Next Article in Journal
A Graph-Based Hybrid Reconfiguration Deformation Planning for Modular Robots
Next Article in Special Issue
Study of Interference Detection of Rail Transit Wireless Communication System Based on Fourth-Order Cyclic Cumulant
Previous Article in Journal
Investigating Imperfect Cloning for Extending Quantum Communication Capabilities
Previous Article in Special Issue
An Overview of Cognitive Radio Technology and Its Applications in Civil Aviation
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Environment-Aware Rate Adaptation Based on Occasional Request and Robust Adjustment in 802.11 Networks

1
School of Software, Northwestern Polytechnical University, Xi’an 710072, China
2
Yangtze River Delta Research Institute, Northwestern Polytechnical University, Taicang 215400, China
*
Author to whom correspondence should be addressed.
Sensors 2023, 23(18), 7889; https://doi.org/10.3390/s23187889
Submission received: 26 July 2023 / Revised: 3 September 2023 / Accepted: 11 September 2023 / Published: 14 September 2023
(This article belongs to the Special Issue Cognitive Radio Networks: Technologies, Challenges and Applications)

Abstract

:
The IEEE 802.11 standard provides multi-rate support for different versions. As there is no specification on the dynamic strategy to adjust the rate, different rate adaptation algorithms are applied according to different manufacturers. Therefore, it is often hard to interpret the performance discrepancy of various devices. Moreover, the ever-changing channels always challenge the rate adaptation, especially in the scenario with scarce spectrum and low SNR. As a result, it is important to sense the radio environment cognitively and reduce the unnecessary oscillation of the transmission rate. In this paper, we propose an environment-aware robust (EAR) algorithm. This algorithm employs an occasional small packet, designs a rate scheme adaptive to the environment, and enhances the robustness. We verify the throughput of EAR using network simulator NS-3 in terms of station number, motion speed and node distance. We also compare the proposed algorithm with three benchmark methods: AARF, RBAR and CHARM. Simulation results demonstrate that EAR outperforms other algorithms in several wireless environments, greatly improving the system robustness and throughput.

1. Introduction

1.1. Background

The devices in a wireless local area network transmit and receive data through wireless electromagnetic waves, where the spectrum is extremely limited. This determines that the devices are required to enhance performance cognitively by interaction with the radio environment. In 802.11 networks, the wireless medium is shared among multiple nodes, and channel conditions can be unpredictable due to factors like node mobility, channel fading and interference [1]. As a result, the quality of wireless links can vary over time, leading to potential disruptions in network performance. Therefore, it is crucial for network devices to actively engage with the environment in order to mitigate these influential factors. Although higher rates can result in higher throughout and lower the channel occupancy time, the difficulty of parsing at the receiving end is greater, and messages are not easily received correctly [2]; on the contrary, although lower rates are easier to parse, increasing transmission time affects efficiency and increases the probability of interference. Interference-causing reception errors may result in packet retransmission or even discarding, significantly reducing data transmission efficiency. Any transmission rate that is too high or too low can potentially affect transmission efficiency. Rate selection plays a pivotal role in the implementation of IEEE 802.11 standard. A well-designed rate adaptation algorithm can not only improve data transmission efficiency, but also balance the stability of data transmission [3]. On the contrary, using inappropriate rate adaptation algorithm can ultimately lead to poor internet experience and even inability to communicate properly. Therefore, adaptively selecting an appropriate transmission rate for the given channel quality becomes an important task in improving the performance of each wireless link. This is the task of rate control at the MAC layer.
In the original IEEE 802.11 standard, all frames were transmitted at inherent rates. Due to the continuous changes in channel environment, it is not possible to switch to higher rates to fully utilize channel resources when the channel conditions improve; when channel conditions deteriorate, excessively high rates result in the continuous retransmission of data packets [4]. From this perspective, a single transmission rate will seriously affect the utilization of channel resources and network performance, resulting in a significant reduction in system throughput.
In the subsequent IEEE 802.11 standard, support for different rates was provided by changing the modulation and encoding methods of the physical layer. For example, in 802.11b, four transmission rates are provided: 1 Mbps, 2 Mbps, 5.5 Mbps and 11 Mbps. In 802.11a, eight transmission rates are provided: 6 Mbps, 9 Mbps, 12 Mbps, 18 Mbps, 24 Mbps, 36 Mbps, 48 Mbps and 54 Mbps. Although the IEEE 802.11 physical layer provides support for multiple rates, the standard only specifies the allowed rate set and does not design relevant schemes to achieve rate switching. Because rate selection is crucial for improving the performance of wireless network, the research on this topic has great practical significance for engineering guidance.
In Section 3, we propose an environment-aware robust (EAR) algorithm based on the analysis of various rate adaptation algorithms. The four key contributions of this paper are as follows:
  • EAR uses the method of comparing the packet loss rates of neighboring windows to perceive changes in the channel environment and adjusts the transmission rate accordingly;
  • By using the frequency-based RTS/CTS mechanism, it effectively distinguishes the cause of packet loss whether it is due to low SNR or a hidden terminal;
  • The dynamic window and threshold adjustment mechanism make the real-time and accuracy of rate adjustment much higher than some classic rate adaptation algorithms currently available;
  • The algorithm’s oscillation detection mechanism can effectively suppress or utilize abnormal rate fluctuations, further improving system throughput.

1.2. Starting Point

One of the important factors affecting wireless network performance is link layer retransmission. According to the IEEE 802.11 standard, all unicast frames sent require ACK frames for confirmation. If there is a conflict or loss during data transmission, the CRC (Cyclic Redundancy Check) at the receiving end will fail, making it impossible to reply to the sending end with an ACK frame. The transmitter did not receive the ACK frame corresponding to the packet within the SIFS (Short Interframe Space), and will attempt to resend the data frame. In addition, even if the receiving end replies to the ACK frame normally, encountering a loss of the ACK frame can lead to the occurrence of retransmission.
Retransmission will have two levels of impact on the performance of a wireless network. From a micro level perspective, retransmission will increase the overhead of the data link, leading to worsening channel congestion and thereby reducing the throughput of the entire wireless network coverage range of the site. From a macro perspective, for upper layer applications, retransmission can cause message jitter and delay. Real-time application services, such as voice and video calls, heavily rely on continuous message transmission. For these applications, real-time performance is higher than data accuracy. Because even if a short segment is missing from the sound or image, users may not have a clear perception, but due to the high delay caused by retransmission, the discontinuity or lag of the sound or image will greatly affect the normal operation of the application.
There are many explanations as to why retransmission occurs, such as multipath effects [5], radio frequency interference, low SNR, hidden terminal, near/far effects [6], power mismatch and adjacent-channel interference [7], which can all lead to retransmission. Although the multipath phenomenon is a serious problem in traditional 802.11a/b/g devices, with the emergence of 802.11n technology and the application of MIMO (Multiple-Input Multiple-Output) and MRC (Maximum-Ratio Combining) [8] signal processing technology, multipath phenomenon has actually had a positive impact on system throughput. The method of using CSMA/CA media access can effectively avoid near/far effects. In addition, issues such as radio frequency interference, power mismatch, and adjacent frequency interference are usually difficult to solve at the software level. Therefore, perceivable and controllable factors, such as SNR and hidden terminal, have become the key to planning most of rate adaptation algorithms.
In the presence of a hidden terminal, the channel may experience significant bit error and packet loss [9]. The traditional algorithm believes that as long as the bit error and packet loss rate increases, the sender needs to reduce the transmission rate. Actually, doing so does not solve the collision problem [10]. Reducing the transmission rate can lead to more intense channel conflicts due to the prolonged transmission time of each packet, thereby exacerbating the conflicts. This reduction can also cause a further decrease in transmit rate, which could have a detrimental effect on the system’s throughput performance, creating a vicious cycle. Consequently, EAR’s key challenge is to identify the cause of packet loss, whether it is collision or channel noise, and adopt adaptive strategies to regulate the transmission rate in varying environments. Therefore, it is imperative that the EAR be designed in accordance with three fundamental principles:
  • When the wireless network environment is favorable, try to utilize high-rate to transmit data.
  • In situations where the SNR is low, the likelihood of successfully receiving data packets decreases as the transmission rate increases. Therefore, opting for a lower transmission rate becomes imperative.
  • In collision scenarios caused by a hidden terminal, a decrease in transmission rate may actually result in channel deterioration and a subsequent reduction in overall system throughput. As a result, it is imperative to select a more suitable transmission rate.
The remainder of this paper is as follows. Section 2 introduces some research achievements in rate adaptation proposed in recent years. Section 3 explains our proposed EAR scheme. Section 4 explains the configuration of the simulation and its results. Finally, the conclusion is given in Section 5.

