Next Article in Journal
Improving Human Activity Recognition Performance by Data Fusion and Feature Engineering
Next Article in Special Issue
A Novel GFDM Waveform Design Based on Cascaded WHT-LWT Transform for the Beyond 5G Wireless Communications
Previous Article in Journal
LoRaWANSim: A Flexible Simulator for LoRaWAN Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Support for 5G Mission-Critical Applications in Software-Defined IEEE 802.11 Networks

by
Pedro H. Isolani
1,*,
Daniel J. Kulenkamp
2,
Johann M. Marquez-Barja
3,
Lisandro Z. Granville
4,
Steven Latré
1 and
Violet R. Syrotiuk
2
1
Department of Computer Science, University of Antwerp–imec, 2000 Antwerp, Belgium
2
School of Computing, Informatics, and Decision Systems Engineering, Arizona State University, Tempe, AZ 85281, USA
3
Department of Electronics–ICT, University of Antwerp–imec, 2000 Antwerp, Belgium
4
Institute of Informatics–INF, Federal University of Rio Grande do Sul, Porto Alegre, Rio Grande do Sul 91501-970, Brazil
*
Author to whom correspondence should be addressed.
Sensors 2021, 21(3), 693; https://doi.org/10.3390/s21030693
Submission received: 14 December 2020 / Revised: 10 January 2021 / Accepted: 18 January 2021 / Published: 20 January 2021
(This article belongs to the Special Issue 5G Mission-Critical Applications)

Abstract

:
With the emergence of 5G networks and the stringent Quality of Service (QoS) requirements of Mission-Critical Applications (MCAs), co-existing networks are expected to deliver higher-speed connections, enhanced reliability, and lower latency. IEEE 802.11 networks, which co-exist with 5G, continue to be the access choice for indoor networks. However, traditional IEEE 802.11 networks lack sufficient reliability and they have non-deterministic latency. To dynamically control resources in IEEE 802.11 networks, in this paper we propose a delay-aware approach for Medium Access Control (MAC) management via airtime-based network slicing and traffic shaping, as well as user association while using Multi-Criteria Decision Analysis (MCDA). To fulfill the QoS requirements, we use Software-Defined Networking (SDN) for airtime-based network slicing and seamless handovers at the Software-Defined Radio Access Network (SD-RAN), while traffic shaping is done at the Stations (STAs). In addition to throughput, channel utilization, and signal strength, our approach monitors the queueing delay at the Access Points (APs) and uses it for centralized network management. We evaluate our approach in a testbed composed of APs controlled by SD-RAN and SDN controllers, with STAs under different workload combinations. Our results show that, in addition to load balancing flows across APs, our approach avoids the ping-pong effect while enhancing the QoS delivery at runtime. Under varying traffic demands, our approach maintains the queueing delay requirements of 5 ms for most of the experiment run, hence drawing closer to MCA requirements.

1. Introduction

5G networks are designed with the goal of fulfilling the expectations of more stringent QoS support [1]. MCAs, such as autonomous cars, industrial automation, and smart cities, require high-speed connections, enhanced reliability, and low latency. A typical use case scenario that requires Ultra-Reliable Low Latency Communication (URLLC) is the process automation and remote control for reactive flows in a digital factory [2]. Although the date rate of such use cases is relatively low, the End-to-End (E2E) latency is expected to remain under 50 ms. In addition to using 5G Radio Access Technology (RAT), MCAs may also exploit the opportunity to offload traffic into IEEE 802.11 networks [3,4,5,6], which makes dealing with stringent QoS requirements in IEEE 802.11 networks of the utmost importance. Traditional network management solutions and techniques cannot deal with such dynamic environments and their requirements well. The introduction of SDN enabled new levels of innovation and automation that also appear to be appropriate for IEEE 802.11 management [7].
Network slicing is advocated as an appropriate abstraction for network virtualization and flexible resource provisioning [8,9,10]. As expected, the SDN paradigm has also been applied in wireless networks. In fact, the 3GPP 5G architecture is embracing the Control/User Plane Split (CUPS) (a cornerstone of SDN) as one of the fundamental enablers for network programmability and E2E network slicing [1]. As a result, SDN-tailored systems are envisioned to ease the creation of logical and isolated wireless networks via slice abstractions. In IEEE 802.11 networks, network slicing allows for the isolation of network resources and traffic among users and services [11]. To this end, portions of airtime are used for slices in order to achieve a more precise Resource Allocation (RA) mechanism. SDN allows for network slices to be dynamically instantiated, modified, and terminated, facilitating network innovation and simplifying network management [12].
Despite the wide range of research efforts addressing network slicing and SDN to enhance resource utilization [4,13,14,15,16,17,18,19,20], deciding how to efficiently allocate, control, and manage both users and slices remains challenging. In this paper, we tackle three outstanding problems. First, research efforts in network slicing have addressed airtime fairness, traffic isolation, and throughput guarantees; for the support of MCAs, our approach also addresses latency-related metrics. Secondly, network slicing has focused on Downlink (DL) transmissions; MCAs may also generate Uplink (UL) traffic, so our approach jointly assesses both. Third, proposals for user re-association often focus on minimizing the average number of STAs assigned to an AP and maximizing the overall throughput of the network and Received Signal Strength Indicators (RSSIs); because of the latency constraints of MCAs, we include queueing delay in our re-association decision.
In previous work, we evaluated the impact of runtime slice reconfiguration on the E2E latency and we exploited the potential of slice orchestration to guarantee latency-related requirements [18,19]. We developed and integrated queueing delay measurements into the formulation of a QoS optimization problem, and we proposed a delay-aware approach for performing runtime MAC management via airtime-based network slicing and user association using MCDA in the IEEE 802.11 SD-RAN [21]. There, we provided a solution that is capable of load balancing flows and enhancing QoS delivery at the Radio Access Network (RAN). However, only DL flows were considered. In this paper, we extend our delay-aware approach to consider both DL and UL flows. In this context, UL and DL flows are characterized as the traffic generated from STAs to APs and from APs to STAs, accordingly. When dealing with both DL and UL flows, slice management and user association are also impacted.
In summary, the contributions of our paper include:
  • we extend the network control to the IEEE 802.11 end-devices with a programmable agent, which is capable of performing monitoring and traffic shaping, and we propose a traffic shaping algorithm that controls them via a centralized controller;
  • we extend our network slicing and user association algorithms to consider satisfying the QoS of flows in both UL and DL directions; and,
  • we conduct a performance analysis of our approach comparing it to a state-of-the-art user association algorithm [5]. We evaluate both of the approaches in a real-world testbed with three APs, controlled by an SD-RAN and a backhaul SDN controller, and six STAs served by QoS and Best-Effort (BE) flows in both UL and DL directions. Our results show an improved load balancing of flows across APs and QoS guarantees via centralized RAN slicing and traffic shaping at the end-devices.
The remainder of this paper is organized, as follows. In Section 2, we review related work. This is followed, in Section 3, by an overview of our system. In Section 4, we describe our approach, providing the algorithms for user association, network slicing, and traffic shaping. Section 5 presents our testbed, workload, and results of our experimentation. Finally, in Section 6, we summarize and describe future work.

2. Related Work

Ensuring QoS in wireless networks is a longstanding research challenge that has become more complex with the advent of 5G [22]. To cope with the stringent requirements of MCAs, industry and standardization bodies have been fostering research towards reliable and improved QoS delivery. In IEEE 802.11 networks, QoS has been pursued based on the adaptation of Enhanced Distributed Channel Access (EDCA) parameters, traffic shaping, and slice scheduling. On the other hand, user association algorithms have been developed while using the SDN paradigm to enhance load balancing, mobility support, and fairness. In this section, we review the major efforts in these areas.

2.1. Resource Allocation and QoS Support

Table 1 presents an overview of the related work in IEEE 802.11 networks, summarizing how each approach targets network management, QoS support, the RA method, and the tools used for experimentation. After the IEEE 802.11e amendment [23] established the foundations for traffic prioritization, many investigations focused on queuing management as a means to enhance QoS [24,25,26,27]. Most work concentrated on scheduling schemes incorporating the length of the traffic queues, the time to serve a packet, or the time waiting on the scheduler. Later, with the improvements in radio resource utilization provided by the IEEE 802.11n amendment [28], researchers focused on channel optimization and fairness (e.g., modifying or predicting the Aggregated MAC Service Data Unit (A-MSDU) behavior) [29,30,31,32,33]. However, such proposals required modifications to the driver (e.g., frame formats) and are no longer compliant with the standard.
Several research efforts involved infrastructure sharing via network slicing [13]. Apart from experimentation isolation and analysis [38,42], most of the approaches consisted of airtime-based RA mechanisms for IEEE 802.11 network virtualization [14,35,36]. The focus of airtime scheduling has been extensively studied as a means to overcome the well-known IEEE 802.11 Performance Anomaly [43]. Without slicing capabilities, all STAs would share the available radio resources equally only if they experience similar channel conditions. Otherwise, when STAs are located far away from the APs and use a lower bit rate, the result is a performance degradation that is perceived by all STAs.
Nakauchi et al. [35] and Guo et al. [36] presented similar proposals. Their focus was on an airtime RA method through the control of EDCA parameters, such as the Contention Window (CW) size and the Transmission Opportunities (TXOPs). Although proper traffic isolation was not achieved, the authors have worked to schedule DL packets based on throughput requirements. Other authors [39,41] presented alternative solutions to the problem, performing traffic shaping to limit the resource usage of each slice and by the use of a queuing model with feedback control. However, proper slice isolation was not guaranteed, due to changes in performance of one STA affecting others.
Other research efforts [34,37] concentrated on EDCA parameter adaptation to guarantee the airtime of slices. However, there was only control over the UL traffic. Moreover, both of the approaches were only evaluated in simulation and did not provide support for RA or traffic isolation, which is crucial in achieving and ensuring high data rates. Recently, several proposals [4,14,15,16,17,18,19,20] addressed network slicing in IEEE 802.11 networks. Richart et al. [14] proposed a mechanism that assigns airtime portions to each slice as a resource to be shared. Later, Richart et al. [20] presented an enhanced version of such scheduling with capacity limits, which is capable of achieving precise queueing delay for slices on an AP. However, that work was only assessed in simulation. On the other hand, there were also several practical implementationsm [4,15,16,17], but runtime slice orchestration based on latency requirements was not addressed.
Coronado et al. [4] proposed a framework that enables programmable and dynamic E2E network slicing over heterogeneous RANs. The framework was deployed on a real-world testbed, showing that slices can be dynamically defined and STA/slice traffic isolation can be achieved. In previous work [18,19], we evaluated the impact of runtime slice reconfiguration on the E2E latency and exploited the potential of slice orchestration to guarantee latency-related requirements. We developed and integrated queueing delay measurements into the formulation of a QoS optimization problem and proposed a delay-aware approach for performing runtime network slicing and MAC management using MCDA in IEEE 802.11 SD-RANs [21]. There, we provided a solution capable of load balancing flows and enhancing QoS delivery at The RAN. However, only DL flows were considered. In this paper, we extend our delay-aware approach to consider both DL and UL flows.

