You are currently viewing a new version of our website. To view the old version click .
Sensors
  • Article
  • Open Access

29 November 2021

Multi-Link Operation with Enhanced Synchronous Channel Access in IEEE 802.11be Wireless LANs: Coexistence Issue and Solutions

and
Department of Electrical and Information Engineering, Seoul National University of Science and Technology, Seoul 01811, Korea
*
Author to whom correspondence should be addressed.
This article belongs to the Section Sensor Networks

Abstract

Multi-link operation is a new feature of IEEE 802.11be Extremely High Throughput (EHT) that enables the utilization of multiple links using individual frequency channels to transmit and receive between EHT devices. This paper aims to illustrate enhanced multi-link channel access schemes, identify the associated coexistence challenge, and propose solutions. First, we describe the multi-link operation of IEEE 802.11be and how the asynchronous and synchronous channel access schemes facilitate multi-link utilization. Next, we describe the design variants of the synchronous channel access scheme and demonstrate the associated coexistence challenge. Subsequently, we propose four features to address this challenge by assigning penalties to multi-link devices (repicking a backoff count, doubling the contention window size, switching to another contention window set, and compensating the backoff count) as well as five coexistence solutions derived from combinations of these features. Comparative simulation results are provided and analyzed for dense single-spot and indoor random deployment scenarios, demonstrating that the throughput and latency gains of multi-link operation differ between schemes. At the same time, we investigate the coexistence performance of multi-link operation with and without the capability of simultaneous transmission and reception and demonstrate that the proposed solutions mitigate the coexistence problem. In particular, compensating the backoff count achieves the highest coexistence performance among the proposed solutions, with a marginal throughput decrease of multi-link devices. A metric for evaluating both the throughput and latency gains and the coexistence performance of a multi-link channel access scheme using a single value is also proposed.