2. Related Works

In recent years, rate adaptation algorithms have been widely studied and applied in the field of wireless communication. As shown in Table 1, based on different dimensions, the most common classification methods are as follows: based on the sending end or based on the receiving end; and based on historical statistics or based on current measurements [11]. The above classification methods are not completely independent, and in practical applications, it is often necessary to cross the two or combine other classification methods to design appropriate rate adaptation algorithms.
The algorithm based on the sender determines the rate of transmission based on the conditions of the sender itself [22]. The receiver-based algorithm will feedback the appropriate rate to the sender by evaluating the current channel conditions, and adjust the next transmission rate after the sender receives the feedback information [23]. The algorithms based on the sending end include ARF, AARF, ONOE, etc. These algorithms have strong compatibility with various wireless network products and do not need to modify the existing IEEE 802.11 frame format, making them easy to implement. Rate adaptation algorithms based on the receiving end include OAR, RBAR, RARA, and so on. Although these algorithms can theoretically obtain more accurate reference data, additional feedback mechanisms are needed to transmit this information to the sender [24]. Usually, CTS frames or ACK frames are used to transmit feedback information, and it is generally necessary to modify the IEEE 802.11 standard frame structure. Therefore, many algorithms cannot be implemented in existing IEEE 802.11 devices and can only be used for theoretical research.
According to algorithms based on historical statistics or current measurements, channel information can be obtained in principle, but the difference between the two lies in the real-time nature of the information. Historical statistics algorithm using the data transmission situation in the previous period to make predictions about the transmission situation in the next period, thereby making rate adjustment decisions in advance. Therefore, it is generally suitable for environments with slow channel changes, and its performance is not very good for scenarios with drastic changes in channel environment. Typical algorithms based on historical statistics include ARF and the improved AARF algorithm based on ARF. These two algorithms record the success and failure status of each transmission frame to determine whether to adjust the rate.
ARF takes data packets as the statistical unit and starts a timer at the beginning of the algorithm. When the data packet fails to be sent twice in a row, the sender will directly reduce the transmit rate. Whenever 10 consecutive packets are successfully sent or the timer reaches the specified time, a higher rate packet will be sent for detection. If the detection packet is successfully sent, that is, the sending end successfully receives the ACK from the receiving end, then it will be sent at this detection rate next time. If the detection frame fails to be sent, the transmission will continue at the previous rate thereafter. After each rate adjustment, the timer will be reset. To stabilize the rate and reduce the occurrence of rate oscillation, when AARF detects a detection packet transmission failure, it will increase the threshold for the rate increase to twice the original value. For example, if the initial threshold is 10 and the detection packet fails to transmit, the threshold will be updated to 20 (the maximum value does not exceed 50), which means that the next time we want to increase the rate again, we need to successfully transmit 20 consecutive times. If the rate decreases due to two consecutive transmission failures during normal transmission, the threshold for the rate increase will be reset to the initial value of 10. AARF increases the time for rate improvement in a stable channel environment, resulting in lower-rate oscillation. However, the relatively fixed adjustment modes of these two algorithms are difficult to adapt to flexible and ever-changing channel environments. Overall, algorithms based on historical statistics infer the next channel state based on channel states in the past.
In channel-measurement-based methods, it can be further divided into measurement RSS (Received Signal Strength), SNR (Signal-to-Noise Ratio), BER (Bit Error Rate), PLR (Packet Loss Rate) and other indicators [25]. For example, in algorithms such as CHARM and SGRA, the sender determines the channel status by the signal strength RSS value in ACK. CHARM utilizes trial and error to find better transmission rates, and therefore, this mechanism is not well suited for mobile high dynamic environments. Before sending the data packet to a specific destination, CHARM calls the path-loss prediction algorithm to estimate the current path loss to the destination. The sender uses its own transmission power and the noise level at the receiver to obtain the SINR estimation of the receiver. Finally, a set of transmission rates is determined by looking up the SINR threshold table. CHARM utilizes channel reciprocity to enable the sender to obtain relevant receiver information, without incurring RTS/CTS overhead during the algorithm process. Although the combination of these technologies enables CHARM to quickly respond to changes in dynamic channels, CHARM inevitably encounters three problems: (1) The transmission of power and noise level information relies on introducing an additional 802.11 information element into the beacon, probe request and probe response, which violates the existing 802.11 frame format standards. (2) If the sending end is using a power control algorithm, it will have a certain degree of impact on the accuracy of CHARM, depending on the speed of power change. (3) CHARM assumes a symmetric link between the sender and receiver, which is not true in wireless channels due to mobility, fading and interference [26].
In RBAR, the format of the RTS frame is modified to no longer carry the reserved channel time, but rather the rate to be used and the size of the data frame. Neighbor nodes calculate the reserved channel time based on these two values. After receiving the RTS frame, the receiving end selects an appropriate rate based on the SNR value of the RTS frame and carries the rate in CTS to inform the sender. The receiving end defines two SNR thresholds for each rate. If the measured SNR falls precisely between these two thresholds, the rate is selected. The disadvantage of RBAR is that it requires enabling the RTS/CTS mechanism for a prolonged period of time to assist in rate control, which is relatively expensive. In addition, RBAR requires modifications to the frame format of RTS/CTS, which brings compatibility issues. The rapid changes in channel conditions require the responsive adaptation of transmission rates. Ideally, RBAR selects an optimal rate for every frame transmission. However, it requires low-latency hardware that may be dedicated to processing MAC-layer frames, such as FPGA, that is capable of selecting the rate on a per-frame basis. From this perspective, RBAR is also difficult to apply to general network devices.