2.2. User Association and Load Balancing

Extensive research has been conducted on user association and load balancing in IEEE 802.11 networks. Although there are several distributed approaches, most recent efforts concentrated on centralized network management solutions [3,5,44,45,46,47,48,49,50,51,52,53,54,55]. The SDN paradigm allows for researchers to introduce new mechanisms without having to modify the IEEE 802.11 standard. In addition, SDN brings significant improvements, particularly in terms of QoS awareness. Consequently, several proposals have benefited from the centralized view of SDN to provide more sophisticated and intelligent solutions. For instance, instead of STAs simply associating with the AP with highest RSSI, other metrics can be considered. In addition, researchers have used the Light Virtual Access Point (LVAP) abstraction, in which a physical AP uses different LVAPs for communication with each STA and this, in turn, avoided problems that are caused by legacy handover algorithms, such as unnecessary re-associations and connection disruptions.
Because we focus on centralized handover management and load balancing among devices using the same network technology, we summarize the related work in this specific research domain. Table 2 presents the most recent efforts on centralized-horizontal handover management and load balancing solutions that were proposed for IEEE 802.11 networks. Murty et al. [44] enabled proactive handovers that were based on RSSIs gathered from both STAs and AP. Targeting location-awareness, they developed a system with several Application Programming Interfaces (APIs) that allow such RSSIs to be available at a centralized controller. Similarly, Murty et al. [45] extended such APIs to support a wider range of input measurements. Similar work can be found in [46].
Apart from work conducted via simulations [47,52], testbed experimentation has also been carried out [50,55]. By considering the content requested by the STAs and their throughput requirements, authors have assessed user association and multicast delivery jointly. Consequently, the authors presented significant performance enhancements over the default STA-driven approaches. The AP selection problem has been addressed in both proactive [54,55] and reactive [49,53] manners. In [54], enhanced mobility support and throughput enhancements were targeted through a supervised learning model with a wider range of input parameters, including the predicted location of STAs, RSSIs, and load of the APs. Moreover, to ensure the preservation of the QoS, the negative impact of STA re-association, i.e., the handover cost, was considered. In this way, STAs avoided handovers between AP with similar loads or experiencing similar channel conditions. This minimized ping-pong effects, while achieving higher overall throughput as compared to the IEEE 802.11 standard handover algorithm.
Coronado et al. [3] addressed the user association and load balancing problem with a joint channel selection and user association scheme. With a constraint programming algorithm, possible collision domains among APs were isolated. As also stated in recent research [51,55], when considering AP load and channel conditions is decisive to avoid network performance degradation. As a result, a user association scheme is proposed in order to detect when traffic is not efficiently distributed and perform handovers to the STAs causing performance issues. In order to perform user-association, the algorithm first computed the channel utilization for each AP and the average channel occupancy across all the APs of the network. Subsequently, if there is a significant difference between the channel utilization and any occupancy ratio, the algorithm selected candidate APs to handover that have the lowest result of the product between current occupancy ratio and the RSSIs of its neighboring APs.
Based on the work presented in [3], Gómez et al. [5] proposed a user association algorithm for enhanced resource allocation. They listed a few limitations of the previous work, including: static channel assignment, excessive number of handovers under low load levels, and the fact that the user re-association process considered neither the average RSSIs of STAs nor the deterioration of signal quality. Therefore, an adjustment of The AP load threshold is proposed, which reduces The excessive number of handovers under low load levels, and they introduced two new indicators that triggered the re-association of STAs. The user association algorithm is based on three indicators: average RSSI of an AP, AP load, and channel occupancy. The first indicator referred to the average of the UL RSSIs for all STAs connected to the APs. The second represented the load of the APs in the network, while the third represented the load of the channels, in which APs are operating. Despite these metrics, the user association algorithm checked the indicators sequentially, and decisions are based on only one indicator at a time.
According to Coronado et al. [3], the majority of user association mechanisms target (i) the minimization of the number of STAs per AP, the maximization of the average signal quality, or (ii) the maximization of the average throughput of the network. We identify that little attention is given to latency-restricted services, and latency-related metrics are not considered within the handover decision-making processes. Today’s MCAs are latency-sensitive, motivating the need for considering the delay metrics. In this paper, in addition to other metrics, we monitor the queueing delay at the APs as part of our centralized network management. In this manner, we enhance SD-RAN resource utilization and QoS delivered to support of MCAs.

3. System Overview

Figure 1 illustrates our SDN-enabled layered network architecture. Multiple tenants, i.e., virtual operators or service providers, share the infrastructure and they have their specific Service Level Agreement (SLA). These SLAs are translated into QoS requirements, in which the network has to support, e.g., minimum throughput, maximum allowed E2E latency, and acceptable packet loss ratio.
The IEEE 802.11 RAN consists of a set of APs responsible for delivering data from different services to/from several users (STAs) in the network. Each AP has resources to be shared and, therefore, managed. To control resources utilization and ensure QoS delivery at the RAN, we propose the use of network slicing. We focus on QoS within a slice as being a service, i.e., Quality of Service Slicing (QoSS), as defined by Richart et. al. [14]. To perform network network-triggered handovers, airtime-based network slicing, and traffic shaping, our approach relies on the 5G-EmPOWER platform (https://github.com/5g-empower/5g-empower.github.io), which includes the 5G-EmPOWER SD-RAN controller, a backhaul implementation of the SDN controller Ryu, and a programmable agent that runs at each AP. The IEEE 802.11 interface of the AP is set monitor mode for radio measurements collection. We extended the SD-RAN controller to allow flow demands and QoS requirements to be informed. Thus, the SD-RAN controller can calculate the expected throughput and verify the QoS. The network intelligence is implemented at the SD-RAN controller, which communicates with the APs at the data plane through its southbound interface using a persistent Transmission Control Protocol (TCP) connection. This communication is given by the OpenEmpower protocol that, besides monitoring, allows for operations, such as the reassignment of the available resources among slices.
The programmable agent at the APs, in turn, consist of two components: An OpenvSwitch (https://www.openvswitch.org/) instance that operates under the supervision of the OpenFlow-enabled SDN controller and a Click modular router [56] instance implementing the IEEE 802.11 data-path with a hypervisor. The hypervisor sits on top of the standard Linux IEEE 802.11 stack of the APs, therefore, acts as a software overlay. In this manner, the SD-RAN controller can request the backhaul controller to tag traffic matching a certain flow through the definition of traffic rules (i.e., OpenFlow rules [57]). Therefore, slices are mapped by the hypervisor according to the Service Set Identifier (SSID) and the Differentiated Services Code Point (DSCP). The SSID is the name of a IEEE 802.11 network and the DSCP determines the priority of each IP packet. Multiple flows can be mapped into a single slice/ the hypervisor is in charge of creating, monitoring, and managing network slices according to traffic rules, ensuring performance isolation and efficient resource utilization.
Figure 2 illustrates the sequence of communication from the SD-RAN controller to the OpenvSwitch instance at the APs. First, the SD-RAN controller sends a message to the backhaul SDN controller containing the traffic rule description. The backhaul SDN controller then takes the traffic rule description and installs the defined traffic rules in each of the APs as OpenFlow rules. At each AP, the IEEE 802.11 interface defines the minimum chunk of wireless resources an STA can use, including the network interface identifier (e.g., MAC address), operating channel (e.g., 1, 6, 11), and the type of channel (e.g., High Throughput (HT) 20 MHz, Very High Throughput (VHT) 40 MHz). Figure 3 shows a simplified queue structure along with the data traffic flow within an AP.
First, frames from slices are classified into queues based on the definition of the traffic rules (e.g., OpenFlow rules [57]).Each traffic rule contains multiple aggregation buffers, one for each user in the slice. These aggregation buffers are scheduled while using the Round Robin policy and subsequently are dequeued following the Airtime Deficit Weighted Round Robin (ADWRR) scheduling algorithm [4]. In the rest of this section, we present the ADWRR scheduling algorithm in Section 3.1. Subsequently, in Section 3.2, we present our proposed frame tracking functionality to monitor the queueing delay of slices. Finally, in Section 3.3, we present the implementation details of the programmable agent in order to perform dynamic traffic shaping at the STA.

3.1. ADWRR Scheduling Algorithm

The ADWRR scheduling algorithm is responsible for assigning a fraction of the airtime to each traffic rule according to its relative priority. The main purpose of ADWRR is to consider the cost of transmitting a frame with regard to the resources that have to be allocated to it [4]. In this case, the cost of transmitting a frame depends on its length and the actual channel conditions that are experienced by its receiver. The hypervisor only serves traffic rules whose expected transmission time, as estimated by a rate control algorithm (e.g., Minstrel [58]), is smaller than a deficit counter. The scheduler only iterates upon active queues/slices; inactive queues/slices do not cause any performance degradation to the system. With ADWRR, the quantum of an individual slice can be adjusted independently, which allows for the airtime of the slice to be controlled dynamically. In this way, a larger quantum can be assigned to a slice supporting services with stricter performance requirements, allocating it more radio resources.

3.2. Monitoring Queueing Delay at APs

The hypervisor is implemented while using the click modular router. Click is a framework for writing multi-purpose packet processing engines [56] and it is used to implement the wireless STA/AP frame exchange. Figure 4 illustrates the main elements involved in the computation of the queueing delay of slices along with a simplified version of the hypervisor implementation.
We introduced a custom click element QueueInfoBase that keeps track of the frames dequeued at the AP. This element maintains the frame information, including the slice identifier and the timestamps when a frame is enqueued and dequeued. Average queueing delay is calculated by the element periodically according to a configurable timer, according to which frames were dequeued during the period. We set this period to be one second in our system, and outdated frame information is removed. To make use of the new statistics, we extended both the OpenEmpower protocol (used for the controller and AP communication) and the SD-RAN controller. Several handler apps at the controller periodically request and calculate the needed metrics, which are maintained at the controller, and a Simple Moving Average (SMA) and Simple Moving Median (SMM) of the last ten measurements are calculated. The queueing delay statistics are utilized by the management algorithms we implement for our user association, traffic shaping, and network slicing.

3.3. Shaping and Monitoring UL Traffic with a Programmable Agent

To allow for the UL traffic, generated by the STAs, to be shaped by the centralized SD-RAN controller, we introduce a programmable agent at the STAs. Traffic shaping is widely used in order to improve latency and bandwidth of flows by delaying others [59]. The agent receives commands from the network controller and applies traffic shaping on all of the traffic leaving the IEEE 802.11 wireless interface of the STAs.
Figure 5 illustrates the main elements that make up the agent implementation at the STAs. This agent is also implemented while using the click modular router and it behaves as a software overlay on top of the IEEE 802.11 data-path. In addition to performing traffic shaping, our implementation keeps track of the enqueued and dequeued frames at the STAs. Specifically, just before frames are enqueued, the element Enqueue sends the timestamp when the frame was enqueued along with the frame identifier to the element STAInfoBase. This element, in turn, stores the identifier and timestamp, and then compares it to when the frame is dequeued to obtain the delay. If frames are not dequeued (i.e., they are dropped by the shaper), a packet loss counter is updated. As with the agent on the APs, the delay and loss statistics are updated every second, and outdated information is removed.
The SD-RAN controller communicates with the agents on STAs through a persistent TCP connection, while using the ControlSocket element. This element enables external access to other element handlers, allowing for read and write operations to be performed. Such operations can be performed on the STAInfoBase element, for example, enabling the controller to read statistics regarding the configuration of the traffic shapers. Moreover, the controller can also adjust the shaping for an STA that is negatively impacting other QoS flows in the network. We define a minimum and maximum value for the shaper, to keep traffic within a range of values. Our minimum value, 1 Mbps, was chosen in order to ensure we do not block an STA from transmitting, and our maximum value, 100 Mbps, was chosen to be well above the capacity of the channel.

4. Delay-Aware Sdn-Based Approach

In this section, we present our delay-aware approach for network slicing and MAC management while using MCDA in IEEE 802.11 SD-RANs. MCDA is a sub-discipline of operations research that evaluates multiple conflicting criteria in decision making and finds the best alternative from a set of available alternatives. We apply MCDA whenever we want to decide to which AP an STA is assigned, according to the high-level objectives of balancing the AP load while considering the delay constraints of any QoS MCAs. In order to enhance the QoS delivery, we complement our approach by performing network slicing at the IEEE 802.11 SD-RAN and traffic shaping at the end-devices.
Next, we formulate our criteria for MCDA, and present our user association, slicing, and shaping algorithms. All of the notations introduced are listed in Table 3 for convenience.

