(𝑡, 𝑐, 𝑠, 𝑟) 𝑟=0 𝑐 Pr(𝑡, 𝑐, 𝑠, 𝑟) Transmission attempt probability for non-marked STA: Evgeny Khorov, Alexander Krotov, Andrey Lyakhov. Modelling MachineType Communication in IEEE 802.11ah Networks Tasks: For :a given RAW slot duration find the probability that B. all N STAs successfully transmit their frames +: marked STA transmits -: marked STA does not transmit 𝑐: number of collisions 𝑠: number of successful slots 𝑟: retry counter 𝑡 𝑡 + 1 6
  • 6. PDF CDF Evgeny Khorov, Alexander Krotov, Andrey Lyakhov. Modelling MachineType Communication in IEEE 802.11ah Networks 6 Numerical Results Probability that the marked STA successfully transmits its frame Probability that all N STAs successfully transmit their frames.
  • 7. By the beginning of the RAW slot each of 1000 STAs has a packet with probability 0.3 Evgeny Khorov, Alexander Krotov, Andrey Lyakhov. Modelling MachineType Communication in IEEE 802.11ah Networks 7 For N stations Solution: Split stations into several groups Splitting into 50 groups minimizes channel time in this scenario Slot duration ~20 ms Required RAW slot duration Required delivery probability: 0.9 For N=Bin(M=1000, p=0.3) stations More than 1 second (exceeds protocol limit)
  • 8. This paper An example of usage of this model The model can be also applied to study and manage many new mechanisms developed in .11ah and described in 8

Editor's Notes

  1. One of the main issues is the high contention during random access. High contention results in high collision rate and collisions waste battery power. As a result, network lifetime is reduced. To solve this problem, contention reduction mechanisms are required.