3. Framework and Design

3.1. Initialization

In the 802.11 network, each node possesses cognitive abilities to enhance its interaction with the environment. During algorithm initialization, it is necessary to configure several fundamental parameters. Table 2 below provides a list of these parameters along with their respective setting values.
The initial rate R o r g is set to the highest supported rate under the current protocol, for example, the initial rate of 802.11b is 11 Mbps, and the initial rate of 802.11a/g is 54 Mbps. The window value is the number of statistical packets, which is the foundation for calculating the packet loss rate. The default value of the initial window is set at 30. In addition, during the algorithmic operation, the window size is subject to dynamic updates based on the current packet loss rate, threshold range and rate. The setting of the window range is particularly important for the algorithm. On the one hand, it can prevent the lag of environment perception caused by a window that is too large, and on the other hand, it can reduce the impact of computing overhead and accidental packet loss caused by a window that is too small. In order to ensure that the window size changes within a reasonable range, we combine the above related papers based on window algorithm and our own simulation experience. When the maximum and minimum values of the window are set to 40 and 20, respectively, the algorithm performs well.
After extensive experiments, we have made the following limitations on the range of threshold values: the increase rate threshold range is set at 0.1–0.3; The decrease rate threshold range is set at 0.3–0.5. Initialize P u p _ o r g in the table is the initialization threshold for increasing the rate, which defaults to 0.2. P d o w n _ o r g is the initialization threshold for reducing the rate, which defaults to 0.4. Set coefficient α to 0.2. It has been demonstrated through simulation that the range of threshold values and the coefficients for updating them can enable the algorithm to perform optimally under this setting.

3.2. Packet Loss Analysis

The sending end will compare the number of ACKs received with the total number of packets sent to determine the packet loss rate of this window, The calculation formula for loss is as follows Equation (1).
P l o s s = T r a n s m i t t e d _ f r a m e s A C K _ f r a m e s T r a n s m i t t e d _ f r a m e s
Among them, T r a n s m i t t e d _ f r a m e s represents the total number of packets sent during the window period. A C K _ f r a m e s represents the number of ACK frames received, and subtracting the two represents the number of packet losses during this window. This is in accordance with P l o s s , P u p and P d o w n , which are used to determine the update strategy for the next window.

3.3. Window Update

The setting of window size will greatly affect the performance of the algorithm in different environments. If the window size setting is too small, the packet loss rate statistics will be too contingent, which will result in the wrong rate selection; on the contrary, if the window set is too large, the algorithm will react slowly and cannot adapt to changes in the channel in a timely manner.
Different window sizes can affect transmission times for multiple rates. In high-speed states, increasing the window size results in more data packets being transmitted during the window period. This adjustment is ideal when subsequent channel conditions are well predicted and facilitates the transmission of high-speed data packets. However, to prevent rate increases from causing mismatches with channel conditions, reducing the window size enables timely callback at high rates, avoiding higher packet loss rates. In low-speed states, reducing the window size results in fewer transmission opportunities at that rate, allowing the system to adjust to high-speed rates faster. Nonetheless, when the SNR is too low, the packet loss rate at the lowest rate remains too high. To mitigate this issue, increasing the window size helps to reduce the use of the RTS mechanism and further minimizes system losses. Therefore, EAR proposes an idea of dynamically adjusting the window size, which adopts the following Algorithm 1 based on the current packet loss rate and rate:
Algorithm 1: Window Update Algorithm
1:   i f   ( C u r r e n t   w i n d o w   i s   R T S   w i n d o w   | |   N e x t   w i n d o w   i s   R T S   w i n d o w )   {
2:         W i n d n e x t = W i n d c u r r ;
3:         b r e a k ;
4:    }
5:   e l s e   {
6:         i f   ( P l o s s P u p )   {
7:           i f   R c u r r < R m a x   {
8:               W i n d n e x t = W i n d m i n ;
9:               }
10:          e l s e   {
11:              W i n d n e x t = W i n d c u r r + c e i l ( W i n d c u r r ( P u p P l o s s ) ) ;
12:              i f   W i n d n e x t W i n d m a x   {
13:                  W i n d n e x t = W i n d m a x ;
14:               }
15:          }
16:           }
17:        e l s e   i f P l o s s P d o w n   {
18:               i f   R c u r r > R m i n   {
19:              W i n d n e x t = W i n d c u r r c e i l ( W i n d c u r r P l o s s P d o w n ) ;
20:              i f   W i n d n e x t W i n d m i n   {
21:                   W i n d n e x t = W i n d m i n ;
22:               }
23:              }
24:             e l s e   {
25:                 W i n d n e x t = W i n d m a x ;
26:              }
27:            }
28:         e l s e   {
29:          W i n d n e x t = W i n d c u r r ;
30:          }
31:   }
  • When the current or next window is an RTS window, the size of the next window equals the size of the current window.
  • When the packet loss rate P l o s s is less than or equal to P u p , trigger the rate increase strategy (binary search), and if the rate at this point does not reach the maximum rate supported by the protocol, the size of the next window should be set to the minimum window value defined at initialization. Because if the increased rate is not suitable for the current channel environment, the algorithm can quickly callback the rate and stop the loss as soon as possible when the rate mismatch leads to continuous packet loss.
  • Unlike the above situation, the current rate has reached the maximum rate supported by the protocol, and the packet loss rate is low. In order to maximize system throughput, the algorithm allows the high-speed rate to have more transmission opportunities, and increases the window size while maintaining the maximum rate in the next window.
  • When the packet loss rate P l o s s is more than or equal to P d o w n , and the rate of the current window is not the lowest rate, the size of next window needs to be reduced. In order to speed up the window size update frequency and increase the probability of sending high-speed data packets. Similar to the logic of window enlargement, it guides the setting of subsequent window sizes based on the current window size and packet loss rate.
  • Undertake the above content, and if the current window is the lowest rate, the next window size should be adjusted to the maximum to minimize the use of RTS and reduce resource consumption.
  • The threshold of window packet loss rate is between P u p and P d o w n , and the size of the next window remains unchanged.