4.1. Load Balancing Problem Formulation Using MCDA

The IEEE 802.11 RAN consists of a set B of APs, being responsible for delivering services to a set T of STAs. Within an AP, n services have to be delivered, hence, n slices are instantiated. Each service is instantiated in a slice, with S b denoting the slices of AP b B . Therefore, each STA t is served by a subset of the slices of S b . In addition, each slice s has a quantum Q s that defines the amount of airtime added to the deficit counter of the slice scheduler. Services are characterized by bidirectional data flows; therefore, we also consider flows coming from the STAs, i.e., the UL flows. Each flow f from the STAs is measured at a given AP and, therefore, considered in our load balancing problem, with F t denoting the flows of STA t. The traffic shaping value λ t is configured at STA t, λ LOSS t is the loss in frames/sec that is introduced by this shaper, and D t is its queueing delay.
We select six criteria for MCDA to evaluate for an AP b: (i) the overall channel load θ b in B/s; (ii) the total measured throughput μ b of both UL flows and DL slices; (iii) the total expected throughput μ EXP b of both UL flows and DL slices; (iv) the total measured queueing delay D b ; (v) t RSSI b , the RSSI perceived at b from STAs within range; and, (vi) an indicator variable t b , which evaluates to true if STA t is associated with AP b. The first four criteria are minimized in order to avoid resource overuse. We use (iv) to avoid APs with a high number of active or overflowing queues. This reduces the chance of a Network Interface Card (NIC) overload and channel saturation. The last two criteria are maximized to improve the chances of using higher data rates, and of fewer connection disruptions, respectively.
The overall measured throughput, μ b , comprises both UL and DL load measured at b. The dequeueing rate (i.e., throughput) of slice s is denoted μ s , while μ f , t denotes the measured throughput of flow f measured from STA t. Therefore,
μ b = s S b μ s + t T f F t μ f , t · t b , b B .
On the other hand, the overall expected throughput μ EXP b of b is:
μ EXP b = s S b t T μ EXP s , t · t b + t T f F t μ EXP f , t · t b , b B ,
where μ EXP s , t is the expected throughput for STA t in slice s and μ EXP f , t is the expected UL throughput for flow f from STA t. Note that the expected throughput is calculated based on flow demands, while the actual throughput is measured at the APs. Furthermore, the overall queueing delay D b of b is calculated as the aggregated queueing delay of its slices. Thus,
D b = s S b D s , b B ,
where D s is the average queueing delay within slice s. Some slices, in turn, specify QoS requirements for throughput and queuing delay of certain flows, denoted μ QoS s and D QoS s , accordingly. In addition to DL traffic, STAs might also require QoS support. Therefore, μ QoS f , t specify the throughput requirements of a flow f from STA t. Last but not least, t b is a binary variable, indicating whether the STA t is associated with AP b. Therefore, for all b B and all t T :
t b = 1 if STA t is associated with AP b , 0 otherwise .
The weight of each criterion depends on the flow type, either QoS or BE. We use the Analytic Hierarchy Process (AHP) [60] to inform our selection of weights for each flow type, and then tune the resulting weights to avoid the ping-pong effect. In order to avoid STAs performing handovers between APs under similar channel conditions and resource utilization, we use the  t b criterion. Because we maximize this criterion in our MCDA formulation, a higher preference is given to the candidate AP to which STAs are already connected. In this manner, when handover decisions involve APs in such conditions, STAs tend to remain connected to their current APs, thus avoiding the ping-pong effect. Another consideration is that we want BE flows to be more likely to undergo handovers than QoS ones, because handovers are detrimental to meeting the QoS requirements. Therefore, we provide different weights for QoSs flows in order to account for this need. Table 4 lists the MCDA criteria and the resulting weights by flow type ( W BE and W QoS ).
Several guidelines exist for choosing the appropriate method to solve an MCDA problem [61]. Given that our problem has quantitative weights, a quantitative scale of comparisons, no uncertainty, and it is characterized by a complete ranking, we select the Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) method [62]. TOPSIS ranks the alternative solutions by minimizing the distance to the positive ideal solution and maximizing the geometric distance from the negative ideal solution. Next, we show how to use the solution to our MCDA problem in order to perform load balancing among the APs.

4.2. Using MCDA in the User Association Algorithm

Our user association algorithm is given in Algorithm 1. At a high level, this algorithm periodically decides to which AP each STA should be assigned while using MCDA. In each round, TOPSIS ranks the candidate APs for STAs to perform handovers and the best AP is selected. Thereafter, the algorithm triggers the handovers. We now describe the algorithm in more detail.
In order to avoid handover decisions being made for STAs in the same order each round, the algorithm randomizes the order of STAs in each reconfiguration loop (line 11). Additionally, handovers are only considered for STAs with active flows. Subsequently, the expected throughput of t is calculated based on its active DL slices and UL flows, followed by the selection of MCDA weights (lines 13 and 14). The weights W t vary by flow type: The  W QoS defines the weights used if an STA t is being served by a flows in a QoS slice or have UL flows with QoS requirements; otherwise, W BE is used. In addition to the statistics, the algorithm calculates the expected throughput of each AP according to STAs distribution and their flow demands (line 16).
Using expected throughput can cause the ping-pong effect, because the expected throughput of the AP to which an STA is connected will be higher than when the STA is not connected. To avoid this problem, we consider the expected throughput of the AP without the load of the STA under consideration. Therefore, we subtract the expected throughput of an STA t from the overall expected throughput of the AP with which it is connected (line 18). This prevents the expected throughput of t from affecting its own handover decisions. TOPSIS is then used to solve the MCDA problem; it returns b BEST , the highest-ranked AP according to the criteria (line 20). An STA only undergoes a handover if it is not associated with its top-ranked AP b BEST (line 22).
First, the algorithm gathers the statistics monitored from all APs (line 9). For each AP, this includes the overall channel load, the measured throughput as the sum of the throughput of all slices and all flows measured from the STAs associated with it, the measured queueing delay of all slices, and the measured RSSI. For brevity, we use b STATS to represent all of these statistics of an AP b.
Given that APs are usually set to operate on different channels, our algorithm avoids excessive handovers per reconfiguration loop, so as to minimize the impact of switching channels on throughput and delay of flows. In case of a handover between APs operating on different channels, the Channel Switch Announcement (CSA) mechanism is triggered. CSA is defined by the IEEE 802.11h amendment in order to enable APs to announce switching to a new channel before their transmission begins on that channel. Beacon messages containing the CSA information are sent to The STA before it switches to the new channel. This allows STAs, which support CSA, to move to the new channel with minimal downtime.
Our algorithm also avoids executing multiple handovers on a single AP in each reconfiguration loop. Except for the expected throughput, the measured statistics do not reflect the network re-configurations instantaneously and this might cause inappropriate handover decisions. Therefore, in each reconfiguration loop, B HANDOVER is the set of APs in which handovers have been performed. Hence, handovers only happen for STAs, in which their current AP or highest-ranked AP did not undergo handovers in the present reconfiguration loop (line 21).
Algorithm 1 User Association Algorithm
Input:
 1: e v e r y                      ▹ configuration loop interval (20 s used)
 2: C , W QoS , W BE                   ▹ set of MCDA criteria and weights
 3: s S b : D QoS s                 ▹ max queueing delay of each slice s
 4: s S b : μ QoS s                    ▹ min throughput of each slice s
 5: f F , t T : μ QoS f , t          ▹ min-avg throughput of each flow f from STA t
 6: s S b : μ EXP s , t                 ▹ expected throughput of each STA t


 7: loop  e v e r y
 8:     for each b B do                     ▹ iterate over all APs
 9:          b STATS  getRBStats(b)

 10:      B HANDOVER
 11:     for each t random.shuffle(t) do               ▹ iterate over all STAs
 12:         if getActiveFlows(t) then
 13:             μ EXP t getSTAExpectedLoad(t)
 14:            W t getSTAWeights(t)
 15:           for each b B do                    ▹ iterate over all APs
 16:                 μ EXP b = getRBExpectedLoad ( b , μ EXP t )
 17:                if t b = t r u e then
 18:                 μ EXP b = μ EXP b μ EXP t
 19:                 TOPSIS . ALTERNATIVE ( C , W t , μ EXP b , b STATS )
 20:             b BEST TOPSIS . BESTALTERNATIVE ( )
 21:            if t b BEST t r u e and b , b BEST   B HANDOVER then
 22:                 doHandover ( b BEST )                 ▹ handover to AP b BEST
 23:                 B HANDOVER + b , b BEST


 24:
 25: function  getSTAWeights(t)
 26:     for each f F t do        ▹ iterate over all flows generated at a given STA
 27:         if μ QoS f , t then return W QoS
 28:     for each s S b do                ▹ iterate over all slices of an AP
 29:         if D QoS s or μ QoS s then return W QoS
 30:     return W BE
 31:
 32: function  getSTAExpectedLoad(t)
 33:      μ EXP t 0
 34:     for each s S b do              ▹ iterate over all slices of an AP
 35:          μ EXP t = μ EXP t + μ EXP s , t
 36:     for each f F t do       ▹ iterate over all flows generated at a given STA
 37:          μ EXP t = μ EXP t + μ EXP f , t
 38:     return μ EXP t
 39:
 40: function getRBExpectedLoad( b , μ EXP t )
 41:      μ EXP b 0
 42:     for each t T do                    ▹ iterate over all STAs
 43:         if t b = t r u e then
 44:             μ EXP b = μ EXP b + μ EXP t

 45:     return μ EXP b

4.3. Network Slicing Algorithm

Algorithm 2 is used for adapting the network slice configurations at runtime. In addition to the quantum adjustments, this adaptation is based on three thresholds: the maximum queueing delay of the QoS slices, the minimum throughput of the QoS slices, and the minimum throughput of the QoS flows that were measured from the STAs. The network slicing algorithm aims to satisfy the QoS requirements of the QoS flows in both DL and UL directions. By reallocating resources from the BE slices, the algorithm delays the traffic dequeued from the BE slices in favor of the QoS-constrained traffic. Periodically, the algorithm checks, for each AP, whether the requirements of all QoS slices and all QoS UL flows measured from STAs that are associated with it are met. When all of the requirements are met, the quantum value of the BE slices, sharing the AP, is increased by a factor of Q INC (line 21), releasing resources until all of the slices equally share the AP. Otherwise, the quantum value of the BE slices is decreased by a factor of Q DEC (lines 14, 16, and 20), delaying such traffic from being dequeued. This leaves more resources for the QoS-constrained slices and the channel less busy for any QoS-constrained flows from STAs, favoring them to be satisfied (recall Section 3.1).
Algorithm 2 Network Slicing Algorithm
Input:
 1: e v e r y                   ▹ configuration loop interval (5 s used)
 2: s S b : D QoS s                ▹ max queueing delay of each slice s
 3: s S b : μ QoS s                  ▹ min throughput of each slice s
 4: f F , t T : μ QoS f , t         ▹ min throughput of each flow f from STA t
 5: Q MIN , Q MAX              ▹ min, max quantum (10 us, 12,000 us used)
 6: Q INC , Q DEC              ▹ increase, decrease factors ( 10 % , 90 % used)


 7: loop  e v e r y
 8:     for each b B do                     ▹ iterate over all APs
 9:         reconfigure(b,requirementsMet(b))


 10:
 11: function  requirementsMet(b)
 12:     for each s S b do               ▹ iterate over all slices of an AP
 13:         if D QoS s then
 14:           if D s > D QoS s then return Q DEC

 15:        if μ QoS s then
 16:            if μ s < μ QoS s then return Q DEC


 17:     for each t T do                    ▹ iterate over all STAs
 18:         for each f F t do
 19:            if μ QoS f , t and t b = t r u e then
 20:                if μ f , t < μ QoS f , t then return Q DEC


 21:     return Q INC

 22:
 23: function  reconfigure( b , Q FACTOR )
 24:     for each s S b do               ▹ iterate over all slices of an AP
 25:         if ( D QoS s = = and μ QoS s = = ) then
 26:             Q s getCurrentQuantum(s)
 27:             Q NEW s Q s · Q FACTOR
 28:            if Q NEW s > Q MAX then Q NEW s Q MAX
 29:            if Q NEW s < Q MIN then Q NEW s Q MIN
 30:            if Q NEW s Q s then b.setSlice ( Q NEW s )    ▹ set new slice quantum on AP
In the slicing algorithm, both throughput and queueing delay requirements are verified. For throughput, the algorithm checks the SMA of the last ten measurements. For queueing delay, the algorithm checks the SMM instead to avoid the masking effect in the presence of outliers. A new quantum Q NEW s is set for a slice on an AP only when it differs from its current one. Q MIN and Q MAX are thresholds that prevent traffic in BE slices from being blocked and from exceeding a maximum quantum configuration, respectively. Recall that, in the ADWRR scheduling algorithm, inactive traffic rules do not cause any performance degradation to the system. The ADWRR scheduling algorithm only iterates over active queues/slices. In addition, limiting the resources that a slice might utilize only occurs when multiple slices of an AP remain active and, therefore, must compete for access to the same NIC; otherwise, a slice may freely utilize all of the resources available.

4.4. Traffic Shaping Algorithm

Algorithm 3 is used for managing the traffic from STAs by shaping UL traffic. The traffic shaping adjustments are again based on three thresholds: the maximum queueing delay of the QoS slices, the minimum throughput of the QoS slices, and the minimum throughput of the QoS flows measured from the STAs. While using the same principle as Algorithm 2, the traffic shaping algorithm tries to satisfy the QoS requirements of the QoS flows in both DL and UL directions. By adjusting the traffic shaping configuration of STAs, which have BE flows only, the algorithm reduces the amount of traffic sent in favor of QoS-constrained traffic.
In each reconfiguration loop, the algorithm checks, for each AP, whether the requirements of all QoS slices and all QoS-constrained flows from the STAs associated with it are met. When all of the requirements of an AP are met, the traffic shaping configuration of the STAs, which have BE flows only and they are sharing the AP with a QoS-constrained flow from an STA or slice, is increased by a factor of λ INC (line 21). Otherwise, the traffic shaping configuration is decreased by a factor of λ DEC (line 14), reducing all of the traffic sent by those STAs, leaving the channel less busy for the QoS-constrained flows from STAs and slices.
Similar to Algorithm 2, throughput and queueing delay requirements are checked in order to ensure they are met; the SMA is used for throughput and the SMM for queueing delay. In addition, the algorithm verifies whether STAs have active flows, otherwise no reconfiguration is required. A new traffic shaping configuration λ NEW s is set for an STA, only when it differs from its current one. λ MIN and λ MAX are thresholds that prevent that traffic shaping configuration from exceeding minimum and maximum boundaries, which prevents STAs from having all connectivity blocked or from exceeding a maximum traffic shaping configuration.
Algorithm 3 Traffic Shaping Algorithm
Input:
 1: e v e r y                   ▹ configuration loop interval (5 s used)
 2: s S b : D QoS s                ▹ max queueing delay of each slice s
 3: s S b : μ QoS s                  ▹ min throughput of each slice s
 4: f F , t T : μ QoS f , t         ▹ min throughput of each flow f from STA t
 5: λ MIN , λ MAX     ▹ min, max value for The traffic shaper. (1 Mbps, 100 Mbps used)
 6: λ INC , λ DEC              ▹ increase, decrease factors ( 10 % , 90 % used)


 7: loop  e v e r y
 8:     for each b B do                     ▹ iterate over all APs
 9:         reconfigure(b,requirementsMet(b))


 10:
 11: function  requirementsMet(b)
 12:     for each s S b do               ▹ iterate over all slices of an AP
 13:         if D QoS s then
 14:           if D s > D QoS s then return λ DEC

 15:        if μ QoS s then
 16:            if μ s < μ QoS s then return λ DEC


 17:     for each t T do                    ▹ iterate over all STAs
 18:         for each f F t do
 19:            if μ QoS f , t and t b = t r u e then
 20:                if μ f , t < μ QoS f , t then return λ DEC


 21:     return λ INC

 22:
 23: function  reconfigure( b , λ FACTOR )
 24:     for each t T do                    ▹ iterate over all STAs
 25:         if t b = t r u e then
 26:            for each f F t do
 27:                if all ( f = = for f in μ QoS f , t ) and getActiveFlows(t) then
 28:                     λ t getCurrentTrafficShaper(t)
 29:                     λ NEW t λ t · λ FACTOR
 30:                    if λ NEW t > λ MAX then λ NEW t λ MAX
 31:                    if λ NEW t < λ MIN then λ NEW t λ MIN
 32:                    if λ NEW t λ t then t . s e t T r a f f i c S h a p e r ( λ NEW t ) ▹ set traffic shaping on STA

5. Evaluation

In this section, we present the evaluation of our approach in a real-world testbed. Figure 6 depicts the layout of the testbed. The setup is made up of a single computer hosting the SD-RAN and backhaul controllers, three APs, and six STAs. The computer hosting the controllers is connected to the wired segment as well as the APs. The APs are based on the PC Engines APU2D4 (x64) processing board, equipped with one Qualcomm Atheros AR958x 802.11 a/b/g/n each. The STAs are Raspberry Pis 4 Model B+ with 802.11b/g/n/ac.
In our setup, APs and STAs are positioned in three rooms, including two offices that are separated by a server room. We have set the APs to operate on non-overlapping channels, specifically on channels 1, 6, and 11 for APs 1, 2, and 3, respectively. The supported Modulation and Coding Scheme (MCS) rate indices are from 0 to 7, because the STAs operate in the 2.4 GHz band. Our experiments were conducted in a closed office environment with little to no external interference. With this setup, we evaluate whether QoS delivery can be enhanced targeting MCAs, such as process automation and remote control. Although our setup is built in an office environment, in future digital factories, production lines are usually confined to specific locations under private ownership; therefore, the level of interference in such private spaces can also be controlled.
Process automation and remote control encompasses the use case scenario for the automation of reactive flows requiring low latency and high service availability (e.g., refineries and water distribution networks). Within digital factories, some of the interactions among components are conducted by automated control applications. The monitoring and management of distributed control systems usually takes place in a dedicated control room and there is the need for controlling real-time data provided to the control room, by the local staff. For such MCAs, the typical end-to-end latency expected is to be around 50 ms and the user experienced data rates, communication service availability, and connection density may vary. According to [2], while the staff on location needs to view inaccessible locations (e.g., emergency valves) with high definition, the personnel in the control room benefit from high-definition footage (High-Definition (HD) or even 4K) from body cameras. Thus, these applications require data rates that range from 1 Mbps to 100 Mbps. In our experimentation, we run services where the queueing delay and throughput requirements are similar to these expected boundaries. Queueing at the RAN often presents bottlenecks when resources becomes scarce, which makes it essential to avoid such bottlenecks that degrade the performance of MCAs.
We generate several User Datagram Protocol (UDP) flows, in which each flow represents a different service in the network. For each DL flow, the SD-RAN controller creates a dedicated slice with the default quantum Q s of 12,000 us on the AP in which the STA is receiving such a flow. We have set equal quantum configurations to slices in order to verify whether MCA application requirements can be satisfied when resources are equally distributed, hence verifying the need for performing airtime-based network slicing at runtime. The backhaul controller is instructed by the SD-RAN controller to install the corresponding traffic rules (i.e., OpenFlow rules) and map flows into slices. On the other hand, for each of the UL flows, the SD-RAN controller sets an initial traffic shaping configuration λ t of 100 Mbps to all STAs. This value was chosen to bootstrap the traffic shaping configuration while not compromising the throughput of STAs in advance. The traffic is generated between the computer hosting the controllers and the STAs in both DL and UL directions. In order to avoid static flow rates and arrival times, we generated the flows following the Poisson distribution with MGEN (https://www.nrl.navy.mil/itd/ncs/products/mgen), a toolset for generating real-time traffic patterns, having a fixed frame size of 1024 bytes. The parameters used for the user association, network slicing, and traffic shaping algorithms are given in Algorithms 1–3. For the evaluation, we created the following three experimental setups:
  • Experiment 1: we evaluate four different scenarios to show how our network slicing and traffic shaping algorithms can provide enhanced QoS delivery when flows of different priorities classes (BE and QoS) and in different directions have to compete with one another. These scenarios were run for five minutes each, with only 200 s presented.
  • Experiment 2: we compare the performance of our approach to a state-of-the-art user association approach from Gómez et al. [5]. We run flows in the DL direction and analyze whether our approach can enhance the QoS delivery of the QoS-restricted slices dedicated to such flows, at runtime. We analyze whether the QoS requirements for throughput and queueing delay can be maintained along the experiment run. This experiment was run for ten minutes.
  • Experiment 3: we analyze whether our whole system can enhance QoS delivery, again in comparison to the approach from Gómez et al. We run flows in both directions and analyze whether the QoS requirements for throughput and queueing delay of slices can be maintained along the experiment run. This experiment was run for ten minutes.
In this paper, we assume no QoS differentiation among QoS services themselves, especially when they compete for resources on the same AP. In such cases, as we consider that they belong to the same group of MCAs and, therefore, are equally important. Thus, our premise is to provide them an equal amount of resources. As defined, the ADWRR scheduling algorithm does not allow for limiting the maximum throughput of slices; this problem requires a new implementation and it is part of our future work. Although QoS differentiation could be addressed with an intra-AP perspective, when multiple APs are sharing a channel and have conflicting QoS requirements, the problem is complex and often without a feasible solution. Because of this, we consider this problem outside the scope of our work. Our evaluation focuses on identifying whether the queues on APs represent bottlenecks that compromise the QoS required by MCAs. We also evaluate whether our approach is capable of enhancing the QoS delivery of such MCAs at runtime, under high, but feasible, demands. In order to prevent QoS slices from overuse of resources, we assume that any SDN-based admission control system can be introduced as necessary.

5.1. Experiment 1: Traffic Shaping and Airtime-Based Network Slicing

In this experiment, we evaluate whether our solution can satisfy the QoS requirements when flows of different priority classes (BE and QoS) and in different directions (UL and DL) are served by a single AP. For this purpose, we used a single AP and two STAs to provide a better understanding of how our solution acts and what are the obtained results. Specifically, we use STAs 1 and 2 connected to AP 1 for this first experiment. Table 5 contains the different scenarios that we evaluate.

5.1.1. Scenario A: UL BE versus UL QoS

Figure 7 presents the throughput, queueing delay, and frame loss, along with the traffic shaping configurations for scenario A. In this scenario, two UL flows are competing for the channel: a BE flow originating from STA 1 and a QoS flow originating from STA 2. The QoS flow requires a guarantee of 10 Mbps of throughput.
In order to highlight the need for traffic shaping, we start both flows and, only after a few seconds (at second 25), we activate our approach to verify whether QoS requirements are met or not. Recall that, to verify the throughput requirements, the controller considers the SMA of the last ten measurements, i.e., the SMA of the last ten measurements. Because the throughput of the QoS flow was, on average, below its QoS requirements (i.e., below 10 Mbps), the traffic shaping configuration of STA 2 transmitting the BE flow is decreased. The increase and decrease rates used correspond to 10 % and 90 % of its current value, while the reconfiguration frequency is set to ten seconds.
As expected, the traffic shaping configuration of STA 2 continues to decrease until the QoS requirements of flows and slices served by the AP are met or its configuration reaches the λ MIN of 1 Mbps. As we see, both the queueing delay and frame loss of STA 2 increase when the traffic shaping configuration is below its throughput. If all the QoS requirements are met, the traffic shaping configuration is gradually increased until it reaches the λ MAX of 100 Mbps. While such traffic shaping imposes frame loss and an increase on the queuing delay of STA 1 originating the BE flow, it allows for the QoS flow to better maintain its throughput requirement.

5.1.2. Scenario B: UL BE versus DL QoS

In this scenario, we introduce a BE flow in the UL direction at STA 1 to compete against a QoS flow, handled by a QoS slice, in the DL direction at STA 2. The queueing delay of the QoS slice should be less than 30 ms. In this scenario, we expect shaping to be activated on STA 1 in order to fulfill the QoS requirements of STA 2. However, even after increasing the throughput demand of STA 2 to 20 Mbps, the results show that the QoS requirements were met without traffic shaping. We believe this is because IEEE 802.11 networks are known to have unfairness between UL and DL accesses under the Distributed Coordination Function (DCF) [63] and, in this scenario, the UL/DL throughput was unbalanced. This favored the queueing delay requirements of the QoS slice to be satisfied, against our expectations. Figure 8a presents the throughput, traffic shaping configuration, queueing delay, and frame loss of STA 1 (the STA that originates the BE flow) along with the throughput and queueing delay of the QoS slice handling the traffic towards the controller (through the AP), while using the original Raspberry Pi node.
We swapped STA 1 with a node capable of transmitting frames using higher MCSs indexes similar to the transmission capabilities of the AP in order to confirm our belief and demonstrate the traffic shaping in this scenario. For this, we used a PC Engines APU2C4 node that was equipped with Qualcomm Atheros QCA986x/988x 802.11b/g/n/ac. Thus, the UL flow originating from this node comprises a QoS slice and traffic shaping is needed. Figure 8b presents the results for this scenario with the more capable node. In Figure 8a, although D QoS S T A 2 was not met for short intervals (≈ 5 s) due to the Address Resolution Protocol (ARP) messages, Algorithm 3 uses the SMM of the last ten measurements to indicate whether such requirements are met or not. If the reconfiguration loop does not coincide with the periods where the SMM indicates that the QoS requirements for the queueing delay are met, the traffic shaping configuration is not decreased.
After the QoS slice starts dequeueing its frames and, therefore, competes for the channel with the UL flow, traffic shaping at STA 1 is applied. Around second 50, the traffic shaping configuration starts to decrease and, as a result, the queueing delay and frame loss for the UL flow increase accordingly, as Figure 8b shows. When the QoS is met, the value of the traffic shaping configuration is increased and both queueing delay and frame loss decrease until the configuration reaches the λ MAX of 100 Mbps. When the queueing delay of the QoS slice is affected by the ARP messages and the reconfiguration loop gets triggered (at around second 155), the traffic shaping configuration decreases once again. As a consequence of such spikes on both queueing delay and throughput measurements, in our approach, one can set different parameters to he measurement window and, therefore, consider those to be outliers. However, as a trade-off, several additional samples are required in order to identify that network re-configurations have impacted the measurements. In this manner, in addition to higher or lower adaptation rates, one can set the size of the measurement window resulting in a more steady or loose behavior for the BE flows.