1. Introduction

Mobile data traffic is expected to grow at a compound annual growth rate (CAGR) of 46% by 2022 [1]. One of the main solutions to meet such increasing demands for bandwidth has long been leveraging Wi-Fi networks. 59% of total mobile data traffic is expected to be delivered through Wi-Fi networks by 2022 [1]. For the continuing evolution of Wi-Fi networks [2], the next generation of IEEE 802.11 wireless local area network (WLAN) technology, named Extremely High Throughput (EHT), is under development by the 802.11be task group of IEEE (TGbe) [3,4], and is expected to be adopted by the Wi-Fi Alliance as Wi-Fi 7. EHT focuses on achieving an extreme increase in the peak throughput up to 30 Gbps, which is three times higher than that of Wi-Fi 6, while simultaneously reducing latency [5,6,7,8,9]. Mobile gaming and wireless virtual reality (VR) are two main use cases that are encouraging the development of EHT towards high peak throughput and low latency, whereas Wi-Fi 6 (also known as High Efficiency Wi-Fi or 802.11ax) was developed to ensure a stable user experience in dense deployment environments.
A new feature of the medium access control (MAC) layer for the realization of EHT is multi-link operation. While physical-layer enhancements, including new bands, wider bandwidths, and higher spatial and modulation orders, are also to be adopted, as was done for prior generations, multi-link operation is a new approach being attempted for the first time in EHT. The idea is to enable a pair of devices to use multiple wireless links in different bands simultaneously for transmission and reception. The main benefit of this approach is the simultaneous exploitation of multiple bands at a lower hardware cost than that of a single multiband radio. This multi-link operation capability is different from the multiband support offered by the access points (APs) currently available on the market in that multi-link operation allows the concurrent use of multiple links at client devices and thus also enhances the throughput of a single data session (Multiband APs allow client devices to connect using only one band at a time).
The main challenges of multi-link operation are (1) the design of channel access schemes with and without the presence of radio frequency (RF) power leakage between links, and (2) the coexistence of devices using multi-link channel access schemes with legacy devices. A straightforward approach to channel access in multi-link operation is to run individual links with independent channel access processes, as in the conventional case; however, this is only possible when no RF power leakage exists between the links. If RF power leakage is present between the links due to imperfect RF shielding, filter artifacts, etc., then synchronous channel access is preferred. Moreover, multi-link devices using these channel access schemes must coexist well with legacy devices when occupying the shared medium.
There have been some research attempts toward multi-link aggregation in the unlicensed spectrum. Glia [10] is a software implementation combining orthogonal frequency channels of multiple center frequency bandwidths and can achieve a high data rate through semisynchronous channel access. E-MICE [11] exploits multiple Wi-Fi radio links in individual bands concurrently with the aid of either link-layer aggregation or the Multipath Transmission Control Protocol (MPTCP). It is equipped with an algorithm to dynamically turn on/off links and switch between them to minimize energy consumption with little performance degradation. Naribole et al. [12] have developed a constraint-aware aligned downlink ending protocol for simultaneous downlink transmissions over multiple channels for devices with no ability to simultaneously transmit and receive. Listen-before-talk schemes (LBT) for multicarrier aggregation of Long-Term Evolution with License-Assisted Access (LTE-LAA; LTE for unlicensed spectrum) [13,14] have been studied, and enhanced schemes for use in the presence of RF power leakage were proposed in [15,16,17]. As proposed by the above-mentioned works, multi-link operation requires a new channel access scheme to better exploit multi-link transmission opportunities. However, none of these prior research works focused on the issue of coexistence with legacy single-link Wi-Fi devices for multi-link channel access schemes. Exploring the coexistence problem and designing solutions within the framework of EHT will be essential to facilitate the wide and fast penetration of the new approach.
This paper aims to illustrate enhanced multi-link channel access schemes for IEEE 802.11be EHT, identify the associated coexistence challenge, and propose solutions applicable to cases both with and without the capability of simultaneous transmission and reception. First, we describe the concept, architecture, and asynchronous and synchronous channel access schemes of multi-link operation, along with the RF power leakage problem. Next, we describe the design variants of the synchronous channel access scheme and demonstrate the coexistence challenge of the enhanced scheme. Subsequently, we propose four features to mitigate this challenge by assigning penalties to multi-link devices: repicking a backoff count, doubling the contention window size, switching to another contention window set, and compensating the backoff count. Then, five coexistence solutions are derived from combinations of these features. Comparative evaluation results are provided and analyzed for dense single-spot and indoor random deployment scenarios, demonstrating that the throughput and latency gains of multi-link operation differ between schemes. We also investigate the coexistence performance of multi-link operation with and without the capability of simultaneous transmission and reception and demonstrate that the proposed solutions mitigate the coexistence problem to different degrees. In particular, compensating the backoff count achieves the highest coexistence performance among the proposed solutions, with a marginal throughput decrease of multi-link devices. A metric for evaluating both the throughput and latency gains and the coexistence performance of a multi-link channel access scheme using a single value is also proposed.
In summary, the main contributions of our work are listed as follows:
  • Identification of the issue concerning the coexistence of an enhanced synchronous multi-link channel access scheme with legacy devices, which has not been explored yet in the literature.
  • Design of features to assign a penalty to a backoff process and coexistence solutions derived from various feature combinations.
  • Comprehensive simulation to illustrate the throughput and latency gains and coexistence performance of various multi-link channel access schemes including the proposed solutions when multi-link devices coexist with legacy devices.
  • Design of a new metric for evaluating both the throughput and latency gains and the coexistence performance of multi-link operation using a single value.
The rest of this paper is organized as follows. Section 2 explains the details of multi-link operation. Section 3 describes the variants of the synchronous multi-link channel access scheme and the coexistence issue. Section 4 details the proposed solutions, and Section 5 presents simulation-based evaluations of the throughput and latency gains along with the coexistence performance of various multi-link channel access schemes in the presence of legacy devices. Finally, Section 6 concludes the paper.

4. Coexistence Solutions for Sync-FT Operation

In what follows, we describe the details of the proposed solutions. The approach of the proposed solutions is to assign a free-riding link a penalty for its subsequent channel access following a free-ride transmission so that each link of an MLD will experience a similar amount of backoff time as a legacy device does in the same channel. We propose four features for assigning penalties to free-riding links. Then, various combinations of these features are considered as solutions, as listed in Table 1. The proposed architecture of an MLD is depicted in Figure 9 where the proposed solutions are implemented by the interaction between the backoff processes of individual links through the backoff coordinator of the UMAC. The entire procedure for channel access by a link is illustrated in Figure 10 and its pseudocode is given in Algorithm 1, where a new flag variable named Scheme indicates the features to be activated.
Table 1. Feature combinations considered in the proposed solutions.
Figure 9. Proposed architecture of an MLD.
Figure 10. Flowchart of the channel access procedure of a link under the Sync scheme with the proposed solutions (black-outlined boxes + black and red arrows: legacy operations, all boxes + black and blue arrows (excluding red ones): new operations).

4.1. Repicking a Backoff Count

This feature allows a free-riding link to repick a new backoff count and restart a BO based on this new count immediately after a free-ride transmission (Figure 11); thus, we name it Repick. Since the link may have performed a BO before the free-ride transmission and reduced the backoff count by some amount, allowing it to repick a new backoff count will increase its backoff time on average. In the example shown in the figure, the free-riding link (Link 2) with Repick starts a new BO with a backoff count of nine. Without this feature, the link would use the previous count of three (STR case) or one (non-STR case). The newly repicked count value is not affected by whether the free-riding transmission was successful. It follows the current CW value of the link.
Figure 11. Repicking a backoff count (Repick). (a) STR MLD, (b) Non-STR MLD.

4.2. Doubling the CW

The next feature uses CW doubling as a penalty. Upon completion of a free-riding transmission, the CW of the corresponding link is doubled; consequently, the next backoff count to be picked for this link will have a higher value on average. We propose two solutions that use this feature, which we call Double and Double + Repick, respectively. Double allows an STA to continue its BO with its remaining backoff count, as illustrated in Figure 12. Once the STA transmits upon completion of the BO, its CW is then doubled as a penalty regardless of the transmission result, and the next backoff count is picked. As illustrated in Figure 13, under Double + Repick, an STA doubles its CW and immediately repicks a new backoff count after a free-riding transmission finishes. That is, the difference between the two solutions is the use of the feature Repick after the doubling of the CW. Therefore, Double+Repick will assign a larger penalty to a free-riding link.
Figure 12. CW doubling (Double). (a) STR MLD, (b) Non-STR MLD.
Figure 13. CW doubling and repicking a backoff count (Double + Repick). (a) STR MLD, (b) Non-STR MLD.

4.3. Switching to Another CW Set

This feature is inspired by the multi-user mode of enhanced distributed channel access (MU-EDCA) in 802.11ax [18], which penalizes an STA for channel access after it is given a channel access opportunity by a trigger-based transmission. The AP of a BSS assigns a pair of CW sets, denoted by set A and set B, to its associated STAs, where set B has CW minimum (CWmin) and maximum (CWmax) values that are the same as or higher than those of set A. The STAs perform their BOs based on CW set A by default. After an STA is given a channel access opportunity by a trigger-based transmission, it switches to CW set B. A similar approach can be adopted for MLO, as illustrated in Figure 14. We refer to the corresponding solution as Switch. After a link is given a channel access opportunity by free riding, we switch the link to CW set B so that it has to wait longer on average for channel access due to its own BO completion. A timer ( t s w i t c h ) is started when the link switches to CW set B. When the timer expires, the link switches back to CW set A. Switching from one set to another is not affected by the transmission result, and the CW value is reset to the CWmin of the current set.
Figure 14. Switching to another CW set (Switch). (a) STR MLD, (b) Non-STR MLD.

4.4. Compensation of the Backoff Count

The last feature compensates the backoff count of a free-riding link by a certain amount such that it will ultimately go through the full backoff time length on average. The operation of the solution that utilizes this feature is illustrated in Figure 15. This feature requires an STA to repick a new backoff count value to be added to the current count. Thus, we refer to the solution that includes this feature as Repick + Comp. In the example shown in the figure, the MLD repicks a backoff count value of eight (STR case) or ten (non-STR case) for Link 2 (free-riding link). After the free-riding transmission finishes, the link stores its current backoff count value as b o l d and repicks a new backoff count b. Then, it performs a new BO with an initial count of b + b o l d . In this example, the backoff count of Link 2 becomes eleven after compensation instead of three (STR case) or one (non-STR case).
Algorithm 1 Proposed multi-link channel access procedure of an STA.
1:
while the STA has a packet to transmit do
2:
b Rand [ 0 , C W 1 ] # Pick a new backoff count value
3:
   while b ! = 0 do
4:
  if Other STA has completed a backoff process and is about to transmit a packet then
5:
   if the channel is idle for PIFS then
6:
    Transmit the packet in the given channel  
7:
    if the MLD uses the Switch Scheme then
8:
      ( C W m i n , C W m a x , C W ) ( C W m i n B , C W m a x B , C W m i n )  
9:
     Start a timer with an expiration time of t s w i t c h  
10:
    end if 
11:
    if the MLD uses the Doubling Scheme then
12:
      C W min ( 2 ( C W + 1 ) 1 , C W m a x )  
13:
    end if 
14:
    if the MLD uses the Repick Scheme then
15:
      b o l d b , b Rand [ 0 , C W 1 ] # Repick a new backoff count value  
16:
    end if 
17:
    if the MLD uses the Compensation Scheme then
18:
      b b + b o l d # Add the remaining backoff count to the current value  
19:
    end if 
20:
   end if 
21:
  end if 
22:
  while the channel is sensed busy do
23:
   Sense the channel for DIFS  
24:
  end while 
25:
   b b 1 for every idle T s l o t duration  
26:
end while 
27:
 Transmit the packet in the given channel  
28:
if the MLD uses the Switch Scheme t s w i t c h has expired then
29:
   ( C W m i n , C W m a x , C W ) ( C W m i n A , C W m a x A , C W m i n )  
30:
end if 
31:
if the transmission succeeds then
32:
   C W C W m i n  
33:
else
34:
   C W min ( 2 ( C W + 1 ) 1 , C W m a x )  
35:
end if 
36:
end while 
Figure 15. Compensation after repicking a backoff count (Repick + Comp). (a) STR MLD, (b) Non-STR MLD.

5. Performance Evaluation

We evaluate and compare the performance gain and coexistence performance of MLO under various channel access schemes through simulation (We used a Matlab-based in-house simulator). In addition to the two basic channel access schemes of EHT MLO, i.e., Async and Sync, we also evaluate Sync-PL and Sync-FT as well as the coexistence solutions for Sync-FT described in the previous section. In this evaluation, we consider two deployment scenarios:
  • Single-spot deployment: All APs and devices are deployed at a single spot. APs/devices of the same type have the same modulation and coding scheme (MCS). This deployment scenario enables us to clearly observe and analyze the coexistence performance.
  • Indoor random deployment: Following the 3rd Generation Partnership Project (3GPP)’s indoor evaluation scenario for coexistence in unlicensed spectrum [22], the APs are evenly placed, and devices with link adaptation are randomly distributed to allow the coexistence performance to be investigated under more realistic conditions. The deployment area considered in this scenario and the placement of the APs are shown in Figure 16.
    Figure 16. Indoor random deployment scenario.
The coexistence performance of MLO is investigated by comparing the throughput and latency performance of legacy devices between the cases without and with MLDs. To this end, two phases of simulation are performed, as illustrated in Figure 17 and described below:
Figure 17. Coexistence evaluation scenario.
  • (Phase 1) Legacy devices only: Only legacy devices exist in the simulated environment.
  • (Phase 2) MLD vs. legacy devices: Half of the legacy devices from the first phase are replaced with MLDs.
In the transition from Phase 1 to 2, one legacy device is replaced with one MLD. The purpose is to evaluate the coexistence performance of MLO when the number of coexisting devices remains unchanged. Phase 1 reflects the baseline performance of the conventional single-link channel access scheme. Phase 2 reveals, compared with the performance in Phase 1, how much of a performance gain MLO achieves and how much of a performance degradation the legacy devices suffer. As the performance of the legacy devices in Phase 2 decreases relative to that in Phase 1, the MLDs coexist more poorly with the legacy devices.
The simulation parameters are listed in Table 2. Each MLD has two links working in individual channels. The cases of MLDs both with and without the STR capability are considered. A transmission frame is an aggregation of up to 64 MAC protocol data units (MPDUs), where each MPDU is 1500 bytes long. We consider full-buffer traffic conditions. For the coexistence solution of CW set switching, CW set A has a CWmin of 16 and a CWmax of 1024, while CW set B has a CWmin of 32 and a CWmax of 2048. The timeout time for switching ( t s w i t c h ) is set to 100 ms. All simulation results are obtained by averaging over 5 runs; in each run, 50 s of time are simulated.
Table 2. Simulation parameters.

5.1. Single-Spot Deployment Scenario

In this deployment scenario, we first investigate the throughput gain of MLO. Then, we present the coexistence performance and evaluate it using a new metric.

5.1.1. Throughput Gain of MLO

First, we consider one MLD deployed with various numbers of overlapping BSSs (OBSSs) with legacy SLDs. The MLD is contending on both link 1 and link 2. OBSSs are added to each of the links at the same time, i.e., one OBSS means one legacy BSS on link 1 and link 2. The performance gain of MLO is evaluated in terms of throughput enhancement.
The throughput performance results of MLO using different channel access schemes with coexisting legacy devices are presented in Figure 18. In the case with the STR capability, as shown in Figure 18a, the throughput of MLO is approximately double that of SLO (the legacy-only case) when a single MLD system exists with no legacy devices (STAs). However, with coexisting legacy devices, the throughputs under Sync and Sync-PL are greatly reduced. Sync fails to provide TXOPs on either link and shows a throughput lower than that in the legacy-only case. Under Sync, the existence of one link occupied by transmission involving other devices can severely affect performance because it can cause the Sync process to become stuck in the step of repicking the backoff counter because of busy channels. Sync-PL achieves performance close to the legacy-only case since its TXOPs are limited by the contention on the primary link. However, the other access schemes still show higher throughput than the legacy-only case, implying that MLO can significantly increase throughput performance. Async without power leakage always achieves double throughput due to the independent transmissions on both links. Sync-FT shows similar performance as Async because of its ability to allow fast transmission when a multi-link TXOP is available. While the other variants of Sync-FT show similar performance to each other, Sync-FT-Repick + Comp shows decreasing throughput as the number of legacy STAs increases.
Figure 18. Throughput performance of an MLD network with and without the STR capability when a specified number of legacy devices coexist in the single-spot deployment scenario. (a) With STR capability, (b) Without STR capability.
Figure 18b shows the throughput performance without the STR capability. The extent to which Sync-FT suffers from power leakage is limited, and it becomes the best scheme. The variants of Sync-FT show similar performance trends as in the case with the STR capability. Async suffers from power leakage and achieves limited throughput, especially in the case of an EHT system alone. This means that Async fails to fully exploit the benefits of MLO with power leakage. As the number of legacy STAs increases, the performance gap between Async and Sync-FT decreases, showing that its throughput is predominantly limited by contention in this case. As in the case without power leakage, Sync and Sync-PL still suffer in the presence of legacy STAs.

5.1.2. Coexistence with Legacy Devices

Next, we investigate the coexistence performance of MLO. The throughput results for the coexistence evaluation scenario in Figure 17 with and without the STR capability are shown in Figure 19. We consider a network in which four devices coexist. The throughput for the legacy-only case, in which only legacy devices exist, is shown as a baseline. In the other cases, two legacy devices, one on each channel, are replaced with two MLDs, and the per-device throughput performance is shown for both the MLDs (blue bars) and the remaining legacy devices (orange bars). If the orange bar for a particular scheme is shorter than that for the legacy-only case, this means that under this scheme, the MLDs aggressively occupy the channel resources and fail to coexist with the legacy devices in a harmonious manner.
Figure 19. Throughput in the coexistence scenario (Phase 1 vs. 2) with single-spot deployment. (a) With STR capability, (b) Without STR capability.
In the case with the STR capability, as shown in Figure 19a, we can see that most schemes except Sync, Sync-PL, and Sync-FT-Repick + Comp show significantly lower throughput of the legacy devices, implying that their throughput gains result from the decreased channel occupation time of the legacy devices. Sync shows significant performance degradation of the MLDs, while Sync-PL achieves a throughput similar to that with legacy devices only, as also shown in Figure 18. It is seen that Sync-FT performs aggressive operations, and its variants somewhat mitigate such aggressiveness. Among the variants, Sync-FT-Repick + Comp shows the throughput of the legacy devices that is closest to that in the legacy-only case, but its throughput gain is simultaneously reduced. Figure 19b shows the performance results without the STR capability. Most schemes result in a lower throughput of the MLDs than in the case with the STR capability, and thus, the legacy devices achieve more throughput, leading to smaller throughput gaps between the MLDs and legacy devices. The corresponding latency results are presented in Figure 20, showing that MLO is also beneficial in terms of latency. The observed coexistence performance trends in terms of latency are similar to the throughput trends described above.
Figure 20. Latency in the coexistence scenario (Phase 1 vs. 2) with single-spot deployment. (a) With STR capability, (b) Without STR capability.
Figure 21 shows the per-device throughput performance for an increasing number of total devices in the network. The performance trends are similar between the cases with and without the STR capability. Sync-PL achieves almost the same performance as the legacy-only case. Sync shows poorer performance than the legacy-only case, and its performance degradation increases as the number of devices increases. The other MLO schemes achieve better performance than the legacy-only case. The throughput performance of the legacy devices is exactly the same as for the legacy-only case when the legacy devices are coexisting with MLDs under Sync-PL but worsens with the other schemes. Moreover, the degradation for the legacy devices increases as the number of devices increases. Among the various schemes, Sync-FT-Repick + Comp is shown to achieve the best coexistence performance, although it offers poorer coexistence for a higher number of devices since the contention between MLDs is already high and the legacy devices receive fewer channel access opportunities.
Figure 21. Throughput with an increasing number of devices in the single-spot deployment scenario (left: MLDs, right: legacy devices). (a) With STR capability, (b) Without STR capability.

5.1.3. New Metric

To evaluate both the throughput and latency gains and the coexistence performance between different schemes using a single metric, we introduce a new metric γ . The goal of MLO is to gain as much throughput and latency performance as possible while maintaining acceptable coexistence with legacy devices/systems. Therefore, the MLD performance in an environment where legacy devices are present is compared against the performance of legacy STAs without any MLDs. The constraint itself comes from the difference in the legacy device performance before and after the addition of MLDs into the environment, and it is limited to zero (no positive values are allowed) because we only wish to leave the legacy performance unchanged rather than to boost the performance of the legacy devices. Let μ M L D , P 2 be the throughput of an MLD in Phase 2, and let μ L e g , P 1 and μ L e g , P 2 be the throughputs of a legacy SLD in Phases 1 and 2, respectively. Furthermore, let l M L D , P 2 , l L e g , P 1 and l L e g , P 2 be the corresponding packet latency values.
The new metrics, denoted by γ t for throughput and γ l for latency, are given as follows:
γ t = μ M L D , P 2 μ L e g , P 1 + α × min { 1 , μ L e g , P 2 μ L e g , P 1 } γ l = l L e g , P 1 l M L D , P 2 + α × min { 1 , l L e g , P 1 l L e g , P 2 }
where the first terms, μ M L D / μ L e g , P 1 and l L e g , P 1 / l M L D , measure the performance gain of MLO and the second terms measure the coexistence performance. α is a weighting constraint; a larger α places more weight on the aspect of the coexistence of MLO with legacy systems. Since increasing the performance of legacy systems to higher than it was before is not a focus of MLO development, we upper-limit the second term by one. For each term, higher values are better. Therefore, higher γ t and γ l values imply better performance overall.
The new metric of throughput performance, i.e., γ t , is shown in Figure 22 for the considered schemes with various α values. (The new metric of latency performance, i.e., γ l , shows similar values and trends as γ t and thus is omitted). When α = 0.01 , Async, Sync-FT and Sync-FT-Repick show the highest values, while Sync shows the lowest value. The other coexistence solutions show lower values than Sync-FT since they assign penalties to the MLDs. As α increases, the values of γ t for Sync, Sync-PL and the other coexistence solutions increase. When α = 1 , most schemes except Sync show similar values. This implies that the performance gain of MLO originates from a greater amount of channel access time and thus comes at the expense of performance degradation for legacy devices. Therefore, in general, the higher the performance gain of MLO is, the lower its coexistence performance.
Figure 22. Values of the new metric γ t in the single-spot deployment scenario. (a) With STR capability, (b) Without STR capability.

5.2. Indoor Random Deployment Scenario

In this simulation, the deployment scenario follows the 3GPP’s indoor coexistence evaluation scenario [22], as shown in Figure 16. Each of two operators deploys four WLANs in a single-floor apartment building. Devices are evenly allocated to the WLANs. The devices of each WLAN are randomly distributed around its serving AP. In Phase 1, all APs are legacy APs (i.e., AP SLDs) working in different primary channels as shown in the figure, while in Phase 2, the APs function as AP MLDs that can work on both links, reserving their primary links only for Sync-PL operation. The system parameters follow those for the simulation scenario [23] and evaluation methodology [24] used for IEEE 802.11ax. The indoor path loss model of the IEEE 802.11ax simulation scenario is used. We consider the transmission bit rates of IEEE 802.11ac, which range from 6.5 (MCS 0) to 78 (MCS 9) Mbps. Packet errors are generated based on the packet error rate (PER) curves provided in the evaluation methodology for IEEE 802.11ax. The MCS of a link is taken to be the highest bit rate with a PER lower than 10% at the signal-to-noise ratio (SNR) of the link [25,26]. Acknowledgment frames are transmitted at the lowest transmission bit rate (6.5 Mbps). The noise figure is 7 dB, and the noise floor is −94 dBm. The simulation parameters are listed in Table 1.
Figure 23 shows the per-device throughput performance for an increasing number of total devices. The overall trends are similar to those observed in the single-spot deployment scenario. Sync-FT and its coexistence solutions achieve better performance than the legacy-only case. Sync-PL shows almost the same throughput performance as that achieved with legacy devices only. As the number of devices increases, the throughput gain of Sync-FT also increases. In contrast, the performance degradation of the legacy devices is more severe than in the single-spot deployment scenario. Sync-FT-Repick+Comp still shows the best coexistence performance among the proposed solutions. Similar trends of γ t are also observed in Figure 24.
Figure 23. Throughput with an increasing number of devices in the indoor random deployment scenario (left: MLDs, right: legacy devices). (a) With STR capability, (b) Without STR capability.
Figure 24. Values of the new metric γ t for 80 devices in total in the indoor random deployment scenario. (a) With STR capability, (b) Without STR capability.

6. Conclusions

In this paper, we illustrated the MLO functionality of the upcoming IEEE 802.11be standard and described how the channel access schemes of IEEE 802.11be facilitates multi-link utilization. We demonstrated the coexistence challenge presented by the enhanced synchronous channel access scheme, and we proposed solutions to mitigate this challenge. Through comprehensive simulations, we evaluated the throughput and latency gains of MLO and the proposed solutions relative to legacy systems in various network environments. At the same time, we investigated the coexistence performance of MLO with and without the STR capability and demonstrated that the proposed solutions mitigate the coexistence problem of the enhanced synchronous channel access scheme to different degrees. A metric for evaluating both the throughput and latency gains and the coexistence performance of a multi-link channel access scheme using a single value was also proposed. The evaluation results showed that, among the proposed solutions, compensating the backoff count achieves the best coexistence performance with a marginal throughput decrease of MLDs. However, there may arise a backoff count overflow problem that the backoff count of an MLD accumulated by repeated compensations gets excessive, thus not giving a transmission opportunity to the MLD once an overflow occurs. We leave an extended design of the compensation feature to handle this problem as future work. As machine learning has been applied to a wide range of communication and networking problems [27], developing a machine learning-based channel access scheme for MLO is also a subject for future research.

Author Contributions

This work was realized through the collaboration of all authors. W.M. contributed to the main results and simulation. J.-H.Y. organized the work, provided the funding, supervised the research, and reviewed the draft of the paper. All authors discussed the results, approved the final version, and contributed to the writing of the paper. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by an Institute of Information Communications Technology Planning & Evaluation (IITP) grant funded by the Korean government (MSIT) (No. 2017-0-00650, Biosignal-based Predictive Content Creation for Cloud VR).

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
APAccess Point
BOBackOff procedure
BSSBasic Service Set (BSS)
CCAClear Channel Assessment
CWContention Window
CWmaxContention Window maximum
CWminContention Window minimum
DIFSDistributed coordination function InterFrame Space
EDEnergy Detection
EHTExtremely High Throughput
FTFaster Transmission
LBTListen-Before-Talk scheme
LLCLogical Link Control layer
LMACLower-Medium Access Control
MACMedium Access Control
MCSModulation and Coding Scheme
MLOMultiLink Operation
MLDMultiLink Device
MU-EDCAMultiUser Enhanced Distributed Channel Access
OBSSOverlapping Basic Service Set
PHYPHYsical layer
PIFSPoint coordination function InterFrame Space
QoSQuality of Service
RFRadio Frequency
SAPService Access Point
STRSimultaneous Transmission and Reception
SLDSingle-Link Device
SLOSingle-Link Operation
TCPTransmission Control Protocol
TIDTraffic IDentifier
UMACUpper-Medium Access Control
WLANWireless Local Area Network

References

  1. Cisco. Cisco Visual Networking Index; White Paper; Cisco: San Jose, CA, USA, 2019. [Google Scholar]
  2. Memon, S.K.; Nisar, K.; Hijazi, M.H.A.; Chowdhry, B.; Sodhro, A.H.; Pirbhulal, S.; Rodrigues, J.J. A survey on 802.11 MAC industrial standards, architecture, security & supporting emergency traffic: Future directions. J. Ind. Inf. Integr. 2021, 24, 100225. [Google Scholar]
  3. IEEE. IEEE. IEEE 802.11 TGbe. In Specification Framework for TGbe; IEEE 802.11-19/1262r23; IEEE: Piscataway, NJ, USA, 2021. [Google Scholar]
  4. IEEE. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 8: Enhancements for Extremely High Throughput (EHT); IEEE P802.11be Draft 1.0; IEEE: Piscataway, NJ, USA, 2021. [Google Scholar]
  5. Khorov, E.; Levitsky, I.; Akyildiz, I.F. Current Status and Directions of IEEE 802.11be, the Future Wi-Fi 7. IEEE Access 2020, 8, 88664–88688. [Google Scholar] [CrossRef]
  6. Kim, S.; Yun, J.H. Wider-Bandwidth Operation of IEEE 802.11 for Extremely High Throughput: Challenges 499 and Solutions for Flexible Puncturing. IEEE Access 2020, 8, 213840–213853. [Google Scholar] [CrossRef]
  7. Deng, C.; Fang, X.; Han, X.; Wang, X.; Yan, L.; He, R.; Long, Y.; Guo, Y. IEEE 802.11be Wi-Fi 7: New Challenges and Opportunities. IEEE Commun. Surv. Tutor. 2020, 22, 2136–2166. [Google Scholar] [CrossRef]
  8. Lopez-Perez, D.; Garcia-Rodriguez, A.; Galati-Giordano, L.; Kasslin, M.; Doppler, K. IEEE 802.11be Extremely High Throughput: The Next Generation ofWi-Fi Technology Beyond 802.11ax. IEEE Commun. Mag. 2019, 57, 113–119. [Google Scholar] [CrossRef] [Green Version]
  9. Garcia-Rodriguez, A.; López-Pérez, D.; Galati-Giordano, L.; Geraci, G. IEEE 802.11be: Wi-Fi 7 Strikes Back. IEEE Commun. Mag. 2021, 59, 102–108. [Google Scholar] [CrossRef]
  10. Kakumanu, S.; Sivakumar, R. Glia: A practical solution for effective high datarate wifi-arrays. In Proceedings of the 15th Annual International Conference on Mobile Computing and Networking, Los Cabos, Mexico, 21–25 October 2009. [Google Scholar]
  11. Saputra, Y.M.; Yun, J.H. E-MICE: Energy-Efficient Concurrent Exploitation of Multiple Wi-Fi Radios. IEEE Trans. Mob. Comput. 2017, 16, 4355–4370. [Google Scholar] [CrossRef]
  12. Naribole, S.; Kandala, S.; Lee, W.B.; Ranganath, A. In Proceedings of the IEEE Global Communications Conference (GLOBECOM), Taipei, Taiwan, 7–11 December 2020. [CrossRef]
  13. 3GPP. Evolved Universal Terrestrial Radio Access (E-UTRA); Overall Description; 3GPP Technical Specification 36.300 15.8.0; 3GPP: Sophia Antipolis, France, 2020. [Google Scholar]
  14. 3GPP. Evolved Universal Terrestrial Radio Access (E-UTRA); Physical Layer Procedures; 3GPP Technical Specification 36.213 16.0.0; 3GPP: Sophia Antipolis, France, 2020. [Google Scholar]
  15. Vu, L.H.; Yun, J.H. Power Leakage-Aware Multi-Carrier LBT for LTE-LAA in Unlicensed Spectrum. In Proceedings of the IEEE DySPAN, Seoul, Korea, 22–25 October 2018. [Google Scholar]
  16. Vu, L.H.; Yun, J.H. Multi-Carrier Listen Before Talk with Power Leakage Awareness for LTE-LAA in Unlicensed Spectrum. IEEE Trans. Cogn. Commun. Netw. 2019, 5, 678–689. [Google Scholar] [CrossRef]
  17. Vu, L.H.; Yun, J.H. Adaptive Self-Deferral for Carrier Aggregation of LTE-LAA with RF Power Leakage in Unlicensed Spectrum. IEEE Access 2019, 7, 89292–89305. [Google Scholar] [CrossRef]
  18. IEEE. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications; IEEE Std. 802.11; IEEE: Piscataway, NJ, USA, 2020. [Google Scholar]
  19. Intel. Performance Aspects of Multi-Link Operation; IEEE 802.11-19/1291r3; Intel: Santa Clara, CA, USA, 2019. [Google Scholar]
  20. Huawei. Channel Access in Multi-Band Operation; IEEE 802.11-19/1116r0; Huawei: Shenzhen, China, 2019. [Google Scholar]
  21. Unisoc. Multiple Link Asynchronous and Synchronous Transmission; IEEE 802.11-19/1678r0; Unisoc: Shanghai, China, 2019. [Google Scholar]
  22. 3GPP. 3GPP TR 36.889 —Feasibility Study on Licensed-Assisted Access to Unlicensed Spectrum; Technical Report; 3GPP: Sophia Antipolis, France, 2015. [Google Scholar]
  23. TGax Simulation Scenarios; IEEE 802.11-14/0980r16; IEEE: Piscataway, NJ, USA, 2015.
  24. 11ax Evaluation Methodology; IEEE 802.11-14/0571r12; IEEE: Piscataway, NJ, USA, 2016.
  25. LGE. Link Adaptation for PHY SLS Calibration; IEEE 802.11-14/0620r0; LGE: Seoul, Korea, 2014. [Google Scholar]
  26. LGE. Simulation Results for Spatial Reuse in 11ax; IEEE 802.11-15/1284r0; LGE: Seoul, Korea, 2015. [Google Scholar]
  27. Ahmad, I.; Shahabuddin, S.; Malik, H.; Harjula, E.; Leppänen, T.; Lovén, L.; Anttonen, A.; Sodhro, A.H.; Mahtab Alam, M.; Juntti, M.; et al. Machine Learning Meets Communication Networks: Current Trends and Future Challenges. IEEE Access 2020, 8, 223418–223460. [Google Scholar] [CrossRef]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.