3.4. Threshold Update

In addition to elastically scaling the window size according to the current channel environment, the threshold of the window also needs to be adjusted in real time. The dynamic threshold can effectively predict the channel environment, and the rate within the most suitable range can be stabilized. The lower the threshold for increasing the rate, the greater the difficulty in increasing the rate; on the contrary, the higher the threshold for increasing the rate, the simpler it is to increase the rate. The same principle applies to reducing the threshold of the rate. The setting of the threshold needs to be determined before the window executes the sending task. This paper adopts a method similar to EWMA (Exponentially Weighted Moving Average) [27], which guides the subsequent threshold setting through short-term historical thresholds. The threshold update is shown in Figure 1 below.
Inferring the packet loss rate W for the next window based on the recent performance of the packet loss rate, we obtain Equations (2) and (3).
W = α i = 1 N 1 P i N 1 + 1 α P N ,                   ( 1 < N < 10 )
W = α i = N 9 N 1 P i N 1 + 1 α P N ,             ( N 10 )
where P i is the packet loss rate of the N i history window closest to the current window, and W P u p _ o r g + P d o w n _ o r g / 2 and P N P u p _ N indicate that packet loss rate is relatively low in the near future, and the next window has met the requirements for increase rate. P N and P u p _ N represent the packet loss rate and increase rate threshold of the current window. The P u p increase in the next window makes it easier to trigger the mechanism of rate increase to achieve higher throughput, where W > P u p _ o r g + P d o w n _ o r g / 2 and P N P d o w n _ N indicates that after inference, not only the current window, but also the next window may have a higher packet loss rate. Then, P d o w n will be decrease to prevent the sustained occurrence of excessive packet loss rate. The pseudocode for threshold update is shown in Algorithm 2 below.
Algorithm 2: Threshold Update Algorithm
1:   i f   ( C u r r e n t   w i n d o w   i s   R T S   w i n d o w   | |   N e x t   w i n d o w   i s   R T S   w i n d o w ) {
2:        P u p _ n e x t = P u p _ c u r r ;
3:        P d o w n _ n e x t = P d o w n _ c u r r ;
4:    }
5:   e l s e   {
6:     W = 0.2     ( s u m ( h i s t o r y _ l o s s ) / h i s t o r y _ l o s s . l e n g t h ) + 0.8     P l o s s ;
7:     A v g = ( P u p _ o r g + P d o w n _ o r g   ) / 2 ;  
8:     i f   ( W A v g   & &   P l o s s < P u p _ c u r r )   {
9:             P u p _ n e x t = 1 W P u p _ o r g + P u p _ c u r r ;
10:           P d o w n _ n e x t = P d o w n _ c u r r + W P d o w n _ o r g ;
11:           i f   ( P u p _ n e x t > 0.3 )     { P u p _ n e x t = 0.3 ;   }
12:           i f   ( P d o w n _ n e x t > 0.5 )     {   P d o w n _ n e x t = 0.5 ;   }
13:           b r e a k ;
14:     }
15:    i f   ( W > A v g   & &   P l o s s > P d o w n _ c u r r )   {
16:           P d o w n _ n e x t = P d o w n _ c u r r W P d o w n _ o r g ;
17:           P u p _ n e x t = P u p _ c u r r 1 W P u p _ o r g ;
18:           i f   ( P d o w n _ n e x t < 0.3 )   { P d o w n _ n e x t = 0.3 ;   }
19:           i f   ( P u p _ n e x t < 0.1 )     {   P u p _ n e x t = 0.1 ;   }
20:           b r e a k ;
21:        }
22:       P u p _ n e x t = P u p _ c u r r ;
23:       P d o w n _ n e x t = P d o w n _ c u r r ;
24:    }
25:   h i s t o r y _ l o s s . a p p e n d P l o s s ;
26:   i f   h i s t o r y _ l o s s . l e n g t h 10   {
27:    h i s t o r y . p o p 0 ;
28:   }

3.5. Environment-Aware Robust (EAR) Algorithm

After the counter is cleared, calculate the packet loss rate P l o s s of the current window, and if P l o s s P u p , then the sending rate of the next window will increase. In order to find the most suitable rate faster, a binary search method is used to select the rate of the next window; If P d o w n > P l o s s > P u p , then the rate within the next window remain unchanged; If P l o s s P d o w n , the rate will not immediately decrease. Instead, add a window W i n d r t s to enable the RTS mechanism later, during this window period, before sending each data packet, an RTS frame is sent to make a reservation for the channel. According to the packet loss rate P r t s _ l o s s during the W i n d r t s period, the following four strategies will be adopted to update the rate:
  • If P r t s _ l o s s P l o s s : The packet loss rate not only does not decrease, but also worsens the channel conditions and increases the packet loss rate. This indicates that the reason for the high packet loss rate in the current environment is due to the low SNR. Therefore, the next window should decrease the rate (stepped type) and turn off the RTS mechanism.
  • If P d o w n < P r t s _ l o s s < P l o s s : Although the packet loss rate has slightly improved, it still does not fall below the threshold of decrease the rate. In this case, the benefits of enabling RTS are not enough to offset the costs of RTS. Therefore, the next window should maintain the original rate and turn off the RTS mechanism.
  • If P u p < P r t s _ l o s s P d o w n : The packet loss rate has reduced to a certain extent, and the throughput benefits brought by RTS are slightly greater than the inherent costs brought by RTS. The factors leading to a higher packet loss rate in the upper window are mostly caused by hidden station issues. Therefore, the next window maintains the original rate of transmission, and the RTS mechanism is still enabled in the next window.
  • If P r t s _ l o s s P u p : After enabling the RTS mechanism, the packet loss rate has been greatly reduced, indicating that the previous high packet loss rate was entirely caused by hidden terminal issues. At this point, the opening of RTS brings great benefits and eliminates the impact of SNR factors. Therefore, in order to maximize the benefits, the next window increases the rate of transmission and still open RTS mechanism.
In the case of hidden terminal, reducing the rate will make the conflict more intense, as it prolongs the transmission time of each data packet, exacerbating channel conflicts and affecting system throughput. The execution flowchart of the EAR algorithm is shown in Figure 2 below.

3.6. Rate Oscillation Detection

In a relatively stable channel environment, if the threshold selection is not appropriate, it may cause the rate selection mechanism to continuously alternate between adjacent high-speed rates, thereby forming rate jitter, which may affect the network throughput [28]. For example, the current speed is 12 Mbps, and the window packet loss rate is 10%, which meets the requirement of increasing the speed to 18 Mbps. Afterwards, the window packet loss rate increased to 50%, and due to the high packet loss rate, it returned to 12 Mbps, repeating this cycle. In theory, if the channel is stable, the corresponding packet loss rate at each rate should be very stable. Therefore, according to calculations, the throughput at 12 Mbps is actually higher than the throughput provided by 18 Mbps. In order to avoid such problems, we added an oscillation detection mechanism to the algorithm: let R be the current rate and R + be the higher-order rate. If the history of rate selection shows a sequence like R R + R R + R R + , it is determined that there is an oscillation reaction at that rate.
When oscillation occurs, in order to maximize throughput, it is necessary to combine the oscillation sequence and compare the average throughput of R + and R . If the average throughput provided by R + is higher than R , the sequence can be ignored and subsequent oscillations can be continuously detected until the oscillation sequence is broken or R ’s average throughput is higher than R + . If the average throughput provided by R is higher than R + , it indicates that the threshold for the rise rate is not set properly. In order to stabilize the current rate, it is necessary to lower the threshold for the rise rate, making the requirements for the rise more stringent.
In order to implement the rate oscillation mechanism, the algorithm needs to continuously record the relevant information of the six windows closest to the current window during execution. Set the window rate sequence as R o l   [ R 1 , R 2   R 6 ] , the window start timestamp sequence as T b e g i n   [ T b 1 , T b 2 T b 6 ] , the corresponding window end timestamp sequence as T e n d   [ T e 1 , T e 2 T e 6 ] , and the number of packets successfully sent by the window sequence as S s u c   [ S 1 , S 2 S 6 ] . If R o l satisfies the law of R R + R R + R R + , then the following Equations (4) and (5) needs to be used to make a detection.
T h r o u g h p u t R = S 1 + S 3 + S 5 L d a t a T e 1 T b 1 + T e 3 T b 3 + ( T e 5 T b 5 )
T h r o u g h p u t R + = S 2 + S 4 + S 6 L d a t a T e 2 T b 2 + T e 4 T b 4 + ( T e 6 T b 6 )
Among them, L d a t a represents the payload size of each packet, T h r o u t h p u t R represents the average throughput of R within R o l , T h r o u t h p u t R + represents the throughput corresponding to R + within R o l . If T h r o u t h p u t R T h r o u t h p u t R + , it indicates that the oscillation leads to an increase in throughput, and the threshold does not need to be updated to fully utilize the advantages brought by oscillation. If T h r o u t h p u t R > T h r o u t h p u t R + , it indicates that the oscillation brings about a decrease in throughput, and it is necessary to reduce the threshold for increasing the rate to half of the original value to impose punishment. This makes the requirements for increasing the rate more stringent to avoid the occurrence of sustained-rate oscillations in the future.
Figure 3 below shows a sequence of rate oscillations that we discovered during the 802.11b simulation process. It can be seen that after the addition of rate oscillation detection mechanism, the fluctuation of the rate has been significantly suppressed and that the packet loss rate has been reduced.
In the first six windows, the rate switches back and forth between 2 Mbps and 5.5 Mbps. After adding the oscillation detection mechanism, in window number 7 (red dotted line), an average throughput evaluation of the oscillation sequence is performed by combining the historical packet length and transmission time. The evaluation results indicate that in this historical sequence, the throughput provided by using the lower rate of 2 Mbps is higher than that provided by 5.5 Mbps. Therefore, a rate of 2 Mbps will be used for transmission in window number 7, and the threshold for increasing the rate will be lowered, making the conditions for increasing the rate more stringent. It can be observed that in the subsequent windows, the rate stabilizes, and the packet loss rate remains low.

4. Simulation Results

In this section, we use NS-3 to verify the performance of EAR in different scenarios. First, we designed a series of experiments to validate the necessity of dynamic parameters in the EAR algorithm. Secondly, by constructing a hidden terminal model, we demonstrated the positive impact of the dynamic RTS/CTS mechanism on the performance improvement of the EAR algorithm. Finally, we investigated the influence of node quantity and node movement speed on different algorithms. The final simulation results indicate that the throughput performance of the EAR algorithm is superior to other comparative algorithms in different scenarios.

4.1. Case Study—Adjustment of Window and Threshold

To demonstrate the necessity of parameters updates, we designed a set of parameter validation experiments. In this experiment, fixed threshold range and window size were used for throughput testing. This experimental scenario consists of two nodes: an Access Point (AP) node and an STA (Station) node. The UDP traffic of 802.11b 11 Mbps CBR generated by the STA node to the AP node is sent at different distances using the LogDistancePropagationLossModel [29] as the propagation loss model for NS-3. The path loss varies depending on distance, as shown in Equation (6) below.
L = L 0 + 10 n l o g ( d d 0 )
where n is the path loss distance exponent, d 0 is the reference distance (m), L 0 is the path loss at reference distance (dB); and d and L represent the distance and path loss (dB).
In the scenario, the movement step of STA is set to 1 m, and the movement time interval is 1 s, which means that the STA node moves away from the AP node at a distance of 1 m per second. STA node starts at the coordinates (5,0,0), and AP node remains at the coordinates (0,0,0) throughout the simulation process. The distance scene model is shown in the following Figure 4.
We repeated the experiment 200 times, and the average throughput under each threshold and window during the entire process is shown in Table 3 below.
It can be seen that the average throughput varies under different threshold ranges and window sizes. When the threshold range is fixed, dynamic windows provide more throughput. When the window size range is fixed, dynamic thresholds also provide more throughput. Finally, when the threshold range and window size can be dynamically adjusted, the throughput provided is the highest. The above experimental results demonstrate that dynamic parameters have better environmental adaptability and provide higher throughput compared to fixed parameters when the channel environment changes significantly.

4.2. Case Study—Effect of Hidden Terminal

In order to explore the impact of a hidden terminal on rate selection, this part used the NS-3 platform to build a WLAN environment based on 802.11g. AARF, RBAR, CHARM and EAR algorithms were used for simulation experiments in the hidden terminal environment, and the experimental results were compared and analyzed. During the simulation experiment, to ensure the fairness of the experiment, the sender uses UDP one-way transmission protocol and sends UDP data streams at a CBR (Constant Bit Rate) of 60 Mbps. The specific parameter settings for each module of NS-3 are shown in Table 4.
The model for the hidden terminal model is shown in the following Figure 5.
The channel propagation loss model selection for this experiment is the MatrixPropagationLossModel of NS-3. The propagation loss of each pair of nodes in this model is fixed and does not depend on their actual positions. And by default, the propagation loss is symmetric. When the propagation loss is 50 dB, two nodes can send and receive information to each other. When the propagation loss reaches 200 dB or above, the signals of the two nodes are weak and cannot be detected. This design can effectively construct a hidden terminal experimental model.
The sender uses the OnOffApplication class to create a CBR source, which can generate traffic for a single destination. However, its sending and stopping states are alternated by default. Therefore, setting its OnTime and OffTime properties to 1 and 0, respectively can keep the source in the sending state. The receiving end uses the PacketSink class in NS-3 to install application services for the node, which are responsible for receiving and consuming the traffic generated to the IP address and port. Finally, we install the EarWifiManager algorithm for flow 1 and select ConstantRateWifiManager as the rate algorithm for flow 2.
We conducted 200 simulation experiments, each lasting for 5 s. To facilitate the display of the EAR algorithm operation process, Table 5 below shows a representative set of data.
In Flow 1, Node 0 sent a total of 26,785 packets, and 2286 packets were successfully received by Node 1. The average throughput was calculated to be 5.22305 Mbps. In Flow 2, Node 2 sent a total of 26,825 packets, with 1565 successfully reaching Node 1 and an average throughput of 3.57571 Mbps. Meanwhile, this section utilized the tracking system provided by NS-3 to conduct a statistical analysis of the data transmission changes during the Flow 1 experiment, as shown in Figure 6.
In addition, the model experiment also incorporates AARF, RBAR and CHARM algorithms for simulation, and the comparative performance is shown in the following Figure 7. It can be seen that it is difficult for algorithms that do not have the addition of RTS mechanism to overcome the packet loss problem in the case of a hidden terminal scenario. And the throughput performance of EAR’s adaptive RTS mechanism in this scenario is also better than the RBAR using full RTS mode. The high collision rate caused by hidden terminal can cause AARF and CHARM errors to reduce transmission rates, thereby exacerbating channel degradation. The performance of both on Flow 1 is similar, while on Flow 2, CHARM performs better than AARF. But overall, the throughput provided by both in this scenario is not ideal.

4.3. Comprehensive Scenario

In the comprehensive testing scenario, we constructed a basic BSS (Basic Service Set) network consisting of one AP and 20 STA. In this network, STA cannot communicate directly with each other and must transmit data through AP. The distribution range of STA and AP is in a rectangular area of 300 m × 300 m. The experimental topology is shown in the following Figure 8.
AP is always at a fixed position in the center of the region (150, 150, 0), and STA is randomly distributed within the region. Each STA continuously generates a 100 Mbps CBR data stream. At the same time, in order to be closer to the real scene, the LogDistancePropagationLossModel is introduced in the environment to perform signal fading on STA nodes at different distances.

4.3.1. Different STA Quantities

This group of experiments verified the impact of different STA numbers on WLAN system throughput by setting different numbers of STA access AP in the above areas. Figure 9 shows the performance of four rate adaptive algorithms, EAR, AARF, CHARM and RBAR, as the number of STA nodes increases. It can be seen that as the number of STA sites increases, the average throughput shows a downward trend. This is because as the number of STA increases, the likelihood of collisions between STAs also increases. At the same time, the average time for each STA to access the AP will also decrease, which will lead to a decrease in system average throughput. Among them, the AARF algorithm is the most sensitive to changes in the number of STAs, and its throughput decreases the fastest. The EAR algorithm, due to the addition of the RTS adaptive mechanism, exhibits relatively good stability and maintains relatively high throughput even when the number of STAs is high. Overall, the RBAR algorithm exhibits the most stable throughput performance during the process of node increase, and when the number of nodes exceeds 13, the average throughput exceeds that of the EAR algorithm. This is due to the RBAR algorithm using RTS for channel reservation before each packet is sent. As the number of STAs in WLAN continues to increase, the probability of packet collisions increases, and the benefits brought by RTS become more apparent. When the number of STAs is less than 10, the throughput performance of CHARM and RBAR is extremely similar. However, as the number of STAs increases, the fading trend of CHARM is more pronounced than that of EAR and RBAR due to the lack of collision detection mechanism.

4.3.2. Different Mobile States

The movement of nodes can cause multipath effects, leading to changes in the channel environment [30]. Figure 10 shows the SNR curves corresponding to two different node movement speeds in the simulation experiment. It can be seen that as the speed of node movement increases, the fluctuation of SNR becomes more severe, channel fading also becomes more severe, and the overall channel environment becomes worse. This is because the movement of nodes can cause changes in frequency and phase, leading to signals traveling through different channel propagation paths. Due to different path lengths and scattering characteristics, signal synthesis or interference may occur, thus affecting the effectiveness of the channel. When the node moves faster, the time interval between adjacent signal transmissions is shorter, and the overlap and interference between signals become more significant, thereby more severely affecting channel quality.
By configuring the RandomWalk2dMobility model of NS-3, STA nodes were randomly moved within the aforementioned 300 × 300 m area and simulated two different motion states: When the motion speed is 0.5 m/s, the state of slow node movement is simulated; and when the motion speed is 5 m/s, the state of rapid node movement is simulated.
Figure 11 shows the average throughput variation of STA at different speeds and distances. It can be seen that when the STA mobility speed is slow, the EAR algorithm has higher throughput than AARF, RBAR and CHARM algorithms at different distances, and as the distance increases, the advantage is most obvious when reaching a distance of 30 m. This is because when the channel state of STA is relatively stable, the EAR algorithm tends to adopt a high transmission rate and maintain a relatively stable rate. The dynamic window and threshold update strategy ensure that the EAR algorithm can accurately capture changes in the channel. In high-speed mobile mode, the throughput of all four algorithms decreases sharply, with an average throughput only reaching about half of that at low speeds. At 10 m, 20 m and 30 m, the throughput performance of EAR algorithm and CHARM algorithm is similar thanks to CHARM’s channel evaluation and rate adaptation mechanism. AARF and RBAR perform poorly in this scenario, only reaching about half of the throughput of EAR algorithm.
Based on mobile scenarios, compared to the CHARM, RBAR and AARF algorithms, EAR has increased UDP’s throughput by 7%, 25% and 51%, respectively, improving the throughput performance of wireless networks in mobile environments.

5. Conclusions

The proposed EAR rate adaptation algorithm, as outlined in this article, effectively identifies the source of channel degradation and differentiates whether the degradation is due to hidden terminal or low SNR. Diverse rate adjustment measures can be implemented based on the various channel environments. The dynamic window and threshold adjustment mechanism significantly enhance the real-time and accuracy of rate adjustment compared to certain conventional rate adaptive algorithms that are currently available. However, there are still shortcomings in the current work. The design concept of EAR is based on the characteristics of traditional standards, such as 802.11a/b/g. There has been no targeted adaptation and optimization of relevant standards, such as 802.11n/ac/ax. This is also a common limitation of many rate adaptation algorithms at present. In future work, EAR will make corresponding improvements based on the characteristics of different standards. For example, the 802.11n standard has added new features, such as aggregate frames, MIMO (Multiple Input Multiple Output), channel bonding and ShortGI (Short Guard Interval). Additionally, 802.11 n allows for many more rate options than 802.11a/b/g mode, ranging from 6.5 Mbps to 600 Mbps. As the rate increases, loss does not monotonically grow with rates in different modes. Therefore, future work has to take these additional factors into account. In addition, 802.11e enhances its support for QoS (Quality of Service) by setting priorities, which can effectively ensure the quality of service for different priority services. In 802.11e devices, the competition unit of the channel in EDCA (Enhanced Distributed Channel Access) mode changes from a set of data to a transmission opportunity. Therefore, the unit of the statistical window in EAR also changes from the number of data packets to a period of time. Additionally, threshold initialization and threshold update strategies are implemented under four different AC (Access Category) conditions to meet the requirements for QoS.

Author Contributions

Conceptualization, W.Y. and L.W.; methodology, W.Y. and L.W.; software, W.Y.; validation, W.Y. and J.S.; formal analysis, W.Y., L.W. and L.H.; investigation, W.Y.; resources, W.Y., L.W. and Y.W.; data curation, W.Y. and J.S.; writing—original draft preparation, W.Y.; writing—review and editing, L.W., L.H. and Y.W.; visualization, W.Y.; supervision, L.W.; project administration, W.Y.; funding acquisition, L.W., L.H. and Y.W. All authors have read and agreed to the published version of the manuscript.

Funding

This research was supported in part by the National Natural Science Foundation of China (61901388, 62002293), in part by the Fundamental Research Funds for the Central Universities, in part by the China Postdoctoral Science Foundation (BX20200280), in part by the Basic Research Programs of Taicang (TC2021JC25), and in part by the Natural Science Basic Research Program of Shaanxi Province (2022JQ-615).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Ngo, T. Why Wi-Fi stinks—And how to fix it. IEEE Spectr. 2016, 53, 44–50. [Google Scholar] [CrossRef]
  2. Cuzanauskas, T. Hybrid rate control mechanisms in IEEE 802.11 networks. In Proceedings of the 2017 Open Conference of Electrical, Electronic and Information Sciences (eStream), Vilnius, Lithuania, 27 April 2017. [Google Scholar]
  3. Sharma, S.; Singh, A.; Tripathi, P.N. Performance of Wireless Ad Hoc Network with All the Data Rate of IEEE 802.11b Using NS-3. In VLSI, Microwave and Wireless Technologies: Select Proceedings of ICVMWT 2021; Springer Nature Singapore: Singapore, 2023; pp. 421–430. [Google Scholar]
  4. Mahesh, M.; Pavan, B.S.; Harigovindan, V.P. Data Rate-Based Grouping to Resolve Performance Anomaly of Multi-Rate IEEE 802.11ah IoT Networks. IEEE Netw. Lett. 2020, 2, 166–170. [Google Scholar] [CrossRef]
  5. Ma, Y.H.; So, P.L.; Gunawan, E. Performance Analysis of OFDM Systems for Broadband Power Line Communications Under Impulsive Noise and Multipath Effects. IEEE Trans. Power Deliv. 2005, 20, 674–682. [Google Scholar] [CrossRef]
  6. Goodman, D.J.; Saleh, A. The near/far effect in local ALOHA radio communications. IEEE Trans. Veh. Technol. 1987, 36, 19–27. [Google Scholar] [CrossRef]
  7. Valenti, M.C.; Torrieri, D.; Talarico, S. Adjacent-Channel Interference in Frequency-Hopping Ad Hoc Networks. In Proceedings of the IEEE International Conference on Communications, Budapest, Hungary, 9–13 June 2013. [Google Scholar]
  8. Wang, Z.; Cao, Y.; Zhang, D.; Hua, X.; Gao, P.; Jiang, T. User Selection for MIMO Downlink With Digital and Hybrid Maximum Ratio Transmission. IEEE Trans. Veh. Technol. 2021, 70, 11101–11105. [Google Scholar] [CrossRef]
  9. Gu, C.; Xu, H.; Yao, N.; Jiang, S.; Zheng, Z.; Xu, Y. Enabling A MAC Protocol with Self-Localization Function to Solve Hidden & Exposed Terminal Problems in Wireless Ad Hoc Networks. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 2022, E105/A, 613–621. [Google Scholar]
  10. Yin, W.; Hu, P.; Indulska, J.; Portmann, M.; Mao, Y. MAC-Layer Rate Control for 802.11 Networks: Lesson Learned and Looking Forward. arXiv 2018, arXiv:1807.02827. [Google Scholar]
  11. Albar, R.; Arif, T.Y.; Munadi, R. Modified Rate Control for Collision-Aware in Minstrel-HT Rate Adaptation Algorithm. In Proceedings of the 2018 International Conference on Electrical Engineering and Informatics (ICELTICs), Banda Aceh, Indonesia, 19–20 September 2018. [Google Scholar]
  12. Kamerman, A.; Monteban, L. WaveLAN-II: A high-performance wireless LAN for the unlicensed band. Bell Labs Tech. J. 1997, 2, 118–133. [Google Scholar] [CrossRef]
  13. Lacage, M.; Manshaei, M.H.; Turletti, T. IEEE 802.11 rate adaptation: A practical approach. In Proceedings of the 7th ACM international symposium on Modeling, analysis and simulation of wireless and mobile systems, Venice, Italy, 4–6 October 2004; pp. 126–134. [Google Scholar]
  14. Bicket, J. Bit-Rate Selection in Wireless Networks. Ph.D. Thesis, Massachusetts Institute of Technology, Cambridge, MA, USA, 2006. [Google Scholar]
  15. Holland, G.; Vaidya, N.; Bahl, P. A rate-adaptive MAC protocol for multi-Hop wireless networks. Proc. Acm/IEEE Mobicom. 2001, 41, 236–251. [Google Scholar]
  16. Sadeghi, B.; Kanodia, V.; Sabharwal, A.; Knightly, E. Opportunistic media access for multirate ad hoc networks. In Proceedings of the 8th annual international conference on Mobile computing and networking, Atlanta, GA, USA, 23–28 September 2002; pp. 24–35. [Google Scholar]
  17. Judd, G.; Wang, X.; Steenkiste, P. Efficient channel-aware rate adaptation in dynamic environments. In Proceedings of the International Conference on Mobile Systems, Breckenridge, CO, USA, 17–20 June 2008; pp. 118–131. [Google Scholar]
  18. Kim, J.; Kim, S.; Choi, S.; Qiao, D. CARA: Collision-Aware Rate Adaptation for IEEE 802.11 WLANs. In Proceedings of the Infocom IEEE International Conference on Computer Communications, Barcelona, Spain, 23–29 April 2006. [Google Scholar]
  19. Zhang, J.; Tan, K.; Zhao, J.; Wu, H.; Zhang, Y. A Practical SNR-Guided Rate Adaptation. In Proceedings of the IEEE INFOCOM 2008-The 27th Conference on Computer Communications, Phoenix, AZ, USA, 13–18 April 2016; pp. 2083–2091. [Google Scholar]
  20. Holl, G.; Vaidya, N.; Bahl, P. A Rate-Adaptive MAC Protocol for Wireless Networks; Texas A & M University: College Station, TX, USA, 2000. [Google Scholar]
  21. Arif, T.Y.; Munadi, R. Evaluation of the minstrel-HT rate adaptation algorithm in IEEE 802.11n WLANs. Int. J. Simul. Syst. Sci. Technol. 2017, 18, 11.11–11.17. [Google Scholar] [CrossRef]
  22. Zhao, Y.; Kang, K.; Qian, H.; Luo, X.; Jin, Y. Greedy Hybrid Rate Adaptation in Dynamic Wireless Communication Environment. In Proceedings of the ICASSP 2020–2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Barcelona, Spain, 4–8 May 2020. [Google Scholar]
  23. Khan, S.; Mahmud, S.A.; Noureddine, H.; Al-Raweshidy, H.S. Rate-adaptation for multi-rate IEEE 802.11 WLANs using mutual feedback between transmitter and receiver. In Proceedings of the IEEE International Symposium on Personal Indoor & Mobile Radio Communications, Istanbul, Turkey, 26–30 September 2010. [Google Scholar]
  24. Park, C.S.; Park, S. Implementation of a Fast Link Rate Adaptation Algorithm for WLAN Systems. Electronics 2021, 10, 91. [Google Scholar] [CrossRef]
  25. Huang, T.; Li, S.; Lu, X.; Gao, S. An Interference-Aware Rate and Channel Adaptation Scheme for Dense IEEE 802.11n Networks. Wirel. Commun. Mob. Comput. 2019, 2019, 1902463. [Google Scholar] [CrossRef]
  26. Petermann, M.; Wübben, D.; Kammeyer, K.-D. Evaluation of encoded MU-MISO-OFDM systems in TDD mode with non-ideal channel reciprocity. In Proceedings of the 2010 International ITG Conference on Source and Channel Coding (SCC), Siegen, Germany, 18–21 January 2010; pp. 1–6. [Google Scholar]
  27. Rathod, V.; Tahiliani, M.P. Geometric Series based effective RTO estimation Technique for CoCoA. Ad Hoc Netw. 2022, 130, 102801. [Google Scholar] [CrossRef]
  28. Yin, W.; Hu, P.; Indulska, J.; Bialkowski, K. Performance of mac80211 rate control mechanisms. In Proceedings of the International Symposium on Modeling Analysis & Simulation of Wireless & Mobile Systems, Miami, FL, USA, 31 October–4 November 2011; pp. 427–436. [Google Scholar]
  29. Khaled, Z.E.; Ajib, W.; Mcheick, H. Log Distance Path Loss Model: Application and Improvement for Sub 5 GHz Rural Fixed Wireless Networks. IEEE Access 2022, 10, 52020–52029. [Google Scholar] [CrossRef]
  30. Zhang, Z.; Chen, B.; Yang, M. Moving Target Detection Based on Time Reversal in a Multipath Environment. IEEE Trans. Aerosp. Electron. Syst. 2021, 57, 3221–3236. [Google Scholar] [CrossRef]
Figure 1. The packet loss rate information of the last ten windows is recorded to calculate the threshold for the following windows.
Figure 1. The packet loss rate information of the last ten windows is recorded to calculate the threshold for the following windows.
Sensors 23 07889 g001
Figure 2. EAR execution flowchart.
Figure 2. EAR execution flowchart.
Sensors 23 07889 g002
Figure 3. (a) Transmission rate comparison before and after adding rate oscillation detection mechanism. (b) Packet loss rate comparison before and after adding rate oscillation detection mechanism.
Figure 3. (a) Transmission rate comparison before and after adding rate oscillation detection mechanism. (b) Packet loss rate comparison before and after adding rate oscillation detection mechanism.
Sensors 23 07889 g003
Figure 4. Pull distance scene model.
Figure 4. Pull distance scene model.
Sensors 23 07889 g004
Figure 5. Hidden terminal model.
Figure 5. Hidden terminal model.
Sensors 23 07889 g005
Figure 6. (a) Changes in packet loss rate. (b) Changes in window size. (c) Changes in transmit rate. (d) Changes in threshold.
Figure 6. (a) Changes in packet loss rate. (b) Changes in window size. (c) Changes in transmit rate. (d) Changes in threshold.
Sensors 23 07889 g006aSensors 23 07889 g006b
Figure 7. Throughput performance of different algorithms in hidden terminal scenario.
Figure 7. Throughput performance of different algorithms in hidden terminal scenario.
Sensors 23 07889 g007
Figure 8. Topological structure of the experimental area.
Figure 8. Topological structure of the experimental area.
Sensors 23 07889 g008
Figure 9. Adding nodes in the WLAN, the average throughput changes of different algorithms.
Figure 9. Adding nodes in the WLAN, the average throughput changes of different algorithms.
Sensors 23 07889 g009
Figure 10. (a) Changes in SNR over time when the movement speed is slow. (b) Changes in SNR over time when the movement speed is fast.
Figure 10. (a) Changes in SNR over time when the movement speed is slow. (b) Changes in SNR over time when the movement speed is fast.
Sensors 23 07889 g010
Figure 11. Comparison of throughput of four algorithms at different speeds and distances.
Figure 11. Comparison of throughput of four algorithms at different speeds and distances.
Sensors 23 07889 g011
Table 1. Classic algorithm classification.
Table 1. Classic algorithm classification.
AlgorithmSender or ReceiverHistory or Current
ARF [12]SenderHistory
AARF [13]SenderHistory
Sample Rate [14]SenderHistory
RBAR [15]ReceiverCurrent
OAR [16]ReceiverCurrent
CHARM [17]SenderCurrent
CARA [18]SenderHistory
SGRA [19]SenderCurrent
BARA [20]SenderCurrent
Minstrel [21]SenderHistory
Table 2. Initialization parameters.
Table 2. Initialization parameters.
ParameterSymbolValue
Initial rate R o r g Protocol maximum rate
Initial window size W i n d o r g 30
Maximum window size W i n d m a x 40
Minimum window size W i n d m i n 20
Original decrease rate threshold P d o w n _ o r g 0.4
Original increase rate threshold P u p _ o r g 0.2
Threshold update coefficient α 0.2
Table 3. Comparison of throughput between fixed and dynamic parameters in high dynamic channel environments.
Table 3. Comparison of throughput between fixed and dynamic parameters in high dynamic channel environments.
Window203040Dynamic
Threshold
0.1–0.22.33 Mbps2.43 Mbps2.12 Mbps2.54 Mbps
0.1–0.32.54 Mbps2.68 Mbps2.55 Mbps2.74 Mbps
0.1–0.42.43 Mbps2.83 Mbps2.63 Mbps3.12 Mbps
0.2–0.32.21 Mbps2.44 Mbps2.36 Mbps3.01 Mbps
0.2–0.42.12 Mbps2.88 Mbps2.34 Mbps2.97 Mbps
0.3–0.41.74 Mbps2.13 Mbps2.29 Mbps2.53 Mbps
Dynamic2.64 Mbps3.26 Mbps3.03 Mbps3.45 Mbps
Table 4. Parameter settings for each module of NS-3.
Table 4. Parameter settings for each module of NS-3.
ParameterValue
Protocol standardIEEE 802.11g
Frequency2.4 GHz
Physical layer modelYansWifiPhy
Transmission methodCBR
Data flow typeUDP
Packet length1400 Bytes
Data flow rate60 Mbps
Channel modelYansWifiChannel
Channel fading modelMatrixPropagationLossModel
Table 5. Performance of the EAR on each data stream.
Table 5. Performance of the EAR on each data stream.
IndicatorsFlow 1Flow 2
Tx Packets26,78526,825
Tx Bytes38,248,98038,306,100
Tx Offered61.1984 Mbps61.2898 Mbps
Rx Packets22861565
Rx Bytes3,264,4082,234,820
Average Throughput5.22305 Mbps3.57571 Mbps
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Yu, W.; Wang, L.; Song, J.; He, L.; Wang, Y. Environment-Aware Rate Adaptation Based on Occasional Request and Robust Adjustment in 802.11 Networks. Sensors 2023, 23, 7889. https://doi.org/10.3390/s23187889

AMA Style

Yu W, Wang L, Song J, He L, Wang Y. Environment-Aware Rate Adaptation Based on Occasional Request and Robust Adjustment in 802.11 Networks. Sensors. 2023; 23(18):7889. https://doi.org/10.3390/s23187889

Chicago/Turabian Style

Yu, Weijie, Li Wang, Jin Song, Lijun He, and Yanting Wang. 2023. "Environment-Aware Rate Adaptation Based on Occasional Request and Robust Adjustment in 802.11 Networks" Sensors 23, no. 18: 7889. https://doi.org/10.3390/s23187889

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop