Académique Documents
Professionnel Documents
Culture Documents
Abstract-IEEE introduced a new standard IEEE 802.11ax for the next generation WLANs.As we know,the current throughput is very low
because of the current Media Access Control(MAC) in present wireless area networks.So,the concept of Orthogonal Frequency Multiple
Access(OFDMA) to facilitate multi user access is introduced.The main challenges of adopting OFDMA areoverhead reduction and
synchronization.To meet these challenges this paper revised an OFDMA based OMAX protocol.And due to various various bandwidth
consuming applications and devices todays WLANs have become stressed and low at throughput.To handle this problem MU MIMO is used to
improve the performance of WLANs.This paper surveys uplink/downlink mutli user MAC protocols for MIMO enabled devices.It also identifies
the key requirements of MAC protocol design.
108
IJRITCC | August 2016, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 4 Issue: 8 108 - 114
_______________________________________________________________________________________________
in this paper. In OMAX protocol, fast backoff process and CW is come to. Each STA transmit RTS after the backoff
whole channelphysical channel sensing are adopted to solve counter is zero.
synchronization problem, also enhanced RTS/CTS
Whole Channel Physical Channel Sensing
mechanism and new frame structure are depicted to
reduceoverhead. In DCF protocol,concurrent transmission happens just on
various sub channels.There is a cyclic prefix (CP) time in
To outline a promising MAC protocol for next
OFDM symbol [5].The time bungle ought to be not exactly
generationWLANs, the synchronization issue, and overhead
CP time.But it is troublesome for numerous STAs to begin
lessening ought to be viewed as vigilantly [1]. The system
transmission in CP time when sub-channel physical
of an OFDMA based multiuser access for IEEE802.11ax
detecting is used.To fathom this entire channel physical
(OMAX) protocol is proposed for cutting edge WLANs in
divert detecting is utilized as a part of OMAX.All STAs
this paper. In OMAX protocol, quick backoff procedure and
sense entire channel as opposed to detecting sub channels.If
entire channel physical channel detecting are embraced to
all sub directs are out of gear state then it is considered as
take care of synchronization issue, additionally upgraded
unmoving else it is considered as busy.So, when one STA
RTS/CTS system and new edge structure are delineated to
begins transmission the various STAs will consider it as
decrease overhead.
busy. And those STAs whose backoff procedure is finished
Procedure of OMAX protocol :- in the same opening could at the same time begin their
transmission.
1) STAs distinguish the entire channel as indicated by
the physical transporter detecting in DCF until the Enhanced RTS/CTS Mechanism
channel is unmoving for circulated between casing
In customary WLAN, if two STAs transmit RTS in the
space (DIFS).
meantime, their RTS bundles will slam into each other and
2) STAs take out the step back procedure utilizing the
AP couldn't get both of them. Be that as it may, in OMAX
backoff rules as utilized as a part of IEEE 802.11
protocol, when a few STAs transmit RTS at the same time
DCF expect the backoff counter in STAs short 4
AP still gets some RTS packets.Though some are impacted
for every unmoving opening subsequent to there
and some are gotten effectively. As represented in Fig
are four sub-diverts in Fig 1.
2.(RTS 1, RTS 2) and (RTS 3, RTS 4) are crashed in sub-
3) After finishing backoff, STAs arbitrarily select one
channel 1 and sub-channel 2, RTS 5 in sub-channel 3, RTS
sub-channel to transmit solicitation to send (RTS),
6 in sub-channel 4 and RTS 7 in sub-channel 5 are
and AP transmit assemble clear to send (G-CTS) to
effectively gotten by AP. By and large, there are all out 7
show the sub-channels allotment data as per the
STAs transmitting RTS, and AP got 3 RTS taking all things
administrations necessity of various STAs.
together.
4) STAs transmit DATA as indicated by the data inG-
CTS, and AP answers the gathering affirmation (G-
ACK).
MUIC Schemes for Downlink Transmissions: There are two CSI feedback schemes:
a)Block diagonalization (BD):Block Diagonalization is a 1) Implicit feedback,where the AP computes the CSI by
very famous channel inversion technique, especially in the calculating training sequences sent from STAs
case where receivers have multipleantennas.Singular value
2) Explicit feedback,where STAs calculate the CSI by
decomposition (SVD) isemployed to discard unitary
calculating the training sequences sent from the AP, and
matrices, which makes the computationalcomplexity of BD
then STAs feedback the CSI to the AP.
higher than MMSE.
Note: No matter which CSI feedback scheme is
b)Zero forcing (ZF):In the Zero Forcing scheme, the
applied,theCSI feedback affects the network performance.It
originalsignal is multiplied with the pseudo-inverse of the
is because ofthe frequent CSI feedback increases
channel matrixto completely nullify the MUI. The
overheads,while the infrequent results in the outdated CSI
conditions are (1) the AP hasthe full CSI, and (2) the
that causes interference among parallel streams.
channel is invertible.The ZF scheme causes an increase in
theerror rate (because the noise vector is amplified) when
111
IJRITCC | August 2016, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 4 Issue: 8 108 - 114
_______________________________________________________________________________________________
C. The Scheduling Scheme
Scheduling scheme is another way to design MU MIMO
MAC protocols. It selects a group of STAs orframes for
transmissions which can optimize some aspects ofthe
system performance. The design of the scheduling scheme
can be divided intotwo types: the scheduling in the uplink
and downlink.
1)Scheduling in the Uplink:In the uplink, it is very difficult
to make a joint scheduling decision among spatially
distributed STAs(Stations).Uplink transmissions are
categorized into the coordinated and the uncoordinated
depending on whether the RTS/CTS(Request To Send/Clear Fig.6Coordinated uplink channel access
To Send) exchanging process is employed or not.In the un- 2) Scheduling in the Downlink:As compared to the uplink,
coordinated one, STAs utilize a random MAC mechanism to the AP plays direct role in the downlink scheduling, which
decide which STA will be allowed for transmissions, which can be categorized in the packet based scheduling and
have two cases: Synchronous[12] and Asynchronous[13] theSTA based one.The packet based scheduling
data transmissions, as shown in Fig. 5.The synchronous algorithmuses a unique metrics,the packetqueuing status of
scheme allows multiple STAs that automatically choose the the AP.The STA based scheduling have a criteria to identify
same BO(Backoff Process) to transmit data frames set of STAs for simultaneous downlink transmissions.This
continuously,while the asynchronous one allows STAs to criteria includes the channel state,spatial
transmit frames along with other transmissions.In the compatibility[18],fairness,etc.A combination of the
coordinated, STAs utilize the MAC random mechanism to previously mentioned scheduling schemes is considered
struggle for the channel, while let the AP(Access Point) to most of the time.However,the mostcommonly used
decide who will be involved in the followed parallel scheduling schemes are Fist In First Out and Opportunistic
transmissions.[14]The coordinated uplink access scheme followed by greedy and WFQ.
implies the implication of the AP (as a coordinator) and the
employment of RTS/CTS exchanges. The AP extracts the 3) Cross-Layer Scheduling:The combination of
interested information fromRTSs sent by the contending parametersfrom different layers should be jointly considered
STAs, and then it makes scheduling decisions for all the [19], which isthe concept of cross-layer scheduling.The
frame transmissions (i.e., the scheduled transmissions), or cross-layer scheduling promises to achieve the optimal
the AP just responds to the received RTSs to inform who system performance with parameters from different layers,
have won the channel contention (i.e., the un-scheduled such asthe channel information at the physical layer,
transmissions). A general example of the coordinated uplink queuing state atthemedia access layer and routing
access is shown in Fig. 6 information at the network layer.But the cross-layer
scheduling is far morecomplex than combining these
parameters.The reasonis that the interaction between the
layers breaks the OSI layered structures andcreates
problems between the performance and the stability
ofsystems,which can lead to unexpected results as
thewireless network scales up[17].
In general,with the CSI acquisition and other layerskey
parameters, the following points should be considered for
Cross-layer design.
System Complexity: As we know, the cross-layer design
Fig.5Un-coordinated uplink channel access (a) Synchronous has shattered theprotocol layered structure; the new wireless
data transmissions (b)Asynchronous data transmissions systemsmight become incompatible with protocolsystems.
Since the maintenance or upgrade of the cross-layer
protocolis no longer isolated within each layer, and any
parameterchanges must be carefully traced and coordinated
[17].
112
IJRITCC | August 2016, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 4 Issue: 8 108 - 114
_______________________________________________________________________________________________
Design Constraints: Different data rates are mostly Int.CommunNetw. Syst. Sci., vol. 3,no. 3, pp. 213252,
appliedto distributed STAs,which might causeinterferences Mar. 2010.
from stronger signals to weaker signals in thedownlink or [9] [9] L. X. Cai, H. Shan, W. Zhuang, X. Shen, J. W. Mark,
and Z. Wang, A Distributed Multi-User MIMO MAC
the near-far effect in the uplink. Therefore, control or data
Protocol for Wireless Local Area Networks, in IEEE
rate selection scheme needs tobe taken account with the
GlobalTelecommunications Conference, 2008. IEEE
MAC design. In addition, someQoS(Quality of Services) GLOBECOM 2008, 2008, pp. 15.
metrics such as the average delay and the jitter are also [10] [10]S. K. Narware and others, Orthogonal Frequency
needed(i.e.,decreasing collisions and increasing Division Multiple Access (OFDMA) Based MAC
throughput).And sometimes,maximizing throughput means Protocols Survey for the Next Generation WLAN,
sacrificing transmissionopportunities of some low-rate 2015.
STAs. [11] [11]M. X. Gong, E. Perahia, R. Stacey, R. Want, and S.
Mao, A CSMA/CA MAC Protocol for Multi-User
4. Conclusion MIMO Wireless LANs, in 2010 IEEE Global
TelecommunicationsConference (GLOBECOM 2010),
An OFDMA based multiuser access for IEEE
2010, pp. 16.
802.11axnamed OMAX protocol is revised for upcoming
[12] [12]H. Jin, B. C. Jung, H. Y. Hwang, and D. K. Sung,
WLANs in this paper. The framework of OMAX is Performance comparison of uplinkWLANs with single-
explained in detail. In OMAX, whole channel physical user and multi-user MIMO schemes, in Proc. IEEE
channel sensingand fast backoff process is proposed to solve WCNC, 2008, pp. 18541859.
synchronizationproblem and enhanced RTS/CTS [13] [13] F. Babich andM. Comisso, Theoretical analysis of
mechanism and framestructure is designed to reduce asynchronous multipacket reception in 802.11
overhead.The theoreticalanalysis of the OMAX protocol is networks, IEEE Trans. Commun., vol. 58, no. 6, pp.
discussed. The uplink and downlink MU-MIMO MAC 17821794, Jun. 2010.
[14] [14] P. X. Zheng, Y. J. Zhang, and S. C. Liew,
protocols forWLANs are investigated and categorized in the
Multipacket reception inwireless local area networks,
paper.The requirements for designing MU-MIMO MAC
in Proc. IEEE ICC, 2006, vol. 8, pp. 36703675.
protocols are identified such as Channel Acquisition [15] [15] M. Costa, Writing on dirty paper
Information and Scheduling Schemes and sometypical (Correspondence), IEEE Trans. Inf. Theory, vol. IT-29,
MUD and MUIC techniques for de/pre-coding are no. 3, pp. 439441, May 1983.
described. [16] [16] A. Paulraj, R. Nabar, and D. Gore, Introduction to
Space Time Wireless Communications. Cambridge,
REFERENCES U.K.: Cambridge Univ. Press, 2003.
[1] Q. Qu, B. Li, M. Yang, and Z. Yan, An OFDMA based [17] [17]V. Kawadia and P. Kumar, A cautionary
concurrent multiuser MAC for upcoming IEEE perspective on crosslayer design, IEEE Wireless
802.11ax, in 2015 IEEE Wireless Communications and Commun., vol. 12, no. 1, pp. 311, Feb. 2005
NetworkingConference Workshops (WCNCW), 2015, pp. [18] [18] H. Li, A. Attar, and V. C. M. Leung, Multi-user
136141. medium access control in wireless local area network,
[2] R. Liao, B. Bellalta, M. Oliver, and Z. Niu, MU-MIMO in Proc. IEEE WCNC, 2010, pp. 16.
MAC Protocols for Wireless Local Area Networks: A [19] [19] C. Anton-Haro, P. Svedman,M. Bengtsson, A.
Survey, IEEE Commun. Surv. Tutor., vol. 18, no. 1, pp. Alexiou, and A. Gameiro, Cross-layer scheduling for
162183, Firstquarter 2016. multi-user MIMO systems, IEEE Commun.Mag., vol.
[3] B. Bellalta, L. Bononi, R. Bruno, and A. Kassler, Next 44, no. 9, pp. 3945, Sep. 2006.
generation IEEE 802.11 Wireless Local Area Networks: [20] [20] IEEE 802.11, Synchronization Requirement, IEEE
Current status, future directions and open challenges, 802.11-14/0818r0, Jul. 2014
Comput.Commun [21] [21] Sushma, Deepak Nandal, and VikasNandal.
[4] B. Bellalta, IEEE 802.11ax: High-Efficiency WLANs, "Security Threats in Wireless Sensor
ArXiv150101496 Cs, Jan. 2015. Networks." IJCSMS International Journal of Computer
[5] [5] J. Heiskala and J. Terry, OFDM Wireless LANs: A Science & Management Studies 11.01 (2011).
Theoretical and Practical Guide, Sams Publishing, [22] [22] Nandal, Vikas, and Deepak Nandal. "Maximizing
2002. Lifetime of Cluster-based WSN through Energy-
[6] [6] IEEE 802.11, HEW MAC Efficiecy Analysis for Efficient Clustering Method." IJCSMS International
HEW SG, IEEE 802.11-13/0505r0, May 2013 Journal of Computer Science & Management
[7] [7] M. Jiang and L. Hanzo, Multiuser MIMO-OFDM Studies 12.03 (2012).
for next-generation wireless systems, Proc. IEEE, vol. [23] [23] Dagar, Anuja, and Deepak Nandal. "High
95, no. 7, pp. 14301469,Jul. 2007. performance Computing Algorithm Applied in Floyd
[8] [8] F. Khalid and J. Speidel, Advances in MIMO Steinberg Dithering." International Journal of Computer
techniques for mobile communicationsA survey, Applications 43.23 (2012).
113
IJRITCC | August 2016, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 4 Issue: 8 108 - 114
_______________________________________________________________________________________________
[24] [24] Manisha, Mr, and Deepak Nandal. "FAULT
DETECTION IN WIRELESS SENSOR
NETWORKS."[25] Deepak Nandal and Manisha,A
Fault Adaptive Route Optimization Model For Wireless
Sensor Networks International Journal of Computer
Engineering and Applications,pp. 99-107.
[25] [26] Deepak Nandal Naveen Rani and VikasNandal,
Various Digital Calibration Techniques in Pipeline
ADCs (Analog to Digital Converter): A Theoretical
ReviewInternational Journal of Latest Technology in
Engineering, Management & Applied Science,Vol.3,
Issue 5,pp 265-271.
[26] [27] Deepak Nandaland VikasNandal Various handover
processes processesprocesses in Wi-Max, International
Journal of Computer Science & Management Studies,
Vol. 12, Issue 03, pp. 106-110.
114
IJRITCC | August 2016, Available @ http://www.ijritcc.org
_______________________________________________________________________________________