5.1.3. Scenario C: DL BE versus UL QoS

Until now, only traffic shaping was performed. In this scenario, we run an UL flow with QoS requirements that competes with a BE flow that is handled by a BE slice. In this case, actions upon the BE slice are required. Because the ADWRR does not provide the means to limit the maximum throughput of slices, the traffic flowing through a slice can be either delayed by decreasing its quantum configuration, or blocked by assigning a non-positive value to its quantum configuration. We set the parameters of Algorithm 2 to not block The entire flow of any slice, but to attempt to introduce delay by reducing its quantum configurations. Figure 9a presents the throughput of the UL QoS flow and the throughput, queueing delay, and quantum configuration of the DL BE slice.
While the load of the UL flow is 15 Mbps, the QoS throughput threshold is only 10 Mbps. As we see when the QoS flow starts (at around second 40), its throughput is less than half of what is required. Therefore, Algorithm 2 performs quantum adjustments on the BE slice running on the AP. The algorithm starts to decrease the quantum configuration until all QoS requirements are met or its value reaches the Q MIN of 10 us. When the 10 Mbps throughput is met, the quantum is gradually increased and, as a result, frames are dequeued at a faster pace and queueing delay reduces. When QoS is met, the quantum configuration increases instead with an upper bound Q MAX of 12,000 us. The increase and decrease rates used for the quantum adaptation correspond to 10 % and 90 % of its current value, as presented in Algorithm 2.

5.1.4. Scenario D: DL BE Versus DL QoS

In this scenario, two slices of different priority classes (BE and QoS) compete for resources on the same AP. The QoS slice requires that its queueing delay remains less than 30 ms for a throughput demand of 15 Mbps. Figure 9b presents the throughput, queueing delay, and quantum configuration of both the BE and QoS slices.
As we can observe, after the QoS slice starts dequeueing its flow, both BE and QoS slices compete for the resources of the AP. At this time, because slices have the same quantum configuration, both STAs receiving such flows experience similar channel conditions and the data rates used for their transmissions are similar. Both throughput and queueing delay are also similar; however, the queueing delay experienced by both corresponds to almost 400 ms each. Therefore, Algorithm 2 is activated and the quantum of BE slice starts to adjust around second 40. When the QoS requirements of the QoS slice are not met, the quantum configuration for the BE slice is decreased until the QoS requirements are met or the quantum configuration of the BE slice reaches the Q MIN of 10 us. When the QoS requirements are satisfied, the quantum configuration of the BE slice is gradually increased until the QoS of the QoS is satisfied or its value reaches the Q MAX of 12,000 us.

5.2. Experiment 2: DL QoS Delivery and User Association

In experiment 2, we evaluate whether our approach can enhance the QoS delivered when the network only has DL flows. Recall that, for each DL flow, a dedicated slice is created in order to handle the flow. In this case, only network slicing is performed, with no traffic shaping occurring on the STAs, although we expect our solution to perform MCDA-based handovers when necessary. We compare our approach to the user-association algorithm from Gómez et al. Their approach uses the average RSSI of an AP, AP load, and channel occupancy to determine which AP is ideal for a given STA. In addition to those factors, our approach considers the queueing delay of slices, the expected load on APs, and the association status of STAs. Table 6 presents the workload parameters used in experiment 2. We start each experiment with The following initial STA/AP association: STAs 1 and 2 are associated with AP 1, STAs 3 and 4 with AP 2, and STAs 5 and 6 with AP 3. The experiment was run for a total of ten minutes, with four events occurring within the first third of the experiment. This was done in order to show the performance of the system during a period, where the network demand varies, as well as a more consistent, less active period.
Figure 10 shows the association of the STAs among the three APs throughout the duration of the experiment, while using both of the approaches. The red vertical dotted lines illustrate when the events occur. There are no flows active at the beginning of the experiment, so, with the approach from Gómez et al., the ideal AP is determined by overall channel load and RSSIs. Additionally, since there are no active flows in the network and handovers at this point might be unnecessary and cause overhead to APs and controller, our approach does not compute any user re-association. For both of the experiments, two STAs are associated with each AP to begin the experiment.
At event 1, two DL flows of 20 Mbps each (BE flows 3 and 4) are started from the controller to STAs 3 and 4, respectively. Handovers begin to occur with the first iteration of the reconfiguration loop at second 20. As we can observe, both of the approaches perform their first handovers. With yhe approach from Gómez et al., STAs 3 and 4 are moved from AP 2 to AP 1, as well as STA 6 from AP 3 to AP 1. The algorithm computed that the channel load of AP 1 in conjunction with the RSSI gathered from these STAs is favorable, and, therefore, triggered the handovers accordingly. Because there is no flow active at AP 3, STA 6 most likely moved based on the average RSSI. However, with the next reconfiguration, STAs are handed off to AP 3, since the AP load at AP 1 is now high. This is an example of the algorithm from Gómez et al. experiencing the ping-pong effect. In contrast, since our approach allows for one handover per AP pair at each reconfiguration loop, only STA 4 suffers a handover as a result of event 1. Once it is moved to AP 1, APs 1 and 2 experience similar loads, while AP 3 remains free until the next events occur. Uneven loads, such as this, can occur, because only two STAs are being served, while three APs are available. This can lead to the ping-pong effect. as we can observe with Gómez et al. With our approach, the ping-pong effect does not occur, as it considers the association status of STAs and expected load of APs.
Event 2 occurs at second 70, and introduces two more BE flows, this time to STAs 2 and 5. With our approach, as the load of APs are similar, so this event does not require handovers. With the approach from Gómez et al., STA 5 does not suffer a handover, while the rest of the STAs move quite frequently. We believe that the reason for this behavior is because the RSSIs perceived for APs 1 and 2 are either not favorable, or unavailable. We analyze the RSSI measurements in Section 5.2.1. Although, in our scenario, all STAs are reachable and perceived by all APs, this might not always be the case. When STAs are not perceived by all APs, the alternatives APs are filtered out according to whether the average RSSIs, perceived from STAs, can be computed or not. When we run the approach from Gómez et al., STAs only perform a handover if the selected AP has measured RSSIs. When there are no measurements regarding the RSSI, the algorithm assumes that the STA is not within range for the APs, so handovers to those are not considered.
At event 3, we can see that Gómez et al. performs three handovers, moving STAs 3, 4, and 6 to AP 2. This is appropriate, as AP 2 had the lowest load of all three APs. Our algorithm also moves STA 3 back to AP 2. At this point, there are only active flows going to STAs 2 and 5, which are associated with separate APs in our approach. At event 4, the first QoS flows are introduced, going to STAs 1 and 6, with loads of 10 Mbps and 8 Mbps, respectively. In our approach, neither STA 1 nor STA 6 suffer a handover after event 4. In fact, neither STA suffers a handover for the duration of the experiment. Meanwhile, with Gómez et al., while STA 1 does not suffer handovers after event 4, STA 6 suffers 12 handovers, while it is receiving a QoS flow. This negatively impacts its QoS requirements, as handovers require the STA to change channels when switching APs, resulting in more downtime, less throughput, and higher delay. Additionally, the Gómez et al. approach also performs many handovers of STAs 2 and 4 after event 4, which leads to more performance degradation among BE flows as well. Overall, our approach only performed two handovers, while the Gómez et al. approach performed 60 handovers, since it suffered from the ping-pong effect. This impacted both queueing delay and throughput when running both of the approaches.
Figure 11 shows the Cumulative Distribution Function (CDF) graphs for both queueing delay and throughput for both approaches. These graphs show the likelihood of achieving a certain throughput or queueing delay during the experiment. The red vertical dotted lines show the QoS requirements for the QoS flows. Regarding throughput, since we are interested in showing the likelihood of flows having higher value occurrences, we show the inverse CDF. We can observe, from Figure 11a,b, that flow QoS 1 never reached its QoS requirement, while QoS flow 2 has less than 1 % chance of meeting its requirement for the Gómez et al. approach. On the other hand, looking at Figure 11c, we can see that, with our approach, the same flows have a 74 % and 86 % chance to meet the queueing delay of QoS flow 1 and 2 while the throughput is met with a 63 % and 85 % probability for QoS 1 and 2, respectively.
Figure 12 presents the overall throughput and queueing delay while using box-and-whiskers plots for both approaches, with Figure 12a presenting the queueing delay and Figure 12b presenting throughput. Looking first at the results that were obtained with Gómez et al., we observe that the overall throughput for flow QoS 1 fails to meet its QoS requirement and flow QoS 2 only the lower whisker meets its QoS requirement. In contrast, in our approach, the upper quartile meets the requirement for flow QoS 1, and all of the quartiles meet the requirement for flow QoS 2 with only outliers from periodic spikes that are caused by control messages lying above the requirement. In other words, most of the time our approach is able to achieve the desired QoS requirements. For BE flows, our approach generally has much tighter variation among delay for its flows, while the delay for Gómez et al. varies highly.
For the dequeueuing rate, we can see that our approach yields higher throughput for both QoS flows, although, for QoS 1, the median lies at the requirement, which means that it does not fully satisfy the requirement all of the time. In contrast, Gómez et al. does not come close to meeting the QoS requirement for the QoS flow 1, with its median throughput around 3.5 Mbps. For flow QoS 2, only the upper whisker meets the throughput requirement. Similar to queueing delay, the throughput of the BE flows while using our approach are much tighter, with slightly higher medians. Using Gómez et al., the throughput of the BE flows have a higher variation and slightly lower medians.

5.2.1. RSSI and User Association

In order to better understand the user association behavior in our setup, we monitor the RSSI perceived from STAs after their initial association with the APs. We collect the results for a period of ten minutes, where only ARP-related messages are flowing. Figure 13 present the RSSI measurements of STAs during the experiment run.
We observe that STA 5 is rarely perceived by APs 1 and 2, only when RSSIs are slightly higher than usual. This explains why STA 5 tends to be connected to AP 3. When RSSIs are not perceived by an AP, such an AP is not considered in subsequent handover decisions. For example, in some scenarios, not all STAs are within the range of APs and, therefore, must be filtered out. Nonetheless, when RSSIs are present, both of the approaches can apply their methods and consider such APs as alternatives for handovers. Given that the approach by Gómez et al. performed the most handovers in experiment 2, we run it again with the goal of verifying the user association with the RSSI measurements. Figure 14 shows the RSSI measurements and the association status running Gómez et al. with the workload presented in Table 6. The red vertical dotted lines illustrate when the events occur.
In Figure 14a, we observe that the RSSIs are similar to our previous run when only the traffic regarding ARP is flowing. However, as a consequence of the flows that were introduced by the events (Table 6), we observe a higher number of RSSI measurements. In this experimental run, AP 2 presents lower RSSIs in general, while AP 1 and AP 3 divide the best alternative AP according to this single criterion. Besides, we see that there are no RSSI measurements for STA 5 at APs 1 and 2. Therefore, in Figure 14b, STA 5 associates with AP 3 for the entire duration of the experiment.

5.3. Experiment 3: UL/DL QoS Delivery and User Association

For experiment 3, we have four similar events that occur in the first third of our ten-minute experiment. Now, we introduce BE and QoS flows in the UL direction. Table 7 presents the workload parameters that were used in this experiment. After the flows start, they run for the duration of the experiment, although BE flows 3 and 4 stop for a minute at event 3. As in the previous experimentation, we start each experiment with the following initial STA/AP association: STAs 1 and 2 are associated with AP 1, STAs 3 and 4 with AP 2, and STAs 5 and 6 with AP 3. In this way, we can verify whether the QoS requirements can be maintained throughout the duration of the experiment.
Similar to experiment 2, we present the STA–AP associations throughout this experiment in Figure 15. Here, we can see a stark contrast between the two approaches. With our approach, only a single handover is performed, while, with Gómez et al., 128 handovers are performed. Although our approach makes use of queueing delay and the expected load of flows to decide upon handovers, the results clearly show the need for considering the cost of a handover to prevent the ping-pong effect. With our approach, only a single handover per AP pair is allowed to be performed at each reconfiguration loop. The lone handover occurs just after event 1, when two DL BE flows start from the controller to STAs 5 and 6 and, in this case, are flowing through the same AP. i.e., AP 3. Our algorithm separates these two flows onto two separate APs in order to achieve enhanced throughput results.
On the other hand, when running the approach from Gómez et al., most of the handovers throughout are caused by the ping-pong effect. One notable detail is that STA 5 does not suffer a handovers during the experiment with Gómez et al., and this happens due to the same reason, as discussed in experiment 2. In short, RSSIs froth STA 5 are mostly not favorable or not available on APs 1 and 2.
In Figure 16, we present the CDF results for both throughput and queueing delay of slices on the APs, as well as the throughput measured from the UL flows. Again, the red vertical dotted lines show the requirements for the QoS flows. With the approach for Gómez et al., apart from an outlier for the throughput, both throughput and queueing delay requirements are never met. Meanwhile, our approach achieves the QoS requirements during most of the experimental duration. For the DL flow (QoS flow 1), the QoS requirements for both queueing delay and throughput of 5 ms and 10 Mbps are met with 93 % and 66 % of likelihood, respectively. For the throughput of the UL flow (QoS flow 2) is met for 76 % of its active period.
Figure 17 presents the overall throughput and queueing delay of slices and the overall throughput measured from the UL flows as box-and-whiskers plots. We can see that Gómez et al. achieves approximately equal delay for all flows, with much higher variability for BE flows, but it does not satisfy the QoS requirements. Only the bottom whisker lies below the delay threshold. On the other hand, with our approach, delay is achieved most of the time, with all three quartiles as well as the maximum and minimum whiskers lying below the threshold for QoS flow 1, and the median just about the threshold for QoS flow 2. There are outliers in our approach for both of the flows that do not meet the requirements. Similarly, for throughput, Gómez et al. has trouble meeting the QoS requirements for either QoS flow, while our approach achieves them (except for some outliers) for QoS flow 2, and achieves a median at the QoS threshold for QoS flow 1. As with experiment 2, our approach achieves much tighter quartiles for both delay and throughput.

6. Conclusions and Future Work

In this new era of 5G communication, MCAs are imposing stricter QoS requirements on coexisting technologies, such as IEEE 802.11 networks. Because traditional IEEE 802.11 networks are known to achieve insufficient reliability and non-deterministic latency, dynamic, and precise RA mechanisms are essential. In this paper, we proposed a delay-aware approach for MAC management via airtime-based network slicing and traffic shaping, as well as user association while using MCDA in IEEE 802.11 SD-RANs. With the centralized view of the network, our approach performs traffic shaping on the STAs to prevent BE flows from degrading the QoS requirements of others. Differently from most work in the literature, our approach considers QoS and BE flows in both the UL and DL directions.
Focusing on MCAs, we designed our experiments based on the QoS requirements from the use case of process automation and remote control in future digital factories. Through experimentation in a real-world testbed, our results show that our approach enhances the QoS support at runtime, drawing closer to the MCA requirements, as compared to a state-of-the-art user association algorithm [5].
As future work, we plan to address the design of a more deterministic scheduling algorithms for precise QoS service differentiation on the AP, the design of decentralized control algorithms for airtime-shaping and local decision-making, and the use of monitoring information with finer granularity for network management in general.

Author Contributions

Conceptualization, all authors; methodology, P.H.I., D.J.K., and V.R.S.; software, P.H.I. and D.J.K.; validation, P.H.I., D.J.K., and V.R.S.; formal analysis, P.H.I.; investigation, P.H.I.; resources, all authors; writing—original draft preparation, P.H.I., D.J.K., and V.R.S.; writing—review and editing, all authors; visualization, P.H.I.; supervision, J.M.M.-B., L.Z.G., S.L., and V.R.S. All authors have read and agreed to the published version of the manuscript.

Funding

This research received partial funding from a research project of The Flemish Research Fund (FWO), from The European Union’s Horizon 2020 Research and innovation program, under grant agreement No. 826284 (ProTego), from The U.S. National Science Foundation NeTS Award 1813451, and was also supported by the FLEXNET project: “Flexible IoT Networks for Value Creators” (Celtic 2016/3), in the Eureka Celtic-Next Cluster.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data presented in this study are openly available in FigShare at https://doi.org/10.6084/m9.figshare.13607276, reference number 13607276.

Conflicts of Interest

The authors declare no conflict of interest. The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, or in the decision to publish the results.

Abbreviations

The following abbreviations are used in this manuscript:
A-MSDUAggregated MAC Service Data Unit
ADWRRAirtime Deficit Weighted Round Robin
AHPAnalytic Hierarchy Process
APAccess Point
APIApplication Programming Interface
ARPAddress Resolution Protocol
BEBest-Effort
CDFComulative Ditribution Function
CSAChannel Switch Annoucement
CUPSControl/User Plane Split
CWContention Window
DCFDistributed Coordination Function
DLDownlink
DSCPDifferentiated Services Code Point
E2EEnd-to-End
EDCAEnhanced Distributed Channel Access
HDHigh-Definition
HTHigh Throughput
LVAPLight Virtual Access Point
MACMedium Access Control
MCAMission-Critical Application
MCDAMulti-Criteria Decision Analysis
MCSModulation and Coding Scheme
NICNetwork Interface Card
QoSQuality of Service
QoSSQuality of Service Slicing
RAResource Allocation
RANRadio Access Network
RATRadio Access Technology
RSSIReceived Signal Strength Indicator
SD-RANSoftware-Defined Radio Access Network
SDNSoftware-Defined Networking
SLAService Level Agreement
SMASimple Moving Average
SMMSimple Moving Median
SSIDService Set Identifier
STAStation
TCPTransmission Control Protocol
TOPSISTechnique for Order of Preference by Similarity to Ideal Solution
TXOPTransmission Opportunity
UDPUser Datagram Protocol
ULUplink
URLLCUntral-Reliably Low Latency Communication
VHTVery High Throughput

References

  1. 5GPPP Architecture Working Group. View on 5G Architecture. Available online: https://5g-ppp.eu/wp-content/uploads/2018/01/5G-PPP-5G-Architecture-White-Paper-Jan-2018-v2.0.pdf (accessed on 19 January 2021).
  2. 3GPP. Service Requirements for the 5G System; Technical Specification (TS) 22.261; 3rd Generation Partnership Project (3GPP): Valbonne, France, 2020; Version 18.0.0. [Google Scholar]
  3. Coronado, E.; Riggio, R.; Villalón, J.; Garrido, A. Wi-balance: Channel-aware user association in software-defined Wi-Fi networks. In Proceedings of the NOMS 2018—2018 IEEE/IFIP Network Operations and Management Symposium, Taipei, Taiwan, 23–27 April 2018; pp. 1–9. [Google Scholar]
  4. Coronado, E.; Riggio, R.; Villa1ón, J.; Garrido, A. Lasagna: Programming Abstractions for End-to-End Slicing in Software-Defined WLANs. In Proceedings of the 2018 IEEE 19th International Symposium on “A World of Wireless, Mobile and Multimedia Networks” (WoWMoM), Chania, Greece, 12–15 June 2018; pp. 14–15. [Google Scholar]
  5. Gómez, B.; Coronado, E.; Villalón, J.; Riggio, R.; Garrido, A. User Association in Software-Defined Wi-Fi Networks for Enhanced Resource Allocation. In Proceedings of the IEEE WCNC 2020 Conference, Virtual Conference, 25–28 May 2020. [Google Scholar]
  6. Aijaz, A. High-Performance Industrial Wireless: Achieving Reliable and Deterministic Connectivity Over IEEE 802.11 WLANs. IEEE Open J. Ind. Electron. Soc. 2020, 1, 28–37. [Google Scholar] [CrossRef] [Green Version]
  7. Wickboldt, J.A.; Jesus, W.P.D.; Isolani, P.H.; Both, C.B.; Rochol, J.; Granville, L.Z. Software-defined networking: Management requirements and challenges. IEEE Commun. Mag. 2015, 53, 278–285. [Google Scholar] [CrossRef]
  8. Alliance, N. Perspectives on Vertical Industries and Implications for 5G; White Paper; NGMN Alliance: Berkshire, UK, 2016. [Google Scholar]
  9. Vassilaras, S.; Gkatzikis, L.; Liakopoulos, N.; Stiakogiannakis, I.N.; Qi, M.; Shi, L.; Liu, L.; Debbah, M.; Paschos, G.S. The Algorithmic Aspects of Network Slicing. IEEE Commun. Mag. 2017, 55, 112–119. [Google Scholar] [CrossRef]
  10. 3GPP. Study on Management and Orchestration of Network Slicing for Next Generation Network; Technical Report TR 28.801 V15.0.0T; 3rd Generation Partnership Project (3GPP): Valbonne, France, 2017. [Google Scholar]
  11. Coronado, E.; Khan, S.N.; Riggio, R. 5G-EmPOWER: A Software-Defined Networking Platform for 5G Radio Access Networks. IEEE Trans. Netw. Serv. Manag. 2019, 16, 715–728. [Google Scholar] [CrossRef]
  12. Fendt, A.; Schmelz, L.C.; Wajda, W.; Lohmüller, S.; Bauer, B. A Network Slice Resource Allocation Process in 5G Mobile Networks. In Proceedings of the 12th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, Kunibiki Messe, Matsue, Japan, 4–6 July 2018. [Google Scholar]
  13. Richart, M.; Baliosian, J.; Serrat, J.; Gorricho, J. Resource Slicing in Virtual Wireless Networks: A Survey. IEEE Trans. Netw. Serv. Manag. 2016, 13, 462–476. [Google Scholar] [CrossRef] [Green Version]
  14. Richart, M.; Baliosian, J.; Serrati, J.; Gorricho, J.; Agüero, R.; Agoulmine, N. Resource allocation for network slicing in WiFi access points. In Proceedings of the 2017 13th International Conference on Network and Service Management (CNSM), Tokyo, Japan, 26–30 November 2017; pp. 1–4. [Google Scholar] [CrossRef]
  15. Høiland-Jørgensen, T.; Kazior, M.; Täht, D.; Hurtig, P.; Brunstrom, A. Ending The Anomaly: Achieving Low Latency and Airtime Fairness in WiFi. In Proceedings of the 2017 USENIX Annual Technical Conference (USENIX ATC 17), Santa Clara, CA, USA, 12–14 July 2017; pp. 139–151. [Google Scholar]
  16. Aleixendri, J.J.; Betzler, A.; Camps-Mur, D. A practical approach to slicing Wi-Fi RANs in future 5G networks. In Proceedings of the 2019 IEEE Wireless Communications and Networking Conference (WCNC), Marrakech, Morocco, 15–19 April 2019; pp. 1–6. [Google Scholar]
  17. Høiland-Jørgensen, T.; Hurtig, P.; Brunstrom, A. PoliFi: Airtime Policy Enforcement for WiFi. In Proceedings of the 2019 IEEE Wireless Communications and Networking Conference (WCNC), Marrakech, Morocco, 15–19 April 2019; pp. 1–6. [Google Scholar] [CrossRef]
  18. Isolani, P.H.; Cardona, N.; Donato, C.; Marquez-Barja, J.; Granville, L.Z.; Latré, S. SDN-based Slice Orchestration and MAC Management for QoS delivery in IEEE 802.11 Networks. In Proceedings of the 2019 Sixth International Conference on Software Defined Systems (SDS), Rome, Italy, 10–13 June 2019; pp. 260–265. [Google Scholar] [CrossRef]
  19. Isolani, P.H.; Cardona, N.; Donato, C.; Pérez, G.A.; Marquez-Barja, J.M.; Granville, L.Z.; Latré, S. Airtime-Based Resource Allocation Modeling for Network Slicing in IEEE 802.11 RANs. IEEE Commun. Lett. 2020, 24, 1077–1080. [Google Scholar] [CrossRef]
  20. Richart, M.; Baliosian, J.; Serrat, J.; Gorricho, J.L.; Agüero, R. Slicing with Guaranteed Quality of Service in WiFi Networks. IEEE Trans. Netw. Serv. Manag. 2020, 17, 1822–1837. [Google Scholar] [CrossRef]
  21. Isolani, P.H.; Kulenkamp, D.J.; Marquez-Barja, J.M.; Latré, S.; Syrotiuk, V.R. Delay-Aware Slicing and MAC Management Using MCDA in IEEE 802.11 SD-RANs. Unpublished work. 2021. [Google Scholar]
  22. Agiwal, M.; Roy, A.; Saxena, N. Next Generation 5G Wireless Networks: A Comprehensive Survey. IEEE Commun. Surv. Tutor. 2016, 18, 1617–1655. [Google Scholar] [CrossRef]
  23. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specification. Amendment 8: Medium Access Control (MAC) Quality of Service (QoS); ANSI/IEEE Std 802.11e; LAN/MAN Standards Committee of the IEEE Computer Society Std.: New York, NY, USA, 2005. [Google Scholar]
  24. Luo, H.; Shyu, M. An Optimized Scheduling Scheme to Provide Quality of Service in 802.11e Wireless LAN. In Proceedings of the 2009 11th IEEE International Symposium on Multimedia, San Diego, CA, USA, 14–16 December 2009; pp. 651–656. [Google Scholar] [CrossRef]
  25. Serrano, P.; Banchs, A.; Patras, P.; Azcorra, A. Optimal Configuration of 802.11e EDCA for Real-Time and Data Traffic. IEEE Trans. Veh. Technol. 2010, 59, 2511–2528. [Google Scholar] [CrossRef] [Green Version]
  26. Pang, W.L.; Chieng, D.; Ahmad, N.N. Adaptive Priority Sliding Admission Control and Scheduling Scheme for DCF and EDCA WLANs. Wirel. Pers. Commun. 2013, 70, 295–321. [Google Scholar] [CrossRef]
  27. Charfi, E.; Gueguen, C.; Chaari, L.; Cousin, B.; Kamoun, L. Dynamic frame aggregation scheduler for multimedia applications in IEEE 802.11n networks. Trans. Emerg. Telecommun. Technol. 2017, 28, e2942. [Google Scholar] [CrossRef]
  28. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. Amendment 5: Enhancements for Higher Throughput; ANSI/IEEE Std 802.11n; LAN/MAN Standards Committee of The IEEE Computer Society Std.: New York, NY, USA, 2009. [Google Scholar]
  29. Sarret, M.G.; Ashta, J.S.; Mogensen, P.; Catania, D.; Cattoni, A.F. A Multi-QoS Aggregation Mechanism for Improved Fairness in WLAN. In Proceedings of the 2013 IEEE 78th Vehicular Technology Conference (VTC Fall), Las Vegas, NV, USA, 2–5 September 2013; pp. 1–5. [Google Scholar] [CrossRef] [Green Version]
  30. Kim, D.; An, S. Throughput enhancement by Dynamic Frame Aggregation in multi-rate WLANs. In Proceedings of the 2012 19th IEEE Symposium on Communications and Vehicular Technology in The Benelux (SCVT), Eindhoven, The Netherlands, 16 November 2012; pp. 1–5. [Google Scholar] [CrossRef]
  31. Azhari, S.V.; Gurbuz, O.; Ercetin, O. QoS based aggregation in high speed IEEE802.11 wireless networks. In Proceedings of the 2016 Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net), Vilanova i la Geltrú, Spain, 21–21 June 2016; pp. 1–7. [Google Scholar] [CrossRef]
  32. Maqhat, B.; Dani Baba, M.; Rahman, R.A.; Saif, A. Performance analysis of fair scheduler for A-MSDU aggregation in IEEE802.11n wireless networks. In Proceedings of the 2014 2nd International Conference on Electrical, Electronics and System Engineering (ICEESE), Kuala Lumpur, Malaysia, 9–10 December 2014; pp. 60–65. [Google Scholar] [CrossRef]
  33. Seytnazarov, S.; Kim, Y. QoS-Aware Adaptive A-MPDU Aggregation Scheduler for Voice Traffic in Aggregation-Enabled High Throughput WLANs. IEEE Trans. Mob. Comput. 2017, 16, 2862–2875. [Google Scholar] [CrossRef]
  34. Banchs, A.; Serrano, P.; Patras, P.; Natkaniec, M. Providing Throughput and Fairness Guarantees in Virtualized WLANs Through Control Theory. Mob. Netw. Appl. 2012, 17, 435–446. [Google Scholar] [CrossRef]
  35. Nakauchi, K.; Shoji, Y.; Nishinaga, N. Airtime-based resource control in wireless LANs for wireless network virtualization. In Proceedings of the 2012 Fourth International Conference on Ubiquitous and Future Networks (ICUFN), Phuket, Thailand, 4–6 July 2012; pp. 166–169. [Google Scholar] [CrossRef]
  36. Guo, K.; Sanadhya, S.; Woo, T. ViFi: Virtualizing WLAN Using Commodity Hardware. In Proceedings of the 9th ACM Workshop on Mobility in The Evolving Internet Architecture, MobiArch ’14, Maui, HI, USA, 11 September 2014; ACM: New York, NY, USA, 2014; pp. 25–30. [Google Scholar] [CrossRef]
  37. Derakhshani, M.; Wang, X.; Tweed, D.; Le-Ngoc, T.; Leon-Garcia, A. AP-STA Association Control for Throughput Maximization in Virtualized WiFi Networks. IEEE Access 2018, 6, 45034–45050. [Google Scholar] [CrossRef]
  38. Smith, G.; Chaturvedi, A.; Mishra, A.; Banerjee, S. Wireless Virtualization on Commodity 802.11 Hardware. In Proceedings of the Second ACM International Workshop on Wireless Network Testbeds, Experimental Evaluation and Characterization, WinTECH ’07, Montreal, QC, Canada, 10 September 2007; Association for Computing Machinery: New York, NY, USA, 2007; pp. 75–82. [Google Scholar] [CrossRef]
  39. Bhanage, G.; Vete, D.; Seskar, I.; Raychaudhuri, D. SplitAP: Leveraging Wireless Network Virtualization for Flexible Sharing of WLANs. In Proceedings of the 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, Miami, FL, USA, 6–10 December 2010; pp. 1–6. [Google Scholar] [CrossRef]
  40. Mahindra, R.; Bhanage, G.D.; Hadjichristofi, G.; Seskar, I.; Raychaudhuri, D.; Zhang, Y.Y. Space Versus Time Separation for Wireless Virtualization on an Indoor Grid. In Proceedings of the 2008 Next Generation Internet Networks, Kraków, Poland, 28–30 April 2008; pp. 215–222. [Google Scholar]
  41. Katsalis, K.; Choumas, K.; Korakis, T.; Tassiulas, L. Virtual 802.11 wireless networks with guaranteed throughout sharing. In Proceedings of the 2015 IEEE Symposium on Computers and Communication (ISCC), Larnaca, Cyprus, 6–9 July 2015; pp. 845–850. [Google Scholar] [CrossRef]
  42. Xia, L.; Kumar, S.; Yang, X.; Gopalakrishnan, P.; Liu, Y.; Schoenberg, S.; Guo, X. Virtual WiFi: Bring Virtualization from Wired to Wireless. SIGPLAN Not. 2011, 46, 181–192. [Google Scholar] [CrossRef]
  43. Heusse, M.; Rousseau, F.; Berger-Sabbatel, G.; Duda, A. Performance anomaly of 802.11b. In Proceedings of the IEEE INFOCOM 2003, Twenty-Second Annual Joint Conference of The IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428), San Francisco, CA, USA, 30 March–2 April 2003; Volume 2, pp. 836–843. [Google Scholar] [CrossRef]
  44. Murty, R.; Padhye, J.; Chandra, R.; Wolman, A.; Zill, B. Designing High Performance Enterprise Wi-Fi Networks. In Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation, NSDI’08, San Francisco, CA, USA, 16–18 April 2008; USENIX Association: Berkeley, CA, USA, 2008; pp. 73–88. [Google Scholar]
  45. Murty, R.; Padhye, J.; Wolman, A.; Welsh, M. Dyson: An Architecture for Extensible Wireless LANs. In Proceedings of the Usenix annual Technical Conference, Boston, MA, USA, 23–25 June 2010. [Google Scholar]
  46. Suresh, L.; Schulz-Zander, J.; Merz, R.; Feldmann, A.; Vazao, T. Towards Programmable Enterprise WLANS with Odin. In Proceedings of the First Workshop on Hot Topics in Software Defined Networks, Helsinki, Finland, 13–17 August 2012; ACM: New York, NY, USA, 2012; pp. 115–120. [Google Scholar] [CrossRef]
  47. Rangisetti, A.K.; Baldaniya, H.B.; B, P.K.; Tamma, B.R. Load-aware hand-offs in software defined wireless LANs. In Proceedings of the 2014 IEEE 10th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Larnaca, Cyprus, 8–10 October 2014; pp. 685–690. [Google Scholar] [CrossRef]
  48. Sen, A.; Sivalingam, K.M. An SDN framework for seamless mobility in enterprise WLANs. In Proceedings of the 2015 IEEE 26th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), Helsinki, Finland, 13–16 September 2015; pp. 1985–1990. [Google Scholar] [CrossRef]
  49. Zubow, A.; Zehl, S.; Wolisz, A. BIGAP—Seamless handover in high performance enterprise IEEE 802.11 networks. In Proceedings of the NOMS 2016—2016 IEEE/IFIP Network Operations and Management Symposium, Istanbul, Turkey, 25–29 April 2016; pp. 445–453. [Google Scholar] [CrossRef]
  50. Wang, H.; Ooi, W.T.; Chan, M.C. JurCast: Joint user and rate allocation for video multicast over multiple APs. In Proceedings of the IEEE INFOCOM 2016—The 35th Annual IEEE International Conference on Computer Communications, San Francisco, CA, USA, 10–15 April 2016; pp. 1–9. [Google Scholar] [CrossRef]
  51. Rodrigues de Sa, F.; da Cunha, A.M.; de Azevedo Castro Cesar, C. Effective AP Association in SDWN Based on Signal Strength and Occupancy Rate. In Proceedings of the 2017 IEEE 42nd Conference on Local Computer Networks (LCN), Singapore, 9–12 October 2017; pp. 159–162. [Google Scholar] [CrossRef]
  52. Aldhaibani, O.; Bouhafs, F.; Makay, M.; Raschellá, A. An SDN-Based Architecture for Smart Handover to Improve QoE in IEEE 802.11 WLANs. In Proceedings of the 2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA), Kraków, Poland, 16–18 May 2018; pp. 287–292. [Google Scholar]
  53. Zeljković, E.; Marquez-Barja, J.M.; Kassler, A.; Riggio, R.; Latré, S. Proactive Access Point Driven Handovers in IEEE 802.11 Networks. In Proceedings of the 2018 14th International Conference on Network and Service Management (CNSM), Rome, Italy, 5–9 November 2018; pp. 261–267. [Google Scholar]
  54. Zeljković, E.; Slamnik-Kriještorac, N.; Latré, S.; Marquez-Barja, J.M. ABRAHAM: Machine Learning Backed Proactive Handover Algorithm Using SDN. IEEE Trans. Netw. Serv. Manag. 2019, 16, 1522–1536. [Google Scholar] [CrossRef]
  55. Bayhan, S.; Coronado, E.; Riggio, R.; Zubow, A. User-AP Association Management in Software-Defined WLANs. IEEE Trans. Netw. Serv. Manag. 2020, 17, 1838–1852. [Google Scholar] [CrossRef]
  56. Kohler, E.; Morris, R.; Chen, B.; Jannotti, J.; Kaashoek, M.F. The Click Modular Router. ACM Trans. Comput. Syst. (TOCS) 2000, 18, 263–297. [Google Scholar] [CrossRef]
  57. McKeown, N.; Anderson, T.; Balakrishnan, H.; Parulkar, G.; Peterson, L.; Rexford, J.; Shenker, S.; Turner, J. OpenFlow: Enabling Innovation in Campus Networks. SIGCOMM Comput. Commun. 2008, 38, 69–74. [Google Scholar] [CrossRef]
  58. Xia, D.; Hart, J.; Fu, Q. Evaluation of The Minstrel rate adaptation algorithm in IEEE 802.11g WLANs. In Proceedings of the 2013 IEEE International Conference on Communications (ICC), Budapest, Hungary, 9–13 June 2013; pp. 2223–2228. [Google Scholar] [CrossRef]
  59. Blake, S.; Black, D.L.; Carlson, M.A.; Davies, E.; Wang, Z.; Weiss, W. An Architecture for Differentiated Services. RFC 2475, RFC Editor, 1998. Available online: http://www.rfc-editor.org/rfc/rfc2475.txt (accessed on 19 January 2021).
  60. Goepel, K.D. Implementation of an Online Software Tool for The Analytic Hierarchy Process (AHP-OS). Int. J. Anal. Hierarchy Process. 2018, 10, 469–487. [Google Scholar] [CrossRef] [Green Version]
  61. Wątróbski, J.; Jankowski, J.; Ziemba, P.; Karczmarczyk, A.; Zioło, M. Generalised framework for multi-criteria method selection. Omega 2019, 86, 107–124. [Google Scholar] [CrossRef]
  62. Hwang, C.L.; Yoon, K. Methods for multiple attribute decision making. In Multiple Attribute Decision Making; Springer: Berlin/Heidelberg, Germany, 1981; pp. 58–191. [Google Scholar]
  63. Jeong, J.; Choi, S.; Kim, C.-k. Achieving weighted fairness between uplink and downlink in IEEE 802.11 DCF-based WLANs. In Proceedings of the Second International Conference on Quality of Service in Heterogeneous Wired/Wireless Networks (QSHINE’05), Lake Vista, FL, USA, 24 August 2005; pp. 10–22. [Google Scholar] [CrossRef]
Figure 1. SDN-enabled layered network architecture.
Figure 1. SDN-enabled layered network architecture.
Sensors 21 00693 g001
Figure 2. Sequence diagram of the traffic rule creation process.
Figure 2. Sequence diagram of the traffic rule creation process.
Sensors 21 00693 g002
Figure 3. Simplified slice queue structure and data traffic flow in an Access Point (AP).
Figure 3. Simplified slice queue structure and data traffic flow in an Access Point (AP).
Sensors 21 00693 g003
Figure 4. Queueing delay monitoring in the simplified queue structure and data flow in an AP.
Figure 4. Queueing delay monitoring in the simplified queue structure and data flow in an AP.
Sensors 21 00693 g004
Figure 5. Traffic shaping in the simplified queue structure and data flow in an Station (STA).
Figure 5. Traffic shaping in the simplified queue structure and data flow in an Station (STA).
Sensors 21 00693 g005
Figure 6. Testbed deployment scenario.
Figure 6. Testbed deployment scenario.
Sensors 21 00693 g006
Figure 7. Scenario A.
Figure 7. Scenario A.
Sensors 21 00693 g007
Figure 8. Scenario B.
Figure 8. Scenario B.
Sensors 21 00693 g008
Figure 9. Scenario C and D.
Figure 9. Scenario C and D.
Sensors 21 00693 g009
Figure 10. Experiment 2 association. (a) Gómez et al. [5]; (b) Proposed.
Figure 10. Experiment 2 association. (a) Gómez et al. [5]; (b) Proposed.
Sensors 21 00693 g010
Figure 11. Experiment 2 Cumulative Distribution Functions (CDFs). (a) Queueing and (b) throughput of slices (DL) with Gómez et al. [5]; (c) queueing delay; and. (d) throughput of slices (DL) with our approach.
Figure 11. Experiment 2 Cumulative Distribution Functions (CDFs). (a) Queueing and (b) throughput of slices (DL) with Gómez et al. [5]; (c) queueing delay; and. (d) throughput of slices (DL) with our approach.
Sensors 21 00693 g011
Figure 12. Experiment 2 box-and-whiskers plots. (a) Overall queueing delay of slices (DL); and, (b) overall throughput of slices (DL).
Figure 12. Experiment 2 box-and-whiskers plots. (a) Overall queueing delay of slices (DL); and, (b) overall throughput of slices (DL).
Sensors 21 00693 g012
Figure 13. Received Signal Strength Indicator (RSSI) of STAs per AP with an initial STA/AP association.
Figure 13. Received Signal Strength Indicator (RSSI) of STAs per AP with an initial STA/AP association.
Sensors 21 00693 g013
Figure 14. RSSI of STAs per AP running the workload of experiment 2 with Gómez et al. [5].
Figure 14. RSSI of STAs per AP running the workload of experiment 2 with Gómez et al. [5].
Sensors 21 00693 g014
Figure 15. Experiment 3 association. (a) Gómez et al. [5]; (b) Proposed.
Figure 15. Experiment 3 association. (a) Gómez et al. [5]; (b) Proposed.
Sensors 21 00693 g015
Figure 16. Experiment 3 CDFs. (a) Queueing delay of slices (DL), (b) throughput of slices (DL), and (c) throughput of flows from STAs (UL) with Gómez et al. [5]; (d) queueing delay of slices (DL), (e) throughput of slices (DL), and (f) throughput of flows from STAs (UL) with our approach.
Figure 16. Experiment 3 CDFs. (a) Queueing delay of slices (DL), (b) throughput of slices (DL), and (c) throughput of flows from STAs (UL) with Gómez et al. [5]; (d) queueing delay of slices (DL), (e) throughput of slices (DL), and (f) throughput of flows from STAs (UL) with our approach.
Sensors 21 00693 g016
Figure 17. Experiment 3 box-and-whiskers plots. (a) Queueing delay of slices (DL); (b) throughput of slices (DL); (c throughput of flows from STAs (UL).
Figure 17. Experiment 3 box-and-whiskers plots. (a) Queueing delay of slices (DL); (b) throughput of slices (DL); (c throughput of flows from STAs (UL).
Sensors 21 00693 g017
Table 1. Summary of the main network slicing proposals in the IEEE 802.11 context.
Table 1. Summary of the main network slicing proposals in the IEEE 802.11 context.
TargetResource Allocation/Isolation MethodEvaluationRef.
ULDL
Airtime fairness via slicingEDCA parameters NoneSimulation in Matlab[34]
Airtime control via slicing EDCA parametersSimulation in QualNet[35]
Slice scheduling
and traffic shaping
Testbed
experimentation
[36]
NoneSimulation in Matlab [37]
NoneSlice scheduling
shaping
[20]
Experiment isolation
in testbed
Slice schedulingSlice schedulingTestbed
experimentation
[38]
Traffic isolation
in testbed
Traffic shapingNone[39]
Experimentation coexistence
in testbed
NoneTraffic shaping[40]
Throughput guaranteesSlice scheduling[41]
STA virtualization
in testbed
[42]
Airtime control and traffic
isolation via slicing
Simulation in NS3[14]
[15]
Slice scheduling
(indirect)
[16]
Testbed
experimentation
[4]
Airtime policy
enforcement mechanism
None [17]
Adaptive airtime-based
slice orchestration
[18]
Optimal airtime-based
RA modelling for
network slicing
Testbed
experimentation and
theoretical analysis
[19]
Table 2. Summary of the main centralized-horizontal user association and load balancing solutions in Software-Defined Networking (SDN)-based IEEE 802.11 networks.
Table 2. Summary of the main centralized-horizontal user association and load balancing solutions in Software-Defined Networking (SDN)-based IEEE 802.11 networks.
Main TargetInput Parameters/MetricsEvaluationRef.
Support high-density AP
deployment
RSSIs from both STAs and APsTestbed
experimentation
[44]
Customization and control of
high-level policies
RSSIs, packets/bytes counters,
airtime utilization, transmission
failures, and re-transmissions
[45]
Mobility support and
throughput enhancements
RSSIs, AP load, STA/AP distance,
and STAs’ assignment status
[53]
RSSIs, AP load, location,
and STAs’ assignment status
[54]
Users’ activity time and SNR of
beacons and probe requests
[49]
RSSIs and load of APs[47]
SNR of probe requests and
APs’ channel utilization
[51]
RSSIs, average load of APs,
and average channel occupancy
[3]
Average RSSIs, average load of APs,
and average channel occupancy
[5]
RSSI threshold [46]
OMNeT++ simulation[48]
Load balancing, QoS and
QoE support
SINR, bandwidth, jitter, and delayOPNET simulation[52]
Mobility support and
multicast
Video quality, user demand, and
RSSI of beacons
Testbed experimentation
and simulation
[50]
AP load, STAs’ SNR, and
throughput requirements
[55]
Table 3. Overview of notation used.
Table 3. Overview of notation used.
SymbolDescription
nThe number of services to be delivered.
BThe set of APs of The network.
S b The set of slices of AP, b B .
TSet of STAs of The network.
t b True if STA t T is associated with AP b B .
t RSSI b The measured RSSI from STA t on AP b.
F t The set of flows measured from STA t.
fA flow measured from an STA, f F t .
θ b The overall channel load of AP b.
D b , D s , D t The measured queueing delay of AP b, of slice s, and of STA t.
D QoS s The maximum queueing delay threshold of slice s.
μ b The measured throughput of AP b.
μ s The measured throughput of slice s.
μ f , t The throughput of flow f measured from STA t.
μ QoS s The minimum throughput threshold of slice s.
μ QoS f , t The minimum throughput threshold for flow f measured from STA t.
μ EXP b , μ EXP t The overall expected throughput of AP b, and from STA t.
μ EXP s , t , μ EXP f , t The expected throughput for STA t in slice s, and of flow f from STA t.
C The set of MCDA criteria.
W BE , W QoS The set of MCDA weights used for The BE and QoS flows.
W t The set of MCDA weights used for t.
b STATS The set of monitoring statistics of b.
b BEST The highest-ranked AP b of a given STA. b BEST B .
B HANDOVER The subset of APs involved in handovers. B HANDOVER B .
Q s The quantum value of slice s.
Q NEW s The new quantum value calculated for slice s.
Q MIN , Q MAX The minimum and maximum quantum value for slices.
Q INC , Q DEC The increase and decrease factor for adapting The quantum value of slices.
Q FACTOR The used factor for adapting The quantum value of a slice.
λ t The traffic shaping value for STA t.
λ NEW t The new traffic shaping value calculated for STA t.
λ LOSS t The loss introduced by The traffic shaping at STA t.
λ MIN , λ MAX The minimum and maximum traffic shaping value of STAs.
λ INC , λ DEC The increase and decrease factor for performing traffic shaping on STAs.
λ FACTOR The used factor for performing traffic shaping of an STA.
Table 4. Multi-Criteria Decision Analysis (MCDA) criteria, objectives, and weights for AP b.
Table 4. Multi-Criteria Decision Analysis (MCDA) criteria, objectives, and weights for AP b.
CriterionObjective W BE W QoS Description
θ b MIN0.050.10Overall channel load of b.
μ b MIN0.100.10Measured throughput of b.
μ EXP b MIN0.400.10Overall expected throughput of b.
D b MIN0.100.10Measured average queueing delay of b.
t RSSI b MAX0.150.20Measured RSSI from STA t of b.
t b MAX0.200.40True if STA t is associated with b.
Table 5. Workload parameters used in experiment 1.
Table 5. Workload parameters used in experiment 1.
ScenarioFlowSTADirection μ EXP s , t μ QoS s / f F t μ QoS f , t D QoS s
ABE1UL30 MbpsN/AN/A
QoS2UL15 Mbps10 MbpsN/A
BBE1UL30 MbpsN/AN/A
QoS2DL20 MbpsN/A30 ms
CBE1DL30 MbpsN/AN/A
QoS2UL15 Mbps10 MbpsN/A
DBE1DL30 MbpsN/AN/A
QoS2DL15 MbpsN/A30 ms
Table 6. Workload parameters used in experiment 2.
Table 6. Workload parameters used in experiment 2.
EventTime (s)FlowSTADirection μ EXP s , t μ QoS s / f F t μ QoS f , t D QoS s
110BE 33DL20 MbpsN/AN/A
BE 44DL20 MbpsN/AN/A
270BE 12DL20 MbpsN/AN/A
BE 25DL20 MbpsN/AN/A
3130BE 33DL0 MbpsN/AN/A
BE 44DL0 MbpsN/AN/A
4190QoS 11DL10 Mbps10 Mbps5 ms
QoS 26DL8 Mbps5 Mbps100 ms
BE 33DL30 MbpsN/AN/A
BE 44DL30 MbpsN/AN/A
Table 7. Workload parameters used in experiment 3.
Table 7. Workload parameters used in experiment 3.
EventTime (s)FlowSTADirection μ EXP s , t μ QoS s / f F t μ QoS f , t D QoS s
110BE 35DL20 MbpsN/AN/A
BE 46DL20 MbpsN/AN/A
270BE 11UL20 MbpsN/AN/A
BE 23UL20 MbpsN/AN/A
3130BE 35DL0 MbpsN/AN/A
BE 46DL0 MbpsN/AN/A
4190QoS 14DL10 Mbps10 Mbps5 ms
QoS 22UL10 Mbps5 MbpsN/A
BE 35DL30 MbpsN/AN/A
BE 46DL30 MbpsN/AN/A
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Isolani, P.H.; Kulenkamp, D.J.; Marquez-Barja, J.M.; Granville, L.Z.; Latré, S.; Syrotiuk, V.R. Support for 5G Mission-Critical Applications in Software-Defined IEEE 802.11 Networks. Sensors 2021, 21, 693. https://doi.org/10.3390/s21030693

AMA Style

Isolani PH, Kulenkamp DJ, Marquez-Barja JM, Granville LZ, Latré S, Syrotiuk VR. Support for 5G Mission-Critical Applications in Software-Defined IEEE 802.11 Networks. Sensors. 2021; 21(3):693. https://doi.org/10.3390/s21030693

Chicago/Turabian Style

Isolani, Pedro H., Daniel J. Kulenkamp, Johann M. Marquez-Barja, Lisandro Z. Granville, Steven Latré, and Violet R. Syrotiuk. 2021. "Support for 5G Mission-Critical Applications in Software-Defined IEEE 802.11 Networks" Sensors 21, no. 3: 693. https://doi.org/10.3390/s21030693

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop